<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2022-04-29T06:37:25</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:109342" version="1" class="patch">
	<metadata>
		<title>Mesa-19.3.4-45.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-19.3.4-45.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481687" comment="Mesa-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481688" comment="Mesa-32bit-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481689" comment="Mesa-KHR-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481690" comment="Mesa-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481691" comment="Mesa-dri-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481692" comment="Mesa-dri-32bit-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481693" comment="Mesa-dri-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481694" comment="Mesa-gallium-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481695" comment="Mesa-gallium-32bit-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481696" comment="Mesa-libEGL-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481697" comment="Mesa-libEGL1-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481698" comment="Mesa-libEGL1-32bit-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481699" comment="Mesa-libGL-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481700" comment="Mesa-libGL1-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481701" comment="Mesa-libGL1-32bit-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481702" comment="Mesa-libGLESv1_CM-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481703" comment="Mesa-libGLESv1_CM1-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481704" comment="Mesa-libGLESv2-2-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481705" comment="Mesa-libGLESv2-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481706" comment="Mesa-libGLESv3-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481707" comment="Mesa-libVulkan-devel-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481708" comment="Mesa-libd3d-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481709" comment="Mesa-libd3d-devel-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481710" comment="Mesa-libglapi-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481711" comment="Mesa-libglapi0-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481712" comment="Mesa-libglapi0-32bit-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481713" comment="Mesa-libva-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481714" comment="libOSMesa-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481715" comment="libOSMesa8-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481716" comment="libgbm-devel-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481717" comment="libgbm1-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481718" comment="libgbm1-32bit-19.3.4-45.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481719" comment="libvdpau_r300-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481720" comment="libvdpau_r600-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481721" comment="libvdpau_radeonsi-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481722" comment="libvulkan_intel-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481723" comment="libvulkan_radeon-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481724" comment="libxatracker-devel-1.0.0-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481725" comment="libxatracker2-1.0.0-45.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109343" version="1" class="patch">
	<metadata>
		<title>alsa-1.1.5-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-0035" ref_url="https://www.suse.com/security/cve/CVE-2009-0035/" source="CVE"/>
		<description>
These are all security issues fixed in the alsa-1.1.5-6.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0035/">CVE-2009-0035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480984" comment="alsa-1.1.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480985" comment="alsa-devel-1.1.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480986" comment="libasound2-1.1.5-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480987" comment="libasound2-32bit-1.1.5-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109344" version="1" class="patch">
	<metadata>
		<title>amavisd-new-2.11.1-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the amavisd-new-2.11.1-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480988" comment="amavisd-new-2.11.1-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480989" comment="amavisd-new-docs-2.11.1-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109345" version="1" class="patch">
	<metadata>
		<title>apache-commons-httpclient-3.1-9.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-5783" ref_url="https://www.suse.com/security/cve/CVE-2012-5783/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-httpclient-3.1-9.65 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-5783/">CVE-2012-5783</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481726" comment="apache-commons-httpclient-3.1-9.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109346" version="1" class="patch">
	<metadata>
		<title>apache2-2.4.43-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-2.4.43-1.15 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481727" comment="apache2-2.4.43-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481728" comment="apache2-prefork-2.4.43-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481729" comment="apache2-utils-2.4.43-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109347" version="1" class="patch">
	<metadata>
		<title>apparmor-abstractions-2.13.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apparmor-abstractions-2.13.4-1.4 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481730" comment="apparmor-abstractions-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481731" comment="apparmor-docs-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481732" comment="apparmor-parser-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481733" comment="apparmor-parser-lang-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481734" comment="apparmor-profiles-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481735" comment="apparmor-utils-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481736" comment="apparmor-utils-lang-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481737" comment="pam_apparmor-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481738" comment="pam_apparmor-32bit-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481739" comment="perl-apparmor-2.13.4-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481740" comment="python3-apparmor-2.13.4-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109348" version="1" class="patch">
	<metadata>
		<title>apr-util-devel-1.6.1-10.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
These are all security issues fixed in the apr-util-devel-1.6.1-10.21 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481741" comment="apr-util-devel-1.6.1-10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481742" comment="libapr-util1-1.6.1-10.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109349" version="1" class="patch">
	<metadata>
		<title>audit-devel-2.8.1-10.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5186" ref_url="https://www.suse.com/security/cve/CVE-2015-5186/" source="CVE"/>
		<description>
These are all security issues fixed in the audit-devel-2.8.1-10.7 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5186/">CVE-2015-5186</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481743" comment="audit-devel-2.8.1-10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481744" comment="libaudit1-2.8.1-10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481745" comment="libaudit1-32bit-2.8.1-10.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481746" comment="libauparse0-2.8.1-10.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109350" version="1" class="patch">
	<metadata>
		<title>augeas-1.10.1-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0786" ref_url="https://www.suse.com/security/cve/CVE-2012-0786/" source="CVE"/>
		<reference ref_id="CVE-2014-8119" ref_url="https://www.suse.com/security/cve/CVE-2014-8119/" source="CVE"/>
		<reference ref_id="CVE-2017-7555" ref_url="https://www.suse.com/security/cve/CVE-2017-7555/" source="CVE"/>
		<description>
These are all security issues fixed in the augeas-1.10.1-1.11 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0786/">CVE-2012-0786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8119/">CVE-2014-8119</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7555/">CVE-2017-7555</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480071" comment="augeas-1.10.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480072" comment="augeas-devel-1.10.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480073" comment="augeas-lenses-1.10.1-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480074" comment="libaugeas0-1.10.1-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109351" version="1" class="patch">
	<metadata>
		<title>autofs-5.1.3-7.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8169" ref_url="https://www.suse.com/security/cve/CVE-2014-8169/" source="CVE"/>
		<description>
These are all security issues fixed in the autofs-5.1.3-7.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8169/">CVE-2014-8169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481003" comment="autofs-5.1.3-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109352" version="1" class="patch">
	<metadata>
		<title>automake-1.15.1-2.145 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-4029" ref_url="https://www.suse.com/security/cve/CVE-2009-4029/" source="CVE"/>
		<description>
These are all security issues fixed in the automake-1.15.1-2.145 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-4029/">CVE-2009-4029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480076" comment="automake-1.15.1-2.145 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480077" comment="m4-1.4.18-2.138 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109353" version="1" class="patch">
	<metadata>
		<title>autoyast2-4.2.37-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-18905" ref_url="https://www.suse.com/security/cve/CVE-2019-18905/" source="CVE"/>
		<description>
These are all security issues fixed in the autoyast2-4.2.37-1.6 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18905/">CVE-2019-18905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481747" comment="autoyast2-4.2.37-1.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481748" comment="autoyast2-installation-4.2.37-1.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109354" version="1" class="patch">
	<metadata>
		<title>avahi-0.7-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-0.7-1.21 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481004" comment="avahi-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481005" comment="avahi-compat-howl-devel-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481006" comment="avahi-compat-mDNSResponder-devel-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481007" comment="avahi-lang-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481008" comment="avahi-utils-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481009" comment="libavahi-client3-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481010" comment="libavahi-client3-32bit-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481011" comment="libavahi-common3-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481012" comment="libavahi-common3-32bit-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481013" comment="libavahi-core7-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481014" comment="libavahi-devel-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481015" comment="libdns_sd-0.7-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481016" comment="libhowl0-0.7-1.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109355" version="1" class="patch">
	<metadata>
		<title>axis-1.4-11.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-5784" ref_url="https://www.suse.com/security/cve/CVE-2012-5784/" source="CVE"/>
		<reference ref_id="CVE-2014-3596" ref_url="https://www.suse.com/security/cve/CVE-2014-3596/" source="CVE"/>
		<reference ref_id="CVE-2018-8032" ref_url="https://www.suse.com/security/cve/CVE-2018-8032/" source="CVE"/>
		<description>
These are all security issues fixed in the axis-1.4-11.65 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2012-5784/">CVE-2012-5784</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3596/">CVE-2014-3596</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8032/">CVE-2018-8032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481749" comment="axis-1.4-11.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109356" version="1" class="patch">
	<metadata>
		<title>bash-4.4-9.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9401" ref_url="https://www.suse.com/security/cve/CVE-2016-9401/" source="CVE"/>
		<description>
These are all security issues fixed in the bash-4.4-9.10.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9401/">CVE-2016-9401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481750" comment="bash-4.4-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481751" comment="bash-devel-4.4-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481752" comment="bash-doc-4.4-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481753" comment="bash-lang-4.4-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481754" comment="libreadline7-7.0-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481755" comment="libreadline7-32bit-7.0-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481756" comment="readline-devel-7.0-9.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481757" comment="readline-doc-7.0-9.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109357" version="1" class="patch">
	<metadata>
		<title>bind-devel-9.11.2-12.13.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3214" ref_url="https://www.suse.com/security/cve/CVE-2014-3214/" source="CVE"/>
		<reference ref_id="CVE-2014-3859" ref_url="https://www.suse.com/security/cve/CVE-2014-3859/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-5986" ref_url="https://www.suse.com/security/cve/CVE-2015-5986/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8461" ref_url="https://www.suse.com/security/cve/CVE-2015-8461/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3140" ref_url="https://www.suse.com/security/cve/CVE-2017-3140/" source="CVE"/>
		<reference ref_id="CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-devel-9.11.2-12.13.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3214/">CVE-2014-3214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3859/">CVE-2014-3859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5986/">CVE-2015-5986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8461/">CVE-2015-8461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3140/">CVE-2017-3140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481758" comment="bind-devel-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481759" comment="bind-utils-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481760" comment="libbind9-160-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481761" comment="libdns169-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481762" comment="libirs-devel-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481763" comment="libirs160-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481764" comment="libisc166-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481765" comment="libisccc160-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481766" comment="libisccfg160-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481767" comment="liblwres160-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481768" comment="python3-bind-9.11.2-12.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109358" version="1" class="patch">
	<metadata>
		<title>binutils-2.32-7.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-2.32-7.8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481769" comment="binutils-2.32-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481770" comment="binutils-devel-2.32-7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109359" version="1" class="patch">
	<metadata>
		<title>bluez-5.48-11.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-5.48-11.58 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481771" comment="bluez-5.48-11.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481772" comment="libbluetooth3-5.48-11.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109360" version="1" class="patch">
	<metadata>
		<title>btrfsmaintenance-0.4.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14722" ref_url="https://www.suse.com/security/cve/CVE-2018-14722/" source="CVE"/>
		<description>
These are all security issues fixed in the btrfsmaintenance-0.4.2-1.11 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14722/">CVE-2018-14722</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481038" comment="btrfsmaintenance-0.4.2-1.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109361" version="1" class="patch">
	<metadata>
		<title>bubblewrap-0.4.1-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-12439" ref_url="https://www.suse.com/security/cve/CVE-2019-12439/" source="CVE"/>
		<reference ref_id="CVE-2020-5291" ref_url="https://www.suse.com/security/cve/CVE-2020-5291/" source="CVE"/>
		<description>
These are all security issues fixed in the bubblewrap-0.4.1-1.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12439/">CVE-2019-12439</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5291/">CVE-2020-5291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481773" comment="bubblewrap-0.4.1-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109362" version="1" class="patch">
	<metadata>
		<title>bzip2-1.0.6-5.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-3189" ref_url="https://www.suse.com/security/cve/CVE-2016-3189/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<description>
These are all security issues fixed in the bzip2-1.0.6-5.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3189/">CVE-2016-3189</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481774" comment="bzip2-1.0.6-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481775" comment="libbz2-1-1.0.6-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481776" comment="libbz2-1-32bit-1.0.6-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481777" comment="libbz2-devel-1.0.6-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109363" version="1" class="patch">
	<metadata>
		<title>c-ares-devel-1.15.0+20200117-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5180" ref_url="https://www.suse.com/security/cve/CVE-2016-5180/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<description>
These are all security issues fixed in the c-ares-devel-1.15.0+20200117-3.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5180/">CVE-2016-5180</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481778" comment="c-ares-devel-1.15.0+20200117-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481779" comment="libcares2-1.15.0+20200117-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109364" version="1" class="patch">
	<metadata>
		<title>cairo-devel-1.16.0-1.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the cairo-devel-1.16.0-1.55 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481780" comment="cairo-devel-1.16.0-1.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481781" comment="libcairo-gobject2-1.16.0-1.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481782" comment="libcairo-script-interpreter2-1.16.0-1.55 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481783" comment="libcairo2-1.16.0-1.55 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109365" version="1" class="patch">
	<metadata>
		<title>ceph-common-15.2.2.18+g1dbcddb5d8-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-16818" ref_url="https://www.suse.com/security/cve/CVE-2017-16818/" source="CVE"/>
		<reference ref_id="CVE-2018-10861" ref_url="https://www.suse.com/security/cve/CVE-2018-10861/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-16889" ref_url="https://www.suse.com/security/cve/CVE-2018-16889/" source="CVE"/>
		<reference ref_id="CVE-2019-10222" ref_url="https://www.suse.com/security/cve/CVE-2019-10222/" source="CVE"/>
		<reference ref_id="CVE-2019-3821" ref_url="https://www.suse.com/security/cve/CVE-2019-3821/" source="CVE"/>
		<reference ref_id="CVE-2020-10736" ref_url="https://www.suse.com/security/cve/CVE-2020-10736/" source="CVE"/>
		<reference ref_id="CVE-2020-1759" ref_url="https://www.suse.com/security/cve/CVE-2020-1759/" source="CVE"/>
		<reference ref_id="CVE-2020-1760" ref_url="https://www.suse.com/security/cve/CVE-2020-1760/" source="CVE"/>
		<description>
These are all security issues fixed in the ceph-common-15.2.2.18+g1dbcddb5d8-1.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16818/">CVE-2017-16818</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10861/">CVE-2018-10861</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16889/">CVE-2018-16889</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10222/">CVE-2019-10222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3821/">CVE-2019-3821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10736/">CVE-2020-10736</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-1759/">CVE-2020-1759</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-1760/">CVE-2020-1760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481784" comment="ceph-common-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481785" comment="libcephfs-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481786" comment="libcephfs2-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481787" comment="librados-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481788" comment="librados2-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481789" comment="libradospp-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481790" comment="librbd-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481791" comment="librbd1-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481792" comment="librgw-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481793" comment="librgw2-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481794" comment="python3-ceph-argparse-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481795" comment="python3-ceph-common-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481796" comment="python3-cephfs-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481797" comment="python3-rados-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481798" comment="python3-rbd-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481799" comment="python3-rgw-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481800" comment="rados-objclass-devel-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481801" comment="rbd-nbd-15.2.2.18+g1dbcddb5d8-1.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109366" version="1" class="patch">
	<metadata>
		<title>chrony-3.2-9.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1567" ref_url="https://www.suse.com/security/cve/CVE-2016-1567/" source="CVE"/>
		<description>
These are all security issues fixed in the chrony-3.2-9.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1567/">CVE-2016-1567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481802" comment="chrony-3.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481803" comment="chrony-pool-empty-3.2-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481804" comment="chrony-pool-suse-3.2-9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109367" version="1" class="patch">
	<metadata>
		<title>clamav-0.100.3-3.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-6706" ref_url="https://www.suse.com/security/cve/CVE-2012-6706/" source="CVE"/>
		<reference ref_id="CVE-2013-6497" ref_url="https://www.suse.com/security/cve/CVE-2013-6497/" source="CVE"/>
		<reference ref_id="CVE-2014-9328" ref_url="https://www.suse.com/security/cve/CVE-2014-9328/" source="CVE"/>
		<reference ref_id="CVE-2015-1461" ref_url="https://www.suse.com/security/cve/CVE-2015-1461/" source="CVE"/>
		<reference ref_id="CVE-2015-1462" ref_url="https://www.suse.com/security/cve/CVE-2015-1462/" source="CVE"/>
		<reference ref_id="CVE-2015-1463" ref_url="https://www.suse.com/security/cve/CVE-2015-1463/" source="CVE"/>
		<reference ref_id="CVE-2015-2170" ref_url="https://www.suse.com/security/cve/CVE-2015-2170/" source="CVE"/>
		<reference ref_id="CVE-2015-2221" ref_url="https://www.suse.com/security/cve/CVE-2015-2221/" source="CVE"/>
		<reference ref_id="CVE-2015-2222" ref_url="https://www.suse.com/security/cve/CVE-2015-2222/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2668" ref_url="https://www.suse.com/security/cve/CVE-2015-2668/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-12374" ref_url="https://www.suse.com/security/cve/CVE-2017-12374/" source="CVE"/>
		<reference ref_id="CVE-2017-12375" ref_url="https://www.suse.com/security/cve/CVE-2017-12375/" source="CVE"/>
		<reference ref_id="CVE-2017-12376" ref_url="https://www.suse.com/security/cve/CVE-2017-12376/" source="CVE"/>
		<reference ref_id="CVE-2017-12377" ref_url="https://www.suse.com/security/cve/CVE-2017-12377/" source="CVE"/>
		<reference ref_id="CVE-2017-12378" ref_url="https://www.suse.com/security/cve/CVE-2017-12378/" source="CVE"/>
		<reference ref_id="CVE-2017-12379" ref_url="https://www.suse.com/security/cve/CVE-2017-12379/" source="CVE"/>
		<reference ref_id="CVE-2017-12380" ref_url="https://www.suse.com/security/cve/CVE-2017-12380/" source="CVE"/>
		<reference ref_id="CVE-2017-6418" ref_url="https://www.suse.com/security/cve/CVE-2017-6418/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2017-6420" ref_url="https://www.suse.com/security/cve/CVE-2017-6420/" source="CVE"/>
		<reference ref_id="CVE-2018-0202" ref_url="https://www.suse.com/security/cve/CVE-2018-0202/" source="CVE"/>
		<reference ref_id="CVE-2018-0360" ref_url="https://www.suse.com/security/cve/CVE-2018-0360/" source="CVE"/>
		<reference ref_id="CVE-2018-0361" ref_url="https://www.suse.com/security/cve/CVE-2018-0361/" source="CVE"/>
		<reference ref_id="CVE-2018-1000085" ref_url="https://www.suse.com/security/cve/CVE-2018-1000085/" source="CVE"/>
		<reference ref_id="CVE-2018-14680" ref_url="https://www.suse.com/security/cve/CVE-2018-14680/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="CVE-2018-15378" ref_url="https://www.suse.com/security/cve/CVE-2018-15378/" source="CVE"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<description>
These are all security issues fixed in the clamav-0.100.3-3.20.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2012-6706/">CVE-2012-6706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6497/">CVE-2013-6497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9328/">CVE-2014-9328</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1461/">CVE-2015-1461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1462/">CVE-2015-1462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1463/">CVE-2015-1463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2170/">CVE-2015-2170</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2221/">CVE-2015-2221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2222/">CVE-2015-2222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2668/">CVE-2015-2668</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12374/">CVE-2017-12374</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12375/">CVE-2017-12375</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12376/">CVE-2017-12376</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12377/">CVE-2017-12377</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12378/">CVE-2017-12378</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12379/">CVE-2017-12379</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12380/">CVE-2017-12380</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6418/">CVE-2017-6418</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6420/">CVE-2017-6420</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0202/">CVE-2018-0202</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0360/">CVE-2018-0360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0361/">CVE-2018-0361</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000085/">CVE-2018-1000085</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14680/">CVE-2018-14680</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15378/">CVE-2018-15378</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481805" comment="clamav-0.100.3-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481806" comment="clamav-devel-0.100.3-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481807" comment="libclamav7-0.100.3-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481808" comment="libclammspack0-0.100.3-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109368" version="1" class="patch">
	<metadata>
		<title>collectd-5.10.0-1.108 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-6254" ref_url="https://www.suse.com/security/cve/CVE-2016-6254/" source="CVE"/>
		<reference ref_id="CVE-2017-7401" ref_url="https://www.suse.com/security/cve/CVE-2017-7401/" source="CVE"/>
		<description>
These are all security issues fixed in the collectd-5.10.0-1.108 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6254/">CVE-2016-6254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7401/">CVE-2017-7401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481809" comment="collectd-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481810" comment="collectd-plugin-connectivity-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481811" comment="collectd-plugin-dbi-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481812" comment="collectd-plugin-ipmi-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481813" comment="collectd-plugin-java-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481814" comment="collectd-plugin-lua-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481815" comment="collectd-plugin-mcelog-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481816" comment="collectd-plugin-memcachec-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481817" comment="collectd-plugin-mysql-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481818" comment="collectd-plugin-notify-desktop-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481819" comment="collectd-plugin-nut-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481820" comment="collectd-plugin-openldap-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481821" comment="collectd-plugin-ovs-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481822" comment="collectd-plugin-pcie-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481823" comment="collectd-plugin-pinba-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481824" comment="collectd-plugin-postgresql-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481825" comment="collectd-plugin-procevent-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481826" comment="collectd-plugin-python3-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481827" comment="collectd-plugin-smart-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481828" comment="collectd-plugin-snmp-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481829" comment="collectd-plugin-synproxy-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481830" comment="collectd-plugin-sysevent-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481831" comment="collectd-plugin-uptime-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481832" comment="collectd-plugin-virt-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481833" comment="collectd-plugin-write_stackdriver-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481834" comment="collectd-plugin-write_syslog-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481835" comment="collectd-plugins-all-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481836" comment="collectd-spamassassin-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481837" comment="collectd-web-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481838" comment="collectd-web-js-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481839" comment="libcollectdclient-devel-5.10.0-1.108 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481840" comment="libcollectdclient1-5.10.0-1.108 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109369" version="1" class="patch">
	<metadata>
		<title>conntrack-tools-1.4.5-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-6496" ref_url="https://www.suse.com/security/cve/CVE-2015-6496/" source="CVE"/>
		<description>
These are all security issues fixed in the conntrack-tools-1.4.5-1.46 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6496/">CVE-2015-6496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481841" comment="conntrack-tools-1.4.5-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481842" comment="conntrackd-1.4.5-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109370" version="1" class="patch">
	<metadata>
		<title>coreutils-8.29-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-0221" ref_url="https://www.suse.com/security/cve/CVE-2013-0221/" source="CVE"/>
		<reference ref_id="CVE-2013-0222" ref_url="https://www.suse.com/security/cve/CVE-2013-0222/" source="CVE"/>
		<reference ref_id="CVE-2013-0223" ref_url="https://www.suse.com/security/cve/CVE-2013-0223/" source="CVE"/>
		<reference ref_id="CVE-2015-4041" ref_url="https://www.suse.com/security/cve/CVE-2015-4041/" source="CVE"/>
		<reference ref_id="CVE-2015-4042" ref_url="https://www.suse.com/security/cve/CVE-2015-4042/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the coreutils-8.29-2.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0221/">CVE-2013-0221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0222/">CVE-2013-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0223/">CVE-2013-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4041/">CVE-2015-4041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4042/">CVE-2015-4042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480143" comment="coreutils-8.29-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480144" comment="coreutils-lang-8.29-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109371" version="1" class="patch">
	<metadata>
		<title>cpio-2.12-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9112" ref_url="https://www.suse.com/security/cve/CVE-2014-9112/" source="CVE"/>
		<reference ref_id="CVE-2016-2037" ref_url="https://www.suse.com/security/cve/CVE-2016-2037/" source="CVE"/>
		<reference ref_id="CVE-2019-14866" ref_url="https://www.suse.com/security/cve/CVE-2019-14866/" source="CVE"/>
		<description>
These are all security issues fixed in the cpio-2.12-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9112/">CVE-2014-9112</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-2037/">CVE-2016-2037</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14866/">CVE-2019-14866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481843" comment="cpio-2.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481844" comment="cpio-lang-2.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481845" comment="cpio-mt-2.12-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109372" version="1" class="patch">
	<metadata>
		<title>cpp7-7.5.0+r278197-4.16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp7-7.5.0+r278197-4.16.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481846" comment="cpp7-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481847" comment="gcc7-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481848" comment="gcc7-c++-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481849" comment="gcc7-fortran-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481850" comment="libada9-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481851" comment="libada9-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481852" comment="libasan4-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481853" comment="libasan5-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481854" comment="libasan5-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481855" comment="libatomic1-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481856" comment="libatomic1-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481857" comment="libcilkrts5-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481858" comment="libgcc_s1-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481859" comment="libgcc_s1-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481860" comment="libgfortran4-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481861" comment="libgfortran4-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481862" comment="libgfortran5-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481863" comment="libgfortran5-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481864" comment="libgo14-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481865" comment="libgo14-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481866" comment="libgomp1-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481867" comment="libgomp1-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481868" comment="libitm1-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481869" comment="libitm1-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481870" comment="liblsan0-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481871" comment="libobjc4-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481872" comment="libquadmath0-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481873" comment="libquadmath0-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481874" comment="libstdc++6-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481875" comment="libstdc++6-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481876" comment="libstdc++6-devel-gcc7-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481877" comment="libstdc++6-devel-gcc9-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481878" comment="libstdc++6-locale-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481879" comment="libstdc++6-pp-gcc9-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481880" comment="libstdc++6-pp-gcc9-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481881" comment="libtsan0-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481882" comment="libubsan0-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481883" comment="libubsan1-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481884" comment="libubsan1-32bit-9.3.1+git1296-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109373" version="1" class="patch">
	<metadata>
		<title>cracklib-2.9.6-9.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-6318" ref_url="https://www.suse.com/security/cve/CVE-2016-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the cracklib-2.9.6-9.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6318/">CVE-2016-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481885" comment="cracklib-2.9.6-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481886" comment="cracklib-devel-2.9.6-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481887" comment="cracklib-dict-small-2.9.6-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481888" comment="libcrack2-2.9.6-9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481889" comment="libcrack2-32bit-2.9.6-9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109374" version="1" class="patch">
	<metadata>
		<title>cron-4.2-6.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-9704" ref_url="https://www.suse.com/security/cve/CVE-2019-9704/" source="CVE"/>
		<reference ref_id="CVE-2019-9705" ref_url="https://www.suse.com/security/cve/CVE-2019-9705/" source="CVE"/>
		<description>
These are all security issues fixed in the cron-4.2-6.12.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9704/">CVE-2019-9704</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9705/">CVE-2019-9705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481890" comment="cron-4.2-6.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481891" comment="cronie-1.5.1-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109375" version="1" class="patch">
	<metadata>
		<title>cups-2.2.7-3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-2.2.7-3.17.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481892" comment="cups-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481893" comment="cups-client-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481894" comment="cups-config-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481895" comment="cups-devel-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481896" comment="libcups2-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481897" comment="libcups2-32bit-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481898" comment="libcupscgi1-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481899" comment="libcupsimage2-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481900" comment="libcupsmime1-2.2.7-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481901" comment="libcupsppdc1-2.2.7-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109376" version="1" class="patch">
	<metadata>
		<title>cups-filters-1.25.0-1.107 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2265" ref_url="https://www.suse.com/security/cve/CVE-2015-2265/" source="CVE"/>
		<reference ref_id="CVE-2015-3258" ref_url="https://www.suse.com/security/cve/CVE-2015-3258/" source="CVE"/>
		<reference ref_id="CVE-2015-3279" ref_url="https://www.suse.com/security/cve/CVE-2015-3279/" source="CVE"/>
		<reference ref_id="CVE-2015-8327" ref_url="https://www.suse.com/security/cve/CVE-2015-8327/" source="CVE"/>
		<reference ref_id="CVE-2015-8560" ref_url="https://www.suse.com/security/cve/CVE-2015-8560/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-filters-1.25.0-1.107 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2265/">CVE-2015-2265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3258/">CVE-2015-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3279/">CVE-2015-3279</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8327/">CVE-2015-8327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8560/">CVE-2015-8560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481902" comment="cups-filters-1.25.0-1.107 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481903" comment="cups-filters-devel-1.25.0-1.107 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109377" version="1" class="patch">
	<metadata>
		<title>curl-7.66.0-2.59 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8150" ref_url="https://www.suse.com/security/cve/CVE-2014-8150/" source="CVE"/>
		<reference ref_id="CVE-2015-3143" ref_url="https://www.suse.com/security/cve/CVE-2015-3143/" source="CVE"/>
		<reference ref_id="CVE-2015-3144" ref_url="https://www.suse.com/security/cve/CVE-2015-3144/" source="CVE"/>
		<reference ref_id="CVE-2015-3145" ref_url="https://www.suse.com/security/cve/CVE-2015-3145/" source="CVE"/>
		<reference ref_id="CVE-2015-3148" ref_url="https://www.suse.com/security/cve/CVE-2015-3148/" source="CVE"/>
		<reference ref_id="CVE-2015-3153" ref_url="https://www.suse.com/security/cve/CVE-2015-3153/" source="CVE"/>
		<reference ref_id="CVE-2015-3236" ref_url="https://www.suse.com/security/cve/CVE-2015-3236/" source="CVE"/>
		<reference ref_id="CVE-2015-3237" ref_url="https://www.suse.com/security/cve/CVE-2015-3237/" source="CVE"/>
		<reference ref_id="CVE-2016-0755" ref_url="https://www.suse.com/security/cve/CVE-2016-0755/" source="CVE"/>
		<reference ref_id="CVE-2016-7167" ref_url="https://www.suse.com/security/cve/CVE-2016-7167/" source="CVE"/>
		<reference ref_id="CVE-2016-8615" ref_url="https://www.suse.com/security/cve/CVE-2016-8615/" source="CVE"/>
		<reference ref_id="CVE-2016-8616" ref_url="https://www.suse.com/security/cve/CVE-2016-8616/" source="CVE"/>
		<reference ref_id="CVE-2016-8617" ref_url="https://www.suse.com/security/cve/CVE-2016-8617/" source="CVE"/>
		<reference ref_id="CVE-2016-8618" ref_url="https://www.suse.com/security/cve/CVE-2016-8618/" source="CVE"/>
		<reference ref_id="CVE-2016-8619" ref_url="https://www.suse.com/security/cve/CVE-2016-8619/" source="CVE"/>
		<reference ref_id="CVE-2016-8620" ref_url="https://www.suse.com/security/cve/CVE-2016-8620/" source="CVE"/>
		<reference ref_id="CVE-2016-8621" ref_url="https://www.suse.com/security/cve/CVE-2016-8621/" source="CVE"/>
		<reference ref_id="CVE-2016-8622" ref_url="https://www.suse.com/security/cve/CVE-2016-8622/" source="CVE"/>
		<reference ref_id="CVE-2016-8623" ref_url="https://www.suse.com/security/cve/CVE-2016-8623/" source="CVE"/>
		<reference ref_id="CVE-2016-8624" ref_url="https://www.suse.com/security/cve/CVE-2016-8624/" source="CVE"/>
		<reference ref_id="CVE-2016-8625" ref_url="https://www.suse.com/security/cve/CVE-2016-8625/" source="CVE"/>
		<reference ref_id="CVE-2016-9586" ref_url="https://www.suse.com/security/cve/CVE-2016-9586/" source="CVE"/>
		<reference ref_id="CVE-2016-9594" ref_url="https://www.suse.com/security/cve/CVE-2016-9594/" source="CVE"/>
		<reference ref_id="CVE-2017-1000099" ref_url="https://www.suse.com/security/cve/CVE-2017-1000099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000100" ref_url="https://www.suse.com/security/cve/CVE-2017-1000100/" source="CVE"/>
		<reference ref_id="CVE-2017-1000101" ref_url="https://www.suse.com/security/cve/CVE-2017-1000101/" source="CVE"/>
		<reference ref_id="CVE-2017-1000254" ref_url="https://www.suse.com/security/cve/CVE-2017-1000254/" source="CVE"/>
		<reference ref_id="CVE-2017-1000257" ref_url="https://www.suse.com/security/cve/CVE-2017-1000257/" source="CVE"/>
		<reference ref_id="CVE-2017-2629" ref_url="https://www.suse.com/security/cve/CVE-2017-2629/" source="CVE"/>
		<reference ref_id="CVE-2017-7468" ref_url="https://www.suse.com/security/cve/CVE-2017-7468/" source="CVE"/>
		<reference ref_id="CVE-2017-8816" ref_url="https://www.suse.com/security/cve/CVE-2017-8816/" source="CVE"/>
		<reference ref_id="CVE-2017-8817" ref_url="https://www.suse.com/security/cve/CVE-2017-8817/" source="CVE"/>
		<reference ref_id="CVE-2017-8818" ref_url="https://www.suse.com/security/cve/CVE-2017-8818/" source="CVE"/>
		<reference ref_id="CVE-2017-9502" ref_url="https://www.suse.com/security/cve/CVE-2017-9502/" source="CVE"/>
		<reference ref_id="CVE-2018-0500" ref_url="https://www.suse.com/security/cve/CVE-2018-0500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000005" ref_url="https://www.suse.com/security/cve/CVE-2018-1000005/" source="CVE"/>
		<reference ref_id="CVE-2018-1000007" ref_url="https://www.suse.com/security/cve/CVE-2018-1000007/" source="CVE"/>
		<reference ref_id="CVE-2018-1000120" ref_url="https://www.suse.com/security/cve/CVE-2018-1000120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000121" ref_url="https://www.suse.com/security/cve/CVE-2018-1000121/" source="CVE"/>
		<reference ref_id="CVE-2018-1000122" ref_url="https://www.suse.com/security/cve/CVE-2018-1000122/" source="CVE"/>
		<reference ref_id="CVE-2018-1000300" ref_url="https://www.suse.com/security/cve/CVE-2018-1000300/" source="CVE"/>
		<reference ref_id="CVE-2018-1000301" ref_url="https://www.suse.com/security/cve/CVE-2018-1000301/" source="CVE"/>
		<reference ref_id="CVE-2018-14618" ref_url="https://www.suse.com/security/cve/CVE-2018-14618/" source="CVE"/>
		<reference ref_id="CVE-2018-16839" ref_url="https://www.suse.com/security/cve/CVE-2018-16839/" source="CVE"/>
		<reference ref_id="CVE-2018-16840" ref_url="https://www.suse.com/security/cve/CVE-2018-16840/" source="CVE"/>
		<reference ref_id="CVE-2018-16842" ref_url="https://www.suse.com/security/cve/CVE-2018-16842/" source="CVE"/>
		<reference ref_id="CVE-2018-16890" ref_url="https://www.suse.com/security/cve/CVE-2018-16890/" source="CVE"/>
		<reference ref_id="CVE-2019-3822" ref_url="https://www.suse.com/security/cve/CVE-2019-3822/" source="CVE"/>
		<reference ref_id="CVE-2019-3823" ref_url="https://www.suse.com/security/cve/CVE-2019-3823/" source="CVE"/>
		<reference ref_id="CVE-2019-5435" ref_url="https://www.suse.com/security/cve/CVE-2019-5435/" source="CVE"/>
		<reference ref_id="CVE-2019-5436" ref_url="https://www.suse.com/security/cve/CVE-2019-5436/" source="CVE"/>
		<reference ref_id="CVE-2019-5481" ref_url="https://www.suse.com/security/cve/CVE-2019-5481/" source="CVE"/>
		<reference ref_id="CVE-2019-5482" ref_url="https://www.suse.com/security/cve/CVE-2019-5482/" source="CVE"/>
		<description>
These are all security issues fixed in the curl-7.66.0-2.59 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8150/">CVE-2014-8150</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3143/">CVE-2015-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3144/">CVE-2015-3144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3145/">CVE-2015-3145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3148/">CVE-2015-3148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3153/">CVE-2015-3153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3236/">CVE-2015-3236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3237/">CVE-2015-3237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0755/">CVE-2016-0755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7167/">CVE-2016-7167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8615/">CVE-2016-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8616/">CVE-2016-8616</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8617/">CVE-2016-8617</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-8618/">CVE-2016-8618</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8619/">CVE-2016-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8620/">CVE-2016-8620</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-8621/">CVE-2016-8621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8622/">CVE-2016-8622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8623/">CVE-2016-8623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8624/">CVE-2016-8624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8625/">CVE-2016-8625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9586/">CVE-2016-9586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9594/">CVE-2016-9594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000099/">CVE-2017-1000099</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000100/">CVE-2017-1000100</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000101/">CVE-2017-1000101</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000254/">CVE-2017-1000254</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000257/">CVE-2017-1000257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2629/">CVE-2017-2629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7468/">CVE-2017-7468</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8816/">CVE-2017-8816</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-8817/">CVE-2017-8817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8818/">CVE-2017-8818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9502/">CVE-2017-9502</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0500/">CVE-2018-0500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000005/">CVE-2018-1000005</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000007/">CVE-2018-1000007</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000120/">CVE-2018-1000120</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000121/">CVE-2018-1000121</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000122/">CVE-2018-1000122</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000300/">CVE-2018-1000300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000301/">CVE-2018-1000301</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14618/">CVE-2018-14618</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16839/">CVE-2018-16839</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16840/">CVE-2018-16840</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16842/">CVE-2018-16842</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16890/">CVE-2018-16890</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3822/">CVE-2019-3822</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3823/">CVE-2019-3823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5435/">CVE-2019-5435</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5436/">CVE-2019-5436</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5481/">CVE-2019-5481</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5482/">CVE-2019-5482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481904" comment="curl-7.66.0-2.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481905" comment="libcurl-devel-7.66.0-2.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481906" comment="libcurl4-7.66.0-2.59 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481907" comment="libcurl4-32bit-7.66.0-2.59 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109378" version="1" class="patch">
	<metadata>
		<title>dbus-1-1.12.2-8.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3636" ref_url="https://www.suse.com/security/cve/CVE-2014-3636/" source="CVE"/>
		<reference ref_id="CVE-2014-3637" ref_url="https://www.suse.com/security/cve/CVE-2014-3637/" source="CVE"/>
		<reference ref_id="CVE-2014-3639" ref_url="https://www.suse.com/security/cve/CVE-2014-3639/" source="CVE"/>
		<reference ref_id="CVE-2014-7824" ref_url="https://www.suse.com/security/cve/CVE-2014-7824/" source="CVE"/>
		<reference ref_id="CVE-2014-8148" ref_url="https://www.suse.com/security/cve/CVE-2014-8148/" source="CVE"/>
		<reference ref_id="CVE-2015-0245" ref_url="https://www.suse.com/security/cve/CVE-2015-0245/" source="CVE"/>
		<reference ref_id="CVE-2019-12749" ref_url="https://www.suse.com/security/cve/CVE-2019-12749/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-1.12.2-8.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3636/">CVE-2014-3636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3637/">CVE-2014-3637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3639/">CVE-2014-3639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7824/">CVE-2014-7824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8148/">CVE-2014-8148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0245/">CVE-2015-0245</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12749/">CVE-2019-12749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481908" comment="dbus-1-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481909" comment="dbus-1-devel-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481910" comment="dbus-1-x11-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481911" comment="libdbus-1-3-1.12.2-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481912" comment="libdbus-1-3-32bit-1.12.2-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109379" version="1" class="patch">
	<metadata>
		<title>dbus-1-glib-0.108-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-1172" ref_url="https://www.suse.com/security/cve/CVE-2010-1172/" source="CVE"/>
		<reference ref_id="CVE-2013-0292" ref_url="https://www.suse.com/security/cve/CVE-2013-0292/" source="CVE"/>
		<description>
These are all security issues fixed in the dbus-1-glib-0.108-1.29 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1172/">CVE-2010-1172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0292/">CVE-2013-0292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480190" comment="dbus-1-glib-0.108-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480191" comment="dbus-1-glib-32bit-0.108-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480192" comment="dbus-1-glib-devel-0.108-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480193" comment="dbus-1-glib-tool-0.108-1.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109380" version="1" class="patch">
	<metadata>
		<title>dhcp-4.3.5-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-4.3.5-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481913" comment="dhcp-4.3.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481914" comment="dhcp-client-4.3.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481915" comment="dhcp-devel-4.3.5-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109381" version="1" class="patch">
	<metadata>
		<title>dnsmasq-2.78-7.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3294" ref_url="https://www.suse.com/security/cve/CVE-2015-3294/" source="CVE"/>
		<reference ref_id="CVE-2015-8899" ref_url="https://www.suse.com/security/cve/CVE-2015-8899/" source="CVE"/>
		<reference ref_id="CVE-2017-14491" ref_url="https://www.suse.com/security/cve/CVE-2017-14491/" source="CVE"/>
		<reference ref_id="CVE-2017-14492" ref_url="https://www.suse.com/security/cve/CVE-2017-14492/" source="CVE"/>
		<reference ref_id="CVE-2017-14493" ref_url="https://www.suse.com/security/cve/CVE-2017-14493/" source="CVE"/>
		<reference ref_id="CVE-2017-14494" ref_url="https://www.suse.com/security/cve/CVE-2017-14494/" source="CVE"/>
		<reference ref_id="CVE-2017-14495" ref_url="https://www.suse.com/security/cve/CVE-2017-14495/" source="CVE"/>
		<reference ref_id="CVE-2017-14496" ref_url="https://www.suse.com/security/cve/CVE-2017-14496/" source="CVE"/>
		<reference ref_id="CVE-2017-15107" ref_url="https://www.suse.com/security/cve/CVE-2017-15107/" source="CVE"/>
		<reference ref_id="CVE-2019-14834" ref_url="https://www.suse.com/security/cve/CVE-2019-14834/" source="CVE"/>
		<description>
These are all security issues fixed in the dnsmasq-2.78-7.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3294/">CVE-2015-3294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8899/">CVE-2015-8899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14491/">CVE-2017-14491</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14492/">CVE-2017-14492</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14493/">CVE-2017-14493</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14494/">CVE-2017-14494</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14495/">CVE-2017-14495</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14496/">CVE-2017-14496</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15107/">CVE-2017-15107</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14834/">CVE-2019-14834</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481916" comment="dnsmasq-2.78-7.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109382" version="1" class="patch">
	<metadata>
		<title>dracut-049.1+suse.144.ge0eaf296-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8637" ref_url="https://www.suse.com/security/cve/CVE-2016-8637/" source="CVE"/>
		<description>
These are all security issues fixed in the dracut-049.1+suse.144.ge0eaf296-1.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8637/">CVE-2016-8637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481917" comment="dracut-049.1+suse.144.ge0eaf296-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481918" comment="dracut-fips-049.1+suse.144.ge0eaf296-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481919" comment="dracut-ima-049.1+suse.144.ge0eaf296-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109383" version="1" class="patch">
	<metadata>
		<title>dstat-0.7.3-2.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-3894" ref_url="https://www.suse.com/security/cve/CVE-2009-3894/" source="CVE"/>
		<description>
These are all security issues fixed in the dstat-0.7.3-2.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3894/">CVE-2009-3894</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480201" comment="dstat-0.7.3-2.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109384" version="1" class="patch">
	<metadata>
		<title>e2fsprogs-1.43.8-4.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0247" ref_url="https://www.suse.com/security/cve/CVE-2015-0247/" source="CVE"/>
		<reference ref_id="CVE-2015-1572" ref_url="https://www.suse.com/security/cve/CVE-2015-1572/" source="CVE"/>
		<reference ref_id="CVE-2019-5094" ref_url="https://www.suse.com/security/cve/CVE-2019-5094/" source="CVE"/>
		<reference ref_id="CVE-2019-5188" ref_url="https://www.suse.com/security/cve/CVE-2019-5188/" source="CVE"/>
		<description>
These are all security issues fixed in the e2fsprogs-1.43.8-4.20.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2015-0247/">CVE-2015-0247</cve>
	<cve impact="low" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-1572/">CVE-2015-1572</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5094/">CVE-2019-5094</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5188/">CVE-2019-5188</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481920" comment="e2fsprogs-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481921" comment="e2fsprogs-devel-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481922" comment="libcom_err-devel-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481923" comment="libcom_err-devel-static-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481924" comment="libcom_err2-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481925" comment="libcom_err2-32bit-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481926" comment="libext2fs-devel-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481927" comment="libext2fs-devel-static-1.43.8-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481928" comment="libext2fs2-1.43.8-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109385" version="1" class="patch">
	<metadata>
		<title>ecryptfs-utils-111-2.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-1831" ref_url="https://www.suse.com/security/cve/CVE-2011-1831/" source="CVE"/>
		<reference ref_id="CVE-2011-1832" ref_url="https://www.suse.com/security/cve/CVE-2011-1832/" source="CVE"/>
		<reference ref_id="CVE-2011-1833" ref_url="https://www.suse.com/security/cve/CVE-2011-1833/" source="CVE"/>
		<reference ref_id="CVE-2011-1834" ref_url="https://www.suse.com/security/cve/CVE-2011-1834/" source="CVE"/>
		<reference ref_id="CVE-2011-1835" ref_url="https://www.suse.com/security/cve/CVE-2011-1835/" source="CVE"/>
		<reference ref_id="CVE-2011-1836" ref_url="https://www.suse.com/security/cve/CVE-2011-1836/" source="CVE"/>
		<reference ref_id="CVE-2011-1837" ref_url="https://www.suse.com/security/cve/CVE-2011-1837/" source="CVE"/>
		<reference ref_id="CVE-2014-9687" ref_url="https://www.suse.com/security/cve/CVE-2014-9687/" source="CVE"/>
		<reference ref_id="CVE-2016-1572" ref_url="https://www.suse.com/security/cve/CVE-2016-1572/" source="CVE"/>
		<description>
These are all security issues fixed in the ecryptfs-utils-111-2.31 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1831/">CVE-2011-1831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1832/">CVE-2011-1832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1833/">CVE-2011-1833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1834/">CVE-2011-1834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1835/">CVE-2011-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1836/">CVE-2011-1836</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-1837/">CVE-2011-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9687/">CVE-2014-9687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1572/">CVE-2016-1572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480202" comment="ecryptfs-utils-111-2.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480203" comment="ecryptfs-utils-devel-111-2.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480204" comment="libecryptfs1-111-2.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109386" version="1" class="patch">
	<metadata>
		<title>elfutils-0.168-4.5.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9447" ref_url="https://www.suse.com/security/cve/CVE-2014-9447/" source="CVE"/>
		<reference ref_id="CVE-2017-7607" ref_url="https://www.suse.com/security/cve/CVE-2017-7607/" source="CVE"/>
		<reference ref_id="CVE-2017-7608" ref_url="https://www.suse.com/security/cve/CVE-2017-7608/" source="CVE"/>
		<reference ref_id="CVE-2017-7609" ref_url="https://www.suse.com/security/cve/CVE-2017-7609/" source="CVE"/>
		<reference ref_id="CVE-2017-7610" ref_url="https://www.suse.com/security/cve/CVE-2017-7610/" source="CVE"/>
		<reference ref_id="CVE-2017-7611" ref_url="https://www.suse.com/security/cve/CVE-2017-7611/" source="CVE"/>
		<reference ref_id="CVE-2017-7612" ref_url="https://www.suse.com/security/cve/CVE-2017-7612/" source="CVE"/>
		<reference ref_id="CVE-2017-7613" ref_url="https://www.suse.com/security/cve/CVE-2017-7613/" source="CVE"/>
		<reference ref_id="CVE-2018-16062" ref_url="https://www.suse.com/security/cve/CVE-2018-16062/" source="CVE"/>
		<reference ref_id="CVE-2018-16402" ref_url="https://www.suse.com/security/cve/CVE-2018-16402/" source="CVE"/>
		<reference ref_id="CVE-2018-16403" ref_url="https://www.suse.com/security/cve/CVE-2018-16403/" source="CVE"/>
		<reference ref_id="CVE-2018-18310" ref_url="https://www.suse.com/security/cve/CVE-2018-18310/" source="CVE"/>
		<reference ref_id="CVE-2018-18520" ref_url="https://www.suse.com/security/cve/CVE-2018-18520/" source="CVE"/>
		<reference ref_id="CVE-2018-18521" ref_url="https://www.suse.com/security/cve/CVE-2018-18521/" source="CVE"/>
		<reference ref_id="CVE-2019-7150" ref_url="https://www.suse.com/security/cve/CVE-2019-7150/" source="CVE"/>
		<reference ref_id="CVE-2019-7665" ref_url="https://www.suse.com/security/cve/CVE-2019-7665/" source="CVE"/>
		<description>
These are all security issues fixed in the elfutils-0.168-4.5.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9447/">CVE-2014-9447</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7607/">CVE-2017-7607</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7608/">CVE-2017-7608</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7609/">CVE-2017-7609</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7610/">CVE-2017-7610</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7611/">CVE-2017-7611</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7612/">CVE-2017-7612</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7613/">CVE-2017-7613</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16062/">CVE-2018-16062</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16402/">CVE-2018-16402</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16403/">CVE-2018-16403</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18310/">CVE-2018-18310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18520/">CVE-2018-18520</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18521/">CVE-2018-18521</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7150/">CVE-2019-7150</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7665/">CVE-2019-7665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481929" comment="elfutils-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481930" comment="elfutils-lang-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481931" comment="libasm-devel-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481932" comment="libasm1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481933" comment="libdw-devel-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481934" comment="libdw1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481935" comment="libdw1-32bit-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481936" comment="libebl-devel-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481937" comment="libebl-plugins-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481938" comment="libebl-plugins-32bit-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481939" comment="libelf-devel-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481940" comment="libelf1-0.168-4.5.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481941" comment="libelf1-32bit-0.168-4.5.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109387" version="1" class="patch">
	<metadata>
		<title>emacs-25.3-3.3.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="CVE-2014-9483" ref_url="https://www.suse.com/security/cve/CVE-2014-9483/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-25.3-3.3.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9483/">CVE-2014-9483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481111" comment="emacs-25.3-3.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481112" comment="emacs-el-25.3-3.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481113" comment="emacs-info-25.3-3.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481114" comment="emacs-nox-25.3-3.3.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481115" comment="etags-25.3-3.3.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109388" version="1" class="patch">
	<metadata>
		<title>enscript-1.6.6-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2008-3863" ref_url="https://www.suse.com/security/cve/CVE-2008-3863/" source="CVE"/>
		<reference ref_id="CVE-2008-4306" ref_url="https://www.suse.com/security/cve/CVE-2008-4306/" source="CVE"/>
		<description>
These are all security issues fixed in the enscript-1.6.6-1.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3863/">CVE-2008-3863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-4306/">CVE-2008-4306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480223" comment="enscript-1.6.6-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109389" version="1" class="patch">
	<metadata>
		<title>expat-2.2.5-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0876" ref_url="https://www.suse.com/security/cve/CVE-2012-0876/" source="CVE"/>
		<reference ref_id="CVE-2012-6702" ref_url="https://www.suse.com/security/cve/CVE-2012-6702/" source="CVE"/>
		<reference ref_id="CVE-2015-1283" ref_url="https://www.suse.com/security/cve/CVE-2015-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-4472" ref_url="https://www.suse.com/security/cve/CVE-2016-4472/" source="CVE"/>
		<reference ref_id="CVE-2016-5300" ref_url="https://www.suse.com/security/cve/CVE-2016-5300/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2017-9233" ref_url="https://www.suse.com/security/cve/CVE-2017-9233/" source="CVE"/>
		<reference ref_id="CVE-2018-20843" ref_url="https://www.suse.com/security/cve/CVE-2018-20843/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<description>
These are all security issues fixed in the expat-2.2.5-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2012-0876/">CVE-2012-0876</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-6702/">CVE-2012-6702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1283/">CVE-2015-1283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4472/">CVE-2016-4472</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5300/">CVE-2016-5300</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9233/">CVE-2017-9233</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20843/">CVE-2018-20843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481942" comment="expat-2.2.5-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481943" comment="libexpat-devel-2.2.5-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481944" comment="libexpat1-2.2.5-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481945" comment="libexpat1-32bit-2.2.5-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109390" version="1" class="patch">
	<metadata>
		<title>fetchmail-6.3.26-3.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmail-6.3.26-3.27 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480228" comment="fetchmail-6.3.26-3.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109391" version="1" class="patch">
	<metadata>
		<title>file-5.32-7.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3710" ref_url="https://www.suse.com/security/cve/CVE-2014-3710/" source="CVE"/>
		<reference ref_id="CVE-2014-8116" ref_url="https://www.suse.com/security/cve/CVE-2014-8116/" source="CVE"/>
		<reference ref_id="CVE-2014-8117" ref_url="https://www.suse.com/security/cve/CVE-2014-8117/" source="CVE"/>
		<reference ref_id="CVE-2017-1000249" ref_url="https://www.suse.com/security/cve/CVE-2017-1000249/" source="CVE"/>
		<reference ref_id="CVE-2018-10360" ref_url="https://www.suse.com/security/cve/CVE-2018-10360/" source="CVE"/>
		<reference ref_id="CVE-2019-18218" ref_url="https://www.suse.com/security/cve/CVE-2019-18218/" source="CVE"/>
		<reference ref_id="CVE-2019-8905" ref_url="https://www.suse.com/security/cve/CVE-2019-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-8906" ref_url="https://www.suse.com/security/cve/CVE-2019-8906/" source="CVE"/>
		<reference ref_id="CVE-2019-8907" ref_url="https://www.suse.com/security/cve/CVE-2019-8907/" source="CVE"/>
		<description>
These are all security issues fixed in the file-5.32-7.8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3710/">CVE-2014-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8116/">CVE-2014-8116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8117/">CVE-2014-8117</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000249/">CVE-2017-1000249</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10360/">CVE-2018-10360</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18218/">CVE-2019-18218</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8905/">CVE-2019-8905</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8906/">CVE-2019-8906</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8907/">CVE-2019-8907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481946" comment="file-5.32-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481947" comment="file-devel-5.32-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481948" comment="file-magic-5.32-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481949" comment="libmagic1-5.32-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481950" comment="libmagic1-32bit-5.32-7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109392" version="1" class="patch">
	<metadata>
		<title>firewall-macros-0.5.5-4.24.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewall-macros-0.5.5-4.24.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481121" comment="firewall-macros-0.5.5-4.24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481122" comment="firewalld-0.5.5-4.24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481123" comment="firewalld-lang-0.5.5-4.24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481124" comment="python3-firewall-0.5.5-4.24.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109393" version="1" class="patch">
	<metadata>
		<title>flac-devel-1.3.2-3.3.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8962" ref_url="https://www.suse.com/security/cve/CVE-2014-8962/" source="CVE"/>
		<reference ref_id="CVE-2014-9028" ref_url="https://www.suse.com/security/cve/CVE-2014-9028/" source="CVE"/>
		<reference ref_id="CVE-2017-6888" ref_url="https://www.suse.com/security/cve/CVE-2017-6888/" source="CVE"/>
		<description>
These are all security issues fixed in the flac-devel-1.3.2-3.3.20 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8962/">CVE-2014-8962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9028/">CVE-2014-9028</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6888/">CVE-2017-6888</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481125" comment="flac-devel-1.3.2-3.3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481126" comment="libFLAC++6-1.3.2-3.3.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481127" comment="libFLAC8-1.3.2-3.3.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109394" version="1" class="patch">
	<metadata>
		<title>freetype2-devel-2.10.1-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-2240" ref_url="https://www.suse.com/security/cve/CVE-2014-2240/" source="CVE"/>
		<reference ref_id="CVE-2014-9656" ref_url="https://www.suse.com/security/cve/CVE-2014-9656/" source="CVE"/>
		<reference ref_id="CVE-2014-9657" ref_url="https://www.suse.com/security/cve/CVE-2014-9657/" source="CVE"/>
		<reference ref_id="CVE-2014-9658" ref_url="https://www.suse.com/security/cve/CVE-2014-9658/" source="CVE"/>
		<reference ref_id="CVE-2014-9659" ref_url="https://www.suse.com/security/cve/CVE-2014-9659/" source="CVE"/>
		<reference ref_id="CVE-2014-9660" ref_url="https://www.suse.com/security/cve/CVE-2014-9660/" source="CVE"/>
		<reference ref_id="CVE-2014-9661" ref_url="https://www.suse.com/security/cve/CVE-2014-9661/" source="CVE"/>
		<reference ref_id="CVE-2014-9662" ref_url="https://www.suse.com/security/cve/CVE-2014-9662/" source="CVE"/>
		<reference ref_id="CVE-2014-9663" ref_url="https://www.suse.com/security/cve/CVE-2014-9663/" source="CVE"/>
		<reference ref_id="CVE-2014-9664" ref_url="https://www.suse.com/security/cve/CVE-2014-9664/" source="CVE"/>
		<reference ref_id="CVE-2014-9665" ref_url="https://www.suse.com/security/cve/CVE-2014-9665/" source="CVE"/>
		<reference ref_id="CVE-2014-9666" ref_url="https://www.suse.com/security/cve/CVE-2014-9666/" source="CVE"/>
		<reference ref_id="CVE-2014-9667" ref_url="https://www.suse.com/security/cve/CVE-2014-9667/" source="CVE"/>
		<reference ref_id="CVE-2014-9668" ref_url="https://www.suse.com/security/cve/CVE-2014-9668/" source="CVE"/>
		<reference ref_id="CVE-2014-9669" ref_url="https://www.suse.com/security/cve/CVE-2014-9669/" source="CVE"/>
		<reference ref_id="CVE-2014-9670" ref_url="https://www.suse.com/security/cve/CVE-2014-9670/" source="CVE"/>
		<reference ref_id="CVE-2014-9671" ref_url="https://www.suse.com/security/cve/CVE-2014-9671/" source="CVE"/>
		<reference ref_id="CVE-2014-9672" ref_url="https://www.suse.com/security/cve/CVE-2014-9672/" source="CVE"/>
		<reference ref_id="CVE-2014-9673" ref_url="https://www.suse.com/security/cve/CVE-2014-9673/" source="CVE"/>
		<reference ref_id="CVE-2014-9674" ref_url="https://www.suse.com/security/cve/CVE-2014-9674/" source="CVE"/>
		<reference ref_id="CVE-2014-9675" ref_url="https://www.suse.com/security/cve/CVE-2014-9675/" source="CVE"/>
		<reference ref_id="CVE-2017-8105" ref_url="https://www.suse.com/security/cve/CVE-2017-8105/" source="CVE"/>
		<reference ref_id="CVE-2017-8287" ref_url="https://www.suse.com/security/cve/CVE-2017-8287/" source="CVE"/>
		<reference ref_id="CVE-2018-6942" ref_url="https://www.suse.com/security/cve/CVE-2018-6942/" source="CVE"/>
		<description>
These are all security issues fixed in the freetype2-devel-2.10.1-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2240/">CVE-2014-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9656/">CVE-2014-9656</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9657/">CVE-2014-9657</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9658/">CVE-2014-9658</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9659/">CVE-2014-9659</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9660/">CVE-2014-9660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9661/">CVE-2014-9661</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9662/">CVE-2014-9662</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9663/">CVE-2014-9663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9664/">CVE-2014-9664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9665/">CVE-2014-9665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9666/">CVE-2014-9666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9667/">CVE-2014-9667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9668/">CVE-2014-9668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9669/">CVE-2014-9669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9670/">CVE-2014-9670</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9671/">CVE-2014-9671</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9672/">CVE-2014-9672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9673/">CVE-2014-9673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9674/">CVE-2014-9674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9675/">CVE-2014-9675</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-8105/">CVE-2017-8105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8287/">CVE-2017-8287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6942/">CVE-2018-6942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481951" comment="freetype2-devel-2.10.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481952" comment="libfreetype6-2.10.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481953" comment="libfreetype6-32bit-2.10.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109395" version="1" class="patch">
	<metadata>
		<title>fuse-2.9.7-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-3297" ref_url="https://www.suse.com/security/cve/CVE-2009-3297/" source="CVE"/>
		<reference ref_id="CVE-2011-0541" ref_url="https://www.suse.com/security/cve/CVE-2011-0541/" source="CVE"/>
		<reference ref_id="CVE-2015-3202" ref_url="https://www.suse.com/security/cve/CVE-2015-3202/" source="CVE"/>
		<reference ref_id="CVE-2018-10906" ref_url="https://www.suse.com/security/cve/CVE-2018-10906/" source="CVE"/>
		<description>
These are all security issues fixed in the fuse-2.9.7-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-3297/">CVE-2009-3297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0541/">CVE-2011-0541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3202/">CVE-2015-3202</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10906/">CVE-2018-10906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481128" comment="fuse-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481129" comment="fuse-devel-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481130" comment="fuse-doc-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481131" comment="libfuse2-2.9.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481132" comment="libulockmgr1-2.9.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109396" version="1" class="patch">
	<metadata>
		<title>g3utils-1.1.37-3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16741" ref_url="https://www.suse.com/security/cve/CVE-2018-16741/" source="CVE"/>
		<reference ref_id="CVE-2018-16742" ref_url="https://www.suse.com/security/cve/CVE-2018-16742/" source="CVE"/>
		<reference ref_id="CVE-2018-16743" ref_url="https://www.suse.com/security/cve/CVE-2018-16743/" source="CVE"/>
		<reference ref_id="CVE-2018-16744" ref_url="https://www.suse.com/security/cve/CVE-2018-16744/" source="CVE"/>
		<reference ref_id="CVE-2018-16745" ref_url="https://www.suse.com/security/cve/CVE-2018-16745/" source="CVE"/>
		<reference ref_id="CVE-2019-1010190" ref_url="https://www.suse.com/security/cve/CVE-2019-1010190/" source="CVE"/>
		<description>
These are all security issues fixed in the g3utils-1.1.37-3.8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16741/">CVE-2018-16741</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16742/">CVE-2018-16742</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16743/">CVE-2018-16743</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16744/">CVE-2018-16744</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16745/">CVE-2018-16745</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010190/">CVE-2019-1010190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481954" comment="g3utils-1.1.37-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481955" comment="mgetty-1.1.37-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109397" version="1" class="patch">
	<metadata>
		<title>gc-devel-7.6.4-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2673" ref_url="https://www.suse.com/security/cve/CVE-2012-2673/" source="CVE"/>
		<description>
These are all security issues fixed in the gc-devel-7.6.4-1.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2673/">CVE-2012-2673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480249" comment="gc-devel-7.6.4-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480250" comment="libgc1-7.6.4-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109398" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-devel-2.40.0-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-devel-2.40.0-1.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481956" comment="gdk-pixbuf-devel-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481957" comment="gdk-pixbuf-lang-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481958" comment="gdk-pixbuf-query-loaders-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481959" comment="gdk-pixbuf-thumbnailer-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481960" comment="libgdk_pixbuf-2_0-0-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481961" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481962" comment="typelib-1_0-GdkPixdata-2_0-2.40.0-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109399" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-loader-rsvg-2.46.4-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-loader-rsvg-2.46.4-1.31 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481963" comment="gdk-pixbuf-loader-rsvg-2.46.4-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481964" comment="librsvg-2-2-2.46.4-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109400" version="1" class="patch">
	<metadata>
		<title>ghostscript-9.52-3.27.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-5653" ref_url="https://www.suse.com/security/cve/CVE-2013-5653/" source="CVE"/>
		<reference ref_id="CVE-2015-3228" ref_url="https://www.suse.com/security/cve/CVE-2015-3228/" source="CVE"/>
		<reference ref_id="CVE-2016-10217" ref_url="https://www.suse.com/security/cve/CVE-2016-10217/" source="CVE"/>
		<reference ref_id="CVE-2016-10218" ref_url="https://www.suse.com/security/cve/CVE-2016-10218/" source="CVE"/>
		<reference ref_id="CVE-2016-10219" ref_url="https://www.suse.com/security/cve/CVE-2016-10219/" source="CVE"/>
		<reference ref_id="CVE-2016-10220" ref_url="https://www.suse.com/security/cve/CVE-2016-10220/" source="CVE"/>
		<reference ref_id="CVE-2016-10317" ref_url="https://www.suse.com/security/cve/CVE-2016-10317/" source="CVE"/>
		<reference ref_id="CVE-2016-7976" ref_url="https://www.suse.com/security/cve/CVE-2016-7976/" source="CVE"/>
		<reference ref_id="CVE-2016-7977" ref_url="https://www.suse.com/security/cve/CVE-2016-7977/" source="CVE"/>
		<reference ref_id="CVE-2016-7978" ref_url="https://www.suse.com/security/cve/CVE-2016-7978/" source="CVE"/>
		<reference ref_id="CVE-2016-7979" ref_url="https://www.suse.com/security/cve/CVE-2016-7979/" source="CVE"/>
		<reference ref_id="CVE-2016-8602" ref_url="https://www.suse.com/security/cve/CVE-2016-8602/" source="CVE"/>
		<reference ref_id="CVE-2017-5951" ref_url="https://www.suse.com/security/cve/CVE-2017-5951/" source="CVE"/>
		<reference ref_id="CVE-2017-7207" ref_url="https://www.suse.com/security/cve/CVE-2017-7207/" source="CVE"/>
		<reference ref_id="CVE-2017-8291" ref_url="https://www.suse.com/security/cve/CVE-2017-8291/" source="CVE"/>
		<reference ref_id="CVE-2017-9216" ref_url="https://www.suse.com/security/cve/CVE-2017-9216/" source="CVE"/>
		<reference ref_id="CVE-2018-10194" ref_url="https://www.suse.com/security/cve/CVE-2018-10194/" source="CVE"/>
		<reference ref_id="CVE-2018-15908" ref_url="https://www.suse.com/security/cve/CVE-2018-15908/" source="CVE"/>
		<reference ref_id="CVE-2018-15909" ref_url="https://www.suse.com/security/cve/CVE-2018-15909/" source="CVE"/>
		<reference ref_id="CVE-2018-15910" ref_url="https://www.suse.com/security/cve/CVE-2018-15910/" source="CVE"/>
		<reference ref_id="CVE-2018-15911" ref_url="https://www.suse.com/security/cve/CVE-2018-15911/" source="CVE"/>
		<reference ref_id="CVE-2018-16509" ref_url="https://www.suse.com/security/cve/CVE-2018-16509/" source="CVE"/>
		<reference ref_id="CVE-2018-16510" ref_url="https://www.suse.com/security/cve/CVE-2018-16510/" source="CVE"/>
		<reference ref_id="CVE-2018-16511" ref_url="https://www.suse.com/security/cve/CVE-2018-16511/" source="CVE"/>
		<reference ref_id="CVE-2018-16513" ref_url="https://www.suse.com/security/cve/CVE-2018-16513/" source="CVE"/>
		<reference ref_id="CVE-2018-16539" ref_url="https://www.suse.com/security/cve/CVE-2018-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-16540" ref_url="https://www.suse.com/security/cve/CVE-2018-16540/" source="CVE"/>
		<reference ref_id="CVE-2018-16541" ref_url="https://www.suse.com/security/cve/CVE-2018-16541/" source="CVE"/>
		<reference ref_id="CVE-2018-16542" ref_url="https://www.suse.com/security/cve/CVE-2018-16542/" source="CVE"/>
		<reference ref_id="CVE-2018-16543" ref_url="https://www.suse.com/security/cve/CVE-2018-16543/" source="CVE"/>
		<reference ref_id="CVE-2018-16585" ref_url="https://www.suse.com/security/cve/CVE-2018-16585/" source="CVE"/>
		<reference ref_id="CVE-2018-16802" ref_url="https://www.suse.com/security/cve/CVE-2018-16802/" source="CVE"/>
		<reference ref_id="CVE-2018-17183" ref_url="https://www.suse.com/security/cve/CVE-2018-17183/" source="CVE"/>
		<reference ref_id="CVE-2018-17961" ref_url="https://www.suse.com/security/cve/CVE-2018-17961/" source="CVE"/>
		<reference ref_id="CVE-2018-18073" ref_url="https://www.suse.com/security/cve/CVE-2018-18073/" source="CVE"/>
		<reference ref_id="CVE-2018-18284" ref_url="https://www.suse.com/security/cve/CVE-2018-18284/" source="CVE"/>
		<reference ref_id="CVE-2018-19409" ref_url="https://www.suse.com/security/cve/CVE-2018-19409/" source="CVE"/>
		<reference ref_id="CVE-2018-19475" ref_url="https://www.suse.com/security/cve/CVE-2018-19475/" source="CVE"/>
		<reference ref_id="CVE-2018-19476" ref_url="https://www.suse.com/security/cve/CVE-2018-19476/" source="CVE"/>
		<reference ref_id="CVE-2018-19477" ref_url="https://www.suse.com/security/cve/CVE-2018-19477/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2019-10216" ref_url="https://www.suse.com/security/cve/CVE-2019-10216/" source="CVE"/>
		<reference ref_id="CVE-2019-12973" ref_url="https://www.suse.com/security/cve/CVE-2019-12973/" source="CVE"/>
		<reference ref_id="CVE-2019-14811" ref_url="https://www.suse.com/security/cve/CVE-2019-14811/" source="CVE"/>
		<reference ref_id="CVE-2019-14812" ref_url="https://www.suse.com/security/cve/CVE-2019-14812/" source="CVE"/>
		<reference ref_id="CVE-2019-14813" ref_url="https://www.suse.com/security/cve/CVE-2019-14813/" source="CVE"/>
		<reference ref_id="CVE-2019-14817" ref_url="https://www.suse.com/security/cve/CVE-2019-14817/" source="CVE"/>
		<reference ref_id="CVE-2019-14869" ref_url="https://www.suse.com/security/cve/CVE-2019-14869/" source="CVE"/>
		<reference ref_id="CVE-2019-3835" ref_url="https://www.suse.com/security/cve/CVE-2019-3835/" source="CVE"/>
		<reference ref_id="CVE-2019-3838" ref_url="https://www.suse.com/security/cve/CVE-2019-3838/" source="CVE"/>
		<reference ref_id="CVE-2019-6116" ref_url="https://www.suse.com/security/cve/CVE-2019-6116/" source="CVE"/>
		<reference ref_id="CVE-2020-12268" ref_url="https://www.suse.com/security/cve/CVE-2020-12268/" source="CVE"/>
		<description>
These are all security issues fixed in the ghostscript-9.52-3.27.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-5653/">CVE-2013-5653</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3228/">CVE-2015-3228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10217/">CVE-2016-10217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10218/">CVE-2016-10218</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10219/">CVE-2016-10219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10220/">CVE-2016-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10317/">CVE-2016-10317</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7976/">CVE-2016-7976</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7977/">CVE-2016-7977</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7978/">CVE-2016-7978</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7979/">CVE-2016-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8602/">CVE-2016-8602</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5951/">CVE-2017-5951</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7207/">CVE-2017-7207</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-8291/">CVE-2017-8291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9216/">CVE-2017-9216</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10194/">CVE-2018-10194</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15908/">CVE-2018-15908</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15909/">CVE-2018-15909</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15910/">CVE-2018-15910</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15911/">CVE-2018-15911</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16509/">CVE-2018-16509</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16510/">CVE-2018-16510</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16511/">CVE-2018-16511</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16513/">CVE-2018-16513</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16539/">CVE-2018-16539</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16540/">CVE-2018-16540</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16541/">CVE-2018-16541</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16542/">CVE-2018-16542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16543/">CVE-2018-16543</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16585/">CVE-2018-16585</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16802/">CVE-2018-16802</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17183/">CVE-2018-17183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-17961/">CVE-2018-17961</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18073/">CVE-2018-18073</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18284/">CVE-2018-18284</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19409/">CVE-2018-19409</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19475/">CVE-2018-19475</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19476/">CVE-2018-19476</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19477/">CVE-2018-19477</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10216/">CVE-2019-10216</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12973/">CVE-2019-12973</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14811/">CVE-2019-14811</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14812/">CVE-2019-14812</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14813/">CVE-2019-14813</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14817/">CVE-2019-14817</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14869/">CVE-2019-14869</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3835/">CVE-2019-3835</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3838/">CVE-2019-3838</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6116/">CVE-2019-6116</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-12268/">CVE-2020-12268</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481965" comment="ghostscript-9.52-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481966" comment="ghostscript-devel-9.52-3.27.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481967" comment="ghostscript-x11-9.52-3.27.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109401" version="1" class="patch">
	<metadata>
		<title>giflib-devel-5.1.4-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7555" ref_url="https://www.suse.com/security/cve/CVE-2015-7555/" source="CVE"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<description>
These are all security issues fixed in the giflib-devel-5.1.4-2.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7555/">CVE-2015-7555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480262" comment="giflib-devel-5.1.4-2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480263" comment="libgif7-5.1.4-2.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109402" version="1" class="patch">
	<metadata>
		<title>git-core-2.26.2-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-19486" ref_url="https://www.suse.com/security/cve/CVE-2018-19486/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
These are all security issues fixed in the git-core-2.26.2-3.28.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324</cve>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19486/">CVE-2018-19486</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481968" comment="git-core-2.26.2-3.28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109403" version="1" class="patch">
	<metadata>
		<title>glib2-devel-2.62.5-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16428" ref_url="https://www.suse.com/security/cve/CVE-2018-16428/" source="CVE"/>
		<reference ref_id="CVE-2018-16429" ref_url="https://www.suse.com/security/cve/CVE-2018-16429/" source="CVE"/>
		<reference ref_id="CVE-2019-12450" ref_url="https://www.suse.com/security/cve/CVE-2019-12450/" source="CVE"/>
		<reference ref_id="CVE-2020-6750" ref_url="https://www.suse.com/security/cve/CVE-2020-6750/" source="CVE"/>
		<description>
These are all security issues fixed in the glib2-devel-2.62.5-1.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16428/">CVE-2018-16428</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16429/">CVE-2018-16429</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12450/">CVE-2019-12450</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6750/">CVE-2020-6750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481969" comment="glib2-devel-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481970" comment="glib2-lang-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481971" comment="glib2-tools-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481972" comment="libgio-2_0-0-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481973" comment="libgio-2_0-0-32bit-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481974" comment="libglib-2_0-0-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481975" comment="libglib-2_0-0-32bit-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481976" comment="libgmodule-2_0-0-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481977" comment="libgmodule-2_0-0-32bit-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481978" comment="libgobject-2_0-0-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481979" comment="libgobject-2_0-0-32bit-2.62.5-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481980" comment="libgthread-2_0-0-2.62.5-1.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109404" version="1" class="patch">
	<metadata>
		<title>glibc-2.26-13.48.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-2.26-13.48.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481981" comment="glibc-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481982" comment="glibc-32bit-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481983" comment="glibc-devel-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481984" comment="glibc-extra-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481985" comment="glibc-i18ndata-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481986" comment="glibc-info-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481987" comment="glibc-locale-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481988" comment="glibc-locale-base-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481989" comment="glibc-locale-base-32bit-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481990" comment="glibc-profile-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481991" comment="nscd-2.26-13.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109405" version="1" class="patch">
	<metadata>
		<title>glibc-32bit-2.26-8.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-32bit-2.26-8.21 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481161" comment="glibc-32bit-2.26-8.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481162" comment="glibc-locale-32bit-2.26-8.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109406" version="1" class="patch">
	<metadata>
		<title>glibc-locale-32bit-2.26-13.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-locale-32bit-2.26-13.8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481163" comment="glibc-locale-32bit-2.26-13.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109407" version="1" class="patch">
	<metadata>
		<title>gnutls-3.6.7-12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8564" ref_url="https://www.suse.com/security/cve/CVE-2014-8564/" source="CVE"/>
		<reference ref_id="CVE-2015-6251" ref_url="https://www.suse.com/security/cve/CVE-2015-6251/" source="CVE"/>
		<reference ref_id="CVE-2016-8610" ref_url="https://www.suse.com/security/cve/CVE-2016-8610/" source="CVE"/>
		<reference ref_id="CVE-2017-7869" ref_url="https://www.suse.com/security/cve/CVE-2017-7869/" source="CVE"/>
		<reference ref_id="CVE-2018-10844" ref_url="https://www.suse.com/security/cve/CVE-2018-10844/" source="CVE"/>
		<reference ref_id="CVE-2018-10845" ref_url="https://www.suse.com/security/cve/CVE-2018-10845/" source="CVE"/>
		<reference ref_id="CVE-2018-10846" ref_url="https://www.suse.com/security/cve/CVE-2018-10846/" source="CVE"/>
		<reference ref_id="CVE-2018-16868" ref_url="https://www.suse.com/security/cve/CVE-2018-16868/" source="CVE"/>
		<reference ref_id="CVE-2019-3829" ref_url="https://www.suse.com/security/cve/CVE-2019-3829/" source="CVE"/>
		<reference ref_id="CVE-2019-3836" ref_url="https://www.suse.com/security/cve/CVE-2019-3836/" source="CVE"/>
		<reference ref_id="CVE-2020-11501" ref_url="https://www.suse.com/security/cve/CVE-2020-11501/" source="CVE"/>
		<reference ref_id="CVE-2020-13777" ref_url="https://www.suse.com/security/cve/CVE-2020-13777/" source="CVE"/>
		<description>
These are all security issues fixed in the gnutls-3.6.7-12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8564/">CVE-2014-8564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6251/">CVE-2015-6251</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8610/">CVE-2016-8610</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7869/">CVE-2017-7869</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10844/">CVE-2018-10844</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10845/">CVE-2018-10845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10846/">CVE-2018-10846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16868/">CVE-2018-16868</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3829/">CVE-2019-3829</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3836/">CVE-2019-3836</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11501/">CVE-2020-11501</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13777/">CVE-2020-13777</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481992" comment="gnutls-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481993" comment="libgnutls-devel-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481994" comment="libgnutls30-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481995" comment="libgnutls30-32bit-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481996" comment="libgnutls30-hmac-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481997" comment="libgnutls30-hmac-32bit-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481998" comment="libgnutlsxx-devel-3.6.7-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481999" comment="libgnutlsxx28-3.6.7-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109408" version="1" class="patch">
	<metadata>
		<title>gpg2-2.2.5-4.14.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000858" ref_url="https://www.suse.com/security/cve/CVE-2018-1000858/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2018-9234" ref_url="https://www.suse.com/security/cve/CVE-2018-9234/" source="CVE"/>
		<reference ref_id="CVE-2019-13050" ref_url="https://www.suse.com/security/cve/CVE-2019-13050/" source="CVE"/>
		<description>
These are all security issues fixed in the gpg2-2.2.5-4.14.4 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000858/">CVE-2018-1000858</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-9234/">CVE-2018-9234</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13050/">CVE-2019-13050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482000" comment="gpg2-2.2.5-4.14.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482001" comment="gpg2-lang-2.2.5-4.14.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109409" version="1" class="patch">
	<metadata>
		<title>graphite2-devel-1.3.11-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1521" ref_url="https://www.suse.com/security/cve/CVE-2016-1521/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2018-7999" ref_url="https://www.suse.com/security/cve/CVE-2018-7999/" source="CVE"/>
		<description>
These are all security issues fixed in the graphite2-devel-1.3.11-2.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1521/">CVE-2016-1521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7999/">CVE-2018-7999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480301" comment="graphite2-devel-1.3.11-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480302" comment="libgraphite2-3-1.3.11-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480303" comment="libgraphite2-3-32bit-1.3.11-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109410" version="1" class="patch">
	<metadata>
		<title>graphviz-2.40.1-6.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-2.40.1-6.3.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482002" comment="graphviz-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482003" comment="graphviz-devel-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482004" comment="graphviz-plugins-core-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482005" comment="libgraphviz6-2.40.1-6.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109411" version="1" class="patch">
	<metadata>
		<title>grep-3.1-4.3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1345" ref_url="https://www.suse.com/security/cve/CVE-2015-1345/" source="CVE"/>
		<description>
These are all security issues fixed in the grep-3.1-4.3.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1345/">CVE-2015-1345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482006" comment="grep-3.1-4.3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482007" comment="grep-lang-3.1-4.3.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109412" version="1" class="patch">
	<metadata>
		<title>groff-1.22.3-3.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5044" ref_url="https://www.suse.com/security/cve/CVE-2009-5044/" source="CVE"/>
		<reference ref_id="CVE-2009-5080" ref_url="https://www.suse.com/security/cve/CVE-2009-5080/" source="CVE"/>
		<reference ref_id="CVE-2009-5081" ref_url="https://www.suse.com/security/cve/CVE-2009-5081/" source="CVE"/>
		<description>
These are all security issues fixed in the groff-1.22.3-3.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5044/">CVE-2009-5044</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5080/">CVE-2009-5080</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-5081/">CVE-2009-5081</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480306" comment="groff-1.22.3-3.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480307" comment="groff-full-1.22.3-3.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480308" comment="gxditview-1.22.3-3.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109413" version="1" class="patch">
	<metadata>
		<title>grub2-2.04-7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-2.04-7.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482008" comment="grub2-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482009" comment="grub2-arm64-efi-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482010" comment="grub2-i386-pc-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482011" comment="grub2-powerpc-ieee1275-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482012" comment="grub2-s390x-emu-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482013" comment="grub2-snapper-plugin-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482014" comment="grub2-systemd-sleep-plugin-2.04-7.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482015" comment="grub2-x86_64-efi-2.04-7.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109414" version="1" class="patch">
	<metadata>
		<title>gstreamer-1.16.2-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-1.16.2-1.53 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482016" comment="gstreamer-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482017" comment="gstreamer-lang-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482018" comment="libgstreamer-1_0-0-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482019" comment="typelib-1_0-Gst-1_0-1.16.2-1.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109415" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-1.16.2-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-1.16.2-2.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482020" comment="gstreamer-plugins-base-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482021" comment="gstreamer-plugins-base-lang-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482022" comment="libgstallocators-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482023" comment="libgstapp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482024" comment="libgstaudio-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482025" comment="libgstfft-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482026" comment="libgstgl-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482027" comment="libgstpbutils-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482028" comment="libgstriff-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482029" comment="libgstrtp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482030" comment="libgstrtsp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482031" comment="libgstsdp-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482032" comment="libgsttag-1_0-0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482033" comment="libgstvideo-1_0-0-1.16.2-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109416" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-good-1.16.2-1.85 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-good-1.16.2-1.85 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482034" comment="gstreamer-plugins-good-1.16.2-1.85 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482035" comment="gstreamer-plugins-good-lang-1.16.2-1.85 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109417" version="1" class="patch">
	<metadata>
		<title>gtk2-devel-2.24.32+67-2.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-devel-2.24.32+67-2.28 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482036" comment="gtk2-devel-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482037" comment="gtk2-lang-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482038" comment="gtk2-tools-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482039" comment="libgtk-2_0-0-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482040" comment="typelib-1_0-Gtk-2_0-2.24.32+67-2.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109418" version="1" class="patch">
	<metadata>
		<title>hardlink-1.0+git.e66999f-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-3630" ref_url="https://www.suse.com/security/cve/CVE-2011-3630/" source="CVE"/>
		<reference ref_id="CVE-2011-3631" ref_url="https://www.suse.com/security/cve/CVE-2011-3631/" source="CVE"/>
		<reference ref_id="CVE-2011-3632" ref_url="https://www.suse.com/security/cve/CVE-2011-3632/" source="CVE"/>
		<description>
These are all security issues fixed in the hardlink-1.0+git.e66999f-1.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3630/">CVE-2011-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3631/">CVE-2011-3631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3632/">CVE-2011-3632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480325" comment="hardlink-1.0+git.e66999f-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109419" version="1" class="patch">
	<metadata>
		<title>hplip-devel-3.19.12-1.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-devel-3.19.12-1.72 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482041" comment="hplip-devel-3.19.12-1.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482042" comment="hplip-hpijs-3.19.12-1.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482043" comment="hplip-sane-3.19.12-1.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109420" version="1" class="patch">
	<metadata>
		<title>ipmitool-1.8.18+git20200204.7ccea28-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the ipmitool-1.8.18+git20200204.7ccea28-1.22 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482044" comment="ipmitool-1.8.18+git20200204.7ccea28-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109421" version="1" class="patch">
	<metadata>
		<title>ipsec-tools-0.8.2-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10396" ref_url="https://www.suse.com/security/cve/CVE-2016-10396/" source="CVE"/>
		<description>
These are all security issues fixed in the ipsec-tools-0.8.2-5.35 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-10396/">CVE-2016-10396</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480330" comment="ipsec-tools-0.8.2-5.35 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109422" version="1" class="patch">
	<metadata>
		<title>iputils-s20161105-6.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the iputils-s20161105-6.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480331" comment="iputils-s20161105-6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109423" version="1" class="patch">
	<metadata>
		<title>java-11-openjdk-11.0.7.0-3.42.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2972" ref_url="https://www.suse.com/security/cve/CVE-2018-2972/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3150" ref_url="https://www.suse.com/security/cve/CVE-2018-3150/" source="CVE"/>
		<reference ref_id="CVE-2018-3157" ref_url="https://www.suse.com/security/cve/CVE-2018-3157/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2818" ref_url="https://www.suse.com/security/cve/CVE-2019-2818/" source="CVE"/>
		<reference ref_id="CVE-2019-2821" ref_url="https://www.suse.com/security/cve/CVE-2019-2821/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2977" ref_url="https://www.suse.com/security/cve/CVE-2019-2977/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2655" ref_url="https://www.suse.com/security/cve/CVE-2020-2655/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2767" ref_url="https://www.suse.com/security/cve/CVE-2020-2767/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2778" ref_url="https://www.suse.com/security/cve/CVE-2020-2778/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2816" ref_url="https://www.suse.com/security/cve/CVE-2020-2816/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<description>
These are all security issues fixed in the java-11-openjdk-11.0.7.0-3.42.4 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2972/">CVE-2018-2972</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3150/">CVE-2018-3150</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3157/">CVE-2018-3157</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2818/">CVE-2019-2818</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2821/">CVE-2019-2821</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2977/">CVE-2019-2977</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2655/">CVE-2020-2655</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2767/">CVE-2020-2767</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2778/">CVE-2020-2778</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-2816/">CVE-2020-2816</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482045" comment="java-11-openjdk-11.0.7.0-3.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482046" comment="java-11-openjdk-demo-11.0.7.0-3.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482047" comment="java-11-openjdk-devel-11.0.7.0-3.42.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482048" comment="java-11-openjdk-headless-11.0.7.0-3.42.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109424" version="1" class="patch">
	<metadata>
		<title>jq-1.6-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8863" ref_url="https://www.suse.com/security/cve/CVE-2015-8863/" source="CVE"/>
		<reference ref_id="CVE-2016-4074" ref_url="https://www.suse.com/security/cve/CVE-2016-4074/" source="CVE"/>
		<description>
These are all security issues fixed in the jq-1.6-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8863/">CVE-2015-8863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4074/">CVE-2016-4074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482049" comment="jq-1.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482050" comment="libjq-devel-1.6-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482051" comment="libjq1-1.6-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109425" version="1" class="patch">
	<metadata>
		<title>kdump-0.9.0-9.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5759" ref_url="https://www.suse.com/security/cve/CVE-2016-5759/" source="CVE"/>
		<description>
These are all security issues fixed in the kdump-0.9.0-9.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5759/">CVE-2016-5759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482052" comment="kdump-0.9.0-9.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109426" version="1" class="patch">
	<metadata>
		<title>kernel-default-5.3.18-22.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-5.3.18-22.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482053" comment="kernel-default-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482054" comment="kernel-default-devel-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482055" comment="kernel-devel-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482056" comment="kernel-macros-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482057" comment="kernel-preempt-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482058" comment="kernel-zfcpdump-5.3.18-22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109427" version="1" class="patch">
	<metadata>
		<title>kernel-default-man-4.12.14-197.40.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255/" source="CVE"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127/" source="CVE"/>
		<reference ref_id="CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15537" ref_url="https://www.suse.com/security/cve/CVE-2017-15537/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16650" ref_url="https://www.suse.com/security/cve/CVE-2017-16650/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075/" source="CVE"/>
		<reference ref_id="CVE-2017-18202" ref_url="https://www.suse.com/security/cve/CVE-2017-18202/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1000028" ref_url="https://www.suse.com/security/cve/CVE-2018-1000028/" source="CVE"/>
		<reference ref_id="CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397/" source="CVE"/>
		<reference ref_id="CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919/" source="CVE"/>
		<reference ref_id="CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920/" source="CVE"/>
		<reference ref_id="CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-19036" ref_url="https://www.suse.com/security/cve/CVE-2019-19036/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19318" ref_url="https://www.suse.com/security/cve/CVE-2019-19318/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19543" ref_url="https://www.suse.com/security/cve/CVE-2019-19543/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19927" ref_url="https://www.suse.com/security/cve/CVE-2019-19927/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3560" ref_url="https://www.suse.com/security/cve/CVE-2019-3560/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980/" source="CVE"/>
		<reference ref_id="CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11669" ref_url="https://www.suse.com/security/cve/CVE-2020-11669/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8834" ref_url="https://www.suse.com/security/cve/CVE-2020-8834/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-man-4.12.14-197.40.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15537/">CVE-2017-15537</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16650/">CVE-2017-16650</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18202/">CVE-2017-18202</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000028/">CVE-2018-1000028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19036/">CVE-2019-19036</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19318/">CVE-2019-19318</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19543/">CVE-2019-19543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19927/">CVE-2019-19927</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3560/">CVE-2019-3560</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11669/">CVE-2020-11669</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8834/">CVE-2020-8834</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482059" comment="kernel-default-man-4.12.14-197.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109428" version="1" class="patch">
	<metadata>
		<title>kernel-firmware-20200107-3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2019-9836" ref_url="https://www.suse.com/security/cve/CVE-2019-9836/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-firmware-20200107-3.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9836/">CVE-2019-9836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482060" comment="kernel-firmware-20200107-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482061" comment="ucode-amd-20200107-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109429" version="1" class="patch">
	<metadata>
		<title>krb5-1.16.3-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-1.16.3-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482062" comment="krb5-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482063" comment="krb5-32bit-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482064" comment="krb5-client-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482065" comment="krb5-devel-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482066" comment="krb5-plugin-preauth-otp-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482067" comment="krb5-plugin-preauth-pkinit-1.16.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109430" version="1" class="patch">
	<metadata>
		<title>ldb-tools-2.0.10-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<description>
These are all security issues fixed in the ldb-tools-2.0.10-1.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482068" comment="ldb-tools-2.0.10-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482069" comment="libldb-devel-2.0.10-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482070" comment="libldb2-2.0.10-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482071" comment="libldb2-32bit-2.0.10-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482072" comment="python3-ldb-2.0.10-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482073" comment="python3-ldb-devel-2.0.10-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109431" version="1" class="patch">
	<metadata>
		<title>ldns-devel-1.7.0-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000231" ref_url="https://www.suse.com/security/cve/CVE-2017-1000231/" source="CVE"/>
		<reference ref_id="CVE-2017-1000232" ref_url="https://www.suse.com/security/cve/CVE-2017-1000232/" source="CVE"/>
		<description>
These are all security issues fixed in the ldns-devel-1.7.0-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000231/">CVE-2017-1000231</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000232/">CVE-2017-1000232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482074" comment="ldns-devel-1.7.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482075" comment="libldns2-1.7.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109432" version="1" class="patch">
	<metadata>
		<title>less-530-1.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9488" ref_url="https://www.suse.com/security/cve/CVE-2014-9488/" source="CVE"/>
		<description>
These are all security issues fixed in the less-530-1.6 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-9488/">CVE-2014-9488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480353" comment="less-530-1.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109433" version="1" class="patch">
	<metadata>
		<title>lftp-4.8.4-3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0139" ref_url="https://www.suse.com/security/cve/CVE-2014-0139/" source="CVE"/>
		<reference ref_id="CVE-2018-10916" ref_url="https://www.suse.com/security/cve/CVE-2018-10916/" source="CVE"/>
		<description>
These are all security issues fixed in the lftp-4.8.4-3.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0139/">CVE-2014-0139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10916/">CVE-2018-10916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481214" comment="lftp-4.8.4-3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109434" version="1" class="patch">
	<metadata>
		<title>libFS-devel-1.0.7-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1996" ref_url="https://www.suse.com/security/cve/CVE-2013-1996/" source="CVE"/>
		<description>
These are all security issues fixed in the libFS-devel-1.0.7-1.22 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1996/">CVE-2013-1996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480355" comment="libFS-devel-1.0.7-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480356" comment="libFS6-1.0.7-1.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109435" version="1" class="patch">
	<metadata>
		<title>libHX-devel-3.22-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2947" ref_url="https://www.suse.com/security/cve/CVE-2010-2947/" source="CVE"/>
		<description>
These are all security issues fixed in the libHX-devel-3.22-1.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2947/">CVE-2010-2947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480357" comment="libHX-devel-3.22-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480358" comment="libHX28-3.22-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480359" comment="libHX28-32bit-3.22-1.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109436" version="1" class="patch">
	<metadata>
		<title>libICE-devel-1.0.9-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE-devel-1.0.9-1.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480360" comment="libICE-devel-1.0.9-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480361" comment="libICE6-1.0.9-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109437" version="1" class="patch">
	<metadata>
		<title>libQt5Concurrent-devel-5.12.7-2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5Concurrent-devel-5.12.7-2.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482076" comment="libQt5Concurrent-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482077" comment="libQt5Concurrent5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482078" comment="libQt5Core-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482079" comment="libQt5Core-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482080" comment="libQt5Core5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482081" comment="libQt5DBus-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482082" comment="libQt5DBus-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482083" comment="libQt5DBus5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482084" comment="libQt5Gui-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482085" comment="libQt5Gui-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482086" comment="libQt5Gui5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482087" comment="libQt5KmsSupport-devel-static-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482088" comment="libQt5KmsSupport-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482089" comment="libQt5Network-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482090" comment="libQt5Network-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482091" comment="libQt5Network5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482092" comment="libQt5OpenGL-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482093" comment="libQt5OpenGL-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482094" comment="libQt5OpenGL5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482095" comment="libQt5PlatformHeaders-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482096" comment="libQt5PlatformSupport-devel-static-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482097" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482098" comment="libQt5PrintSupport-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482099" comment="libQt5PrintSupport-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482100" comment="libQt5PrintSupport5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482101" comment="libQt5Sql-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482102" comment="libQt5Sql-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482103" comment="libQt5Sql5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482104" comment="libQt5Sql5-sqlite-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482105" comment="libQt5Test-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482106" comment="libQt5Test-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482107" comment="libQt5Test5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482108" comment="libQt5Widgets-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482109" comment="libQt5Widgets-private-headers-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482110" comment="libQt5Widgets5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482111" comment="libQt5Xml-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482112" comment="libQt5Xml5-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482113" comment="libqt5-qtbase-common-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482114" comment="libqt5-qtbase-devel-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482115" comment="libqt5-qtbase-private-headers-devel-5.12.7-2.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109438" version="1" class="patch">
	<metadata>
		<title>libX11-6-1.6.5-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1981" ref_url="https://www.suse.com/security/cve/CVE-2013-1981/" source="CVE"/>
		<reference ref_id="CVE-2013-1997" ref_url="https://www.suse.com/security/cve/CVE-2013-1997/" source="CVE"/>
		<reference ref_id="CVE-2013-2004" ref_url="https://www.suse.com/security/cve/CVE-2013-2004/" source="CVE"/>
		<reference ref_id="CVE-2018-14598" ref_url="https://www.suse.com/security/cve/CVE-2018-14598/" source="CVE"/>
		<reference ref_id="CVE-2018-14599" ref_url="https://www.suse.com/security/cve/CVE-2018-14599/" source="CVE"/>
		<reference ref_id="CVE-2018-14600" ref_url="https://www.suse.com/security/cve/CVE-2018-14600/" source="CVE"/>
		<description>
These are all security issues fixed in the libX11-6-1.6.5-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1981/">CVE-2013-1981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1997/">CVE-2013-1997</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2004/">CVE-2013-2004</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14598/">CVE-2018-14598</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14599/">CVE-2018-14599</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14600/">CVE-2018-14600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481255" comment="libX11-6-1.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481256" comment="libX11-6-32bit-1.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481257" comment="libX11-data-1.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481258" comment="libX11-devel-1.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481259" comment="libX11-xcb1-1.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481260" comment="libX11-xcb1-32bit-1.6.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109439" version="1" class="patch">
	<metadata>
		<title>libXRes1-1.2.0-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1988" ref_url="https://www.suse.com/security/cve/CVE-2013-1988/" source="CVE"/>
		<description>
These are all security issues fixed in the libXRes1-1.2.0-1.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1988/">CVE-2013-1988</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480408" comment="libXRes1-1.2.0-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480409" comment="libXres-devel-1.2.0-1.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109440" version="1" class="patch">
	<metadata>
		<title>libXcursor-devel-1.1.15-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor-devel-1.1.15-1.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480410" comment="libXcursor-devel-1.1.15-1.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480411" comment="libXcursor1-1.1.15-1.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109441" version="1" class="patch">
	<metadata>
		<title>libXdmcp-devel-1.1.2-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2625" ref_url="https://www.suse.com/security/cve/CVE-2017-2625/" source="CVE"/>
		<description>
These are all security issues fixed in the libXdmcp-devel-1.1.2-1.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2625/">CVE-2017-2625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480412" comment="libXdmcp-devel-1.1.2-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480413" comment="libXdmcp6-1.1.2-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109442" version="1" class="patch">
	<metadata>
		<title>libXext-devel-1.3.3-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1982" ref_url="https://www.suse.com/security/cve/CVE-2013-1982/" source="CVE"/>
		<description>
These are all security issues fixed in the libXext-devel-1.3.3-1.30 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1982/">CVE-2013-1982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480414" comment="libXext-devel-1.3.3-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480415" comment="libXext6-1.3.3-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480416" comment="libXext6-32bit-1.3.3-1.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109443" version="1" class="patch">
	<metadata>
		<title>libXfixes-devel-5.0.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1983" ref_url="https://www.suse.com/security/cve/CVE-2013-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfixes-devel-5.0.3-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1983/">CVE-2013-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480417" comment="libXfixes-devel-5.0.3-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480418" comment="libXfixes3-5.0.3-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480419" comment="libXfixes3-32bit-5.0.3-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109444" version="1" class="patch">
	<metadata>
		<title>libXfont-devel-1.5.4-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<reference ref_id="CVE-2013-6462" ref_url="https://www.suse.com/security/cve/CVE-2013-6462/" source="CVE"/>
		<reference ref_id="CVE-2014-0209" ref_url="https://www.suse.com/security/cve/CVE-2014-0209/" source="CVE"/>
		<reference ref_id="CVE-2014-0210" ref_url="https://www.suse.com/security/cve/CVE-2014-0210/" source="CVE"/>
		<reference ref_id="CVE-2014-0211" ref_url="https://www.suse.com/security/cve/CVE-2014-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-1802" ref_url="https://www.suse.com/security/cve/CVE-2015-1802/" source="CVE"/>
		<reference ref_id="CVE-2015-1803" ref_url="https://www.suse.com/security/cve/CVE-2015-1803/" source="CVE"/>
		<reference ref_id="CVE-2015-1804" ref_url="https://www.suse.com/security/cve/CVE-2015-1804/" source="CVE"/>
		<reference ref_id="CVE-2017-13720" ref_url="https://www.suse.com/security/cve/CVE-2017-13720/" source="CVE"/>
		<reference ref_id="CVE-2017-13722" ref_url="https://www.suse.com/security/cve/CVE-2017-13722/" source="CVE"/>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont-devel-1.5.4-1.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6462/">CVE-2013-6462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0209/">CVE-2014-0209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0210/">CVE-2014-0210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0211/">CVE-2014-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1802/">CVE-2015-1802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1803/">CVE-2015-1803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1804/">CVE-2015-1804</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-13720/">CVE-2017-13720</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13722/">CVE-2017-13722</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480420" comment="libXfont-devel-1.5.4-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480421" comment="libXfont1-1.5.4-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109445" version="1" class="patch">
	<metadata>
		<title>libXfont2-2-2.0.3-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-16611" ref_url="https://www.suse.com/security/cve/CVE-2017-16611/" source="CVE"/>
		<description>
These are all security issues fixed in the libXfont2-2-2.0.3-1.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16611/">CVE-2017-16611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480422" comment="libXfont2-2-2.0.3-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480423" comment="libXfont2-devel-2.0.3-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109446" version="1" class="patch">
	<metadata>
		<title>libXi-devel-1.7.9-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1984" ref_url="https://www.suse.com/security/cve/CVE-2013-1984/" source="CVE"/>
		<reference ref_id="CVE-2013-1995" ref_url="https://www.suse.com/security/cve/CVE-2013-1995/" source="CVE"/>
		<reference ref_id="CVE-2013-1998" ref_url="https://www.suse.com/security/cve/CVE-2013-1998/" source="CVE"/>
		<description>
These are all security issues fixed in the libXi-devel-1.7.9-3.2.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1984/">CVE-2013-1984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1995/">CVE-2013-1995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1998/">CVE-2013-1998</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482116" comment="libXi-devel-1.7.9-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482117" comment="libXi6-1.7.9-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482118" comment="libXi6-32bit-1.7.9-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109447" version="1" class="patch">
	<metadata>
		<title>libXinerama-devel-1.1.3-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama-devel-1.1.3-1.22 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480426" comment="libXinerama-devel-1.1.3-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480427" comment="libXinerama1-1.1.3-1.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109448" version="1" class="patch">
	<metadata>
		<title>libXp-devel-1.0.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp-devel-1.0.3-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480428" comment="libXp-devel-1.0.3-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480429" comment="libXp6-1.0.3-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109449" version="1" class="patch">
	<metadata>
		<title>libXrandr-devel-1.5.1-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr-devel-1.5.1-2.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480430" comment="libXrandr-devel-1.5.1-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480431" comment="libXrandr2-1.5.1-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109450" version="1" class="patch">
	<metadata>
		<title>libXrender-devel-0.9.10-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1987" ref_url="https://www.suse.com/security/cve/CVE-2013-1987/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrender-devel-0.9.10-1.30 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1987/">CVE-2013-1987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480432" comment="libXrender-devel-0.9.10-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480433" comment="libXrender1-0.9.10-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480434" comment="libXrender1-32bit-0.9.10-1.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109451" version="1" class="patch">
	<metadata>
		<title>libXt-devel-1.1.5-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt-devel-1.1.5-2.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480435" comment="libXt-devel-1.1.5-2.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480436" comment="libXt6-1.1.5-2.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109452" version="1" class="patch">
	<metadata>
		<title>libXtst-devel-1.2.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2063" ref_url="https://www.suse.com/security/cve/CVE-2013-2063/" source="CVE"/>
		<description>
These are all security issues fixed in the libXtst-devel-1.2.3-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2063/">CVE-2013-2063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480437" comment="libXtst-devel-1.2.3-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480438" comment="libXtst6-1.2.3-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480439" comment="libXtst6-32bit-1.2.3-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109453" version="1" class="patch">
	<metadata>
		<title>libXv-devel-1.0.11-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1989" ref_url="https://www.suse.com/security/cve/CVE-2013-1989/" source="CVE"/>
		<reference ref_id="CVE-2013-2066" ref_url="https://www.suse.com/security/cve/CVE-2013-2066/" source="CVE"/>
		<reference ref_id="CVE-2016-5407" ref_url="https://www.suse.com/security/cve/CVE-2016-5407/" source="CVE"/>
		<description>
These are all security issues fixed in the libXv-devel-1.0.11-1.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1989/">CVE-2013-1989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2066/">CVE-2013-2066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5407/">CVE-2016-5407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480440" comment="libXv-devel-1.0.11-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480441" comment="libXv1-1.0.11-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109454" version="1" class="patch">
	<metadata>
		<title>libXvMC-devel-1.0.10-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1990" ref_url="https://www.suse.com/security/cve/CVE-2013-1990/" source="CVE"/>
		<reference ref_id="CVE-2013-1999" ref_url="https://www.suse.com/security/cve/CVE-2013-1999/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvMC-devel-1.0.10-1.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1990/">CVE-2013-1990</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1999/">CVE-2013-1999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480442" comment="libXvMC-devel-1.0.10-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480443" comment="libXvMC1-1.0.10-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109455" version="1" class="patch">
	<metadata>
		<title>libXvnc1-1.9.0-19.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc1-1.9.0-19.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482119" comment="libXvnc1-1.9.0-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482120" comment="tigervnc-1.9.0-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482121" comment="xorg-x11-Xvnc-1.9.0-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482122" comment="xorg-x11-Xvnc-module-1.9.0-19.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482123" comment="xorg-x11-Xvnc-novnc-1.9.0-19.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109456" version="1" class="patch">
	<metadata>
		<title>libXxf86dga-devel-1.1.4-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1991" ref_url="https://www.suse.com/security/cve/CVE-2013-1991/" source="CVE"/>
		<reference ref_id="CVE-2013-2000" ref_url="https://www.suse.com/security/cve/CVE-2013-2000/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86dga-devel-1.1.4-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1991/">CVE-2013-1991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2000/">CVE-2013-2000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480448" comment="libXxf86dga-devel-1.1.4-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480449" comment="libXxf86dga1-1.1.4-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109457" version="1" class="patch">
	<metadata>
		<title>libXxf86vm-devel-1.1.4-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2001" ref_url="https://www.suse.com/security/cve/CVE-2013-2001/" source="CVE"/>
		<description>
These are all security issues fixed in the libXxf86vm-devel-1.1.4-1.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2001/">CVE-2013-2001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480450" comment="libXxf86vm-devel-1.1.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480451" comment="libXxf86vm1-1.1.4-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480452" comment="libXxf86vm1-32bit-1.1.4-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109458" version="1" class="patch">
	<metadata>
		<title>libarchive-devel-3.4.2-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<description>
These are all security issues fixed in the libarchive-devel-3.4.2-2.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482124" comment="libarchive-devel-3.4.2-2.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482125" comment="libarchive13-3.4.2-2.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109459" version="1" class="patch">
	<metadata>
		<title>libblkid-devel-2.33.1-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<description>
These are all security issues fixed in the libblkid-devel-2.33.1-4.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482126" comment="libblkid-devel-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482127" comment="libblkid-devel-static-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482128" comment="libblkid1-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482129" comment="libblkid1-32bit-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482130" comment="libfdisk-devel-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482131" comment="libfdisk1-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482132" comment="libmount-devel-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482133" comment="libmount1-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482134" comment="libmount1-32bit-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482135" comment="libsmartcols-devel-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482136" comment="libsmartcols1-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482137" comment="libuuid-devel-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482138" comment="libuuid-devel-static-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482139" comment="libuuid1-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482140" comment="libuuid1-32bit-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482141" comment="util-linux-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482142" comment="util-linux-lang-2.33.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482143" comment="util-linux-systemd-2.33.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109460" version="1" class="patch">
	<metadata>
		<title>libbsd-devel-0.8.7-3.3.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-20367" ref_url="https://www.suse.com/security/cve/CVE-2019-20367/" source="CVE"/>
		<description>
These are all security issues fixed in the libbsd-devel-0.8.7-3.3.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-20367/">CVE-2019-20367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482144" comment="libbsd-devel-0.8.7-3.3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482145" comment="libbsd0-0.8.7-3.3.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109461" version="1" class="patch">
	<metadata>
		<title>libcaca-devel-0.99.beta19.git20171003-9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-20544" ref_url="https://www.suse.com/security/cve/CVE-2018-20544/" source="CVE"/>
		<reference ref_id="CVE-2018-20545" ref_url="https://www.suse.com/security/cve/CVE-2018-20545/" source="CVE"/>
		<reference ref_id="CVE-2018-20546" ref_url="https://www.suse.com/security/cve/CVE-2018-20546/" source="CVE"/>
		<reference ref_id="CVE-2018-20547" ref_url="https://www.suse.com/security/cve/CVE-2018-20547/" source="CVE"/>
		<reference ref_id="CVE-2018-20548" ref_url="https://www.suse.com/security/cve/CVE-2018-20548/" source="CVE"/>
		<reference ref_id="CVE-2018-20549" ref_url="https://www.suse.com/security/cve/CVE-2018-20549/" source="CVE"/>
		<description>
These are all security issues fixed in the libcaca-devel-0.99.beta19.git20171003-9.28 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20544/">CVE-2018-20544</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20545/">CVE-2018-20545</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20546/">CVE-2018-20546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20547/">CVE-2018-20547</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20548/">CVE-2018-20548</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20549/">CVE-2018-20549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482146" comment="libcaca-devel-0.99.beta19.git20171003-9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482147" comment="libcaca0-0.99.beta19.git20171003-9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482148" comment="libcaca0-plugins-0.99.beta19.git20171003-9.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109462" version="1" class="patch">
	<metadata>
		<title>libcontainers-common-20200306-3.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<description>
These are all security issues fixed in the libcontainers-common-20200306-3.9.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482149" comment="libcontainers-common-20200306-3.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109463" version="1" class="patch">
	<metadata>
		<title>libcroco-0.6.13-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7960" ref_url="https://www.suse.com/security/cve/CVE-2017-7960/" source="CVE"/>
		<reference ref_id="CVE-2017-7961" ref_url="https://www.suse.com/security/cve/CVE-2017-7961/" source="CVE"/>
		<reference ref_id="CVE-2017-8834" ref_url="https://www.suse.com/security/cve/CVE-2017-8834/" source="CVE"/>
		<reference ref_id="CVE-2017-8871" ref_url="https://www.suse.com/security/cve/CVE-2017-8871/" source="CVE"/>
		<description>
These are all security issues fixed in the libcroco-0.6.13-1.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7960/">CVE-2017-7960</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7961/">CVE-2017-7961</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8834/">CVE-2017-8834</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8871/">CVE-2017-8871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482150" comment="libcroco-0.6.13-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482151" comment="libcroco-0_6-3-0.6.13-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482152" comment="libcroco-0_6-3-32bit-0.6.13-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482153" comment="libcroco-devel-0.6.13-1.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109464" version="1" class="patch">
	<metadata>
		<title>libdcerpc-binding0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8143" ref_url="https://www.suse.com/security/cve/CVE-2014-8143/" source="CVE"/>
		<reference ref_id="CVE-2015-0240" ref_url="https://www.suse.com/security/cve/CVE-2015-0240/" source="CVE"/>
		<reference ref_id="CVE-2015-3223" ref_url="https://www.suse.com/security/cve/CVE-2015-3223/" source="CVE"/>
		<reference ref_id="CVE-2015-5252" ref_url="https://www.suse.com/security/cve/CVE-2015-5252/" source="CVE"/>
		<reference ref_id="CVE-2015-5296" ref_url="https://www.suse.com/security/cve/CVE-2015-5296/" source="CVE"/>
		<reference ref_id="CVE-2015-5299" ref_url="https://www.suse.com/security/cve/CVE-2015-5299/" source="CVE"/>
		<reference ref_id="CVE-2015-5330" ref_url="https://www.suse.com/security/cve/CVE-2015-5330/" source="CVE"/>
		<reference ref_id="CVE-2015-5370" ref_url="https://www.suse.com/security/cve/CVE-2015-5370/" source="CVE"/>
		<reference ref_id="CVE-2015-7560" ref_url="https://www.suse.com/security/cve/CVE-2015-7560/" source="CVE"/>
		<reference ref_id="CVE-2015-8467" ref_url="https://www.suse.com/security/cve/CVE-2015-8467/" source="CVE"/>
		<reference ref_id="CVE-2015-8543" ref_url="https://www.suse.com/security/cve/CVE-2015-8543/" source="CVE"/>
		<reference ref_id="CVE-2016-0771" ref_url="https://www.suse.com/security/cve/CVE-2016-0771/" source="CVE"/>
		<reference ref_id="CVE-2016-2110" ref_url="https://www.suse.com/security/cve/CVE-2016-2110/" source="CVE"/>
		<reference ref_id="CVE-2016-2111" ref_url="https://www.suse.com/security/cve/CVE-2016-2111/" source="CVE"/>
		<reference ref_id="CVE-2016-2112" ref_url="https://www.suse.com/security/cve/CVE-2016-2112/" source="CVE"/>
		<reference ref_id="CVE-2016-2113" ref_url="https://www.suse.com/security/cve/CVE-2016-2113/" source="CVE"/>
		<reference ref_id="CVE-2016-2115" ref_url="https://www.suse.com/security/cve/CVE-2016-2115/" source="CVE"/>
		<reference ref_id="CVE-2016-2118" ref_url="https://www.suse.com/security/cve/CVE-2016-2118/" source="CVE"/>
		<reference ref_id="CVE-2016-2119" ref_url="https://www.suse.com/security/cve/CVE-2016-2119/" source="CVE"/>
		<reference ref_id="CVE-2016-2123" ref_url="https://www.suse.com/security/cve/CVE-2016-2123/" source="CVE"/>
		<reference ref_id="CVE-2016-2125" ref_url="https://www.suse.com/security/cve/CVE-2016-2125/" source="CVE"/>
		<reference ref_id="CVE-2016-2126" ref_url="https://www.suse.com/security/cve/CVE-2016-2126/" source="CVE"/>
		<reference ref_id="CVE-2017-11103" ref_url="https://www.suse.com/security/cve/CVE-2017-11103/" source="CVE"/>
		<reference ref_id="CVE-2017-12150" ref_url="https://www.suse.com/security/cve/CVE-2017-12150/" source="CVE"/>
		<reference ref_id="CVE-2017-12151" ref_url="https://www.suse.com/security/cve/CVE-2017-12151/" source="CVE"/>
		<reference ref_id="CVE-2017-12163" ref_url="https://www.suse.com/security/cve/CVE-2017-12163/" source="CVE"/>
		<reference ref_id="CVE-2017-14746" ref_url="https://www.suse.com/security/cve/CVE-2017-14746/" source="CVE"/>
		<reference ref_id="CVE-2017-15275" ref_url="https://www.suse.com/security/cve/CVE-2017-15275/" source="CVE"/>
		<reference ref_id="CVE-2017-2619" ref_url="https://www.suse.com/security/cve/CVE-2017-2619/" source="CVE"/>
		<reference ref_id="CVE-2017-7494" ref_url="https://www.suse.com/security/cve/CVE-2017-7494/" source="CVE"/>
		<reference ref_id="CVE-2018-1050" ref_url="https://www.suse.com/security/cve/CVE-2018-1050/" source="CVE"/>
		<reference ref_id="CVE-2018-1057" ref_url="https://www.suse.com/security/cve/CVE-2018-1057/" source="CVE"/>
		<reference ref_id="CVE-2018-10858" ref_url="https://www.suse.com/security/cve/CVE-2018-10858/" source="CVE"/>
		<reference ref_id="CVE-2018-10918" ref_url="https://www.suse.com/security/cve/CVE-2018-10918/" source="CVE"/>
		<reference ref_id="CVE-2018-10919" ref_url="https://www.suse.com/security/cve/CVE-2018-10919/" source="CVE"/>
		<reference ref_id="CVE-2018-1139" ref_url="https://www.suse.com/security/cve/CVE-2018-1139/" source="CVE"/>
		<reference ref_id="CVE-2018-1140" ref_url="https://www.suse.com/security/cve/CVE-2018-1140/" source="CVE"/>
		<reference ref_id="CVE-2018-14629" ref_url="https://www.suse.com/security/cve/CVE-2018-14629/" source="CVE"/>
		<reference ref_id="CVE-2018-16841" ref_url="https://www.suse.com/security/cve/CVE-2018-16841/" source="CVE"/>
		<reference ref_id="CVE-2018-16851" ref_url="https://www.suse.com/security/cve/CVE-2018-16851/" source="CVE"/>
		<reference ref_id="CVE-2018-16852" ref_url="https://www.suse.com/security/cve/CVE-2018-16852/" source="CVE"/>
		<reference ref_id="CVE-2018-16853" ref_url="https://www.suse.com/security/cve/CVE-2018-16853/" source="CVE"/>
		<reference ref_id="CVE-2018-16857" ref_url="https://www.suse.com/security/cve/CVE-2018-16857/" source="CVE"/>
		<reference ref_id="CVE-2018-16860" ref_url="https://www.suse.com/security/cve/CVE-2018-16860/" source="CVE"/>
		<reference ref_id="CVE-2019-10197" ref_url="https://www.suse.com/security/cve/CVE-2019-10197/" source="CVE"/>
		<reference ref_id="CVE-2019-10218" ref_url="https://www.suse.com/security/cve/CVE-2019-10218/" source="CVE"/>
		<reference ref_id="CVE-2019-12435" ref_url="https://www.suse.com/security/cve/CVE-2019-12435/" source="CVE"/>
		<reference ref_id="CVE-2019-12436" ref_url="https://www.suse.com/security/cve/CVE-2019-12436/" source="CVE"/>
		<reference ref_id="CVE-2019-14833" ref_url="https://www.suse.com/security/cve/CVE-2019-14833/" source="CVE"/>
		<reference ref_id="CVE-2019-14847" ref_url="https://www.suse.com/security/cve/CVE-2019-14847/" source="CVE"/>
		<reference ref_id="CVE-2019-14861" ref_url="https://www.suse.com/security/cve/CVE-2019-14861/" source="CVE"/>
		<reference ref_id="CVE-2019-14870" ref_url="https://www.suse.com/security/cve/CVE-2019-14870/" source="CVE"/>
		<reference ref_id="CVE-2019-14902" ref_url="https://www.suse.com/security/cve/CVE-2019-14902/" source="CVE"/>
		<reference ref_id="CVE-2019-14907" ref_url="https://www.suse.com/security/cve/CVE-2019-14907/" source="CVE"/>
		<reference ref_id="CVE-2019-19344" ref_url="https://www.suse.com/security/cve/CVE-2019-19344/" source="CVE"/>
		<reference ref_id="CVE-2019-3824" ref_url="https://www.suse.com/security/cve/CVE-2019-3824/" source="CVE"/>
		<reference ref_id="CVE-2019-3870" ref_url="https://www.suse.com/security/cve/CVE-2019-3870/" source="CVE"/>
		<reference ref_id="CVE-2019-3880" ref_url="https://www.suse.com/security/cve/CVE-2019-3880/" source="CVE"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<description>
These are all security issues fixed in the libdcerpc-binding0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8143/">CVE-2014-8143</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0240/">CVE-2015-0240</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3223/">CVE-2015-3223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5252/">CVE-2015-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5296/">CVE-2015-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5299/">CVE-2015-5299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5330/">CVE-2015-5330</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5370/">CVE-2015-5370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7560/">CVE-2015-7560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8467/">CVE-2015-8467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8543/">CVE-2015-8543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0771/">CVE-2016-0771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2110/">CVE-2016-2110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2111/">CVE-2016-2111</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2112/">CVE-2016-2112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2113/">CVE-2016-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2115/">CVE-2016-2115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2118/">CVE-2016-2118</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2119/">CVE-2016-2119</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2123/">CVE-2016-2123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2125/">CVE-2016-2125</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2126/">CVE-2016-2126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11103/">CVE-2017-11103</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12150/">CVE-2017-12150</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-12151/">CVE-2017-12151</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12163/">CVE-2017-12163</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14746/">CVE-2017-14746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15275/">CVE-2017-15275</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2619/">CVE-2017-2619</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7494/">CVE-2017-7494</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1050/">CVE-2018-1050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1057/">CVE-2018-1057</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10858/">CVE-2018-10858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10918/">CVE-2018-10918</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10919/">CVE-2018-10919</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1139/">CVE-2018-1139</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1140/">CVE-2018-1140</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14629/">CVE-2018-14629</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16841/">CVE-2018-16841</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16851/">CVE-2018-16851</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16852/">CVE-2018-16852</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16853/">CVE-2018-16853</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16857/">CVE-2018-16857</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16860/">CVE-2018-16860</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10197/">CVE-2019-10197</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10218/">CVE-2019-10218</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12435/">CVE-2019-12435</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12436/">CVE-2019-12436</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14833/">CVE-2019-14833</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14847/">CVE-2019-14847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14861/">CVE-2019-14861</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14870/">CVE-2019-14870</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-14902/">CVE-2019-14902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14907/">CVE-2019-14907</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19344/">CVE-2019-19344</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3824/">CVE-2019-3824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3870/">CVE-2019-3870</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3880/">CVE-2019-3880</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482154" comment="libdcerpc-binding0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482155" comment="libdcerpc-binding0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482156" comment="libdcerpc-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482157" comment="libdcerpc-samr-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482158" comment="libdcerpc-samr0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482159" comment="libdcerpc0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482160" comment="libdcerpc0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482161" comment="libndr-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482162" comment="libndr-krb5pac-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482163" comment="libndr-krb5pac0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482164" comment="libndr-krb5pac0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482165" comment="libndr-nbt-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482166" comment="libndr-nbt0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482167" comment="libndr-nbt0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482168" comment="libndr-standard-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482169" comment="libndr-standard0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482170" comment="libndr-standard0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482171" comment="libndr0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482172" comment="libndr0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482173" comment="libnetapi-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482174" comment="libnetapi0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482175" comment="libnetapi0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482176" comment="libsamba-credentials-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482177" comment="libsamba-credentials0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482178" comment="libsamba-credentials0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482179" comment="libsamba-errors-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482180" comment="libsamba-errors0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482181" comment="libsamba-errors0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482182" comment="libsamba-hostconfig-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482183" comment="libsamba-hostconfig0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482184" comment="libsamba-hostconfig0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482185" comment="libsamba-passdb-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482186" comment="libsamba-passdb0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482187" comment="libsamba-passdb0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482188" comment="libsamba-policy-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482189" comment="libsamba-policy-python3-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482190" comment="libsamba-policy0-python3-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482191" comment="libsamba-util-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482192" comment="libsamba-util0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482193" comment="libsamba-util0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482194" comment="libsamdb-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482195" comment="libsamdb0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482196" comment="libsamdb0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482197" comment="libsmbclient-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482198" comment="libsmbclient0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482199" comment="libsmbconf-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482200" comment="libsmbconf0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482201" comment="libsmbconf0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482202" comment="libsmbldap-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482203" comment="libsmbldap2-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482204" comment="libsmbldap2-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482205" comment="libtevent-util-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482206" comment="libtevent-util0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482207" comment="libtevent-util0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482208" comment="libwbclient-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482209" comment="libwbclient0-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482210" comment="libwbclient0-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482211" comment="samba-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482212" comment="samba-ceph-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482213" comment="samba-client-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482214" comment="samba-core-devel-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482215" comment="samba-libs-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482216" comment="samba-libs-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482217" comment="samba-libs-python3-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482218" comment="samba-python3-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482219" comment="samba-winbind-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482220" comment="samba-winbind-32bit-4.11.5+git.161.74bc5e6ec8e-2.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109465" version="1" class="patch">
	<metadata>
		<title>libdmx-devel-1.1.3-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1992" ref_url="https://www.suse.com/security/cve/CVE-2013-1992/" source="CVE"/>
		<description>
These are all security issues fixed in the libdmx-devel-1.1.3-1.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1992/">CVE-2013-1992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480523" comment="libdmx-devel-1.1.3-1.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480524" comment="libdmx1-1.1.3-1.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109466" version="1" class="patch">
	<metadata>
		<title>libevent-2_1-8-2.1.8-2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-6272" ref_url="https://www.suse.com/security/cve/CVE-2014-6272/" source="CVE"/>
		<description>
These are all security issues fixed in the libevent-2_1-8-2.1.8-2.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6272/">CVE-2014-6272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480525" comment="libevent-2_1-8-2.1.8-2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480526" comment="libevent-devel-2.1.8-2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109467" version="1" class="patch">
	<metadata>
		<title>libfreebl3-3.47.1-3.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-3.47.1-3.37.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482221" comment="libfreebl3-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482222" comment="libfreebl3-32bit-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482223" comment="libsoftokn3-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482224" comment="libsoftokn3-32bit-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482225" comment="mozilla-nss-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482226" comment="mozilla-nss-32bit-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482227" comment="mozilla-nss-certs-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482228" comment="mozilla-nss-certs-32bit-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482229" comment="mozilla-nss-devel-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482230" comment="mozilla-nss-sysinit-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482231" comment="mozilla-nss-tools-3.47.1-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109468" version="1" class="patch">
	<metadata>
		<title>libgcrypt-devel-1.8.2-8.36.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3591" ref_url="https://www.suse.com/security/cve/CVE-2014-3591/" source="CVE"/>
		<reference ref_id="CVE-2015-0837" ref_url="https://www.suse.com/security/cve/CVE-2015-0837/" source="CVE"/>
		<reference ref_id="CVE-2015-5738" ref_url="https://www.suse.com/security/cve/CVE-2015-5738/" source="CVE"/>
		<reference ref_id="CVE-2015-7511" ref_url="https://www.suse.com/security/cve/CVE-2015-7511/" source="CVE"/>
		<reference ref_id="CVE-2016-6313" ref_url="https://www.suse.com/security/cve/CVE-2016-6313/" source="CVE"/>
		<reference ref_id="CVE-2017-0379" ref_url="https://www.suse.com/security/cve/CVE-2017-0379/" source="CVE"/>
		<reference ref_id="CVE-2017-7526" ref_url="https://www.suse.com/security/cve/CVE-2017-7526/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2019-12904" ref_url="https://www.suse.com/security/cve/CVE-2019-12904/" source="CVE"/>
		<reference ref_id="CVE-2019-13627" ref_url="https://www.suse.com/security/cve/CVE-2019-13627/" source="CVE"/>
		<description>
These are all security issues fixed in the libgcrypt-devel-1.8.2-8.36.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3591/">CVE-2014-3591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0837/">CVE-2015-0837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5738/">CVE-2015-5738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7511/">CVE-2015-7511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6313/">CVE-2016-6313</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-0379/">CVE-2017-0379</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7526/">CVE-2017-7526</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12904/">CVE-2019-12904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13627/">CVE-2019-13627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482232" comment="libgcrypt-devel-1.8.2-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482233" comment="libgcrypt20-1.8.2-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482234" comment="libgcrypt20-32bit-1.8.2-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482235" comment="libgcrypt20-hmac-1.8.2-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482236" comment="libgcrypt20-hmac-32bit-1.8.2-8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109469" version="1" class="patch">
	<metadata>
		<title>libgd3-2.2.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the libgd3-2.2.5-9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482237" comment="libgd3-2.2.5-9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109470" version="1" class="patch">
	<metadata>
		<title>libgstphotography-1_0-0-1.16.2-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the libgstphotography-1_0-0-1.16.2-2.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482238" comment="libgstphotography-1_0-0-1.16.2-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109471" version="1" class="patch">
	<metadata>
		<title>libgtk-vnc-2_0-0-1.0.0-2.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
These are all security issues fixed in the libgtk-vnc-2_0-0-1.0.0-2.35 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482239" comment="libgtk-vnc-2_0-0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482240" comment="libgvnc-1_0-0-1.0.0-2.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109472" version="1" class="patch">
	<metadata>
		<title>libhogweed4-3.4.1-4.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8803" ref_url="https://www.suse.com/security/cve/CVE-2015-8803/" source="CVE"/>
		<reference ref_id="CVE-2015-8804" ref_url="https://www.suse.com/security/cve/CVE-2015-8804/" source="CVE"/>
		<reference ref_id="CVE-2015-8805" ref_url="https://www.suse.com/security/cve/CVE-2015-8805/" source="CVE"/>
		<reference ref_id="CVE-2016-6489" ref_url="https://www.suse.com/security/cve/CVE-2016-6489/" source="CVE"/>
		<reference ref_id="CVE-2018-16869" ref_url="https://www.suse.com/security/cve/CVE-2018-16869/" source="CVE"/>
		<description>
These are all security issues fixed in the libhogweed4-3.4.1-4.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8803/">CVE-2015-8803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8804/">CVE-2015-8804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8805/">CVE-2015-8805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6489/">CVE-2016-6489</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16869/">CVE-2018-16869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482241" comment="libhogweed4-3.4.1-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482242" comment="libhogweed4-32bit-3.4.1-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482243" comment="libnettle-devel-3.4.1-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482244" comment="libnettle6-3.4.1-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482245" comment="libnettle6-32bit-3.4.1-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109473" version="1" class="patch">
	<metadata>
		<title>libical3-3.0.6-2.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical3-3.0.6-2.56 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482246" comment="libical3-3.0.6-2.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109474" version="1" class="patch">
	<metadata>
		<title>libidn-devel-1.34-3.2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2017-14062" ref_url="https://www.suse.com/security/cve/CVE-2017-14062/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn-devel-1.34-3.2.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14062/">CVE-2017-14062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482247" comment="libidn-devel-1.34-3.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482248" comment="libidn11-1.34-3.2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482249" comment="libidn11-32bit-1.34-3.2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109475" version="1" class="patch">
	<metadata>
		<title>libidn2-0-2.2.0-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2059" ref_url="https://www.suse.com/security/cve/CVE-2015-2059/" source="CVE"/>
		<reference ref_id="CVE-2015-8948" ref_url="https://www.suse.com/security/cve/CVE-2015-8948/" source="CVE"/>
		<reference ref_id="CVE-2016-6261" ref_url="https://www.suse.com/security/cve/CVE-2016-6261/" source="CVE"/>
		<reference ref_id="CVE-2016-6262" ref_url="https://www.suse.com/security/cve/CVE-2016-6262/" source="CVE"/>
		<reference ref_id="CVE-2016-6263" ref_url="https://www.suse.com/security/cve/CVE-2016-6263/" source="CVE"/>
		<reference ref_id="CVE-2019-12290" ref_url="https://www.suse.com/security/cve/CVE-2019-12290/" source="CVE"/>
		<reference ref_id="CVE-2019-18224" ref_url="https://www.suse.com/security/cve/CVE-2019-18224/" source="CVE"/>
		<description>
These are all security issues fixed in the libidn2-0-2.2.0-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-2059/">CVE-2015-2059</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8948/">CVE-2015-8948</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6261/">CVE-2016-6261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6262/">CVE-2016-6262</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6263/">CVE-2016-6263</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12290/">CVE-2019-12290</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18224/">CVE-2019-18224</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482250" comment="libidn2-0-2.2.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482251" comment="libidn2-0-32bit-2.2.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482252" comment="libidn2-devel-2.2.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109476" version="1" class="patch">
	<metadata>
		<title>libipa_hbac-devel-1.16.1-15.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12173" ref_url="https://www.suse.com/security/cve/CVE-2017-12173/" source="CVE"/>
		<reference ref_id="CVE-2018-10852" ref_url="https://www.suse.com/security/cve/CVE-2018-10852/" source="CVE"/>
		<reference ref_id="CVE-2018-16838" ref_url="https://www.suse.com/security/cve/CVE-2018-16838/" source="CVE"/>
		<reference ref_id="CVE-2019-3811" ref_url="https://www.suse.com/security/cve/CVE-2019-3811/" source="CVE"/>
		<description>
These are all security issues fixed in the libipa_hbac-devel-1.16.1-15.32 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12173/">CVE-2017-12173</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10852/">CVE-2018-10852</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16838/">CVE-2018-16838</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3811/">CVE-2019-3811</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482253" comment="libipa_hbac-devel-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482254" comment="libipa_hbac0-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482255" comment="libsss_certmap-devel-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482256" comment="libsss_certmap0-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482257" comment="libsss_idmap-devel-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482258" comment="libsss_idmap0-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482259" comment="libsss_nss_idmap-devel-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482260" comment="libsss_nss_idmap0-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482261" comment="libsss_simpleifp-devel-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482262" comment="libsss_simpleifp0-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482263" comment="python3-sssd-config-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482264" comment="sssd-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482265" comment="sssd-32bit-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482266" comment="sssd-ad-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482267" comment="sssd-dbus-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482268" comment="sssd-ipa-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482269" comment="sssd-krb5-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482270" comment="sssd-krb5-common-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482271" comment="sssd-ldap-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482272" comment="sssd-proxy-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482273" comment="sssd-tools-1.16.1-15.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482274" comment="sssd-winbind-idmap-1.16.1-15.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109477" version="1" class="patch">
	<metadata>
		<title>libjansson-devel-2.9-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6401" ref_url="https://www.suse.com/security/cve/CVE-2013-6401/" source="CVE"/>
		<description>
These are all security issues fixed in the libjansson-devel-2.9-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6401/">CVE-2013-6401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480579" comment="libjansson-devel-2.9-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480580" comment="libjansson4-2.9-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481404" comment="libjansson4-32bit-2.9-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109478" version="1" class="patch">
	<metadata>
		<title>libjasper4-2.0.14-3.11.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper4-2.0.14-3.11.8 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482275" comment="libjasper4-2.0.14-3.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109479" version="1" class="patch">
	<metadata>
		<title>libjavascriptcoregtk-4_0-18-2.28.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8523" ref_url="https://www.suse.com/security/cve/CVE-2019-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<description>
These are all security issues fixed in the libjavascriptcoregtk-4_0-18-2.28.2-1.11 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8523/">CVE-2019-8523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482276" comment="libjavascriptcoregtk-4_0-18-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482277" comment="libwebkit2gtk-4_0-37-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482278" comment="libwebkit2gtk3-lang-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482279" comment="webkit2gtk-4_0-injected-bundles-2.28.2-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109480" version="1" class="patch">
	<metadata>
		<title>libjbig-devel-2.1-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig-devel-2.1-1.31 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480586" comment="libjbig-devel-2.1-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480587" comment="libjbig2-2.1-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109481" version="1" class="patch">
	<metadata>
		<title>libjpeg62-62.2.0-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg62-62.2.0-5.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482280" comment="libjpeg62-62.2.0-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482281" comment="libjpeg62-devel-62.2.0-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109482" version="1" class="patch">
	<metadata>
		<title>libjpeg8-8.1.2-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg8-8.1.2-5.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482282" comment="libjpeg8-8.1.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482283" comment="libjpeg8-devel-8.1.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482284" comment="libturbojpeg0-8.1.2-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109483" version="1" class="patch">
	<metadata>
		<title>libjson-c-devel-0.13-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6370" ref_url="https://www.suse.com/security/cve/CVE-2013-6370/" source="CVE"/>
		<reference ref_id="CVE-2013-6371" ref_url="https://www.suse.com/security/cve/CVE-2013-6371/" source="CVE"/>
		<description>
These are all security issues fixed in the libjson-c-devel-0.13-1.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6370/">CVE-2013-6370</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6371/">CVE-2013-6371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480593" comment="libjson-c-devel-0.13-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480594" comment="libjson-c3-0.13-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480595" comment="libjson-c3-32bit-0.13-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109484" version="1" class="patch">
	<metadata>
		<title>libksba-devel-1.3.5-2.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9087" ref_url="https://www.suse.com/security/cve/CVE-2014-9087/" source="CVE"/>
		<reference ref_id="CVE-2016-4574" ref_url="https://www.suse.com/security/cve/CVE-2016-4574/" source="CVE"/>
		<reference ref_id="CVE-2016-4579" ref_url="https://www.suse.com/security/cve/CVE-2016-4579/" source="CVE"/>
		<description>
These are all security issues fixed in the libksba-devel-1.3.5-2.14 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9087/">CVE-2014-9087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4574/">CVE-2016-4574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4579/">CVE-2016-4579</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480596" comment="libksba-devel-1.3.5-2.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480597" comment="libksba8-1.3.5-2.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109485" version="1" class="patch">
	<metadata>
		<title>liblcms2-2-2.9-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<description>
These are all security issues fixed in the liblcms2-2-2.9-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481415" comment="liblcms2-2-2.9-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481416" comment="liblcms2-devel-2.9-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109486" version="1" class="patch">
	<metadata>
		<title>libldap-2_4-2-2.4.46-9.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
These are all security issues fixed in the libldap-2_4-2-2.4.46-9.28.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482285" comment="libldap-2_4-2-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482286" comment="libldap-2_4-2-32bit-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482287" comment="libldap-data-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482288" comment="openldap2-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482289" comment="openldap2-client-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482290" comment="openldap2-devel-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482291" comment="openldap2-devel-static-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482292" comment="openldap2-ppolicy-check-password-1.2-9.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109487" version="1" class="patch">
	<metadata>
		<title>libltdl7-2.4.6-1.406 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libltdl7-2.4.6-1.406 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480609" comment="libltdl7-2.4.6-1.406 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480610" comment="libtool-2.4.6-1.406 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109488" version="1" class="patch">
	<metadata>
		<title>liblua5_3-5-32bit-5.3.4-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-6706" ref_url="https://www.suse.com/security/cve/CVE-2019-6706/" source="CVE"/>
		<description>
These are all security issues fixed in the liblua5_3-5-32bit-5.3.4-3.3.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6706/">CVE-2019-6706</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481427" comment="liblua5_3-5-5.3.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481428" comment="liblua5_3-5-32bit-5.3.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481429" comment="lua53-5.3.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481430" comment="lua53-devel-5.3.4-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109489" version="1" class="patch">
	<metadata>
		<title>liblz4-1-1.8.0-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-17543" ref_url="https://www.suse.com/security/cve/CVE-2019-17543/" source="CVE"/>
		<description>
These are all security issues fixed in the liblz4-1-1.8.0-3.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17543/">CVE-2019-17543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482293" comment="liblz4-1-1.8.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482294" comment="liblz4-1-32bit-1.8.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482295" comment="liblz4-devel-1.8.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482296" comment="lz4-1.8.0-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109490" version="1" class="patch">
	<metadata>
		<title>liblzo2-2-2.10-2.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<description>
These are all security issues fixed in the liblzo2-2-2.10-2.22 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480611" comment="liblzo2-2-2.10-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480612" comment="lzo-devel-2.10-2.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480613" comment="lzo-devel-static-2.10-2.22 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109491" version="1" class="patch">
	<metadata>
		<title>libmariadb3-3.1.8-3.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadb3-3.1.8-3.18.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482297" comment="libmariadb3-3.1.8-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482298" comment="libmariadbprivate-3.1.8-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109492" version="1" class="patch">
	<metadata>
		<title>libmarkdown2-2.2.4-1.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-11468" ref_url="https://www.suse.com/security/cve/CVE-2018-11468/" source="CVE"/>
		<reference ref_id="CVE-2018-12495" ref_url="https://www.suse.com/security/cve/CVE-2018-12495/" source="CVE"/>
		<description>
These are all security issues fixed in the libmarkdown2-2.2.4-1.41 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11468/">CVE-2018-11468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12495/">CVE-2018-12495</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482299" comment="libmarkdown2-2.2.4-1.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109493" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd12-0.9.57-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd12-0.9.57-1.33 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482300" comment="libmicrohttpd12-0.9.57-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109494" version="1" class="patch">
	<metadata>
		<title>libminizip1-1.2.11-3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the libminizip1-1.2.11-3.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482301" comment="libminizip1-1.2.11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482302" comment="libz1-1.2.11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482303" comment="libz1-32bit-1.2.11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482304" comment="minizip-devel-1.2.11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482305" comment="zlib-devel-1.2.11-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482306" comment="zlib-devel-static-1.2.11-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109495" version="1" class="patch">
	<metadata>
		<title>libmp3lame0-3.100-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-9410" ref_url="https://www.suse.com/security/cve/CVE-2017-9410/" source="CVE"/>
		<reference ref_id="CVE-2017-9411" ref_url="https://www.suse.com/security/cve/CVE-2017-9411/" source="CVE"/>
		<reference ref_id="CVE-2017-9412" ref_url="https://www.suse.com/security/cve/CVE-2017-9412/" source="CVE"/>
		<description>
These are all security issues fixed in the libmp3lame0-3.100-1.33 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9410/">CVE-2017-9410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9411/">CVE-2017-9411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9412/">CVE-2017-9412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482307" comment="libmp3lame0-3.100-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109496" version="1" class="patch">
	<metadata>
		<title>libmpfr6-4.0.1-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9474" ref_url="https://www.suse.com/security/cve/CVE-2014-9474/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpfr6-4.0.1-1.46 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9474/">CVE-2014-9474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480620" comment="libmpfr6-4.0.1-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480621" comment="mpfr-devel-4.0.1-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109497" version="1" class="patch">
	<metadata>
		<title>libmpg123-0-1.25.10-1.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-10683" ref_url="https://www.suse.com/security/cve/CVE-2017-10683/" source="CVE"/>
		<reference ref_id="CVE-2017-11126" ref_url="https://www.suse.com/security/cve/CVE-2017-11126/" source="CVE"/>
		<description>
These are all security issues fixed in the libmpg123-0-1.25.10-1.38 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-10683/">CVE-2017-10683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-11126/">CVE-2017-11126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482308" comment="libmpg123-0-1.25.10-1.38 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109498" version="1" class="patch">
	<metadata>
		<title>libmspack-devel-0.6-3.8.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9556" ref_url="https://www.suse.com/security/cve/CVE-2014-9556/" source="CVE"/>
		<reference ref_id="CVE-2017-11423" ref_url="https://www.suse.com/security/cve/CVE-2017-11423/" source="CVE"/>
		<reference ref_id="CVE-2017-6419" ref_url="https://www.suse.com/security/cve/CVE-2017-6419/" source="CVE"/>
		<reference ref_id="CVE-2018-18584" ref_url="https://www.suse.com/security/cve/CVE-2018-18584/" source="CVE"/>
		<reference ref_id="CVE-2018-18585" ref_url="https://www.suse.com/security/cve/CVE-2018-18585/" source="CVE"/>
		<reference ref_id="CVE-2019-1010305" ref_url="https://www.suse.com/security/cve/CVE-2019-1010305/" source="CVE"/>
		<description>
These are all security issues fixed in the libmspack-devel-0.6-3.8.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9556/">CVE-2014-9556</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11423/">CVE-2017-11423</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6419/">CVE-2017-6419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18584/">CVE-2018-18584</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-18585/">CVE-2018-18585</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010305/">CVE-2019-1010305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482309" comment="libmspack-devel-0.6-3.8.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482310" comment="libmspack0-0.6-3.8.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109499" version="1" class="patch">
	<metadata>
		<title>libncurses6-32bit-6.1-5.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses6-32bit-6.1-5.6.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482311" comment="libncurses6-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482312" comment="libncurses6-32bit-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482313" comment="ncurses-devel-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482314" comment="ncurses-utils-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482315" comment="tack-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482316" comment="terminfo-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482317" comment="terminfo-base-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482318" comment="terminfo-iterm-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482319" comment="terminfo-screen-6.1-5.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109500" version="1" class="patch">
	<metadata>
		<title>libnetpbm11-10.80.1-3.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm11-10.80.1-3.8.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482320" comment="libnetpbm11-10.80.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482321" comment="netpbm-10.80.1-3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109501" version="1" class="patch">
	<metadata>
		<title>libnewt0_52-0.52.20-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the libnewt0_52-0.52.20-5.35 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480626" comment="libnewt0_52-0.52.20-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480627" comment="newt-0.52.20-5.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480628" comment="python3-newt-0.52.20-5.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109502" version="1" class="patch">
	<metadata>
		<title>libnghttp2-14-1.40.0-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1544" ref_url="https://www.suse.com/security/cve/CVE-2016-1544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2019-18802" ref_url="https://www.suse.com/security/cve/CVE-2019-18802/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<description>
These are all security issues fixed in the libnghttp2-14-1.40.0-1.15 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-1544/">CVE-2016-1544</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18802/">CVE-2019-18802</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482322" comment="libnghttp2-14-1.40.0-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482323" comment="libnghttp2-14-32bit-1.40.0-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482324" comment="libnghttp2-devel-1.40.0-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482325" comment="libnghttp2_asio-devel-1.40.0-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482326" comment="libnghttp2_asio1-1.40.0-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109503" version="1" class="patch">
	<metadata>
		<title>libnm0-1.22.6-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>
These are all security issues fixed in the libnm0-1.22.6-1.36 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482327" comment="libnm0-1.22.6-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482328" comment="typelib-1_0-NM-1_0-1.22.6-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109504" version="1" class="patch">
	<metadata>
		<title>liboath-devel-2.6.2-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7322" ref_url="https://www.suse.com/security/cve/CVE-2013-7322/" source="CVE"/>
		<description>
These are all security issues fixed in the liboath-devel-2.6.2-1.15 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7322/">CVE-2013-7322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481452" comment="liboath-devel-2.6.2-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480636" comment="liboath0-2.6.2-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480637" comment="oath-toolkit-xml-2.6.2-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109505" version="1" class="patch">
	<metadata>
		<title>libopenjp2-7-2.3.0-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10504" ref_url="https://www.suse.com/security/cve/CVE-2016-10504/" source="CVE"/>
		<reference ref_id="CVE-2016-10505" ref_url="https://www.suse.com/security/cve/CVE-2016-10505/" source="CVE"/>
		<reference ref_id="CVE-2016-10506" ref_url="https://www.suse.com/security/cve/CVE-2016-10506/" source="CVE"/>
		<reference ref_id="CVE-2016-5139" ref_url="https://www.suse.com/security/cve/CVE-2016-5139/" source="CVE"/>
		<reference ref_id="CVE-2016-5152" ref_url="https://www.suse.com/security/cve/CVE-2016-5152/" source="CVE"/>
		<reference ref_id="CVE-2016-5158" ref_url="https://www.suse.com/security/cve/CVE-2016-5158/" source="CVE"/>
		<reference ref_id="CVE-2016-5159" ref_url="https://www.suse.com/security/cve/CVE-2016-5159/" source="CVE"/>
		<reference ref_id="CVE-2016-7163" ref_url="https://www.suse.com/security/cve/CVE-2016-7163/" source="CVE"/>
		<reference ref_id="CVE-2016-8332" ref_url="https://www.suse.com/security/cve/CVE-2016-8332/" source="CVE"/>
		<reference ref_id="CVE-2017-12982" ref_url="https://www.suse.com/security/cve/CVE-2017-12982/" source="CVE"/>
		<reference ref_id="CVE-2017-14039" ref_url="https://www.suse.com/security/cve/CVE-2017-14039/" source="CVE"/>
		<reference ref_id="CVE-2017-14040" ref_url="https://www.suse.com/security/cve/CVE-2017-14040/" source="CVE"/>
		<reference ref_id="CVE-2017-14041" ref_url="https://www.suse.com/security/cve/CVE-2017-14041/" source="CVE"/>
		<reference ref_id="CVE-2017-14151" ref_url="https://www.suse.com/security/cve/CVE-2017-14151/" source="CVE"/>
		<reference ref_id="CVE-2017-14152" ref_url="https://www.suse.com/security/cve/CVE-2017-14152/" source="CVE"/>
		<reference ref_id="CVE-2017-14164" ref_url="https://www.suse.com/security/cve/CVE-2017-14164/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjp2-7-2.3.0-1.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10504/">CVE-2016-10504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10505/">CVE-2016-10505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10506/">CVE-2016-10506</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5139/">CVE-2016-5139</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5152/">CVE-2016-5152</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5158/">CVE-2016-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5159/">CVE-2016-5159</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7163/">CVE-2016-7163</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8332/">CVE-2016-8332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12982/">CVE-2017-12982</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14039/">CVE-2017-14039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14040/">CVE-2017-14040</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14041/">CVE-2017-14041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14151/">CVE-2017-14151</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14152/">CVE-2017-14152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14164/">CVE-2017-14164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480638" comment="libopenjp2-7-2.3.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480639" comment="openjpeg2-2.3.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480640" comment="openjpeg2-devel-2.3.0-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109506" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_1-devel-1.1.1d-9.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2019-1543" ref_url="https://www.suse.com/security/cve/CVE-2019-1543/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1549" ref_url="https://www.suse.com/security/cve/CVE-2019-1549/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_1-devel-1.1.1d-9.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1543/">CVE-2019-1543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1549/">CVE-2019-1549</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482329" comment="libopenssl-1_1-devel-1.1.1d-9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482330" comment="libopenssl1_1-1.1.1d-9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482331" comment="libopenssl1_1-32bit-1.1.1d-9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482332" comment="libopenssl1_1-hmac-1.1.1d-9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482333" comment="libopenssl1_1-hmac-32bit-1.1.1d-9.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482334" comment="openssl-1_1-1.1.1d-9.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109507" version="1" class="patch">
	<metadata>
		<title>libopenssl-devel-1.1.1d-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-devel-1.1.1d-1.46 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482335" comment="libopenssl-devel-1.1.1d-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482336" comment="openssl-1.1.1d-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109508" version="1" class="patch">
	<metadata>
		<title>libopus0-1.3.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus0-1.3.1-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482337" comment="libopus0-1.3.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109509" version="1" class="patch">
	<metadata>
		<title>libosinfo-1.7.1-1.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-1.7.1-1.52 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482338" comment="libosinfo-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482339" comment="libosinfo-1_0-0-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482340" comment="libosinfo-lang-1.7.1-1.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109510" version="1" class="patch">
	<metadata>
		<title>libpainter0-0.9.13-2.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1430" ref_url="https://www.suse.com/security/cve/CVE-2013-1430/" source="CVE"/>
		<reference ref_id="CVE-2017-16927" ref_url="https://www.suse.com/security/cve/CVE-2017-16927/" source="CVE"/>
		<reference ref_id="CVE-2017-6967" ref_url="https://www.suse.com/security/cve/CVE-2017-6967/" source="CVE"/>
		<description>
These are all security issues fixed in the libpainter0-0.9.13-2.8 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2013-1430/">CVE-2013-1430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16927/">CVE-2017-16927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6967/">CVE-2017-6967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482341" comment="libpainter0-0.9.13-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482342" comment="librfxencode0-0.9.13-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482343" comment="xrdp-0.9.13-2.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482344" comment="xrdp-devel-0.9.13-2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109511" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-1.44.7+11-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-1.44.7+11-1.25 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482345" comment="libpango-1_0-0-1.44.7+11-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482346" comment="pango-devel-1.44.7+11-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482347" comment="typelib-1_0-Pango-1_0-1.44.7+11-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109512" version="1" class="patch">
	<metadata>
		<title>libpcap-devel-1.8.1-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2019-15165" ref_url="https://www.suse.com/security/cve/CVE-2019-15165/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcap-devel-1.8.1-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15165/">CVE-2019-15165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482348" comment="libpcap-devel-1.8.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482349" comment="libpcap1-1.8.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109513" version="1" class="patch">
	<metadata>
		<title>libpcre1-32bit-8.41-4.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-3217" ref_url="https://www.suse.com/security/cve/CVE-2015-3217/" source="CVE"/>
		<reference ref_id="CVE-2016-1283" ref_url="https://www.suse.com/security/cve/CVE-2016-1283/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-6004" ref_url="https://www.suse.com/security/cve/CVE-2017-6004/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-7244" ref_url="https://www.suse.com/security/cve/CVE-2017-7244/" source="CVE"/>
		<reference ref_id="CVE-2017-7245" ref_url="https://www.suse.com/security/cve/CVE-2017-7245/" source="CVE"/>
		<reference ref_id="CVE-2017-7246" ref_url="https://www.suse.com/security/cve/CVE-2017-7246/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre1-32bit-8.41-4.20 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3217/">CVE-2015-3217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1283/">CVE-2016-1283</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6004/">CVE-2017-6004</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7244/">CVE-2017-7244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7245/">CVE-2017-7245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7246/">CVE-2017-7246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480657" comment="libpcre1-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480658" comment="libpcre1-32bit-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480659" comment="libpcre16-0-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480660" comment="libpcrecpp0-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480661" comment="libpcrecpp0-32bit-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480662" comment="libpcreposix0-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480663" comment="pcre-devel-8.41-4.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480664" comment="pcre-tools-8.41-4.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109514" version="1" class="patch">
	<metadata>
		<title>libpcre2-16-0-10.31-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8964" ref_url="https://www.suse.com/security/cve/CVE-2014-8964/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2016-3191" ref_url="https://www.suse.com/security/cve/CVE-2016-3191/" source="CVE"/>
		<reference ref_id="CVE-2017-7186" ref_url="https://www.suse.com/security/cve/CVE-2017-7186/" source="CVE"/>
		<reference ref_id="CVE-2017-8786" ref_url="https://www.suse.com/security/cve/CVE-2017-8786/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcre2-16-0-10.31-1.14 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8964/">CVE-2014-8964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-3191/">CVE-2016-3191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7186/">CVE-2017-7186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8786/">CVE-2017-8786</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480665" comment="libpcre2-16-0-10.31-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480666" comment="libpcre2-32-0-10.31-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480667" comment="libpcre2-8-0-10.31-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482350" comment="libpcre2-posix2-10.31-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482351" comment="pcre2-devel-10.31-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109515" version="1" class="patch">
	<metadata>
		<title>libpcsclite1-1.8.24-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10109" ref_url="https://www.suse.com/security/cve/CVE-2016-10109/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcsclite1-1.8.24-1.14 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10109/">CVE-2016-10109</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481464" comment="libpcsclite1-1.8.24-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481465" comment="libpcscspy0-1.8.24-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481466" comment="pcsc-lite-1.8.24-1.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481467" comment="pcsc-lite-devel-1.8.24-1.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109516" version="1" class="patch">
	<metadata>
		<title>libpng12-0-1.2.57-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-1205" ref_url="https://www.suse.com/security/cve/CVE-2010-1205/" source="CVE"/>
		<reference ref_id="CVE-2011-2501" ref_url="https://www.suse.com/security/cve/CVE-2011-2501/" source="CVE"/>
		<reference ref_id="CVE-2011-3026" ref_url="https://www.suse.com/security/cve/CVE-2011-3026/" source="CVE"/>
		<reference ref_id="CVE-2011-3045" ref_url="https://www.suse.com/security/cve/CVE-2011-3045/" source="CVE"/>
		<reference ref_id="CVE-2011-3048" ref_url="https://www.suse.com/security/cve/CVE-2011-3048/" source="CVE"/>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<reference ref_id="CVE-2013-7353" ref_url="https://www.suse.com/security/cve/CVE-2013-7353/" source="CVE"/>
		<reference ref_id="CVE-2013-7354" ref_url="https://www.suse.com/security/cve/CVE-2013-7354/" source="CVE"/>
		<reference ref_id="CVE-2014-9495" ref_url="https://www.suse.com/security/cve/CVE-2014-9495/" source="CVE"/>
		<reference ref_id="CVE-2015-0973" ref_url="https://www.suse.com/security/cve/CVE-2015-0973/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8540" ref_url="https://www.suse.com/security/cve/CVE-2015-8540/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng12-0-1.2.57-2.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-1205/">CVE-2010-1205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2501/">CVE-2011-2501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3026/">CVE-2011-3026</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3045/">CVE-2011-3045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-3048/">CVE-2011-3048</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7353/">CVE-2013-7353</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7354/">CVE-2013-7354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9495/">CVE-2014-9495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0973/">CVE-2015-0973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8540/">CVE-2015-8540</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480672" comment="libpng12-0-1.2.57-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480673" comment="libpng12-devel-1.2.57-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109517" version="1" class="patch">
	<metadata>
		<title>libpng16-16-1.6.34-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-10087" ref_url="https://www.suse.com/security/cve/CVE-2016-10087/" source="CVE"/>
		<reference ref_id="CVE-2016-5735" ref_url="https://www.suse.com/security/cve/CVE-2016-5735/" source="CVE"/>
		<reference ref_id="CVE-2017-12652" ref_url="https://www.suse.com/security/cve/CVE-2017-12652/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<description>
These are all security issues fixed in the libpng16-16-1.6.34-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10087/">CVE-2016-10087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5735/">CVE-2016-5735</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12652/">CVE-2017-12652</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482352" comment="libpng16-16-1.6.34-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482353" comment="libpng16-16-32bit-1.6.34-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482354" comment="libpng16-compat-devel-1.6.34-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482355" comment="libpng16-devel-1.6.34-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109518" version="1" class="patch">
	<metadata>
		<title>libpolkit0-0.116-1.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3218" ref_url="https://www.suse.com/security/cve/CVE-2015-3218/" source="CVE"/>
		<reference ref_id="CVE-2015-3255" ref_url="https://www.suse.com/security/cve/CVE-2015-3255/" source="CVE"/>
		<reference ref_id="CVE-2015-3256" ref_url="https://www.suse.com/security/cve/CVE-2015-3256/" source="CVE"/>
		<reference ref_id="CVE-2015-4625" ref_url="https://www.suse.com/security/cve/CVE-2015-4625/" source="CVE"/>
		<reference ref_id="CVE-2018-1116" ref_url="https://www.suse.com/security/cve/CVE-2018-1116/" source="CVE"/>
		<reference ref_id="CVE-2018-19788" ref_url="https://www.suse.com/security/cve/CVE-2018-19788/" source="CVE"/>
		<reference ref_id="CVE-2019-6133" ref_url="https://www.suse.com/security/cve/CVE-2019-6133/" source="CVE"/>
		<description>
These are all security issues fixed in the libpolkit0-0.116-1.51 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3218/">CVE-2015-3218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3255/">CVE-2015-3255</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3256/">CVE-2015-3256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4625/">CVE-2015-4625</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1116/">CVE-2018-1116</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19788/">CVE-2018-19788</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6133/">CVE-2019-6133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482356" comment="libpolkit0-0.116-1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482357" comment="polkit-0.116-1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482358" comment="polkit-devel-0.116-1.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482359" comment="typelib-1_0-Polkit-1_0-0.116-1.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109519" version="1" class="patch">
	<metadata>
		<title>libpoppler-cpp0-0.79.0-1.89 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler-cpp0-0.79.0-1.89 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482360" comment="libpoppler-cpp0-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482361" comment="libpoppler-devel-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482362" comment="libpoppler-glib-devel-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482363" comment="libpoppler-glib8-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482364" comment="libpoppler89-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482365" comment="poppler-tools-0.79.0-1.89 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482366" comment="typelib-1_0-Poppler-0_18-0.79.0-1.89 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109520" version="1" class="patch">
	<metadata>
		<title>libpq5-12.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
These are all security issues fixed in the libpq5-12.2-6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482367" comment="libpq5-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482368" comment="postgresql12-12.2-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109521" version="1" class="patch">
	<metadata>
		<title>libprocps7-3.3.15-7.10.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1122" ref_url="https://www.suse.com/security/cve/CVE-2018-1122/" source="CVE"/>
		<reference ref_id="CVE-2018-1123" ref_url="https://www.suse.com/security/cve/CVE-2018-1123/" source="CVE"/>
		<reference ref_id="CVE-2018-1124" ref_url="https://www.suse.com/security/cve/CVE-2018-1124/" source="CVE"/>
		<reference ref_id="CVE-2018-1125" ref_url="https://www.suse.com/security/cve/CVE-2018-1125/" source="CVE"/>
		<reference ref_id="CVE-2018-1126" ref_url="https://www.suse.com/security/cve/CVE-2018-1126/" source="CVE"/>
		<description>
These are all security issues fixed in the libprocps7-3.3.15-7.10.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1122/">CVE-2018-1122</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1123/">CVE-2018-1123</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1124/">CVE-2018-1124</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1125/">CVE-2018-1125</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1126/">CVE-2018-1126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482369" comment="libprocps7-3.3.15-7.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482370" comment="procps-3.3.15-7.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482371" comment="procps-devel-3.3.15-7.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109522" version="1" class="patch">
	<metadata>
		<title>libproxy-devel-0.4.15-2.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy-devel-0.4.15-2.15 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480691" comment="libproxy-devel-0.4.15-2.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480692" comment="libproxy1-0.4.15-2.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109523" version="1" class="patch">
	<metadata>
		<title>libpython2_7-1_0-2.7.17-7.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython2_7-1_0-2.7.17-7.38.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482372" comment="libpython2_7-1_0-2.7.17-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482373" comment="python-2.7.17-7.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482374" comment="python-base-2.7.17-7.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109524" version="1" class="patch">
	<metadata>
		<title>libpython3_6m1_0-3.6.10-3.53.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
These are all security issues fixed in the libpython3_6m1_0-3.6.10-3.53.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482375" comment="libpython3_6m1_0-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482376" comment="python3-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482377" comment="python3-base-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482378" comment="python3-curses-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482379" comment="python3-dbm-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482380" comment="python3-devel-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482381" comment="python3-idle-3.6.10-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482382" comment="python3-tk-3.6.10-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109525" version="1" class="patch">
	<metadata>
		<title>libqpdf26-9.0.2-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-11624" ref_url="https://www.suse.com/security/cve/CVE-2017-11624/" source="CVE"/>
		<reference ref_id="CVE-2017-11625" ref_url="https://www.suse.com/security/cve/CVE-2017-11625/" source="CVE"/>
		<reference ref_id="CVE-2017-11626" ref_url="https://www.suse.com/security/cve/CVE-2017-11626/" source="CVE"/>
		<reference ref_id="CVE-2017-11627" ref_url="https://www.suse.com/security/cve/CVE-2017-11627/" source="CVE"/>
		<reference ref_id="CVE-2017-12595" ref_url="https://www.suse.com/security/cve/CVE-2017-12595/" source="CVE"/>
		<reference ref_id="CVE-2017-9208" ref_url="https://www.suse.com/security/cve/CVE-2017-9208/" source="CVE"/>
		<reference ref_id="CVE-2017-9209" ref_url="https://www.suse.com/security/cve/CVE-2017-9209/" source="CVE"/>
		<reference ref_id="CVE-2017-9210" ref_url="https://www.suse.com/security/cve/CVE-2017-9210/" source="CVE"/>
		<description>
These are all security issues fixed in the libqpdf26-9.0.2-1.36 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11624/">CVE-2017-11624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11625/">CVE-2017-11625</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11626/">CVE-2017-11626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11627/">CVE-2017-11627</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12595/">CVE-2017-12595</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9208/">CVE-2017-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9209/">CVE-2017-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9210/">CVE-2017-9210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482383" comment="libqpdf26-9.0.2-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482384" comment="qpdf-9.0.2-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482385" comment="qpdf-devel-9.0.2-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109526" version="1" class="patch">
	<metadata>
		<title>librrd8-1.7.0-4.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2131" ref_url="https://www.suse.com/security/cve/CVE-2013-2131/" source="CVE"/>
		<description>
These are all security issues fixed in the librrd8-1.7.0-4.34 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2131/">CVE-2013-2131</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480707" comment="librrd8-1.7.0-4.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482386" comment="perl-rrdtool-1.7.0-4.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480708" comment="rrdtool-1.7.0-4.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480709" comment="rrdtool-devel-1.7.0-4.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109527" version="1" class="patch">
	<metadata>
		<title>librsync-devel-1.0.0-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<description>
These are all security issues fixed in the librsync-devel-1.0.0-1.27 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480710" comment="librsync-devel-1.0.0-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480711" comment="librsync2-1.0.0-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109528" version="1" class="patch">
	<metadata>
		<title>libruby2_5-2_5-2.5.8-4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-6708" ref_url="https://www.suse.com/security/cve/CVE-2012-6708/" source="CVE"/>
		<reference ref_id="CVE-2015-9251" ref_url="https://www.suse.com/security/cve/CVE-2015-9251/" source="CVE"/>
		<reference ref_id="CVE-2017-17742" ref_url="https://www.suse.com/security/cve/CVE-2017-17742/" source="CVE"/>
		<reference ref_id="CVE-2018-1000073" ref_url="https://www.suse.com/security/cve/CVE-2018-1000073/" source="CVE"/>
		<reference ref_id="CVE-2018-1000074" ref_url="https://www.suse.com/security/cve/CVE-2018-1000074/" source="CVE"/>
		<reference ref_id="CVE-2018-1000075" ref_url="https://www.suse.com/security/cve/CVE-2018-1000075/" source="CVE"/>
		<reference ref_id="CVE-2018-1000076" ref_url="https://www.suse.com/security/cve/CVE-2018-1000076/" source="CVE"/>
		<reference ref_id="CVE-2018-1000077" ref_url="https://www.suse.com/security/cve/CVE-2018-1000077/" source="CVE"/>
		<reference ref_id="CVE-2018-1000078" ref_url="https://www.suse.com/security/cve/CVE-2018-1000078/" source="CVE"/>
		<reference ref_id="CVE-2018-1000079" ref_url="https://www.suse.com/security/cve/CVE-2018-1000079/" source="CVE"/>
		<reference ref_id="CVE-2018-16395" ref_url="https://www.suse.com/security/cve/CVE-2018-16395/" source="CVE"/>
		<reference ref_id="CVE-2018-16396" ref_url="https://www.suse.com/security/cve/CVE-2018-16396/" source="CVE"/>
		<reference ref_id="CVE-2018-6914" ref_url="https://www.suse.com/security/cve/CVE-2018-6914/" source="CVE"/>
		<reference ref_id="CVE-2018-8777" ref_url="https://www.suse.com/security/cve/CVE-2018-8777/" source="CVE"/>
		<reference ref_id="CVE-2018-8778" ref_url="https://www.suse.com/security/cve/CVE-2018-8778/" source="CVE"/>
		<reference ref_id="CVE-2018-8779" ref_url="https://www.suse.com/security/cve/CVE-2018-8779/" source="CVE"/>
		<reference ref_id="CVE-2018-8780" ref_url="https://www.suse.com/security/cve/CVE-2018-8780/" source="CVE"/>
		<reference ref_id="CVE-2019-15845" ref_url="https://www.suse.com/security/cve/CVE-2019-15845/" source="CVE"/>
		<reference ref_id="CVE-2019-16201" ref_url="https://www.suse.com/security/cve/CVE-2019-16201/" source="CVE"/>
		<reference ref_id="CVE-2019-16254" ref_url="https://www.suse.com/security/cve/CVE-2019-16254/" source="CVE"/>
		<reference ref_id="CVE-2019-16255" ref_url="https://www.suse.com/security/cve/CVE-2019-16255/" source="CVE"/>
		<reference ref_id="CVE-2019-8320" ref_url="https://www.suse.com/security/cve/CVE-2019-8320/" source="CVE"/>
		<reference ref_id="CVE-2019-8321" ref_url="https://www.suse.com/security/cve/CVE-2019-8321/" source="CVE"/>
		<reference ref_id="CVE-2019-8322" ref_url="https://www.suse.com/security/cve/CVE-2019-8322/" source="CVE"/>
		<reference ref_id="CVE-2019-8323" ref_url="https://www.suse.com/security/cve/CVE-2019-8323/" source="CVE"/>
		<reference ref_id="CVE-2019-8324" ref_url="https://www.suse.com/security/cve/CVE-2019-8324/" source="CVE"/>
		<reference ref_id="CVE-2019-8325" ref_url="https://www.suse.com/security/cve/CVE-2019-8325/" source="CVE"/>
		<reference ref_id="CVE-2020-10663" ref_url="https://www.suse.com/security/cve/CVE-2020-10663/" source="CVE"/>
		<reference ref_id="CVE-2020-10933" ref_url="https://www.suse.com/security/cve/CVE-2020-10933/" source="CVE"/>
		<reference ref_id="CVE-2020-8130" ref_url="https://www.suse.com/security/cve/CVE-2020-8130/" source="CVE"/>
		<description>
These are all security issues fixed in the libruby2_5-2_5-2.5.8-4.11.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2012-6708/">CVE-2012-6708</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-9251/">CVE-2015-9251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17742/">CVE-2017-17742</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000073/">CVE-2018-1000073</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000074/">CVE-2018-1000074</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000075/">CVE-2018-1000075</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000076/">CVE-2018-1000076</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000077/">CVE-2018-1000077</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000078/">CVE-2018-1000078</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000079/">CVE-2018-1000079</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16395/">CVE-2018-16395</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16396/">CVE-2018-16396</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6914/">CVE-2018-6914</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8777/">CVE-2018-8777</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8778/">CVE-2018-8778</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8779/">CVE-2018-8779</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8780/">CVE-2018-8780</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15845/">CVE-2019-15845</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16201/">CVE-2019-16201</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16254/">CVE-2019-16254</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-16255/">CVE-2019-16255</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8320/">CVE-2019-8320</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8321/">CVE-2019-8321</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8322/">CVE-2019-8322</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8323/">CVE-2019-8323</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8324/">CVE-2019-8324</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8325/">CVE-2019-8325</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10663/">CVE-2020-10663</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10933/">CVE-2020-10933</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8130/">CVE-2020-8130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482387" comment="libruby2_5-2_5-2.5.8-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482388" comment="ruby2.5-2.5.8-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482389" comment="ruby2.5-devel-2.5.8-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482390" comment="ruby2.5-devel-extra-2.5.8-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482391" comment="ruby2.5-stdlib-2.5.8-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109529" version="1" class="patch">
	<metadata>
		<title>libseccomp-devel-2.4.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-9893" ref_url="https://www.suse.com/security/cve/CVE-2019-9893/" source="CVE"/>
		<description>
These are all security issues fixed in the libseccomp-devel-2.4.1-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9893/">CVE-2019-9893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482392" comment="libseccomp-devel-2.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482393" comment="libseccomp2-2.4.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482394" comment="libseccomp2-32bit-2.4.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109530" version="1" class="patch">
	<metadata>
		<title>libserf-1-1-1.3.9-2.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3504" ref_url="https://www.suse.com/security/cve/CVE-2014-3504/" source="CVE"/>
		<description>
These are all security issues fixed in the libserf-1-1-1.3.9-2.31 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3504/">CVE-2014-3504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480712" comment="libserf-1-1-1.3.9-2.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480713" comment="libserf-devel-1.3.9-2.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109531" version="1" class="patch">
	<metadata>
		<title>libsha1detectcoll-devel-1.0.3-2.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<description>
These are all security issues fixed in the libsha1detectcoll-devel-1.0.3-2.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480714" comment="libsha1detectcoll-devel-1.0.3-2.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480715" comment="libsha1detectcoll1-1.0.3-2.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109532" version="1" class="patch">
	<metadata>
		<title>libsmi-0.4.8-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-0.4.8-1.29 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480716" comment="libsmi-0.4.8-1.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480717" comment="libsmi2-0.4.8-1.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109533" version="1" class="patch">
	<metadata>
		<title>libsndfile-devel-1.0.28-5.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-0186" ref_url="https://www.suse.com/security/cve/CVE-2009-0186/" source="CVE"/>
		<reference ref_id="CVE-2011-2696" ref_url="https://www.suse.com/security/cve/CVE-2011-2696/" source="CVE"/>
		<reference ref_id="CVE-2014-9496" ref_url="https://www.suse.com/security/cve/CVE-2014-9496/" source="CVE"/>
		<reference ref_id="CVE-2014-9756" ref_url="https://www.suse.com/security/cve/CVE-2014-9756/" source="CVE"/>
		<reference ref_id="CVE-2015-7805" ref_url="https://www.suse.com/security/cve/CVE-2015-7805/" source="CVE"/>
		<reference ref_id="CVE-2015-8075" ref_url="https://www.suse.com/security/cve/CVE-2015-8075/" source="CVE"/>
		<reference ref_id="CVE-2017-12562" ref_url="https://www.suse.com/security/cve/CVE-2017-12562/" source="CVE"/>
		<reference ref_id="CVE-2017-14245" ref_url="https://www.suse.com/security/cve/CVE-2017-14245/" source="CVE"/>
		<reference ref_id="CVE-2017-14246" ref_url="https://www.suse.com/security/cve/CVE-2017-14246/" source="CVE"/>
		<reference ref_id="CVE-2017-14634" ref_url="https://www.suse.com/security/cve/CVE-2017-14634/" source="CVE"/>
		<reference ref_id="CVE-2017-17456" ref_url="https://www.suse.com/security/cve/CVE-2017-17456/" source="CVE"/>
		<reference ref_id="CVE-2017-17457" ref_url="https://www.suse.com/security/cve/CVE-2017-17457/" source="CVE"/>
		<reference ref_id="CVE-2017-6892" ref_url="https://www.suse.com/security/cve/CVE-2017-6892/" source="CVE"/>
		<reference ref_id="CVE-2017-7585" ref_url="https://www.suse.com/security/cve/CVE-2017-7585/" source="CVE"/>
		<reference ref_id="CVE-2017-7586" ref_url="https://www.suse.com/security/cve/CVE-2017-7586/" source="CVE"/>
		<reference ref_id="CVE-2017-8361" ref_url="https://www.suse.com/security/cve/CVE-2017-8361/" source="CVE"/>
		<reference ref_id="CVE-2017-8362" ref_url="https://www.suse.com/security/cve/CVE-2017-8362/" source="CVE"/>
		<reference ref_id="CVE-2017-8363" ref_url="https://www.suse.com/security/cve/CVE-2017-8363/" source="CVE"/>
		<reference ref_id="CVE-2017-8365" ref_url="https://www.suse.com/security/cve/CVE-2017-8365/" source="CVE"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<description>
These are all security issues fixed in the libsndfile-devel-1.0.28-5.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-0186/">CVE-2009-0186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2696/">CVE-2011-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9496/">CVE-2014-9496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9756/">CVE-2014-9756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7805/">CVE-2015-7805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8075/">CVE-2015-8075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12562/">CVE-2017-12562</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14245/">CVE-2017-14245</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14246/">CVE-2017-14246</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14634/">CVE-2017-14634</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17456/">CVE-2017-17456</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17457/">CVE-2017-17457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6892/">CVE-2017-6892</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7585/">CVE-2017-7585</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7586/">CVE-2017-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8361/">CVE-2017-8361</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8362/">CVE-2017-8362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8363/">CVE-2017-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8365/">CVE-2017-8365</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481480" comment="libsndfile-devel-1.0.28-5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481481" comment="libsndfile1-1.0.28-5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109534" version="1" class="patch">
	<metadata>
		<title>libsnmp30-5.7.3-8.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5621" ref_url="https://www.suse.com/security/cve/CVE-2015-5621/" source="CVE"/>
		<description>
These are all security issues fixed in the libsnmp30-5.7.3-8.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5621/">CVE-2015-5621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481482" comment="libsnmp30-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481483" comment="net-snmp-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481484" comment="net-snmp-devel-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481485" comment="perl-SNMP-5.7.3-8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481486" comment="snmp-mibs-5.7.3-8.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109535" version="1" class="patch">
	<metadata>
		<title>libsolv-devel-0.7.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
These are all security issues fixed in the libsolv-devel-0.7.14-1.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482395" comment="libsolv-devel-0.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482396" comment="libsolv-tools-0.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482397" comment="python3-solv-0.7.14-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482398" comment="ruby-solv-0.7.14-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109536" version="1" class="patch">
	<metadata>
		<title>libsoup-2_4-1-2.68.3-2.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-2_4-1-2.68.3-2.32 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482399" comment="libsoup-2_4-1-2.68.3-2.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482400" comment="libsoup-lang-2.68.3-2.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109537" version="1" class="patch">
	<metadata>
		<title>libspice-client-glib-2_0-8-0.37-1.92 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-client-glib-2_0-8-0.37-1.92 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482401" comment="libspice-client-glib-2_0-8-0.37-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482402" comment="libspice-client-glib-helper-0.37-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482403" comment="libspice-client-gtk-3_0-5-0.37-1.92 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109538" version="1" class="patch">
	<metadata>
		<title>libsqlite3-0-3.28.0-3.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-20346" ref_url="https://www.suse.com/security/cve/CVE-2018-20346/" source="CVE"/>
		<reference ref_id="CVE-2018-8740" ref_url="https://www.suse.com/security/cve/CVE-2018-8740/" source="CVE"/>
		<reference ref_id="CVE-2019-16168" ref_url="https://www.suse.com/security/cve/CVE-2019-16168/" source="CVE"/>
		<reference ref_id="CVE-2019-9936" ref_url="https://www.suse.com/security/cve/CVE-2019-9936/" source="CVE"/>
		<reference ref_id="CVE-2019-9937" ref_url="https://www.suse.com/security/cve/CVE-2019-9937/" source="CVE"/>
		<description>
These are all security issues fixed in the libsqlite3-0-3.28.0-3.9.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20346/">CVE-2018-20346</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8740/">CVE-2018-8740</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16168/">CVE-2019-16168</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9936/">CVE-2019-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9937/">CVE-2019-9937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482404" comment="libsqlite3-0-3.28.0-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482405" comment="libsqlite3-0-32bit-3.28.0-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482406" comment="sqlite3-3.28.0-3.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482407" comment="sqlite3-devel-3.28.0-3.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109539" version="1" class="patch">
	<metadata>
		<title>libssh-devel-0.8.7-10.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8132" ref_url="https://www.suse.com/security/cve/CVE-2014-8132/" source="CVE"/>
		<reference ref_id="CVE-2015-3146" ref_url="https://www.suse.com/security/cve/CVE-2015-3146/" source="CVE"/>
		<reference ref_id="CVE-2018-10933" ref_url="https://www.suse.com/security/cve/CVE-2018-10933/" source="CVE"/>
		<reference ref_id="CVE-2019-14889" ref_url="https://www.suse.com/security/cve/CVE-2019-14889/" source="CVE"/>
		<reference ref_id="CVE-2020-1730" ref_url="https://www.suse.com/security/cve/CVE-2020-1730/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh-devel-0.8.7-10.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8132/">CVE-2014-8132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3146/">CVE-2015-3146</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10933/">CVE-2018-10933</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14889/">CVE-2019-14889</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-1730/">CVE-2020-1730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482408" comment="libssh-devel-0.8.7-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482409" comment="libssh4-0.8.7-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482410" comment="libssh4-32bit-0.8.7-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109540" version="1" class="patch">
	<metadata>
		<title>libssh2-1-1.8.0-4.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1782" ref_url="https://www.suse.com/security/cve/CVE-2015-1782/" source="CVE"/>
		<reference ref_id="CVE-2016-0787" ref_url="https://www.suse.com/security/cve/CVE-2016-0787/" source="CVE"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<description>
These are all security issues fixed in the libssh2-1-1.8.0-4.10.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1782/">CVE-2015-1782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0787/">CVE-2016-0787</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482411" comment="libssh2-1-1.8.0-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482412" comment="libssh2-devel-1.8.0-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109541" version="1" class="patch">
	<metadata>
		<title>libsystemd0-234-24.49.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7510" ref_url="https://www.suse.com/security/cve/CVE-2015-7510/" source="CVE"/>
		<reference ref_id="CVE-2016-10156" ref_url="https://www.suse.com/security/cve/CVE-2016-10156/" source="CVE"/>
		<reference ref_id="CVE-2017-15908" ref_url="https://www.suse.com/security/cve/CVE-2017-15908/" source="CVE"/>
		<reference ref_id="CVE-2017-18078" ref_url="https://www.suse.com/security/cve/CVE-2017-18078/" source="CVE"/>
		<reference ref_id="CVE-2017-9445" ref_url="https://www.suse.com/security/cve/CVE-2017-9445/" source="CVE"/>
		<reference ref_id="CVE-2018-15686" ref_url="https://www.suse.com/security/cve/CVE-2018-15686/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<reference ref_id="CVE-2018-16864" ref_url="https://www.suse.com/security/cve/CVE-2018-16864/" source="CVE"/>
		<reference ref_id="CVE-2018-16865" ref_url="https://www.suse.com/security/cve/CVE-2018-16865/" source="CVE"/>
		<reference ref_id="CVE-2018-6954" ref_url="https://www.suse.com/security/cve/CVE-2018-6954/" source="CVE"/>
		<reference ref_id="CVE-2019-20386" ref_url="https://www.suse.com/security/cve/CVE-2019-20386/" source="CVE"/>
		<reference ref_id="CVE-2019-3842" ref_url="https://www.suse.com/security/cve/CVE-2019-3842/" source="CVE"/>
		<reference ref_id="CVE-2019-3843" ref_url="https://www.suse.com/security/cve/CVE-2019-3843/" source="CVE"/>
		<reference ref_id="CVE-2019-3844" ref_url="https://www.suse.com/security/cve/CVE-2019-3844/" source="CVE"/>
		<reference ref_id="CVE-2019-6454" ref_url="https://www.suse.com/security/cve/CVE-2019-6454/" source="CVE"/>
		<reference ref_id="CVE-2020-1712" ref_url="https://www.suse.com/security/cve/CVE-2020-1712/" source="CVE"/>
		<description>
These are all security issues fixed in the libsystemd0-234-24.49.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7510/">CVE-2015-7510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10156/">CVE-2016-10156</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15908/">CVE-2017-15908</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18078/">CVE-2017-18078</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9445/">CVE-2017-9445</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15686/">CVE-2018-15686</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16864/">CVE-2018-16864</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16865/">CVE-2018-16865</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-6954/">CVE-2018-6954</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20386/">CVE-2019-20386</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3842/">CVE-2019-3842</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3843/">CVE-2019-3843</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3844/">CVE-2019-3844</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6454/">CVE-2019-6454</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1712/">CVE-2020-1712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482413" comment="libsystemd0-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482414" comment="libsystemd0-32bit-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482415" comment="libudev-devel-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482416" comment="libudev1-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482417" comment="libudev1-32bit-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482418" comment="systemd-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482419" comment="systemd-32bit-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482420" comment="systemd-bash-completion-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482421" comment="systemd-container-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482422" comment="systemd-coredump-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482423" comment="systemd-devel-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482424" comment="systemd-sysvinit-234-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482425" comment="udev-234-24.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109542" version="1" class="patch">
	<metadata>
		<title>libtag1-1.11.1-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678/" source="CVE"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag1-1.11.1-4.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482426" comment="libtag1-1.11.1-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109543" version="1" class="patch">
	<metadata>
		<title>libtasn1-4.13-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2806" ref_url="https://www.suse.com/security/cve/CVE-2015-2806/" source="CVE"/>
		<reference ref_id="CVE-2015-3622" ref_url="https://www.suse.com/security/cve/CVE-2015-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-4008" ref_url="https://www.suse.com/security/cve/CVE-2016-4008/" source="CVE"/>
		<reference ref_id="CVE-2018-1000654" ref_url="https://www.suse.com/security/cve/CVE-2018-1000654/" source="CVE"/>
		<reference ref_id="CVE-2018-6003" ref_url="https://www.suse.com/security/cve/CVE-2018-6003/" source="CVE"/>
		<description>
These are all security issues fixed in the libtasn1-4.13-4.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2806/">CVE-2015-2806</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3622/">CVE-2015-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4008/">CVE-2016-4008</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000654/">CVE-2018-1000654</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6003/">CVE-2018-6003</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482427" comment="libtasn1-4.13-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482428" comment="libtasn1-6-4.13-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482429" comment="libtasn1-6-32bit-4.13-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482430" comment="libtasn1-devel-4.13-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109544" version="1" class="patch">
	<metadata>
		<title>libthai-data-0.1.27-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai-data-0.1.27-1.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480757" comment="libthai-data-0.1.27-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482431" comment="libthai-devel-0.1.27-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480758" comment="libthai0-0.1.27-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109545" version="1" class="patch">
	<metadata>
		<title>libtidy5-5.4.0-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="CVE-2016-6583" ref_url="https://www.suse.com/security/cve/CVE-2016-6583/" source="CVE"/>
		<description>
These are all security issues fixed in the libtidy5-5.4.0-3.2.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6583/">CVE-2016-6583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482432" comment="libtidy5-5.4.0-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109546" version="1" class="patch">
	<metadata>
		<title>libtiff-devel-4.0.9-5.27.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff-devel-4.0.9-5.27.5 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481518" comment="libtiff-devel-4.0.9-5.27.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481519" comment="libtiff5-4.0.9-5.27.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109547" version="1" class="patch">
	<metadata>
		<title>libtspi1-0.3.14-6.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-18898" ref_url="https://www.suse.com/security/cve/CVE-2019-18898/" source="CVE"/>
		<description>
These are all security issues fixed in the libtspi1-0.3.14-6.6.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18898/">CVE-2019-18898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482433" comment="libtspi1-0.3.14-6.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482434" comment="trousers-0.3.14-6.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482435" comment="trousers-devel-0.3.14-6.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109548" version="1" class="patch">
	<metadata>
		<title>libu2f-host-devel-1.1.6-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340/" source="CVE"/>
		<reference ref_id="CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578/" source="CVE"/>
		<description>
These are all security issues fixed in the libu2f-host-devel-1.1.6-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482436" comment="libu2f-host-devel-1.1.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482437" comment="libu2f-host0-1.1.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109549" version="1" class="patch">
	<metadata>
		<title>libudisks2-0-2.8.1-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-17336" ref_url="https://www.suse.com/security/cve/CVE-2018-17336/" source="CVE"/>
		<description>
These are all security issues fixed in the libudisks2-0-2.8.1-1.39 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-17336/">CVE-2018-17336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482438" comment="libudisks2-0-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482439" comment="libudisks2-0-devel-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482440" comment="typelib-1_0-UDisks-2_0-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482441" comment="udisks2-2.8.1-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482442" comment="udisks2-lang-2.8.1-1.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109550" version="1" class="patch">
	<metadata>
		<title>libunbound2-1.6.8-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8602" ref_url="https://www.suse.com/security/cve/CVE-2014-8602/" source="CVE"/>
		<reference ref_id="CVE-2017-15105" ref_url="https://www.suse.com/security/cve/CVE-2017-15105/" source="CVE"/>
		<description>
These are all security issues fixed in the libunbound2-1.6.8-8.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8602/">CVE-2014-8602</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15105/">CVE-2017-15105</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481525" comment="libunbound2-1.6.8-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481526" comment="unbound-anchor-1.6.8-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481527" comment="unbound-devel-1.6.8-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109551" version="1" class="patch">
	<metadata>
		<title>libunwind-1.2.1-2.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3239" ref_url="https://www.suse.com/security/cve/CVE-2015-3239/" source="CVE"/>
		<description>
These are all security issues fixed in the libunwind-1.2.1-2.13 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2015-3239/">CVE-2015-3239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480769" comment="libunwind-1.2.1-2.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480770" comment="libunwind-devel-1.2.1-2.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109552" version="1" class="patch">
	<metadata>
		<title>libupsclient1-2.7.4-4.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the libupsclient1-2.7.4-4.72 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482443" comment="libupsclient1-2.7.4-4.72 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109553" version="1" class="patch">
	<metadata>
		<title>libvirt-libs-6.0.0-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-libs-6.0.0-11.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482444" comment="libvirt-libs-6.0.0-11.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109554" version="1" class="patch">
	<metadata>
		<title>libvmtools-devel-11.1.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the libvmtools-devel-11.1.0-2.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482445" comment="libvmtools-devel-11.1.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482446" comment="libvmtools0-11.1.0-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482447" comment="open-vm-tools-11.1.0-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109555" version="1" class="patch">
	<metadata>
		<title>libvorbis-devel-1.3.6-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2008-1420" ref_url="https://www.suse.com/security/cve/CVE-2008-1420/" source="CVE"/>
		<reference ref_id="CVE-2009-3379" ref_url="https://www.suse.com/security/cve/CVE-2009-3379/" source="CVE"/>
		<reference ref_id="CVE-2012-0444" ref_url="https://www.suse.com/security/cve/CVE-2012-0444/" source="CVE"/>
		<reference ref_id="CVE-2017-14160" ref_url="https://www.suse.com/security/cve/CVE-2017-14160/" source="CVE"/>
		<reference ref_id="CVE-2017-14632" ref_url="https://www.suse.com/security/cve/CVE-2017-14632/" source="CVE"/>
		<reference ref_id="CVE-2017-14633" ref_url="https://www.suse.com/security/cve/CVE-2017-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-10392" ref_url="https://www.suse.com/security/cve/CVE-2018-10392/" source="CVE"/>
		<reference ref_id="CVE-2018-10393" ref_url="https://www.suse.com/security/cve/CVE-2018-10393/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<description>
These are all security issues fixed in the libvorbis-devel-1.3.6-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2008-1420/">CVE-2008-1420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3379/">CVE-2009-3379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0444/">CVE-2012-0444</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14160/">CVE-2017-14160</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14632/">CVE-2017-14632</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14633/">CVE-2017-14633</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10392/">CVE-2018-10392</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10393/">CVE-2018-10393</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481532" comment="libvorbis-devel-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481533" comment="libvorbis0-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481534" comment="libvorbisenc2-1.3.6-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481535" comment="libvorbisfile3-1.3.6-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109556" version="1" class="patch">
	<metadata>
		<title>libvpx4-1.6.1-6.6.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621/" source="CVE"/>
		<reference ref_id="CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464/" source="CVE"/>
		<reference ref_id="CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641/" source="CVE"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx4-1.6.1-6.6.8 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482448" comment="libvpx4-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109557" version="1" class="patch">
	<metadata>
		<title>libwavpack1-5.1.0-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the libwavpack1-5.1.0-4.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482449" comment="libwavpack1-5.1.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109558" version="1" class="patch">
	<metadata>
		<title>libwebp7-1.0.3-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8888" ref_url="https://www.suse.com/security/cve/CVE-2016-8888/" source="CVE"/>
		<reference ref_id="CVE-2016-9085" ref_url="https://www.suse.com/security/cve/CVE-2016-9085/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebp7-1.0.3-1.62 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8888/">CVE-2016-8888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9085/">CVE-2016-9085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482450" comment="libwebp7-1.0.3-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482451" comment="libwebpdemux2-1.0.3-1.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109559" version="1" class="patch">
	<metadata>
		<title>libwireshark13-3.2.2-3.35.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192/" source="CVE"/>
		<reference ref_id="CVE-2015-3808" ref_url="https://www.suse.com/security/cve/CVE-2015-3808/" source="CVE"/>
		<reference ref_id="CVE-2015-3809" ref_url="https://www.suse.com/security/cve/CVE-2015-3809/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-3815" ref_url="https://www.suse.com/security/cve/CVE-2015-3815/" source="CVE"/>
		<reference ref_id="CVE-2015-4651" ref_url="https://www.suse.com/security/cve/CVE-2015-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2015-8734" ref_url="https://www.suse.com/security/cve/CVE-2015-8734/" source="CVE"/>
		<reference ref_id="CVE-2015-8735" ref_url="https://www.suse.com/security/cve/CVE-2015-8735/" source="CVE"/>
		<reference ref_id="CVE-2015-8736" ref_url="https://www.suse.com/security/cve/CVE-2015-8736/" source="CVE"/>
		<reference ref_id="CVE-2015-8737" ref_url="https://www.suse.com/security/cve/CVE-2015-8737/" source="CVE"/>
		<reference ref_id="CVE-2015-8738" ref_url="https://www.suse.com/security/cve/CVE-2015-8738/" source="CVE"/>
		<reference ref_id="CVE-2015-8739" ref_url="https://www.suse.com/security/cve/CVE-2015-8739/" source="CVE"/>
		<reference ref_id="CVE-2015-8740" ref_url="https://www.suse.com/security/cve/CVE-2015-8740/" source="CVE"/>
		<reference ref_id="CVE-2015-8741" ref_url="https://www.suse.com/security/cve/CVE-2015-8741/" source="CVE"/>
		<reference ref_id="CVE-2015-8742" ref_url="https://www.suse.com/security/cve/CVE-2015-8742/" source="CVE"/>
		<reference ref_id="CVE-2016-2522" ref_url="https://www.suse.com/security/cve/CVE-2016-2522/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2524" ref_url="https://www.suse.com/security/cve/CVE-2016-2524/" source="CVE"/>
		<reference ref_id="CVE-2016-2525" ref_url="https://www.suse.com/security/cve/CVE-2016-2525/" source="CVE"/>
		<reference ref_id="CVE-2016-2526" ref_url="https://www.suse.com/security/cve/CVE-2016-2526/" source="CVE"/>
		<reference ref_id="CVE-2016-2527" ref_url="https://www.suse.com/security/cve/CVE-2016-2527/" source="CVE"/>
		<reference ref_id="CVE-2016-2528" ref_url="https://www.suse.com/security/cve/CVE-2016-2528/" source="CVE"/>
		<reference ref_id="CVE-2016-2529" ref_url="https://www.suse.com/security/cve/CVE-2016-2529/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512/" source="CVE"/>
		<reference ref_id="CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9372" ref_url="https://www.suse.com/security/cve/CVE-2016-9372/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15189" ref_url="https://www.suse.com/security/cve/CVE-2017-15189/" source="CVE"/>
		<reference ref_id="CVE-2017-15190" ref_url="https://www.suse.com/security/cve/CVE-2017-15190/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6467" ref_url="https://www.suse.com/security/cve/CVE-2017-6467/" source="CVE"/>
		<reference ref_id="CVE-2017-6468" ref_url="https://www.suse.com/security/cve/CVE-2017-6468/" source="CVE"/>
		<reference ref_id="CVE-2017-6469" ref_url="https://www.suse.com/security/cve/CVE-2017-6469/" source="CVE"/>
		<reference ref_id="CVE-2017-6470" ref_url="https://www.suse.com/security/cve/CVE-2017-6470/" source="CVE"/>
		<reference ref_id="CVE-2017-6471" ref_url="https://www.suse.com/security/cve/CVE-2017-6471/" source="CVE"/>
		<reference ref_id="CVE-2017-6472" ref_url="https://www.suse.com/security/cve/CVE-2017-6472/" source="CVE"/>
		<reference ref_id="CVE-2017-6473" ref_url="https://www.suse.com/security/cve/CVE-2017-6473/" source="CVE"/>
		<reference ref_id="CVE-2017-6474" ref_url="https://www.suse.com/security/cve/CVE-2017-6474/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-18225" ref_url="https://www.suse.com/security/cve/CVE-2018-18225/" source="CVE"/>
		<reference ref_id="CVE-2018-18226" ref_url="https://www.suse.com/security/cve/CVE-2018-18226/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9257" ref_url="https://www.suse.com/security/cve/CVE-2018-9257/" source="CVE"/>
		<reference ref_id="CVE-2018-9258" ref_url="https://www.suse.com/security/cve/CVE-2018-9258/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10897" ref_url="https://www.suse.com/security/cve/CVE-2019-10897/" source="CVE"/>
		<reference ref_id="CVE-2019-10898" ref_url="https://www.suse.com/security/cve/CVE-2019-10898/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10900" ref_url="https://www.suse.com/security/cve/CVE-2019-10900/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10902" ref_url="https://www.suse.com/security/cve/CVE-2019-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319/" source="CVE"/>
		<reference ref_id="CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553/" source="CVE"/>
		<reference ref_id="CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716/" source="CVE"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044/" source="CVE"/>
		<reference ref_id="CVE-2020-9428" ref_url="https://www.suse.com/security/cve/CVE-2020-9428/" source="CVE"/>
		<reference ref_id="CVE-2020-9429" ref_url="https://www.suse.com/security/cve/CVE-2020-9429/" source="CVE"/>
		<reference ref_id="CVE-2020-9430" ref_url="https://www.suse.com/security/cve/CVE-2020-9430/" source="CVE"/>
		<reference ref_id="CVE-2020-9431" ref_url="https://www.suse.com/security/cve/CVE-2020-9431/" source="CVE"/>
		<description>
These are all security issues fixed in the libwireshark13-3.2.2-3.35.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3808/">CVE-2015-3808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3809/">CVE-2015-3809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3815/">CVE-2015-3815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4651/">CVE-2015-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8734/">CVE-2015-8734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8735/">CVE-2015-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8736/">CVE-2015-8736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8737/">CVE-2015-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8738/">CVE-2015-8738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8739/">CVE-2015-8739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8740/">CVE-2015-8740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8741/">CVE-2015-8741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8742/">CVE-2015-8742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2522/">CVE-2016-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2524/">CVE-2016-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2525/">CVE-2016-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2526/">CVE-2016-2526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2527/">CVE-2016-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2528/">CVE-2016-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2529/">CVE-2016-2529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9372/">CVE-2016-9372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15189/">CVE-2017-15189</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15190/">CVE-2017-15190</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6467/">CVE-2017-6467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6468/">CVE-2017-6468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6469/">CVE-2017-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6470/">CVE-2017-6470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6471/">CVE-2017-6471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6472/">CVE-2017-6472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6473/">CVE-2017-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6474/">CVE-2017-6474</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18225/">CVE-2018-18225</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18226/">CVE-2018-18226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9257/">CVE-2018-9257</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9258/">CVE-2018-9258</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10897/">CVE-2019-10897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10898/">CVE-2019-10898</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10900/">CVE-2019-10900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10902/">CVE-2019-10902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9428/">CVE-2020-9428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9429/">CVE-2020-9429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9430/">CVE-2020-9430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9431/">CVE-2020-9431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482452" comment="libwireshark13-3.2.2-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482453" comment="libwiretap10-3.2.2-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482454" comment="libwsutil11-3.2.2-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482455" comment="wireshark-3.2.2-3.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109560" version="1" class="patch">
	<metadata>
		<title>libwscodecs1-2.4.16-3.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192/" source="CVE"/>
		<reference ref_id="CVE-2015-3808" ref_url="https://www.suse.com/security/cve/CVE-2015-3808/" source="CVE"/>
		<reference ref_id="CVE-2015-3809" ref_url="https://www.suse.com/security/cve/CVE-2015-3809/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-3815" ref_url="https://www.suse.com/security/cve/CVE-2015-3815/" source="CVE"/>
		<reference ref_id="CVE-2015-4651" ref_url="https://www.suse.com/security/cve/CVE-2015-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2015-8734" ref_url="https://www.suse.com/security/cve/CVE-2015-8734/" source="CVE"/>
		<reference ref_id="CVE-2015-8735" ref_url="https://www.suse.com/security/cve/CVE-2015-8735/" source="CVE"/>
		<reference ref_id="CVE-2015-8736" ref_url="https://www.suse.com/security/cve/CVE-2015-8736/" source="CVE"/>
		<reference ref_id="CVE-2015-8737" ref_url="https://www.suse.com/security/cve/CVE-2015-8737/" source="CVE"/>
		<reference ref_id="CVE-2015-8738" ref_url="https://www.suse.com/security/cve/CVE-2015-8738/" source="CVE"/>
		<reference ref_id="CVE-2015-8739" ref_url="https://www.suse.com/security/cve/CVE-2015-8739/" source="CVE"/>
		<reference ref_id="CVE-2015-8740" ref_url="https://www.suse.com/security/cve/CVE-2015-8740/" source="CVE"/>
		<reference ref_id="CVE-2015-8741" ref_url="https://www.suse.com/security/cve/CVE-2015-8741/" source="CVE"/>
		<reference ref_id="CVE-2015-8742" ref_url="https://www.suse.com/security/cve/CVE-2015-8742/" source="CVE"/>
		<reference ref_id="CVE-2016-2522" ref_url="https://www.suse.com/security/cve/CVE-2016-2522/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2524" ref_url="https://www.suse.com/security/cve/CVE-2016-2524/" source="CVE"/>
		<reference ref_id="CVE-2016-2525" ref_url="https://www.suse.com/security/cve/CVE-2016-2525/" source="CVE"/>
		<reference ref_id="CVE-2016-2526" ref_url="https://www.suse.com/security/cve/CVE-2016-2526/" source="CVE"/>
		<reference ref_id="CVE-2016-2527" ref_url="https://www.suse.com/security/cve/CVE-2016-2527/" source="CVE"/>
		<reference ref_id="CVE-2016-2528" ref_url="https://www.suse.com/security/cve/CVE-2016-2528/" source="CVE"/>
		<reference ref_id="CVE-2016-2529" ref_url="https://www.suse.com/security/cve/CVE-2016-2529/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512/" source="CVE"/>
		<reference ref_id="CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9372" ref_url="https://www.suse.com/security/cve/CVE-2016-9372/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15189" ref_url="https://www.suse.com/security/cve/CVE-2017-15189/" source="CVE"/>
		<reference ref_id="CVE-2017-15190" ref_url="https://www.suse.com/security/cve/CVE-2017-15190/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6467" ref_url="https://www.suse.com/security/cve/CVE-2017-6467/" source="CVE"/>
		<reference ref_id="CVE-2017-6468" ref_url="https://www.suse.com/security/cve/CVE-2017-6468/" source="CVE"/>
		<reference ref_id="CVE-2017-6469" ref_url="https://www.suse.com/security/cve/CVE-2017-6469/" source="CVE"/>
		<reference ref_id="CVE-2017-6470" ref_url="https://www.suse.com/security/cve/CVE-2017-6470/" source="CVE"/>
		<reference ref_id="CVE-2017-6471" ref_url="https://www.suse.com/security/cve/CVE-2017-6471/" source="CVE"/>
		<reference ref_id="CVE-2017-6472" ref_url="https://www.suse.com/security/cve/CVE-2017-6472/" source="CVE"/>
		<reference ref_id="CVE-2017-6473" ref_url="https://www.suse.com/security/cve/CVE-2017-6473/" source="CVE"/>
		<reference ref_id="CVE-2017-6474" ref_url="https://www.suse.com/security/cve/CVE-2017-6474/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9257" ref_url="https://www.suse.com/security/cve/CVE-2018-9257/" source="CVE"/>
		<reference ref_id="CVE-2018-9258" ref_url="https://www.suse.com/security/cve/CVE-2018-9258/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<description>
These are all security issues fixed in the libwscodecs1-2.4.16-3.31.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3808/">CVE-2015-3808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3809/">CVE-2015-3809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3815/">CVE-2015-3815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4651/">CVE-2015-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8734/">CVE-2015-8734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8735/">CVE-2015-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8736/">CVE-2015-8736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8737/">CVE-2015-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8738/">CVE-2015-8738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8739/">CVE-2015-8739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8740/">CVE-2015-8740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8741/">CVE-2015-8741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8742/">CVE-2015-8742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2522/">CVE-2016-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2524/">CVE-2016-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2525/">CVE-2016-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2526/">CVE-2016-2526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2527/">CVE-2016-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2528/">CVE-2016-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2529/">CVE-2016-2529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9372/">CVE-2016-9372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15189/">CVE-2017-15189</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15190/">CVE-2017-15190</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6467/">CVE-2017-6467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6468/">CVE-2017-6468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6469/">CVE-2017-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6470/">CVE-2017-6470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6471/">CVE-2017-6471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6472/">CVE-2017-6472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6473/">CVE-2017-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6474/">CVE-2017-6474</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9257/">CVE-2018-9257</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9258/">CVE-2018-9258</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482456" comment="libwscodecs1-2.4.16-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482457" comment="libwsutil8-2.4.16-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109561" version="1" class="patch">
	<metadata>
		<title>libxcb-composite0-1.13-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-composite0-1.13-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481542" comment="libxcb-composite0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481543" comment="libxcb-damage0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481544" comment="libxcb-devel-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481545" comment="libxcb-devel-doc-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481546" comment="libxcb-dpms0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481547" comment="libxcb-dri2-0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481548" comment="libxcb-dri2-0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481549" comment="libxcb-dri3-0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481550" comment="libxcb-dri3-0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481551" comment="libxcb-glx0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481552" comment="libxcb-glx0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481553" comment="libxcb-present0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481554" comment="libxcb-present0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481555" comment="libxcb-randr0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481556" comment="libxcb-record0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481557" comment="libxcb-render0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481558" comment="libxcb-res0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481559" comment="libxcb-screensaver0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481560" comment="libxcb-shape0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481561" comment="libxcb-shm0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481562" comment="libxcb-sync1-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481563" comment="libxcb-sync1-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481564" comment="libxcb-xf86dri0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481565" comment="libxcb-xfixes0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481566" comment="libxcb-xfixes0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481567" comment="libxcb-xinerama0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481568" comment="libxcb-xinput0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481569" comment="libxcb-xkb1-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481570" comment="libxcb-xtest0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481571" comment="libxcb-xv0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481572" comment="libxcb-xvmc0-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481573" comment="libxcb1-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481574" comment="libxcb1-32bit-1.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109562" version="1" class="patch">
	<metadata>
		<title>libxerces-c-3_1-3.1.4-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-0729" ref_url="https://www.suse.com/security/cve/CVE-2016-0729/" source="CVE"/>
		<reference ref_id="CVE-2016-2099" ref_url="https://www.suse.com/security/cve/CVE-2016-2099/" source="CVE"/>
		<reference ref_id="CVE-2016-4463" ref_url="https://www.suse.com/security/cve/CVE-2016-4463/" source="CVE"/>
		<reference ref_id="CVE-2017-12627" ref_url="https://www.suse.com/security/cve/CVE-2017-12627/" source="CVE"/>
		<description>
These are all security issues fixed in the libxerces-c-3_1-3.1.4-8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0729/">CVE-2016-0729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2099/">CVE-2016-2099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4463/">CVE-2016-4463</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12627/">CVE-2017-12627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482458" comment="libxerces-c-3_1-3.1.4-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482459" comment="libxerces-c-devel-3.1.4-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109563" version="1" class="patch">
	<metadata>
		<title>libxkbcommon-devel-0.8.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853/" source="CVE"/>
		<reference ref_id="CVE-2018-15854" ref_url="https://www.suse.com/security/cve/CVE-2018-15854/" source="CVE"/>
		<reference ref_id="CVE-2018-15855" ref_url="https://www.suse.com/security/cve/CVE-2018-15855/" source="CVE"/>
		<reference ref_id="CVE-2018-15856" ref_url="https://www.suse.com/security/cve/CVE-2018-15856/" source="CVE"/>
		<reference ref_id="CVE-2018-15857" ref_url="https://www.suse.com/security/cve/CVE-2018-15857/" source="CVE"/>
		<reference ref_id="CVE-2018-15858" ref_url="https://www.suse.com/security/cve/CVE-2018-15858/" source="CVE"/>
		<reference ref_id="CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859/" source="CVE"/>
		<reference ref_id="CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861/" source="CVE"/>
		<reference ref_id="CVE-2018-15862" ref_url="https://www.suse.com/security/cve/CVE-2018-15862/" source="CVE"/>
		<reference ref_id="CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863/" source="CVE"/>
		<reference ref_id="CVE-2018-15864" ref_url="https://www.suse.com/security/cve/CVE-2018-15864/" source="CVE"/>
		<description>
These are all security issues fixed in the libxkbcommon-devel-0.8.2-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15854/">CVE-2018-15854</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15855/">CVE-2018-15855</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15856/">CVE-2018-15856</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15857/">CVE-2018-15857</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15858/">CVE-2018-15858</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15862/">CVE-2018-15862</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15864/">CVE-2018-15864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481577" comment="libxkbcommon-devel-0.8.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481578" comment="libxkbcommon-x11-0-0.8.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481579" comment="libxkbcommon-x11-devel-0.8.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481580" comment="libxkbcommon0-0.8.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109564" version="1" class="patch">
	<metadata>
		<title>libxml2-2-2.9.7-3.19.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0191" ref_url="https://www.suse.com/security/cve/CVE-2014-0191/" source="CVE"/>
		<reference ref_id="CVE-2014-3660" ref_url="https://www.suse.com/security/cve/CVE-2014-3660/" source="CVE"/>
		<reference ref_id="CVE-2015-1819" ref_url="https://www.suse.com/security/cve/CVE-2015-1819/" source="CVE"/>
		<reference ref_id="CVE-2015-5312" ref_url="https://www.suse.com/security/cve/CVE-2015-5312/" source="CVE"/>
		<reference ref_id="CVE-2015-7497" ref_url="https://www.suse.com/security/cve/CVE-2015-7497/" source="CVE"/>
		<reference ref_id="CVE-2015-7498" ref_url="https://www.suse.com/security/cve/CVE-2015-7498/" source="CVE"/>
		<reference ref_id="CVE-2015-7499" ref_url="https://www.suse.com/security/cve/CVE-2015-7499/" source="CVE"/>
		<reference ref_id="CVE-2015-7500" ref_url="https://www.suse.com/security/cve/CVE-2015-7500/" source="CVE"/>
		<reference ref_id="CVE-2015-7941" ref_url="https://www.suse.com/security/cve/CVE-2015-7941/" source="CVE"/>
		<reference ref_id="CVE-2015-7942" ref_url="https://www.suse.com/security/cve/CVE-2015-7942/" source="CVE"/>
		<reference ref_id="CVE-2015-8035" ref_url="https://www.suse.com/security/cve/CVE-2015-8035/" source="CVE"/>
		<reference ref_id="CVE-2015-8242" ref_url="https://www.suse.com/security/cve/CVE-2015-8242/" source="CVE"/>
		<reference ref_id="CVE-2016-1762" ref_url="https://www.suse.com/security/cve/CVE-2016-1762/" source="CVE"/>
		<reference ref_id="CVE-2016-1833" ref_url="https://www.suse.com/security/cve/CVE-2016-1833/" source="CVE"/>
		<reference ref_id="CVE-2016-1834" ref_url="https://www.suse.com/security/cve/CVE-2016-1834/" source="CVE"/>
		<reference ref_id="CVE-2016-1835" ref_url="https://www.suse.com/security/cve/CVE-2016-1835/" source="CVE"/>
		<reference ref_id="CVE-2016-1836" ref_url="https://www.suse.com/security/cve/CVE-2016-1836/" source="CVE"/>
		<reference ref_id="CVE-2016-1837" ref_url="https://www.suse.com/security/cve/CVE-2016-1837/" source="CVE"/>
		<reference ref_id="CVE-2016-1838" ref_url="https://www.suse.com/security/cve/CVE-2016-1838/" source="CVE"/>
		<reference ref_id="CVE-2016-1839" ref_url="https://www.suse.com/security/cve/CVE-2016-1839/" source="CVE"/>
		<reference ref_id="CVE-2016-1840" ref_url="https://www.suse.com/security/cve/CVE-2016-1840/" source="CVE"/>
		<reference ref_id="CVE-2016-3627" ref_url="https://www.suse.com/security/cve/CVE-2016-3627/" source="CVE"/>
		<reference ref_id="CVE-2016-3705" ref_url="https://www.suse.com/security/cve/CVE-2016-3705/" source="CVE"/>
		<reference ref_id="CVE-2016-4483" ref_url="https://www.suse.com/security/cve/CVE-2016-4483/" source="CVE"/>
		<reference ref_id="CVE-2016-4658" ref_url="https://www.suse.com/security/cve/CVE-2016-4658/" source="CVE"/>
		<reference ref_id="CVE-2017-0663" ref_url="https://www.suse.com/security/cve/CVE-2017-0663/" source="CVE"/>
		<reference ref_id="CVE-2017-18258" ref_url="https://www.suse.com/security/cve/CVE-2017-18258/" source="CVE"/>
		<reference ref_id="CVE-2017-5969" ref_url="https://www.suse.com/security/cve/CVE-2017-5969/" source="CVE"/>
		<reference ref_id="CVE-2017-9047" ref_url="https://www.suse.com/security/cve/CVE-2017-9047/" source="CVE"/>
		<reference ref_id="CVE-2017-9048" ref_url="https://www.suse.com/security/cve/CVE-2017-9048/" source="CVE"/>
		<reference ref_id="CVE-2017-9049" ref_url="https://www.suse.com/security/cve/CVE-2017-9049/" source="CVE"/>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-14567" ref_url="https://www.suse.com/security/cve/CVE-2018-14567/" source="CVE"/>
		<reference ref_id="CVE-2018-9251" ref_url="https://www.suse.com/security/cve/CVE-2018-9251/" source="CVE"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="CVE-2019-20388" ref_url="https://www.suse.com/security/cve/CVE-2019-20388/" source="CVE"/>
		<reference ref_id="CVE-2020-7595" ref_url="https://www.suse.com/security/cve/CVE-2020-7595/" source="CVE"/>
		<description>
These are all security issues fixed in the libxml2-2-2.9.7-3.19.8 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0191/">CVE-2014-0191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3660/">CVE-2014-3660</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1819/">CVE-2015-1819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5312/">CVE-2015-5312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7497/">CVE-2015-7497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7498/">CVE-2015-7498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7499/">CVE-2015-7499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7500/">CVE-2015-7500</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7941/">CVE-2015-7941</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7942/">CVE-2015-7942</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8035/">CVE-2015-8035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8242/">CVE-2015-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1762/">CVE-2016-1762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1833/">CVE-2016-1833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1834/">CVE-2016-1834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1835/">CVE-2016-1835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1836/">CVE-2016-1836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1837/">CVE-2016-1837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1838/">CVE-2016-1838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-1839/">CVE-2016-1839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1840/">CVE-2016-1840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3627/">CVE-2016-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3705/">CVE-2016-3705</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4483/">CVE-2016-4483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4658/">CVE-2016-4658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-0663/">CVE-2017-0663</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18258/">CVE-2017-18258</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5969/">CVE-2017-5969</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9047/">CVE-2017-9047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9048/">CVE-2017-9048</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9049/">CVE-2017-9049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14567/">CVE-2018-14567</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9251/">CVE-2018-9251</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20388/">CVE-2019-20388</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7595/">CVE-2020-7595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482460" comment="libxml2-2-2.9.7-3.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482461" comment="libxml2-2-32bit-2.9.7-3.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482462" comment="libxml2-devel-2.9.7-3.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482463" comment="libxml2-tools-2.9.7-3.19.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482464" comment="python3-libxml2-python-2.9.7-3.19.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109565" version="1" class="patch">
	<metadata>
		<title>libxslt-devel-1.1.32-3.8.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7995" ref_url="https://www.suse.com/security/cve/CVE-2015-7995/" source="CVE"/>
		<reference ref_id="CVE-2015-9019" ref_url="https://www.suse.com/security/cve/CVE-2015-9019/" source="CVE"/>
		<reference ref_id="CVE-2016-4738" ref_url="https://www.suse.com/security/cve/CVE-2016-4738/" source="CVE"/>
		<reference ref_id="CVE-2017-5029" ref_url="https://www.suse.com/security/cve/CVE-2017-5029/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-13117" ref_url="https://www.suse.com/security/cve/CVE-2019-13117/" source="CVE"/>
		<reference ref_id="CVE-2019-13118" ref_url="https://www.suse.com/security/cve/CVE-2019-13118/" source="CVE"/>
		<reference ref_id="CVE-2019-18197" ref_url="https://www.suse.com/security/cve/CVE-2019-18197/" source="CVE"/>
		<description>
These are all security issues fixed in the libxslt-devel-1.1.32-3.8.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7995/">CVE-2015-7995</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-9019/">CVE-2015-9019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4738/">CVE-2016-4738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5029/">CVE-2017-5029</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13117/">CVE-2019-13117</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13118/">CVE-2019-13118</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18197/">CVE-2019-18197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482465" comment="libxslt-devel-1.1.32-3.8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482466" comment="libxslt-tools-1.1.32-3.8.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482467" comment="libxslt1-1.1.32-3.8.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109566" version="1" class="patch">
	<metadata>
		<title>libyaml-0-2-0.1.7-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-0-2-0.1.7-1.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480828" comment="libyaml-0-2-0.1.7-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480829" comment="libyaml-devel-0.1.7-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109567" version="1" class="patch">
	<metadata>
		<title>libykcs11-1-1.6.2-4.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14779" ref_url="https://www.suse.com/security/cve/CVE-2018-14779/" source="CVE"/>
		<reference ref_id="CVE-2018-14780" ref_url="https://www.suse.com/security/cve/CVE-2018-14780/" source="CVE"/>
		<description>
These are all security issues fixed in the libykcs11-1-1.6.2-4.30 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14779/">CVE-2018-14779</cve>
	<cve impact="low" cvss3="2.2/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14780/">CVE-2018-14780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481585" comment="libykcs11-1-1.6.2-4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481586" comment="libykcs11-devel-1.6.2-4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481587" comment="libykpiv-devel-1.6.2-4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481588" comment="libykpiv1-1.6.2-4.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481589" comment="yubico-piv-tool-1.6.2-4.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109568" version="1" class="patch">
	<metadata>
		<title>libzip-devel-1.5.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-0421" ref_url="https://www.suse.com/security/cve/CVE-2011-0421/" source="CVE"/>
		<reference ref_id="CVE-2012-1162" ref_url="https://www.suse.com/security/cve/CVE-2012-1162/" source="CVE"/>
		<reference ref_id="CVE-2012-1163" ref_url="https://www.suse.com/security/cve/CVE-2012-1163/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2017-12858" ref_url="https://www.suse.com/security/cve/CVE-2017-12858/" source="CVE"/>
		<reference ref_id="CVE-2017-14107" ref_url="https://www.suse.com/security/cve/CVE-2017-14107/" source="CVE"/>
		<description>
These are all security issues fixed in the libzip-devel-1.5.1-1.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0421/">CVE-2011-0421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1162/">CVE-2012-1162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1163/">CVE-2012-1163</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12858/">CVE-2017-12858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14107/">CVE-2017-14107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480830" comment="libzip-devel-1.5.1-1.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480831" comment="libzip5-1.5.1-1.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109569" version="1" class="patch">
	<metadata>
		<title>libzmq5-4.2.3-3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7202" ref_url="https://www.suse.com/security/cve/CVE-2014-7202/" source="CVE"/>
		<reference ref_id="CVE-2014-7203" ref_url="https://www.suse.com/security/cve/CVE-2014-7203/" source="CVE"/>
		<reference ref_id="CVE-2014-9721" ref_url="https://www.suse.com/security/cve/CVE-2014-9721/" source="CVE"/>
		<reference ref_id="CVE-2019-13132" ref_url="https://www.suse.com/security/cve/CVE-2019-13132/" source="CVE"/>
		<reference ref_id="CVE-2019-6250" ref_url="https://www.suse.com/security/cve/CVE-2019-6250/" source="CVE"/>
		<description>
These are all security issues fixed in the libzmq5-4.2.3-3.8.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7202/">CVE-2014-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7203/">CVE-2014-7203</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-9721/">CVE-2014-9721</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13132/">CVE-2019-13132</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6250/">CVE-2019-6250</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482468" comment="libzmq5-4.2.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482469" comment="zeromq-devel-4.2.3-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109570" version="1" class="patch">
	<metadata>
		<title>libzstd-devel-1.4.4-1.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11922" ref_url="https://www.suse.com/security/cve/CVE-2019-11922/" source="CVE"/>
		<description>
These are all security issues fixed in the libzstd-devel-1.4.4-1.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11922/">CVE-2019-11922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482470" comment="libzstd-devel-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482471" comment="libzstd1-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482472" comment="libzstd1-32bit-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482473" comment="zstd-1.4.4-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109571" version="1" class="patch">
	<metadata>
		<title>libzypp-17.23.6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7435" ref_url="https://www.suse.com/security/cve/CVE-2017-7435/" source="CVE"/>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-7685" ref_url="https://www.suse.com/security/cve/CVE-2018-7685/" source="CVE"/>
		<reference ref_id="CVE-2019-18900" ref_url="https://www.suse.com/security/cve/CVE-2019-18900/" source="CVE"/>
		<description>
These are all security issues fixed in the libzypp-17.23.6-1.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7435/">CVE-2017-7435</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7685/">CVE-2018-7685</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18900/">CVE-2019-18900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482474" comment="libzypp-17.23.6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482475" comment="libzypp-devel-17.23.6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109572" version="1" class="patch">
	<metadata>
		<title>libzzip-0-13-0.13.69-3.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5974" ref_url="https://www.suse.com/security/cve/CVE-2017-5974/" source="CVE"/>
		<reference ref_id="CVE-2017-5975" ref_url="https://www.suse.com/security/cve/CVE-2017-5975/" source="CVE"/>
		<reference ref_id="CVE-2017-5976" ref_url="https://www.suse.com/security/cve/CVE-2017-5976/" source="CVE"/>
		<reference ref_id="CVE-2017-5977" ref_url="https://www.suse.com/security/cve/CVE-2017-5977/" source="CVE"/>
		<reference ref_id="CVE-2017-5978" ref_url="https://www.suse.com/security/cve/CVE-2017-5978/" source="CVE"/>
		<reference ref_id="CVE-2017-5979" ref_url="https://www.suse.com/security/cve/CVE-2017-5979/" source="CVE"/>
		<reference ref_id="CVE-2017-5981" ref_url="https://www.suse.com/security/cve/CVE-2017-5981/" source="CVE"/>
		<reference ref_id="CVE-2018-16548" ref_url="https://www.suse.com/security/cve/CVE-2018-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-17828" ref_url="https://www.suse.com/security/cve/CVE-2018-17828/" source="CVE"/>
		<reference ref_id="CVE-2018-6381" ref_url="https://www.suse.com/security/cve/CVE-2018-6381/" source="CVE"/>
		<reference ref_id="CVE-2018-6484" ref_url="https://www.suse.com/security/cve/CVE-2018-6484/" source="CVE"/>
		<reference ref_id="CVE-2018-6540" ref_url="https://www.suse.com/security/cve/CVE-2018-6540/" source="CVE"/>
		<reference ref_id="CVE-2018-6542" ref_url="https://www.suse.com/security/cve/CVE-2018-6542/" source="CVE"/>
		<reference ref_id="CVE-2018-7725" ref_url="https://www.suse.com/security/cve/CVE-2018-7725/" source="CVE"/>
		<reference ref_id="CVE-2018-7726" ref_url="https://www.suse.com/security/cve/CVE-2018-7726/" source="CVE"/>
		<description>
These are all security issues fixed in the libzzip-0-13-0.13.69-3.10.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5974/">CVE-2017-5974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5975/">CVE-2017-5975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5976/">CVE-2017-5976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5977/">CVE-2017-5977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5978/">CVE-2017-5978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5979/">CVE-2017-5979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5981/">CVE-2017-5981</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16548/">CVE-2018-16548</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17828/">CVE-2018-17828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6381/">CVE-2018-6381</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6484/">CVE-2018-6484</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6540/">CVE-2018-6540</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6542/">CVE-2018-6542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7725/">CVE-2018-7725</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7726/">CVE-2018-7726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482476" comment="libzzip-0-13-0.13.69-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482477" comment="zziplib-devel-0.13.69-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109573" version="1" class="patch">
	<metadata>
		<title>log4j12-1.2.17-2.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645/" source="CVE"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j12-1.2.17-2.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482478" comment="log4j12-1.2.17-2.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109574" version="1" class="patch">
	<metadata>
		<title>logrotate-3.13.0-4.3.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-1098" ref_url="https://www.suse.com/security/cve/CVE-2011-1098/" source="CVE"/>
		<reference ref_id="CVE-2011-1154" ref_url="https://www.suse.com/security/cve/CVE-2011-1154/" source="CVE"/>
		<reference ref_id="CVE-2011-1155" ref_url="https://www.suse.com/security/cve/CVE-2011-1155/" source="CVE"/>
		<description>
These are all security issues fixed in the logrotate-3.13.0-4.3.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1098/">CVE-2011-1098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1154/">CVE-2011-1154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1155/">CVE-2011-1155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481596" comment="logrotate-3.13.0-4.3.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109575" version="1" class="patch">
	<metadata>
		<title>mailx-12.5-1.87 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2004-2771" ref_url="https://www.suse.com/security/cve/CVE-2004-2771/" source="CVE"/>
		<reference ref_id="CVE-2014-7844" ref_url="https://www.suse.com/security/cve/CVE-2014-7844/" source="CVE"/>
		<description>
These are all security issues fixed in the mailx-12.5-1.87 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2004-2771/">CVE-2004-2771</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2014-7844/">CVE-2014-7844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480839" comment="mailx-12.5-1.87 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109576" version="1" class="patch">
	<metadata>
		<title>minicom-2.7.1-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7467" ref_url="https://www.suse.com/security/cve/CVE-2017-7467/" source="CVE"/>
		<description>
These are all security issues fixed in the minicom-2.7.1-1.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7467/">CVE-2017-7467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480840" comment="minicom-2.7.1-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480841" comment="minicom-lang-2.7.1-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109577" version="1" class="patch">
	<metadata>
		<title>mozilla-nspr-32bit-4.23-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<description>
These are all security issues fixed in the mozilla-nspr-32bit-4.23-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482479" comment="mozilla-nspr-4.23-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482480" comment="mozilla-nspr-32bit-4.23-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482481" comment="mozilla-nspr-devel-4.23-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109578" version="1" class="patch">
	<metadata>
		<title>mutt-1.10.1-3.3.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0467" ref_url="https://www.suse.com/security/cve/CVE-2014-0467/" source="CVE"/>
		<reference ref_id="CVE-2014-9116" ref_url="https://www.suse.com/security/cve/CVE-2014-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-14349" ref_url="https://www.suse.com/security/cve/CVE-2018-14349/" source="CVE"/>
		<reference ref_id="CVE-2018-14350" ref_url="https://www.suse.com/security/cve/CVE-2018-14350/" source="CVE"/>
		<reference ref_id="CVE-2018-14351" ref_url="https://www.suse.com/security/cve/CVE-2018-14351/" source="CVE"/>
		<reference ref_id="CVE-2018-14352" ref_url="https://www.suse.com/security/cve/CVE-2018-14352/" source="CVE"/>
		<reference ref_id="CVE-2018-14353" ref_url="https://www.suse.com/security/cve/CVE-2018-14353/" source="CVE"/>
		<reference ref_id="CVE-2018-14354" ref_url="https://www.suse.com/security/cve/CVE-2018-14354/" source="CVE"/>
		<reference ref_id="CVE-2018-14355" ref_url="https://www.suse.com/security/cve/CVE-2018-14355/" source="CVE"/>
		<reference ref_id="CVE-2018-14356" ref_url="https://www.suse.com/security/cve/CVE-2018-14356/" source="CVE"/>
		<reference ref_id="CVE-2018-14357" ref_url="https://www.suse.com/security/cve/CVE-2018-14357/" source="CVE"/>
		<reference ref_id="CVE-2018-14358" ref_url="https://www.suse.com/security/cve/CVE-2018-14358/" source="CVE"/>
		<reference ref_id="CVE-2018-14359" ref_url="https://www.suse.com/security/cve/CVE-2018-14359/" source="CVE"/>
		<reference ref_id="CVE-2018-14360" ref_url="https://www.suse.com/security/cve/CVE-2018-14360/" source="CVE"/>
		<reference ref_id="CVE-2018-14361" ref_url="https://www.suse.com/security/cve/CVE-2018-14361/" source="CVE"/>
		<reference ref_id="CVE-2018-14362" ref_url="https://www.suse.com/security/cve/CVE-2018-14362/" source="CVE"/>
		<reference ref_id="CVE-2018-14363" ref_url="https://www.suse.com/security/cve/CVE-2018-14363/" source="CVE"/>
		<description>
These are all security issues fixed in the mutt-1.10.1-3.3.4 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0467/">CVE-2014-0467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9116/">CVE-2014-9116</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14349/">CVE-2018-14349</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14350/">CVE-2018-14350</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14351/">CVE-2018-14351</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14352/">CVE-2018-14352</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14353/">CVE-2018-14353</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14354/">CVE-2018-14354</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14355/">CVE-2018-14355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14356/">CVE-2018-14356</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14357/">CVE-2018-14357</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14358/">CVE-2018-14358</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14359/">CVE-2018-14359</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14360/">CVE-2018-14360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14361/">CVE-2018-14361</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14362/">CVE-2018-14362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14363/">CVE-2018-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481600" comment="mutt-1.10.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481601" comment="mutt-doc-1.10.1-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481602" comment="mutt-lang-1.10.1-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109579" version="1" class="patch">
	<metadata>
		<title>nfs-client-2.1.1-10.4.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-3689" ref_url="https://www.suse.com/security/cve/CVE-2019-3689/" source="CVE"/>
		<description>
These are all security issues fixed in the nfs-client-2.1.1-10.4.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3689/">CVE-2019-3689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482482" comment="nfs-client-2.1.1-10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482483" comment="nfs-doc-2.1.1-10.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482484" comment="nfs-kernel-server-2.1.1-10.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109580" version="1" class="patch">
	<metadata>
		<title>nmap-7.70-3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594/" source="CVE"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<description>
These are all security issues fixed in the nmap-7.70-3.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482485" comment="nmap-7.70-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109581" version="1" class="patch">
	<metadata>
		<title>opensc-0.19.0-1.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16391" ref_url="https://www.suse.com/security/cve/CVE-2018-16391/" source="CVE"/>
		<reference ref_id="CVE-2018-16392" ref_url="https://www.suse.com/security/cve/CVE-2018-16392/" source="CVE"/>
		<reference ref_id="CVE-2018-16393" ref_url="https://www.suse.com/security/cve/CVE-2018-16393/" source="CVE"/>
		<reference ref_id="CVE-2018-16418" ref_url="https://www.suse.com/security/cve/CVE-2018-16418/" source="CVE"/>
		<reference ref_id="CVE-2018-16419" ref_url="https://www.suse.com/security/cve/CVE-2018-16419/" source="CVE"/>
		<reference ref_id="CVE-2018-16420" ref_url="https://www.suse.com/security/cve/CVE-2018-16420/" source="CVE"/>
		<reference ref_id="CVE-2018-16421" ref_url="https://www.suse.com/security/cve/CVE-2018-16421/" source="CVE"/>
		<reference ref_id="CVE-2018-16422" ref_url="https://www.suse.com/security/cve/CVE-2018-16422/" source="CVE"/>
		<reference ref_id="CVE-2018-16423" ref_url="https://www.suse.com/security/cve/CVE-2018-16423/" source="CVE"/>
		<reference ref_id="CVE-2018-16424" ref_url="https://www.suse.com/security/cve/CVE-2018-16424/" source="CVE"/>
		<reference ref_id="CVE-2018-16425" ref_url="https://www.suse.com/security/cve/CVE-2018-16425/" source="CVE"/>
		<reference ref_id="CVE-2018-16426" ref_url="https://www.suse.com/security/cve/CVE-2018-16426/" source="CVE"/>
		<reference ref_id="CVE-2018-16427" ref_url="https://www.suse.com/security/cve/CVE-2018-16427/" source="CVE"/>
		<description>
These are all security issues fixed in the opensc-0.19.0-1.14 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16391/">CVE-2018-16391</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16392/">CVE-2018-16392</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16393/">CVE-2018-16393</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16418/">CVE-2018-16418</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16419/">CVE-2018-16419</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16420/">CVE-2018-16420</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16421/">CVE-2018-16421</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16422/">CVE-2018-16422</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16423/">CVE-2018-16423</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16424/">CVE-2018-16424</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16425/">CVE-2018-16425</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16426/">CVE-2018-16426</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16427/">CVE-2018-16427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481603" comment="opensc-0.19.0-1.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109582" version="1" class="patch">
	<metadata>
		<title>openslp-2.0.0-6.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-2.0.0-6.12.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482486" comment="openslp-2.0.0-6.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482487" comment="openslp-32bit-2.0.0-6.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482488" comment="openslp-devel-2.0.0-6.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109583" version="1" class="patch">
	<metadata>
		<title>openssh-8.1p1-3.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-8.1p1-3.21 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482489" comment="openssh-8.1p1-3.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482490" comment="openssh-helpers-8.1p1-3.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109584" version="1" class="patch">
	<metadata>
		<title>openvpn-2.4.3-5.3.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8104" ref_url="https://www.suse.com/security/cve/CVE-2014-8104/" source="CVE"/>
		<reference ref_id="CVE-2017-12166" ref_url="https://www.suse.com/security/cve/CVE-2017-12166/" source="CVE"/>
		<reference ref_id="CVE-2017-7521" ref_url="https://www.suse.com/security/cve/CVE-2017-7521/" source="CVE"/>
		<reference ref_id="CVE-2017-7522" ref_url="https://www.suse.com/security/cve/CVE-2017-7522/" source="CVE"/>
		<reference ref_id="CVE-2018-9336" ref_url="https://www.suse.com/security/cve/CVE-2018-9336/" source="CVE"/>
		<description>
These are all security issues fixed in the openvpn-2.4.3-5.3.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8104/">CVE-2014-8104</cve>
	<cve impact="critical" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12166/">CVE-2017-12166</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7521/">CVE-2017-7521</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7522/">CVE-2017-7522</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-9336/">CVE-2018-9336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481609" comment="openvpn-2.4.3-5.3.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481610" comment="openvpn-auth-pam-plugin-2.4.3-5.3.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481611" comment="openvpn-devel-2.4.3-5.3.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109585" version="1" class="patch">
	<metadata>
		<title>opie-32bit-2.4-1.96 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-2489" ref_url="https://www.suse.com/security/cve/CVE-2011-2489/" source="CVE"/>
		<reference ref_id="CVE-2011-2490" ref_url="https://www.suse.com/security/cve/CVE-2011-2490/" source="CVE"/>
		<description>
These are all security issues fixed in the opie-32bit-2.4-1.96 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2489/">CVE-2011-2489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-2490/">CVE-2011-2490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480857" comment="opie-32bit-2.4-1.96 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109586" version="1" class="patch">
	<metadata>
		<title>p7zip-16.02-12.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1038" ref_url="https://www.suse.com/security/cve/CVE-2015-1038/" source="CVE"/>
		<reference ref_id="CVE-2016-2334" ref_url="https://www.suse.com/security/cve/CVE-2016-2334/" source="CVE"/>
		<reference ref_id="CVE-2016-2335" ref_url="https://www.suse.com/security/cve/CVE-2016-2335/" source="CVE"/>
		<reference ref_id="CVE-2016-9296" ref_url="https://www.suse.com/security/cve/CVE-2016-9296/" source="CVE"/>
		<reference ref_id="CVE-2017-17969" ref_url="https://www.suse.com/security/cve/CVE-2017-17969/" source="CVE"/>
		<description>
These are all security issues fixed in the p7zip-16.02-12.33 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1038/">CVE-2015-1038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2334/">CVE-2016-2334</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2335/">CVE-2016-2335</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9296/">CVE-2016-9296</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17969/">CVE-2017-17969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482491" comment="p7zip-16.02-12.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109587" version="1" class="patch">
	<metadata>
		<title>pam-1.3.0-6.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-1.3.0-6.16.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482492" comment="pam-1.3.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482493" comment="pam-32bit-1.3.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482494" comment="pam-devel-1.3.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482495" comment="pam-doc-1.3.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482496" comment="pam-extra-1.3.0-6.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482497" comment="pam-extra-32bit-1.3.0-6.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109588" version="1" class="patch">
	<metadata>
		<title>pam_krb5-2.4.13-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2008-3825" ref_url="https://www.suse.com/security/cve/CVE-2008-3825/" source="CVE"/>
		<reference ref_id="CVE-2009-1384" ref_url="https://www.suse.com/security/cve/CVE-2009-1384/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_krb5-2.4.13-1.36 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3825/">CVE-2008-3825</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2009-1384/">CVE-2009-1384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480863" comment="pam_krb5-2.4.13-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480864" comment="pam_krb5-32bit-2.4.13-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109589" version="1" class="patch">
	<metadata>
		<title>pam_ssh-2.1-2.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-1273" ref_url="https://www.suse.com/security/cve/CVE-2009-1273/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_ssh-2.1-2.27 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1273/">CVE-2009-1273</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480865" comment="pam_ssh-2.1-2.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480866" comment="pam_ssh-32bit-2.1-2.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109590" version="1" class="patch">
	<metadata>
		<title>pam_u2f-1.0.8-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-12209" ref_url="https://www.suse.com/security/cve/CVE-2019-12209/" source="CVE"/>
		<reference ref_id="CVE-2019-12210" ref_url="https://www.suse.com/security/cve/CVE-2019-12210/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_u2f-1.0.8-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12209/">CVE-2019-12209</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12210/">CVE-2019-12210</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482498" comment="pam_u2f-1.0.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109591" version="1" class="patch">
	<metadata>
		<title>pam_yubico-2.26-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-9275" ref_url="https://www.suse.com/security/cve/CVE-2018-9275/" source="CVE"/>
		<description>
These are all security issues fixed in the pam_yubico-2.26-1.7 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9275/">CVE-2018-9275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480867" comment="pam_yubico-2.26-1.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109592" version="1" class="patch">
	<metadata>
		<title>patch-2.7.6-3.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-4651" ref_url="https://www.suse.com/security/cve/CVE-2010-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-1196" ref_url="https://www.suse.com/security/cve/CVE-2015-1196/" source="CVE"/>
		<reference ref_id="CVE-2016-10713" ref_url="https://www.suse.com/security/cve/CVE-2016-10713/" source="CVE"/>
		<reference ref_id="CVE-2018-1000156" ref_url="https://www.suse.com/security/cve/CVE-2018-1000156/" source="CVE"/>
		<reference ref_id="CVE-2018-6951" ref_url="https://www.suse.com/security/cve/CVE-2018-6951/" source="CVE"/>
		<description>
These are all security issues fixed in the patch-2.7.6-3.5 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4651/">CVE-2010-4651</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1196/">CVE-2015-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10713/">CVE-2016-10713</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000156/">CVE-2018-1000156</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6951/">CVE-2018-6951</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481616" comment="patch-2.7.6-3.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109593" version="1" class="patch">
	<metadata>
		<title>perl-5.26.1-7.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313/" source="CVE"/>
		<reference ref_id="CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-5.26.1-7.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482499" comment="perl-5.26.1-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482500" comment="perl-base-5.26.1-7.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482501" comment="perl-base-32bit-5.26.1-7.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109594" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Zip-1.60-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10860" ref_url="https://www.suse.com/security/cve/CVE-2018-10860/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Zip-1.60-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10860/">CVE-2018-10860</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481620" comment="perl-Archive-Zip-1.60-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109595" version="1" class="patch">
	<metadata>
		<title>perl-DBD-mysql-4.046-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1246" ref_url="https://www.suse.com/security/cve/CVE-2016-1246/" source="CVE"/>
		<reference ref_id="CVE-2016-1249" ref_url="https://www.suse.com/security/cve/CVE-2016-1249/" source="CVE"/>
		<reference ref_id="CVE-2016-1251" ref_url="https://www.suse.com/security/cve/CVE-2016-1251/" source="CVE"/>
		<reference ref_id="CVE-2017-10788" ref_url="https://www.suse.com/security/cve/CVE-2017-10788/" source="CVE"/>
		<reference ref_id="CVE-2017-10789" ref_url="https://www.suse.com/security/cve/CVE-2017-10789/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DBD-mysql-4.046-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1246/">CVE-2016-1246</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1249/">CVE-2016-1249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1251/">CVE-2016-1251</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10788/">CVE-2017-10788</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10789/">CVE-2017-10789</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482502" comment="perl-DBD-mysql-4.046-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109596" version="1" class="patch">
	<metadata>
		<title>perl-HTML-Parser-3.72-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-3627" ref_url="https://www.suse.com/security/cve/CVE-2009-3627/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-HTML-Parser-3.72-1.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3627/">CVE-2009-3627</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480873" comment="perl-HTML-Parser-3.72-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109597" version="1" class="patch">
	<metadata>
		<title>perl-LWP-Protocol-https-6.06-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3230" ref_url="https://www.suse.com/security/cve/CVE-2014-3230/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-LWP-Protocol-https-6.06-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3230/">CVE-2014-3230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480874" comment="perl-LWP-Protocol-https-6.06-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109598" version="1" class="patch">
	<metadata>
		<title>perl-Mail-SpamAssassin-3.4.2-12.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Mail-SpamAssassin-3.4.2-12.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482503" comment="perl-Mail-SpamAssassin-3.4.2-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482504" comment="spamassassin-3.4.2-12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109599" version="1" class="patch">
	<metadata>
		<title>perl-XML-LibXML-2.0132-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3451" ref_url="https://www.suse.com/security/cve/CVE-2015-3451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-XML-LibXML-2.0132-1.20 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3451/">CVE-2015-3451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480875" comment="perl-XML-LibXML-2.0132-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109600" version="1" class="patch">
	<metadata>
		<title>permissions-20181224-21.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-3687" ref_url="https://www.suse.com/security/cve/CVE-2019-3687/" source="CVE"/>
		<reference ref_id="CVE-2019-3688" ref_url="https://www.suse.com/security/cve/CVE-2019-3688/" source="CVE"/>
		<reference ref_id="CVE-2019-3690" ref_url="https://www.suse.com/security/cve/CVE-2019-3690/" source="CVE"/>
		<reference ref_id="CVE-2020-8013" ref_url="https://www.suse.com/security/cve/CVE-2020-8013/" source="CVE"/>
		<description>
These are all security issues fixed in the permissions-20181224-21.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3687/">CVE-2019-3687</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3688/">CVE-2019-3688</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3690/">CVE-2019-3690</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8013/">CVE-2020-8013</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482505" comment="permissions-20181224-21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482506" comment="permissions-zypp-plugin-20181224-21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109601" version="1" class="patch">
	<metadata>
		<title>policycoreutils-3.0-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-3.0-1.20 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482507" comment="policycoreutils-3.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482508" comment="policycoreutils-lang-3.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482509" comment="policycoreutils-newrole-3.0-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482510" comment="python3-policycoreutils-3.0-1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109602" version="1" class="patch">
	<metadata>
		<title>postgresql-12-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-12-2.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482511" comment="postgresql-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109603" version="1" class="patch">
	<metadata>
		<title>postgresql10-10.12-8.13.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="CVE-2018-1052" ref_url="https://www.suse.com/security/cve/CVE-2018-1052/" source="CVE"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-10.12-8.13.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1052/">CVE-2018-1052</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482512" comment="postgresql10-10.12-8.13.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109604" version="1" class="patch">
	<metadata>
		<title>powerpc-utils-1.3.7.1-3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4040" ref_url="https://www.suse.com/security/cve/CVE-2014-4040/" source="CVE"/>
		<description>
These are all security issues fixed in the powerpc-utils-1.3.7.1-3.12.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4040/">CVE-2014-4040</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482513" comment="powerpc-utils-1.3.7.1-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109605" version="1" class="patch">
	<metadata>
		<title>ppc64-diag-2.7.6-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4038" ref_url="https://www.suse.com/security/cve/CVE-2014-4038/" source="CVE"/>
		<reference ref_id="CVE-2014-4039" ref_url="https://www.suse.com/security/cve/CVE-2014-4039/" source="CVE"/>
		<description>
These are all security issues fixed in the ppc64-diag-2.7.6-1.53 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4038/">CVE-2014-4038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4039/">CVE-2014-4039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482514" comment="ppc64-diag-2.7.6-1.53 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109606" version="1" class="patch">
	<metadata>
		<title>procmail-3.22-2.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3618" ref_url="https://www.suse.com/security/cve/CVE-2014-3618/" source="CVE"/>
		<reference ref_id="CVE-2017-16844" ref_url="https://www.suse.com/security/cve/CVE-2017-16844/" source="CVE"/>
		<description>
These are all security issues fixed in the procmail-3.22-2.34 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3618/">CVE-2014-3618</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16844/">CVE-2017-16844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480880" comment="procmail-3.22-2.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109607" version="1" class="patch">
	<metadata>
		<title>python3-CherryPy-18.3.0-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-CherryPy-18.3.0-1.31 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482515" comment="python3-CherryPy-18.3.0-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109608" version="1" class="patch">
	<metadata>
		<title>python3-Jinja2-2.10.1-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0012" ref_url="https://www.suse.com/security/cve/CVE-2014-0012/" source="CVE"/>
		<reference ref_id="CVE-2016-10745" ref_url="https://www.suse.com/security/cve/CVE-2016-10745/" source="CVE"/>
		<reference ref_id="CVE-2019-10906" ref_url="https://www.suse.com/security/cve/CVE-2019-10906/" source="CVE"/>
		<reference ref_id="CVE-2019-8341" ref_url="https://www.suse.com/security/cve/CVE-2019-8341/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Jinja2-2.10.1-3.5.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0012/">CVE-2014-0012</cve>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2016-10745/">CVE-2016-10745</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-10906/">CVE-2019-10906</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8341/">CVE-2019-8341</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481633" comment="python3-Jinja2-2.10.1-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109609" version="1" class="patch">
	<metadata>
		<title>python3-PyYAML-5.1.2-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-18342" ref_url="https://www.suse.com/security/cve/CVE-2017-18342/" source="CVE"/>
		<reference ref_id="CVE-2020-1747" ref_url="https://www.suse.com/security/cve/CVE-2020-1747/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-PyYAML-5.1.2-6.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18342/">CVE-2017-18342</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1747/">CVE-2020-1747</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482516" comment="python3-PyYAML-5.1.2-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109610" version="1" class="patch">
	<metadata>
		<title>python3-SQLAlchemy-1.2.14-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-7164" ref_url="https://www.suse.com/security/cve/CVE-2019-7164/" source="CVE"/>
		<reference ref_id="CVE-2019-7548" ref_url="https://www.suse.com/security/cve/CVE-2019-7548/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-SQLAlchemy-1.2.14-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7164/">CVE-2019-7164</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7548/">CVE-2019-7548</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482517" comment="python3-SQLAlchemy-1.2.14-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109611" version="1" class="patch">
	<metadata>
		<title>python3-Werkzeug-0.14.1-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14806" ref_url="https://www.suse.com/security/cve/CVE-2019-14806/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-Werkzeug-0.14.1-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14806/">CVE-2019-14806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482518" comment="python3-Werkzeug-0.14.1-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109612" version="1" class="patch">
	<metadata>
		<title>python3-ecdsa-0.13.3-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-ecdsa-0.13.3-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482519" comment="python3-ecdsa-0.13.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109613" version="1" class="patch">
	<metadata>
		<title>python3-numpy-1.17.3-4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-numpy-1.17.3-4.11.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482520" comment="python3-numpy-1.17.3-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482521" comment="python3-numpy-devel-1.17.3-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109614" version="1" class="patch">
	<metadata>
		<title>python3-paramiko-2.4.2-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-7750" ref_url="https://www.suse.com/security/cve/CVE-2018-7750/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-paramiko-2.4.2-6.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="10/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7750/">CVE-2018-7750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482522" comment="python3-paramiko-2.4.2-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109615" version="1" class="patch">
	<metadata>
		<title>python3-pip-10.0.1-1.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-5123" ref_url="https://www.suse.com/security/cve/CVE-2013-5123/" source="CVE"/>
		<reference ref_id="CVE-2014-8991" ref_url="https://www.suse.com/security/cve/CVE-2014-8991/" source="CVE"/>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-pip-10.0.1-1.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2013-5123/">CVE-2013-5123</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2014-8991/">CVE-2014-8991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480895" comment="python3-pip-10.0.1-1.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109616" version="1" class="patch">
	<metadata>
		<title>python3-python3-saml-1.7.0-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-11427" ref_url="https://www.suse.com/security/cve/CVE-2017-11427/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-python3-saml-1.7.0-1.45 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11427/">CVE-2017-11427</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482523" comment="python3-python3-saml-1.7.0-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109617" version="1" class="patch">
	<metadata>
		<title>python3-requests-2.20.1-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2296" ref_url="https://www.suse.com/security/cve/CVE-2015-2296/" source="CVE"/>
		<reference ref_id="CVE-2018-18074" ref_url="https://www.suse.com/security/cve/CVE-2018-18074/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-requests-2.20.1-6.6.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2296/">CVE-2015-2296</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18074/">CVE-2018-18074</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482524" comment="python3-requests-2.20.1-6.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109618" version="1" class="patch">
	<metadata>
		<title>python3-salt-3000-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1866" ref_url="https://www.suse.com/security/cve/CVE-2016-1866/" source="CVE"/>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361/" source="CVE"/>
		<reference ref_id="CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-salt-3000-2.9 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1866/">CVE-2016-1866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696</cve>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482525" comment="python3-salt-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482526" comment="salt-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482527" comment="salt-bash-completion-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482528" comment="salt-doc-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482529" comment="salt-minion-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482530" comment="salt-zsh-completion-3000-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109619" version="1" class="patch">
	<metadata>
		<title>python3-targetcli-fb-2.1.52-1.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-10699" ref_url="https://www.suse.com/security/cve/CVE-2020-10699/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-targetcli-fb-2.1.52-1.5 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10699/">CVE-2020-10699</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482531" comment="python3-targetcli-fb-2.1.52-1.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482532" comment="targetcli-fb-common-2.1.52-1.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109620" version="1" class="patch">
	<metadata>
		<title>python3-urllib3-1.24-9.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9015" ref_url="https://www.suse.com/security/cve/CVE-2016-9015/" source="CVE"/>
		<reference ref_id="CVE-2019-11236" ref_url="https://www.suse.com/security/cve/CVE-2019-11236/" source="CVE"/>
		<reference ref_id="CVE-2019-11324" ref_url="https://www.suse.com/security/cve/CVE-2019-11324/" source="CVE"/>
		<reference ref_id="CVE-2019-9740" ref_url="https://www.suse.com/security/cve/CVE-2019-9740/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-urllib3-1.24-9.7.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2016-9015/">CVE-2016-9015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11236/">CVE-2019-11236</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11324/">CVE-2019-11324</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9740/">CVE-2019-9740</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482533" comment="python3-urllib3-1.24-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109621" version="1" class="patch">
	<metadata>
		<title>qemu-tools-4.2.0-9.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-tools-4.2.0-9.4 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482534" comment="qemu-tools-4.2.0-9.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109622" version="1" class="patch">
	<metadata>
		<title>radvd-2.17-3.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-3602" ref_url="https://www.suse.com/security/cve/CVE-2011-3602/" source="CVE"/>
		<description>
These are all security issues fixed in the radvd-2.17-3.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3602/">CVE-2011-3602</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480917" comment="radvd-2.17-3.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109623" version="1" class="patch">
	<metadata>
		<title>rpcbind-0.2.3-5.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7236" ref_url="https://www.suse.com/security/cve/CVE-2015-7236/" source="CVE"/>
		<reference ref_id="CVE-2017-8779" ref_url="https://www.suse.com/security/cve/CVE-2017-8779/" source="CVE"/>
		<description>
These are all security issues fixed in the rpcbind-0.2.3-5.9.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7236/">CVE-2015-7236</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-8779/">CVE-2017-8779</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482535" comment="rpcbind-0.2.3-5.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109624" version="1" class="patch">
	<metadata>
		<title>rpm-32bit-4.14.1-20.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-32bit-4.14.1-20.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482536" comment="rpm-4.14.1-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482537" comment="rpm-32bit-4.14.1-20.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482538" comment="rpm-devel-4.14.1-20.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109625" version="1" class="patch">
	<metadata>
		<title>rsync-3.1.3-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8242" ref_url="https://www.suse.com/security/cve/CVE-2014-8242/" source="CVE"/>
		<reference ref_id="CVE-2014-9512" ref_url="https://www.suse.com/security/cve/CVE-2014-9512/" source="CVE"/>
		<reference ref_id="CVE-2017-16548" ref_url="https://www.suse.com/security/cve/CVE-2017-16548/" source="CVE"/>
		<reference ref_id="CVE-2018-5764" ref_url="https://www.suse.com/security/cve/CVE-2018-5764/" source="CVE"/>
		<description>
These are all security issues fixed in the rsync-3.1.3-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8242/">CVE-2014-8242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9512/">CVE-2014-9512</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16548/">CVE-2017-16548</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5764/">CVE-2018-5764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482539" comment="rsync-3.1.3-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109626" version="1" class="patch">
	<metadata>
		<title>rsyslog-8.39.0-2.90 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-8.39.0-2.90 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482540" comment="rsyslog-8.39.0-2.90 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109627" version="1" class="patch">
	<metadata>
		<title>rzsz-0.12.21~rc-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10195" ref_url="https://www.suse.com/security/cve/CVE-2018-10195/" source="CVE"/>
		<description>
These are all security issues fixed in the rzsz-0.12.21~rc-1.8 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10195/">CVE-2018-10195</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480921" comment="rzsz-0.12.21~rc-1.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109628" version="1" class="patch">
	<metadata>
		<title>screen-4.6.2-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5618" ref_url="https://www.suse.com/security/cve/CVE-2017-5618/" source="CVE"/>
		<description>
These are all security issues fixed in the screen-4.6.2-3.14 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5618/">CVE-2017-5618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480922" comment="screen-4.6.2-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109629" version="1" class="patch">
	<metadata>
		<title>shadow-4.6-3.5.6 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-7169" ref_url="https://www.suse.com/security/cve/CVE-2018-7169/" source="CVE"/>
		<description>
These are all security issues fixed in the shadow-4.6-3.5.6 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7169/">CVE-2018-7169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482541" comment="shadow-4.6-3.5.6 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109630" version="1" class="patch">
	<metadata>
		<title>sharutils-4.15.2-2.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000097" ref_url="https://www.suse.com/security/cve/CVE-2018-1000097/" source="CVE"/>
		<description>
These are all security issues fixed in the sharutils-4.15.2-2.21 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000097/">CVE-2018-1000097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480924" comment="sharutils-4.15.2-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480925" comment="sharutils-lang-4.15.2-2.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109631" version="1" class="patch">
	<metadata>
		<title>shim-15+git47-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3675" ref_url="https://www.suse.com/security/cve/CVE-2014-3675/" source="CVE"/>
		<reference ref_id="CVE-2014-3676" ref_url="https://www.suse.com/security/cve/CVE-2014-3676/" source="CVE"/>
		<reference ref_id="CVE-2014-3677" ref_url="https://www.suse.com/security/cve/CVE-2014-3677/" source="CVE"/>
		<description>
These are all security issues fixed in the shim-15+git47-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3675/">CVE-2014-3675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3676/">CVE-2014-3676</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3677/">CVE-2014-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482542" comment="shim-15+git47-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109632" version="1" class="patch">
	<metadata>
		<title>socat-1.7.3.2-4.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-3571" ref_url="https://www.suse.com/security/cve/CVE-2013-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-0019" ref_url="https://www.suse.com/security/cve/CVE-2014-0019/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<description>
These are all security issues fixed in the socat-1.7.3.2-4.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3571/">CVE-2013-3571</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-0019/">CVE-2014-0019</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481656" comment="socat-1.7.3.2-4.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109633" version="1" class="patch">
	<metadata>
		<title>spectre-meltdown-checker-0.43-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<description>
These are all security issues fixed in the spectre-meltdown-checker-0.43-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482543" comment="spectre-meltdown-checker-0.43-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109634" version="1" class="patch">
	<metadata>
		<title>squashfs-4.3-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-4024" ref_url="https://www.suse.com/security/cve/CVE-2012-4024/" source="CVE"/>
		<reference ref_id="CVE-2012-4025" ref_url="https://www.suse.com/security/cve/CVE-2012-4025/" source="CVE"/>
		<description>
These are all security issues fixed in the squashfs-4.3-1.29 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4024/">CVE-2012-4024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4025/">CVE-2012-4025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480927" comment="squashfs-4.3-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109635" version="1" class="patch">
	<metadata>
		<title>strongswan-5.8.2-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="CVE-2018-6459" ref_url="https://www.suse.com/security/cve/CVE-2018-6459/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-5.8.2-9.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6459/">CVE-2018-6459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482544" comment="strongswan-5.8.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482545" comment="strongswan-doc-5.8.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482546" comment="strongswan-hmac-5.8.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482547" comment="strongswan-ipsec-5.8.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482548" comment="strongswan-libs0-5.8.2-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109636" version="1" class="patch">
	<metadata>
		<title>subversion-1.10.6-3.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<reference ref_id="CVE-2015-0202" ref_url="https://www.suse.com/security/cve/CVE-2015-0202/" source="CVE"/>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<reference ref_id="CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184/" source="CVE"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<reference ref_id="CVE-2015-5259" ref_url="https://www.suse.com/security/cve/CVE-2015-5259/" source="CVE"/>
		<reference ref_id="CVE-2015-5343" ref_url="https://www.suse.com/security/cve/CVE-2015-5343/" source="CVE"/>
		<reference ref_id="CVE-2016-2167" ref_url="https://www.suse.com/security/cve/CVE-2016-2167/" source="CVE"/>
		<reference ref_id="CVE-2016-2168" ref_url="https://www.suse.com/security/cve/CVE-2016-2168/" source="CVE"/>
		<reference ref_id="CVE-2016-8734" ref_url="https://www.suse.com/security/cve/CVE-2016-8734/" source="CVE"/>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<reference ref_id="CVE-2018-11803" ref_url="https://www.suse.com/security/cve/CVE-2018-11803/" source="CVE"/>
		<reference ref_id="CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203/" source="CVE"/>
		<description>
These are all security issues fixed in the subversion-1.10.6-3.6.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0202/">CVE-2015-0202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5259/">CVE-2015-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5343/">CVE-2015-5343</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2167/">CVE-2016-2167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2168/">CVE-2016-2168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8734/">CVE-2016-8734</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11803/">CVE-2018-11803</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482549" comment="subversion-1.10.6-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482550" comment="subversion-devel-1.10.6-3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109637" version="1" class="patch">
	<metadata>
		<title>sudo-1.8.22-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9680" ref_url="https://www.suse.com/security/cve/CVE-2014-9680/" source="CVE"/>
		<reference ref_id="CVE-2016-7032" ref_url="https://www.suse.com/security/cve/CVE-2016-7032/" source="CVE"/>
		<reference ref_id="CVE-2016-7076" ref_url="https://www.suse.com/security/cve/CVE-2016-7076/" source="CVE"/>
		<reference ref_id="CVE-2017-1000367" ref_url="https://www.suse.com/security/cve/CVE-2017-1000367/" source="CVE"/>
		<reference ref_id="CVE-2017-1000368" ref_url="https://www.suse.com/security/cve/CVE-2017-1000368/" source="CVE"/>
		<reference ref_id="CVE-2019-14287" ref_url="https://www.suse.com/security/cve/CVE-2019-14287/" source="CVE"/>
		<reference ref_id="CVE-2019-18634" ref_url="https://www.suse.com/security/cve/CVE-2019-18634/" source="CVE"/>
		<description>
These are all security issues fixed in the sudo-1.8.22-4.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9680/">CVE-2014-9680</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7032/">CVE-2016-7032</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7076/">CVE-2016-7076</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000367/">CVE-2017-1000367</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000368/">CVE-2017-1000368</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14287/">CVE-2019-14287</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18634/">CVE-2019-18634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482551" comment="sudo-1.8.22-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482552" comment="sudo-devel-1.8.22-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109638" version="1" class="patch">
	<metadata>
		<title>supportutils-3.1.9-5.24.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19637" ref_url="https://www.suse.com/security/cve/CVE-2018-19637/" source="CVE"/>
		<reference ref_id="CVE-2018-19638" ref_url="https://www.suse.com/security/cve/CVE-2018-19638/" source="CVE"/>
		<reference ref_id="CVE-2018-19639" ref_url="https://www.suse.com/security/cve/CVE-2018-19639/" source="CVE"/>
		<reference ref_id="CVE-2018-19640" ref_url="https://www.suse.com/security/cve/CVE-2018-19640/" source="CVE"/>
		<description>
These are all security issues fixed in the supportutils-3.1.9-5.24.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19637/">CVE-2018-19637</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19638/">CVE-2018-19638</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19639/">CVE-2018-19639</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19640/">CVE-2018-19640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482553" comment="supportutils-3.1.9-5.24.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109639" version="1" class="patch">
	<metadata>
		<title>syslog-service-2.0-2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3634" ref_url="https://www.suse.com/security/cve/CVE-2014-3634/" source="CVE"/>
		<description>
These are all security issues fixed in the syslog-service-2.0-2.23 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3634/">CVE-2014-3634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480939" comment="syslog-service-2.0-2.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109640" version="1" class="patch">
	<metadata>
		<title>sysstat-12.0.2-3.21.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-12.0.2-3.21.18 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482554" comment="sysstat-12.0.2-3.21.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109641" version="1" class="patch">
	<metadata>
		<title>sysvinit-tools-2.88+-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-2483" ref_url="https://www.suse.com/security/cve/CVE-2011-2483/" source="CVE"/>
		<description>
These are all security issues fixed in the sysvinit-tools-2.88+-1.26 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2483/">CVE-2011-2483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480940" comment="sysvinit-tools-2.88+-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480941" comment="whois-5.3.0-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109642" version="1" class="patch">
	<metadata>
		<title>tar-1.30-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-0624" ref_url="https://www.suse.com/security/cve/CVE-2010-0624/" source="CVE"/>
		<reference ref_id="CVE-2016-6321" ref_url="https://www.suse.com/security/cve/CVE-2016-6321/" source="CVE"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<description>
These are all security issues fixed in the tar-1.30-3.3.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0624/">CVE-2010-0624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6321/">CVE-2016-6321</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009481663" comment="tar-1.30-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481664" comment="tar-lang-1.30-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481665" comment="tar-rmt-1.30-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109643" version="1" class="patch">
	<metadata>
		<title>tboot-20170711_1.9.8-13.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-16837" ref_url="https://www.suse.com/security/cve/CVE-2017-16837/" source="CVE"/>
		<description>
These are all security issues fixed in the tboot-20170711_1.9.8-13.34 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16837/">CVE-2017-16837</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482555" comment="tboot-20170711_1.9.8-13.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109644" version="1" class="patch">
	<metadata>
		<title>tcpdump-4.9.2-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8767" ref_url="https://www.suse.com/security/cve/CVE-2014-8767/" source="CVE"/>
		<reference ref_id="CVE-2014-8768" ref_url="https://www.suse.com/security/cve/CVE-2014-8768/" source="CVE"/>
		<reference ref_id="CVE-2014-8769" ref_url="https://www.suse.com/security/cve/CVE-2014-8769/" source="CVE"/>
		<reference ref_id="CVE-2015-0261" ref_url="https://www.suse.com/security/cve/CVE-2015-0261/" source="CVE"/>
		<reference ref_id="CVE-2015-2153" ref_url="https://www.suse.com/security/cve/CVE-2015-2153/" source="CVE"/>
		<reference ref_id="CVE-2015-2154" ref_url="https://www.suse.com/security/cve/CVE-2015-2154/" source="CVE"/>
		<reference ref_id="CVE-2015-2155" ref_url="https://www.suse.com/security/cve/CVE-2015-2155/" source="CVE"/>
		<reference ref_id="CVE-2015-3138" ref_url="https://www.suse.com/security/cve/CVE-2015-3138/" source="CVE"/>
		<reference ref_id="CVE-2016-7922" ref_url="https://www.suse.com/security/cve/CVE-2016-7922/" source="CVE"/>
		<reference ref_id="CVE-2016-7923" ref_url="https://www.suse.com/security/cve/CVE-2016-7923/" source="CVE"/>
		<reference ref_id="CVE-2016-7924" ref_url="https://www.suse.com/security/cve/CVE-2016-7924/" source="CVE"/>
		<reference ref_id="CVE-2016-7925" ref_url="https://www.suse.com/security/cve/CVE-2016-7925/" source="CVE"/>
		<reference ref_id="CVE-2016-7926" ref_url="https://www.suse.com/security/cve/CVE-2016-7926/" source="CVE"/>
		<reference ref_id="CVE-2016-7927" ref_url="https://www.suse.com/security/cve/CVE-2016-7927/" source="CVE"/>
		<reference ref_id="CVE-2016-7928" ref_url="https://www.suse.com/security/cve/CVE-2016-7928/" source="CVE"/>
		<reference ref_id="CVE-2016-7929" ref_url="https://www.suse.com/security/cve/CVE-2016-7929/" source="CVE"/>
		<reference ref_id="CVE-2016-7930" ref_url="https://www.suse.com/security/cve/CVE-2016-7930/" source="CVE"/>
		<reference ref_id="CVE-2016-7931" ref_url="https://www.suse.com/security/cve/CVE-2016-7931/" source="CVE"/>
		<reference ref_id="CVE-2016-7932" ref_url="https://www.suse.com/security/cve/CVE-2016-7932/" source="CVE"/>
		<reference ref_id="CVE-2016-7933" ref_url="https://www.suse.com/security/cve/CVE-2016-7933/" source="CVE"/>
		<reference ref_id="CVE-2016-7934" ref_url="https://www.suse.com/security/cve/CVE-2016-7934/" source="CVE"/>
		<reference ref_id="CVE-2016-7935" ref_url="https://www.suse.com/security/cve/CVE-2016-7935/" source="CVE"/>
		<reference ref_id="CVE-2016-7936" ref_url="https://www.suse.com/security/cve/CVE-2016-7936/" source="CVE"/>
		<reference ref_id="CVE-2016-7937" ref_url="https://www.suse.com/security/cve/CVE-2016-7937/" source="CVE"/>
		<reference ref_id="CVE-2016-7938" ref_url="https://www.suse.com/security/cve/CVE-2016-7938/" source="CVE"/>
		<reference ref_id="CVE-2016-7939" ref_url="https://www.suse.com/security/cve/CVE-2016-7939/" source="CVE"/>
		<reference ref_id="CVE-2016-7940" ref_url="https://www.suse.com/security/cve/CVE-2016-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-7973" ref_url="https://www.suse.com/security/cve/CVE-2016-7973/" source="CVE"/>
		<reference ref_id="CVE-2016-7974" ref_url="https://www.suse.com/security/cve/CVE-2016-7974/" source="CVE"/>
		<reference ref_id="CVE-2016-7975" ref_url="https://www.suse.com/security/cve/CVE-2016-7975/" source="CVE"/>
		<reference ref_id="CVE-2016-7983" ref_url="https://www.suse.com/security/cve/CVE-2016-7983/" source="CVE"/>
		<reference ref_id="CVE-2016-7984" ref_url="https://www.suse.com/security/cve/CVE-2016-7984/" source="CVE"/>
		<reference ref_id="CVE-2016-7985" ref_url="https://www.suse.com/security/cve/CVE-2016-7985/" source="CVE"/>
		<reference ref_id="CVE-2016-7986" ref_url="https://www.suse.com/security/cve/CVE-2016-7986/" source="CVE"/>
		<reference ref_id="CVE-2016-7992" ref_url="https://www.suse.com/security/cve/CVE-2016-7992/" source="CVE"/>
		<reference ref_id="CVE-2016-7993" ref_url="https://www.suse.com/security/cve/CVE-2016-7993/" source="CVE"/>
		<reference ref_id="CVE-2016-8574" ref_url="https://www.suse.com/security/cve/CVE-2016-8574/" source="CVE"/>
		<reference ref_id="CVE-2016-8575" ref_url="https://www.suse.com/security/cve/CVE-2016-8575/" source="CVE"/>
		<reference ref_id="CVE-2017-11108" ref_url="https://www.suse.com/security/cve/CVE-2017-11108/" source="CVE"/>
		<reference ref_id="CVE-2017-11541" ref_url="https://www.suse.com/security/cve/CVE-2017-11541/" source="CVE"/>
		<reference ref_id="CVE-2017-11542" ref_url="https://www.suse.com/security/cve/CVE-2017-11542/" source="CVE"/>
		<reference ref_id="CVE-2017-11543" ref_url="https://www.suse.com/security/cve/CVE-2017-11543/" source="CVE"/>
		<reference ref_id="CVE-2017-12893" ref_url="https://www.suse.com/security/cve/CVE-2017-12893/" source="CVE"/>
		<reference ref_id="CVE-2017-12894" ref_url="https://www.suse.com/security/cve/CVE-2017-12894/" source="CVE"/>
		<reference ref_id="CVE-2017-12895" ref_url="https://www.suse.com/security/cve/CVE-2017-12895/" source="CVE"/>
		<reference ref_id="CVE-2017-12896" ref_url="https://www.suse.com/security/cve/CVE-2017-12896/" source="CVE"/>
		<reference ref_id="CVE-2017-12897" ref_url="https://www.suse.com/security/cve/CVE-2017-12897/" source="CVE"/>
		<reference ref_id="CVE-2017-12898" ref_url="https://www.suse.com/security/cve/CVE-2017-12898/" source="CVE"/>
		<reference ref_id="CVE-2017-12899" ref_url="https://www.suse.com/security/cve/CVE-2017-12899/" source="CVE"/>
		<reference ref_id="CVE-2017-12900" ref_url="https://www.suse.com/security/cve/CVE-2017-12900/" source="CVE"/>
		<reference ref_id="CVE-2017-12901" ref_url="https://www.suse.com/security/cve/CVE-2017-12901/" source="CVE"/>
		<reference ref_id="CVE-2017-12902" ref_url="https://www.suse.com/security/cve/CVE-2017-12902/" source="CVE"/>
		<reference ref_id="CVE-2017-12985" ref_url="https://www.suse.com/security/cve/CVE-2017-12985/" source="CVE"/>
		<reference ref_id="CVE-2017-12986" ref_url="https://www.suse.com/security/cve/CVE-2017-12986/" source="CVE"/>
		<reference ref_id="CVE-2017-12987" ref_url="https://www.suse.com/security/cve/CVE-2017-12987/" source="CVE"/>
		<reference ref_id="CVE-2017-12988" ref_url="https://www.suse.com/security/cve/CVE-2017-12988/" source="CVE"/>
		<reference ref_id="CVE-2017-12989" ref_url="https://www.suse.com/security/cve/CVE-2017-12989/" source="CVE"/>
		<reference ref_id="CVE-2017-12990" ref_url="https://www.suse.com/security/cve/CVE-2017-12990/" source="CVE"/>
		<reference ref_id="CVE-2017-12991" ref_url="https://www.suse.com/security/cve/CVE-2017-12991/" source="CVE"/>
		<reference ref_id="CVE-2017-12992" ref_url="https://www.suse.com/security/cve/CVE-2017-12992/" source="CVE"/>
		<reference ref_id="CVE-2017-12993" ref_url="https://www.suse.com/security/cve/CVE-2017-12993/" source="CVE"/>
		<reference ref_id="CVE-2017-12994" ref_url="https://www.suse.com/security/cve/CVE-2017-12994/" source="CVE"/>
		<reference ref_id="CVE-2017-12995" ref_url="https://www.suse.com/security/cve/CVE-2017-12995/" source="CVE"/>
		<reference ref_id="CVE-2017-12996" ref_url="https://www.suse.com/security/cve/CVE-2017-12996/" source="CVE"/>
		<reference ref_id="CVE-2017-12997" ref_url="https://www.suse.com/security/cve/CVE-2017-12997/" source="CVE"/>
		<reference ref_id="CVE-2017-12998" ref_url="https://www.suse.com/security/cve/CVE-2017-12998/" source="CVE"/>
		<reference ref_id="CVE-2017-12999" ref_url="https://www.suse.com/security/cve/CVE-2017-12999/" source="CVE"/>
		<reference ref_id="CVE-2017-13000" ref_url="https://www.suse.com/security/cve/CVE-2017-13000/" source="CVE"/>
		<reference ref_id="CVE-2017-13001" ref_url="https://www.suse.com/security/cve/CVE-2017-13001/" source="CVE"/>
		<reference ref_id="CVE-2017-13002" ref_url="https://www.suse.com/security/cve/CVE-2017-13002/" source="CVE"/>
		<reference ref_id="CVE-2017-13003" ref_url="https://www.suse.com/security/cve/CVE-2017-13003/" source="CVE"/>
		<reference ref_id="CVE-2017-13004" ref_url="https://www.suse.com/security/cve/CVE-2017-13004/" source="CVE"/>
		<reference ref_id="CVE-2017-13005" ref_url="https://www.suse.com/security/cve/CVE-2017-13005/" source="CVE"/>
		<reference ref_id="CVE-2017-13006" ref_url="https://www.suse.com/security/cve/CVE-2017-13006/" source="CVE"/>
		<reference ref_id="CVE-2017-13007" ref_url="https://www.suse.com/security/cve/CVE-2017-13007/" source="CVE"/>
		<reference ref_id="CVE-2017-13008" ref_url="https://www.suse.com/security/cve/CVE-2017-13008/" source="CVE"/>
		<reference ref_id="CVE-2017-13009" ref_url="https://www.suse.com/security/cve/CVE-2017-13009/" source="CVE"/>
		<reference ref_id="CVE-2017-13010" ref_url="https://www.suse.com/security/cve/CVE-2017-13010/" source="CVE"/>
		<reference ref_id="CVE-2017-13011" ref_url="https://www.suse.com/security/cve/CVE-2017-13011/" source="CVE"/>
		<reference ref_id="CVE-2017-13012" ref_url="https://www.suse.com/security/cve/CVE-2017-13012/" source="CVE"/>
		<reference ref_id="CVE-2017-13013" ref_url="https://www.suse.com/security/cve/CVE-2017-13013/" source="CVE"/>
		<reference ref_id="CVE-2017-13014" ref_url="https://www.suse.com/security/cve/CVE-2017-13014/" source="CVE"/>
		<reference ref_id="CVE-2017-13015" ref_url="https://www.suse.com/security/cve/CVE-2017-13015/" source="CVE"/>
		<reference ref_id="CVE-2017-13016" ref_url="https://www.suse.com/security/cve/CVE-2017-13016/" source="CVE"/>
		<reference ref_id="CVE-2017-13017" ref_url="https://www.suse.com/security/cve/CVE-2017-13017/" source="CVE"/>
		<reference ref_id="CVE-2017-13018" ref_url="https://www.suse.com/security/cve/CVE-2017-13018/" source="CVE"/>
		<reference ref_id="CVE-2017-13019" ref_url="https://www.suse.com/security/cve/CVE-2017-13019/" source="CVE"/>
		<reference ref_id="CVE-2017-13020" ref_url="https://www.suse.com/security/cve/CVE-2017-13020/" source="CVE"/>
		<reference ref_id="CVE-2017-13021" ref_url="https://www.suse.com/security/cve/CVE-2017-13021/" source="CVE"/>
		<reference ref_id="CVE-2017-13022" ref_url="https://www.suse.com/security/cve/CVE-2017-13022/" source="CVE"/>
		<reference ref_id="CVE-2017-13023" ref_url="https://www.suse.com/security/cve/CVE-2017-13023/" source="CVE"/>
		<reference ref_id="CVE-2017-13024" ref_url="https://www.suse.com/security/cve/CVE-2017-13024/" source="CVE"/>
		<reference ref_id="CVE-2017-13025" ref_url="https://www.suse.com/security/cve/CVE-2017-13025/" source="CVE"/>
		<reference ref_id="CVE-2017-13026" ref_url="https://www.suse.com/security/cve/CVE-2017-13026/" source="CVE"/>
		<reference ref_id="CVE-2017-13027" ref_url="https://www.suse.com/security/cve/CVE-2017-13027/" source="CVE"/>
		<reference ref_id="CVE-2017-13028" ref_url="https://www.suse.com/security/cve/CVE-2017-13028/" source="CVE"/>
		<reference ref_id="CVE-2017-13029" ref_url="https://www.suse.com/security/cve/CVE-2017-13029/" source="CVE"/>
		<reference ref_id="CVE-2017-13030" ref_url="https://www.suse.com/security/cve/CVE-2017-13030/" source="CVE"/>
		<reference ref_id="CVE-2017-13031" ref_url="https://www.suse.com/security/cve/CVE-2017-13031/" source="CVE"/>
		<reference ref_id="CVE-2017-13032" ref_url="https://www.suse.com/security/cve/CVE-2017-13032/" source="CVE"/>
		<reference ref_id="CVE-2017-13033" ref_url="https://www.suse.com/security/cve/CVE-2017-13033/" source="CVE"/>
		<reference ref_id="CVE-2017-13034" ref_url="https://www.suse.com/security/cve/CVE-2017-13034/" source="CVE"/>
		<reference ref_id="CVE-2017-13035" ref_url="https://www.suse.com/security/cve/CVE-2017-13035/" source="CVE"/>
		<reference ref_id="CVE-2017-13036" ref_url="https://www.suse.com/security/cve/CVE-2017-13036/" source="CVE"/>
		<reference ref_id="CVE-2017-13037" ref_url="https://www.suse.com/security/cve/CVE-2017-13037/" source="CVE"/>
		<reference ref_id="CVE-2017-13038" ref_url="https://www.suse.com/security/cve/CVE-2017-13038/" source="CVE"/>
		<reference ref_id="CVE-2017-13039" ref_url="https://www.suse.com/security/cve/CVE-2017-13039/" source="CVE"/>
		<reference ref_id="CVE-2017-13040" ref_url="https://www.suse.com/security/cve/CVE-2017-13040/" source="CVE"/>
		<reference ref_id="CVE-2017-13041" ref_url="https://www.suse.com/security/cve/CVE-2017-13041/" source="CVE"/>
		<reference ref_id="CVE-2017-13042" ref_url="https://www.suse.com/security/cve/CVE-2017-13042/" source="CVE"/>
		<reference ref_id="CVE-2017-13043" ref_url="https://www.suse.com/security/cve/CVE-2017-13043/" source="CVE"/>
		<reference ref_id="CVE-2017-13044" ref_url="https://www.suse.com/security/cve/CVE-2017-13044/" source="CVE"/>
		<reference ref_id="CVE-2017-13045" ref_url="https://www.suse.com/security/cve/CVE-2017-13045/" source="CVE"/>
		<reference ref_id="CVE-2017-13046" ref_url="https://www.suse.com/security/cve/CVE-2017-13046/" source="CVE"/>
		<reference ref_id="CVE-2017-13047" ref_url="https://www.suse.com/security/cve/CVE-2017-13047/" source="CVE"/>
		<reference ref_id="CVE-2017-13048" ref_url="https://www.suse.com/security/cve/CVE-2017-13048/" source="CVE"/>
		<reference ref_id="CVE-2017-13049" ref_url="https://www.suse.com/security/cve/CVE-2017-13049/" source="CVE"/>
		<reference ref_id="CVE-2017-13050" ref_url="https://www.suse.com/security/cve/CVE-2017-13050/" source="CVE"/>
		<reference ref_id="CVE-2017-13051" ref_url="https://www.suse.com/security/cve/CVE-2017-13051/" source="CVE"/>
		<reference ref_id="CVE-2017-13052" ref_url="https://www.suse.com/security/cve/CVE-2017-13052/" source="CVE"/>
		<reference ref_id="CVE-2017-13053" ref_url="https://www.suse.com/security/cve/CVE-2017-13053/" source="CVE"/>
		<reference ref_id="CVE-2017-13054" ref_url="https://www.suse.com/security/cve/CVE-2017-13054/" source="CVE"/>
		<reference ref_id="CVE-2017-13055" ref_url="https://www.suse.com/security/cve/CVE-2017-13055/" source="CVE"/>
		<reference ref_id="CVE-2017-13687" ref_url="https://www.suse.com/security/cve/CVE-2017-13687/" source="CVE"/>
		<reference ref_id="CVE-2017-13688" ref_url="https://www.suse.com/security/cve/CVE-2017-13688/" source="CVE"/>
		<reference ref_id="CVE-2017-13689" ref_url="https://www.suse.com/security/cve/CVE-2017-13689/" source="CVE"/>
		<reference ref_id="CVE-2017-13690" ref_url="https://www.suse.com/security/cve/CVE-2017-13690/" source="CVE"/>
		<reference ref_id="CVE-2017-13725" ref_url="https://www.suse.com/security/cve/CVE-2017-13725/" source="CVE"/>
		<reference ref_id="CVE-2017-16808" ref_url="https://www.suse.com/security/cve/CVE-2017-16808/" source="CVE"/>
		<reference ref_id="CVE-2017-5202" ref_url="https://www.suse.com/security/cve/CVE-2017-5202/" source="CVE"/>
		<reference ref_id="CVE-2017-5203" ref_url="https://www.suse.com/security/cve/CVE-2017-5203/" source="CVE"/>
		<reference ref_id="CVE-2017-5204" ref_url="https://www.suse.com/security/cve/CVE-2017-5204/" source="CVE"/>
		<reference ref_id="CVE-2017-5205" ref_url="https://www.suse.com/security/cve/CVE-2017-5205/" source="CVE"/>
		<reference ref_id="CVE-2017-5341" ref_url="https://www.suse.com/security/cve/CVE-2017-5341/" source="CVE"/>
		<reference ref_id="CVE-2017-5342" ref_url="https://www.suse.com/security/cve/CVE-2017-5342/" source="CVE"/>
		<reference ref_id="CVE-2017-5482" ref_url="https://www.suse.com/security/cve/CVE-2017-5482/" source="CVE"/>
		<reference ref_id="CVE-2017-5483" ref_url="https://www.suse.com/security/cve/CVE-2017-5483/" source="CVE"/>
		<reference ref_id="CVE-2017-5484" ref_url="https://www.suse.com/security/cve/CVE-2017-5484/" source="CVE"/>
		<reference ref_id="CVE-2017-5485" ref_url="https://www.suse.com/security/cve/CVE-2017-5485/" source="CVE"/>
		<reference ref_id="CVE-2017-5486" ref_url="https://www.suse.com/security/cve/CVE-2017-5486/" source="CVE"/>
		<reference ref_id="CVE-2018-10103" ref_url="https://www.suse.com/security/cve/CVE-2018-10103/" source="CVE"/>
		<reference ref_id="CVE-2018-10105" ref_url="https://www.suse.com/security/cve/CVE-2018-10105/" source="CVE"/>
		<reference ref_id="CVE-2018-14461" ref_url="https://www.suse.com/security/cve/CVE-2018-14461/" source="CVE"/>
		<reference ref_id="CVE-2018-14462" ref_url="https://www.suse.com/security/cve/CVE-2018-14462/" source="CVE"/>
		<reference ref_id="CVE-2018-14463" ref_url="https://www.suse.com/security/cve/CVE-2018-14463/" source="CVE"/>
		<reference ref_id="CVE-2018-14464" ref_url="https://www.suse.com/security/cve/CVE-2018-14464/" source="CVE"/>
		<reference ref_id="CVE-2018-14465" ref_url="https://www.suse.com/security/cve/CVE-2018-14465/" source="CVE"/>
		<reference ref_id="CVE-2018-14466" ref_url="https://www.suse.com/security/cve/CVE-2018-14466/" source="CVE"/>
		<reference ref_id="CVE-2018-14467" ref_url="https://www.suse.com/security/cve/CVE-2018-14467/" source="CVE"/>
		<reference ref_id="CVE-2018-14468" ref_url="https://www.suse.com/security/cve/CVE-2018-14468/" source="CVE"/>
		<reference ref_id="CVE-2018-14469" ref_url="https://www.suse.com/security/cve/CVE-2018-14469/" source="CVE"/>
		<reference ref_id="CVE-2018-14470" ref_url="https://www.suse.com/security/cve/CVE-2018-14470/" source="CVE"/>
		<reference ref_id="CVE-2018-14879" ref_url="https://www.suse.com/security/cve/CVE-2018-14879/" source="CVE"/>
		<reference ref_id="CVE-2018-14880" ref_url="https://www.suse.com/security/cve/CVE-2018-14880/" source="CVE"/>
		<reference ref_id="CVE-2018-14881" ref_url="https://www.suse.com/security/cve/CVE-2018-14881/" source="CVE"/>
		<reference ref_id="CVE-2018-14882" ref_url="https://www.suse.com/security/cve/CVE-2018-14882/" source="CVE"/>
		<reference ref_id="CVE-2018-16227" ref_url="https://www.suse.com/security/cve/CVE-2018-16227/" source="CVE"/>
		<reference ref_id="CVE-2018-16228" ref_url="https://www.suse.com/security/cve/CVE-2018-16228/" source="CVE"/>
		<reference ref_id="CVE-2018-16229" ref_url="https://www.suse.com/security/cve/CVE-2018-16229/" source="CVE"/>
		<reference ref_id="CVE-2018-16230" ref_url="https://www.suse.com/security/cve/CVE-2018-16230/" source="CVE"/>
		<reference ref_id="CVE-2018-16300" ref_url="https://www.suse.com/security/cve/CVE-2018-16300/" source="CVE"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="CVE-2018-16451" ref_url="https://www.suse.com/security/cve/CVE-2018-16451/" source="CVE"/>
		<reference ref_id="CVE-2018-16452" ref_url="https://www.suse.com/security/cve/CVE-2018-16452/" source="CVE"/>
		<reference ref_id="CVE-2018-19519" ref_url="https://www.suse.com/security/cve/CVE-2018-19519/" source="CVE"/>
		<reference ref_id="CVE-2019-1010220" ref_url="https://www.suse.com/security/cve/CVE-2019-1010220/" source="CVE"/>
		<reference ref_id="CVE-2019-15166" ref_url="https://www.suse.com/security/cve/CVE-2019-15166/" source="CVE"/>
		<reference ref_id="CVE-2019-15167" ref_url="https://www.suse.com/security/cve/CVE-2019-15167/" source="CVE"/>
		<description>
These are all security issues fixed in the tcpdump-4.9.2-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8767/">CVE-2014-8767</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8768/">CVE-2014-8768</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8769/">CVE-2014-8769</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0261/">CVE-2015-0261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2153/">CVE-2015-2153</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2154/">CVE-2015-2154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2155/">CVE-2015-2155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3138/">CVE-2015-3138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7922/">CVE-2016-7922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7923/">CVE-2016-7923</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7924/">CVE-2016-7924</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7925/">CVE-2016-7925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7926/">CVE-2016-7926</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7927/">CVE-2016-7927</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7928/">CVE-2016-7928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7929/">CVE-2016-7929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7930/">CVE-2016-7930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7931/">CVE-2016-7931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7932/">CVE-2016-7932</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7933/">CVE-2016-7933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7934/">CVE-2016-7934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7935/">CVE-2016-7935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7936/">CVE-2016-7936</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7937/">CVE-2016-7937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7938/">CVE-2016-7938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7939/">CVE-2016-7939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7940/">CVE-2016-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7973/">CVE-2016-7973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7974/">CVE-2016-7974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7975/">CVE-2016-7975</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7983/">CVE-2016-7983</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7984/">CVE-2016-7984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7985/">CVE-2016-7985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7986/">CVE-2016-7986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7992/">CVE-2016-7992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7993/">CVE-2016-7993</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8574/">CVE-2016-8574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8575/">CVE-2016-8575</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11108/">CVE-2017-11108</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11541/">CVE-2017-11541</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11542/">CVE-2017-11542</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11543/">CVE-2017-11543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12893/">CVE-2017-12893</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12894/">CVE-2017-12894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12895/">CVE-2017-12895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12896/">CVE-2017-12896</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12897/">CVE-2017-12897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12898/">CVE-2017-12898</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12899/">CVE-2017-12899</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12900/">CVE-2017-12900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12901/">CVE-2017-12901</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12902/">CVE-2017-12902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12985/">CVE-2017-12985</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12986/">CVE-2017-12986</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12987/">CVE-2017-12987</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12988/">CVE-2017-12988</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12989/">CVE-2017-12989</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12990/">CVE-2017-12990</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12991/">CVE-2017-12991</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12992/">CVE-2017-12992</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12993/">CVE-2017-12993</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12994/">CVE-2017-12994</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12995/">CVE-2017-12995</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12996/">CVE-2017-12996</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12997/">CVE-2017-12997</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12998/">CVE-2017-12998</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12999/">CVE-2017-12999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13000/">CVE-2017-13000</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13001/">CVE-2017-13001</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13002/">CVE-2017-13002</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13003/">CVE-2017-13003</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13004/">CVE-2017-13004</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13005/">CVE-2017-13005</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13006/">CVE-2017-13006</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13007/">CVE-2017-13007</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13008/">CVE-2017-13008</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13009/">CVE-2017-13009</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13010/">CVE-2017-13010</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13011/">CVE-2017-13011</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13012/">CVE-2017-13012</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13013/">CVE-2017-13013</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13014/">CVE-2017-13014</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13015/">CVE-2017-13015</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13016/">CVE-2017-13016</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13017/">CVE-2017-13017</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13018/">CVE-2017-13018</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13019/">CVE-2017-13019</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13020/">CVE-2017-13020</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13021/">CVE-2017-13021</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13022/">CVE-2017-13022</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13023/">CVE-2017-13023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13024/">CVE-2017-13024</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13025/">CVE-2017-13025</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13026/">CVE-2017-13026</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13027/">CVE-2017-13027</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13028/">CVE-2017-13028</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13029/">CVE-2017-13029</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13030/">CVE-2017-13030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13031/">CVE-2017-13031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13032/">CVE-2017-13032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13033/">CVE-2017-13033</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13034/">CVE-2017-13034</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13035/">CVE-2017-13035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13036/">CVE-2017-13036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13037/">CVE-2017-13037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13038/">CVE-2017-13038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13039/">CVE-2017-13039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13040/">CVE-2017-13040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13041/">CVE-2017-13041</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13042/">CVE-2017-13042</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13043/">CVE-2017-13043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13044/">CVE-2017-13044</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13045/">CVE-2017-13045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13046/">CVE-2017-13046</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13047/">CVE-2017-13047</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13048/">CVE-2017-13048</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13049/">CVE-2017-13049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13050/">CVE-2017-13050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13051/">CVE-2017-13051</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13052/">CVE-2017-13052</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13053/">CVE-2017-13053</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13054/">CVE-2017-13054</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13055/">CVE-2017-13055</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13687/">CVE-2017-13687</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13688/">CVE-2017-13688</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13689/">CVE-2017-13689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13690/">CVE-2017-13690</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13725/">CVE-2017-13725</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16808/">CVE-2017-16808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5202/">CVE-2017-5202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5203/">CVE-2017-5203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5204/">CVE-2017-5204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5205/">CVE-2017-5205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5341/">CVE-2017-5341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5342/">CVE-2017-5342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5482/">CVE-2017-5482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5483/">CVE-2017-5483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5484/">CVE-2017-5484</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5485/">CVE-2017-5485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5486/">CVE-2017-5486</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10103/">CVE-2018-10103</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10105/">CVE-2018-10105</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14461/">CVE-2018-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14462/">CVE-2018-14462</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14463/">CVE-2018-14463</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14464/">CVE-2018-14464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14465/">CVE-2018-14465</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14466/">CVE-2018-14466</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14467/">CVE-2018-14467</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14468/">CVE-2018-14468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14469/">CVE-2018-14469</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14470/">CVE-2018-14470</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-14879/">CVE-2018-14879</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14880/">CVE-2018-14880</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14881/">CVE-2018-14881</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14882/">CVE-2018-14882</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16227/">CVE-2018-16227</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16228/">CVE-2018-16228</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16229/">CVE-2018-16229</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16230/">CVE-2018-16230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16300/">CVE-2018-16300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16451/">CVE-2018-16451</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16452/">CVE-2018-16452</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19519/">CVE-2018-19519</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1010220/">CVE-2019-1010220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15166/">CVE-2019-15166</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15167/">CVE-2019-15167</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482556" comment="tcpdump-4.9.2-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109645" version="1" class="patch">
	<metadata>
		<title>tpm2.0-tools-4.1-1.57 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7524" ref_url="https://www.suse.com/security/cve/CVE-2017-7524/" source="CVE"/>
		<description>
These are all security issues fixed in the tpm2.0-tools-4.1-1.57 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7524/">CVE-2017-7524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482557" comment="tpm2.0-tools-4.1-1.57 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109646" version="1" class="patch">
	<metadata>
		<title>u-boot-rpiarm64-2020.01-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-18439" ref_url="https://www.suse.com/security/cve/CVE-2018-18439/" source="CVE"/>
		<reference ref_id="CVE-2018-18440" ref_url="https://www.suse.com/security/cve/CVE-2018-18440/" source="CVE"/>
		<description>
These are all security issues fixed in the u-boot-rpiarm64-2020.01-8.3 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18439/">CVE-2018-18439</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18440/">CVE-2018-18440</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482558" comment="u-boot-rpiarm64-2020.01-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482559" comment="u-boot-rpiarm64-doc-2020.01-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482560" comment="u-boot-tools-2020.01-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109647" version="1" class="patch">
	<metadata>
		<title>ucode-intel-20200602-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3640" ref_url="https://www.suse.com/security/cve/CVE-2018-3640/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-11139" ref_url="https://www.suse.com/security/cve/CVE-2019-11139/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-0548" ref_url="https://www.suse.com/security/cve/CVE-2020-0548/" source="CVE"/>
		<reference ref_id="CVE-2020-0549" ref_url="https://www.suse.com/security/cve/CVE-2020-0549/" source="CVE"/>
		<description>
These are all security issues fixed in the ucode-intel-20200602-1.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3640/">CVE-2018-3640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11139/">CVE-2019-11139</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0548/">CVE-2020-0548</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0549/">CVE-2020-0549</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482561" comment="ucode-intel-20200602-1.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109648" version="1" class="patch">
	<metadata>
		<title>unixODBC-2.3.6-1.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-1145" ref_url="https://www.suse.com/security/cve/CVE-2011-1145/" source="CVE"/>
		<reference ref_id="CVE-2018-7409" ref_url="https://www.suse.com/security/cve/CVE-2018-7409/" source="CVE"/>
		<reference ref_id="CVE-2018-7485" ref_url="https://www.suse.com/security/cve/CVE-2018-7485/" source="CVE"/>
		<description>
These are all security issues fixed in the unixODBC-2.3.6-1.12 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1145/">CVE-2011-1145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7409/">CVE-2018-7409</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7485/">CVE-2018-7485</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480950" comment="unixODBC-2.3.6-1.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480951" comment="unixODBC-devel-2.3.6-1.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109649" version="1" class="patch">
	<metadata>
		<title>unzip-6.00-4.8.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8139" ref_url="https://www.suse.com/security/cve/CVE-2014-8139/" source="CVE"/>
		<reference ref_id="CVE-2014-8140" ref_url="https://www.suse.com/security/cve/CVE-2014-8140/" source="CVE"/>
		<reference ref_id="CVE-2014-8141" ref_url="https://www.suse.com/security/cve/CVE-2014-8141/" source="CVE"/>
		<reference ref_id="CVE-2014-9636" ref_url="https://www.suse.com/security/cve/CVE-2014-9636/" source="CVE"/>
		<reference ref_id="CVE-2014-9913" ref_url="https://www.suse.com/security/cve/CVE-2014-9913/" source="CVE"/>
		<reference ref_id="CVE-2015-7696" ref_url="https://www.suse.com/security/cve/CVE-2015-7696/" source="CVE"/>
		<reference ref_id="CVE-2015-7697" ref_url="https://www.suse.com/security/cve/CVE-2015-7697/" source="CVE"/>
		<reference ref_id="CVE-2016-9844" ref_url="https://www.suse.com/security/cve/CVE-2016-9844/" source="CVE"/>
		<reference ref_id="CVE-2018-1000035" ref_url="https://www.suse.com/security/cve/CVE-2018-1000035/" source="CVE"/>
		<reference ref_id="CVE-2018-18384" ref_url="https://www.suse.com/security/cve/CVE-2018-18384/" source="CVE"/>
		<description>
These are all security issues fixed in the unzip-6.00-4.8.13 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8139/">CVE-2014-8139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8140/">CVE-2014-8140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8141/">CVE-2014-8141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9636/">CVE-2014-9636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9913/">CVE-2014-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7696/">CVE-2015-7696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7697/">CVE-2015-7697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9844/">CVE-2016-9844</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000035/">CVE-2018-1000035</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18384/">CVE-2018-18384</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481670" comment="unzip-6.00-4.8.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109650" version="1" class="patch">
	<metadata>
		<title>update-alternatives-1.19.0.4-2.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the update-alternatives-1.19.0.4-2.48 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480953" comment="update-alternatives-1.19.0.4-2.48 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109651" version="1" class="patch">
	<metadata>
		<title>vim-8.0.1568-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
These are all security issues fixed in the vim-8.0.1568-5.3.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482562" comment="vim-8.0.1568-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482563" comment="vim-data-8.0.1568-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482564" comment="vim-data-common-8.0.1568-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109652" version="1" class="patch">
	<metadata>
		<title>w3m-0.5.3+git20180125-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2074" ref_url="https://www.suse.com/security/cve/CVE-2010-2074/" source="CVE"/>
		<reference ref_id="CVE-2012-4929" ref_url="https://www.suse.com/security/cve/CVE-2012-4929/" source="CVE"/>
		<reference ref_id="CVE-2016-9434" ref_url="https://www.suse.com/security/cve/CVE-2016-9434/" source="CVE"/>
		<reference ref_id="CVE-2016-9435" ref_url="https://www.suse.com/security/cve/CVE-2016-9435/" source="CVE"/>
		<reference ref_id="CVE-2016-9436" ref_url="https://www.suse.com/security/cve/CVE-2016-9436/" source="CVE"/>
		<reference ref_id="CVE-2016-9437" ref_url="https://www.suse.com/security/cve/CVE-2016-9437/" source="CVE"/>
		<reference ref_id="CVE-2016-9438" ref_url="https://www.suse.com/security/cve/CVE-2016-9438/" source="CVE"/>
		<reference ref_id="CVE-2016-9439" ref_url="https://www.suse.com/security/cve/CVE-2016-9439/" source="CVE"/>
		<reference ref_id="CVE-2016-9440" ref_url="https://www.suse.com/security/cve/CVE-2016-9440/" source="CVE"/>
		<reference ref_id="CVE-2016-9441" ref_url="https://www.suse.com/security/cve/CVE-2016-9441/" source="CVE"/>
		<reference ref_id="CVE-2016-9442" ref_url="https://www.suse.com/security/cve/CVE-2016-9442/" source="CVE"/>
		<reference ref_id="CVE-2016-9443" ref_url="https://www.suse.com/security/cve/CVE-2016-9443/" source="CVE"/>
		<reference ref_id="CVE-2016-9621" ref_url="https://www.suse.com/security/cve/CVE-2016-9621/" source="CVE"/>
		<reference ref_id="CVE-2016-9622" ref_url="https://www.suse.com/security/cve/CVE-2016-9622/" source="CVE"/>
		<reference ref_id="CVE-2016-9623" ref_url="https://www.suse.com/security/cve/CVE-2016-9623/" source="CVE"/>
		<reference ref_id="CVE-2016-9624" ref_url="https://www.suse.com/security/cve/CVE-2016-9624/" source="CVE"/>
		<reference ref_id="CVE-2016-9625" ref_url="https://www.suse.com/security/cve/CVE-2016-9625/" source="CVE"/>
		<reference ref_id="CVE-2016-9626" ref_url="https://www.suse.com/security/cve/CVE-2016-9626/" source="CVE"/>
		<reference ref_id="CVE-2016-9627" ref_url="https://www.suse.com/security/cve/CVE-2016-9627/" source="CVE"/>
		<reference ref_id="CVE-2016-9628" ref_url="https://www.suse.com/security/cve/CVE-2016-9628/" source="CVE"/>
		<reference ref_id="CVE-2016-9629" ref_url="https://www.suse.com/security/cve/CVE-2016-9629/" source="CVE"/>
		<reference ref_id="CVE-2016-9630" ref_url="https://www.suse.com/security/cve/CVE-2016-9630/" source="CVE"/>
		<reference ref_id="CVE-2016-9631" ref_url="https://www.suse.com/security/cve/CVE-2016-9631/" source="CVE"/>
		<reference ref_id="CVE-2016-9632" ref_url="https://www.suse.com/security/cve/CVE-2016-9632/" source="CVE"/>
		<reference ref_id="CVE-2016-9633" ref_url="https://www.suse.com/security/cve/CVE-2016-9633/" source="CVE"/>
		<reference ref_id="CVE-2018-6196" ref_url="https://www.suse.com/security/cve/CVE-2018-6196/" source="CVE"/>
		<reference ref_id="CVE-2018-6197" ref_url="https://www.suse.com/security/cve/CVE-2018-6197/" source="CVE"/>
		<reference ref_id="CVE-2018-6198" ref_url="https://www.suse.com/security/cve/CVE-2018-6198/" source="CVE"/>
		<description>
These are all security issues fixed in the w3m-0.5.3+git20180125-1.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2074/">CVE-2010-2074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4929/">CVE-2012-4929</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9434/">CVE-2016-9434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9435/">CVE-2016-9435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9436/">CVE-2016-9436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9437/">CVE-2016-9437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9438/">CVE-2016-9438</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9439/">CVE-2016-9439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9440/">CVE-2016-9440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9441/">CVE-2016-9441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9442/">CVE-2016-9442</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9443/">CVE-2016-9443</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9621/">CVE-2016-9621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9622/">CVE-2016-9622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9623/">CVE-2016-9623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9624/">CVE-2016-9624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9625/">CVE-2016-9625</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9626/">CVE-2016-9626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9627/">CVE-2016-9627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9628/">CVE-2016-9628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9629/">CVE-2016-9629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9630/">CVE-2016-9630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9631/">CVE-2016-9631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9632/">CVE-2016-9632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9633/">CVE-2016-9633</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6196/">CVE-2018-6196</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6197/">CVE-2018-6197</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-6198/">CVE-2018-6198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480957" comment="w3m-0.5.3+git20180125-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109653" version="1" class="patch">
	<metadata>
		<title>wget-1.20.3-3.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4877" ref_url="https://www.suse.com/security/cve/CVE-2014-4877/" source="CVE"/>
		<reference ref_id="CVE-2015-7665" ref_url="https://www.suse.com/security/cve/CVE-2015-7665/" source="CVE"/>
		<reference ref_id="CVE-2016-4971" ref_url="https://www.suse.com/security/cve/CVE-2016-4971/" source="CVE"/>
		<reference ref_id="CVE-2017-13089" ref_url="https://www.suse.com/security/cve/CVE-2017-13089/" source="CVE"/>
		<reference ref_id="CVE-2017-13090" ref_url="https://www.suse.com/security/cve/CVE-2017-13090/" source="CVE"/>
		<reference ref_id="CVE-2017-6508" ref_url="https://www.suse.com/security/cve/CVE-2017-6508/" source="CVE"/>
		<reference ref_id="CVE-2018-0494" ref_url="https://www.suse.com/security/cve/CVE-2018-0494/" source="CVE"/>
		<reference ref_id="CVE-2018-20483" ref_url="https://www.suse.com/security/cve/CVE-2018-20483/" source="CVE"/>
		<reference ref_id="CVE-2019-5953" ref_url="https://www.suse.com/security/cve/CVE-2019-5953/" source="CVE"/>
		<description>
These are all security issues fixed in the wget-1.20.3-3.9.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-4877/">CVE-2014-4877</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7665/">CVE-2015-7665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4971/">CVE-2016-4971</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13089/">CVE-2017-13089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13090/">CVE-2017-13090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6508/">CVE-2017-6508</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-0494/">CVE-2018-0494</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20483/">CVE-2018-20483</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5953/">CVE-2019-5953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482565" comment="wget-1.20.3-3.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109654" version="1" class="patch">
	<metadata>
		<title>wicked-0.6.63-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-18902" ref_url="https://www.suse.com/security/cve/CVE-2019-18902/" source="CVE"/>
		<reference ref_id="CVE-2019-18903" ref_url="https://www.suse.com/security/cve/CVE-2019-18903/" source="CVE"/>
		<reference ref_id="CVE-2020-7216" ref_url="https://www.suse.com/security/cve/CVE-2020-7216/" source="CVE"/>
		<reference ref_id="CVE-2020-7217" ref_url="https://www.suse.com/security/cve/CVE-2020-7217/" source="CVE"/>
		<description>
These are all security issues fixed in the wicked-0.6.63-1.19 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18902/">CVE-2019-18902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18903/">CVE-2019-18903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7216/">CVE-2020-7216</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7217/">CVE-2020-7217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482566" comment="wicked-0.6.63-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482567" comment="wicked-service-0.6.63-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109655" version="1" class="patch">
	<metadata>
		<title>wpa_supplicant-2.6-4.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3686" ref_url="https://www.suse.com/security/cve/CVE-2014-3686/" source="CVE"/>
		<reference ref_id="CVE-2015-1863" ref_url="https://www.suse.com/security/cve/CVE-2015-1863/" source="CVE"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-4144" ref_url="https://www.suse.com/security/cve/CVE-2015-4144/" source="CVE"/>
		<reference ref_id="CVE-2015-4145" ref_url="https://www.suse.com/security/cve/CVE-2015-4145/" source="CVE"/>
		<reference ref_id="CVE-2015-4146" ref_url="https://www.suse.com/security/cve/CVE-2015-4146/" source="CVE"/>
		<reference ref_id="CVE-2015-5310" ref_url="https://www.suse.com/security/cve/CVE-2015-5310/" source="CVE"/>
		<reference ref_id="CVE-2015-5315" ref_url="https://www.suse.com/security/cve/CVE-2015-5315/" source="CVE"/>
		<reference ref_id="CVE-2015-5316" ref_url="https://www.suse.com/security/cve/CVE-2015-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-4476" ref_url="https://www.suse.com/security/cve/CVE-2016-4476/" source="CVE"/>
		<reference ref_id="CVE-2016-4477" ref_url="https://www.suse.com/security/cve/CVE-2016-4477/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<description>
These are all security issues fixed in the wpa_supplicant-2.6-4.17.1 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3686/">CVE-2014-3686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1863/">CVE-2015-1863</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4144/">CVE-2015-4144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4145/">CVE-2015-4145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4146/">CVE-2015-4146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5310/">CVE-2015-5310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5315/">CVE-2015-5315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5316/">CVE-2015-5316</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4476/">CVE-2016-4476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4477/">CVE-2016-4477</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482568" comment="wpa_supplicant-2.6-4.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109656" version="1" class="patch">
	<metadata>
		<title>xalan-j2-2.7.2-9.64 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0107" ref_url="https://www.suse.com/security/cve/CVE-2014-0107/" source="CVE"/>
		<description>
These are all security issues fixed in the xalan-j2-2.7.2-9.64 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0107/">CVE-2014-0107</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482569" comment="xalan-j2-2.7.2-9.64 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109657" version="1" class="patch">
	<metadata>
		<title>xdg-utils-1.1.3+20190413-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-18266" ref_url="https://www.suse.com/security/cve/CVE-2017-18266/" source="CVE"/>
		<description>
These are all security issues fixed in the xdg-utils-1.1.3+20190413-1.24 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18266/">CVE-2017-18266</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482570" comment="xdg-utils-1.1.3+20190413-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109658" version="1" class="patch">
	<metadata>
		<title>xen-libs-4.13.1_02-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-libs-4.13.1_02-1.2 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482571" comment="xen-libs-4.13.1_02-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482572" comment="xen-tools-domU-4.13.1_02-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109659" version="1" class="patch">
	<metadata>
		<title>xorg-x11-7.6_1-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-0465" ref_url="https://www.suse.com/security/cve/CVE-2011-0465/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-7.6_1-1.22 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0465/">CVE-2011-0465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480964" comment="xorg-x11-7.6_1-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480965" comment="xorg-x11-essentials-7.6_1-1.22 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481675" comment="xrdb-1.1.0-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109660" version="1" class="patch">
	<metadata>
		<title>xorg-x11-devel-7.6.1-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-2895" ref_url="https://www.suse.com/security/cve/CVE-2011-2895/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-devel-7.6.1-1.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2895/">CVE-2011-2895</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480967" comment="xorg-x11-devel-7.6.1-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480968" comment="xorg-x11-libs-7.6.1-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109661" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-1.20.3-20.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-1.20.3-20.11 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482573" comment="xorg-x11-server-1.20.3-20.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482574" comment="xorg-x11-server-extra-1.20.3-20.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109662" version="1" class="patch">
	<metadata>
		<title>xscreensaver-5.37-3.51 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8025" ref_url="https://www.suse.com/security/cve/CVE-2015-8025/" source="CVE"/>
		<description>
These are all security issues fixed in the xscreensaver-5.37-3.51 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8025/">CVE-2015-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009480971" comment="xscreensaver-5.37-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480972" comment="xscreensaver-data-5.37-3.51 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480973" comment="xscreensaver-lang-5.37-3.51 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109663" version="1" class="patch">
	<metadata>
		<title>yast2-buildtools-4.2.5-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-17042" ref_url="https://www.suse.com/security/cve/CVE-2017-17042/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-buildtools-4.2.5-1.45 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17042/">CVE-2017-17042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482575" comment="yast2-buildtools-4.2.5-1.45 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482576" comment="yast2-devtools-4.2.5-1.45 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109664" version="1" class="patch">
	<metadata>
		<title>yast2-multipath-4.2.1-1.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-17955" ref_url="https://www.suse.com/security/cve/CVE-2018-17955/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-multipath-4.2.1-1.74 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17955/">CVE-2018-17955</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482577" comment="yast2-multipath-4.2.1-1.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109665" version="1" class="patch">
	<metadata>
		<title>yast2-security-4.2.12-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-3700" ref_url="https://www.suse.com/security/cve/CVE-2019-3700/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-security-4.2.12-1.27 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3700/">CVE-2019-3700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482578" comment="yast2-security-4.2.12-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109666" version="1" class="patch">
	<metadata>
		<title>yast2-users-4.2.11-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1601" ref_url="https://www.suse.com/security/cve/CVE-2016-1601/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-users-4.2.11-1.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1601/">CVE-2016-1601</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482579" comment="yast2-users-4.2.11-1.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109667" version="1" class="patch">
	<metadata>
		<title>yubikey-manager-2.1.0-1.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-15631" ref_url="https://www.suse.com/security/cve/CVE-2017-15631/" source="CVE"/>
		<description>
These are all security issues fixed in the yubikey-manager-2.1.0-1.10 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-15631/">CVE-2017-15631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481682" comment="yubikey-manager-2.1.0-1.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109668" version="1" class="patch">
	<metadata>
		<title>zoo-2.10-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2006-0855" ref_url="https://www.suse.com/security/cve/CVE-2006-0855/" source="CVE"/>
		<reference ref_id="CVE-2007-1669" ref_url="https://www.suse.com/security/cve/CVE-2007-1669/" source="CVE"/>
		<description>
These are all security issues fixed in the zoo-2.10-1.29 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-0855/">CVE-2006-0855</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2007-1669/">CVE-2007-1669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480979" comment="zoo-2.10-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109669" version="1" class="patch">
	<metadata>
		<title>zsh-5.6-5.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-0502" ref_url="https://www.suse.com/security/cve/CVE-2018-0502/" source="CVE"/>
		<reference ref_id="CVE-2018-1071" ref_url="https://www.suse.com/security/cve/CVE-2018-1071/" source="CVE"/>
		<reference ref_id="CVE-2018-1083" ref_url="https://www.suse.com/security/cve/CVE-2018-1083/" source="CVE"/>
		<reference ref_id="CVE-2018-1100" ref_url="https://www.suse.com/security/cve/CVE-2018-1100/" source="CVE"/>
		<reference ref_id="CVE-2018-13259" ref_url="https://www.suse.com/security/cve/CVE-2018-13259/" source="CVE"/>
		<description>
These are all security issues fixed in the zsh-5.6-5.17 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-0502/">CVE-2018-0502</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1071/">CVE-2018-1071</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1083/">CVE-2018-1083</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1100/">CVE-2018-1100</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13259/">CVE-2018-13259</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009481683" comment="zsh-5.6-5.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109670" version="1" class="patch">
	<metadata>
		<title>zypper-1.14.36-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7436" ref_url="https://www.suse.com/security/cve/CVE-2017-7436/" source="CVE"/>
		<reference ref_id="CVE-2017-9269" ref_url="https://www.suse.com/security/cve/CVE-2017-9269/" source="CVE"/>
		<description>
These are all security issues fixed in the zypper-1.14.36-1.16 package on the GA media of SUSE Linux Enterprise Module for Basesystem 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7436/">CVE-2017-7436</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2017-9269/">CVE-2017-9269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482580" comment="zypper-1.14.36-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482581" comment="zypper-log-1.14.36-1.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482582" comment="zypper-needs-restarting-1.14.36-1.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109671" version="1" class="patch">
	<metadata>
		<title>buildah-1.7.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<description>
These are all security issues fixed in the buildah-1.7.1-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482595" comment="buildah-1.7.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109672" version="1" class="patch">
	<metadata>
		<title>containerd-1.2.10-5.19.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
These are all security issues fixed in the containerd-1.2.10-5.19.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482596" comment="containerd-1.2.10-5.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109673" version="1" class="patch">
	<metadata>
		<title>docker-19.03.5_ce-6.31.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-5277" ref_url="https://www.suse.com/security/cve/CVE-2014-5277/" source="CVE"/>
		<reference ref_id="CVE-2014-6407" ref_url="https://www.suse.com/security/cve/CVE-2014-6407/" source="CVE"/>
		<reference ref_id="CVE-2014-6408" ref_url="https://www.suse.com/security/cve/CVE-2014-6408/" source="CVE"/>
		<reference ref_id="CVE-2014-8178" ref_url="https://www.suse.com/security/cve/CVE-2014-8178/" source="CVE"/>
		<reference ref_id="CVE-2014-8179" ref_url="https://www.suse.com/security/cve/CVE-2014-8179/" source="CVE"/>
		<reference ref_id="CVE-2014-9356" ref_url="https://www.suse.com/security/cve/CVE-2014-9356/" source="CVE"/>
		<reference ref_id="CVE-2014-9357" ref_url="https://www.suse.com/security/cve/CVE-2014-9357/" source="CVE"/>
		<reference ref_id="CVE-2014-9358" ref_url="https://www.suse.com/security/cve/CVE-2014-9358/" source="CVE"/>
		<reference ref_id="CVE-2015-3627" ref_url="https://www.suse.com/security/cve/CVE-2015-3627/" source="CVE"/>
		<reference ref_id="CVE-2015-3629" ref_url="https://www.suse.com/security/cve/CVE-2015-3629/" source="CVE"/>
		<reference ref_id="CVE-2015-3630" ref_url="https://www.suse.com/security/cve/CVE-2015-3630/" source="CVE"/>
		<reference ref_id="CVE-2015-3631" ref_url="https://www.suse.com/security/cve/CVE-2015-3631/" source="CVE"/>
		<reference ref_id="CVE-2016-3697" ref_url="https://www.suse.com/security/cve/CVE-2016-3697/" source="CVE"/>
		<reference ref_id="CVE-2016-8867" ref_url="https://www.suse.com/security/cve/CVE-2016-8867/" source="CVE"/>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2017-16539" ref_url="https://www.suse.com/security/cve/CVE-2017-16539/" source="CVE"/>
		<reference ref_id="CVE-2018-10892" ref_url="https://www.suse.com/security/cve/CVE-2018-10892/" source="CVE"/>
		<reference ref_id="CVE-2018-15664" ref_url="https://www.suse.com/security/cve/CVE-2018-15664/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2018-20699" ref_url="https://www.suse.com/security/cve/CVE-2018-20699/" source="CVE"/>
		<reference ref_id="CVE-2019-13509" ref_url="https://www.suse.com/security/cve/CVE-2019-13509/" source="CVE"/>
		<reference ref_id="CVE-2019-14271" ref_url="https://www.suse.com/security/cve/CVE-2019-14271/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-19.03.5_ce-6.31.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5277/">CVE-2014-5277</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6407/">CVE-2014-6407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6408/">CVE-2014-6408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8178/">CVE-2014-8178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8179/">CVE-2014-8179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9356/">CVE-2014-9356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9357/">CVE-2014-9357</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9358/">CVE-2014-9358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3627/">CVE-2015-3627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3629/">CVE-2015-3629</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3630/">CVE-2015-3630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3631/">CVE-2015-3631</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3697/">CVE-2016-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8867/">CVE-2016-8867</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-16539/">CVE-2017-16539</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10892/">CVE-2018-10892</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15664/">CVE-2018-15664</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20699/">CVE-2018-20699</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13509/">CVE-2019-13509</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14271/">CVE-2019-14271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482597" comment="docker-19.03.5_ce-6.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482598" comment="docker-bash-completion-19.03.5_ce-6.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109674" version="1" class="patch">
	<metadata>
		<title>docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-4.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-4.18.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482599" comment="docker-libnetwork-0.7.0.1+gitr2877_3eb39382bfa6-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482600" comment="helm-mirror-0.3.0-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109675" version="1" class="patch">
	<metadata>
		<title>docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-6.35.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9962" ref_url="https://www.suse.com/security/cve/CVE-2016-9962/" source="CVE"/>
		<reference ref_id="CVE-2018-16873" ref_url="https://www.suse.com/security/cve/CVE-2018-16873/" source="CVE"/>
		<reference ref_id="CVE-2018-16874" ref_url="https://www.suse.com/security/cve/CVE-2018-16874/" source="CVE"/>
		<reference ref_id="CVE-2018-16875" ref_url="https://www.suse.com/security/cve/CVE-2018-16875/" source="CVE"/>
		<reference ref_id="CVE-2019-16884" ref_url="https://www.suse.com/security/cve/CVE-2019-16884/" source="CVE"/>
		<reference ref_id="CVE-2019-19921" ref_url="https://www.suse.com/security/cve/CVE-2019-19921/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
These are all security issues fixed in the docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-6.35.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9962/">CVE-2016-9962</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16873/">CVE-2018-16873</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-16874/">CVE-2018-16874</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16875/">CVE-2018-16875</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16884/">CVE-2019-16884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19921/">CVE-2019-19921</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482601" comment="docker-runc-1.0.0rc8+gitr3917_3e425f80a8c9-6.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482602" comment="runc-1.0.0~rc10-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109676" version="1" class="patch">
	<metadata>
		<title>podman-1.8.0-4.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10856" ref_url="https://www.suse.com/security/cve/CVE-2018-10856/" source="CVE"/>
		<reference ref_id="CVE-2019-10152" ref_url="https://www.suse.com/security/cve/CVE-2019-10152/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<description>
These are all security issues fixed in the podman-1.8.0-4.20.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10856/">CVE-2018-10856</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10152/">CVE-2019-10152</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482603" comment="podman-1.8.0-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482604" comment="podman-cni-config-1.8.0-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109677" version="1" class="patch">
	<metadata>
		<title>slirp4netns-0.4.5-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<description>
These are all security issues fixed in the slirp4netns-0.4.5-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Containers 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482605" comment="slirp4netns-0.4.5-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109678" version="1" class="patch">
	<metadata>
		<title>ImageMagick-7.0.7.34-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624/" source="CVE"/>
		<reference ref_id="CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136/" source="CVE"/>
		<reference ref_id="CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298/" source="CVE"/>
		<reference ref_id="CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302/" source="CVE"/>
		<reference ref_id="CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303/" source="CVE"/>
		<reference ref_id="CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304/" source="CVE"/>
		<reference ref_id="CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7396" ref_url="https://www.suse.com/security/cve/CVE-2019-7396/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
These are all security issues fixed in the ImageMagick-7.0.7.34-8.3 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7396/">CVE-2019-7396</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487172" comment="ImageMagick-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487173" comment="ImageMagick-config-7-SUSE-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487174" comment="ImageMagick-devel-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487175" comment="libMagick++-7_Q16HDRI4-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487176" comment="libMagick++-devel-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487177" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-8.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487178" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-8.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109679" version="1" class="patch">
	<metadata>
		<title>MozillaFirefox-68.8.0-3.87.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2012-2808" ref_url="https://www.suse.com/security/cve/CVE-2012-2808/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1588" ref_url="https://www.suse.com/security/cve/CVE-2014-1588/" source="CVE"/>
		<reference ref_id="CVE-2014-1589" ref_url="https://www.suse.com/security/cve/CVE-2014-1589/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1591" ref_url="https://www.suse.com/security/cve/CVE-2014-1591/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8636" ref_url="https://www.suse.com/security/cve/CVE-2014-8636/" source="CVE"/>
		<reference ref_id="CVE-2014-8637" ref_url="https://www.suse.com/security/cve/CVE-2014-8637/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2014-8640" ref_url="https://www.suse.com/security/cve/CVE-2014-8640/" source="CVE"/>
		<reference ref_id="CVE-2014-8641" ref_url="https://www.suse.com/security/cve/CVE-2014-8641/" source="CVE"/>
		<reference ref_id="CVE-2014-8642" ref_url="https://www.suse.com/security/cve/CVE-2014-8642/" source="CVE"/>
		<reference ref_id="CVE-2014-8643" ref_url="https://www.suse.com/security/cve/CVE-2014-8643/" source="CVE"/>
		<reference ref_id="CVE-2015-0798" ref_url="https://www.suse.com/security/cve/CVE-2015-0798/" source="CVE"/>
		<reference ref_id="CVE-2015-0799" ref_url="https://www.suse.com/security/cve/CVE-2015-0799/" source="CVE"/>
		<reference ref_id="CVE-2015-0800" ref_url="https://www.suse.com/security/cve/CVE-2015-0800/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0802" ref_url="https://www.suse.com/security/cve/CVE-2015-0802/" source="CVE"/>
		<reference ref_id="CVE-2015-0803" ref_url="https://www.suse.com/security/cve/CVE-2015-0803/" source="CVE"/>
		<reference ref_id="CVE-2015-0804" ref_url="https://www.suse.com/security/cve/CVE-2015-0804/" source="CVE"/>
		<reference ref_id="CVE-2015-0805" ref_url="https://www.suse.com/security/cve/CVE-2015-0805/" source="CVE"/>
		<reference ref_id="CVE-2015-0806" ref_url="https://www.suse.com/security/cve/CVE-2015-0806/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0808" ref_url="https://www.suse.com/security/cve/CVE-2015-0808/" source="CVE"/>
		<reference ref_id="CVE-2015-0810" ref_url="https://www.suse.com/security/cve/CVE-2015-0810/" source="CVE"/>
		<reference ref_id="CVE-2015-0811" ref_url="https://www.suse.com/security/cve/CVE-2015-0811/" source="CVE"/>
		<reference ref_id="CVE-2015-0812" ref_url="https://www.suse.com/security/cve/CVE-2015-0812/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0814" ref_url="https://www.suse.com/security/cve/CVE-2015-0814/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0817" ref_url="https://www.suse.com/security/cve/CVE-2015-0817/" source="CVE"/>
		<reference ref_id="CVE-2015-0818" ref_url="https://www.suse.com/security/cve/CVE-2015-0818/" source="CVE"/>
		<reference ref_id="CVE-2015-0819" ref_url="https://www.suse.com/security/cve/CVE-2015-0819/" source="CVE"/>
		<reference ref_id="CVE-2015-0820" ref_url="https://www.suse.com/security/cve/CVE-2015-0820/" source="CVE"/>
		<reference ref_id="CVE-2015-0821" ref_url="https://www.suse.com/security/cve/CVE-2015-0821/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0823" ref_url="https://www.suse.com/security/cve/CVE-2015-0823/" source="CVE"/>
		<reference ref_id="CVE-2015-0824" ref_url="https://www.suse.com/security/cve/CVE-2015-0824/" source="CVE"/>
		<reference ref_id="CVE-2015-0825" ref_url="https://www.suse.com/security/cve/CVE-2015-0825/" source="CVE"/>
		<reference ref_id="CVE-2015-0826" ref_url="https://www.suse.com/security/cve/CVE-2015-0826/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0828" ref_url="https://www.suse.com/security/cve/CVE-2015-0828/" source="CVE"/>
		<reference ref_id="CVE-2015-0829" ref_url="https://www.suse.com/security/cve/CVE-2015-0829/" source="CVE"/>
		<reference ref_id="CVE-2015-0830" ref_url="https://www.suse.com/security/cve/CVE-2015-0830/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0832" ref_url="https://www.suse.com/security/cve/CVE-2015-0832/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0834" ref_url="https://www.suse.com/security/cve/CVE-2015-0834/" source="CVE"/>
		<reference ref_id="CVE-2015-0835" ref_url="https://www.suse.com/security/cve/CVE-2015-0835/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2706" ref_url="https://www.suse.com/security/cve/CVE-2015-2706/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2709" ref_url="https://www.suse.com/security/cve/CVE-2015-2709/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2711" ref_url="https://www.suse.com/security/cve/CVE-2015-2711/" source="CVE"/>
		<reference ref_id="CVE-2015-2712" ref_url="https://www.suse.com/security/cve/CVE-2015-2712/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2715" ref_url="https://www.suse.com/security/cve/CVE-2015-2715/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2717" ref_url="https://www.suse.com/security/cve/CVE-2015-2717/" source="CVE"/>
		<reference ref_id="CVE-2015-2718" ref_url="https://www.suse.com/security/cve/CVE-2015-2718/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2726" ref_url="https://www.suse.com/security/cve/CVE-2015-2726/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2742" ref_url="https://www.suse.com/security/cve/CVE-2015-2742/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4474" ref_url="https://www.suse.com/security/cve/CVE-2015-4474/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4476" ref_url="https://www.suse.com/security/cve/CVE-2015-4476/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4483" ref_url="https://www.suse.com/security/cve/CVE-2015-4483/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4490" ref_url="https://www.suse.com/security/cve/CVE-2015-4490/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4495" ref_url="https://www.suse.com/security/cve/CVE-2015-4495/" source="CVE"/>
		<reference ref_id="CVE-2015-4497" ref_url="https://www.suse.com/security/cve/CVE-2015-4497/" source="CVE"/>
		<reference ref_id="CVE-2015-4498" ref_url="https://www.suse.com/security/cve/CVE-2015-4498/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4501" ref_url="https://www.suse.com/security/cve/CVE-2015-4501/" source="CVE"/>
		<reference ref_id="CVE-2015-4502" ref_url="https://www.suse.com/security/cve/CVE-2015-4502/" source="CVE"/>
		<reference ref_id="CVE-2015-4503" ref_url="https://www.suse.com/security/cve/CVE-2015-4503/" source="CVE"/>
		<reference ref_id="CVE-2015-4504" ref_url="https://www.suse.com/security/cve/CVE-2015-4504/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4507" ref_url="https://www.suse.com/security/cve/CVE-2015-4507/" source="CVE"/>
		<reference ref_id="CVE-2015-4508" ref_url="https://www.suse.com/security/cve/CVE-2015-4508/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4510" ref_url="https://www.suse.com/security/cve/CVE-2015-4510/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4512" ref_url="https://www.suse.com/security/cve/CVE-2015-4512/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4515" ref_url="https://www.suse.com/security/cve/CVE-2015-4515/" source="CVE"/>
		<reference ref_id="CVE-2015-4516" ref_url="https://www.suse.com/security/cve/CVE-2015-4516/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4518" ref_url="https://www.suse.com/security/cve/CVE-2015-4518/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7184" ref_url="https://www.suse.com/security/cve/CVE-2015-7184/" source="CVE"/>
		<reference ref_id="CVE-2015-7185" ref_url="https://www.suse.com/security/cve/CVE-2015-7185/" source="CVE"/>
		<reference ref_id="CVE-2015-7186" ref_url="https://www.suse.com/security/cve/CVE-2015-7186/" source="CVE"/>
		<reference ref_id="CVE-2015-7187" ref_url="https://www.suse.com/security/cve/CVE-2015-7187/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7190" ref_url="https://www.suse.com/security/cve/CVE-2015-7190/" source="CVE"/>
		<reference ref_id="CVE-2015-7191" ref_url="https://www.suse.com/security/cve/CVE-2015-7191/" source="CVE"/>
		<reference ref_id="CVE-2015-7192" ref_url="https://www.suse.com/security/cve/CVE-2015-7192/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7195" ref_url="https://www.suse.com/security/cve/CVE-2015-7195/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7202" ref_url="https://www.suse.com/security/cve/CVE-2015-7202/" source="CVE"/>
		<reference ref_id="CVE-2015-7203" ref_url="https://www.suse.com/security/cve/CVE-2015-7203/" source="CVE"/>
		<reference ref_id="CVE-2015-7204" ref_url="https://www.suse.com/security/cve/CVE-2015-7204/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7208" ref_url="https://www.suse.com/security/cve/CVE-2015-7208/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7211" ref_url="https://www.suse.com/security/cve/CVE-2015-7211/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7215" ref_url="https://www.suse.com/security/cve/CVE-2015-7215/" source="CVE"/>
		<reference ref_id="CVE-2015-7216" ref_url="https://www.suse.com/security/cve/CVE-2015-7216/" source="CVE"/>
		<reference ref_id="CVE-2015-7217" ref_url="https://www.suse.com/security/cve/CVE-2015-7217/" source="CVE"/>
		<reference ref_id="CVE-2015-7218" ref_url="https://www.suse.com/security/cve/CVE-2015-7218/" source="CVE"/>
		<reference ref_id="CVE-2015-7219" ref_url="https://www.suse.com/security/cve/CVE-2015-7219/" source="CVE"/>
		<reference ref_id="CVE-2015-7220" ref_url="https://www.suse.com/security/cve/CVE-2015-7220/" source="CVE"/>
		<reference ref_id="CVE-2015-7221" ref_url="https://www.suse.com/security/cve/CVE-2015-7221/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7223" ref_url="https://www.suse.com/security/cve/CVE-2015-7223/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-0718" ref_url="https://www.suse.com/security/cve/CVE-2016-0718/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1931" ref_url="https://www.suse.com/security/cve/CVE-2016-1931/" source="CVE"/>
		<reference ref_id="CVE-2016-1933" ref_url="https://www.suse.com/security/cve/CVE-2016-1933/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1937" ref_url="https://www.suse.com/security/cve/CVE-2016-1937/" source="CVE"/>
		<reference ref_id="CVE-2016-1938" ref_url="https://www.suse.com/security/cve/CVE-2016-1938/" source="CVE"/>
		<reference ref_id="CVE-2016-1939" ref_url="https://www.suse.com/security/cve/CVE-2016-1939/" source="CVE"/>
		<reference ref_id="CVE-2016-1942" ref_url="https://www.suse.com/security/cve/CVE-2016-1942/" source="CVE"/>
		<reference ref_id="CVE-2016-1943" ref_url="https://www.suse.com/security/cve/CVE-2016-1943/" source="CVE"/>
		<reference ref_id="CVE-2016-1944" ref_url="https://www.suse.com/security/cve/CVE-2016-1944/" source="CVE"/>
		<reference ref_id="CVE-2016-1945" ref_url="https://www.suse.com/security/cve/CVE-2016-1945/" source="CVE"/>
		<reference ref_id="CVE-2016-1946" ref_url="https://www.suse.com/security/cve/CVE-2016-1946/" source="CVE"/>
		<reference ref_id="CVE-2016-1947" ref_url="https://www.suse.com/security/cve/CVE-2016-1947/" source="CVE"/>
		<reference ref_id="CVE-2016-1949" ref_url="https://www.suse.com/security/cve/CVE-2016-1949/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1959" ref_url="https://www.suse.com/security/cve/CVE-2016-1959/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1963" ref_url="https://www.suse.com/security/cve/CVE-2016-1963/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1967" ref_url="https://www.suse.com/security/cve/CVE-2016-1967/" source="CVE"/>
		<reference ref_id="CVE-2016-1968" ref_url="https://www.suse.com/security/cve/CVE-2016-1968/" source="CVE"/>
		<reference ref_id="CVE-2016-1970" ref_url="https://www.suse.com/security/cve/CVE-2016-1970/" source="CVE"/>
		<reference ref_id="CVE-2016-1971" ref_url="https://www.suse.com/security/cve/CVE-2016-1971/" source="CVE"/>
		<reference ref_id="CVE-2016-1972" ref_url="https://www.suse.com/security/cve/CVE-2016-1972/" source="CVE"/>
		<reference ref_id="CVE-2016-1973" ref_url="https://www.suse.com/security/cve/CVE-2016-1973/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1975" ref_url="https://www.suse.com/security/cve/CVE-2016-1975/" source="CVE"/>
		<reference ref_id="CVE-2016-1976" ref_url="https://www.suse.com/security/cve/CVE-2016-1976/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2804" ref_url="https://www.suse.com/security/cve/CVE-2016-2804/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2808" ref_url="https://www.suse.com/security/cve/CVE-2016-2808/" source="CVE"/>
		<reference ref_id="CVE-2016-2809" ref_url="https://www.suse.com/security/cve/CVE-2016-2809/" source="CVE"/>
		<reference ref_id="CVE-2016-2810" ref_url="https://www.suse.com/security/cve/CVE-2016-2810/" source="CVE"/>
		<reference ref_id="CVE-2016-2811" ref_url="https://www.suse.com/security/cve/CVE-2016-2811/" source="CVE"/>
		<reference ref_id="CVE-2016-2812" ref_url="https://www.suse.com/security/cve/CVE-2016-2812/" source="CVE"/>
		<reference ref_id="CVE-2016-2813" ref_url="https://www.suse.com/security/cve/CVE-2016-2813/" source="CVE"/>
		<reference ref_id="CVE-2016-2814" ref_url="https://www.suse.com/security/cve/CVE-2016-2814/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2816" ref_url="https://www.suse.com/security/cve/CVE-2016-2816/" source="CVE"/>
		<reference ref_id="CVE-2016-2817" ref_url="https://www.suse.com/security/cve/CVE-2016-2817/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2819" ref_url="https://www.suse.com/security/cve/CVE-2016-2819/" source="CVE"/>
		<reference ref_id="CVE-2016-2820" ref_url="https://www.suse.com/security/cve/CVE-2016-2820/" source="CVE"/>
		<reference ref_id="CVE-2016-2821" ref_url="https://www.suse.com/security/cve/CVE-2016-2821/" source="CVE"/>
		<reference ref_id="CVE-2016-2822" ref_url="https://www.suse.com/security/cve/CVE-2016-2822/" source="CVE"/>
		<reference ref_id="CVE-2016-2824" ref_url="https://www.suse.com/security/cve/CVE-2016-2824/" source="CVE"/>
		<reference ref_id="CVE-2016-2825" ref_url="https://www.suse.com/security/cve/CVE-2016-2825/" source="CVE"/>
		<reference ref_id="CVE-2016-2827" ref_url="https://www.suse.com/security/cve/CVE-2016-2827/" source="CVE"/>
		<reference ref_id="CVE-2016-2828" ref_url="https://www.suse.com/security/cve/CVE-2016-2828/" source="CVE"/>
		<reference ref_id="CVE-2016-2829" ref_url="https://www.suse.com/security/cve/CVE-2016-2829/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2831" ref_url="https://www.suse.com/security/cve/CVE-2016-2831/" source="CVE"/>
		<reference ref_id="CVE-2016-2832" ref_url="https://www.suse.com/security/cve/CVE-2016-2832/" source="CVE"/>
		<reference ref_id="CVE-2016-2833" ref_url="https://www.suse.com/security/cve/CVE-2016-2833/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2016-2835" ref_url="https://www.suse.com/security/cve/CVE-2016-2835/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5250" ref_url="https://www.suse.com/security/cve/CVE-2016-5250/" source="CVE"/>
		<reference ref_id="CVE-2016-5251" ref_url="https://www.suse.com/security/cve/CVE-2016-5251/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5253" ref_url="https://www.suse.com/security/cve/CVE-2016-5253/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5255" ref_url="https://www.suse.com/security/cve/CVE-2016-5255/" source="CVE"/>
		<reference ref_id="CVE-2016-5256" ref_url="https://www.suse.com/security/cve/CVE-2016-5256/" source="CVE"/>
		<reference ref_id="CVE-2016-5257" ref_url="https://www.suse.com/security/cve/CVE-2016-5257/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5260" ref_url="https://www.suse.com/security/cve/CVE-2016-5260/" source="CVE"/>
		<reference ref_id="CVE-2016-5261" ref_url="https://www.suse.com/security/cve/CVE-2016-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5266" ref_url="https://www.suse.com/security/cve/CVE-2016-5266/" source="CVE"/>
		<reference ref_id="CVE-2016-5267" ref_url="https://www.suse.com/security/cve/CVE-2016-5267/" source="CVE"/>
		<reference ref_id="CVE-2016-5268" ref_url="https://www.suse.com/security/cve/CVE-2016-5268/" source="CVE"/>
		<reference ref_id="CVE-2016-5270" ref_url="https://www.suse.com/security/cve/CVE-2016-5270/" source="CVE"/>
		<reference ref_id="CVE-2016-5271" ref_url="https://www.suse.com/security/cve/CVE-2016-5271/" source="CVE"/>
		<reference ref_id="CVE-2016-5272" ref_url="https://www.suse.com/security/cve/CVE-2016-5272/" source="CVE"/>
		<reference ref_id="CVE-2016-5273" ref_url="https://www.suse.com/security/cve/CVE-2016-5273/" source="CVE"/>
		<reference ref_id="CVE-2016-5274" ref_url="https://www.suse.com/security/cve/CVE-2016-5274/" source="CVE"/>
		<reference ref_id="CVE-2016-5275" ref_url="https://www.suse.com/security/cve/CVE-2016-5275/" source="CVE"/>
		<reference ref_id="CVE-2016-5276" ref_url="https://www.suse.com/security/cve/CVE-2016-5276/" source="CVE"/>
		<reference ref_id="CVE-2016-5277" ref_url="https://www.suse.com/security/cve/CVE-2016-5277/" source="CVE"/>
		<reference ref_id="CVE-2016-5278" ref_url="https://www.suse.com/security/cve/CVE-2016-5278/" source="CVE"/>
		<reference ref_id="CVE-2016-5279" ref_url="https://www.suse.com/security/cve/CVE-2016-5279/" source="CVE"/>
		<reference ref_id="CVE-2016-5280" ref_url="https://www.suse.com/security/cve/CVE-2016-5280/" source="CVE"/>
		<reference ref_id="CVE-2016-5281" ref_url="https://www.suse.com/security/cve/CVE-2016-5281/" source="CVE"/>
		<reference ref_id="CVE-2016-5282" ref_url="https://www.suse.com/security/cve/CVE-2016-5282/" source="CVE"/>
		<reference ref_id="CVE-2016-5283" ref_url="https://www.suse.com/security/cve/CVE-2016-5283/" source="CVE"/>
		<reference ref_id="CVE-2016-5284" ref_url="https://www.suse.com/security/cve/CVE-2016-5284/" source="CVE"/>
		<reference ref_id="CVE-2016-5287" ref_url="https://www.suse.com/security/cve/CVE-2016-5287/" source="CVE"/>
		<reference ref_id="CVE-2016-5288" ref_url="https://www.suse.com/security/cve/CVE-2016-5288/" source="CVE"/>
		<reference ref_id="CVE-2016-5289" ref_url="https://www.suse.com/security/cve/CVE-2016-5289/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5292" ref_url="https://www.suse.com/security/cve/CVE-2016-5292/" source="CVE"/>
		<reference ref_id="CVE-2016-5293" ref_url="https://www.suse.com/security/cve/CVE-2016-5293/" source="CVE"/>
		<reference ref_id="CVE-2016-5294" ref_url="https://www.suse.com/security/cve/CVE-2016-5294/" source="CVE"/>
		<reference ref_id="CVE-2016-5295" ref_url="https://www.suse.com/security/cve/CVE-2016-5295/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5298" ref_url="https://www.suse.com/security/cve/CVE-2016-5298/" source="CVE"/>
		<reference ref_id="CVE-2016-5299" ref_url="https://www.suse.com/security/cve/CVE-2016-5299/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9061" ref_url="https://www.suse.com/security/cve/CVE-2016-9061/" source="CVE"/>
		<reference ref_id="CVE-2016-9062" ref_url="https://www.suse.com/security/cve/CVE-2016-9062/" source="CVE"/>
		<reference ref_id="CVE-2016-9063" ref_url="https://www.suse.com/security/cve/CVE-2016-9063/" source="CVE"/>
		<reference ref_id="CVE-2016-9064" ref_url="https://www.suse.com/security/cve/CVE-2016-9064/" source="CVE"/>
		<reference ref_id="CVE-2016-9065" ref_url="https://www.suse.com/security/cve/CVE-2016-9065/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9067" ref_url="https://www.suse.com/security/cve/CVE-2016-9067/" source="CVE"/>
		<reference ref_id="CVE-2016-9068" ref_url="https://www.suse.com/security/cve/CVE-2016-9068/" source="CVE"/>
		<reference ref_id="CVE-2016-9069" ref_url="https://www.suse.com/security/cve/CVE-2016-9069/" source="CVE"/>
		<reference ref_id="CVE-2016-9070" ref_url="https://www.suse.com/security/cve/CVE-2016-9070/" source="CVE"/>
		<reference ref_id="CVE-2016-9071" ref_url="https://www.suse.com/security/cve/CVE-2016-9071/" source="CVE"/>
		<reference ref_id="CVE-2016-9072" ref_url="https://www.suse.com/security/cve/CVE-2016-9072/" source="CVE"/>
		<reference ref_id="CVE-2016-9073" ref_url="https://www.suse.com/security/cve/CVE-2016-9073/" source="CVE"/>
		<reference ref_id="CVE-2016-9074" ref_url="https://www.suse.com/security/cve/CVE-2016-9074/" source="CVE"/>
		<reference ref_id="CVE-2016-9075" ref_url="https://www.suse.com/security/cve/CVE-2016-9075/" source="CVE"/>
		<reference ref_id="CVE-2016-9076" ref_url="https://www.suse.com/security/cve/CVE-2016-9076/" source="CVE"/>
		<reference ref_id="CVE-2016-9077" ref_url="https://www.suse.com/security/cve/CVE-2016-9077/" source="CVE"/>
		<reference ref_id="CVE-2016-9078" ref_url="https://www.suse.com/security/cve/CVE-2016-9078/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9080" ref_url="https://www.suse.com/security/cve/CVE-2016-9080/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9894" ref_url="https://www.suse.com/security/cve/CVE-2016-9894/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9896" ref_url="https://www.suse.com/security/cve/CVE-2016-9896/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9901" ref_url="https://www.suse.com/security/cve/CVE-2016-9901/" source="CVE"/>
		<reference ref_id="CVE-2016-9902" ref_url="https://www.suse.com/security/cve/CVE-2016-9902/" source="CVE"/>
		<reference ref_id="CVE-2016-9903" ref_url="https://www.suse.com/security/cve/CVE-2016-9903/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5031" ref_url="https://www.suse.com/security/cve/CVE-2017-5031/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5374" ref_url="https://www.suse.com/security/cve/CVE-2017-5374/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5377" ref_url="https://www.suse.com/security/cve/CVE-2017-5377/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5379" ref_url="https://www.suse.com/security/cve/CVE-2017-5379/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5381" ref_url="https://www.suse.com/security/cve/CVE-2017-5381/" source="CVE"/>
		<reference ref_id="CVE-2017-5382" ref_url="https://www.suse.com/security/cve/CVE-2017-5382/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5384" ref_url="https://www.suse.com/security/cve/CVE-2017-5384/" source="CVE"/>
		<reference ref_id="CVE-2017-5385" ref_url="https://www.suse.com/security/cve/CVE-2017-5385/" source="CVE"/>
		<reference ref_id="CVE-2017-5386" ref_url="https://www.suse.com/security/cve/CVE-2017-5386/" source="CVE"/>
		<reference ref_id="CVE-2017-5387" ref_url="https://www.suse.com/security/cve/CVE-2017-5387/" source="CVE"/>
		<reference ref_id="CVE-2017-5388" ref_url="https://www.suse.com/security/cve/CVE-2017-5388/" source="CVE"/>
		<reference ref_id="CVE-2017-5389" ref_url="https://www.suse.com/security/cve/CVE-2017-5389/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5391" ref_url="https://www.suse.com/security/cve/CVE-2017-5391/" source="CVE"/>
		<reference ref_id="CVE-2017-5392" ref_url="https://www.suse.com/security/cve/CVE-2017-5392/" source="CVE"/>
		<reference ref_id="CVE-2017-5393" ref_url="https://www.suse.com/security/cve/CVE-2017-5393/" source="CVE"/>
		<reference ref_id="CVE-2017-5394" ref_url="https://www.suse.com/security/cve/CVE-2017-5394/" source="CVE"/>
		<reference ref_id="CVE-2017-5395" ref_url="https://www.suse.com/security/cve/CVE-2017-5395/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5415" ref_url="https://www.suse.com/security/cve/CVE-2017-5415/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5417" ref_url="https://www.suse.com/security/cve/CVE-2017-5417/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5420" ref_url="https://www.suse.com/security/cve/CVE-2017-5420/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5427" ref_url="https://www.suse.com/security/cve/CVE-2017-5427/" source="CVE"/>
		<reference ref_id="CVE-2017-5428" ref_url="https://www.suse.com/security/cve/CVE-2017-5428/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5448" ref_url="https://www.suse.com/security/cve/CVE-2017-5448/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5455" ref_url="https://www.suse.com/security/cve/CVE-2017-5455/" source="CVE"/>
		<reference ref_id="CVE-2017-5456" ref_url="https://www.suse.com/security/cve/CVE-2017-5456/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7755" ref_url="https://www.suse.com/security/cve/CVE-2017-7755/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7760" ref_url="https://www.suse.com/security/cve/CVE-2017-7760/" source="CVE"/>
		<reference ref_id="CVE-2017-7761" ref_url="https://www.suse.com/security/cve/CVE-2017-7761/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7766" ref_url="https://www.suse.com/security/cve/CVE-2017-7766/" source="CVE"/>
		<reference ref_id="CVE-2017-7767" ref_url="https://www.suse.com/security/cve/CVE-2017-7767/" source="CVE"/>
		<reference ref_id="CVE-2017-7768" ref_url="https://www.suse.com/security/cve/CVE-2017-7768/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7843" ref_url="https://www.suse.com/security/cve/CVE-2017-7843/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12368" ref_url="https://www.suse.com/security/cve/CVE-2018-12368/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12379" ref_url="https://www.suse.com/security/cve/CVE-2018-12379/" source="CVE"/>
		<reference ref_id="CVE-2018-12381" ref_url="https://www.suse.com/security/cve/CVE-2018-12381/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12386" ref_url="https://www.suse.com/security/cve/CVE-2018-12386/" source="CVE"/>
		<reference ref_id="CVE-2018-12387" ref_url="https://www.suse.com/security/cve/CVE-2018-12387/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12395" ref_url="https://www.suse.com/security/cve/CVE-2018-12395/" source="CVE"/>
		<reference ref_id="CVE-2018-12396" ref_url="https://www.suse.com/security/cve/CVE-2018-12396/" source="CVE"/>
		<reference ref_id="CVE-2018-12397" ref_url="https://www.suse.com/security/cve/CVE-2018-12397/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18506" ref_url="https://www.suse.com/security/cve/CVE-2018-18506/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5091" ref_url="https://www.suse.com/security/cve/CVE-2018-5091/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5130" ref_url="https://www.suse.com/security/cve/CVE-2018-5130/" source="CVE"/>
		<reference ref_id="CVE-2018-5131" ref_url="https://www.suse.com/security/cve/CVE-2018-5131/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5147" ref_url="https://www.suse.com/security/cve/CVE-2018-5147/" source="CVE"/>
		<reference ref_id="CVE-2018-5148" ref_url="https://www.suse.com/security/cve/CVE-2018-5148/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5157" ref_url="https://www.suse.com/security/cve/CVE-2018-5157/" source="CVE"/>
		<reference ref_id="CVE-2018-5158" ref_url="https://www.suse.com/security/cve/CVE-2018-5158/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2018-6126" ref_url="https://www.suse.com/security/cve/CVE-2018-6126/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11718" ref_url="https://www.suse.com/security/cve/CVE-2019-11718/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11733" ref_url="https://www.suse.com/security/cve/CVE-2019-11733/" source="CVE"/>
		<reference ref_id="CVE-2019-11735" ref_url="https://www.suse.com/security/cve/CVE-2019-11735/" source="CVE"/>
		<reference ref_id="CVE-2019-11736" ref_url="https://www.suse.com/security/cve/CVE-2019-11736/" source="CVE"/>
		<reference ref_id="CVE-2019-11738" ref_url="https://www.suse.com/security/cve/CVE-2019-11738/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11747" ref_url="https://www.suse.com/security/cve/CVE-2019-11747/" source="CVE"/>
		<reference ref_id="CVE-2019-11748" ref_url="https://www.suse.com/security/cve/CVE-2019-11748/" source="CVE"/>
		<reference ref_id="CVE-2019-11749" ref_url="https://www.suse.com/security/cve/CVE-2019-11749/" source="CVE"/>
		<reference ref_id="CVE-2019-11750" ref_url="https://www.suse.com/security/cve/CVE-2019-11750/" source="CVE"/>
		<reference ref_id="CVE-2019-11751" ref_url="https://www.suse.com/security/cve/CVE-2019-11751/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11753" ref_url="https://www.suse.com/security/cve/CVE-2019-11753/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9788" ref_url="https://www.suse.com/security/cve/CVE-2019-9788/" source="CVE"/>
		<reference ref_id="CVE-2019-9790" ref_url="https://www.suse.com/security/cve/CVE-2019-9790/" source="CVE"/>
		<reference ref_id="CVE-2019-9791" ref_url="https://www.suse.com/security/cve/CVE-2019-9791/" source="CVE"/>
		<reference ref_id="CVE-2019-9792" ref_url="https://www.suse.com/security/cve/CVE-2019-9792/" source="CVE"/>
		<reference ref_id="CVE-2019-9793" ref_url="https://www.suse.com/security/cve/CVE-2019-9793/" source="CVE"/>
		<reference ref_id="CVE-2019-9794" ref_url="https://www.suse.com/security/cve/CVE-2019-9794/" source="CVE"/>
		<reference ref_id="CVE-2019-9795" ref_url="https://www.suse.com/security/cve/CVE-2019-9795/" source="CVE"/>
		<reference ref_id="CVE-2019-9796" ref_url="https://www.suse.com/security/cve/CVE-2019-9796/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9801" ref_url="https://www.suse.com/security/cve/CVE-2019-9801/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9812" ref_url="https://www.suse.com/security/cve/CVE-2019-9812/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12388" ref_url="https://www.suse.com/security/cve/CVE-2020-12388/" source="CVE"/>
		<reference ref_id="CVE-2020-12389" ref_url="https://www.suse.com/security/cve/CVE-2020-12389/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-6796" ref_url="https://www.suse.com/security/cve/CVE-2020-6796/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6799" ref_url="https://www.suse.com/security/cve/CVE-2020-6799/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6827" ref_url="https://www.suse.com/security/cve/CVE-2020-6827/" source="CVE"/>
		<reference ref_id="CVE-2020-6828" ref_url="https://www.suse.com/security/cve/CVE-2020-6828/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaFirefox-68.8.0-3.87.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2808/">CVE-2012-2808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1588/">CVE-2014-1588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1589/">CVE-2014-1589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1591/">CVE-2014-1591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8636/">CVE-2014-8636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8637/">CVE-2014-8637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8640/">CVE-2014-8640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8641/">CVE-2014-8641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8642/">CVE-2014-8642</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8643/">CVE-2014-8643</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0798/">CVE-2015-0798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0799/">CVE-2015-0799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0800/">CVE-2015-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0802/">CVE-2015-0802</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0803/">CVE-2015-0803</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0804/">CVE-2015-0804</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0805/">CVE-2015-0805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0806/">CVE-2015-0806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0808/">CVE-2015-0808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0810/">CVE-2015-0810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0811/">CVE-2015-0811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0812/">CVE-2015-0812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0814/">CVE-2015-0814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0817/">CVE-2015-0817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0818/">CVE-2015-0818</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0819/">CVE-2015-0819</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0820/">CVE-2015-0820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0821/">CVE-2015-0821</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0823/">CVE-2015-0823</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0824/">CVE-2015-0824</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0825/">CVE-2015-0825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0826/">CVE-2015-0826</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0828/">CVE-2015-0828</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0829/">CVE-2015-0829</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0830/">CVE-2015-0830</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0832/">CVE-2015-0832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0834/">CVE-2015-0834</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0835/">CVE-2015-0835</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2706/">CVE-2015-2706</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2709/">CVE-2015-2709</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2711/">CVE-2015-2711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2712/">CVE-2015-2712</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2715/">CVE-2015-2715</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2717/">CVE-2015-2717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2718/">CVE-2015-2718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2726/">CVE-2015-2726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2742/">CVE-2015-2742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4474/">CVE-2015-4474</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4476/">CVE-2015-4476</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4483/">CVE-2015-4483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4490/">CVE-2015-4490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4495/">CVE-2015-4495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4497/">CVE-2015-4497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4498/">CVE-2015-4498</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4501/">CVE-2015-4501</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4502/">CVE-2015-4502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4503/">CVE-2015-4503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4504/">CVE-2015-4504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4507/">CVE-2015-4507</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4508/">CVE-2015-4508</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4510/">CVE-2015-4510</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4512/">CVE-2015-4512</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4515/">CVE-2015-4515</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4516/">CVE-2015-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4518/">CVE-2015-4518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7184/">CVE-2015-7184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7185/">CVE-2015-7185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7186/">CVE-2015-7186</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7187/">CVE-2015-7187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7190/">CVE-2015-7190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7191/">CVE-2015-7191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7192/">CVE-2015-7192</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7195/">CVE-2015-7195</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7202/">CVE-2015-7202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7203/">CVE-2015-7203</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7204/">CVE-2015-7204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7208/">CVE-2015-7208</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7211/">CVE-2015-7211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7215/">CVE-2015-7215</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7216/">CVE-2015-7216</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7217/">CVE-2015-7217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7218/">CVE-2015-7218</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7219/">CVE-2015-7219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7220/">CVE-2015-7220</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7221/">CVE-2015-7221</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7223/">CVE-2015-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0718/">CVE-2016-0718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1931/">CVE-2016-1931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1933/">CVE-2016-1933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1937/">CVE-2016-1937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1938/">CVE-2016-1938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1939/">CVE-2016-1939</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1942/">CVE-2016-1942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1943/">CVE-2016-1943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1944/">CVE-2016-1944</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1945/">CVE-2016-1945</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1946/">CVE-2016-1946</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1947/">CVE-2016-1947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1949/">CVE-2016-1949</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1959/">CVE-2016-1959</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1963/">CVE-2016-1963</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1967/">CVE-2016-1967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1968/">CVE-2016-1968</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1970/">CVE-2016-1970</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1971/">CVE-2016-1971</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1972/">CVE-2016-1972</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1973/">CVE-2016-1973</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1975/">CVE-2016-1975</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1976/">CVE-2016-1976</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2804/">CVE-2016-2804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2808/">CVE-2016-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2809/">CVE-2016-2809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2810/">CVE-2016-2810</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2811/">CVE-2016-2811</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2812/">CVE-2016-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2813/">CVE-2016-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2814/">CVE-2016-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2816/">CVE-2016-2816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2817/">CVE-2016-2817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2819/">CVE-2016-2819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2820/">CVE-2016-2820</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2821/">CVE-2016-2821</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2822/">CVE-2016-2822</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2824/">CVE-2016-2824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2825/">CVE-2016-2825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2827/">CVE-2016-2827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2828/">CVE-2016-2828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2829/">CVE-2016-2829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2831/">CVE-2016-2831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2832/">CVE-2016-2832</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2833/">CVE-2016-2833</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2835/">CVE-2016-2835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5250/">CVE-2016-5250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5251/">CVE-2016-5251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5253/">CVE-2016-5253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5255/">CVE-2016-5255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5256/">CVE-2016-5256</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5257/">CVE-2016-5257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5260/">CVE-2016-5260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5261/">CVE-2016-5261</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5266/">CVE-2016-5266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5267/">CVE-2016-5267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5268/">CVE-2016-5268</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5270/">CVE-2016-5270</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5271/">CVE-2016-5271</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5272/">CVE-2016-5272</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5273/">CVE-2016-5273</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5274/">CVE-2016-5274</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5275/">CVE-2016-5275</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5276/">CVE-2016-5276</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5277/">CVE-2016-5277</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5278/">CVE-2016-5278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5279/">CVE-2016-5279</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5280/">CVE-2016-5280</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5281/">CVE-2016-5281</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5282/">CVE-2016-5282</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5283/">CVE-2016-5283</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5284/">CVE-2016-5284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5287/">CVE-2016-5287</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5288/">CVE-2016-5288</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5289/">CVE-2016-5289</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5292/">CVE-2016-5292</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5293/">CVE-2016-5293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5294/">CVE-2016-5294</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5295/">CVE-2016-5295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5298/">CVE-2016-5298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5299/">CVE-2016-5299</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9061/">CVE-2016-9061</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9062/">CVE-2016-9062</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9063/">CVE-2016-9063</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9064/">CVE-2016-9064</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9065/">CVE-2016-9065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9067/">CVE-2016-9067</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9068/">CVE-2016-9068</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9069/">CVE-2016-9069</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9070/">CVE-2016-9070</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9071/">CVE-2016-9071</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9072/">CVE-2016-9072</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9073/">CVE-2016-9073</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9074/">CVE-2016-9074</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9075/">CVE-2016-9075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9076/">CVE-2016-9076</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9077/">CVE-2016-9077</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9078/">CVE-2016-9078</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9080/">CVE-2016-9080</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9894/">CVE-2016-9894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9896/">CVE-2016-9896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9901/">CVE-2016-9901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9902/">CVE-2016-9902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9903/">CVE-2016-9903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5031/">CVE-2017-5031</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5374/">CVE-2017-5374</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5377/">CVE-2017-5377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5379/">CVE-2017-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5381/">CVE-2017-5381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5382/">CVE-2017-5382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5384/">CVE-2017-5384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5385/">CVE-2017-5385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5386/">CVE-2017-5386</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5387/">CVE-2017-5387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5388/">CVE-2017-5388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5389/">CVE-2017-5389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5391/">CVE-2017-5391</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5392/">CVE-2017-5392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5393/">CVE-2017-5393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5394/">CVE-2017-5394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5395/">CVE-2017-5395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5415/">CVE-2017-5415</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5417/">CVE-2017-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5420/">CVE-2017-5420</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5427/">CVE-2017-5427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5428/">CVE-2017-5428</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5448/">CVE-2017-5448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5455/">CVE-2017-5455</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5456/">CVE-2017-5456</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7755/">CVE-2017-7755</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7760/">CVE-2017-7760</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7761/">CVE-2017-7761</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7766/">CVE-2017-7766</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7767/">CVE-2017-7767</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7768/">CVE-2017-7768</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7843/">CVE-2017-7843</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12368/">CVE-2018-12368</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12379/">CVE-2018-12379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12381/">CVE-2018-12381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12386/">CVE-2018-12386</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12387/">CVE-2018-12387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12395/">CVE-2018-12395</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12396/">CVE-2018-12396</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12397/">CVE-2018-12397</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18506/">CVE-2018-18506</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5091/">CVE-2018-5091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5130/">CVE-2018-5130</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5131/">CVE-2018-5131</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5147/">CVE-2018-5147</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5148/">CVE-2018-5148</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5157/">CVE-2018-5157</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5158/">CVE-2018-5158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6126/">CVE-2018-6126</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11718/">CVE-2019-11718</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11733/">CVE-2019-11733</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11735/">CVE-2019-11735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11736/">CVE-2019-11736</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11738/">CVE-2019-11738</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11747/">CVE-2019-11747</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11748/">CVE-2019-11748</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11749/">CVE-2019-11749</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11750/">CVE-2019-11750</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11751/">CVE-2019-11751</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11753/">CVE-2019-11753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9788/">CVE-2019-9788</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9790/">CVE-2019-9790</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9791/">CVE-2019-9791</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9792/">CVE-2019-9792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9793/">CVE-2019-9793</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9794/">CVE-2019-9794</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9795/">CVE-2019-9795</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9796/">CVE-2019-9796</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9801/">CVE-2019-9801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9812/">CVE-2019-9812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12388/">CVE-2020-12388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12389/">CVE-2020-12389</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6796/">CVE-2020-6796</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6799/">CVE-2020-6799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6827/">CVE-2020-6827</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6828/">CVE-2020-6828</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487179" comment="MozillaFirefox-68.8.0-3.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487180" comment="MozillaFirefox-devel-68.8.0-3.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487181" comment="MozillaFirefox-translations-common-68.8.0-3.87.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487182" comment="MozillaFirefox-translations-other-68.8.0-3.87.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109680" version="1" class="patch">
	<metadata>
		<title>NetworkManager-1.22.6-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-1.22.6-1.36 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487183" comment="NetworkManager-1.22.6-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487184" comment="NetworkManager-devel-1.22.6-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109681" version="1" class="patch">
	<metadata>
		<title>PackageKit-1.1.13-2.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-1.1.13-2.16 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487185" comment="PackageKit-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487186" comment="PackageKit-backend-zypp-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487187" comment="PackageKit-devel-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487188" comment="PackageKit-lang-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487189" comment="libpackagekit-glib2-18-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487190" comment="libpackagekit-glib2-devel-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487191" comment="typelib-1_0-PackageKitGlib-1_0-1.1.13-2.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109682" version="1" class="patch">
	<metadata>
		<title>accountsservice-0.6.55-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14036" ref_url="https://www.suse.com/security/cve/CVE-2018-14036/" source="CVE"/>
		<description>
These are all security issues fixed in the accountsservice-0.6.55-3.14 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14036/">CVE-2018-14036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487192" comment="accountsservice-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487193" comment="accountsservice-devel-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487194" comment="accountsservice-lang-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487195" comment="libaccountsservice0-0.6.55-3.14 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487196" comment="typelib-1_0-AccountsService-1_0-0.6.55-3.14 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109683" version="1" class="patch">
	<metadata>
		<title>audiofile-devel-0.3.6-3.7.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7747" ref_url="https://www.suse.com/security/cve/CVE-2015-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-6827" ref_url="https://www.suse.com/security/cve/CVE-2017-6827/" source="CVE"/>
		<reference ref_id="CVE-2017-6828" ref_url="https://www.suse.com/security/cve/CVE-2017-6828/" source="CVE"/>
		<reference ref_id="CVE-2017-6829" ref_url="https://www.suse.com/security/cve/CVE-2017-6829/" source="CVE"/>
		<reference ref_id="CVE-2017-6830" ref_url="https://www.suse.com/security/cve/CVE-2017-6830/" source="CVE"/>
		<reference ref_id="CVE-2017-6831" ref_url="https://www.suse.com/security/cve/CVE-2017-6831/" source="CVE"/>
		<reference ref_id="CVE-2017-6832" ref_url="https://www.suse.com/security/cve/CVE-2017-6832/" source="CVE"/>
		<reference ref_id="CVE-2017-6833" ref_url="https://www.suse.com/security/cve/CVE-2017-6833/" source="CVE"/>
		<reference ref_id="CVE-2017-6834" ref_url="https://www.suse.com/security/cve/CVE-2017-6834/" source="CVE"/>
		<reference ref_id="CVE-2017-6835" ref_url="https://www.suse.com/security/cve/CVE-2017-6835/" source="CVE"/>
		<reference ref_id="CVE-2017-6836" ref_url="https://www.suse.com/security/cve/CVE-2017-6836/" source="CVE"/>
		<reference ref_id="CVE-2017-6837" ref_url="https://www.suse.com/security/cve/CVE-2017-6837/" source="CVE"/>
		<reference ref_id="CVE-2017-6838" ref_url="https://www.suse.com/security/cve/CVE-2017-6838/" source="CVE"/>
		<reference ref_id="CVE-2017-6839" ref_url="https://www.suse.com/security/cve/CVE-2017-6839/" source="CVE"/>
		<reference ref_id="CVE-2018-13440" ref_url="https://www.suse.com/security/cve/CVE-2018-13440/" source="CVE"/>
		<reference ref_id="CVE-2018-17095" ref_url="https://www.suse.com/security/cve/CVE-2018-17095/" source="CVE"/>
		<description>
These are all security issues fixed in the audiofile-devel-0.3.6-3.7.10 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7747/">CVE-2015-7747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6827/">CVE-2017-6827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6828/">CVE-2017-6828</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6829/">CVE-2017-6829</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6830/">CVE-2017-6830</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6831/">CVE-2017-6831</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6832/">CVE-2017-6832</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6833/">CVE-2017-6833</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6834/">CVE-2017-6834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6835/">CVE-2017-6835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6836/">CVE-2017-6836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6837/">CVE-2017-6837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6838/">CVE-2017-6838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6839/">CVE-2017-6839</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13440/">CVE-2018-13440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-17095/">CVE-2018-17095</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486590" comment="audiofile-devel-0.3.6-3.7.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486591" comment="libaudiofile1-0.3.6-3.7.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109684" version="1" class="patch">
	<metadata>
		<title>avahi-autoipd-0.7-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000845" ref_url="https://www.suse.com/security/cve/CVE-2018-1000845/" source="CVE"/>
		<description>
These are all security issues fixed in the avahi-autoipd-0.7-1.21 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000845/">CVE-2018-1000845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486592" comment="avahi-autoipd-0.7-1.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109685" version="1" class="patch">
	<metadata>
		<title>bluez-devel-5.48-11.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-devel-5.48-11.58 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487197" comment="bluez-devel-5.48-11.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109686" version="1" class="patch">
	<metadata>
		<title>conky-1.11.5-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-3616" ref_url="https://www.suse.com/security/cve/CVE-2011-3616/" source="CVE"/>
		<description>
These are all security issues fixed in the conky-1.11.5-1.20 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2011-3616/">CVE-2011-3616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487198" comment="conky-1.11.5-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487199" comment="conky-doc-1.11.5-1.20 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487200" comment="vim-plugin-conky-1.11.5-1.20 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109687" version="1" class="patch">
	<metadata>
		<title>cups-pk-helper-0.2.6-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-4510" ref_url="https://www.suse.com/security/cve/CVE-2012-4510/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-pk-helper-0.2.6-1.36 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4510/">CVE-2012-4510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482654" comment="cups-pk-helper-0.2.6-1.36 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482655" comment="cups-pk-helper-lang-0.2.6-1.36 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109688" version="1" class="patch">
	<metadata>
		<title>emacs-x11-25.3-3.3.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0035" ref_url="https://www.suse.com/security/cve/CVE-2012-0035/" source="CVE"/>
		<reference ref_id="CVE-2014-3421" ref_url="https://www.suse.com/security/cve/CVE-2014-3421/" source="CVE"/>
		<reference ref_id="CVE-2014-3422" ref_url="https://www.suse.com/security/cve/CVE-2014-3422/" source="CVE"/>
		<reference ref_id="CVE-2014-3423" ref_url="https://www.suse.com/security/cve/CVE-2014-3423/" source="CVE"/>
		<reference ref_id="CVE-2014-3424" ref_url="https://www.suse.com/security/cve/CVE-2014-3424/" source="CVE"/>
		<reference ref_id="CVE-2014-9483" ref_url="https://www.suse.com/security/cve/CVE-2014-9483/" source="CVE"/>
		<reference ref_id="CVE-2017-7476" ref_url="https://www.suse.com/security/cve/CVE-2017-7476/" source="CVE"/>
		<description>
These are all security issues fixed in the emacs-x11-25.3-3.3.18 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0035/">CVE-2012-0035</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3421/">CVE-2014-3421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3422/">CVE-2014-3422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3423/">CVE-2014-3423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3424/">CVE-2014-3424</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-9483/">CVE-2014-9483</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7476/">CVE-2017-7476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486596" comment="emacs-x11-25.3-3.3.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109689" version="1" class="patch">
	<metadata>
		<title>eog-3.34.2-1.46 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<reference ref_id="CVE-2016-6855" ref_url="https://www.suse.com/security/cve/CVE-2016-6855/" source="CVE"/>
		<description>
These are all security issues fixed in the eog-3.34.2-1.46 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6855/">CVE-2016-6855</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487201" comment="eog-3.34.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487202" comment="eog-devel-3.34.2-1.46 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487203" comment="eog-lang-3.34.2-1.46 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109690" version="1" class="patch">
	<metadata>
		<title>evince-3.34.2-1.115 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000083" ref_url="https://www.suse.com/security/cve/CVE-2017-1000083/" source="CVE"/>
		<reference ref_id="CVE-2019-1010006" ref_url="https://www.suse.com/security/cve/CVE-2019-1010006/" source="CVE"/>
		<reference ref_id="CVE-2019-11459" ref_url="https://www.suse.com/security/cve/CVE-2019-11459/" source="CVE"/>
		<description>
These are all security issues fixed in the evince-3.34.2-1.115 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000083/">CVE-2017-1000083</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010006/">CVE-2019-1010006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11459/">CVE-2019-11459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487204" comment="evince-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487205" comment="evince-devel-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487206" comment="evince-lang-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487207" comment="evince-plugin-djvudocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487208" comment="evince-plugin-dvidocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487209" comment="evince-plugin-pdfdocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487210" comment="evince-plugin-psdocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487211" comment="evince-plugin-tiffdocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487212" comment="evince-plugin-xpsdocument-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487213" comment="libevdocument3-4-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487214" comment="libevview3-3-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487215" comment="nautilus-evince-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487216" comment="typelib-1_0-EvinceDocument-3_0-3.34.2-1.115 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487217" comment="typelib-1_0-EvinceView-3_0-3.34.2-1.115 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109691" version="1" class="patch">
	<metadata>
		<title>fetchmailconf-6.3.26-3.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2666" ref_url="https://www.suse.com/security/cve/CVE-2009-2666/" source="CVE"/>
		<reference ref_id="CVE-2010-1167" ref_url="https://www.suse.com/security/cve/CVE-2010-1167/" source="CVE"/>
		<reference ref_id="CVE-2011-1947" ref_url="https://www.suse.com/security/cve/CVE-2011-1947/" source="CVE"/>
		<reference ref_id="CVE-2011-3389" ref_url="https://www.suse.com/security/cve/CVE-2011-3389/" source="CVE"/>
		<reference ref_id="CVE-2012-3482" ref_url="https://www.suse.com/security/cve/CVE-2012-3482/" source="CVE"/>
		<description>
These are all security issues fixed in the fetchmailconf-6.3.26-3.27 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2666/">CVE-2009-2666</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1167/">CVE-2010-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1947/">CVE-2011-1947</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2011-3389/">CVE-2011-3389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3482/">CVE-2012-3482</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482674" comment="fetchmailconf-6.3.26-3.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109692" version="1" class="patch">
	<metadata>
		<title>file-roller-3.32.5-1.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-11736" ref_url="https://www.suse.com/security/cve/CVE-2020-11736/" source="CVE"/>
		<description>
These are all security issues fixed in the file-roller-3.32.5-1.8 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11736/">CVE-2020-11736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487218" comment="file-roller-3.32.5-1.8 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487219" comment="file-roller-lang-3.32.5-1.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109693" version="1" class="patch">
	<metadata>
		<title>firewall-applet-0.5.5-4.24.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5410" ref_url="https://www.suse.com/security/cve/CVE-2016-5410/" source="CVE"/>
		<description>
These are all security issues fixed in the firewall-applet-0.5.5-4.24.9 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5410/">CVE-2016-5410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486597" comment="firewall-applet-0.5.5-4.24.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486598" comment="firewall-config-0.5.5-4.24.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109694" version="1" class="patch">
	<metadata>
		<title>flatpak-1.6.3-2.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8659" ref_url="https://www.suse.com/security/cve/CVE-2016-8659/" source="CVE"/>
		<reference ref_id="CVE-2017-5226" ref_url="https://www.suse.com/security/cve/CVE-2017-5226/" source="CVE"/>
		<reference ref_id="CVE-2019-10063" ref_url="https://www.suse.com/security/cve/CVE-2019-10063/" source="CVE"/>
		<reference ref_id="CVE-2019-5736" ref_url="https://www.suse.com/security/cve/CVE-2019-5736/" source="CVE"/>
		<description>
These are all security issues fixed in the flatpak-1.6.3-2.7 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8659/">CVE-2016-8659</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5226/">CVE-2017-5226</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10063/">CVE-2019-10063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5736/">CVE-2019-5736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487220" comment="flatpak-1.6.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487221" comment="flatpak-devel-1.6.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487222" comment="flatpak-zsh-completion-1.6.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487223" comment="libflatpak0-1.6.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487224" comment="system-user-flatpak-1.6.3-2.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487225" comment="typelib-1_0-Flatpak-1_0-1.6.3-2.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109695" version="1" class="patch">
	<metadata>
		<title>fontforge-20200314-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-5395" ref_url="https://www.suse.com/security/cve/CVE-2020-5395/" source="CVE"/>
		<reference ref_id="CVE-2020-5496" ref_url="https://www.suse.com/security/cve/CVE-2020-5496/" source="CVE"/>
		<description>
These are all security issues fixed in the fontforge-20200314-1.17 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5395/">CVE-2020-5395</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-5496/">CVE-2020-5496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487226" comment="fontforge-20200314-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109696" version="1" class="patch">
	<metadata>
		<title>fwupd-1.2.11-3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<description>
These are all security issues fixed in the fwupd-1.2.11-3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487227" comment="fwupd-1.2.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487228" comment="fwupd-devel-1.2.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487229" comment="fwupd-lang-1.2.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487230" comment="libfwupd2-1.2.11-3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487231" comment="typelib-1_0-Fwupd-2_0-1.2.11-3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109697" version="1" class="patch">
	<metadata>
		<title>gcab-1.1-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0552" ref_url="https://www.suse.com/security/cve/CVE-2015-0552/" source="CVE"/>
		<reference ref_id="CVE-2018-5345" ref_url="https://www.suse.com/security/cve/CVE-2018-5345/" source="CVE"/>
		<description>
These are all security issues fixed in the gcab-1.1-1.15 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0552/">CVE-2015-0552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5345/">CVE-2018-5345</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482681" comment="gcab-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482682" comment="gcab-devel-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482683" comment="gcab-lang-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482684" comment="libgcab-1_0-0-1.1-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482685" comment="typelib-1_0-GCab-1_0-1.1-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109698" version="1" class="patch">
	<metadata>
		<title>gd-2.2.5-9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-2497" ref_url="https://www.suse.com/security/cve/CVE-2014-2497/" source="CVE"/>
		<reference ref_id="CVE-2016-10166" ref_url="https://www.suse.com/security/cve/CVE-2016-10166/" source="CVE"/>
		<reference ref_id="CVE-2016-10167" ref_url="https://www.suse.com/security/cve/CVE-2016-10167/" source="CVE"/>
		<reference ref_id="CVE-2016-10168" ref_url="https://www.suse.com/security/cve/CVE-2016-10168/" source="CVE"/>
		<reference ref_id="CVE-2016-5116" ref_url="https://www.suse.com/security/cve/CVE-2016-5116/" source="CVE"/>
		<reference ref_id="CVE-2016-5766" ref_url="https://www.suse.com/security/cve/CVE-2016-5766/" source="CVE"/>
		<reference ref_id="CVE-2016-6128" ref_url="https://www.suse.com/security/cve/CVE-2016-6128/" source="CVE"/>
		<reference ref_id="CVE-2016-6132" ref_url="https://www.suse.com/security/cve/CVE-2016-6132/" source="CVE"/>
		<reference ref_id="CVE-2016-6207" ref_url="https://www.suse.com/security/cve/CVE-2016-6207/" source="CVE"/>
		<reference ref_id="CVE-2016-6214" ref_url="https://www.suse.com/security/cve/CVE-2016-6214/" source="CVE"/>
		<reference ref_id="CVE-2016-6905" ref_url="https://www.suse.com/security/cve/CVE-2016-6905/" source="CVE"/>
		<reference ref_id="CVE-2016-6912" ref_url="https://www.suse.com/security/cve/CVE-2016-6912/" source="CVE"/>
		<reference ref_id="CVE-2016-9317" ref_url="https://www.suse.com/security/cve/CVE-2016-9317/" source="CVE"/>
		<reference ref_id="CVE-2017-6362" ref_url="https://www.suse.com/security/cve/CVE-2017-6362/" source="CVE"/>
		<reference ref_id="CVE-2017-7890" ref_url="https://www.suse.com/security/cve/CVE-2017-7890/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-14553" ref_url="https://www.suse.com/security/cve/CVE-2018-14553/" source="CVE"/>
		<reference ref_id="CVE-2018-5711" ref_url="https://www.suse.com/security/cve/CVE-2018-5711/" source="CVE"/>
		<reference ref_id="CVE-2019-11038" ref_url="https://www.suse.com/security/cve/CVE-2019-11038/" source="CVE"/>
		<reference ref_id="CVE-2019-6977" ref_url="https://www.suse.com/security/cve/CVE-2019-6977/" source="CVE"/>
		<reference ref_id="CVE-2019-6978" ref_url="https://www.suse.com/security/cve/CVE-2019-6978/" source="CVE"/>
		<description>
These are all security issues fixed in the gd-2.2.5-9.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2497/">CVE-2014-2497</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10166/">CVE-2016-10166</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10167/">CVE-2016-10167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10168/">CVE-2016-10168</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5116/">CVE-2016-5116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5766/">CVE-2016-5766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6128/">CVE-2016-6128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6132/">CVE-2016-6132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6207/">CVE-2016-6207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6214/">CVE-2016-6214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6905/">CVE-2016-6905</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6912/">CVE-2016-6912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9317/">CVE-2016-9317</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-6362/">CVE-2017-6362</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7890/">CVE-2017-7890</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14553/">CVE-2018-14553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5711/">CVE-2018-5711</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11038/">CVE-2019-11038</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6977/">CVE-2019-6977</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6978/">CVE-2019-6978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487232" comment="gd-2.2.5-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487233" comment="gd-devel-2.2.5-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109699" version="1" class="patch">
	<metadata>
		<title>gdk-pixbuf-query-loaders-32bit-2.40.0-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-7552" ref_url="https://www.suse.com/security/cve/CVE-2015-7552/" source="CVE"/>
		<reference ref_id="CVE-2015-7673" ref_url="https://www.suse.com/security/cve/CVE-2015-7673/" source="CVE"/>
		<reference ref_id="CVE-2015-7674" ref_url="https://www.suse.com/security/cve/CVE-2015-7674/" source="CVE"/>
		<reference ref_id="CVE-2016-6352" ref_url="https://www.suse.com/security/cve/CVE-2016-6352/" source="CVE"/>
		<reference ref_id="CVE-2017-2862" ref_url="https://www.suse.com/security/cve/CVE-2017-2862/" source="CVE"/>
		<reference ref_id="CVE-2017-2870" ref_url="https://www.suse.com/security/cve/CVE-2017-2870/" source="CVE"/>
		<reference ref_id="CVE-2017-6312" ref_url="https://www.suse.com/security/cve/CVE-2017-6312/" source="CVE"/>
		<reference ref_id="CVE-2017-6313" ref_url="https://www.suse.com/security/cve/CVE-2017-6313/" source="CVE"/>
		<description>
These are all security issues fixed in the gdk-pixbuf-query-loaders-32bit-2.40.0-1.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7552/">CVE-2015-7552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7673/">CVE-2015-7673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7674/">CVE-2015-7674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6352/">CVE-2016-6352</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2862/">CVE-2017-2862</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-2870/">CVE-2017-2870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6312/">CVE-2017-6312</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6313/">CVE-2017-6313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487234" comment="gdk-pixbuf-query-loaders-32bit-2.40.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487235" comment="libgdk_pixbuf-2_0-0-32bit-2.40.0-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109700" version="1" class="patch">
	<metadata>
		<title>gdm-3.34.1-6.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7496" ref_url="https://www.suse.com/security/cve/CVE-2015-7496/" source="CVE"/>
		<reference ref_id="CVE-2017-12164" ref_url="https://www.suse.com/security/cve/CVE-2017-12164/" source="CVE"/>
		<reference ref_id="CVE-2018-14424" ref_url="https://www.suse.com/security/cve/CVE-2018-14424/" source="CVE"/>
		<reference ref_id="CVE-2019-3825" ref_url="https://www.suse.com/security/cve/CVE-2019-3825/" source="CVE"/>
		<description>
These are all security issues fixed in the gdm-3.34.1-6.19 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7496/">CVE-2015-7496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12164/">CVE-2017-12164</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14424/">CVE-2018-14424</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3825/">CVE-2019-3825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487236" comment="gdm-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487237" comment="gdm-devel-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487238" comment="gdm-lang-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487239" comment="gdm-systemd-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487240" comment="gdmflexiserver-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487241" comment="libgdm1-3.34.1-6.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487242" comment="typelib-1_0-Gdm-1_0-3.34.1-6.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109701" version="1" class="patch">
	<metadata>
		<title>gnome-desktop-lang-3.34.4-1.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11460" ref_url="https://www.suse.com/security/cve/CVE-2019-11460/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-desktop-lang-3.34.4-1.32 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11460/">CVE-2019-11460</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487243" comment="gnome-desktop-lang-3.34.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487244" comment="gnome-version-3.34.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487245" comment="libgnome-desktop-3-18-3.34.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487246" comment="libgnome-desktop-3-devel-3.34.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487247" comment="libgnome-desktop-3_0-common-3.34.4-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487248" comment="typelib-1_0-GnomeDesktop-3_0-3.34.4-1.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109702" version="1" class="patch">
	<metadata>
		<title>gnome-settings-daemon-3.34.2+0-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7300" ref_url="https://www.suse.com/security/cve/CVE-2014-7300/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-settings-daemon-3.34.2+0-2.12 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7300/">CVE-2014-7300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487249" comment="gnome-settings-daemon-3.34.2+0-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487250" comment="gnome-settings-daemon-devel-3.34.2+0-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487251" comment="gnome-settings-daemon-lang-3.34.2+0-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109703" version="1" class="patch">
	<metadata>
		<title>gnome-shell-3.34.4+4-1.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-3.34.4+4-1.58 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487252" comment="gnome-shell-3.34.4+4-1.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487253" comment="gnome-shell-devel-3.34.4+4-1.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487254" comment="gnome-shell-lang-3.34.4+4-1.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109704" version="1" class="patch">
	<metadata>
		<title>gnome-shell-search-provider-nautilus-3.34.2-2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11461" ref_url="https://www.suse.com/security/cve/CVE-2019-11461/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-search-provider-nautilus-3.34.2-2.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11461/">CVE-2019-11461</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487255" comment="gnome-shell-search-provider-nautilus-3.34.2-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487256" comment="libnautilus-extension1-3.34.2-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487257" comment="nautilus-3.34.2-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487258" comment="nautilus-devel-3.34.2-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487259" comment="nautilus-lang-3.34.2-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487260" comment="typelib-1_0-Nautilus-3_0-3.34.2-2.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109705" version="1" class="patch">
	<metadata>
		<title>gstreamer-devel-1.16.2-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10198" ref_url="https://www.suse.com/security/cve/CVE-2016-10198/" source="CVE"/>
		<reference ref_id="CVE-2016-10199" ref_url="https://www.suse.com/security/cve/CVE-2016-10199/" source="CVE"/>
		<reference ref_id="CVE-2017-5837" ref_url="https://www.suse.com/security/cve/CVE-2017-5837/" source="CVE"/>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5839" ref_url="https://www.suse.com/security/cve/CVE-2017-5839/" source="CVE"/>
		<reference ref_id="CVE-2017-5840" ref_url="https://www.suse.com/security/cve/CVE-2017-5840/" source="CVE"/>
		<reference ref_id="CVE-2017-5841" ref_url="https://www.suse.com/security/cve/CVE-2017-5841/" source="CVE"/>
		<reference ref_id="CVE-2017-5842" ref_url="https://www.suse.com/security/cve/CVE-2017-5842/" source="CVE"/>
		<reference ref_id="CVE-2017-5843" ref_url="https://www.suse.com/security/cve/CVE-2017-5843/" source="CVE"/>
		<reference ref_id="CVE-2017-5844" ref_url="https://www.suse.com/security/cve/CVE-2017-5844/" source="CVE"/>
		<reference ref_id="CVE-2017-5845" ref_url="https://www.suse.com/security/cve/CVE-2017-5845/" source="CVE"/>
		<reference ref_id="CVE-2017-5846" ref_url="https://www.suse.com/security/cve/CVE-2017-5846/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-devel-1.16.2-1.53 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10198/">CVE-2016-10198</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10199/">CVE-2016-10199</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5837/">CVE-2017-5837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5839/">CVE-2017-5839</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5840/">CVE-2017-5840</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5841/">CVE-2017-5841</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5842/">CVE-2017-5842</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5843/">CVE-2017-5843</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5844/">CVE-2017-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5845/">CVE-2017-5845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5846/">CVE-2017-5846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487261" comment="gstreamer-devel-1.16.2-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487262" comment="gstreamer-utils-1.16.2-1.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109706" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-bad-1.16.2-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<reference ref_id="CVE-2017-5848" ref_url="https://www.suse.com/security/cve/CVE-2017-5848/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-bad-1.16.2-2.17 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5848/">CVE-2017-5848</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487263" comment="gstreamer-plugins-bad-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487264" comment="gstreamer-plugins-bad-chromaprint-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487265" comment="gstreamer-plugins-bad-devel-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487266" comment="gstreamer-plugins-bad-lang-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487267" comment="libgstadaptivedemux-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487268" comment="libgstbadaudio-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487269" comment="libgstbasecamerabinsrc-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487270" comment="libgstcodecparsers-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487271" comment="libgstinsertbin-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487272" comment="libgstisoff-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487273" comment="libgstmpegts-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487274" comment="libgstplayer-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487275" comment="libgstsctp-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487276" comment="libgsturidownloader-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487277" comment="libgstwayland-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487278" comment="libgstwebrtc-1_0-0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487279" comment="typelib-1_0-GstInsertBin-1_0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487280" comment="typelib-1_0-GstMpegts-1_0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487281" comment="typelib-1_0-GstPlayer-1_0-1.16.2-2.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487282" comment="typelib-1_0-GstWebRTC-1_0-1.16.2-2.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109707" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-base-devel-1.16.2-2.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-9928" ref_url="https://www.suse.com/security/cve/CVE-2019-9928/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-base-devel-1.16.2-2.12 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9928/">CVE-2019-9928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487283" comment="gstreamer-plugins-base-devel-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487284" comment="typelib-1_0-GstAllocators-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487285" comment="typelib-1_0-GstApp-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487286" comment="typelib-1_0-GstAudio-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487287" comment="typelib-1_0-GstGL-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487288" comment="typelib-1_0-GstPbutils-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487289" comment="typelib-1_0-GstRtp-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487290" comment="typelib-1_0-GstRtsp-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487291" comment="typelib-1_0-GstSdp-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487292" comment="typelib-1_0-GstTag-1_0-1.16.2-2.12 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487293" comment="typelib-1_0-GstVideo-1_0-1.16.2-2.12 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109708" version="1" class="patch">
	<metadata>
		<title>gtk2-data-2.24.32+67-2.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk2-data-2.24.32+67-2.28 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487294" comment="gtk2-data-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487295" comment="gtk2-tools-32bit-2.24.32+67-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487296" comment="libgtk-2_0-0-32bit-2.24.32+67-2.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109709" version="1" class="patch">
	<metadata>
		<title>gvfs-1.42.2-4.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-12447" ref_url="https://www.suse.com/security/cve/CVE-2019-12447/" source="CVE"/>
		<reference ref_id="CVE-2019-12448" ref_url="https://www.suse.com/security/cve/CVE-2019-12448/" source="CVE"/>
		<reference ref_id="CVE-2019-12449" ref_url="https://www.suse.com/security/cve/CVE-2019-12449/" source="CVE"/>
		<reference ref_id="CVE-2019-12795" ref_url="https://www.suse.com/security/cve/CVE-2019-12795/" source="CVE"/>
		<reference ref_id="CVE-2019-3827" ref_url="https://www.suse.com/security/cve/CVE-2019-3827/" source="CVE"/>
		<description>
These are all security issues fixed in the gvfs-1.42.2-4.24 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12447/">CVE-2019-12447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12448/">CVE-2019-12448</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12449/">CVE-2019-12449</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12795/">CVE-2019-12795</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3827/">CVE-2019-3827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487297" comment="gvfs-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487298" comment="gvfs-backend-afc-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487299" comment="gvfs-backend-samba-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487300" comment="gvfs-backends-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487301" comment="gvfs-devel-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487302" comment="gvfs-fuse-1.42.2-4.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487303" comment="gvfs-lang-1.42.2-4.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109710" version="1" class="patch">
	<metadata>
		<title>gvim-8.0.1568-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-0316" ref_url="https://www.suse.com/security/cve/CVE-2009-0316/" source="CVE"/>
		<reference ref_id="CVE-2017-1000382" ref_url="https://www.suse.com/security/cve/CVE-2017-1000382/" source="CVE"/>
		<reference ref_id="CVE-2017-5953" ref_url="https://www.suse.com/security/cve/CVE-2017-5953/" source="CVE"/>
		<reference ref_id="CVE-2017-6349" ref_url="https://www.suse.com/security/cve/CVE-2017-6349/" source="CVE"/>
		<reference ref_id="CVE-2017-6350" ref_url="https://www.suse.com/security/cve/CVE-2017-6350/" source="CVE"/>
		<reference ref_id="CVE-2019-12735" ref_url="https://www.suse.com/security/cve/CVE-2019-12735/" source="CVE"/>
		<description>
These are all security issues fixed in the gvim-8.0.1568-5.3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0316/">CVE-2009-0316</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000382/">CVE-2017-1000382</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-5953/">CVE-2017-5953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6349/">CVE-2017-6349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6350/">CVE-2017-6350</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12735/">CVE-2019-12735</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487304" comment="gvim-8.0.1568-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109711" version="1" class="patch">
	<metadata>
		<title>hplip-3.19.12-1.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0839" ref_url="https://www.suse.com/security/cve/CVE-2015-0839/" source="CVE"/>
		<description>
These are all security issues fixed in the hplip-3.19.12-1.72 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0839/">CVE-2015-0839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487305" comment="hplip-3.19.12-1.72 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109712" version="1" class="patch">
	<metadata>
		<title>ibus-1.5.22-2.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14822" ref_url="https://www.suse.com/security/cve/CVE-2019-14822/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-1.5.22-2.21 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14822/">CVE-2019-14822</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487306" comment="ibus-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487307" comment="ibus-devel-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487308" comment="ibus-dict-emoji-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487309" comment="ibus-gtk-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487310" comment="ibus-gtk3-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487311" comment="ibus-lang-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487312" comment="libibus-1_0-5-1.5.22-2.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487313" comment="typelib-1_0-IBus-1_0-1.5.22-2.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109713" version="1" class="patch">
	<metadata>
		<title>ibus-chewing-1.6.1-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-4509" ref_url="https://www.suse.com/security/cve/CVE-2013-4509/" source="CVE"/>
		<description>
These are all security issues fixed in the ibus-chewing-1.6.1-1.53 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4509/">CVE-2013-4509</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487314" comment="ibus-chewing-1.6.1-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486644" comment="ibus-pinyin-1.5.0-4.37 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109714" version="1" class="patch">
	<metadata>
		<title>imlib2-loaders-1.4.10-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-0991" ref_url="https://www.suse.com/security/cve/CVE-2010-0991/" source="CVE"/>
		<description>
These are all security issues fixed in the imlib2-loaders-1.4.10-1.28 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-0991/">CVE-2010-0991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487315" comment="imlib2-loaders-1.4.10-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487316" comment="libImlib2-1-1.4.10-1.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109715" version="1" class="patch">
	<metadata>
		<title>libICE6-32bit-1.0.9-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2626" ref_url="https://www.suse.com/security/cve/CVE-2017-2626/" source="CVE"/>
		<description>
These are all security issues fixed in the libICE6-32bit-1.0.9-1.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-2626/">CVE-2017-2626</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482742" comment="libICE6-32bit-1.0.9-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109716" version="1" class="patch">
	<metadata>
		<title>libIlmImf-2_2-23-2.2.1-3.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12596" ref_url="https://www.suse.com/security/cve/CVE-2017-12596/" source="CVE"/>
		<reference ref_id="CVE-2017-14988" ref_url="https://www.suse.com/security/cve/CVE-2017-14988/" source="CVE"/>
		<reference ref_id="CVE-2017-9110" ref_url="https://www.suse.com/security/cve/CVE-2017-9110/" source="CVE"/>
		<reference ref_id="CVE-2017-9111" ref_url="https://www.suse.com/security/cve/CVE-2017-9111/" source="CVE"/>
		<reference ref_id="CVE-2017-9112" ref_url="https://www.suse.com/security/cve/CVE-2017-9112/" source="CVE"/>
		<reference ref_id="CVE-2017-9113" ref_url="https://www.suse.com/security/cve/CVE-2017-9113/" source="CVE"/>
		<reference ref_id="CVE-2017-9114" ref_url="https://www.suse.com/security/cve/CVE-2017-9114/" source="CVE"/>
		<reference ref_id="CVE-2017-9115" ref_url="https://www.suse.com/security/cve/CVE-2017-9115/" source="CVE"/>
		<reference ref_id="CVE-2017-9116" ref_url="https://www.suse.com/security/cve/CVE-2017-9116/" source="CVE"/>
		<reference ref_id="CVE-2018-18444" ref_url="https://www.suse.com/security/cve/CVE-2018-18444/" source="CVE"/>
		<reference ref_id="CVE-2020-11758" ref_url="https://www.suse.com/security/cve/CVE-2020-11758/" source="CVE"/>
		<reference ref_id="CVE-2020-11760" ref_url="https://www.suse.com/security/cve/CVE-2020-11760/" source="CVE"/>
		<reference ref_id="CVE-2020-11761" ref_url="https://www.suse.com/security/cve/CVE-2020-11761/" source="CVE"/>
		<reference ref_id="CVE-2020-11762" ref_url="https://www.suse.com/security/cve/CVE-2020-11762/" source="CVE"/>
		<reference ref_id="CVE-2020-11763" ref_url="https://www.suse.com/security/cve/CVE-2020-11763/" source="CVE"/>
		<reference ref_id="CVE-2020-11764" ref_url="https://www.suse.com/security/cve/CVE-2020-11764/" source="CVE"/>
		<reference ref_id="CVE-2020-11765" ref_url="https://www.suse.com/security/cve/CVE-2020-11765/" source="CVE"/>
		<description>
These are all security issues fixed in the libIlmImf-2_2-23-2.2.1-3.14.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12596/">CVE-2017-12596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14988/">CVE-2017-14988</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9110/">CVE-2017-9110</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9111/">CVE-2017-9111</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9112/">CVE-2017-9112</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-9113/">CVE-2017-9113</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9114/">CVE-2017-9114</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9115/">CVE-2017-9115</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9116/">CVE-2017-9116</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18444/">CVE-2018-18444</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11758/">CVE-2020-11758</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11760/">CVE-2020-11760</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11761/">CVE-2020-11761</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-11762/">CVE-2020-11762</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11763/">CVE-2020-11763</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11764/">CVE-2020-11764</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11765/">CVE-2020-11765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487317" comment="libIlmImf-2_2-23-2.2.1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487318" comment="libIlmImfUtil-2_2-23-2.2.1-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487319" comment="openexr-devel-2.2.1-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109717" version="1" class="patch">
	<metadata>
		<title>libQt5OpenGLExtensions-devel-static-5.12.7-2.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0295" ref_url="https://www.suse.com/security/cve/CVE-2015-0295/" source="CVE"/>
		<reference ref_id="CVE-2020-0569" ref_url="https://www.suse.com/security/cve/CVE-2020-0569/" source="CVE"/>
		<reference ref_id="CVE-2020-0570" ref_url="https://www.suse.com/security/cve/CVE-2020-0570/" source="CVE"/>
		<description>
These are all security issues fixed in the libQt5OpenGLExtensions-devel-static-5.12.7-2.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0295/">CVE-2015-0295</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0569/">CVE-2020-0569</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0570/">CVE-2020-0570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487320" comment="libQt5OpenGLExtensions-devel-static-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487321" comment="libQt5Sql5-mysql-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487322" comment="libQt5Sql5-postgresql-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487323" comment="libQt5Sql5-unixODBC-5.12.7-2.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487324" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-2.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109718" version="1" class="patch">
	<metadata>
		<title>libSDL-1_2-0-1.2.15-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL-1_2-0-1.2.15-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486653" comment="libSDL-1_2-0-1.2.15-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486654" comment="libSDL-devel-1.2.15-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109719" version="1" class="patch">
	<metadata>
		<title>libSDL2-2_0-0-2.0.8-9.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2888" ref_url="https://www.suse.com/security/cve/CVE-2017-2888/" source="CVE"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="CVE-2019-13626" ref_url="https://www.suse.com/security/cve/CVE-2019-13626/" source="CVE"/>
		<reference ref_id="CVE-2019-7572" ref_url="https://www.suse.com/security/cve/CVE-2019-7572/" source="CVE"/>
		<reference ref_id="CVE-2019-7573" ref_url="https://www.suse.com/security/cve/CVE-2019-7573/" source="CVE"/>
		<reference ref_id="CVE-2019-7574" ref_url="https://www.suse.com/security/cve/CVE-2019-7574/" source="CVE"/>
		<reference ref_id="CVE-2019-7575" ref_url="https://www.suse.com/security/cve/CVE-2019-7575/" source="CVE"/>
		<reference ref_id="CVE-2019-7576" ref_url="https://www.suse.com/security/cve/CVE-2019-7576/" source="CVE"/>
		<reference ref_id="CVE-2019-7577" ref_url="https://www.suse.com/security/cve/CVE-2019-7577/" source="CVE"/>
		<reference ref_id="CVE-2019-7578" ref_url="https://www.suse.com/security/cve/CVE-2019-7578/" source="CVE"/>
		<reference ref_id="CVE-2019-7635" ref_url="https://www.suse.com/security/cve/CVE-2019-7635/" source="CVE"/>
		<reference ref_id="CVE-2019-7636" ref_url="https://www.suse.com/security/cve/CVE-2019-7636/" source="CVE"/>
		<reference ref_id="CVE-2019-7637" ref_url="https://www.suse.com/security/cve/CVE-2019-7637/" source="CVE"/>
		<reference ref_id="CVE-2019-7638" ref_url="https://www.suse.com/security/cve/CVE-2019-7638/" source="CVE"/>
		<description>
These are all security issues fixed in the libSDL2-2_0-0-2.0.8-9.63 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2888/">CVE-2017-2888</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13626/">CVE-2019-13626</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-7572/">CVE-2019-7572</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7573/">CVE-2019-7573</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7574/">CVE-2019-7574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7575/">CVE-2019-7575</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7576/">CVE-2019-7576</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7577/">CVE-2019-7577</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7578/">CVE-2019-7578</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7635/">CVE-2019-7635</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7636/">CVE-2019-7636</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7637/">CVE-2019-7637</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7638/">CVE-2019-7638</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487325" comment="libSDL2-2_0-0-2.0.8-9.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487326" comment="libSDL2-devel-2.0.8-9.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109720" version="1" class="patch">
	<metadata>
		<title>libSoundTouch0-1.8.0-3.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000223" ref_url="https://www.suse.com/security/cve/CVE-2018-1000223/" source="CVE"/>
		<reference ref_id="CVE-2018-17096" ref_url="https://www.suse.com/security/cve/CVE-2018-17096/" source="CVE"/>
		<reference ref_id="CVE-2018-17097" ref_url="https://www.suse.com/security/cve/CVE-2018-17097/" source="CVE"/>
		<reference ref_id="CVE-2018-17098" ref_url="https://www.suse.com/security/cve/CVE-2018-17098/" source="CVE"/>
		<description>
These are all security issues fixed in the libSoundTouch0-1.8.0-3.11.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000223/">CVE-2018-1000223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-17096/">CVE-2018-17096</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17097/">CVE-2018-17097</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-17098/">CVE-2018-17098</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486657" comment="libSoundTouch0-1.8.0-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486658" comment="soundtouch-devel-1.8.0-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109721" version="1" class="patch">
	<metadata>
		<title>libXcursor1-32bit-1.1.15-1.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2003" ref_url="https://www.suse.com/security/cve/CVE-2013-2003/" source="CVE"/>
		<reference ref_id="CVE-2017-16612" ref_url="https://www.suse.com/security/cve/CVE-2017-16612/" source="CVE"/>
		<description>
These are all security issues fixed in the libXcursor1-32bit-1.1.15-1.18 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2003/">CVE-2013-2003</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16612/">CVE-2017-16612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482753" comment="libXcursor1-32bit-1.1.15-1.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109722" version="1" class="patch">
	<metadata>
		<title>libXinerama1-32bit-1.1.3-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1985" ref_url="https://www.suse.com/security/cve/CVE-2013-1985/" source="CVE"/>
		<description>
These are all security issues fixed in the libXinerama1-32bit-1.1.3-1.22 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1985/">CVE-2013-1985</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482755" comment="libXinerama1-32bit-1.1.3-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109723" version="1" class="patch">
	<metadata>
		<title>libXp6-32bit-1.0.3-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2062" ref_url="https://www.suse.com/security/cve/CVE-2013-2062/" source="CVE"/>
		<description>
These are all security issues fixed in the libXp6-32bit-1.0.3-1.24 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2062/">CVE-2013-2062</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482756" comment="libXp6-32bit-1.0.3-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109724" version="1" class="patch">
	<metadata>
		<title>libXrandr2-32bit-1.5.1-2.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1986" ref_url="https://www.suse.com/security/cve/CVE-2013-1986/" source="CVE"/>
		<reference ref_id="CVE-2016-7947" ref_url="https://www.suse.com/security/cve/CVE-2016-7947/" source="CVE"/>
		<reference ref_id="CVE-2016-7948" ref_url="https://www.suse.com/security/cve/CVE-2016-7948/" source="CVE"/>
		<description>
These are all security issues fixed in the libXrandr2-32bit-1.5.1-2.17 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1986/">CVE-2013-1986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7947/">CVE-2016-7947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7948/">CVE-2016-7948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482757" comment="libXrandr2-32bit-1.5.1-2.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109725" version="1" class="patch">
	<metadata>
		<title>libXt6-32bit-1.1.5-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2002" ref_url="https://www.suse.com/security/cve/CVE-2013-2002/" source="CVE"/>
		<reference ref_id="CVE-2013-2005" ref_url="https://www.suse.com/security/cve/CVE-2013-2005/" source="CVE"/>
		<description>
These are all security issues fixed in the libXt6-32bit-1.1.5-2.24 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2002/">CVE-2013-2002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2005/">CVE-2013-2005</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482758" comment="libXt6-32bit-1.1.5-2.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109726" version="1" class="patch">
	<metadata>
		<title>libXvnc-devel-1.9.0-19.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8240" ref_url="https://www.suse.com/security/cve/CVE-2014-8240/" source="CVE"/>
		<reference ref_id="CVE-2015-0255" ref_url="https://www.suse.com/security/cve/CVE-2015-0255/" source="CVE"/>
		<reference ref_id="CVE-2019-15691" ref_url="https://www.suse.com/security/cve/CVE-2019-15691/" source="CVE"/>
		<reference ref_id="CVE-2019-15692" ref_url="https://www.suse.com/security/cve/CVE-2019-15692/" source="CVE"/>
		<reference ref_id="CVE-2019-15693" ref_url="https://www.suse.com/security/cve/CVE-2019-15693/" source="CVE"/>
		<reference ref_id="CVE-2019-15694" ref_url="https://www.suse.com/security/cve/CVE-2019-15694/" source="CVE"/>
		<reference ref_id="CVE-2019-15695" ref_url="https://www.suse.com/security/cve/CVE-2019-15695/" source="CVE"/>
		<description>
These are all security issues fixed in the libXvnc-devel-1.9.0-19.6.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8240/">CVE-2014-8240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0255/">CVE-2015-0255</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15691/">CVE-2019-15691</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15692/">CVE-2019-15692</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15693/">CVE-2019-15693</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15694/">CVE-2019-15694</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15695/">CVE-2019-15695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487327" comment="libXvnc-devel-1.9.0-19.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109727" version="1" class="patch">
	<metadata>
		<title>libass-devel-0.14.0-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-7969" ref_url="https://www.suse.com/security/cve/CVE-2016-7969/" source="CVE"/>
		<reference ref_id="CVE-2016-7970" ref_url="https://www.suse.com/security/cve/CVE-2016-7970/" source="CVE"/>
		<reference ref_id="CVE-2016-7972" ref_url="https://www.suse.com/security/cve/CVE-2016-7972/" source="CVE"/>
		<description>
These are all security issues fixed in the libass-devel-0.14.0-1.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7969/">CVE-2016-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7970/">CVE-2016-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7972/">CVE-2016-7972</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482760" comment="libass-devel-0.14.0-1.25 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482761" comment="libass9-0.14.0-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109728" version="1" class="patch">
	<metadata>
		<title>libavcodec57-3.4.2-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8364" ref_url="https://www.suse.com/security/cve/CVE-2015-8364/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8662" ref_url="https://www.suse.com/security/cve/CVE-2015-8662/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-10190" ref_url="https://www.suse.com/security/cve/CVE-2016-10190/" source="CVE"/>
		<reference ref_id="CVE-2016-10191" ref_url="https://www.suse.com/security/cve/CVE-2016-10191/" source="CVE"/>
		<reference ref_id="CVE-2016-10192" ref_url="https://www.suse.com/security/cve/CVE-2016-10192/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2016-1898" ref_url="https://www.suse.com/security/cve/CVE-2016-1898/" source="CVE"/>
		<reference ref_id="CVE-2017-11399" ref_url="https://www.suse.com/security/cve/CVE-2017-11399/" source="CVE"/>
		<reference ref_id="CVE-2017-11665" ref_url="https://www.suse.com/security/cve/CVE-2017-11665/" source="CVE"/>
		<reference ref_id="CVE-2017-14054" ref_url="https://www.suse.com/security/cve/CVE-2017-14054/" source="CVE"/>
		<reference ref_id="CVE-2017-14055" ref_url="https://www.suse.com/security/cve/CVE-2017-14055/" source="CVE"/>
		<reference ref_id="CVE-2017-14056" ref_url="https://www.suse.com/security/cve/CVE-2017-14056/" source="CVE"/>
		<reference ref_id="CVE-2017-14057" ref_url="https://www.suse.com/security/cve/CVE-2017-14057/" source="CVE"/>
		<reference ref_id="CVE-2017-14058" ref_url="https://www.suse.com/security/cve/CVE-2017-14058/" source="CVE"/>
		<reference ref_id="CVE-2017-14059" ref_url="https://www.suse.com/security/cve/CVE-2017-14059/" source="CVE"/>
		<reference ref_id="CVE-2017-14169" ref_url="https://www.suse.com/security/cve/CVE-2017-14169/" source="CVE"/>
		<reference ref_id="CVE-2017-14170" ref_url="https://www.suse.com/security/cve/CVE-2017-14170/" source="CVE"/>
		<reference ref_id="CVE-2017-14171" ref_url="https://www.suse.com/security/cve/CVE-2017-14171/" source="CVE"/>
		<reference ref_id="CVE-2017-14222" ref_url="https://www.suse.com/security/cve/CVE-2017-14222/" source="CVE"/>
		<reference ref_id="CVE-2017-14223" ref_url="https://www.suse.com/security/cve/CVE-2017-14223/" source="CVE"/>
		<reference ref_id="CVE-2017-14225" ref_url="https://www.suse.com/security/cve/CVE-2017-14225/" source="CVE"/>
		<reference ref_id="CVE-2017-15186" ref_url="https://www.suse.com/security/cve/CVE-2017-15186/" source="CVE"/>
		<reference ref_id="CVE-2017-15672" ref_url="https://www.suse.com/security/cve/CVE-2017-15672/" source="CVE"/>
		<reference ref_id="CVE-2017-16840" ref_url="https://www.suse.com/security/cve/CVE-2017-16840/" source="CVE"/>
		<reference ref_id="CVE-2017-17081" ref_url="https://www.suse.com/security/cve/CVE-2017-17081/" source="CVE"/>
		<reference ref_id="CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555/" source="CVE"/>
		<reference ref_id="CVE-2017-7859" ref_url="https://www.suse.com/security/cve/CVE-2017-7859/" source="CVE"/>
		<reference ref_id="CVE-2017-7862" ref_url="https://www.suse.com/security/cve/CVE-2017-7862/" source="CVE"/>
		<reference ref_id="CVE-2017-7863" ref_url="https://www.suse.com/security/cve/CVE-2017-7863/" source="CVE"/>
		<reference ref_id="CVE-2017-7865" ref_url="https://www.suse.com/security/cve/CVE-2017-7865/" source="CVE"/>
		<reference ref_id="CVE-2017-7866" ref_url="https://www.suse.com/security/cve/CVE-2017-7866/" source="CVE"/>
		<reference ref_id="CVE-2018-12458" ref_url="https://www.suse.com/security/cve/CVE-2018-12458/" source="CVE"/>
		<reference ref_id="CVE-2018-13300" ref_url="https://www.suse.com/security/cve/CVE-2018-13300/" source="CVE"/>
		<reference ref_id="CVE-2018-13301" ref_url="https://www.suse.com/security/cve/CVE-2018-13301/" source="CVE"/>
		<reference ref_id="CVE-2018-13302" ref_url="https://www.suse.com/security/cve/CVE-2018-13302/" source="CVE"/>
		<reference ref_id="CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-14394" ref_url="https://www.suse.com/security/cve/CVE-2018-14394/" source="CVE"/>
		<reference ref_id="CVE-2018-14395" ref_url="https://www.suse.com/security/cve/CVE-2018-14395/" source="CVE"/>
		<reference ref_id="CVE-2018-15822" ref_url="https://www.suse.com/security/cve/CVE-2018-15822/" source="CVE"/>
		<reference ref_id="CVE-2018-1999010" ref_url="https://www.suse.com/security/cve/CVE-2018-1999010/" source="CVE"/>
		<reference ref_id="CVE-2018-1999011" ref_url="https://www.suse.com/security/cve/CVE-2018-1999011/" source="CVE"/>
		<reference ref_id="CVE-2018-1999012" ref_url="https://www.suse.com/security/cve/CVE-2018-1999012/" source="CVE"/>
		<reference ref_id="CVE-2018-1999013" ref_url="https://www.suse.com/security/cve/CVE-2018-1999013/" source="CVE"/>
		<reference ref_id="CVE-2018-6392" ref_url="https://www.suse.com/security/cve/CVE-2018-6392/" source="CVE"/>
		<reference ref_id="CVE-2018-6621" ref_url="https://www.suse.com/security/cve/CVE-2018-6621/" source="CVE"/>
		<reference ref_id="CVE-2019-12730" ref_url="https://www.suse.com/security/cve/CVE-2019-12730/" source="CVE"/>
		<reference ref_id="CVE-2019-17542" ref_url="https://www.suse.com/security/cve/CVE-2019-17542/" source="CVE"/>
		<reference ref_id="CVE-2019-9718" ref_url="https://www.suse.com/security/cve/CVE-2019-9718/" source="CVE"/>
		<description>
These are all security issues fixed in the libavcodec57-3.4.2-9.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8364/">CVE-2015-8364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8662/">CVE-2015-8662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10190/">CVE-2016-10190</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10191/">CVE-2016-10191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10192/">CVE-2016-10192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1898/">CVE-2016-1898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11399/">CVE-2017-11399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11665/">CVE-2017-11665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14054/">CVE-2017-14054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14055/">CVE-2017-14055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14056/">CVE-2017-14056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14057/">CVE-2017-14057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14058/">CVE-2017-14058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14059/">CVE-2017-14059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14169/">CVE-2017-14169</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14170/">CVE-2017-14170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14171/">CVE-2017-14171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14222/">CVE-2017-14222</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14223/">CVE-2017-14223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14225/">CVE-2017-14225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15186/">CVE-2017-15186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15672/">CVE-2017-15672</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-16840/">CVE-2017-16840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17081/">CVE-2017-17081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7859/">CVE-2017-7859</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7862/">CVE-2017-7862</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7863/">CVE-2017-7863</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7865/">CVE-2017-7865</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7866/">CVE-2017-7866</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12458/">CVE-2018-12458</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13300/">CVE-2018-13300</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13301/">CVE-2018-13301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13302/">CVE-2018-13302</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14394/">CVE-2018-14394</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14395/">CVE-2018-14395</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15822/">CVE-2018-15822</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999010/">CVE-2018-1999010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999011/">CVE-2018-1999011</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999012/">CVE-2018-1999012</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999013/">CVE-2018-1999013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6392/">CVE-2018-6392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6621/">CVE-2018-6621</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12730/">CVE-2019-12730</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17542/">CVE-2019-17542</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9718/">CVE-2019-9718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487328" comment="libavcodec57-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487329" comment="libavformat57-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487330" comment="libavutil-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487331" comment="libavutil55-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487332" comment="libpostproc-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487333" comment="libpostproc54-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487334" comment="libswresample-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487335" comment="libswresample2-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487336" comment="libswscale-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487337" comment="libswscale4-3.4.2-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109729" version="1" class="patch">
	<metadata>
		<title>libcairo2-32bit-1.16.0-1.55 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9082" ref_url="https://www.suse.com/security/cve/CVE-2016-9082/" source="CVE"/>
		<reference ref_id="CVE-2017-7475" ref_url="https://www.suse.com/security/cve/CVE-2017-7475/" source="CVE"/>
		<reference ref_id="CVE-2017-9814" ref_url="https://www.suse.com/security/cve/CVE-2017-9814/" source="CVE"/>
		<description>
These are all security issues fixed in the libcairo2-32bit-1.16.0-1.55 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9082/">CVE-2016-9082</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7475/">CVE-2017-7475</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9814/">CVE-2017-9814</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487338" comment="libcairo2-32bit-1.16.0-1.55 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109730" version="1" class="patch">
	<metadata>
		<title>libcdio++0-0.94-6.9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-18199" ref_url="https://www.suse.com/security/cve/CVE-2017-18199/" source="CVE"/>
		<reference ref_id="CVE-2017-18201" ref_url="https://www.suse.com/security/cve/CVE-2017-18201/" source="CVE"/>
		<description>
These are all security issues fixed in the libcdio++0-0.94-6.9.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18199/">CVE-2017-18199</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18201/">CVE-2017-18201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487339" comment="libcdio++0-0.94-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487340" comment="libcdio-devel-0.94-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487341" comment="libcdio16-0.94-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487342" comment="libiso9660-10-0.94-6.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487343" comment="libudf0-0.94-6.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109731" version="1" class="patch">
	<metadata>
		<title>libcolord-gtk-devel-0.1.26-1.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the libcolord-gtk-devel-0.1.26-1.48 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482645" comment="libcolord-gtk-devel-0.1.26-1.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482646" comment="libcolord-gtk1-0.1.26-1.48 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482649" comment="typelib-1_0-ColordGtk-1_0-0.1.26-1.48 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109732" version="1" class="patch">
	<metadata>
		<title>libdjvulibre-devel-3.5.27-9.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-15142" ref_url="https://www.suse.com/security/cve/CVE-2019-15142/" source="CVE"/>
		<reference ref_id="CVE-2019-15143" ref_url="https://www.suse.com/security/cve/CVE-2019-15143/" source="CVE"/>
		<reference ref_id="CVE-2019-15144" ref_url="https://www.suse.com/security/cve/CVE-2019-15144/" source="CVE"/>
		<reference ref_id="CVE-2019-15145" ref_url="https://www.suse.com/security/cve/CVE-2019-15145/" source="CVE"/>
		<reference ref_id="CVE-2019-18804" ref_url="https://www.suse.com/security/cve/CVE-2019-18804/" source="CVE"/>
		<description>
These are all security issues fixed in the libdjvulibre-devel-3.5.27-9.28 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15142/">CVE-2019-15142</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15143/">CVE-2019-15143</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15144/">CVE-2019-15144</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15145/">CVE-2019-15145</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18804/">CVE-2019-18804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487344" comment="libdjvulibre-devel-3.5.27-9.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487345" comment="libdjvulibre21-3.5.27-9.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109733" version="1" class="patch">
	<metadata>
		<title>libexempi-devel-2.4.5-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-12648" ref_url="https://www.suse.com/security/cve/CVE-2018-12648/" source="CVE"/>
		<reference ref_id="CVE-2018-7728" ref_url="https://www.suse.com/security/cve/CVE-2018-7728/" source="CVE"/>
		<reference ref_id="CVE-2018-7729" ref_url="https://www.suse.com/security/cve/CVE-2018-7729/" source="CVE"/>
		<reference ref_id="CVE-2018-7730" ref_url="https://www.suse.com/security/cve/CVE-2018-7730/" source="CVE"/>
		<reference ref_id="CVE-2018-7731" ref_url="https://www.suse.com/security/cve/CVE-2018-7731/" source="CVE"/>
		<description>
These are all security issues fixed in the libexempi-devel-2.4.5-3.3.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12648/">CVE-2018-12648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7728/">CVE-2018-7728</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7729/">CVE-2018-7729</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7730/">CVE-2018-7730</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7731/">CVE-2018-7731</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487346" comment="libexempi-devel-2.4.5-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487347" comment="libexempi3-2.4.5-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109734" version="1" class="patch">
	<metadata>
		<title>libexif-devel-0.6.21-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2812" ref_url="https://www.suse.com/security/cve/CVE-2012-2812/" source="CVE"/>
		<reference ref_id="CVE-2012-2813" ref_url="https://www.suse.com/security/cve/CVE-2012-2813/" source="CVE"/>
		<reference ref_id="CVE-2012-2814" ref_url="https://www.suse.com/security/cve/CVE-2012-2814/" source="CVE"/>
		<reference ref_id="CVE-2012-2836" ref_url="https://www.suse.com/security/cve/CVE-2012-2836/" source="CVE"/>
		<reference ref_id="CVE-2012-2837" ref_url="https://www.suse.com/security/cve/CVE-2012-2837/" source="CVE"/>
		<reference ref_id="CVE-2012-2840" ref_url="https://www.suse.com/security/cve/CVE-2012-2840/" source="CVE"/>
		<reference ref_id="CVE-2012-2841" ref_url="https://www.suse.com/security/cve/CVE-2012-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<description>
These are all security issues fixed in the libexif-devel-0.6.21-5.3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2812/">CVE-2012-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2813/">CVE-2012-2813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2814/">CVE-2012-2814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2836/">CVE-2012-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2837/">CVE-2012-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2840/">CVE-2012-2840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2841/">CVE-2012-2841</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487348" comment="libexif-devel-0.6.21-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487349" comment="libexif12-0.6.21-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109735" version="1" class="patch">
	<metadata>
		<title>libexiv2-26-0.26-6.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9449" ref_url="https://www.suse.com/security/cve/CVE-2014-9449/" source="CVE"/>
		<reference ref_id="CVE-2017-1000126" ref_url="https://www.suse.com/security/cve/CVE-2017-1000126/" source="CVE"/>
		<reference ref_id="CVE-2017-11337" ref_url="https://www.suse.com/security/cve/CVE-2017-11337/" source="CVE"/>
		<reference ref_id="CVE-2017-11338" ref_url="https://www.suse.com/security/cve/CVE-2017-11338/" source="CVE"/>
		<reference ref_id="CVE-2017-11339" ref_url="https://www.suse.com/security/cve/CVE-2017-11339/" source="CVE"/>
		<reference ref_id="CVE-2017-11340" ref_url="https://www.suse.com/security/cve/CVE-2017-11340/" source="CVE"/>
		<reference ref_id="CVE-2017-11553" ref_url="https://www.suse.com/security/cve/CVE-2017-11553/" source="CVE"/>
		<reference ref_id="CVE-2017-11591" ref_url="https://www.suse.com/security/cve/CVE-2017-11591/" source="CVE"/>
		<reference ref_id="CVE-2017-11592" ref_url="https://www.suse.com/security/cve/CVE-2017-11592/" source="CVE"/>
		<reference ref_id="CVE-2017-11683" ref_url="https://www.suse.com/security/cve/CVE-2017-11683/" source="CVE"/>
		<reference ref_id="CVE-2017-12955" ref_url="https://www.suse.com/security/cve/CVE-2017-12955/" source="CVE"/>
		<reference ref_id="CVE-2017-12956" ref_url="https://www.suse.com/security/cve/CVE-2017-12956/" source="CVE"/>
		<reference ref_id="CVE-2017-12957" ref_url="https://www.suse.com/security/cve/CVE-2017-12957/" source="CVE"/>
		<reference ref_id="CVE-2017-14859" ref_url="https://www.suse.com/security/cve/CVE-2017-14859/" source="CVE"/>
		<reference ref_id="CVE-2017-14860" ref_url="https://www.suse.com/security/cve/CVE-2017-14860/" source="CVE"/>
		<reference ref_id="CVE-2017-14862" ref_url="https://www.suse.com/security/cve/CVE-2017-14862/" source="CVE"/>
		<reference ref_id="CVE-2017-14864" ref_url="https://www.suse.com/security/cve/CVE-2017-14864/" source="CVE"/>
		<reference ref_id="CVE-2017-9239" ref_url="https://www.suse.com/security/cve/CVE-2017-9239/" source="CVE"/>
		<reference ref_id="CVE-2018-12264" ref_url="https://www.suse.com/security/cve/CVE-2018-12264/" source="CVE"/>
		<reference ref_id="CVE-2018-12265" ref_url="https://www.suse.com/security/cve/CVE-2018-12265/" source="CVE"/>
		<reference ref_id="CVE-2018-17229" ref_url="https://www.suse.com/security/cve/CVE-2018-17229/" source="CVE"/>
		<reference ref_id="CVE-2018-17230" ref_url="https://www.suse.com/security/cve/CVE-2018-17230/" source="CVE"/>
		<reference ref_id="CVE-2018-17282" ref_url="https://www.suse.com/security/cve/CVE-2018-17282/" source="CVE"/>
		<reference ref_id="CVE-2018-19108" ref_url="https://www.suse.com/security/cve/CVE-2018-19108/" source="CVE"/>
		<reference ref_id="CVE-2018-19607" ref_url="https://www.suse.com/security/cve/CVE-2018-19607/" source="CVE"/>
		<reference ref_id="CVE-2018-9305" ref_url="https://www.suse.com/security/cve/CVE-2018-9305/" source="CVE"/>
		<reference ref_id="CVE-2019-13114" ref_url="https://www.suse.com/security/cve/CVE-2019-13114/" source="CVE"/>
		<description>
These are all security issues fixed in the libexiv2-26-0.26-6.8.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9449/">CVE-2014-9449</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000126/">CVE-2017-1000126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11337/">CVE-2017-11337</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11338/">CVE-2017-11338</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11339/">CVE-2017-11339</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-11340/">CVE-2017-11340</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11553/">CVE-2017-11553</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11591/">CVE-2017-11591</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11592/">CVE-2017-11592</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11683/">CVE-2017-11683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12955/">CVE-2017-12955</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12956/">CVE-2017-12956</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12957/">CVE-2017-12957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14859/">CVE-2017-14859</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14860/">CVE-2017-14860</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14862/">CVE-2017-14862</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-14864/">CVE-2017-14864</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9239/">CVE-2017-9239</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12264/">CVE-2018-12264</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12265/">CVE-2018-12265</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17229/">CVE-2018-17229</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17230/">CVE-2018-17230</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17282/">CVE-2018-17282</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19108/">CVE-2018-19108</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19607/">CVE-2018-19607</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9305/">CVE-2018-9305</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13114/">CVE-2019-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487350" comment="libexiv2-26-0.26-6.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487351" comment="libexiv2-devel-0.26-6.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109736" version="1" class="patch">
	<metadata>
		<title>libgme-devel-0.6.2-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9957" ref_url="https://www.suse.com/security/cve/CVE-2016-9957/" source="CVE"/>
		<reference ref_id="CVE-2016-9958" ref_url="https://www.suse.com/security/cve/CVE-2016-9958/" source="CVE"/>
		<reference ref_id="CVE-2016-9959" ref_url="https://www.suse.com/security/cve/CVE-2016-9959/" source="CVE"/>
		<reference ref_id="CVE-2016-9960" ref_url="https://www.suse.com/security/cve/CVE-2016-9960/" source="CVE"/>
		<reference ref_id="CVE-2016-9961" ref_url="https://www.suse.com/security/cve/CVE-2016-9961/" source="CVE"/>
		<description>
These are all security issues fixed in the libgme-devel-0.6.2-1.17 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9957/">CVE-2016-9957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9958/">CVE-2016-9958</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9959/">CVE-2016-9959</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9960/">CVE-2016-9960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9961/">CVE-2016-9961</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482784" comment="libgme-devel-0.6.2-1.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482785" comment="libgme0-0.6.2-1.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109737" version="1" class="patch">
	<metadata>
		<title>libgxps-devel-0.3.0-4.3.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10733" ref_url="https://www.suse.com/security/cve/CVE-2018-10733/" source="CVE"/>
		<description>
These are all security issues fixed in the libgxps-devel-0.3.0-4.3.29 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10733/">CVE-2018-10733</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486677" comment="libgxps-devel-0.3.0-4.3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486678" comment="libgxps2-0.3.0-4.3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486679" comment="typelib-1_0-GXPS-0_1-0.3.0-4.3.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109738" version="1" class="patch">
	<metadata>
		<title>libgypsy-devel-0.9-2.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-0523" ref_url="https://www.suse.com/security/cve/CVE-2011-0523/" source="CVE"/>
		<reference ref_id="CVE-2011-0524" ref_url="https://www.suse.com/security/cve/CVE-2011-0524/" source="CVE"/>
		<description>
These are all security issues fixed in the libgypsy-devel-0.9-2.30 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0523/">CVE-2011-0523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-0524/">CVE-2011-0524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482791" comment="libgypsy-devel-0.9-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482792" comment="libgypsy0-0.9-2.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109739" version="1" class="patch">
	<metadata>
		<title>libical-devel-3.0.6-2.56 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical-devel-3.0.6-2.56 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487352" comment="libical-devel-3.0.6-2.56 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109740" version="1" class="patch">
	<metadata>
		<title>libid3tag0-0.15.1b-3.14 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2004-2779" ref_url="https://www.suse.com/security/cve/CVE-2004-2779/" source="CVE"/>
		<reference ref_id="CVE-2008-2109" ref_url="https://www.suse.com/security/cve/CVE-2008-2109/" source="CVE"/>
		<reference ref_id="CVE-2017-11550" ref_url="https://www.suse.com/security/cve/CVE-2017-11550/" source="CVE"/>
		<reference ref_id="CVE-2017-11551" ref_url="https://www.suse.com/security/cve/CVE-2017-11551/" source="CVE"/>
		<description>
These are all security issues fixed in the libid3tag0-0.15.1b-3.14 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2004-2779/">CVE-2004-2779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-2109/">CVE-2008-2109</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11550/">CVE-2017-11550</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11551/">CVE-2017-11551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487353" comment="libid3tag0-0.15.1b-3.14 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109741" version="1" class="patch">
	<metadata>
		<title>libimobiledevice-devel-1.2.0+git20180427.26373b3-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the libimobiledevice-devel-1.2.0+git20180427.26373b3-1.40 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487354" comment="libimobiledevice-devel-1.2.0+git20180427.26373b3-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487355" comment="libimobiledevice6-1.2.0+git20180427.26373b3-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486509" comment="libusbmuxd-devel-1.0.10-3.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486510" comment="libusbmuxd4-1.0.10-3.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109742" version="1" class="patch">
	<metadata>
		<title>libjasper-devel-2.0.14-3.11.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2008-3522" ref_url="https://www.suse.com/security/cve/CVE-2008-3522/" source="CVE"/>
		<reference ref_id="CVE-2011-4516" ref_url="https://www.suse.com/security/cve/CVE-2011-4516/" source="CVE"/>
		<reference ref_id="CVE-2011-4517" ref_url="https://www.suse.com/security/cve/CVE-2011-4517/" source="CVE"/>
		<reference ref_id="CVE-2014-8137" ref_url="https://www.suse.com/security/cve/CVE-2014-8137/" source="CVE"/>
		<reference ref_id="CVE-2014-8138" ref_url="https://www.suse.com/security/cve/CVE-2014-8138/" source="CVE"/>
		<reference ref_id="CVE-2014-8157" ref_url="https://www.suse.com/security/cve/CVE-2014-8157/" source="CVE"/>
		<reference ref_id="CVE-2014-8158" ref_url="https://www.suse.com/security/cve/CVE-2014-8158/" source="CVE"/>
		<reference ref_id="CVE-2014-9029" ref_url="https://www.suse.com/security/cve/CVE-2014-9029/" source="CVE"/>
		<reference ref_id="CVE-2015-5203" ref_url="https://www.suse.com/security/cve/CVE-2015-5203/" source="CVE"/>
		<reference ref_id="CVE-2015-5221" ref_url="https://www.suse.com/security/cve/CVE-2015-5221/" source="CVE"/>
		<reference ref_id="CVE-2016-10251" ref_url="https://www.suse.com/security/cve/CVE-2016-10251/" source="CVE"/>
		<reference ref_id="CVE-2016-1577" ref_url="https://www.suse.com/security/cve/CVE-2016-1577/" source="CVE"/>
		<reference ref_id="CVE-2016-1867" ref_url="https://www.suse.com/security/cve/CVE-2016-1867/" source="CVE"/>
		<reference ref_id="CVE-2016-2089" ref_url="https://www.suse.com/security/cve/CVE-2016-2089/" source="CVE"/>
		<reference ref_id="CVE-2016-2116" ref_url="https://www.suse.com/security/cve/CVE-2016-2116/" source="CVE"/>
		<reference ref_id="CVE-2016-8654" ref_url="https://www.suse.com/security/cve/CVE-2016-8654/" source="CVE"/>
		<reference ref_id="CVE-2016-8690" ref_url="https://www.suse.com/security/cve/CVE-2016-8690/" source="CVE"/>
		<reference ref_id="CVE-2016-8691" ref_url="https://www.suse.com/security/cve/CVE-2016-8691/" source="CVE"/>
		<reference ref_id="CVE-2016-8692" ref_url="https://www.suse.com/security/cve/CVE-2016-8692/" source="CVE"/>
		<reference ref_id="CVE-2016-8693" ref_url="https://www.suse.com/security/cve/CVE-2016-8693/" source="CVE"/>
		<reference ref_id="CVE-2016-8880" ref_url="https://www.suse.com/security/cve/CVE-2016-8880/" source="CVE"/>
		<reference ref_id="CVE-2016-8881" ref_url="https://www.suse.com/security/cve/CVE-2016-8881/" source="CVE"/>
		<reference ref_id="CVE-2016-8882" ref_url="https://www.suse.com/security/cve/CVE-2016-8882/" source="CVE"/>
		<reference ref_id="CVE-2016-8883" ref_url="https://www.suse.com/security/cve/CVE-2016-8883/" source="CVE"/>
		<reference ref_id="CVE-2016-8884" ref_url="https://www.suse.com/security/cve/CVE-2016-8884/" source="CVE"/>
		<reference ref_id="CVE-2016-8885" ref_url="https://www.suse.com/security/cve/CVE-2016-8885/" source="CVE"/>
		<reference ref_id="CVE-2016-8886" ref_url="https://www.suse.com/security/cve/CVE-2016-8886/" source="CVE"/>
		<reference ref_id="CVE-2016-8887" ref_url="https://www.suse.com/security/cve/CVE-2016-8887/" source="CVE"/>
		<reference ref_id="CVE-2016-9262" ref_url="https://www.suse.com/security/cve/CVE-2016-9262/" source="CVE"/>
		<reference ref_id="CVE-2016-9387" ref_url="https://www.suse.com/security/cve/CVE-2016-9387/" source="CVE"/>
		<reference ref_id="CVE-2016-9388" ref_url="https://www.suse.com/security/cve/CVE-2016-9388/" source="CVE"/>
		<reference ref_id="CVE-2016-9389" ref_url="https://www.suse.com/security/cve/CVE-2016-9389/" source="CVE"/>
		<reference ref_id="CVE-2016-9390" ref_url="https://www.suse.com/security/cve/CVE-2016-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-9391" ref_url="https://www.suse.com/security/cve/CVE-2016-9391/" source="CVE"/>
		<reference ref_id="CVE-2016-9392" ref_url="https://www.suse.com/security/cve/CVE-2016-9392/" source="CVE"/>
		<reference ref_id="CVE-2016-9393" ref_url="https://www.suse.com/security/cve/CVE-2016-9393/" source="CVE"/>
		<reference ref_id="CVE-2016-9394" ref_url="https://www.suse.com/security/cve/CVE-2016-9394/" source="CVE"/>
		<reference ref_id="CVE-2016-9395" ref_url="https://www.suse.com/security/cve/CVE-2016-9395/" source="CVE"/>
		<reference ref_id="CVE-2016-9396" ref_url="https://www.suse.com/security/cve/CVE-2016-9396/" source="CVE"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9557" ref_url="https://www.suse.com/security/cve/CVE-2016-9557/" source="CVE"/>
		<reference ref_id="CVE-2016-9560" ref_url="https://www.suse.com/security/cve/CVE-2016-9560/" source="CVE"/>
		<reference ref_id="CVE-2016-9583" ref_url="https://www.suse.com/security/cve/CVE-2016-9583/" source="CVE"/>
		<reference ref_id="CVE-2016-9591" ref_url="https://www.suse.com/security/cve/CVE-2016-9591/" source="CVE"/>
		<reference ref_id="CVE-2016-9600" ref_url="https://www.suse.com/security/cve/CVE-2016-9600/" source="CVE"/>
		<reference ref_id="CVE-2017-1000050" ref_url="https://www.suse.com/security/cve/CVE-2017-1000050/" source="CVE"/>
		<reference ref_id="CVE-2017-5498" ref_url="https://www.suse.com/security/cve/CVE-2017-5498/" source="CVE"/>
		<reference ref_id="CVE-2017-6850" ref_url="https://www.suse.com/security/cve/CVE-2017-6850/" source="CVE"/>
		<reference ref_id="CVE-2018-19539" ref_url="https://www.suse.com/security/cve/CVE-2018-19539/" source="CVE"/>
		<reference ref_id="CVE-2018-19540" ref_url="https://www.suse.com/security/cve/CVE-2018-19540/" source="CVE"/>
		<reference ref_id="CVE-2018-19541" ref_url="https://www.suse.com/security/cve/CVE-2018-19541/" source="CVE"/>
		<reference ref_id="CVE-2018-19542" ref_url="https://www.suse.com/security/cve/CVE-2018-19542/" source="CVE"/>
		<reference ref_id="CVE-2018-9055" ref_url="https://www.suse.com/security/cve/CVE-2018-9055/" source="CVE"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<description>
These are all security issues fixed in the libjasper-devel-2.0.14-3.11.8 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2008-3522/">CVE-2008-3522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4516/">CVE-2011-4516</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-4517/">CVE-2011-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8137/">CVE-2014-8137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8138/">CVE-2014-8138</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8157/">CVE-2014-8157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8158/">CVE-2014-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9029/">CVE-2014-9029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5203/">CVE-2015-5203</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5221/">CVE-2015-5221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10251/">CVE-2016-10251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1577/">CVE-2016-1577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1867/">CVE-2016-1867</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2089/">CVE-2016-2089</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2116/">CVE-2016-2116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8654/">CVE-2016-8654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8690/">CVE-2016-8690</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8691/">CVE-2016-8691</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8692/">CVE-2016-8692</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-8693/">CVE-2016-8693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8880/">CVE-2016-8880</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8881/">CVE-2016-8881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8882/">CVE-2016-8882</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8883/">CVE-2016-8883</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8884/">CVE-2016-8884</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8885/">CVE-2016-8885</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8886/">CVE-2016-8886</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8887/">CVE-2016-8887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9262/">CVE-2016-9262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9387/">CVE-2016-9387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9388/">CVE-2016-9388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9389/">CVE-2016-9389</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9390/">CVE-2016-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9391/">CVE-2016-9391</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9392/">CVE-2016-9392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9393/">CVE-2016-9393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9394/">CVE-2016-9394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9395/">CVE-2016-9395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9396/">CVE-2016-9396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9557/">CVE-2016-9557</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9560/">CVE-2016-9560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9583/">CVE-2016-9583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9591/">CVE-2016-9591</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9600/">CVE-2016-9600</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000050/">CVE-2017-1000050</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5498/">CVE-2017-5498</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6850/">CVE-2017-6850</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19539/">CVE-2018-19539</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19540/">CVE-2018-19540</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19541/">CVE-2018-19541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19542/">CVE-2018-19542</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9055/">CVE-2018-9055</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487356" comment="libjasper-devel-2.0.14-3.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109743" version="1" class="patch">
	<metadata>
		<title>libjbig2-32bit-2.1-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6369" ref_url="https://www.suse.com/security/cve/CVE-2013-6369/" source="CVE"/>
		<description>
These are all security issues fixed in the libjbig2-32bit-2.1-1.31 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6369/">CVE-2013-6369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482799" comment="libjbig2-32bit-2.1-1.31 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109744" version="1" class="patch">
	<metadata>
		<title>libjpeg8-32bit-8.1.2-5.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9092" ref_url="https://www.suse.com/security/cve/CVE-2014-9092/" source="CVE"/>
		<reference ref_id="CVE-2017-15232" ref_url="https://www.suse.com/security/cve/CVE-2017-15232/" source="CVE"/>
		<reference ref_id="CVE-2018-1152" ref_url="https://www.suse.com/security/cve/CVE-2018-1152/" source="CVE"/>
		<reference ref_id="CVE-2018-11813" ref_url="https://www.suse.com/security/cve/CVE-2018-11813/" source="CVE"/>
		<reference ref_id="CVE-2018-14498" ref_url="https://www.suse.com/security/cve/CVE-2018-14498/" source="CVE"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<description>
These are all security issues fixed in the libjpeg8-32bit-8.1.2-5.12.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9092/">CVE-2014-9092</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15232/">CVE-2017-15232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1152/">CVE-2018-1152</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11813/">CVE-2018-11813</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14498/">CVE-2018-14498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487357" comment="libjpeg8-32bit-8.1.2-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109745" version="1" class="patch">
	<metadata>
		<title>libkpathsea6-6.2.3-19.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<reference ref_id="CVE-2018-17407" ref_url="https://www.suse.com/security/cve/CVE-2018-17407/" source="CVE"/>
		<reference ref_id="CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016/" source="CVE"/>
		<description>
These are all security issues fixed in the libkpathsea6-6.2.3-19.4 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17407/">CVE-2018-17407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487358" comment="libkpathsea6-6.2.3-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487359" comment="libptexenc1-1.3.5-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487360" comment="libsynctex1-1.18-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487361" comment="libtexlua52-5-5.2.4-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487362" comment="libtexluajit2-2.1.0beta2-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487363" comment="perl-biber-2017.20170520.svn30357-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487364" comment="texlive-2017.20170520-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487365" comment="texlive-a2ping-bin-2017.20170520.svn27321-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487366" comment="texlive-accfonts-bin-2017.20170520.svn12688-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487367" comment="texlive-adhocfilelist-bin-2017.20170520.svn28038-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487368" comment="texlive-afm2pl-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487369" comment="texlive-aleph-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487370" comment="texlive-amstex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487371" comment="texlive-arara-bin-2017.20170520.svn29036-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487372" comment="texlive-asymptote-bin-2017.20170520.svn43843-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487373" comment="texlive-authorindex-bin-2017.20170520.svn18790-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487374" comment="texlive-autosp-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487375" comment="texlive-biber-bin-2017.20170520.svn42679-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487376" comment="texlive-bibexport-bin-2017.20170520.svn16219-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487377" comment="texlive-bibtex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487378" comment="texlive-bibtex8-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487379" comment="texlive-bibtexu-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487380" comment="texlive-bin-devel-2017.20170520-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487381" comment="texlive-bundledoc-bin-2017.20170520.svn17794-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487382" comment="texlive-cachepic-bin-2017.20170520.svn15543-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487383" comment="texlive-checkcites-bin-2017.20170520.svn25623-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487384" comment="texlive-checklistings-bin-2017.20170520.svn38300-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487385" comment="texlive-chktex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487386" comment="texlive-cjk-gs-integrate-bin-2017.20170520.svn37223-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487387" comment="texlive-cjkutils-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487388" comment="texlive-context-bin-2017.20170520.svn34112-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487389" comment="texlive-convbkmk-bin-2017.20170520.svn30408-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487390" comment="texlive-crossrefware-bin-2017.20170520.svn43866-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487391" comment="texlive-cslatex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487392" comment="texlive-csplain-bin-2017.20170520.svn33902-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487393" comment="texlive-ctanify-bin-2017.20170520.svn24061-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487394" comment="texlive-ctanupload-bin-2017.20170520.svn23866-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487395" comment="texlive-ctie-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487396" comment="texlive-cweb-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487397" comment="texlive-cyrillic-bin-bin-2017.20170520.svn29741-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487398" comment="texlive-de-macro-bin-2017.20170520.svn17399-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487399" comment="texlive-detex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487400" comment="texlive-diadia-bin-2017.20170520.svn37645-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487401" comment="texlive-dosepsbin-bin-2017.20170520.svn24759-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487402" comment="texlive-dtl-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487403" comment="texlive-dtxgen-bin-2017.20170520.svn29031-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487404" comment="texlive-dviasm-bin-2017.20170520.svn8329-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487405" comment="texlive-dvicopy-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487406" comment="texlive-dvidvi-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487407" comment="texlive-dviinfox-bin-2017.20170520.svn44515-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487408" comment="texlive-dviljk-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487409" comment="texlive-dvipdfmx-bin-2017.20170520.svn40273-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487410" comment="texlive-dvipng-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487411" comment="texlive-dvipos-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487412" comment="texlive-dvips-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487413" comment="texlive-dvisvgm-bin-2017.20170520.svn40987-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487414" comment="texlive-ebong-bin-2017.20170520.svn21000-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487415" comment="texlive-eplain-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487416" comment="texlive-epspdf-bin-2017.20170520.svn29050-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487417" comment="texlive-epstopdf-bin-2017.20170520.svn18336-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487418" comment="texlive-exceltex-bin-2017.20170520.svn25860-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487419" comment="texlive-fig4latex-bin-2017.20170520.svn14752-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487420" comment="texlive-findhyph-bin-2017.20170520.svn14758-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487421" comment="texlive-fontinst-bin-2017.20170520.svn29741-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487422" comment="texlive-fontools-bin-2017.20170520.svn25997-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487423" comment="texlive-fontware-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487424" comment="texlive-fragmaster-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487425" comment="texlive-getmap-bin-2017.20170520.svn34971-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487426" comment="texlive-glossaries-bin-2017.20170520.svn37813-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487427" comment="texlive-gregoriotex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487428" comment="texlive-gsftopk-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487429" comment="texlive-jadetex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487430" comment="texlive-kotex-utils-bin-2017.20170520.svn32101-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487431" comment="texlive-kpathsea-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487432" comment="texlive-kpathsea-devel-6.2.3-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487433" comment="texlive-lacheck-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487434" comment="texlive-latex-bin-bin-2017.20170520.svn14050-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487435" comment="texlive-latex-git-log-bin-2017.20170520.svn30983-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487436" comment="texlive-latex-papersize-bin-2017.20170520.svn42296-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487437" comment="texlive-latex2man-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487438" comment="texlive-latex2nemeth-bin-2017.20170520.svn42300-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487439" comment="texlive-latexdiff-bin-2017.20170520.svn16420-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487440" comment="texlive-latexfileversion-bin-2017.20170520.svn25012-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487441" comment="texlive-latexindent-bin-2017.20170520.svn32150-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487442" comment="texlive-latexmk-bin-2017.20170520.svn10937-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487443" comment="texlive-latexpand-bin-2017.20170520.svn27025-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487444" comment="texlive-lcdftypetools-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487445" comment="texlive-lilyglyphs-bin-2017.20170520.svn31696-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487446" comment="texlive-listbib-bin-2017.20170520.svn26126-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487447" comment="texlive-listings-ext-bin-2017.20170520.svn15093-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487448" comment="texlive-lollipop-bin-2017.20170520.svn41465-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487449" comment="texlive-ltxfileinfo-bin-2017.20170520.svn29005-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487450" comment="texlive-ltximg-bin-2017.20170520.svn32346-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487451" comment="texlive-lua2dox-bin-2017.20170520.svn29053-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487452" comment="texlive-luaotfload-bin-2017.20170520.svn34647-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487453" comment="texlive-luatex-bin-2017.20170520.svn44549-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487454" comment="texlive-lwarp-bin-2017.20170520.svn43292-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487455" comment="texlive-m-tx-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487456" comment="texlive-make4ht-bin-2017.20170520.svn37750-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487457" comment="texlive-makedtx-bin-2017.20170520.svn38769-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487458" comment="texlive-makeindex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487459" comment="texlive-match_parens-bin-2017.20170520.svn23500-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487460" comment="texlive-mathspic-bin-2017.20170520.svn23661-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487461" comment="texlive-metafont-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487462" comment="texlive-metapost-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487463" comment="texlive-mex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487464" comment="texlive-mf2pt1-bin-2017.20170520.svn23406-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487465" comment="texlive-mflua-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487466" comment="texlive-mfware-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487467" comment="texlive-mkgrkindex-bin-2017.20170520.svn14428-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487468" comment="texlive-mkjobtexmf-bin-2017.20170520.svn8457-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487469" comment="texlive-mkpic-bin-2017.20170520.svn33688-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487470" comment="texlive-mltex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487471" comment="texlive-mptopdf-bin-2017.20170520.svn18674-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487472" comment="texlive-multibibliography-bin-2017.20170520.svn30534-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487473" comment="texlive-musixtex-bin-2017.20170520.svn37026-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487474" comment="texlive-musixtnt-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487475" comment="texlive-omegaware-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487476" comment="texlive-patgen-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487477" comment="texlive-pax-bin-2017.20170520.svn10843-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487478" comment="texlive-pdfbook2-bin-2017.20170520.svn37537-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487479" comment="texlive-pdfcrop-bin-2017.20170520.svn14387-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487480" comment="texlive-pdfjam-bin-2017.20170520.svn17868-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487481" comment="texlive-pdflatexpicscale-bin-2017.20170520.svn41779-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487482" comment="texlive-pdftex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487483" comment="texlive-pdftools-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487484" comment="texlive-pdfxup-bin-2017.20170520.svn40690-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487485" comment="texlive-pedigree-perl-bin-2017.20170520.svn25962-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487486" comment="texlive-perltex-bin-2017.20170520.svn16181-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487487" comment="texlive-petri-nets-bin-2017.20170520.svn39165-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487488" comment="texlive-pfarrei-bin-2017.20170520.svn29348-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487489" comment="texlive-pkfix-bin-2017.20170520.svn13364-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487490" comment="texlive-pkfix-helper-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487491" comment="texlive-platex-bin-2017.20170520.svn22859-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487492" comment="texlive-pmx-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487493" comment="texlive-pmxchords-bin-2017.20170520.svn32405-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487494" comment="texlive-ps2pk-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487495" comment="texlive-pst-pdf-bin-2017.20170520.svn7838-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487496" comment="texlive-pst2pdf-bin-2017.20170520.svn29333-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487497" comment="texlive-pstools-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487498" comment="texlive-ptex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487499" comment="texlive-ptex-fontmaps-bin-2017.20170520.svn44206-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487500" comment="texlive-ptex2pdf-bin-2017.20170520.svn29335-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487501" comment="texlive-ptexenc-devel-1.3.5-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487502" comment="texlive-purifyeps-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487503" comment="texlive-pygmentex-bin-2017.20170520.svn34996-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487504" comment="texlive-pythontex-bin-2017.20170520.svn31638-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487505" comment="texlive-rubik-bin-2017.20170520.svn32919-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487506" comment="texlive-seetexk-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487507" comment="texlive-splitindex-bin-2017.20170520.svn29688-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487508" comment="texlive-srcredact-bin-2017.20170520.svn38710-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487509" comment="texlive-sty2dtx-bin-2017.20170520.svn21215-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487510" comment="texlive-svn-multi-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487511" comment="texlive-synctex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487512" comment="texlive-synctex-devel-1.18-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487513" comment="texlive-tetex-bin-2017.20170520.svn43957-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487514" comment="texlive-tex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487515" comment="texlive-tex4ebook-bin-2017.20170520.svn37771-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487516" comment="texlive-tex4ht-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487517" comment="texlive-texconfig-bin-2017.20170520.svn29741-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487518" comment="texlive-texcount-bin-2017.20170520.svn13013-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487519" comment="texlive-texdef-bin-2017.20170520.svn21802-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487520" comment="texlive-texdiff-bin-2017.20170520.svn15506-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487521" comment="texlive-texdirflatten-bin-2017.20170520.svn12782-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487522" comment="texlive-texdoc-bin-2017.20170520.svn29741-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487523" comment="texlive-texfot-bin-2017.20170520.svn33155-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487524" comment="texlive-texliveonfly-bin-2017.20170520.svn24062-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487525" comment="texlive-texloganalyser-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487526" comment="texlive-texlua-devel-5.2.4-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487527" comment="texlive-texluajit-devel-2.1.0beta2-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487528" comment="texlive-texosquery-bin-2017.20170520.svn43596-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487529" comment="texlive-texsis-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487530" comment="texlive-texware-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487531" comment="texlive-thumbpdf-bin-2017.20170520.svn6898-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487532" comment="texlive-tie-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487533" comment="texlive-tpic2pdftex-bin-2017.20170520.svn29741-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487534" comment="texlive-ttfutils-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487535" comment="texlive-typeoutfileinfo-bin-2017.20170520.svn25648-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487536" comment="texlive-ulqda-bin-2017.20170520.svn13663-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487537" comment="texlive-uplatex-bin-2017.20170520.svn26326-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487538" comment="texlive-uptex-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487539" comment="texlive-urlbst-bin-2017.20170520.svn23262-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487540" comment="texlive-velthuis-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487541" comment="texlive-vlna-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487542" comment="texlive-vpe-bin-2017.20170520.svn6897-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487543" comment="texlive-web-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487544" comment="texlive-xdvi-bin-2017.20170520.svn44143-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487545" comment="texlive-xetex-bin-2017.20170520.svn44361-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487546" comment="texlive-xmltex-bin-2017.20170520.svn3006-19.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487547" comment="texlive-yplan-bin-2017.20170520.svn34398-19.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109746" version="1" class="patch">
	<metadata>
		<title>liblouis-data-3.11.0-1.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-13738" ref_url="https://www.suse.com/security/cve/CVE-2017-13738/" source="CVE"/>
		<reference ref_id="CVE-2017-13739" ref_url="https://www.suse.com/security/cve/CVE-2017-13739/" source="CVE"/>
		<reference ref_id="CVE-2017-13740" ref_url="https://www.suse.com/security/cve/CVE-2017-13740/" source="CVE"/>
		<reference ref_id="CVE-2017-13741" ref_url="https://www.suse.com/security/cve/CVE-2017-13741/" source="CVE"/>
		<reference ref_id="CVE-2017-13742" ref_url="https://www.suse.com/security/cve/CVE-2017-13742/" source="CVE"/>
		<reference ref_id="CVE-2017-13743" ref_url="https://www.suse.com/security/cve/CVE-2017-13743/" source="CVE"/>
		<reference ref_id="CVE-2017-13744" ref_url="https://www.suse.com/security/cve/CVE-2017-13744/" source="CVE"/>
		<reference ref_id="CVE-2018-11410" ref_url="https://www.suse.com/security/cve/CVE-2018-11410/" source="CVE"/>
		<reference ref_id="CVE-2018-11440" ref_url="https://www.suse.com/security/cve/CVE-2018-11440/" source="CVE"/>
		<reference ref_id="CVE-2018-11683" ref_url="https://www.suse.com/security/cve/CVE-2018-11683/" source="CVE"/>
		<reference ref_id="CVE-2018-11684" ref_url="https://www.suse.com/security/cve/CVE-2018-11684/" source="CVE"/>
		<reference ref_id="CVE-2018-11685" ref_url="https://www.suse.com/security/cve/CVE-2018-11685/" source="CVE"/>
		<reference ref_id="CVE-2018-12085" ref_url="https://www.suse.com/security/cve/CVE-2018-12085/" source="CVE"/>
		<description>
These are all security issues fixed in the liblouis-data-3.11.0-1.42 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13738/">CVE-2017-13738</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13739/">CVE-2017-13739</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13740/">CVE-2017-13740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13741/">CVE-2017-13741</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13742/">CVE-2017-13742</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13743/">CVE-2017-13743</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13744/">CVE-2017-13744</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11410/">CVE-2018-11410</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11440/">CVE-2018-11440</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11683/">CVE-2018-11683</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11684/">CVE-2018-11684</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11685/">CVE-2018-11685</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12085/">CVE-2018-12085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487548" comment="liblouis-data-3.11.0-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487549" comment="liblouis-devel-3.11.0-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487550" comment="liblouis19-3.11.0-1.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487551" comment="python3-louis-3.11.0-1.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109747" version="1" class="patch">
	<metadata>
		<title>libmad-devel-0.15.1b-3.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-8374" ref_url="https://www.suse.com/security/cve/CVE-2017-8374/" source="CVE"/>
		<description>
These are all security issues fixed in the libmad-devel-0.15.1b-3.16 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8374/">CVE-2017-8374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486458" comment="libmad-devel-0.15.1b-3.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486459" comment="libmad0-0.15.1b-3.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109748" version="1" class="patch">
	<metadata>
		<title>libmicrohttpd-devel-0.9.57-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7038" ref_url="https://www.suse.com/security/cve/CVE-2013-7038/" source="CVE"/>
		<reference ref_id="CVE-2013-7039" ref_url="https://www.suse.com/security/cve/CVE-2013-7039/" source="CVE"/>
		<description>
These are all security issues fixed in the libmicrohttpd-devel-0.9.57-1.33 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7038/">CVE-2013-7038</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2013-7039/">CVE-2013-7039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486460" comment="libmicrohttpd-devel-0.9.57-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109749" version="1" class="patch">
	<metadata>
		<title>libmms-devel-0.6.4-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-2892" ref_url="https://www.suse.com/security/cve/CVE-2014-2892/" source="CVE"/>
		<description>
These are all security issues fixed in the libmms-devel-0.6.4-1.24 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-2892/">CVE-2014-2892</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486461" comment="libmms-devel-0.6.4-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486462" comment="libmms0-0.6.4-1.24 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109750" version="1" class="patch">
	<metadata>
		<title>libmodplug-devel-0.3.19-2.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-11311" ref_url="https://www.suse.com/security/cve/CVE-2017-11311/" source="CVE"/>
		<reference ref_id="CVE-2018-10017" ref_url="https://www.suse.com/security/cve/CVE-2018-10017/" source="CVE"/>
		<reference ref_id="CVE-2018-11710" ref_url="https://www.suse.com/security/cve/CVE-2018-11710/" source="CVE"/>
		<reference ref_id="CVE-2018-20860" ref_url="https://www.suse.com/security/cve/CVE-2018-20860/" source="CVE"/>
		<reference ref_id="CVE-2018-20861" ref_url="https://www.suse.com/security/cve/CVE-2018-20861/" source="CVE"/>
		<reference ref_id="CVE-2019-14382" ref_url="https://www.suse.com/security/cve/CVE-2019-14382/" source="CVE"/>
		<reference ref_id="CVE-2019-14383" ref_url="https://www.suse.com/security/cve/CVE-2019-14383/" source="CVE"/>
		<reference ref_id="CVE-2019-17113" ref_url="https://www.suse.com/security/cve/CVE-2019-17113/" source="CVE"/>
		<description>
These are all security issues fixed in the libmodplug-devel-0.3.19-2.10.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11311/">CVE-2017-11311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10017/">CVE-2018-10017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11710/">CVE-2018-11710</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20860/">CVE-2018-20860</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20861/">CVE-2018-20861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14382/">CVE-2019-14382</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14383/">CVE-2019-14383</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17113/">CVE-2019-17113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487552" comment="libmodplug-devel-0.3.19-2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487553" comment="libmodplug1-0.3.19-2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487554" comment="libopenmpt-devel-0.3.19-2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487555" comment="libopenmpt0-0.3.19-2.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487556" comment="libopenmpt_modplug1-0.3.19-2.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109751" version="1" class="patch">
	<metadata>
		<title>libmp3lame-devel-3.100-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-9410" ref_url="https://www.suse.com/security/cve/CVE-2017-9410/" source="CVE"/>
		<reference ref_id="CVE-2017-9411" ref_url="https://www.suse.com/security/cve/CVE-2017-9411/" source="CVE"/>
		<reference ref_id="CVE-2017-9412" ref_url="https://www.suse.com/security/cve/CVE-2017-9412/" source="CVE"/>
		<description>
These are all security issues fixed in the libmp3lame-devel-3.100-1.33 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9410/">CVE-2017-9410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9411/">CVE-2017-9411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9412/">CVE-2017-9412</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486468" comment="libmp3lame-devel-3.100-1.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109752" version="1" class="patch">
	<metadata>
		<title>libndp-devel-1.6-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-3698" ref_url="https://www.suse.com/security/cve/CVE-2016-3698/" source="CVE"/>
		<description>
These are all security issues fixed in the libndp-devel-1.6-1.26 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3698/">CVE-2016-3698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486473" comment="libndp-devel-1.6-1.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486474" comment="libndp0-1.6-1.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109753" version="1" class="patch">
	<metadata>
		<title>libnetpbm-devel-10.80.1-3.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2579" ref_url="https://www.suse.com/security/cve/CVE-2017-2579/" source="CVE"/>
		<reference ref_id="CVE-2017-2580" ref_url="https://www.suse.com/security/cve/CVE-2017-2580/" source="CVE"/>
		<reference ref_id="CVE-2018-8975" ref_url="https://www.suse.com/security/cve/CVE-2018-8975/" source="CVE"/>
		<description>
These are all security issues fixed in the libnetpbm-devel-10.80.1-3.8.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2579/">CVE-2017-2579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2580/">CVE-2017-2580</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8975/">CVE-2018-8975</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487557" comment="libnetpbm-devel-10.80.1-3.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109754" version="1" class="patch">
	<metadata>
		<title>libnma-devel-1.8.24-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6590" ref_url="https://www.suse.com/security/cve/CVE-2017-6590/" source="CVE"/>
		<description>
These are all security issues fixed in the libnma-devel-1.8.24-5.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6590/">CVE-2017-6590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487558" comment="libnma-devel-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487559" comment="libnma0-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487560" comment="nma-data-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487561" comment="typelib-1_0-NMA-1_0-1.8.24-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109755" version="1" class="patch">
	<metadata>
		<title>libopenjpeg1-1.5.2-2.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5030" ref_url="https://www.suse.com/security/cve/CVE-2009-5030/" source="CVE"/>
		<reference ref_id="CVE-2012-3358" ref_url="https://www.suse.com/security/cve/CVE-2012-3358/" source="CVE"/>
		<reference ref_id="CVE-2012-3535" ref_url="https://www.suse.com/security/cve/CVE-2012-3535/" source="CVE"/>
		<reference ref_id="CVE-2013-1447" ref_url="https://www.suse.com/security/cve/CVE-2013-1447/" source="CVE"/>
		<reference ref_id="CVE-2013-4289" ref_url="https://www.suse.com/security/cve/CVE-2013-4289/" source="CVE"/>
		<reference ref_id="CVE-2013-4290" ref_url="https://www.suse.com/security/cve/CVE-2013-4290/" source="CVE"/>
		<reference ref_id="CVE-2013-6045" ref_url="https://www.suse.com/security/cve/CVE-2013-6045/" source="CVE"/>
		<reference ref_id="CVE-2013-6052" ref_url="https://www.suse.com/security/cve/CVE-2013-6052/" source="CVE"/>
		<reference ref_id="CVE-2013-6053" ref_url="https://www.suse.com/security/cve/CVE-2013-6053/" source="CVE"/>
		<reference ref_id="CVE-2013-6054" ref_url="https://www.suse.com/security/cve/CVE-2013-6054/" source="CVE"/>
		<reference ref_id="CVE-2013-6887" ref_url="https://www.suse.com/security/cve/CVE-2013-6887/" source="CVE"/>
		<reference ref_id="CVE-2016-7445" ref_url="https://www.suse.com/security/cve/CVE-2016-7445/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenjpeg1-1.5.2-2.28 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-5030/">CVE-2009-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3358/">CVE-2012-3358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3535/">CVE-2012-3535</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1447/">CVE-2013-1447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4289/">CVE-2013-4289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4290/">CVE-2013-4290</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-6045/">CVE-2013-6045</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6052/">CVE-2013-6052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6053/">CVE-2013-6053</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6054/">CVE-2013-6054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6887/">CVE-2013-6887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7445/">CVE-2016-7445</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486482" comment="libopenjpeg1-1.5.2-2.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486483" comment="openjpeg-devel-1.5.2-2.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109756" version="1" class="patch">
	<metadata>
		<title>libopus-devel-1.3.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-0381" ref_url="https://www.suse.com/security/cve/CVE-2017-0381/" source="CVE"/>
		<description>
These are all security issues fixed in the libopus-devel-1.3.1-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0381/">CVE-2017-0381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487562" comment="libopus-devel-1.3.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109757" version="1" class="patch">
	<metadata>
		<title>libout123-0-1.25.10-1.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-10683" ref_url="https://www.suse.com/security/cve/CVE-2017-10683/" source="CVE"/>
		<reference ref_id="CVE-2017-11126" ref_url="https://www.suse.com/security/cve/CVE-2017-11126/" source="CVE"/>
		<description>
These are all security issues fixed in the libout123-0-1.25.10-1.38 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-10683/">CVE-2017-10683</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-11126/">CVE-2017-11126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486469" comment="libout123-0-1.25.10-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486470" comment="mpg123-1.25.10-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486471" comment="mpg123-devel-1.25.10-1.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486472" comment="mpg123-pulse-1.25.10-1.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109758" version="1" class="patch">
	<metadata>
		<title>libpango-1_0-0-32bit-1.44.7+11-1.25 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-15120" ref_url="https://www.suse.com/security/cve/CVE-2018-15120/" source="CVE"/>
		<description>
These are all security issues fixed in the libpango-1_0-0-32bit-1.44.7+11-1.25 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15120/">CVE-2018-15120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487563" comment="libpango-1_0-0-32bit-1.44.7+11-1.25 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109759" version="1" class="patch">
	<metadata>
		<title>libplist++-devel-2.0.0-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5209" ref_url="https://www.suse.com/security/cve/CVE-2017-5209/" source="CVE"/>
		<reference ref_id="CVE-2017-5545" ref_url="https://www.suse.com/security/cve/CVE-2017-5545/" source="CVE"/>
		<reference ref_id="CVE-2017-5834" ref_url="https://www.suse.com/security/cve/CVE-2017-5834/" source="CVE"/>
		<reference ref_id="CVE-2017-5835" ref_url="https://www.suse.com/security/cve/CVE-2017-5835/" source="CVE"/>
		<reference ref_id="CVE-2017-5836" ref_url="https://www.suse.com/security/cve/CVE-2017-5836/" source="CVE"/>
		<reference ref_id="CVE-2017-6435" ref_url="https://www.suse.com/security/cve/CVE-2017-6435/" source="CVE"/>
		<reference ref_id="CVE-2017-6436" ref_url="https://www.suse.com/security/cve/CVE-2017-6436/" source="CVE"/>
		<reference ref_id="CVE-2017-6437" ref_url="https://www.suse.com/security/cve/CVE-2017-6437/" source="CVE"/>
		<reference ref_id="CVE-2017-6438" ref_url="https://www.suse.com/security/cve/CVE-2017-6438/" source="CVE"/>
		<reference ref_id="CVE-2017-6439" ref_url="https://www.suse.com/security/cve/CVE-2017-6439/" source="CVE"/>
		<reference ref_id="CVE-2017-6440" ref_url="https://www.suse.com/security/cve/CVE-2017-6440/" source="CVE"/>
		<reference ref_id="CVE-2017-7982" ref_url="https://www.suse.com/security/cve/CVE-2017-7982/" source="CVE"/>
		<description>
These are all security issues fixed in the libplist++-devel-2.0.0-1.31 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5209/">CVE-2017-5209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5545/">CVE-2017-5545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5834/">CVE-2017-5834</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5835/">CVE-2017-5835</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5836/">CVE-2017-5836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6435/">CVE-2017-6435</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6436/">CVE-2017-6436</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6437/">CVE-2017-6437</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6438/">CVE-2017-6438</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-6439/">CVE-2017-6439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6440/">CVE-2017-6440</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7982/">CVE-2017-7982</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486486" comment="libplist++-devel-2.0.0-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486487" comment="libplist++3-2.0.0-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486488" comment="libplist-devel-2.0.0-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486489" comment="libplist3-2.0.0-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109760" version="1" class="patch">
	<metadata>
		<title>libpotrace0-1.15-3.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-7437" ref_url="https://www.suse.com/security/cve/CVE-2013-7437/" source="CVE"/>
		<reference ref_id="CVE-2016-8685" ref_url="https://www.suse.com/security/cve/CVE-2016-8685/" source="CVE"/>
		<reference ref_id="CVE-2016-8686" ref_url="https://www.suse.com/security/cve/CVE-2016-8686/" source="CVE"/>
		<reference ref_id="CVE-2017-12067" ref_url="https://www.suse.com/security/cve/CVE-2017-12067/" source="CVE"/>
		<description>
These are all security issues fixed in the libpotrace0-1.15-3.19 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-7437/">CVE-2013-7437</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8685/">CVE-2016-8685</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8686/">CVE-2016-8686</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12067/">CVE-2017-12067</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486490" comment="libpotrace0-1.15-3.19 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109761" version="1" class="patch">
	<metadata>
		<title>libquicktime-1.2.4+git20180804.fff99cd-1.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-2399" ref_url="https://www.suse.com/security/cve/CVE-2016-2399/" source="CVE"/>
		<reference ref_id="CVE-2017-9122" ref_url="https://www.suse.com/security/cve/CVE-2017-9122/" source="CVE"/>
		<reference ref_id="CVE-2017-9123" ref_url="https://www.suse.com/security/cve/CVE-2017-9123/" source="CVE"/>
		<reference ref_id="CVE-2017-9124" ref_url="https://www.suse.com/security/cve/CVE-2017-9124/" source="CVE"/>
		<reference ref_id="CVE-2017-9125" ref_url="https://www.suse.com/security/cve/CVE-2017-9125/" source="CVE"/>
		<reference ref_id="CVE-2017-9126" ref_url="https://www.suse.com/security/cve/CVE-2017-9126/" source="CVE"/>
		<reference ref_id="CVE-2017-9127" ref_url="https://www.suse.com/security/cve/CVE-2017-9127/" source="CVE"/>
		<reference ref_id="CVE-2017-9128" ref_url="https://www.suse.com/security/cve/CVE-2017-9128/" source="CVE"/>
		<description>
These are all security issues fixed in the libquicktime-1.2.4+git20180804.fff99cd-1.19 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2399/">CVE-2016-2399</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9122/">CVE-2017-9122</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9123/">CVE-2017-9123</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9124/">CVE-2017-9124</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9125/">CVE-2017-9125</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9126/">CVE-2017-9126</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9127/">CVE-2017-9127</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9128/">CVE-2017-9128</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487564" comment="libquicktime-1.2.4+git20180804.fff99cd-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487565" comment="libquicktime-devel-1.2.4+git20180804.fff99cd-1.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487566" comment="libquicktime0-1.2.4+git20180804.fff99cd-1.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109762" version="1" class="patch">
	<metadata>
		<title>libraptor-devel-2.0.15-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0037" ref_url="https://www.suse.com/security/cve/CVE-2012-0037/" source="CVE"/>
		<description>
These are all security issues fixed in the libraptor-devel-2.0.15-7.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0037/">CVE-2012-0037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487567" comment="libraptor-devel-2.0.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487568" comment="libraptor2-0-2.0.15-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487569" comment="raptor-2.0.15-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109763" version="1" class="patch">
	<metadata>
		<title>librsvg-devel-2.46.4-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-11464" ref_url="https://www.suse.com/security/cve/CVE-2017-11464/" source="CVE"/>
		<description>
These are all security issues fixed in the librsvg-devel-2.46.4-1.31 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11464/">CVE-2017-11464</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487570" comment="librsvg-devel-2.46.4-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487571" comment="typelib-1_0-Rsvg-2_0-2.46.4-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109764" version="1" class="patch">
	<metadata>
		<title>libsmi-devel-0.4.8-1.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2891" ref_url="https://www.suse.com/security/cve/CVE-2010-2891/" source="CVE"/>
		<description>
These are all security issues fixed in the libsmi-devel-0.4.8-1.29 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2891/">CVE-2010-2891</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486499" comment="libsmi-devel-0.4.8-1.29 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109765" version="1" class="patch">
	<metadata>
		<title>libsoup-devel-2.68.3-2.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-2885" ref_url="https://www.suse.com/security/cve/CVE-2017-2885/" source="CVE"/>
		<reference ref_id="CVE-2018-12910" ref_url="https://www.suse.com/security/cve/CVE-2018-12910/" source="CVE"/>
		<description>
These are all security issues fixed in the libsoup-devel-2.68.3-2.32 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2885/">CVE-2017-2885</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12910/">CVE-2018-12910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487572" comment="libsoup-devel-2.68.3-2.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487573" comment="typelib-1_0-Soup-2_4-2.68.3-2.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109766" version="1" class="patch">
	<metadata>
		<title>libsrt1-1.3.4-1.45 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-15784" ref_url="https://www.suse.com/security/cve/CVE-2019-15784/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrt1-1.3.4-1.45 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15784/">CVE-2019-15784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487574" comment="libsrt1-1.3.4-1.45 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109767" version="1" class="patch">
	<metadata>
		<title>libsrtp-devel-1.6.0-2.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2139" ref_url="https://www.suse.com/security/cve/CVE-2013-2139/" source="CVE"/>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp-devel-1.6.0-2.19 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2139/">CVE-2013-2139</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486502" comment="libsrtp-devel-1.6.0-2.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486503" comment="libsrtp1-1.6.0-2.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109768" version="1" class="patch">
	<metadata>
		<title>libsrtp2-1-2.2.0-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-6360" ref_url="https://www.suse.com/security/cve/CVE-2015-6360/" source="CVE"/>
		<description>
These are all security issues fixed in the libsrtp2-1-2.2.0-1.34 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6360/">CVE-2015-6360</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487575" comment="libsrtp2-1-2.2.0-1.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109769" version="1" class="patch">
	<metadata>
		<title>libtag-devel-1.11.1-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12678" ref_url="https://www.suse.com/security/cve/CVE-2017-12678/" source="CVE"/>
		<reference ref_id="CVE-2018-11439" ref_url="https://www.suse.com/security/cve/CVE-2018-11439/" source="CVE"/>
		<description>
These are all security issues fixed in the libtag-devel-1.11.1-4.6.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-12678/">CVE-2017-12678</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11439/">CVE-2018-11439</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487576" comment="libtag-devel-1.11.1-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487577" comment="libtag_c0-1.11.1-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109770" version="1" class="patch">
	<metadata>
		<title>libthai0-32bit-0.1.27-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-4012" ref_url="https://www.suse.com/security/cve/CVE-2009-4012/" source="CVE"/>
		<description>
These are all security issues fixed in the libthai0-32bit-0.1.27-1.16 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-4012/">CVE-2009-4012</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486507" comment="libthai0-32bit-0.1.27-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109771" version="1" class="patch">
	<metadata>
		<title>libtiff5-32bit-4.0.9-5.27.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2285" ref_url="https://www.suse.com/security/cve/CVE-2009-2285/" source="CVE"/>
		<reference ref_id="CVE-2009-2347" ref_url="https://www.suse.com/security/cve/CVE-2009-2347/" source="CVE"/>
		<reference ref_id="CVE-2010-2065" ref_url="https://www.suse.com/security/cve/CVE-2010-2065/" source="CVE"/>
		<reference ref_id="CVE-2010-2067" ref_url="https://www.suse.com/security/cve/CVE-2010-2067/" source="CVE"/>
		<reference ref_id="CVE-2010-2233" ref_url="https://www.suse.com/security/cve/CVE-2010-2233/" source="CVE"/>
		<reference ref_id="CVE-2010-4665" ref_url="https://www.suse.com/security/cve/CVE-2010-4665/" source="CVE"/>
		<reference ref_id="CVE-2011-0192" ref_url="https://www.suse.com/security/cve/CVE-2011-0192/" source="CVE"/>
		<reference ref_id="CVE-2011-1167" ref_url="https://www.suse.com/security/cve/CVE-2011-1167/" source="CVE"/>
		<reference ref_id="CVE-2012-1173" ref_url="https://www.suse.com/security/cve/CVE-2012-1173/" source="CVE"/>
		<reference ref_id="CVE-2012-2113" ref_url="https://www.suse.com/security/cve/CVE-2012-2113/" source="CVE"/>
		<reference ref_id="CVE-2012-3401" ref_url="https://www.suse.com/security/cve/CVE-2012-3401/" source="CVE"/>
		<reference ref_id="CVE-2012-4564" ref_url="https://www.suse.com/security/cve/CVE-2012-4564/" source="CVE"/>
		<reference ref_id="CVE-2013-1960" ref_url="https://www.suse.com/security/cve/CVE-2013-1960/" source="CVE"/>
		<reference ref_id="CVE-2013-1961" ref_url="https://www.suse.com/security/cve/CVE-2013-1961/" source="CVE"/>
		<reference ref_id="CVE-2013-4231" ref_url="https://www.suse.com/security/cve/CVE-2013-4231/" source="CVE"/>
		<reference ref_id="CVE-2013-4232" ref_url="https://www.suse.com/security/cve/CVE-2013-4232/" source="CVE"/>
		<reference ref_id="CVE-2013-4243" ref_url="https://www.suse.com/security/cve/CVE-2013-4243/" source="CVE"/>
		<reference ref_id="CVE-2013-4244" ref_url="https://www.suse.com/security/cve/CVE-2013-4244/" source="CVE"/>
		<reference ref_id="CVE-2014-8127" ref_url="https://www.suse.com/security/cve/CVE-2014-8127/" source="CVE"/>
		<reference ref_id="CVE-2014-8128" ref_url="https://www.suse.com/security/cve/CVE-2014-8128/" source="CVE"/>
		<reference ref_id="CVE-2014-8129" ref_url="https://www.suse.com/security/cve/CVE-2014-8129/" source="CVE"/>
		<reference ref_id="CVE-2014-8130" ref_url="https://www.suse.com/security/cve/CVE-2014-8130/" source="CVE"/>
		<reference ref_id="CVE-2014-9655" ref_url="https://www.suse.com/security/cve/CVE-2014-9655/" source="CVE"/>
		<reference ref_id="CVE-2015-1547" ref_url="https://www.suse.com/security/cve/CVE-2015-1547/" source="CVE"/>
		<reference ref_id="CVE-2015-7554" ref_url="https://www.suse.com/security/cve/CVE-2015-7554/" source="CVE"/>
		<reference ref_id="CVE-2015-8665" ref_url="https://www.suse.com/security/cve/CVE-2015-8665/" source="CVE"/>
		<reference ref_id="CVE-2015-8683" ref_url="https://www.suse.com/security/cve/CVE-2015-8683/" source="CVE"/>
		<reference ref_id="CVE-2015-8781" ref_url="https://www.suse.com/security/cve/CVE-2015-8781/" source="CVE"/>
		<reference ref_id="CVE-2015-8782" ref_url="https://www.suse.com/security/cve/CVE-2015-8782/" source="CVE"/>
		<reference ref_id="CVE-2015-8783" ref_url="https://www.suse.com/security/cve/CVE-2015-8783/" source="CVE"/>
		<reference ref_id="CVE-2016-10092" ref_url="https://www.suse.com/security/cve/CVE-2016-10092/" source="CVE"/>
		<reference ref_id="CVE-2016-10093" ref_url="https://www.suse.com/security/cve/CVE-2016-10093/" source="CVE"/>
		<reference ref_id="CVE-2016-10094" ref_url="https://www.suse.com/security/cve/CVE-2016-10094/" source="CVE"/>
		<reference ref_id="CVE-2016-10095" ref_url="https://www.suse.com/security/cve/CVE-2016-10095/" source="CVE"/>
		<reference ref_id="CVE-2016-10266" ref_url="https://www.suse.com/security/cve/CVE-2016-10266/" source="CVE"/>
		<reference ref_id="CVE-2016-10267" ref_url="https://www.suse.com/security/cve/CVE-2016-10267/" source="CVE"/>
		<reference ref_id="CVE-2016-10268" ref_url="https://www.suse.com/security/cve/CVE-2016-10268/" source="CVE"/>
		<reference ref_id="CVE-2016-10269" ref_url="https://www.suse.com/security/cve/CVE-2016-10269/" source="CVE"/>
		<reference ref_id="CVE-2016-10270" ref_url="https://www.suse.com/security/cve/CVE-2016-10270/" source="CVE"/>
		<reference ref_id="CVE-2016-10271" ref_url="https://www.suse.com/security/cve/CVE-2016-10271/" source="CVE"/>
		<reference ref_id="CVE-2016-10272" ref_url="https://www.suse.com/security/cve/CVE-2016-10272/" source="CVE"/>
		<reference ref_id="CVE-2016-10371" ref_url="https://www.suse.com/security/cve/CVE-2016-10371/" source="CVE"/>
		<reference ref_id="CVE-2016-3186" ref_url="https://www.suse.com/security/cve/CVE-2016-3186/" source="CVE"/>
		<reference ref_id="CVE-2016-3622" ref_url="https://www.suse.com/security/cve/CVE-2016-3622/" source="CVE"/>
		<reference ref_id="CVE-2016-3623" ref_url="https://www.suse.com/security/cve/CVE-2016-3623/" source="CVE"/>
		<reference ref_id="CVE-2016-3658" ref_url="https://www.suse.com/security/cve/CVE-2016-3658/" source="CVE"/>
		<reference ref_id="CVE-2016-3945" ref_url="https://www.suse.com/security/cve/CVE-2016-3945/" source="CVE"/>
		<reference ref_id="CVE-2016-3990" ref_url="https://www.suse.com/security/cve/CVE-2016-3990/" source="CVE"/>
		<reference ref_id="CVE-2016-3991" ref_url="https://www.suse.com/security/cve/CVE-2016-3991/" source="CVE"/>
		<reference ref_id="CVE-2016-5314" ref_url="https://www.suse.com/security/cve/CVE-2016-5314/" source="CVE"/>
		<reference ref_id="CVE-2016-5316" ref_url="https://www.suse.com/security/cve/CVE-2016-5316/" source="CVE"/>
		<reference ref_id="CVE-2016-5317" ref_url="https://www.suse.com/security/cve/CVE-2016-5317/" source="CVE"/>
		<reference ref_id="CVE-2016-5318" ref_url="https://www.suse.com/security/cve/CVE-2016-5318/" source="CVE"/>
		<reference ref_id="CVE-2016-5320" ref_url="https://www.suse.com/security/cve/CVE-2016-5320/" source="CVE"/>
		<reference ref_id="CVE-2016-5321" ref_url="https://www.suse.com/security/cve/CVE-2016-5321/" source="CVE"/>
		<reference ref_id="CVE-2016-5323" ref_url="https://www.suse.com/security/cve/CVE-2016-5323/" source="CVE"/>
		<reference ref_id="CVE-2016-5652" ref_url="https://www.suse.com/security/cve/CVE-2016-5652/" source="CVE"/>
		<reference ref_id="CVE-2016-5875" ref_url="https://www.suse.com/security/cve/CVE-2016-5875/" source="CVE"/>
		<reference ref_id="CVE-2016-6223" ref_url="https://www.suse.com/security/cve/CVE-2016-6223/" source="CVE"/>
		<reference ref_id="CVE-2016-9273" ref_url="https://www.suse.com/security/cve/CVE-2016-9273/" source="CVE"/>
		<reference ref_id="CVE-2016-9297" ref_url="https://www.suse.com/security/cve/CVE-2016-9297/" source="CVE"/>
		<reference ref_id="CVE-2016-9448" ref_url="https://www.suse.com/security/cve/CVE-2016-9448/" source="CVE"/>
		<reference ref_id="CVE-2016-9453" ref_url="https://www.suse.com/security/cve/CVE-2016-9453/" source="CVE"/>
		<reference ref_id="CVE-2016-9538" ref_url="https://www.suse.com/security/cve/CVE-2016-9538/" source="CVE"/>
		<reference ref_id="CVE-2017-11613" ref_url="https://www.suse.com/security/cve/CVE-2017-11613/" source="CVE"/>
		<reference ref_id="CVE-2017-12944" ref_url="https://www.suse.com/security/cve/CVE-2017-12944/" source="CVE"/>
		<reference ref_id="CVE-2017-16232" ref_url="https://www.suse.com/security/cve/CVE-2017-16232/" source="CVE"/>
		<reference ref_id="CVE-2017-18013" ref_url="https://www.suse.com/security/cve/CVE-2017-18013/" source="CVE"/>
		<reference ref_id="CVE-2017-5225" ref_url="https://www.suse.com/security/cve/CVE-2017-5225/" source="CVE"/>
		<reference ref_id="CVE-2017-7592" ref_url="https://www.suse.com/security/cve/CVE-2017-7592/" source="CVE"/>
		<reference ref_id="CVE-2017-7593" ref_url="https://www.suse.com/security/cve/CVE-2017-7593/" source="CVE"/>
		<reference ref_id="CVE-2017-7594" ref_url="https://www.suse.com/security/cve/CVE-2017-7594/" source="CVE"/>
		<reference ref_id="CVE-2017-7595" ref_url="https://www.suse.com/security/cve/CVE-2017-7595/" source="CVE"/>
		<reference ref_id="CVE-2017-7596" ref_url="https://www.suse.com/security/cve/CVE-2017-7596/" source="CVE"/>
		<reference ref_id="CVE-2017-7597" ref_url="https://www.suse.com/security/cve/CVE-2017-7597/" source="CVE"/>
		<reference ref_id="CVE-2017-7598" ref_url="https://www.suse.com/security/cve/CVE-2017-7598/" source="CVE"/>
		<reference ref_id="CVE-2017-7599" ref_url="https://www.suse.com/security/cve/CVE-2017-7599/" source="CVE"/>
		<reference ref_id="CVE-2017-7600" ref_url="https://www.suse.com/security/cve/CVE-2017-7600/" source="CVE"/>
		<reference ref_id="CVE-2017-7601" ref_url="https://www.suse.com/security/cve/CVE-2017-7601/" source="CVE"/>
		<reference ref_id="CVE-2017-7602" ref_url="https://www.suse.com/security/cve/CVE-2017-7602/" source="CVE"/>
		<reference ref_id="CVE-2017-9403" ref_url="https://www.suse.com/security/cve/CVE-2017-9403/" source="CVE"/>
		<reference ref_id="CVE-2017-9404" ref_url="https://www.suse.com/security/cve/CVE-2017-9404/" source="CVE"/>
		<reference ref_id="CVE-2017-9935" ref_url="https://www.suse.com/security/cve/CVE-2017-9935/" source="CVE"/>
		<reference ref_id="CVE-2017-9936" ref_url="https://www.suse.com/security/cve/CVE-2017-9936/" source="CVE"/>
		<reference ref_id="CVE-2018-10779" ref_url="https://www.suse.com/security/cve/CVE-2018-10779/" source="CVE"/>
		<reference ref_id="CVE-2018-10963" ref_url="https://www.suse.com/security/cve/CVE-2018-10963/" source="CVE"/>
		<reference ref_id="CVE-2018-12900" ref_url="https://www.suse.com/security/cve/CVE-2018-12900/" source="CVE"/>
		<reference ref_id="CVE-2018-16335" ref_url="https://www.suse.com/security/cve/CVE-2018-16335/" source="CVE"/>
		<reference ref_id="CVE-2018-17000" ref_url="https://www.suse.com/security/cve/CVE-2018-17000/" source="CVE"/>
		<reference ref_id="CVE-2018-17100" ref_url="https://www.suse.com/security/cve/CVE-2018-17100/" source="CVE"/>
		<reference ref_id="CVE-2018-17101" ref_url="https://www.suse.com/security/cve/CVE-2018-17101/" source="CVE"/>
		<reference ref_id="CVE-2018-17795" ref_url="https://www.suse.com/security/cve/CVE-2018-17795/" source="CVE"/>
		<reference ref_id="CVE-2018-18557" ref_url="https://www.suse.com/security/cve/CVE-2018-18557/" source="CVE"/>
		<reference ref_id="CVE-2018-18661" ref_url="https://www.suse.com/security/cve/CVE-2018-18661/" source="CVE"/>
		<reference ref_id="CVE-2018-19210" ref_url="https://www.suse.com/security/cve/CVE-2018-19210/" source="CVE"/>
		<reference ref_id="CVE-2018-5784" ref_url="https://www.suse.com/security/cve/CVE-2018-5784/" source="CVE"/>
		<reference ref_id="CVE-2018-7456" ref_url="https://www.suse.com/security/cve/CVE-2018-7456/" source="CVE"/>
		<reference ref_id="CVE-2018-8905" ref_url="https://www.suse.com/security/cve/CVE-2018-8905/" source="CVE"/>
		<reference ref_id="CVE-2019-6128" ref_url="https://www.suse.com/security/cve/CVE-2019-6128/" source="CVE"/>
		<reference ref_id="CVE-2019-7663" ref_url="https://www.suse.com/security/cve/CVE-2019-7663/" source="CVE"/>
		<description>
These are all security issues fixed in the libtiff5-32bit-4.0.9-5.27.5 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2285/">CVE-2009-2285</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2347/">CVE-2009-2347</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2065/">CVE-2010-2065</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2067/">CVE-2010-2067</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2233/">CVE-2010-2233</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-4665/">CVE-2010-4665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-0192/">CVE-2011-0192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-1167/">CVE-2011-1167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1173/">CVE-2012-1173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2113/">CVE-2012-2113</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3401/">CVE-2012-3401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4564/">CVE-2012-4564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1960/">CVE-2013-1960</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1961/">CVE-2013-1961</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4231/">CVE-2013-4231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4232/">CVE-2013-4232</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4243/">CVE-2013-4243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4244/">CVE-2013-4244</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8127/">CVE-2014-8127</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8128/">CVE-2014-8128</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8129/">CVE-2014-8129</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8130/">CVE-2014-8130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9655/">CVE-2014-9655</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1547/">CVE-2015-1547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7554/">CVE-2015-7554</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8665/">CVE-2015-8665</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2015-8683/">CVE-2015-8683</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8781/">CVE-2015-8781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8782/">CVE-2015-8782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8783/">CVE-2015-8783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10092/">CVE-2016-10092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10093/">CVE-2016-10093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10094/">CVE-2016-10094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10095/">CVE-2016-10095</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10266/">CVE-2016-10266</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10267/">CVE-2016-10267</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10268/">CVE-2016-10268</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10269/">CVE-2016-10269</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10270/">CVE-2016-10270</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10271/">CVE-2016-10271</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10272/">CVE-2016-10272</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-10371/">CVE-2016-10371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3186/">CVE-2016-3186</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3622/">CVE-2016-3622</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3623/">CVE-2016-3623</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3658/">CVE-2016-3658</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3945/">CVE-2016-3945</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3990/">CVE-2016-3990</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3991/">CVE-2016-3991</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5314/">CVE-2016-5314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5316/">CVE-2016-5316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5317/">CVE-2016-5317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5318/">CVE-2016-5318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5320/">CVE-2016-5320</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5321/">CVE-2016-5321</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5323/">CVE-2016-5323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5652/">CVE-2016-5652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5875/">CVE-2016-5875</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6223/">CVE-2016-6223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9273/">CVE-2016-9273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9297/">CVE-2016-9297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9448/">CVE-2016-9448</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9453/">CVE-2016-9453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9538/">CVE-2016-9538</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11613/">CVE-2017-11613</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12944/">CVE-2017-12944</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16232/">CVE-2017-16232</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18013/">CVE-2017-18013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5225/">CVE-2017-5225</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7592/">CVE-2017-7592</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7593/">CVE-2017-7593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7594/">CVE-2017-7594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7595/">CVE-2017-7595</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7596/">CVE-2017-7596</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7597/">CVE-2017-7597</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7598/">CVE-2017-7598</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7599/">CVE-2017-7599</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7600/">CVE-2017-7600</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7601/">CVE-2017-7601</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7602/">CVE-2017-7602</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9403/">CVE-2017-9403</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9404/">CVE-2017-9404</cve>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-9935/">CVE-2017-9935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9936/">CVE-2017-9936</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10779/">CVE-2018-10779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10963/">CVE-2018-10963</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12900/">CVE-2018-12900</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16335/">CVE-2018-16335</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17000/">CVE-2018-17000</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17100/">CVE-2018-17100</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-17101/">CVE-2018-17101</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17795/">CVE-2018-17795</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18557/">CVE-2018-18557</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18661/">CVE-2018-18661</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19210/">CVE-2018-19210</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5784/">CVE-2018-5784</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7456/">CVE-2018-7456</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-8905/">CVE-2018-8905</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6128/">CVE-2019-6128</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7663/">CVE-2019-7663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486885" comment="libtiff5-32bit-4.0.9-5.27.5 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109772" version="1" class="patch">
	<metadata>
		<title>libvdpau-devel-1.1.1-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5198" ref_url="https://www.suse.com/security/cve/CVE-2015-5198/" source="CVE"/>
		<reference ref_id="CVE-2015-5199" ref_url="https://www.suse.com/security/cve/CVE-2015-5199/" source="CVE"/>
		<reference ref_id="CVE-2015-5200" ref_url="https://www.suse.com/security/cve/CVE-2015-5200/" source="CVE"/>
		<description>
These are all security issues fixed in the libvdpau-devel-1.1.1-1.28 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5198/">CVE-2015-5198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5199/">CVE-2015-5199</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5200/">CVE-2015-5200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486511" comment="libvdpau-devel-1.1.1-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486512" comment="libvdpau1-1.1.1-1.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109773" version="1" class="patch">
	<metadata>
		<title>libvpx-devel-1.6.1-6.6.8 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1621" ref_url="https://www.suse.com/security/cve/CVE-2016-1621/" source="CVE"/>
		<reference ref_id="CVE-2016-2464" ref_url="https://www.suse.com/security/cve/CVE-2016-2464/" source="CVE"/>
		<reference ref_id="CVE-2017-0641" ref_url="https://www.suse.com/security/cve/CVE-2017-0641/" source="CVE"/>
		<reference ref_id="CVE-2017-13194" ref_url="https://www.suse.com/security/cve/CVE-2017-13194/" source="CVE"/>
		<reference ref_id="CVE-2019-2126" ref_url="https://www.suse.com/security/cve/CVE-2019-2126/" source="CVE"/>
		<reference ref_id="CVE-2019-9232" ref_url="https://www.suse.com/security/cve/CVE-2019-9232/" source="CVE"/>
		<reference ref_id="CVE-2019-9325" ref_url="https://www.suse.com/security/cve/CVE-2019-9325/" source="CVE"/>
		<reference ref_id="CVE-2019-9371" ref_url="https://www.suse.com/security/cve/CVE-2019-9371/" source="CVE"/>
		<reference ref_id="CVE-2019-9433" ref_url="https://www.suse.com/security/cve/CVE-2019-9433/" source="CVE"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<description>
These are all security issues fixed in the libvpx-devel-1.6.1-6.6.8 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1621/">CVE-2016-1621</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2464/">CVE-2016-2464</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-0641/">CVE-2017-0641</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13194/">CVE-2017-13194</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2126/">CVE-2019-2126</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9232/">CVE-2019-9232</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9325/">CVE-2019-9325</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9371/">CVE-2019-9371</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9433/">CVE-2019-9433</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487578" comment="libvpx-devel-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109774" version="1" class="patch">
	<metadata>
		<title>libwebp-devel-1.0.3-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8888" ref_url="https://www.suse.com/security/cve/CVE-2016-8888/" source="CVE"/>
		<reference ref_id="CVE-2016-9085" ref_url="https://www.suse.com/security/cve/CVE-2016-9085/" source="CVE"/>
		<description>
These are all security issues fixed in the libwebp-devel-1.0.3-1.62 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8888/">CVE-2016-8888</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9085/">CVE-2016-9085</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487579" comment="libwebp-devel-1.0.3-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487580" comment="libwebpdecoder3-1.0.3-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487581" comment="libwebpmux3-1.0.3-1.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109775" version="1" class="patch">
	<metadata>
		<title>libxcb-render0-32bit-1.13-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2064" ref_url="https://www.suse.com/security/cve/CVE-2013-2064/" source="CVE"/>
		<description>
These are all security issues fixed in the libxcb-render0-32bit-1.13-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2064/">CVE-2013-2064</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486886" comment="libxcb-render0-32bit-1.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486887" comment="libxcb-shm0-32bit-1.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109776" version="1" class="patch">
	<metadata>
		<title>libyaml-cpp0_6-0.6.1-2.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5950" ref_url="https://www.suse.com/security/cve/CVE-2017-5950/" source="CVE"/>
		<description>
These are all security issues fixed in the libyaml-cpp0_6-0.6.1-2.15 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5950/">CVE-2017-5950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486516" comment="libyaml-cpp0_6-0.6.1-2.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486517" comment="yaml-cpp-devel-0.6.1-2.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109777" version="1" class="patch">
	<metadata>
		<title>newt-devel-0.52.20-5.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-2905" ref_url="https://www.suse.com/security/cve/CVE-2009-2905/" source="CVE"/>
		<description>
These are all security issues fixed in the newt-devel-0.52.20-5.35 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-2905/">CVE-2009-2905</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486518" comment="newt-devel-0.52.20-5.35 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109778" version="1" class="patch">
	<metadata>
		<title>open-vm-tools-desktop-11.1.0-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5191" ref_url="https://www.suse.com/security/cve/CVE-2015-5191/" source="CVE"/>
		<description>
These are all security issues fixed in the open-vm-tools-desktop-11.1.0-2.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5191/">CVE-2015-5191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487582" comment="open-vm-tools-desktop-11.1.0-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109779" version="1" class="patch">
	<metadata>
		<title>perl-File-Path-2.150000-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6512" ref_url="https://www.suse.com/security/cve/CVE-2017-6512/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-File-Path-2.150000-1.22 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-6512/">CVE-2017-6512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486521" comment="perl-File-Path-2.150000-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109780" version="1" class="patch">
	<metadata>
		<title>perl-MIME-Charset-1.012.2-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-MIME-Charset-1.012.2-1.24 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486522" comment="perl-MIME-Charset-1.012.2-1.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109781" version="1" class="patch">
	<metadata>
		<title>ppp-2.4.7-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3158" ref_url="https://www.suse.com/security/cve/CVE-2014-3158/" source="CVE"/>
		<reference ref_id="CVE-2015-3310" ref_url="https://www.suse.com/security/cve/CVE-2015-3310/" source="CVE"/>
		<reference ref_id="CVE-2020-8597" ref_url="https://www.suse.com/security/cve/CVE-2020-8597/" source="CVE"/>
		<description>
These are all security issues fixed in the ppp-2.4.7-5.3.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3158/">CVE-2014-3158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3310/">CVE-2015-3310</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-8597/">CVE-2020-8597</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487583" comment="ppp-2.4.7-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487584" comment="ppp-devel-2.4.7-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109782" version="1" class="patch">
	<metadata>
		<title>python-tk-2.7.17-7.38.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-1752" ref_url="https://www.suse.com/security/cve/CVE-2013-1752/" source="CVE"/>
		<reference ref_id="CVE-2013-1753" ref_url="https://www.suse.com/security/cve/CVE-2013-1753/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-1000158" ref_url="https://www.suse.com/security/cve/CVE-2017-1000158/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000030" ref_url="https://www.suse.com/security/cve/CVE-2018-1000030/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2019-9948" ref_url="https://www.suse.com/security/cve/CVE-2019-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
These are all security issues fixed in the python-tk-2.7.17-7.38.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-1752/">CVE-2013-1752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1753/">CVE-2013-1753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000158/">CVE-2017-1000158</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000030/">CVE-2018-1000030</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9948/">CVE-2019-9948</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487585" comment="python-tk-2.7.17-7.38.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109783" version="1" class="patch">
	<metadata>
		<title>python3-bottle-0.12.13-1.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9964" ref_url="https://www.suse.com/security/cve/CVE-2016-9964/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-bottle-0.12.13-1.26 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9964/">CVE-2016-9964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486537" comment="python3-bottle-0.12.13-1.26 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109784" version="1" class="patch">
	<metadata>
		<title>python3-cupshelpers-1.5.7-6.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-4405" ref_url="https://www.suse.com/security/cve/CVE-2011-4405/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-cupshelpers-1.5.7-6.27 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4405/">CVE-2011-4405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486538" comment="python3-cupshelpers-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486539" comment="system-config-printer-common-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486540" comment="system-config-printer-common-lang-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486541" comment="system-config-printer-dbus-service-1.5.7-6.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486542" comment="udev-configure-printer-1.5.7-6.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109785" version="1" class="patch">
	<metadata>
		<title>rtkit-0.11+git.20130926-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-4326" ref_url="https://www.suse.com/security/cve/CVE-2013-4326/" source="CVE"/>
		<description>
These are all security issues fixed in the rtkit-0.11+git.20130926-1.34 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4326/">CVE-2013-4326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486543" comment="rtkit-0.11+git.20130926-1.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109786" version="1" class="patch">
	<metadata>
		<title>sane-backends-1.0.27-4.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6318" ref_url="https://www.suse.com/security/cve/CVE-2017-6318/" source="CVE"/>
		<description>
These are all security issues fixed in the sane-backends-1.0.27-4.27 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6318/">CVE-2017-6318</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486544" comment="sane-backends-1.0.27-4.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486545" comment="sane-backends-autoconfig-1.0.27-4.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486546" comment="sane-backends-devel-1.0.27-4.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109787" version="1" class="patch">
	<metadata>
		<title>spice-vdagent-0.19.0-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-15108" ref_url="https://www.suse.com/security/cve/CVE-2017-15108/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-vdagent-0.19.0-1.62 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15108/">CVE-2017-15108</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487586" comment="spice-vdagent-0.19.0-1.62 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109788" version="1" class="patch">
	<metadata>
		<title>texlive-12many-2017.133.0.0.3svn15878-6.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10243" ref_url="https://www.suse.com/security/cve/CVE-2016-10243/" source="CVE"/>
		<description>
These are all security issues fixed in the texlive-12many-2017.133.0.0.3svn15878-6.18 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10243/">CVE-2016-10243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009482808" comment="texlive-12many-2017.133.0.0.3svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482809" comment="texlive-2up-2017.133.1.2svn41578-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482810" comment="texlive-Asana-Math-2017.133.0.000.955svn37556-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482811" comment="texlive-Asana-Math-fonts-2017.133.0.000.955svn37556-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482812" comment="texlive-ESIEEcv-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482813" comment="texlive-FAQ-en-2017.133.3.28svn34303-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482814" comment="texlive-GS1-2017.133.15svn27540-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482815" comment="texlive-HA-prosper-2017.133.4.21svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482816" comment="texlive-IEEEconf-2017.133.1.4svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482817" comment="texlive-IEEEtran-2017.133.1.8bsvn38238-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482818" comment="texlive-MemoirChapStyles-2017.133.1.7esvn25918-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482819" comment="texlive-SIstyle-2017.133.2.3asvn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482820" comment="texlive-SIunits-2017.133.1.36svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482821" comment="texlive-Tabbing-2017.133.svn17022-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482822" comment="texlive-Type1fonts-2017.133.2.14svn19603-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482823" comment="texlive-a0poster-2017.133.1.22bsvn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482824" comment="texlive-a2ping-2017.133.svn29725-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482826" comment="texlive-a4wide-2017.133.svn20943-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482827" comment="texlive-a5comb-2017.133.4svn17020-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482828" comment="texlive-aastex-2017.133.6.0svn39929-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482829" comment="texlive-abbr-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482830" comment="texlive-abc-2017.133.2.0bsvn41157-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482831" comment="texlive-abntex2-2017.133.1.9.6svn39913-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482832" comment="texlive-abraces-2017.133.1._svn27880-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482833" comment="texlive-abstract-2017.133.1.2asvn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482834" comment="texlive-abstyles-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482835" comment="texlive-academicons-2017.133.1.8.0svn44380-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482836" comment="texlive-academicons-fonts-2017.133.1.8.0svn44380-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482837" comment="texlive-accanthis-2017.133.svn32089-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482838" comment="texlive-accanthis-fonts-2017.133.svn32089-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482839" comment="texlive-accfonts-2017.133.0.0.25svn18835-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482841" comment="texlive-achemso-2017.133.3.10isvn44425-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482842" comment="texlive-acmart-2017.133.1.39svn44367-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482843" comment="texlive-acmconf-2017.133.1.3svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482844" comment="texlive-acro-2017.133.2.7asvn43186-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482845" comment="texlive-acronym-2017.133.1.41svn36582-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482846" comment="texlive-acroterm-2017.133.0.0.1svn20498-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482847" comment="texlive-active-conf-2017.133.0.0.3asvn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482848" comment="texlive-actuarialangle-2017.133.2.0svn43751-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482849" comment="texlive-actuarialsymbol-2017.133.1.0svn43768-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482850" comment="texlive-addfont-2017.133.1svn41972-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482851" comment="texlive-addlines-2017.133.0.0.2asvn37805-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482852" comment="texlive-adfathesis-2017.133.2.42svn26048-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482853" comment="texlive-adforn-2017.133.1.001_b_2svn20019-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482854" comment="texlive-adforn-fonts-2017.133.1.001_b_2svn20019-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482855" comment="texlive-adfsymbols-2017.133.1.001svn19766-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482856" comment="texlive-adfsymbols-fonts-2017.133.1.001svn19766-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482857" comment="texlive-adhocfilelist-2017.133.svn29349-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482859" comment="texlive-adjmulticol-2017.133.1.1svn28936-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482860" comment="texlive-adjustbox-2017.133.1.0svn26555-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482861" comment="texlive-adobemapping-2017.133.svn44085-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482862" comment="texlive-adrconv-2017.133.1.3svn17683-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482863" comment="texlive-adtrees-2017.133.1.0svn39438-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482864" comment="texlive-advdate-2017.133.svn20538-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482865" comment="texlive-ae-2017.133.1.4svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482866" comment="texlive-aecc-2017.133.1.0svn28574-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482867" comment="texlive-aeguill-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482868" comment="texlive-afm2pl-2017.133.svn44166-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482870" comment="texlive-afparticle-2017.133.1.3svn35900-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482871" comment="texlive-afthesis-2017.133.2.7svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482872" comment="texlive-aguplus-2017.133.1.6bsvn17156-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482873" comment="texlive-aiaa-2017.133.3.6svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482874" comment="texlive-aichej-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482875" comment="texlive-ajl-2017.133.svn34016-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482876" comment="texlive-akktex-2017.133.0.0.3.2svn26055-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482877" comment="texlive-akletter-2017.133.1.5isvn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482878" comment="texlive-alegreya-2017.133.svn42077-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482879" comment="texlive-alegreya-fonts-2017.133.svn42077-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482880" comment="texlive-aleph-2017.133.svn44166-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482882" comment="texlive-alertmessage-2017.133.1.1svn38055-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482883" comment="texlive-alg-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482884" comment="texlive-algorithm2e-2017.133.5.1svn38805-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482885" comment="texlive-algorithmicx-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482886" comment="texlive-algorithms-2017.133.0.0.1svn42428-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482887" comment="texlive-alkalami-2017.133.1.000svn44497-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482888" comment="texlive-alkalami-fonts-2017.133.1.000svn44497-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482889" comment="texlive-allrunes-2017.133.2.1.1svn42221-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482890" comment="texlive-allrunes-fonts-2017.133.2.1.1svn42221-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482891" comment="texlive-almfixed-2017.133.0.0.92svn35065-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482892" comment="texlive-almfixed-fonts-2017.133.0.0.92svn35065-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482893" comment="texlive-alnumsec-2017.133.0.0.03svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482894" comment="texlive-alterqcm-2017.133.3.7csvn23385-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482895" comment="texlive-altfont-2017.133.1.1svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482896" comment="texlive-ametsoc-2017.133.4.3.2svn36030-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482897" comment="texlive-amiri-2017.133.0.0.109svn44303-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482898" comment="texlive-amiri-fonts-2017.133.0.0.109svn44303-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482899" comment="texlive-amsaddr-2017.133.1.1svn29630-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482900" comment="texlive-amscls-2017.133.svn36804-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482901" comment="texlive-amsfonts-2017.133.3.04svn29208-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482902" comment="texlive-amsfonts-fonts-2017.133.3.04svn29208-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482903" comment="texlive-amslatex-primer-2017.133.2.3svn28980-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482904" comment="texlive-amsldoc-it-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482905" comment="texlive-amsldoc-vn-2017.133.2.0svn21855-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482906" comment="texlive-amsmath-2017.133.svn43813-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482907" comment="texlive-amsmath-it-2017.133.svn22930-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482908" comment="texlive-amsrefs-2017.133.2.14svn30646-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482909" comment="texlive-amstex-2017.133.2.2svn44166-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482911" comment="texlive-amsthdoc-it-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482912" comment="texlive-animate-2017.133.svn44410-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482913" comment="texlive-anonchap-2017.133.1.1asvn17049-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482914" comment="texlive-anonymouspro-2017.133.2.1svn33441-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482915" comment="texlive-anonymouspro-fonts-2017.133.2.1svn33441-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482916" comment="texlive-answers-2017.133.2.16svn35032-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482917" comment="texlive-antiqua-2017.133.001.003svn24266-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482918" comment="texlive-antiqua-fonts-2017.133.001.003svn24266-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482919" comment="texlive-antomega-2017.133.0.0.8svn21933-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482920" comment="texlive-antt-2017.133.2.08svn18651-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482921" comment="texlive-antt-fonts-2017.133.2.08svn18651-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482922" comment="texlive-anufinalexam-2017.133.svn26053-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482923" comment="texlive-anyfontsize-2017.133.svn17050-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482924" comment="texlive-anysize-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482925" comment="texlive-aobs-tikz-2017.133.1.0svn32662-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482926" comment="texlive-aomart-2017.133.1.20svn44282-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482927" comment="texlive-apa-2017.133.1.3.4svn42428-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482928" comment="texlive-apa6-2017.133.2.31svn44477-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482929" comment="texlive-apa6e-2017.133.0.0.3svn23350-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482930" comment="texlive-apacite-2017.133.6.03svn31264-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482931" comment="texlive-apalike-german-2017.133.svn42045-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482932" comment="texlive-apalike2-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482933" comment="texlive-apnum-2017.133.1.6svn39710-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482934" comment="texlive-appendix-2017.133.1.2bsvn42428-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482935" comment="texlive-appendixnumberbeamer-2017.133.svn40322-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482936" comment="texlive-apprends-latex-2017.133.4.02svn19306-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482937" comment="texlive-apptools-2017.133.1.0svn28400-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482938" comment="texlive-apxproof-2017.133.1.0.5svn44478-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482939" comment="texlive-arabi-2017.133.1.1svn25095-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482940" comment="texlive-arabi-add-2017.133.1.0svn37709-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482941" comment="texlive-arabi-fonts-2017.133.1.1svn25095-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482942" comment="texlive-arabluatex-2017.133.1.8.4svn44241-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482943" comment="texlive-arabtex-2017.133.3.17svn25711-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482944" comment="texlive-arabtex-fonts-2017.133.3.17svn25711-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482945" comment="texlive-arabxetex-2017.133.1.2.1svn38299-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482946" comment="texlive-aramaic-serto-2017.133.1.0svn30042-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482947" comment="texlive-aramaic-serto-fonts-2017.133.1.0svn30042-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482948" comment="texlive-arara-2017.133.3.0svn29762-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482950" comment="texlive-archaeologie-2017.133.2.31svn44484-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482951" comment="texlive-archaic-2017.133.svn38005-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482952" comment="texlive-archaic-fonts-2017.133.svn38005-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482953" comment="texlive-arcs-2017.133.1svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482954" comment="texlive-arev-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482955" comment="texlive-arev-fonts-2017.133.svn15878-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482956" comment="texlive-arimo-2017.133.svn42880-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482957" comment="texlive-arimo-fonts-2017.133.svn42880-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482958" comment="texlive-armtex-2017.133.3.0_beta3svn33894-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482959" comment="texlive-armtex-fonts-2017.133.3.0_beta3svn33894-6.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482960" comment="texlive-around-the-bend-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482961" comment="texlive-arphic-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482962" comment="texlive-arphic-fonts-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482963" comment="texlive-arphic-ttf-2017.135.svn42675-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482964" comment="texlive-arphic-ttf-fonts-2017.135.svn42675-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482965" comment="texlive-arrayjobx-2017.135.1.04svn18125-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482966" comment="texlive-arraysort-2017.135.1.0svn31576-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482967" comment="texlive-arsclassica-2017.135.march_2017svn43509-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482968" comment="texlive-articleingud-2017.135.0.0.3svn38741-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482969" comment="texlive-arydshln-2017.135.1.73svn40847-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482970" comment="texlive-asaetr-2017.135.1.0asvn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482971" comment="texlive-asapsym-2017.135.1.0svn40201-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482972" comment="texlive-asapsym-fonts-2017.135.1.0svn40201-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482973" comment="texlive-ascelike-2017.135.2.3svn29129-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482974" comment="texlive-ascii-chart-2017.135.svn20536-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482975" comment="texlive-ascii-font-2017.135.2.0svn29989-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482976" comment="texlive-ascii-font-fonts-2017.135.2.0svn29989-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482977" comment="texlive-asciilist-2017.135.2.2svn41158-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482978" comment="texlive-askmaps-2017.135.0.0.1svn32320-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482979" comment="texlive-aspectratio-2017.135.2.0svn25243-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482980" comment="texlive-aspectratio-fonts-2017.135.2.0svn25243-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482981" comment="texlive-assignment-2017.135.svn20431-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482982" comment="texlive-assoccnt-2017.135.0.0.8svn38497-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482983" comment="texlive-astro-2017.135.2.20svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482984" comment="texlive-asyfig-2017.135.0.0.1csvn17512-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482985" comment="texlive-asymptote-2017.135.2.41svn43843-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482987" comment="texlive-asymptote-by-example-zh-cn-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482988" comment="texlive-asymptote-faq-zh-cn-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482989" comment="texlive-asymptote-manual-zh-cn-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482990" comment="texlive-asypictureb-2017.135.0.0.3svn33490-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482991" comment="texlive-attachfile-2017.135.1.9svn42099-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482992" comment="texlive-aucklandthesis-2017.135.svn41506-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482993" comment="texlive-augie-2017.135.svn18948-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482994" comment="texlive-augie-fonts-2017.135.svn18948-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482995" comment="texlive-auncial-new-2017.135.2.0svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482996" comment="texlive-auncial-new-fonts-2017.135.2.0svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482997" comment="texlive-aurical-2017.135.1.5svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482998" comment="texlive-aurical-fonts-2017.135.1.5svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009482999" comment="texlive-aurl-2017.135.svn41853-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483000" comment="texlive-authoraftertitle-2017.135.0.0.9svn24863-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483001" comment="texlive-authorindex-2017.135.svn26313-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483003" comment="texlive-auto-pst-pdf-2017.135.0.0.6svn23723-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483004" comment="texlive-autoaligne-2017.135.1.3svn43195-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483005" comment="texlive-autoarea-2017.135.0.0.3asvn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483006" comment="texlive-autobreak-2017.135.0.0.3svn43337-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483007" comment="texlive-automata-2017.135.0.0.3svn19717-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483008" comment="texlive-autonum-2017.135.0.0.3.11svn36084-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483009" comment="texlive-autopdf-2017.135.1.1svn32377-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483010" comment="texlive-autosp-2017.135.svn44166-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483012" comment="texlive-avantgar-2017.135.svn31835-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483013" comment="texlive-avantgar-fonts-2017.135.svn31835-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483014" comment="texlive-avremu-2017.135.0.0.1svn35373-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483015" comment="texlive-awesomebox-2017.135.0.0.1svn44131-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483016" comment="texlive-axodraw2-2017.135.2.1.0bsvn44396-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483017" comment="texlive-b1encoding-2017.135.1.0svn21271-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483018" comment="texlive-babel-2017.135.3.10svn44427-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483019" comment="texlive-babel-albanian-2017.135.1.0csvn30254-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483020" comment="texlive-babel-azerbaijani-2017.135.1.0asvn44197-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483021" comment="texlive-babel-basque-2017.135.1.0fsvn30256-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483022" comment="texlive-babel-belarusian-2017.135.1.3hsvn40636-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483023" comment="texlive-babel-bosnian-2017.135.1.1svn38174-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483024" comment="texlive-babel-breton-2017.135.1.0hsvn30257-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483025" comment="texlive-babel-bulgarian-2017.135.1.2gsvn31902-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483026" comment="texlive-babel-catalan-2017.135.2.2psvn30259-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483027" comment="texlive-babel-croatian-2017.135.1.3lsvn35198-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483028" comment="texlive-babel-czech-2017.135.3.1asvn30261-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483029" comment="texlive-babel-danish-2017.135.1.3rsvn30262-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483030" comment="texlive-babel-dutch-2017.135.3.8isvn30263-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483031" comment="texlive-babel-english-2017.135.3.3qsvn44495-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483032" comment="texlive-babel-esperanto-2017.135.1.4tsvn30265-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483033" comment="texlive-babel-estonian-2017.135.1.1asvn38064-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483034" comment="texlive-babel-finnish-2017.135.1.3qsvn30267-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483035" comment="texlive-babel-french-2017.135.3.3asvn44270-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483036" comment="texlive-babel-friulan-2017.135.1.3svn39861-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483037" comment="texlive-babel-galician-2017.135.4.3csvn30270-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483038" comment="texlive-babel-georgian-2017.135.2.1svn33527-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483039" comment="texlive-babel-german-2017.135.2.9svn42424-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483040" comment="texlive-babel-greek-2017.135.1.9gsvn42010-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483041" comment="texlive-babel-hebrew-2017.135.2.3hsvn30273-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483042" comment="texlive-babel-hungarian-2017.135.1.5csvn41435-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483043" comment="texlive-babel-icelandic-2017.135.1.2bsvn39387-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483044" comment="texlive-babel-indonesian-2017.135.1.0msvn43235-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483045" comment="texlive-babel-interlingua-2017.135.1.6svn30276-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483046" comment="texlive-babel-irish-2017.135.1.0hsvn30277-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483047" comment="texlive-babel-italian-2017.135.1.3nsvn36645-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483048" comment="texlive-babel-japanese-2017.135.2.1svn43145-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483049" comment="texlive-babel-kurmanji-2017.135.1.1svn30279-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483050" comment="texlive-babel-latin-2017.135.3.5svn38173-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483051" comment="texlive-babel-latvian-2017.135.2.0asvn34377-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483052" comment="texlive-babel-macedonian-2017.135.svn39587-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483053" comment="texlive-babel-malay-2017.135.1.0msvn43234-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483054" comment="texlive-babel-norsk-2017.135.2.0isvn30281-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483055" comment="texlive-babel-occitan-2017.135.0.0.2svn39608-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483056" comment="texlive-babel-piedmontese-2017.135.1.0svn30282-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483057" comment="texlive-babel-polish-2017.135.1.2lsvn30283-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483058" comment="texlive-babel-portuges-2017.135.1.2qsvn30284-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483059" comment="texlive-babel-romanian-2017.135.1.2lsvn30285-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483060" comment="texlive-babel-romansh-2017.135.svn30286-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483061" comment="texlive-babel-russian-2017.135.1.3isvn42885-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483062" comment="texlive-babel-samin-2017.135.1.0csvn30288-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483063" comment="texlive-babel-scottish-2017.135.1.0gsvn30289-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483064" comment="texlive-babel-serbian-2017.135.1.0dsvn30290-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483065" comment="texlive-babel-serbianc-2017.135.2.2svn30348-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483066" comment="texlive-babel-slovak-2017.135.3.1asvn30292-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483067" comment="texlive-babel-slovenian-2017.135.1.2isvn30351-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483068" comment="texlive-babel-sorbian-2017.135.lower_sorbian_1.0g._upper_1.0ksvn30294-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483069" comment="texlive-babel-spanglish-2017.135.0.0.3svn37629-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483070" comment="texlive-babel-spanish-2017.135.5.0psvn39920-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483071" comment="texlive-babel-swedish-2017.135.2.3dsvn30296-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483072" comment="texlive-babel-thai-2017.135.1.0.0svn30564-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483073" comment="texlive-babel-turkish-2017.135.1.3bsvn33284-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483074" comment="texlive-babel-ukrainian-2017.135.1.4svn44550-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483075" comment="texlive-babel-vietnamese-2017.135.1.4svn39246-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483076" comment="texlive-babel-welsh-2017.135.1.1asvn38372-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483077" comment="texlive-babelbib-2017.135.1.31svn25245-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483078" comment="texlive-background-2017.135.2.1svn42428-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483079" comment="texlive-backnaur-2017.135.1.1svn28513-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483080" comment="texlive-baekmuk-2017.135.2.2svn42106-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483081" comment="texlive-baekmuk-fonts-2017.135.2.2svn42106-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483082" comment="texlive-bagpipe-2017.135.3.02svn34393-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483083" comment="texlive-bangorcsthesis-2017.135.1.5.1svn41919-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483084" comment="texlive-bangorexam-2017.135.1.2.0svn43500-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483085" comment="texlive-bangtex-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483086" comment="texlive-bankstatement-2017.135.0.0.9.2svn38857-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483087" comment="texlive-barcodes-2017.135.svn15878-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483088" comment="texlive-bardiag-2017.135.0.0.4asvn22013-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483089" comment="texlive-barr-2017.135.svn38479-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483090" comment="texlive-bartel-chess-fonts-2017.135.svn20619-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483091" comment="texlive-bashful-2017.135.0.0.93svn25597-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483092" comment="texlive-basicarith-2017.135.1.1svn35460-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483093" comment="texlive-baskervald-2017.135.1.016svn19490-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483094" comment="texlive-baskervald-fonts-2017.135.1.016svn19490-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483095" comment="texlive-baskervaldx-2017.135.1.072svn43461-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483096" comment="texlive-baskervaldx-fonts-2017.135.1.072svn43461-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483097" comment="texlive-baskervillef-2017.135.1.043svn43484-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483098" comment="texlive-baskervillef-fonts-2017.135.1.043svn43484-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483099" comment="texlive-basque-book-2017.135.1.20svn32924-6.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483100" comment="texlive-basque-date-2017.133.1.05svn26477-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483101" comment="texlive-bbcard-2017.133.svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483102" comment="texlive-bbding-2017.133.1.01svn17186-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483103" comment="texlive-bbm-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483104" comment="texlive-bbm-macros-2017.133.svn17224-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483105" comment="texlive-bbold-2017.133.1.01svn17187-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483106" comment="texlive-bbold-type1-2017.133.svn33143-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483107" comment="texlive-bbold-type1-fonts-2017.133.svn33143-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483108" comment="texlive-bchart-2017.133.0.0.1.3svn43928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483109" comment="texlive-bclogo-2017.133.3.1svn39364-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483110" comment="texlive-beamer-2017.133.3.41svn43073-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483111" comment="texlive-beamer-FUBerlin-2017.133.0.0.02bsvn38159-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483112" comment="texlive-beamer-tut-pt-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483113" comment="texlive-beamer-verona-2017.133.0.0.2svn39180-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483114" comment="texlive-beamer2thesis-2017.133.2.2svn27539-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483115" comment="texlive-beameraudience-2017.133.0.0.1svn23427-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483116" comment="texlive-beamercolorthemeowl-2017.133.0.0.1.1svn40105-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483117" comment="texlive-beamerdarkthemes-2017.133.0.0.4.1svn35101-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483118" comment="texlive-beamerposter-2017.133.1.12svn37009-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483119" comment="texlive-beamersubframe-2017.133.0.0.2svn23510-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483120" comment="texlive-beamerswitch-2017.133.1.2svn44568-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483121" comment="texlive-beamertheme-cuerna-2017.133.svn42161-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483122" comment="texlive-beamertheme-detlevcm-2017.133.1.02svn39048-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483123" comment="texlive-beamertheme-epyt-2017.133.1.0svn41404-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483124" comment="texlive-beamertheme-metropolis-2017.133.1.2svn43031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483125" comment="texlive-beamertheme-phnompenh-2017.133.1.0svn39100-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483126" comment="texlive-beamertheme-upenn-bc-2017.133.1.0svn29937-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483127" comment="texlive-beamerthemejltree-2017.133.1.1svn21977-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483128" comment="texlive-beamerthemenirma-2017.133.0.0.1svn20765-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483129" comment="texlive-beebe-2017.133.svn44569-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483130" comment="texlive-begingreek-2017.133.1.5svn36294-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483131" comment="texlive-begriff-2017.133.1.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483132" comment="texlive-belleek-2017.133.svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483133" comment="texlive-belleek-fonts-2017.133.svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483134" comment="texlive-bengali-2017.133.svn20987-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483135" comment="texlive-bera-2017.133.svn20031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483136" comment="texlive-bera-fonts-2017.133.svn20031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483137" comment="texlive-berenisadf-2017.133.1.004svn32215-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483138" comment="texlive-berenisadf-fonts-2017.133.1.004svn32215-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483139" comment="texlive-besjournals-2017.133.svn35428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483140" comment="texlive-bestpapers-2017.133.1.0svn38708-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483141" comment="texlive-betababel-2017.133.0.0.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483142" comment="texlive-beton-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483143" comment="texlive-beuron-2017.133.1.1svn42038-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483144" comment="texlive-beuron-fonts-2017.133.1.1svn42038-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483145" comment="texlive-bewerbung-2017.133.1.1svn37880-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483146" comment="texlive-bez123-2017.133.1.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483147" comment="texlive-bezos-2017.133.svn25507-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483148" comment="texlive-bgreek-2017.133.0.0.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483149" comment="texlive-bgteubner-2017.133.2.11svn44205-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483150" comment="texlive-bguq-2017.133.0.0.4svn27401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483151" comment="texlive-bguq-fonts-2017.133.0.0.4svn27401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483152" comment="texlive-bhcexam-2017.133.0.0.4svn39041-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483153" comment="texlive-bib-fr-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483154" comment="texlive-bibarts-2017.133.2.1svn40096-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483155" comment="texlive-biber-2017.133.2.7svn43910-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483157" comment="texlive-bibexport-2017.133.3.02svn39928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483159" comment="texlive-bibhtml-2017.133.2.0.2svn31607-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483160" comment="texlive-biblatex-2017.133.3.7svn42680-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483161" comment="texlive-biblatex-abnt-2017.133.3.0.1svn43510-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483162" comment="texlive-biblatex-anonymous-2017.133.2.6.0svn43043-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483163" comment="texlive-biblatex-apa-2017.133.7.4svn42893-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483164" comment="texlive-biblatex-archaeology-2017.133.1.2svn44522-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483165" comment="texlive-biblatex-arthistory-bonn-2017.133.1.0svn43468-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483166" comment="texlive-biblatex-bookinarticle-2017.133.1.3.1asvn40323-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483167" comment="texlive-biblatex-bookinother-2017.133.2.3.0svn43619-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483168" comment="texlive-biblatex-bwl-2017.133.0.0.02svn26556-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483169" comment="texlive-biblatex-caspervector-2017.133.0.0.2.7svn43371-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483170" comment="texlive-biblatex-cheatsheet-2017.133.svn43650-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483171" comment="texlive-biblatex-chem-2017.133.1.1ssvn43116-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483172" comment="texlive-biblatex-chicago-2017.133.1.0rc4svn44156-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483173" comment="texlive-biblatex-claves-2017.133.1.2.0svn43723-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483174" comment="texlive-biblatex-dw-2017.133.1.7svn42649-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483175" comment="texlive-biblatex-fiwi-2017.133.1.6csvn43082-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483176" comment="texlive-biblatex-gb7714-2015-2017.133.1.0gsvn43555-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483177" comment="texlive-biblatex-gost-2017.133.1.14svn44172-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483178" comment="texlive-biblatex-historian-2017.133.0.0.4svn19787-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483179" comment="texlive-biblatex-ieee-2017.133.1.2dsvn43620-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483180" comment="texlive-biblatex-ijsra-2017.133.0.0.1svn41634-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483181" comment="texlive-biblatex-iso690-2017.133.0.0.3.2svn44066-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483182" comment="texlive-biblatex-juradiss-2017.133.0.0.1gsvn29252-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483183" comment="texlive-biblatex-lni-2017.133.0.0.4svn43032-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483184" comment="texlive-biblatex-luh-ipw-2017.133.0.0.3svn32180-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483185" comment="texlive-biblatex-manuscripts-philology-2017.133.1.12.2svn43108-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483186" comment="texlive-biblatex-mla-2017.133.1.9svn42445-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483187" comment="texlive-biblatex-morenames-2017.133.1.3.1svn43049-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483188" comment="texlive-biblatex-multiple-dm-2017.133.1.0.1svn37081-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483189" comment="texlive-biblatex-musuos-2017.133.1.0svn24097-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483190" comment="texlive-biblatex-nature-2017.133.1.3bsvn43382-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483191" comment="texlive-biblatex-nejm-2017.133.0.0.4svn24011-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483192" comment="texlive-biblatex-nottsclassic-2017.133.0.0.1svn41596-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483193" comment="texlive-biblatex-opcit-booktitle-2017.133.1.8.0svn43621-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483194" comment="texlive-biblatex-oxref-2017.133.0.0.10svn44385-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483195" comment="texlive-biblatex-philosophy-2017.133.1.9.5svn43860-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483196" comment="texlive-biblatex-phys-2017.133.1.0bsvn41922-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483197" comment="texlive-biblatex-publist-2017.133.1.7svn43765-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483198" comment="texlive-biblatex-realauthor-2017.133.2.7.0svn42390-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483199" comment="texlive-biblatex-sbl-2017.133.0.0.8.1svn42972-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483200" comment="texlive-biblatex-science-2017.133.1.1gsvn42147-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483201" comment="texlive-biblatex-shortfields-2017.133.1.0.0svn43738-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483202" comment="texlive-biblatex-source-division-2017.133.2.4.1svn41675-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483203" comment="texlive-biblatex-subseries-2017.133.1.2.0svn43330-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483204" comment="texlive-biblatex-swiss-legal-2017.133.1.1.2asvn32750-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483205" comment="texlive-biblatex-trad-2017.133.0.0.3svn41656-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483206" comment="texlive-biblatex-true-citepages-omit-2017.133.1.3.0svn42120-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483207" comment="texlive-bibleref-2017.133.1.16svn42162-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483208" comment="texlive-bibleref-french-2017.133.2.3.1svn35497-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483209" comment="texlive-bibleref-german-2017.133.1.0asvn21923-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483210" comment="texlive-bibleref-lds-2017.133.1.0svn25526-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483211" comment="texlive-bibleref-mouth-2017.133.1.0svn25527-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483212" comment="texlive-bibleref-parse-2017.133.1.1svn22054-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483213" comment="texlive-bibletext-2017.133.0.0.1svn39785-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483214" comment="texlive-biblist-2017.133.svn17116-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483215" comment="texlive-bibtex-2017.133.0.0.99dsvn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483217" comment="texlive-bibtex8-2017.133.3.71svn29725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483219" comment="texlive-bibtexperllibs-2017.133.1.3svn43549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483220" comment="texlive-bibtexu-2017.133.svn29743-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483222" comment="texlive-bibtopic-2017.133.1.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483223" comment="texlive-bibtopicprefix-2017.133.1.10svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483224" comment="texlive-bibunits-2017.133.2.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483225" comment="texlive-bidi-2017.133.30.7svn44546-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483226" comment="texlive-bidi-atbegshi-2017.133.0.0.1svn35154-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483227" comment="texlive-bidicontour-2017.133.0.0.2svn34631-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483228" comment="texlive-bidihl-2017.133.0.0.1csvn37795-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483229" comment="texlive-bidipagegrid-2017.133.0.0.2svn34632-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483230" comment="texlive-bidipresentation-2017.133.0.0.3svn35267-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483231" comment="texlive-bidishadowtext-2017.133.0.0.1svn34633-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483232" comment="texlive-bigfoot-2017.133.2.1svn38248-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483233" comment="texlive-bigints-2017.133.svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483235" comment="texlive-binarytree-2017.133.1.01svn41777-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483236" comment="texlive-binomexp-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483237" comment="texlive-biochemistry-colors-2017.133.1.00svn43960-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483238" comment="texlive-biocon-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483239" comment="texlive-biolett-bst-2017.133.svn42217-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483240" comment="texlive-bitelist-2017.133.0.0.1svn25779-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483241" comment="texlive-bitpattern-2017.133.svn39073-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483242" comment="texlive-bizcard-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483243" comment="texlive-blacklettert1-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483244" comment="texlive-blindtext-2017.133.2.0svn25039-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483245" comment="texlive-blkarray-2017.133.0.0.07svn36406-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483246" comment="texlive-blochsphere-2017.133.1.1svn38388-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483247" comment="texlive-block-2017.133.svn17209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483248" comment="texlive-blockdraw_mp-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483249" comment="texlive-bloques-2017.133.1.0svn22490-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483250" comment="texlive-blox-2017.133.2.5svn35014-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483251" comment="texlive-bnumexpr-2017.133.1.2asvn38638-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483252" comment="texlive-bodegraph-2017.133.1.4svn20047-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483253" comment="texlive-bohr-2017.133.1.0svn37657-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483254" comment="texlive-boisik-2017.133.0.0.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483255" comment="texlive-boites-2017.133.1.1svn32235-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483256" comment="texlive-bold-extra-2017.133.0.0.1svn17076-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483257" comment="texlive-boldtensors-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483258" comment="texlive-bondgraph-2017.133.1.0svn21670-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483259" comment="texlive-bondgraphs-2017.133.1.0.1svn36605-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483260" comment="texlive-bookcover-2017.133.2.1svn43861-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483261" comment="texlive-bookdb-2017.133.0.0.2svn37536-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483262" comment="texlive-bookest-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483263" comment="texlive-bookhands-2017.133.svn23609-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483264" comment="texlive-bookhands-fonts-2017.133.svn23609-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483265" comment="texlive-booklet-2017.133.0.0.7bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483266" comment="texlive-bookman-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483267" comment="texlive-bookman-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483268" comment="texlive-booktabs-2017.133.1.618033svn40846-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483269" comment="texlive-booktabs-de-2017.133.1.61803svn21907-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483270" comment="texlive-booktabs-fr-2017.133.1.00svn21948-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483271" comment="texlive-boolexpr-2017.133.3.14svn17830-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483272" comment="texlive-boondox-2017.133.1.02dsvn43344-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483273" comment="texlive-boondox-fonts-2017.133.1.02dsvn43344-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483274" comment="texlive-bophook-2017.133.0.0.02svn17062-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483275" comment="texlive-borceux-2017.133.svn21047-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483276" comment="texlive-bosisio-2017.133.svn16989-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483277" comment="texlive-boxedminipage-2017.133.2svn17087-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483278" comment="texlive-boxedminipage2e-2017.133.1.0svn36477-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483279" comment="texlive-boxhandler-2017.133.1.30svn28031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483280" comment="texlive-bpchem-2017.133.1.06svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483281" comment="texlive-bpolynomial-2017.133.0.0.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483282" comment="texlive-br-lex-2017.133.svn39701-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483283" comment="texlive-bracketkey-2017.133.1.0svn17129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483284" comment="texlive-braids-2017.133.1.0svn23790-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483285" comment="texlive-braille-2017.133.svn20655-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483286" comment="texlive-braket-2017.133.svn17127-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483287" comment="texlive-brandeis-dissertation-2017.133.2.0svn32047-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483288" comment="texlive-breakcites-2017.133.svn21014-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483289" comment="texlive-breakurl-2017.133.1.40svn29901-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483290" comment="texlive-bredzenie-2017.133.1.0svn44371-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483291" comment="texlive-breqn-2017.133.0.0.98esvn43071-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483292" comment="texlive-bropd-2017.133.1.2svn35383-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483293" comment="texlive-brushscr-2017.133.svn28363-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483294" comment="texlive-brushscr-fonts-2017.133.svn28363-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483295" comment="texlive-bullcntr-2017.133.0.0.04svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483296" comment="texlive-bundledoc-2017.133.3.2svn35041-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483298" comment="texlive-burmese-2017.133.svn25185-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483299" comment="texlive-burmese-fonts-2017.133.svn25185-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483300" comment="texlive-bussproofs-2017.133.1.1svn27488-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483301" comment="texlive-bxbase-2017.133.1.1svn44481-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483302" comment="texlive-bxcalc-2017.133.1.0svn44514-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483303" comment="texlive-bxcjkjatype-2017.133.0.0.3svn42292-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483304" comment="texlive-bxdpx-beamer-2017.133.0.0.3svn41813-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483305" comment="texlive-bxdvidriver-2017.133.0.0.2asvn43219-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483306" comment="texlive-bxeepic-2017.133.0.0.2svn30559-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483307" comment="texlive-bxenclose-2017.133.0.0.2svn40213-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483308" comment="texlive-bxjalipsum-2017.133.0.0.3asvn43369-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483309" comment="texlive-bxjaprnind-2017.133.0.0.3asvn44554-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483310" comment="texlive-bxjscls-2017.133.1.5bsvn43741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483311" comment="texlive-bxnewfont-2017.133.0.0.2bsvn44173-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483312" comment="texlive-bxorigcapt-2017.133.0.0.2asvn44195-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483313" comment="texlive-bxpapersize-2017.133.0.0.3asvn44174-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483314" comment="texlive-bxpdfver-2017.133.0.0.4svn43201-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483315" comment="texlive-bytefield-2017.133.2.3svn38736-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483316" comment="texlive-c-pascal-2017.133.1.2svn18337-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483317" comment="texlive-c90-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483318" comment="texlive-cabin-2017.133.svn43687-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483319" comment="texlive-cabin-fonts-2017.133.svn43687-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483320" comment="texlive-cachepic-2017.133.1.0svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483322" comment="texlive-caladea-2017.133.svn34991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483323" comment="texlive-caladea-fonts-2017.133.svn34991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483324" comment="texlive-calcage-2017.133.0.0.90svn27725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483325" comment="texlive-calctab-2017.133.0.0.6.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483326" comment="texlive-calculation-2017.133.1.0svn35973-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483327" comment="texlive-calculator-2017.133.2.0svn33041-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483328" comment="texlive-calligra-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483329" comment="texlive-calligra-type1-2017.133.001.000svn24302-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483330" comment="texlive-calligra-type1-fonts-2017.133.001.000svn24302-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483331" comment="texlive-callouts-2017.133.svn43515-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483332" comment="texlive-calrsfs-2017.133.svn17125-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483333" comment="texlive-cals-2017.133.2.4.2svn43003-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483334" comment="texlive-calxxxx-yyyy-2017.133.20.17asvn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483335" comment="texlive-cancel-2017.133.2.2svn32508-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483336" comment="texlive-canoniclayout-2017.133.0.0.4svn24523-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483337" comment="texlive-cantarell-2017.133.2.4svn27066-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483338" comment="texlive-cantarell-fonts-2017.133.2.4svn27066-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483339" comment="texlive-capt-of-2017.133.svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483340" comment="texlive-captcont-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483341" comment="texlive-captdef-2017.133.svn17353-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483342" comment="texlive-caption-2017.133.svn41409-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483343" comment="texlive-carbohydrates-2017.133.0.0.1svn39000-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483344" comment="texlive-carlisle-2017.133.svn18258-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483345" comment="texlive-carlito-2017.133.svn35002-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483346" comment="texlive-carlito-fonts-2017.133.svn35002-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483347" comment="texlive-carolmin-ps-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483348" comment="texlive-carolmin-ps-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483349" comment="texlive-cascadilla-2017.133.1.8.2svn25144-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483350" comment="texlive-cases-2017.133.2.5svn17123-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483351" comment="texlive-casyl-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483352" comment="texlive-catchfilebetweentags-2017.133.1.1svn21476-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483353" comment="texlive-catcodes-2017.133.r0.2svn38859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483354" comment="texlive-catechis-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483355" comment="texlive-catoptions-2017.133.0.0.2.7hsvn35069-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483356" comment="texlive-cbcoptic-2017.133.0.0.2svn16666-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483357" comment="texlive-cbcoptic-fonts-2017.133.0.0.2svn16666-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483358" comment="texlive-cbfonts-2017.133.svn31624-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483359" comment="texlive-cbfonts-fd-2017.133.1.1svn39936-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483360" comment="texlive-cbfonts-fonts-2017.133.svn31624-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483361" comment="texlive-cc-pl-2017.133.1.02.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483362" comment="texlive-cc-pl-fonts-2017.133.1.02.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483363" comment="texlive-ccaption-2017.133.3.2csvn23443-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483364" comment="texlive-ccfonts-2017.133.1.1svn17122-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483365" comment="texlive-ccicons-2017.133.1.5svn30020-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483366" comment="texlive-ccicons-fonts-2017.133.1.5svn30020-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483367" comment="texlive-cclicenses-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483368" comment="texlive-cd-2017.133.1.4svn34452-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483369" comment="texlive-cd-cover-2017.133.1.0svn17121-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483370" comment="texlive-cdpbundl-2017.133.0.0.36svn36697-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483371" comment="texlive-cell-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483372" comment="texlive-cellspace-2017.133.1.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483373" comment="texlive-celtic-2017.133.1.1svn39797-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483374" comment="texlive-censor-2017.133.3.21svn31332-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483375" comment="texlive-cfr-initials-2017.133.1.01svn36728-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483376" comment="texlive-cfr-lm-2017.133.1.5svn36195-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483377" comment="texlive-changebar-2017.133.3.5csvn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483378" comment="texlive-changelayout-2017.133.1.0svn16094-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483379" comment="texlive-changepage-2017.133.1.0csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483380" comment="texlive-changes-2017.133.2.0.4svn41737-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483381" comment="texlive-chappg-2017.133.2.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483382" comment="texlive-chapterfolder-2017.133.2.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483383" comment="texlive-charter-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483384" comment="texlive-charter-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483385" comment="texlive-chbibref-2017.133.1.0svn17120-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483386" comment="texlive-checkcites-2017.133.1.0isvn28572-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483388" comment="texlive-checklistings-2017.133.1.0svn38300-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483390" comment="texlive-chem-journal-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483391" comment="texlive-chemarrow-2017.133.0.0.9svn17146-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483392" comment="texlive-chemarrow-fonts-2017.133.0.0.9svn17146-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483393" comment="texlive-chembst-2017.133.0.0.2.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483394" comment="texlive-chemcompounds-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483395" comment="texlive-chemcono-2017.133.1.3svn17119-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483396" comment="texlive-chemexec-2017.133.1.0svn21632-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483397" comment="texlive-chemfig-2017.133.1.2esvn44513-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483398" comment="texlive-chemformula-2017.133.4.15esvn43583-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483399" comment="texlive-chemgreek-2017.133.1.1svn42758-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483400" comment="texlive-chemmacros-2017.133.5.8svn44023-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483401" comment="texlive-chemnum-2017.133.1.2svn40522-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483402" comment="texlive-chemschemex-2017.133.1.1svn43747-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483403" comment="texlive-chemstyle-2017.133.2.0msvn31096-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483404" comment="texlive-cherokee-2017.133.svn21046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483405" comment="texlive-chess-2017.133.1.2svn20582-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483406" comment="texlive-chess-problem-diagrams-2017.133.1.12svn39317-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483407" comment="texlive-chessboard-2017.133.1.7svn33801-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483408" comment="texlive-chessfss-2017.133.1.2asvn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483409" comment="texlive-chet-2017.133.2.1svn38161-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483410" comment="texlive-chextras-2017.133.1.01svn27118-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483411" comment="texlive-chicago-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483412" comment="texlive-chicago-annote-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483413" comment="texlive-chickenize-2017.133.0.0.2.4svn42341-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483414" comment="texlive-childdoc-2017.133.1.5svn44512-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483415" comment="texlive-chivo-2017.133.1.0svn40931-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483416" comment="texlive-chivo-fonts-2017.133.1.0svn40931-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483417" comment="texlive-chkfloat-2017.133.0.0.1svn27473-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483418" comment="texlive-chktex-2017.133.1.7.6svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483420" comment="texlive-chletter-2017.133.2.0svn20060-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483421" comment="texlive-chngcntr-2017.133.1.0asvn17157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483422" comment="texlive-chronology-2017.133.1.1.1svn37934-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483423" comment="texlive-chronosys-2017.133.1.2svn26700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483424" comment="texlive-chscite-2017.133.2.9999svn28552-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483425" comment="texlive-churchslavonic-2017.133.0.0.2.1svn42751-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483426" comment="texlive-cinzel-2017.133.svn34408-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483427" comment="texlive-cinzel-fonts-2017.133.svn34408-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483428" comment="texlive-circ-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483429" comment="texlive-circuitikz-2017.133.0.0.8.3svn44488-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483430" comment="texlive-cite-2017.133.5.5svn36428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483431" comment="texlive-citeall-2017.133.1.2svn37103-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483432" comment="texlive-cje-2017.133.1.01svn44454-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483433" comment="texlive-cjhebrew-2017.133.0.0.2asvn43444-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483434" comment="texlive-cjhebrew-fonts-2017.133.0.0.2asvn43444-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483435" comment="texlive-cjk-2017.133.4.8.4svn36951-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483436" comment="texlive-cjk-gs-integrate-2017.133.20170505.0svn44207-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483438" comment="texlive-cjk-ko-2017.133.1.8svn40373-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483439" comment="texlive-cjkpunct-2017.133.4.8.4svn41119-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483440" comment="texlive-cjkutils-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483442" comment="texlive-classics-2017.133.0.0.1svn29018-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483443" comment="texlive-classicthesis-2017.133.4.2svn38304-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483444" comment="texlive-classpack-2017.133.0.0.77svn33101-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483445" comment="texlive-cleanthesis-2017.133.0.0.3.1svn38221-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483446" comment="texlive-clearsans-2017.133.svn34405-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483447" comment="texlive-clearsans-fonts-2017.133.svn34405-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483448" comment="texlive-clefval-2017.133.0svn16549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483449" comment="texlive-cleveref-2017.133.0.0.19svn32513-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483450" comment="texlive-clipboard-2017.133.0.0.2svn28876-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483451" comment="texlive-clock-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483452" comment="texlive-cloze-2017.133.1.2svn41531-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483453" comment="texlive-clrscode-2017.133.1.7svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483454" comment="texlive-clrscode3e-2017.133.svn34887-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483455" comment="texlive-cm-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483456" comment="texlive-cm-lgc-2017.133.0.0.5svn28250-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483457" comment="texlive-cm-lgc-fonts-2017.133.0.0.5svn28250-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483458" comment="texlive-cm-super-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483459" comment="texlive-cm-super-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483460" comment="texlive-cm-unicode-2017.133.0.0.7.0svn19445-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483461" comment="texlive-cm-unicode-fonts-2017.133.0.0.7.0svn19445-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483462" comment="texlive-cmap-2017.133.1.0hsvn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483463" comment="texlive-cmarrows-2017.133.0.0.9svn24378-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483464" comment="texlive-cmbright-2017.133.8.1svn21107-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483465" comment="texlive-cmcyr-2017.133.svn39273-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483466" comment="texlive-cmcyr-fonts-2017.133.svn39273-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483467" comment="texlive-cmdstring-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483468" comment="texlive-cmdtrack-2017.133.svn28910-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483469" comment="texlive-cmexb-2017.133.svn40785-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483470" comment="texlive-cmexb-fonts-2017.133.svn40785-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483471" comment="texlive-cmextra-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483472" comment="texlive-cmll-2017.133.svn17964-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483473" comment="texlive-cmll-fonts-2017.133.svn17964-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483474" comment="texlive-cmpica-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483475" comment="texlive-cmpj-2017.133.3.01svn44283-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483476" comment="texlive-cmsd-2017.133.svn18787-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483477" comment="texlive-cmtiup-2017.133.2.1svn39728-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483478" comment="texlive-cnbwp-2017.133.svn32550-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483479" comment="texlive-cnltx-2017.133.0.0.13svn38138-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483480" comment="texlive-cns-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483481" comment="texlive-cntformats-2017.133.0.0.7svn34668-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483482" comment="texlive-cntperchap-2017.133.0.0.3svn37572-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483483" comment="texlive-cochineal-2017.133.1.042svn43462-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483484" comment="texlive-cochineal-fonts-2017.133.1.042svn43462-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483485" comment="texlive-codedoc-2017.133.0.0.3svn17630-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483486" comment="texlive-codepage-2017.133.svn21126-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483487" comment="texlive-codesection-2017.133.0.0.1svn34481-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483488" comment="texlive-codicefiscaleitaliano-2017.133.1.2svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483489" comment="texlive-collcell-2017.133.0.0.5svn21539-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483490" comment="texlive-collectbox-2017.133.0.0.4bsvn26557-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483491" comment="texlive-collref-2017.133.2.0bsvn35084-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483492" comment="texlive-colordoc-2017.133.svn18270-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483493" comment="texlive-colorinfo-2017.133.0.0.3csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483494" comment="texlive-coloring-2017.133.0.0.2svn41042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483495" comment="texlive-colorsep-2017.133.svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483496" comment="texlive-colorspace-2017.133.1.2.0svn42228-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483497" comment="texlive-colortab-2017.133.1.0svn22155-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483498" comment="texlive-colortbl-2017.133.1.0asvn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483499" comment="texlive-colorwav-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483500" comment="texlive-colorweb-2017.133.1.3svn31490-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483501" comment="texlive-colourchange-2017.133.1.22svn21741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483502" comment="texlive-combelow-2017.133.0.0.99fsvn18462-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483503" comment="texlive-combine-2017.133.0.0.7asvn19361-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483504" comment="texlive-combinedgraphics-2017.133.0.0.2.2svn27198-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483505" comment="texlive-combofont-2017.133.0.0.1svn44491-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483506" comment="texlive-comfortaa-2017.133.2.3svn27536-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483507" comment="texlive-comfortaa-fonts-2017.133.2.3svn27536-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483508" comment="texlive-comicneue-2017.133.1.1svn42851-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483509" comment="texlive-comicneue-fonts-2017.133.1.1svn42851-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483510" comment="texlive-comma-2017.133.1.2svn18259-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483511" comment="texlive-commado-2017.133.r0.11asvn38875-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483512" comment="texlive-commath-2017.133.0.0.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483513" comment="texlive-comment-2017.133.3.8svn41927-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483514" comment="texlive-compactbib-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483515" comment="texlive-complexity-2017.133.0.0.76svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483516" comment="texlive-components-of-TeX-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483517" comment="texlive-comprehensive-2017.133.12.3svn43001-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483518" comment="texlive-computational-complexity-2017.133.2.25fsvn39903-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483519" comment="texlive-concepts-2017.133.0.0.0.5_r1svn29020-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483520" comment="texlive-concmath-2017.133.svn17219-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483521" comment="texlive-concmath-fonts-2017.133.svn17218-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483522" comment="texlive-concprog-2017.133.svn18791-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483523" comment="texlive-concrete-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483524" comment="texlive-confproc-2017.133.0.0.8svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483525" comment="texlive-constants-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483526" comment="texlive-conteq-2017.133.0.0.1.1svn37868-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483527" comment="texlive-context-2017.133.svn44436-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483528" comment="texlive-context-account-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483529" comment="texlive-context-algorithmic-2017.133.svn31026-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483530" comment="texlive-context-animation-2017.133.svn36188-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483531" comment="texlive-context-annotation-2017.133.svn36188-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483533" comment="texlive-context-bnf-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483534" comment="texlive-context-chromato-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483535" comment="texlive-context-cmscbf-2017.133.svn42327-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483536" comment="texlive-context-cmttbf-2017.133.svn42328-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483537" comment="texlive-context-construction-plan-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483538" comment="texlive-context-cyrillicnumbers-2017.133.svn29905-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483539" comment="texlive-context-degrade-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483540" comment="texlive-context-fancybreak-2017.133.svn36948-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483541" comment="texlive-context-filter-2017.133.svn42326-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483542" comment="texlive-context-fonts-2017.133.svn44436-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483543" comment="texlive-context-french-2017.133.svn24582-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483544" comment="texlive-context-fullpage-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483545" comment="texlive-context-gantt-2017.133.svn27472-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483546" comment="texlive-context-gnuplot-2017.133.svn30380-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483547" comment="texlive-context-inifile-2017.133.svn42329-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483548" comment="texlive-context-layout-2017.133.svn42330-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483549" comment="texlive-context-letter-2017.133.svn38202-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483550" comment="texlive-context-lettrine-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483551" comment="texlive-context-mathsets-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483552" comment="texlive-context-notes-zh-cn-2017.133.svn23171-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483553" comment="texlive-context-rst-2017.133.0.0.6csvn33092-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483554" comment="texlive-context-ruby-2017.133.svn28434-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483555" comment="texlive-context-simplefonts-2017.133.svn29229-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483556" comment="texlive-context-simpleslides-2017.133.svn34438-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483557" comment="texlive-context-title-2017.133.svn36189-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483558" comment="texlive-context-transliterator-2017.133.svn29801-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483559" comment="texlive-context-typearea-2017.133.svn23167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483560" comment="texlive-context-typescripts-2017.133.svn25411-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483561" comment="texlive-context-vim-2017.133.svn37413-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483562" comment="texlive-context-visualcounter-2017.133.svn36190-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483563" comment="texlive-continue-2017.133.0.0.1svn39308-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483564" comment="texlive-contour-2017.133.2.14svn18950-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483565" comment="texlive-contracard-2017.133.1.0.1svn31745-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483566" comment="texlive-conv-xkv-2017.133.svn43558-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483567" comment="texlive-convbkmk-2017.133.0.0.10asvn35923-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483569" comment="texlive-cooking-2017.133.0.0.9bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483570" comment="texlive-cooking-units-2017.133.1.10svn42507-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483571" comment="texlive-cookingsymbols-2017.133.1.1svn35929-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483572" comment="texlive-cool-2017.133.1.35svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483573" comment="texlive-coollist-2017.133.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483574" comment="texlive-coolstr-2017.133.2.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483575" comment="texlive-coolthms-2017.133.1.2svn29062-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483576" comment="texlive-cooltooltips-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483577" comment="texlive-coordsys-2017.133.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483578" comment="texlive-copyedit-2017.133.1.6svn37928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483579" comment="texlive-copyrightbox-2017.133.0.0.1svn24829-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483580" comment="texlive-cormorantgaramond-2017.133.3.00svn41865-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483581" comment="texlive-cormorantgaramond-fonts-2017.133.3.00svn41865-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483582" comment="texlive-correctmathalign-2017.133.1.1svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483583" comment="texlive-coseoul-2017.133.1.1svn23862-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483584" comment="texlive-countriesofeurope-2017.133.0.0.21svn26042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483585" comment="texlive-countriesofeurope-fonts-2017.133.0.0.21svn26042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483586" comment="texlive-counttexruns-2017.133.1.00asvn27576-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483587" comment="texlive-courier-2017.133.svn35058-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483588" comment="texlive-courier-fonts-2017.133.svn35058-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483589" comment="texlive-courier-scaled-2017.133.svn24940-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483590" comment="texlive-courseoutline-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483591" comment="texlive-coursepaper-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483592" comment="texlive-coverpage-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483593" comment="texlive-covington-2017.133.1.4svn44501-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483594" comment="texlive-cprotect-2017.133.1.0esvn21209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483595" comment="texlive-cquthesis-2017.133.1.20svn44476-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483596" comment="texlive-crbox-2017.133.0.0.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483597" comment="texlive-crimson-2017.133.svn43525-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483598" comment="texlive-crimson-fonts-2017.133.svn43525-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483599" comment="texlive-crop-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483600" comment="texlive-crossreference-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483601" comment="texlive-crossrefware-2017.133.2.1asvn43993-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483603" comment="texlive-crossword-2017.133.1.9svn32657-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483604" comment="texlive-crosswrd-2017.133.3.0svn16896-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483605" comment="texlive-cryptocode-2017.133.0.0.1svn37019-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483606" comment="texlive-cryst-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483607" comment="texlive-cryst-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483608" comment="texlive-cs-2017.133.svn41553-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483609" comment="texlive-cs-fonts-2017.133.svn41553-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483610" comment="texlive-csbulletin-2017.133.1.1svn43277-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483611" comment="texlive-cslatex-2017.133.svn40855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483613" comment="texlive-csplain-2017.133.svn44321-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483615" comment="texlive-csquotes-2017.133.5.2bsvn43469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483616" comment="texlive-csquotes-de-2017.133.1.01svn23371-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483617" comment="texlive-css-colors-2017.133.1.02svn43961-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483618" comment="texlive-cstex-2017.133.svn41301-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483619" comment="texlive-cstypo-2017.133.0.0.03svn41986-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483620" comment="texlive-csvsimple-2017.133.1.20svn41597-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483621" comment="texlive-ctable-2017.133.1.31svn38672-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483622" comment="texlive-ctablestack-2017.133.1.0svn38514-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483623" comment="texlive-ctan_chk-2017.133.1.0svn36304-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483624" comment="texlive-ctanify-2017.133.1.9.1svn44129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483626" comment="texlive-ctanupload-2017.133.1.2csvn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483628" comment="texlive-ctex-2017.133.2.4.9svn43669-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483629" comment="texlive-ctex-faq-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483630" comment="texlive-ctib-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483631" comment="texlive-ctie-2017.133.1.1svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483633" comment="texlive-cuisine-2017.133.0.0.7svn34453-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483634" comment="texlive-currency-2017.133.0.0.1svn44489-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483635" comment="texlive-currfile-2017.133.0.0.7csvn40725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483636" comment="texlive-currvita-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483637" comment="texlive-cursolatex-2017.133.svn24139-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483638" comment="texlive-curve-2017.133.1.16svn20745-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483639" comment="texlive-curve2e-2017.133.1.60svn37839-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483640" comment="texlive-curves-2017.133.1.53svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483641" comment="texlive-custom-bib-2017.133.4.33svn24729-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483642" comment="texlive-cutwin-2017.133.0.0.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483643" comment="texlive-cv-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483644" comment="texlive-cv4tw-2017.133.0.0.2svn34577-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483645" comment="texlive-cweb-2017.133.3.64bsvn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483647" comment="texlive-cweb-latex-2017.133.svn28878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483648" comment="texlive-cyber-2017.133.2.1svn37658-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483649" comment="texlive-cybercic-2017.133.2.1svn37659-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483650" comment="texlive-cyklop-2017.133.0.0.915svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483651" comment="texlive-cyklop-fonts-2017.133.0.0.915svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483652" comment="texlive-cyrillic-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483653" comment="texlive-cyrillic-bin-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483655" comment="texlive-cyrplain-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483656" comment="texlive-dad-2017.133.1.1svn35362-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483657" comment="texlive-dad-fonts-2017.133.1.1svn35362-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483658" comment="texlive-dancers-2017.133.svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483659" comment="texlive-dantelogo-2017.133.0.0.03svn38599-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483660" comment="texlive-dantelogo-fonts-2017.133.0.0.03svn38599-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483661" comment="texlive-dashbox-2017.133.1.14svn23425-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483662" comment="texlive-dashrule-2017.133.1.3svn29579-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483663" comment="texlive-dashundergaps-2017.133.1.2svn23373-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483664" comment="texlive-dataref-2017.133.0.0.6svn42883-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483665" comment="texlive-datatool-2017.133.2.27svn41772-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483666" comment="texlive-dateiliste-2017.133.0.0.6svn27974-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483667" comment="texlive-datenumber-2017.133.0.0.02svn18951-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483668" comment="texlive-datetime-2017.133.2.60svn36650-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483669" comment="texlive-datetime2-2017.133.1.5.2svn41686-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483670" comment="texlive-datetime2-bahasai-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483671" comment="texlive-datetime2-basque-2017.133.1.2svn38287-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483672" comment="texlive-datetime2-breton-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483673" comment="texlive-datetime2-bulgarian-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483674" comment="texlive-datetime2-catalan-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483675" comment="texlive-datetime2-croatian-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483676" comment="texlive-datetime2-czech-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483677" comment="texlive-datetime2-danish-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483678" comment="texlive-datetime2-dutch-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483679" comment="texlive-datetime2-en-fulltext-2017.133.1.0svn36705-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483680" comment="texlive-datetime2-english-2017.133.1.04svn39991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483681" comment="texlive-datetime2-esperanto-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483682" comment="texlive-datetime2-estonian-2017.133.1.0svn36682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483683" comment="texlive-datetime2-finnish-2017.133.1.1svn40237-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483684" comment="texlive-datetime2-french-2017.133.1.02svn43742-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483685" comment="texlive-datetime2-galician-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483686" comment="texlive-datetime2-german-2017.133.1.1svn43452-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483687" comment="texlive-datetime2-greek-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483688" comment="texlive-datetime2-hebrew-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483689" comment="texlive-datetime2-icelandic-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483690" comment="texlive-datetime2-irish-2017.133.1.0svn36635-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483691" comment="texlive-datetime2-it-fulltext-2017.133.1.6svn38093-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483692" comment="texlive-datetime2-italian-2017.133.1.3svn37146-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483693" comment="texlive-datetime2-latin-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483694" comment="texlive-datetime2-lsorbian-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483695" comment="texlive-datetime2-magyar-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483696" comment="texlive-datetime2-norsk-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483697" comment="texlive-datetime2-polish-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483698" comment="texlive-datetime2-portuges-2017.133.1.0svn36670-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483699" comment="texlive-datetime2-romanian-2017.133.1.01svn43743-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483700" comment="texlive-datetime2-russian-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483701" comment="texlive-datetime2-samin-2017.133.1.0svn36692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483702" comment="texlive-datetime2-scottish-2017.133.1.0svn36625-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483703" comment="texlive-datetime2-serbian-2017.133.1.0svn36699-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483704" comment="texlive-datetime2-slovak-2017.133.1.0svn36700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483705" comment="texlive-datetime2-slovene-2017.133.1.0svn36700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483706" comment="texlive-datetime2-spanish-2017.133.1.0svn36661-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483707" comment="texlive-datetime2-swedish-2017.133.1.0svn36700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483708" comment="texlive-datetime2-turkish-2017.133.1.0svn36700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483709" comment="texlive-datetime2-ukrainian-2017.133.1.1svn44562-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483710" comment="texlive-datetime2-usorbian-2017.133.1.0svn36700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483711" comment="texlive-datetime2-welsh-2017.133.1.0svn36636-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483712" comment="texlive-dblfloatfix-2017.133.1.0asvn28983-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483713" comment="texlive-dccpaper-2017.133.1.5svn41804-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483714" comment="texlive-dcpic-2017.133.5.0.0svn30206-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483715" comment="texlive-de-macro-2017.133.1.3svn26355-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483717" comment="texlive-decimal-2017.133.svn23374-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483718" comment="texlive-decorule-2017.133.0.0.6svn23487-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483719" comment="texlive-dehyph-exptl-2017.133.0.0.41svn43666-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483720" comment="texlive-dejavu-2017.133.2.34svn31771-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483721" comment="texlive-dejavu-fonts-2017.133.2.34svn31771-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483722" comment="texlive-delim-2017.133.1.0svn23974-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483723" comment="texlive-delimseasy-2017.133.2.0svn39589-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483724" comment="texlive-delimset-2017.133.1.0svn42415-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483725" comment="texlive-delimtxt-2017.133.svn16549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483726" comment="texlive-denisbdoc-2017.133.0.0.7svn42829-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483727" comment="texlive-detex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483729" comment="texlive-dhua-2017.133.0.0.11svn24035-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483730" comment="texlive-diadia-2017.133.1.1svn37656-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483732" comment="texlive-diagbox-2017.133.2.2svn42843-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483733" comment="texlive-diagmac2-2017.133.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483734" comment="texlive-diagnose-2017.133.0.0.2svn19387-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483735" comment="texlive-dialogl-2017.133.svn28946-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483736" comment="texlive-dice-2017.133.svn28501-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483737" comment="texlive-dichokey-2017.133.svn17192-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483738" comment="texlive-dickimaw-2017.133.svn32925-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483739" comment="texlive-dictsym-2017.133.svn20031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483740" comment="texlive-dictsym-fonts-2017.133.svn20031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483741" comment="texlive-diffcoeff-2017.133.1.0svn41554-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483742" comment="texlive-digiconfigs-2017.133.0.0.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483743" comment="texlive-din1505-2017.133.svn19441-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483744" comment="texlive-dinat-2017.133.2.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483745" comment="texlive-dinbrief-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483746" comment="texlive-dingbat-2017.133.1.0svn27918-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483747" comment="texlive-directory-2017.133.1.20svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483748" comment="texlive-dirtree-2017.133.0.0.32svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483749" comment="texlive-dirtytalk-2017.133.1.0svn20520-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483750" comment="texlive-disser-2017.133.1.5.0svn43417-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483751" comment="texlive-dithesis-2017.133.0.0.2svn34295-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483752" comment="texlive-dk-bib-2017.133.0.0.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483753" comment="texlive-dlfltxb-2017.133.svn17337-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483754" comment="texlive-dnaseq-2017.133.0.0.01svn17194-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483755" comment="texlive-dnp-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483756" comment="texlive-doc-pictex-2017.133.svn24927-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483757" comment="texlive-docbytex-2017.133.svn34294-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483758" comment="texlive-doclicense-2017.133.1.5.0svn40723-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483759" comment="texlive-docmfp-2017.133.1.2dsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483760" comment="texlive-docmute-2017.133.1.4svn25741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483761" comment="texlive-docsurvey-2017.133.svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483762" comment="texlive-doctools-2017.133.0.0.1svn34474-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483763" comment="texlive-documentation-2017.133.0.0.1svn34521-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483764" comment="texlive-doi-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483765" comment="texlive-doipubmed-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483766" comment="texlive-dosepsbin-2017.133.1.2svn29752-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483768" comment="texlive-dot2texi-2017.133.3.0svn26237-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483769" comment="texlive-dotarrow-2017.133.0.0.01asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483770" comment="texlive-dotseqn-2017.133.1.1svn17195-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483771" comment="texlive-dottex-2017.133.0.0.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483772" comment="texlive-doublestroke-2017.133.1.111svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483773" comment="texlive-doublestroke-fonts-2017.133.1.111svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483774" comment="texlive-dowith-2017.133.r0.32svn38860-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483775" comment="texlive-download-2017.133.1.1svn30695-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483776" comment="texlive-dox-2017.133.2.3svn43060-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483777" comment="texlive-dozenal-2017.133.7.0svn42608-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483778" comment="texlive-dozenal-fonts-2017.133.7.0svn42608-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483779" comment="texlive-dpfloat-2017.133.svn17196-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483780" comment="texlive-dprogress-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483781" comment="texlive-drac-2017.133.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483782" comment="texlive-draftcopy-2017.133.2.16svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483783" comment="texlive-draftfigure-2017.133.0.0.1svn44269-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483784" comment="texlive-draftwatermark-2017.133.1.2svn37498-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483785" comment="texlive-dramatist-2017.133.1.2esvn35866-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483786" comment="texlive-dratex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483787" comment="texlive-drawmatrix-2017.133.1.5.0svn44471-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483788" comment="texlive-drawstack-2017.133.svn28582-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483789" comment="texlive-drm-2017.133.4.4svn38157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483790" comment="texlive-drm-fonts-2017.133.4.4svn38157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483791" comment="texlive-droid-2017.133.2.1svn23912-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483792" comment="texlive-droid-fonts-2017.133.2.1svn23912-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483793" comment="texlive-droit-fr-2017.133.1.2svn39802-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483794" comment="texlive-drs-2017.133.1.1bsvn19232-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483795" comment="texlive-drv-2017.133.0.0.97svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483796" comment="texlive-dsptricks-2017.133.1.0svn34724-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483797" comment="texlive-dtk-2017.133.2.07asvn44524-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483798" comment="texlive-dtl-2017.133.0.0.6.1svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483800" comment="texlive-dtxdescribe-2017.133.0.0.10svn42661-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483801" comment="texlive-dtxgallery-2017.133.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483802" comment="texlive-dtxgen-2017.133.1.07svn38419-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483804" comment="texlive-dtxtut-2017.133.2.1svn38375-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483805" comment="texlive-duerer-2017.133.svn20741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483806" comment="texlive-duerer-latex-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483807" comment="texlive-duotenzor-2017.133.1.00svn18728-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483808" comment="texlive-dutchcal-2017.133.1.0svn23448-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483809" comment="texlive-dutchcal-fonts-2017.133.1.0svn23448-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483810" comment="texlive-dvdcoll-2017.133.1.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483811" comment="texlive-dvgloss-2017.133.0.0.1svn29103-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483812" comment="texlive-dviasm-2017.133.svn36814-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483814" comment="texlive-dvicopy-2017.133.1.5svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483816" comment="texlive-dvidvi-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483818" comment="texlive-dviincl-2017.133.1.00svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483819" comment="texlive-dviinfox-2017.133.1.04svn44515-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483821" comment="texlive-dviljk-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483823" comment="texlive-dvipdfmx-2017.133.svn44224-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483825" comment="texlive-dvipng-2017.133.1.15svn44167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483827" comment="texlive-dvipos-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483829" comment="texlive-dvips-2017.133.svn44167-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483831" comment="texlive-dvipsconfig-2017.133.1.6svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483832" comment="texlive-dvisvgm-2017.133.2.1.3svn40768-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483834" comment="texlive-dynamicnumber-2017.133.0.0.1.3svn38726-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483835" comment="texlive-dynblocks-2017.133.0.0.2bsvn35193-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483836" comment="texlive-dyntree-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483837" comment="texlive-e-french-2017.133.6.0svn38742-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483838" comment="texlive-ean-2017.133.svn20851-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483839" comment="texlive-ean13isbn-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483840" comment="texlive-easy-2017.133.0.0.99svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483841" comment="texlive-easy-todo-2017.133.svn32677-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483842" comment="texlive-easyfig-2017.133.1.2svn26424-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483843" comment="texlive-easyformat-2017.133.1.4.0svn44543-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483844" comment="texlive-easylist-2017.133.1.3svn32661-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483845" comment="texlive-easyreview-2017.133.1.0svn38352-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483846" comment="texlive-ebezier-2017.133.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483847" comment="texlive-ebgaramond-2017.133.0.0.16svn35662-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483848" comment="texlive-ebgaramond-fonts-2017.133.0.0.16svn35662-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483849" comment="texlive-ebgaramond-maths-2017.133.1.1svn35701-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483850" comment="texlive-ebong-2017.133.svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483852" comment="texlive-ebook-2017.133.svn29466-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483853" comment="texlive-ebproof-2017.133.2.0svn44392-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483854" comment="texlive-ebsthesis-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483855" comment="texlive-ec-2017.133.1.0svn25033-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483856" comment="texlive-ecc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483857" comment="texlive-ecclesiastic-2017.133.0.0.3svn38172-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483858" comment="texlive-ecgdraw-2017.133.0.0.1svn41617-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483859" comment="texlive-ecltree-2017.133.1.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483860" comment="texlive-eco-2017.133.1.3svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483861" comment="texlive-ecobiblatex-2017.133.1.0svn39233-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483862" comment="texlive-econometrics-2017.133.1.0svn39396-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483863" comment="texlive-economic-2017.133.svn32639-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483864" comment="texlive-ecv-2017.133.0.0.3svn24928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483865" comment="texlive-ed-2017.133.1.8svn25231-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483866" comment="texlive-edfnotes-2017.133.0.0.6bsvn21540-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483867" comment="texlive-edmac-2017.133.3.17svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483868" comment="texlive-edmargin-2017.133.1.2svn27599-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483869" comment="texlive-ednotes-2017.133.1.3asvn35829-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483870" comment="texlive-eemeir-2017.133.1.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483871" comment="texlive-eepic-2017.133.1.1esvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483872" comment="texlive-efbox-2017.133.1.0svn33236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483873" comment="texlive-egameps-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483874" comment="texlive-egplot-2017.133.1.02asvn20617-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483875" comment="texlive-eiad-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483876" comment="texlive-eiad-ltx-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483877" comment="texlive-eijkhout-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483878" comment="texlive-einfuehrung-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483879" comment="texlive-einfuehrung2-2017.133.svn39153-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483880" comment="texlive-ejpecp-2017.133.1.5svn42003-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483881" comment="texlive-ekaia-2017.133.1.04svn42578-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483882" comment="texlive-elbioimp-2017.133.1.2svn21758-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483883" comment="texlive-electrum-2017.133.1.005_bsvn19705-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483884" comment="texlive-electrum-fonts-2017.133.1.005_bsvn19705-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483885" comment="texlive-eledform-2017.133.1.1asvn38114-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483886" comment="texlive-eledmac-2017.133.1.24.11svn38639-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483887" comment="texlive-elements-2017.133.0.0.2svn41161-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483888" comment="texlive-ellipse-2017.133.1.0svn39025-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483889" comment="texlive-ellipsis-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483890" comment="texlive-elmath-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483891" comment="texlive-elocalloc-2017.133.0.0.03svn42712-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483892" comment="texlive-elpres-2017.133.0.0.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483893" comment="texlive-elsarticle-2017.133.1.20svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483894" comment="texlive-elteikthesis-2017.133.1.2svn22513-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483895" comment="texlive-eltex-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483896" comment="texlive-elvish-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483897" comment="texlive-elzcards-2017.133.1.20svn37063-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483898" comment="texlive-emarks-2017.133.1.0svn24504-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483899" comment="texlive-embedall-2017.133.1.0svn31903-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483900" comment="texlive-embrac-2017.133.0.0.6dsvn39334-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483901" comment="texlive-emf-2017.133.1svn42023-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483902" comment="texlive-emisa-2017.133.2.1.1svn41731-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483903" comment="texlive-emp-2017.133.svn23483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483904" comment="texlive-emptypage-2017.133.1.2svn18064-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483905" comment="texlive-emulateapj-2017.133.svn28469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483906" comment="texlive-enctex-2017.133.svn34957-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483907" comment="texlive-encxvlna-2017.133.1.1svn34087-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483908" comment="texlive-endfloat-2017.133.2.5dsvn24962-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483909" comment="texlive-endheads-2017.133.1.6svn43750-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483910" comment="texlive-endiagram-2017.133.0.0.1dsvn34486-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483911" comment="texlive-endnotes-2017.133.svn17197-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483912" comment="texlive-engpron-2017.133.2svn16558-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483913" comment="texlive-engrec-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483914" comment="texlive-engtlc-2017.133.3.2svn28571-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483915" comment="texlive-enigma-2017.133.0.0.1svn29802-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483916" comment="texlive-enotez-2017.133.0.0.9asvn44024-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483917" comment="texlive-enumitem-2017.133.3.5.2svn24146-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483918" comment="texlive-enumitem-zref-2017.133.1.8svn21472-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483919" comment="texlive-envbig-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483920" comment="texlive-environ-2017.133.0.0.3svn33821-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483921" comment="texlive-envlab-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483922" comment="texlive-epigrafica-2017.133.1.01svn17210-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483923" comment="texlive-epigrafica-fonts-2017.133.1.01svn17210-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483924" comment="texlive-epigram-2017.133.svn20513-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483925" comment="texlive-epigraph-2017.133.1.5csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483926" comment="texlive-epiolmec-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483927" comment="texlive-epiolmec-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483928" comment="texlive-eplain-2017.133.3.8svn41154-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483930" comment="texlive-epsdice-2017.133.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483931" comment="texlive-epsf-2017.133.2.7.4svn21461-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483932" comment="texlive-epsf-dvipdfmx-2017.133.2014svn35575-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483933" comment="texlive-epsincl-2017.133.0.0.2svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483934" comment="texlive-epslatex-fr-2017.133.svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483935" comment="texlive-epspdf-2017.133.0.0.6.3svn40917-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483937" comment="texlive-epspdfconversion-2017.133.0.0.61svn18703-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483938" comment="texlive-epstopdf-2017.133.2.26svn42905-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483940" comment="texlive-eqell-2017.133.svn22931-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483941" comment="texlive-eqlist-2017.133.2.1svn32257-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483942" comment="texlive-eqnalign-2017.133.1.0asvn43278-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483943" comment="texlive-eqname-2017.133.svn20678-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483944" comment="texlive-eqnarray-2017.133.1.3svn20641-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483945" comment="texlive-eqparbox-2017.133.4.0svn29419-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483946" comment="texlive-erdc-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483947" comment="texlive-erewhon-2017.133.1.08svn43506-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483948" comment="texlive-erewhon-fonts-2017.133.1.08svn43506-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483949" comment="texlive-errata-2017.133.0.0.3svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483950" comment="texlive-es-tex-faq-2017.133.1.97svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483951" comment="texlive-esami-2017.133.2.1svn41774-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483952" comment="texlive-esdiff-2017.133.1.2svn21385-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483953" comment="texlive-esint-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483954" comment="texlive-esint-type1-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483955" comment="texlive-esint-type1-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483956" comment="texlive-esk-2017.133.1.0svn18115-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483957" comment="texlive-eskd-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483958" comment="texlive-eskdx-2017.133.0.0.98svn29235-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483959" comment="texlive-eso-pic-2017.133.2.0gsvn37925-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483960" comment="texlive-esrelation-2017.133.svn37236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483961" comment="texlive-esrelation-fonts-2017.133.svn37236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483962" comment="texlive-esstix-2017.133.1.0svn22426-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483963" comment="texlive-esstix-fonts-2017.133.1.0svn22426-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483964" comment="texlive-estcpmm-2017.133.0.0.4svn17335-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483965" comment="texlive-esvect-2017.133.1.3svn32098-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483966" comment="texlive-esvect-fonts-2017.133.1.3svn32098-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483967" comment="texlive-etaremune-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483968" comment="texlive-etdipa-2017.133.2.6svn36354-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483969" comment="texlive-etex-2017.133.svn37057-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483970" comment="texlive-etex-pkg-2017.133.2.7svn41784-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483971" comment="texlive-etextools-2017.133.3.1415926svn20694-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483972" comment="texlive-ethiop-2017.133.0.0.7svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483973" comment="texlive-ethiop-t1-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483974" comment="texlive-ethiop-t1-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483975" comment="texlive-etoc-2017.133.1.08isvn42182-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483976" comment="texlive-etoolbox-2017.133.2.4svn42855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483977" comment="texlive-etoolbox-de-2017.133.1svn21906-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483978" comment="texlive-euenc-2017.133.0.0.1hsvn19795-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483979" comment="texlive-eukdate-2017.133.1.04svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483980" comment="texlive-euler-2017.133.2.5svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483981" comment="texlive-eulerpx-2017.133.0.0.2.1svn43735-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483982" comment="texlive-eulervm-2017.133.4.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483983" comment="texlive-euro-2017.133.1.1svn22191-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483984" comment="texlive-euro-ce-2017.133.3.0bsvn25714-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483985" comment="texlive-europasscv-2017.133.svn43033-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483986" comment="texlive-europecv-2017.133.svn34454-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483987" comment="texlive-eurosym-2017.133.1.4_subrfixsvn17265-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483988" comment="texlive-eurosym-fonts-2017.133.1.4_subrfixsvn17265-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483989" comment="texlive-euxm-2017.133.svn20202-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483990" comment="texlive-everyhook-2017.133.1.2svn35675-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483991" comment="texlive-everypage-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483992" comment="texlive-exam-2017.133.2.5svn37279-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483993" comment="texlive-exam-n-2017.133.1.1.4svn42755-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483994" comment="texlive-examdesign-2017.133.1.101svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483995" comment="texlive-example-2017.133.svn33398-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483996" comment="texlive-examplep-2017.133.0.0.04svn16916-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483997" comment="texlive-exceltex-2017.133.0.0.5.1svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009483999" comment="texlive-excludeonly-2017.133.1.0svn17262-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484000" comment="texlive-exercise-2017.133.1.6svn35417-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484001" comment="texlive-exercises-2017.133.1.0svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484002" comment="texlive-exp-testopt-2017.133.0.0.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484003" comment="texlive-expdlist-2017.133.2.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484004" comment="texlive-expex-2017.133.5.1bsvn44499-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484005" comment="texlive-export-2017.133.1.8svn27206-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484006" comment="texlive-expressg-2017.133.1.5svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484007" comment="texlive-exsheets-2017.133.0.0.21isvn43188-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484008" comment="texlive-exsol-2017.133.1.2svn41377-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484009" comment="texlive-extarrows-2017.133.1.0bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484010" comment="texlive-exteps-2017.133.0.0.41svn19859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484011" comment="texlive-extpfeil-2017.133.0.0.4svn16243-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484012" comment="texlive-extract-2017.133.1.8svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484013" comment="texlive-extsizes-2017.133.1.4asvn17263-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484014" comment="texlive-facsimile-2017.133.1.0svn21328-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484015" comment="texlive-factura-2017.133.3.00svn43470-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484016" comment="texlive-facture-2017.133.1.2.2svn43865-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484017" comment="texlive-faktor-2017.133.0.0.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484018" comment="texlive-fancybox-2017.133.1.4svn18304-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484019" comment="texlive-fancyhdr-2017.133.3.9svn44479-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484020" comment="texlive-fancyhdr-it-2017.133.svn21912-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484021" comment="texlive-fancylabel-2017.133.1.0svn34684-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484022" comment="texlive-fancynum-2017.133.0.0.92svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484023" comment="texlive-fancypar-2017.133.1.1svn18018-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484024" comment="texlive-fancyref-2017.133.0.0.9csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484025" comment="texlive-fancyslides-2017.133.1.0svn36263-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484026" comment="texlive-fancytabs-2017.133.1.9svn41549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484027" comment="texlive-fancytooltips-2017.133.1.8svn27129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484028" comment="texlive-fancyvrb-2017.133.2.8svn18492-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484029" comment="texlive-fandol-2017.133.0.0.3svn37889-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484030" comment="texlive-fandol-fonts-2017.133.0.0.3svn37889-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484031" comment="texlive-fast-diagram-2017.133.1.1svn29264-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484032" comment="texlive-fbb-2017.133.1.12svn43464-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484033" comment="texlive-fbb-fonts-2017.133.1.12svn43464-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484034" comment="texlive-fbithesis-2017.133.1.2msvn21340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484035" comment="texlive-fbs-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484036" comment="texlive-fc-2017.133.1.4svn32796-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484037" comment="texlive-fcavtex-2017.133.1.1svn38074-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484038" comment="texlive-fcltxdoc-2017.133.1.0svn24500-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484039" comment="texlive-fcolumn-2017.133.1.1.1svn38489-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484040" comment="texlive-fdsymbol-2017.133.0.0.8svn26722-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484041" comment="texlive-fdsymbol-fonts-2017.133.0.0.8svn26722-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484042" comment="texlive-featpost-2017.133.0.0.8.8svn35346-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484043" comment="texlive-fei-2017.133.3.0.6svn43630-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484044" comment="texlive-fenixpar-2017.133.0.0.92svn24730-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484045" comment="texlive-fetamont-2017.133.svn43812-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484046" comment="texlive-fetamont-fonts-2017.133.svn43812-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484047" comment="texlive-feupphdteses-2017.133.4.0svn30962-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484048" comment="texlive-feyn-2017.133.0.0.3.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484049" comment="texlive-feynmf-2017.133.1.08svn17259-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484050" comment="texlive-feynmp-auto-2017.133.1.1svn30223-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484051" comment="texlive-ffslides-2017.133.svn38895-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484052" comment="texlive-fge-2017.133.1.25svn37628-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484053" comment="texlive-fge-fonts-2017.133.1.25svn37628-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484054" comment="texlive-fgruler-2017.133.1.0svn42966-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484055" comment="texlive-fibeamer-2017.133.1.1.7svn44239-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484056" comment="texlive-fifinddo-info-2017.133.1.1bsvn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484057" comment="texlive-fifo-stack-2017.133.1.0svn33288-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484058" comment="texlive-fig4latex-2017.133.0.0.2svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484060" comment="texlive-figbas-2017.133.1.0.3svn28943-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484061" comment="texlive-figbas-fonts-2017.133.1.0.3svn28943-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484062" comment="texlive-figbib-2017.133.svn19388-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484063" comment="texlive-figflow-2017.133.svn21462-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484064" comment="texlive-figsize-2017.133.0.0.1svn18784-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484065" comment="texlive-filecontents-2017.133.1.3svn24250-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484066" comment="texlive-filecontentsdef-2017.133.1.2svn42107-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484067" comment="texlive-filedate-2017.133.svn29529-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484068" comment="texlive-filehook-2017.133.0.0.5dsvn24280-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484069" comment="texlive-fileinfo-2017.133.0.0.81asvn28421-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484070" comment="texlive-filemod-2017.133.1.2svn24042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484071" comment="texlive-finbib-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484072" comment="texlive-findhyph-2017.133.3.4svn38674-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484074" comment="texlive-fink-2017.133.2.2.1svn24329-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484075" comment="texlive-finstrut-2017.133.0.0.5svn21719-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484076" comment="texlive-fira-2017.133.4.2svn42501-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484077" comment="texlive-fira-fonts-2017.133.4.2svn42501-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484078" comment="texlive-first-latex-doc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484079" comment="texlive-fitbox-2017.133.1.00svn38139-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484080" comment="texlive-fithesis-2017.133.0.0.3.46svn44472-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484081" comment="texlive-fix2col-2017.133.0.0.04svn38770-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484082" comment="texlive-fixcmex-2017.133.1.0svn38816-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484083" comment="texlive-fixfoot-2017.133.0.0.3asvn17131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484084" comment="texlive-fixlatvian-2017.133.1asvn21631-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484085" comment="texlive-fixltxhyph-2017.133.0.0.4svn25832-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484086" comment="texlive-fixme-2017.133.4.4svn43413-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484087" comment="texlive-fixmetodonotes-2017.133.0.0.2.2svn30168-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484088" comment="texlive-fixpdfmag-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484089" comment="texlive-fjodor-2017.133.svn20220-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484090" comment="texlive-flabels-2017.133.1.0svn17272-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484091" comment="texlive-flacards-2017.133.0.0.1.1bsvn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484092" comment="texlive-flagderiv-2017.133.0.0.10svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484093" comment="texlive-flashcards-2017.133.1.0.1svn19667-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484094" comment="texlive-flashmovie-2017.133.0.0.4svn25768-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484095" comment="texlive-flipbook-2017.133.0.0.2svn25584-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484096" comment="texlive-flippdf-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484097" comment="texlive-float-2017.133.1.3dsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484098" comment="texlive-floatrow-2017.133.0.0.3bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484099" comment="texlive-flowchart-2017.133.3.3svn36572-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484100" comment="texlive-flowfram-2017.133.1.17svn35291-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484101" comment="texlive-fltpoint-2017.133.1.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484102" comment="texlive-fmp-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484103" comment="texlive-fmtcount-2017.133.3.01svn37298-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484104" comment="texlive-fn2end-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484105" comment="texlive-fnbreak-2017.133.1.30svn25003-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484106" comment="texlive-fncychap-2017.133.1.34svn20710-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484107" comment="texlive-fncylab-2017.133.1.0svn17382-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484108" comment="texlive-fnpara-2017.133.svn25607-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484109" comment="texlive-fnpct-2017.133.0.0.4esvn40535-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484110" comment="texlive-fnspe-2017.133.1.1bsvn43380-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484111" comment="texlive-fntproof-2017.133.svn20638-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484112" comment="texlive-fnumprint-2017.133.1.1asvn29173-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484113" comment="texlive-foekfont-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484114" comment="texlive-foekfont-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484115" comment="texlive-foilhtml-2017.133.1.2svn21855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484116" comment="texlive-fonetika-2017.133.svn21326-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484117" comment="texlive-fonetika-fonts-2017.133.svn21326-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484118" comment="texlive-font-change-2017.133.2015.2svn40403-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484119" comment="texlive-font-change-xetex-2017.133.2016.1svn40404-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484120" comment="texlive-fontawesome-2017.133.4.6.3.2svn41412-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484121" comment="texlive-fontawesome-fonts-2017.133.4.6.3.2svn41412-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484122" comment="texlive-fontaxes-2017.133.1.0dsvn33276-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484123" comment="texlive-fontbook-2017.133.0.0.2svn23608-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484124" comment="texlive-fontch-2017.133.2.2svn17859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484125" comment="texlive-fontinst-2017.133.1.933svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484127" comment="texlive-fontmfizz-2017.133.svn43546-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484128" comment="texlive-fontmfizz-fonts-2017.133.svn43546-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484129" comment="texlive-fontname-2017.133.svn38345-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484130" comment="texlive-fontools-2017.133.svn43573-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484132" comment="texlive-fonts-churchslavonic-2017.133.1.1svn43121-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484133" comment="texlive-fonts-churchslavonic-fonts-2017.133.1.1svn43121-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484134" comment="texlive-fonts-tlwg-2017.133.0.0.6.3svn41366-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484135" comment="texlive-fonts-tlwg-fonts-2017.133.0.0.6.3svn41366-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484136" comment="texlive-fontspec-2017.133.2.6asvn43661-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484137" comment="texlive-fonttable-2017.133.1.6bsvn21399-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484138" comment="texlive-fontware-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484140" comment="texlive-fontwrap-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484141" comment="texlive-footbib-2017.133.2.0.7svn17115-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484142" comment="texlive-footmisc-2017.133.5.5bsvn23330-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484143" comment="texlive-footmisx-2017.133.20161201svn42621-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484144" comment="texlive-footnotebackref-2017.133.1.0svn27034-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484145" comment="texlive-footnotehyper-2017.133.1.0svn43424-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484146" comment="texlive-footnoterange-2017.133.1.0asvn25430-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484147" comment="texlive-footnpag-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484148" comment="texlive-forarray-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484149" comment="texlive-foreign-2017.133.2.7svn27819-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484150" comment="texlive-forest-2017.133.2.1.4svn43129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484151" comment="texlive-forest-quickstart-2017.133.svn42503-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484152" comment="texlive-forloop-2017.133.3.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484153" comment="texlive-formation-latex-ul-2017.133.2016.11_3svn43005-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484154" comment="texlive-formlett-2017.133.2.3svn21480-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484155" comment="texlive-formular-2017.133.1.0asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484156" comment="texlive-fouridx-2017.133.2.00svn32214-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484157" comment="texlive-fourier-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484158" comment="texlive-fourier-fonts-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484159" comment="texlive-fouriernc-2017.133.svn29646-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484160" comment="texlive-fp-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484161" comment="texlive-fpl-2017.133.1.002svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484162" comment="texlive-fpl-fonts-2017.133.1.002svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484163" comment="texlive-fragmaster-2017.133.1.6svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484165" comment="texlive-fragments-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484166" comment="texlive-frame-2017.133.1.0svn18312-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484167" comment="texlive-framed-2017.133.0.0.96svn26789-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484168" comment="texlive-francais-bst-2017.133.1.1svn38922-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484169" comment="texlive-frankenstein-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484170" comment="texlive-frcursive-2017.133.svn24559-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484171" comment="texlive-frcursive-fonts-2017.133.svn24559-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484172" comment="texlive-frederika2016-2017.133.1.000_2016_initial_releasesvn42157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484173" comment="texlive-frederika2016-fonts-2017.133.1.000_2016_initial_releasesvn42157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484174" comment="texlive-frege-2017.133.1.3svn27417-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484175" comment="texlive-frletter-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484176" comment="texlive-frontespizio-2017.133.1.4asvn24054-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484177" comment="texlive-ftcap-2017.133.1.4svn17275-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484178" comment="texlive-ftnxtra-2017.133.0.0.1svn29652-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484179" comment="texlive-fullblck-2017.133.1.03svn25434-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484180" comment="texlive-fullminipage-2017.133.0.0.1.1svn34545-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484181" comment="texlive-fullwidth-2017.133.0.0.1svn24684-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484182" comment="texlive-functan-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484183" comment="texlive-fundus-calligra-2017.133.1.2svn26018-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484184" comment="texlive-fundus-cyr-2017.133.svn26019-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484185" comment="texlive-fundus-sueterlin-2017.133.1.2svn26030-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484186" comment="texlive-fvextra-2017.133.1.2.1svn41984-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484187" comment="texlive-fwlw-2017.133.svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484188" comment="texlive-g-brief-2017.133.4.0.2svn21140-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484189" comment="texlive-gaceta-2017.133.1.06svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484190" comment="texlive-galois-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484191" comment="texlive-gamebook-2017.133.1.0svn24714-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484192" comment="texlive-garrigues-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484193" comment="texlive-garuda-c90-2017.133.svn37677-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484194" comment="texlive-gastex-2017.133.2.8svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484195" comment="texlive-gatech-thesis-2017.133.1.8svn19886-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484196" comment="texlive-gates-2017.133.0.0.2svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484197" comment="texlive-gauss-2017.133.svn32934-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484198" comment="texlive-gb4e-2017.133.svn19216-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484199" comment="texlive-gcard-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484200" comment="texlive-gchords-2017.133.1.20svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484201" comment="texlive-gcite-2017.133.1.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484202" comment="texlive-gender-2017.133.1.0svn36464-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484203" comment="texlive-gene-logic-2017.133.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484204" comment="texlive-genealogy-2017.133.svn25112-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484205" comment="texlive-genealogytree-2017.133.1.10svn43086-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484206" comment="texlive-genmisc-2017.133.svn27208-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484207" comment="texlive-genmpage-2017.133.0.0.3.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484208" comment="texlive-gentium-tug-2017.133.1.1svn37378-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484209" comment="texlive-gentium-tug-fonts-2017.133.1.1svn37378-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484210" comment="texlive-gentle-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484211" comment="texlive-geometry-2017.133.5.6svn19716-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484212" comment="texlive-geometry-de-2017.133.1.1svn21882-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484213" comment="texlive-german-2017.133.2.5esvn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484214" comment="texlive-germbib-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484215" comment="texlive-germkorr-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484216" comment="texlive-geschichtsfrkl-2017.133.1.4svn42121-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484217" comment="texlive-getfiledate-2017.133.1.2svn16189-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484218" comment="texlive-getitems-2017.133.1.0svn39365-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484219" comment="texlive-getmap-2017.133.1.9svn41503-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484221" comment="texlive-getoptk-2017.133.1.0svn23567-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484222" comment="texlive-gfnotation-2017.133.2.9svn37156-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484223" comment="texlive-gfsartemisia-2017.133.1.0svn19469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484224" comment="texlive-gfsartemisia-fonts-2017.133.1.0svn19469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484225" comment="texlive-gfsbaskerville-2017.133.1.0svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484226" comment="texlive-gfsbaskerville-fonts-2017.133.1.0svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484227" comment="texlive-gfsbodoni-2017.133.1.01svn28484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484228" comment="texlive-gfsbodoni-fonts-2017.133.1.01svn28484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484229" comment="texlive-gfscomplutum-2017.133.1.0svn19469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484230" comment="texlive-gfscomplutum-fonts-2017.133.1.0svn19469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484231" comment="texlive-gfsdidot-2017.133.svn31978-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484232" comment="texlive-gfsdidot-fonts-2017.133.svn31978-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484233" comment="texlive-gfsneohellenic-2017.133.svn31979-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484234" comment="texlive-gfsneohellenic-fonts-2017.133.svn31979-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484235" comment="texlive-gfsporson-2017.133.1.01svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484236" comment="texlive-gfsporson-fonts-2017.133.1.01svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484237" comment="texlive-gfssolomos-2017.133.1.0svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484238" comment="texlive-gfssolomos-fonts-2017.133.1.0svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484239" comment="texlive-ghab-2017.133.0.0.5svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484240" comment="texlive-ghsystem-2017.133.4.8svn41714-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484241" comment="texlive-gillcm-2017.133.1.1svn19878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484242" comment="texlive-gillius-2017.133.svn32068-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484243" comment="texlive-gillius-fonts-2017.133.svn32068-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484244" comment="texlive-gincltex-2017.133.0.0.3svn23835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484245" comment="texlive-ginpenc-2017.133.1.0svn24980-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484246" comment="texlive-gitfile-info-2017.133.0.0.3svn41693-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484247" comment="texlive-gitinfo-2017.133.1.0svn34049-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484248" comment="texlive-gitinfo2-2017.133.2.0.7svn38913-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484249" comment="texlive-gitlog-2017.133.0.0.0.betasvn38932-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484250" comment="texlive-gloss-2017.133.1.5.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484251" comment="texlive-gloss-occitan-2017.133.0.0.1svn39609-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484252" comment="texlive-glossaries-2017.133.4.30svn44564-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484254" comment="texlive-glossaries-danish-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484255" comment="texlive-glossaries-dutch-2017.133.1.1svn35685-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484256" comment="texlive-glossaries-english-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484257" comment="texlive-glossaries-extra-2017.133.1.15svn44284-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484258" comment="texlive-glossaries-french-2017.133.1.1svn42873-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484259" comment="texlive-glossaries-german-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484260" comment="texlive-glossaries-irish-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484261" comment="texlive-glossaries-italian-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484262" comment="texlive-glossaries-magyar-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484263" comment="texlive-glossaries-polish-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484264" comment="texlive-glossaries-portuges-2017.133.1.1svn36064-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484265" comment="texlive-glossaries-serbian-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484266" comment="texlive-glossaries-spanish-2017.133.1.0svn35665-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484267" comment="texlive-glyphlist-2017.133.svn41545-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484268" comment="texlive-gmdoc-2017.133.0.0.993svn21292-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484269" comment="texlive-gmdoc-enhance-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484270" comment="texlive-gmiflink-2017.133.0.0.97svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484271" comment="texlive-gmp-2017.133.1.0svn21691-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484272" comment="texlive-gmutils-2017.133.0.0.996svn24287-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484273" comment="texlive-gmverb-2017.133.0.0.98svn24288-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484274" comment="texlive-gmverse-2017.133.0.0.73svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484275" comment="texlive-gnu-freefont-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484276" comment="texlive-gnu-freefont-fonts-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484277" comment="texlive-gnuplottex-2017.133.0.0.9.2svn41904-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484278" comment="texlive-go-2017.133.svn28628-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484279" comment="texlive-gobble-2017.133.0.0.1svn40936-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484280" comment="texlive-gofonts-2017.133.svn43726-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484281" comment="texlive-gofonts-fonts-2017.133.svn43726-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484282" comment="texlive-gost-2017.133.1.2isvn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484283" comment="texlive-gothic-2017.133.svn38263-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484284" comment="texlive-gotoh-2017.133.1.0svn44211-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484285" comment="texlive-gradientframe-2017.133.0.0.2svn21387-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484286" comment="texlive-gradstudentresume-2017.133.svn38832-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484287" comment="texlive-grafcet-2017.133.1.3.5svn22509-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484288" comment="texlive-grant-2017.133.0.0.0.3svn41905-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484289" comment="texlive-graphbox-2017.133.1.0svn35075-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484290" comment="texlive-graphics-2017.133.svn43813-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484291" comment="texlive-graphics-cfg-2017.133.svn41448-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484292" comment="texlive-graphics-def-2017.133.svn43025-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484293" comment="texlive-graphics-pln-2017.133.svn44567-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484294" comment="texlive-graphicx-psmin-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484295" comment="texlive-graphicxbox-2017.133.1.0svn32630-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484296" comment="texlive-graphviz-2017.133.0.0.94svn31517-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484297" comment="texlive-grayhints-2017.133.svn43561-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484298" comment="texlive-greek-fontenc-2017.133.0.0.13.2svn39606-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484299" comment="texlive-greek-inputenc-2017.133.1.6svn40613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484300" comment="texlive-greekdates-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484301" comment="texlive-greektex-2017.133.svn28327-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484302" comment="texlive-greektonoi-2017.133.svn39419-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484303" comment="texlive-greenpoint-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484304" comment="texlive-gregoriotex-2017.133.5.0.2svn44502-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484306" comment="texlive-gregoriotex-fonts-2017.133.5.0.2svn44502-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484307" comment="texlive-grfpaste-2017.133.0.0.2svn17354-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484308" comment="texlive-grid-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484309" comment="texlive-grid-system-2017.133.0.0.3.0svn32981-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484310" comment="texlive-gridset-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484311" comment="texlive-grotesq-2017.133.svn35859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484312" comment="texlive-grotesq-fonts-2017.133.svn35859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484313" comment="texlive-grundgesetze-2017.133.1.02svn34439-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484314" comment="texlive-gsemthesis-2017.133.0.0.9.4svn36244-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484315" comment="texlive-gsftopk-2017.133.1.19.2svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484317" comment="texlive-gtl-2017.133.0.0.2svn38503-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484318" comment="texlive-gtrcrd-2017.133.1.1svn32484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484319" comment="texlive-gtrlib-largetrees-2017.133.svn43279-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484320" comment="texlive-gu-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484321" comment="texlive-guide-to-latex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484322" comment="texlive-guitar-2017.133.1.6svn32258-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484323" comment="texlive-guitarchordschemes-2017.133.0.0.7svn41880-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484324" comment="texlive-guitlogo-2017.133.0.0.9.2svn27458-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484325" comment="texlive-gustlib-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484326" comment="texlive-gustprog-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484327" comment="texlive-gzt-2017.133.0.0.97svn43254-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484328" comment="texlive-h2020proposal-2017.133.1.0svn38428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484329" comment="texlive-hacm-2017.133.0.0.1svn27671-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484330" comment="texlive-hacm-fonts-2017.133.0.0.1svn27671-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484331" comment="texlive-halloweenmath-2017.133.0.0.10asvn44043-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484332" comment="texlive-handout-2017.133.1.6.0svn43962-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484333" comment="texlive-hands-2017.133.svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484334" comment="texlive-hang-2017.133.2.1svn43280-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484335" comment="texlive-hanging-2017.133.1.2bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484336" comment="texlive-hanoi-2017.133.20120101svn25019-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484337" comment="texlive-happy4th-2017.133.20120102svn25020-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484338" comment="texlive-har2nat-2017.133.1.0svn17356-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484339" comment="texlive-hardwrap-2017.133.0.0.2svn21396-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484340" comment="texlive-harmony-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484341" comment="texlive-harnon-cv-2017.133.1.0svn26543-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484342" comment="texlive-harpoon-2017.133.1.0svn21327-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484343" comment="texlive-harvard-2017.133.2.0.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484344" comment="texlive-harveyballs-2017.133.1.1svn32003-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484345" comment="texlive-harvmac-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484346" comment="texlive-hatching-2017.133.0.0.11svn23818-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484347" comment="texlive-hausarbeit-jura-2017.133.1.5svn42054-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484348" comment="texlive-havannah-2017.133.svn36348-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484349" comment="texlive-hc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484350" comment="texlive-he-she-2017.133.1.3svn41359-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484351" comment="texlive-helvetic-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484352" comment="texlive-helvetic-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484353" comment="texlive-hep-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484354" comment="texlive-hepnames-2017.133.2.0svn35722-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484355" comment="texlive-hepparticles-2017.133.2.0svn35723-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484356" comment="texlive-hepthesis-2017.133.1.5.0svn35720-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484357" comment="texlive-hepunits-2017.133.1.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484358" comment="texlive-here-2017.133.svn16135-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484359" comment="texlive-heuristica-2017.133.1.09svn43507-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484360" comment="texlive-heuristica-fonts-2017.133.1.09svn43507-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484361" comment="texlive-hexgame-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484362" comment="texlive-hf-tikz-2017.133.0.0.3asvn34733-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484363" comment="texlive-hfbright-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484364" comment="texlive-hfbright-fonts-2017.133.svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484365" comment="texlive-hfoldsty-2017.133.1.15svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484366" comment="texlive-hhtensor-2017.133.0.0.61svn24981-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484367" comment="texlive-histogr-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484368" comment="texlive-historische-zeitschrift-2017.133.1.2svn42635-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484369" comment="texlive-hitec-2017.133.0.0.0betasvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484370" comment="texlive-hletter-2017.133.4.2svn30002-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484371" comment="texlive-hlist-2017.133.0.0.1svn44158-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484372" comment="texlive-hobby-2017.133.1.8svn44474-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484373" comment="texlive-hobete-2017.133.svn27036-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484374" comment="texlive-hook-pre-commit-pkg-2017.133.1.1.2svn41378-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484375" comment="texlive-horoscop-2017.133.0.0.92svn30530-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484376" comment="texlive-hpsdiss-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484377" comment="texlive-hrefhide-2017.133.1.0fsvn22255-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484378" comment="texlive-hrlatex-2017.133.0.0.23svn18020-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484379" comment="texlive-hustthesis-2017.133.1.4svn42547-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484380" comment="texlive-hvfloat-2017.133.1.2svn43732-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484381" comment="texlive-hvindex-2017.133.0.0.02svn16136-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484382" comment="texlive-hypdvips-2017.133.3.02svn34364-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484383" comment="texlive-hyper-2017.133.4.2dsvn17357-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484384" comment="texlive-hypernat-2017.133.1.0bsvn17358-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484385" comment="texlive-hyperref-2017.133.6.85asvn43547-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484386" comment="texlive-hyperref-docsrc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484387" comment="texlive-hyperxmp-2017.133.3.2svn43316-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484388" comment="texlive-hyph-utf8-2017.133.svn44401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484389" comment="texlive-hyphen-afrikaans-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484390" comment="texlive-hyphen-ancientgreek-2017.133.svn41189-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484391" comment="texlive-hyphen-arabic-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484392" comment="texlive-hyphen-armenian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484393" comment="texlive-hyphen-base-2017.133.svn44419-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484394" comment="texlive-hyphen-basque-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484395" comment="texlive-hyphen-belarusian-2017.133.svn44401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484396" comment="texlive-hyphen-bulgarian-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484397" comment="texlive-hyphen-catalan-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484398" comment="texlive-hyphen-chinese-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484399" comment="texlive-hyphen-churchslavonic-2017.133.svn44401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484400" comment="texlive-hyphen-coptic-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484401" comment="texlive-hyphen-croatian-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484402" comment="texlive-hyphen-czech-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484403" comment="texlive-hyphen-danish-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484404" comment="texlive-hyphen-dutch-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484405" comment="texlive-hyphen-english-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484406" comment="texlive-hyphen-esperanto-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484407" comment="texlive-hyphen-estonian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484408" comment="texlive-hyphen-ethiopic-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484409" comment="texlive-hyphen-farsi-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484410" comment="texlive-hyphen-finnish-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484411" comment="texlive-hyphen-french-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484412" comment="texlive-hyphen-friulan-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484413" comment="texlive-hyphen-galician-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484414" comment="texlive-hyphen-georgian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484415" comment="texlive-hyphen-german-2017.133.svn44401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484416" comment="texlive-hyphen-greek-2017.133.5svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484417" comment="texlive-hyphen-hungarian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484418" comment="texlive-hyphen-icelandic-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484419" comment="texlive-hyphen-indic-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484420" comment="texlive-hyphen-indonesian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484421" comment="texlive-hyphen-interlingua-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484422" comment="texlive-hyphen-irish-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484423" comment="texlive-hyphen-italian-2017.133.4.8gsvn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484424" comment="texlive-hyphen-kurmanji-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484425" comment="texlive-hyphen-latin-2017.133.3.1svn44401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484426" comment="texlive-hyphen-latvian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484427" comment="texlive-hyphen-lithuanian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484428" comment="texlive-hyphen-mongolian-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484429" comment="texlive-hyphen-norwegian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484430" comment="texlive-hyphen-occitan-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484431" comment="texlive-hyphen-piedmontese-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484432" comment="texlive-hyphen-polish-2017.133.3.0asvn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484433" comment="texlive-hyphen-portuguese-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484434" comment="texlive-hyphen-romanian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484435" comment="texlive-hyphen-romansh-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484436" comment="texlive-hyphen-russian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484437" comment="texlive-hyphen-sanskrit-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484438" comment="texlive-hyphen-serbian-2017.133.1.0asvn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484439" comment="texlive-hyphen-slovak-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484440" comment="texlive-hyphen-slovenian-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484441" comment="texlive-hyphen-spanish-2017.133.4.5svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484442" comment="texlive-hyphen-swedish-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484443" comment="texlive-hyphen-thai-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484444" comment="texlive-hyphen-turkish-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484445" comment="texlive-hyphen-turkmen-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484446" comment="texlive-hyphen-ukrainian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484447" comment="texlive-hyphen-uppersorbian-2017.133.svn40340-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484448" comment="texlive-hyphen-welsh-2017.133.svn41113-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484449" comment="texlive-hyphenat-2017.133.2.3csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484450" comment="texlive-hyphenex-2017.133.svn37354-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484451" comment="texlive-hyplain-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484452" comment="texlive-ibycus-babel-2017.133.3.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484453" comment="texlive-ibygrk-2017.133.4.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484454" comment="texlive-ibygrk-fonts-2017.133.4.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484455" comment="texlive-icsv-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484456" comment="texlive-idxcmds-2017.133.0.0.2csvn38115-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484457" comment="texlive-idxlayout-2017.133.0.0.4dsvn25821-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484458" comment="texlive-ieeepes-2017.133.4.0svn17359-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484459" comment="texlive-ietfbibs-2017.133.1.0.0svn41332-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484460" comment="texlive-ifetex-2017.133.1.2svn24853-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484461" comment="texlive-iffont-2017.133.1.0.0svn38823-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484462" comment="texlive-ifluatex-2017.133.1.4svn43610-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484463" comment="texlive-ifmslide-2017.133.0.0.47svn20727-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484464" comment="texlive-ifmtarg-2017.133.1.2asvn19363-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484465" comment="texlive-ifnextok-2017.133.0.0.3svn23379-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484466" comment="texlive-ifoddpage-2017.133.1.1svn40726-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484467" comment="texlive-ifplatform-2017.133.0.0.4svn21156-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484468" comment="texlive-ifptex-2017.133.1.1svn44194-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484469" comment="texlive-ifsym-2017.133.svn24868-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484470" comment="texlive-iftex-2017.133.0.0.2svn29654-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484471" comment="texlive-ifthenx-2017.133.0.0.1asvn25819-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484472" comment="texlive-ifxetex-2017.133.0.0.6svn19685-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484473" comment="texlive-iitem-2017.133.1.0svn29613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484474" comment="texlive-ijmart-2017.133.1.7svn30958-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484475" comment="texlive-ijqc-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484476" comment="texlive-ijsra-2017.133.1.0svn44551-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484477" comment="texlive-imac-2017.133.svn17347-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484478" comment="texlive-image-gallery-2017.133.1.0jsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484479" comment="texlive-imakeidx-2017.133.1.3esvn42287-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484480" comment="texlive-imfellenglish-2017.133.svn38547-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484481" comment="texlive-imfellenglish-fonts-2017.133.svn38547-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484482" comment="texlive-impatient-2017.133.svn35573-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484483" comment="texlive-impatient-cn-2017.133.svn35576-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484484" comment="texlive-impatient-fr-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484485" comment="texlive-impnattypo-2017.133.1.4svn36448-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484486" comment="texlive-import-2017.133.5.1svn17361-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484487" comment="texlive-imsproc-2017.133.0.0.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484488" comment="texlive-imtekda-2017.133.1.7svn17667-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484489" comment="texlive-incgraph-2017.133.1.12svn36500-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484490" comment="texlive-inconsolata-2017.133.1.112svn42871-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484491" comment="texlive-inconsolata-fonts-2017.133.1.112svn42871-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484492" comment="texlive-index-2017.133.4.1betasvn24099-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484493" comment="texlive-indextools-2017.133.1.5.1svn38931-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484494" comment="texlive-initials-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484495" comment="texlive-initials-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484496" comment="texlive-inlinebib-2017.133.svn22018-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484497" comment="texlive-inlinedef-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484498" comment="texlive-inputtrc-2017.133.0.0.3svn28019-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484499" comment="texlive-insbox-2017.133.2.2svn34299-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484500" comment="texlive-interactiveworkbook-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484501" comment="texlive-interchar-2017.133.0.0.2svn36312-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484502" comment="texlive-interfaces-2017.133.3.1svn21474-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484503" comment="texlive-interpreter-2017.133.1.2svn27232-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484504" comment="texlive-interval-2017.133.0.0.3svn34840-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484505" comment="texlive-intro-scientific-2017.133.5th_editionsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484506" comment="texlive-inversepath-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484507" comment="texlive-invoice-2017.133.svn39397-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484508" comment="texlive-ionumbers-2017.133.0.0.3.3svn33457-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484509" comment="texlive-iopart-num-2017.133.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484510" comment="texlive-ipaex-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484511" comment="texlive-ipaex-fonts-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484512" comment="texlive-ipaex-type1-2017.133.0.0.4asvn42403-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484513" comment="texlive-ipaex-type1-fonts-2017.133.0.0.4asvn42403-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484514" comment="texlive-iscram-2017.133.1.0.2svn42604-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484515" comment="texlive-iso-2017.133.2.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484516" comment="texlive-iso10303-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484517" comment="texlive-isodate-2017.133.2.28svn16613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484518" comment="texlive-isodoc-2017.133.1.09svn39520-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484519" comment="texlive-isomath-2017.133.0.0.6.1svn27654-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484520" comment="texlive-isonums-2017.133.1.0svn17362-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484521" comment="texlive-isorot-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484522" comment="texlive-isotope-2017.133.0.0.3svn23711-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484523" comment="texlive-issuulinks-2017.133.1.1svn25742-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484524" comment="texlive-itnumpar-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484525" comment="texlive-iwhdp-2017.133.0.0.50svn37552-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484526" comment="texlive-iwona-2017.133.0.0.995bsvn19611-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484527" comment="texlive-iwona-fonts-2017.133.0.0.995bsvn19611-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484528" comment="texlive-jablantile-2017.133.svn16364-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484529" comment="texlive-jacow-2017.133.1.95svn40523-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484530" comment="texlive-jadetex-2017.133.3.13svn41718-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484532" comment="texlive-jamtimes-2017.133.1.12svn20408-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484533" comment="texlive-japanese-otf-2017.133.1.7b6svn42950-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484534" comment="texlive-japanese-otf-uptex-2017.133.0.0.18svn43395-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484535" comment="texlive-jknapltx-2017.133.svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484536" comment="texlive-jlabels-2017.133.svn24858-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484537" comment="texlive-jlreq-2017.133.svn44563-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484538" comment="texlive-jmlr-2017.133.1.23svn43458-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484539" comment="texlive-jmn-2017.133.svn22719-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484540" comment="texlive-jmn-fonts-2017.133.svn22719-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484541" comment="texlive-jneurosci-2017.133.1.00svn17346-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484542" comment="texlive-jpsj-2017.133.1.2.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484543" comment="texlive-js-misc-2017.133.svn16211-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484544" comment="texlive-jsclasses-2017.133.svn43403-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484545" comment="texlive-jslectureplanner-2017.133.1.5svn43476-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484546" comment="texlive-jumplines-2017.133.0.0.2svn37553-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484547" comment="texlive-junicode-2017.133.0.0.7.7svn28286-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484548" comment="texlive-junicode-fonts-2017.133.0.0.7.7svn28286-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484549" comment="texlive-jura-2017.133.4.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484550" comment="texlive-juraabbrev-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484551" comment="texlive-jurabib-2017.133.0.0.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484552" comment="texlive-juramisc-2017.133.0.0.91svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484553" comment="texlive-jurarsp-2017.133.0.0.52svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484554" comment="texlive-jvlisting-2017.133.0.0.7svn24638-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484555" comment="texlive-kantlipsum-2017.133.0.0.6svn27994-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484556" comment="texlive-karnaugh-2017.133.svn21338-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484557" comment="texlive-karnaugh-map-2017.133.1.1svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484558" comment="texlive-karnaughmap-2017.133.2.0svn36989-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484559" comment="texlive-kastrup-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484560" comment="texlive-kdgdocs-2017.133.1.0svn24498-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484561" comment="texlive-kerkis-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484562" comment="texlive-kerkis-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484563" comment="texlive-kerntest-2017.133.1.32svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484564" comment="texlive-keycommand-2017.133.3.1415svn18042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484565" comment="texlive-keyfloat-2017.133.0.0.15svn44306-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484566" comment="texlive-keyreader-2017.133.0.0.5bsvn28195-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484567" comment="texlive-keystroke-2017.133.1.6svn17992-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484568" comment="texlive-keyval2e-2017.133.0.0.0.2svn23698-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484569" comment="texlive-keyvaltable-2017.133.0.0.2svn41414-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484570" comment="texlive-kix-2017.133.svn21606-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484571" comment="texlive-kixfont-2017.133.svn18488-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484572" comment="texlive-kluwer-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484573" comment="texlive-knitting-2017.133.2.0svn19595-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484574" comment="texlive-knitting-fonts-2017.133.2.0svn19595-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484575" comment="texlive-knittingpattern-2017.133.svn17205-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484576" comment="texlive-knowledge-2017.133.1.01svn44565-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484577" comment="texlive-knuth-2017.133.svn32899-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484578" comment="texlive-knuth-lib-2017.133.svn35820-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484579" comment="texlive-knuth-local-2017.133.svn38627-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484580" comment="texlive-knuthotherfonts-2017.133.svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484581" comment="texlive-koma-moderncvclassic-2017.133.0.0.5svn25025-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484582" comment="texlive-koma-script-2017.133.3.23svn44226-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484583" comment="texlive-koma-script-examples-2017.133.svn34243-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484584" comment="texlive-koma-script-sfs-2017.133.1.0svn26137-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484585" comment="texlive-komacv-2017.133.1.1.1svn43902-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484586" comment="texlive-kotex-oblivoir-2017.133.2.1.8svn43130-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484587" comment="texlive-kotex-plain-2017.133.2.1.1asvn38630-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484588" comment="texlive-kotex-utf-2017.133.2.1.2svn38558-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484589" comment="texlive-kotex-utils-2017.133.2.1.0svn38727-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484591" comment="texlive-kpathsea-2017.133.svn44223-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484594" comment="texlive-kpfonts-2017.133.3.31svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484595" comment="texlive-kpfonts-fonts-2017.133.3.31svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484596" comment="texlive-ksfh_nat-2017.133.1.1svn24825-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484597" comment="texlive-ksp-thesis-2017.133.1.0.2svn39080-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484598" comment="texlive-ktv-texdata-2017.133.05.34svn27369-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484599" comment="texlive-kurier-2017.133.0.0.995bsvn19612-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484600" comment="texlive-kurier-fonts-2017.133.0.0.995bsvn19612-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484601" comment="texlive-l2picfaq-2017.133.1.50svn19601-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484602" comment="texlive-l2tabu-2017.133.2.4svn39597-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484603" comment="texlive-l2tabu-english-2017.133.1.8.5.7svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484604" comment="texlive-l2tabu-french-2017.133.2.3svn31315-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484605" comment="texlive-l2tabu-italian-2017.133.2.3svn25218-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484606" comment="texlive-l2tabu-spanish-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484607" comment="texlive-l3build-2017.133.svn44483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484608" comment="texlive-l3experimental-2017.133.svn44483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484609" comment="texlive-l3kernel-2017.133.svn44483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484610" comment="texlive-l3packages-2017.133.svn44483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484611" comment="texlive-labbook-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484612" comment="texlive-labels-2017.133.0.0.13svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484613" comment="texlive-labyrinth-2017.133.1.0svn33454-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484614" comment="texlive-lacheck-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484616" comment="texlive-ladder-2017.133.svn44394-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484617" comment="texlive-lambda-2017.133.svn28669-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484618" comment="texlive-lambda-lists-2017.133.svn31402-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484619" comment="texlive-langcode-2017.133.0.0.2svn27764-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484620" comment="texlive-langsci-2017.133.svn44096-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484621" comment="texlive-lapdf-2017.133.1.1svn23806-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484622" comment="texlive-lastpackage-2017.133.0.0.1svn34481-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484623" comment="texlive-lastpage-2017.133.1.2msvn36680-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484624" comment="texlive-latex-2017.133.20170101_pl1svn43813-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484625" comment="texlive-latex-bib-ex-2017.133.svn25831-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484626" comment="texlive-latex-bib2-ex-2017.133.svn40098-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484627" comment="texlive-latex-bin-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484629" comment="texlive-latex-brochure-2017.133.svn40612-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484630" comment="texlive-latex-course-2017.133.2svn25505-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484631" comment="texlive-latex-doc-ptr-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484632" comment="texlive-latex-fonts-2017.133.svn28888-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484633" comment="texlive-latex-git-log-2017.133.0.0.9svn30983-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484635" comment="texlive-latex-graphics-companion-2017.133.svn29235-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484636" comment="texlive-latex-make-2017.133.2.2.3svn42914-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486890" comment="texlive-latex-notes-zh-cn-2017.137.1.20svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486891" comment="texlive-latex-papersize-2017.137.1.62svn42296-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486892" comment="texlive-latex-referenz-2017.137.2svn36671-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486893" comment="texlive-latex-tabellen-2017.137.svn16979-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486894" comment="texlive-latex-tds-2017.137.svn40613-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486895" comment="texlive-latex-veryshortguide-2017.137.svn41844-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486896" comment="texlive-latex-web-companion-2017.137.svn29349-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486897" comment="texlive-latex2e-help-texinfo-2017.137.svn38709-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486898" comment="texlive-latex2e-help-texinfo-fr-2017.137.svn42541-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486899" comment="texlive-latex2e-help-texinfo-spanish-2017.137.svn37356-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486900" comment="texlive-latex2man-2017.137.1.25svn43855-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486901" comment="texlive-latex2nemeth-2017.137.1.0svn42300-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486902" comment="texlive-latex4wp-2017.137.1.0.10svn35999-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486903" comment="texlive-latex4wp-it-2017.137.1.0.10svn36000-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486904" comment="texlive-latexbangla-2017.137.0.0.2svn42409-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486905" comment="texlive-latexbug-2017.137.1.0asvn44566-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486906" comment="texlive-latexcheat-2017.137.1.13svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486907" comment="texlive-latexcheat-de-2017.137.svn35702-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486908" comment="texlive-latexcheat-esmx-2017.137.2.00svn36866-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486909" comment="texlive-latexcheat-ptbr-2017.137.1.13svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486910" comment="texlive-latexconfig-2017.137.svn40274-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486911" comment="texlive-latexcourse-rug-2017.137.1.1svn39026-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486912" comment="texlive-latexdemo-2017.137.0.0.1svn34481-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486913" comment="texlive-latexdiff-2017.137.1.2.0svn41892-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486914" comment="texlive-latexfileinfo-pkgs-2017.137.0.0.22svn26760-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486915" comment="texlive-latexfileversion-2017.137.0.0.3svn29349-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486916" comment="texlive-latexgit-2017.137.svn41920-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486917" comment="texlive-latexindent-2017.137.3.1svn44492-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486918" comment="texlive-latexmk-2017.137.4.52csvn43099-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486919" comment="texlive-latexmp-2017.137.1.2.1svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486920" comment="texlive-latexpand-2017.137.1.3svn41873-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486921" comment="texlive-lato-2017.137.2.2svn24986-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486922" comment="texlive-lato-fonts-2017.137.2.2svn24986-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486923" comment="texlive-layaureo-2017.137.0.0.2svn19087-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486924" comment="texlive-layouts-2017.137.2.6dsvn42428-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486925" comment="texlive-lazylist-2017.137.1.0asvn17691-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486926" comment="texlive-lcd-2017.137.0.0.3svn16549-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486927" comment="texlive-lcdftypetools-2017.137.svn44166-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486928" comment="texlive-lcg-2017.137.1.3svn31474-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486929" comment="texlive-lcyw-2017.137.1.1svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486930" comment="texlive-leading-2017.137.0.0.3svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486931" comment="texlive-leadsheets-2017.137.0.0.5asvn43034-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486932" comment="texlive-leaflet-2017.137.1.1bsvn43523-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486933" comment="texlive-lecturer-2017.137.svn23916-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486934" comment="texlive-ledmac-2017.137.0.0.19.4svn41811-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486935" comment="texlive-leftidx-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486936" comment="texlive-leipzig-2017.137.1.1svn34902-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486937" comment="texlive-lengthconvert-2017.137.1.0asvn30867-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486938" comment="texlive-lettre-2017.137.2.353svn35145-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486939" comment="texlive-lettrine-2017.137.1.9svn38268-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486940" comment="texlive-levy-2017.137.svn21750-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486941" comment="texlive-lewis-2017.137.0.0.1svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486942" comment="texlive-lexikon-2017.137.1.0csvn17364-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486943" comment="texlive-lexref-2017.137.1.1asvn36026-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486944" comment="texlive-lfb-2017.137.1.0svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486945" comment="texlive-lgreek-2017.137.svn21818-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486946" comment="texlive-lh-2017.137.3.5gsvn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486947" comment="texlive-lhcyr-2017.137.svn31795-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486948" comment="texlive-lhelp-2017.137.2.0svn23638-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486949" comment="texlive-libertine-2017.137.5.3.0svn43603-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486950" comment="texlive-libertine-fonts-2017.137.5.3.0svn43603-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486951" comment="texlive-libertinegc-2017.137.1.00svn39746-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486952" comment="texlive-libertinus-2017.137.6.4svn44409-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486953" comment="texlive-libertinus-fonts-2017.137.6.4svn44409-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486954" comment="texlive-libertinust1math-2017.137.1.0.4svn44542-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486955" comment="texlive-libertinust1math-fonts-2017.137.1.0.4svn44542-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486956" comment="texlive-libgreek-2017.137.1.0svn27789-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486957" comment="texlive-librarian-2017.137.1.0svn19880-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486958" comment="texlive-librebaskerville-2017.137.svn31741-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486959" comment="texlive-librebaskerville-fonts-2017.137.svn31741-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486960" comment="texlive-librebodoni-2017.137.svn39375-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486961" comment="texlive-librebodoni-fonts-2017.137.svn39375-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486962" comment="texlive-librecaslon-2017.137.svn31929-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486963" comment="texlive-librecaslon-fonts-2017.137.svn31929-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486964" comment="texlive-libris-2017.137.1.007svn19409-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486965" comment="texlive-libris-fonts-2017.137.1.007svn19409-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486966" comment="texlive-lilyglyphs-2017.137.0.0.2.3svn33164-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486967" comment="texlive-lilyglyphs-fonts-2017.137.0.0.2.3svn33164-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486968" comment="texlive-limap-2017.137.2.1svn41390-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486969" comment="texlive-linearA-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486970" comment="texlive-linearA-fonts-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486971" comment="texlive-linegoal-2017.137.2.9svn21523-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486972" comment="texlive-lineno-2017.137.4.41svn21442-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486973" comment="texlive-ling-macros-2017.137.svn42268-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486974" comment="texlive-linguex-2017.137.4.3svn30815-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486975" comment="texlive-linop-2017.137.0.0.1svn41304-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486976" comment="texlive-lion-msc-2017.137.0.0.27svn44131-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486977" comment="texlive-lipsum-2017.137.1.3svn34800-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486978" comment="texlive-lisp-on-tex-2017.137.2.0svn38722-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486979" comment="texlive-listbib-2017.137.2.2svn29349-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486980" comment="texlive-listing-2017.137.1.2svn17373-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486981" comment="texlive-listings-2017.137.1.6svn37534-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486982" comment="texlive-listings-ext-2017.137.67svn29349-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486983" comment="texlive-listlbls-2017.137.1.03svn34893-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486984" comment="texlive-listliketab-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486985" comment="texlive-listofitems-2017.137.1.3svn42530-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486986" comment="texlive-listofsymbols-2017.137.0.0.2svn16134-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486987" comment="texlive-lithuanian-2017.137.svn22722-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486988" comment="texlive-liturg-2017.137.1.0svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486989" comment="texlive-lkproof-2017.137.3.1svn20021-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486990" comment="texlive-lm-2017.137.2.004svn28119-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486991" comment="texlive-lm-fonts-2017.137.2.004svn28119-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486992" comment="texlive-lm-math-2017.137.1.959svn36915-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486993" comment="texlive-lm-math-fonts-2017.137.1.959svn36915-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486994" comment="texlive-lmake-2017.137.1.0svn25552-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486995" comment="texlive-lni-2017.137.1.3svn44368-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486996" comment="texlive-lobster2-2017.137.svn32617-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486997" comment="texlive-lobster2-fonts-2017.137.svn32617-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486998" comment="texlive-locality-2017.137.0.0.2svn20422-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486999" comment="texlive-localloc-2017.137.svn21934-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487000" comment="texlive-logbox-2017.137.1.0svn24499-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487001" comment="texlive-logical-markup-utils-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487002" comment="texlive-logicproof-2017.137.svn33254-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487003" comment="texlive-logicpuzzle-2017.137.2.5svn34491-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487004" comment="texlive-logpap-2017.137.0.0.6svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487005" comment="texlive-logreq-2017.137.1.0svn19640-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487006" comment="texlive-lollipop-2017.137.1.07svn41438-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487007" comment="texlive-longdivision-2017.137.1.0svn43159-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487008" comment="texlive-longfbox-2017.137.1.0svn39028-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487009" comment="texlive-longfigure-2017.137.1.0svn34302-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487010" comment="texlive-longnamefilelist-2017.137.0.0.2svn27889-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487011" comment="texlive-loops-2017.137.1.3svn30704-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487012" comment="texlive-lpform-2017.137.svn36918-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487013" comment="texlive-lpic-2017.137.0.0.8svn20843-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487014" comment="texlive-lplfitch-2017.137.0.0.9svn31077-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487015" comment="texlive-lps-2017.137.0.0.7svn21322-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487016" comment="texlive-lroundrect-2017.137.1.0svn39804-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487017" comment="texlive-lsc-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487018" comment="texlive-lshort-bulgarian-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487019" comment="texlive-lshort-chinese-2017.137.5.10svn43606-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487020" comment="texlive-lshort-czech-2017.137.4.27svn29803-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487021" comment="texlive-lshort-dutch-2017.137.1.3svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487022" comment="texlive-lshort-english-2017.137.5.0.5svn37892-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487023" comment="texlive-lshort-estonian-2017.137.5.05svn39323-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487024" comment="texlive-lshort-finnish-2017.137.svn15878-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487025" comment="texlive-lshort-french-2017.137.5.01fr_0svn23332-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487026" comment="texlive-lshort-german-2017.137.3.0bsvn42434-7.6.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484787" comment="texlive-lshort-italian-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484788" comment="texlive-lshort-japanese-2017.133.svn36207-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484789" comment="texlive-lshort-korean-2017.133.4.17svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484790" comment="texlive-lshort-mongol-2017.133.4.26svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484791" comment="texlive-lshort-persian-2017.133.5.01svn31296-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484792" comment="texlive-lshort-polish-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484793" comment="texlive-lshort-portuguese-2017.133.5.01.0svn22569-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484794" comment="texlive-lshort-russian-2017.133.svn18906-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484795" comment="texlive-lshort-slovak-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484796" comment="texlive-lshort-slovenian-2017.133.4.20svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484797" comment="texlive-lshort-spanish-2017.133.0.0.5svn35050-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484798" comment="texlive-lshort-thai-2017.133.1.32svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484799" comment="texlive-lshort-turkish-2017.133.4.20svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484800" comment="texlive-lshort-ukr-2017.133.4.00svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484801" comment="texlive-lshort-vietnamese-2017.133.4.00svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484802" comment="texlive-lstaddons-2017.133.0.0.1svn26196-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484803" comment="texlive-lstbayes-2017.133.svn41550-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484804" comment="texlive-lt3graph-2017.133.0.0.1.8svn42874-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484805" comment="texlive-ltablex-2017.133.1.1svn34923-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484806" comment="texlive-ltabptch-2017.133.1.74dsvn17533-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484807" comment="texlive-ltb2bib-2017.133.0.0.01svn43746-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484808" comment="texlive-ltxdockit-2017.133.1.2dsvn21869-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484809" comment="texlive-ltxfileinfo-2017.133.2.04svn38663-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484811" comment="texlive-ltximg-2017.133.1.2svn37006-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484813" comment="texlive-ltxindex-2017.133.0.0.1csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484814" comment="texlive-ltxkeys-2017.133.0.0.0.3csvn28332-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484815" comment="texlive-ltxmisc-2017.133.svn21927-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484816" comment="texlive-ltxnew-2017.133.1.3svn21586-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484817" comment="texlive-ltxtools-2017.133.0.0.0.1asvn24897-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484818" comment="texlive-lua-alt-getopt-2017.133.0.0.7.0svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484819" comment="texlive-lua-check-hyphen-2017.133.0.0.4svn40229-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484820" comment="texlive-lua-visual-debug-2017.133.0.0.5svn41387-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484821" comment="texlive-lua2dox-2017.133.0.0.2svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484823" comment="texlive-luabibentry-2017.133.0.0.1asvn31783-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484824" comment="texlive-luabidi-2017.133.0.0.2svn30790-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484825" comment="texlive-luacode-2017.133.1.2asvn25193-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484826" comment="texlive-luahyphenrules-2017.133.1.0svn42670-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484827" comment="texlive-luaindex-2017.133.0.0.1bsvn25882-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484828" comment="texlive-luainputenc-2017.133.0.0.973svn20491-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484829" comment="texlive-luaintro-2017.133.0.0.03svn35490-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484830" comment="texlive-lualatex-doc-2017.133.svn30473-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484831" comment="texlive-lualatex-doc-de-2017.133.1.0svn30474-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484832" comment="texlive-lualatex-math-2017.133.1.6svn40621-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484833" comment="texlive-lualibs-2017.133.2.5svn43153-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484834" comment="texlive-luamesh-2017.133.0.0.51svn43814-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484835" comment="texlive-luamplib-2017.133.2.12.1svn44496-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484836" comment="texlive-luaotfload-2017.133.2.8_fix_2svn43194-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484838" comment="texlive-luapackageloader-2017.133.0.0.1svn44500-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484839" comment="texlive-luasseq-2017.133.svn37877-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484840" comment="texlive-luatex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484842" comment="texlive-luatex85-2017.133.1.4svn41456-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484843" comment="texlive-luatexbase-2017.133.1.3svn38550-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484844" comment="texlive-luatexja-2017.133.20170505.0svn44217-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484845" comment="texlive-luatexko-2017.133.1.17svn44141-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484846" comment="texlive-luatextra-2017.133.1.0.1svn20747-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484847" comment="texlive-luatodonotes-2017.133.0.0.3svn39019-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484848" comment="texlive-luaxml-2017.133.0.0.0.2svn32741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484849" comment="texlive-lwarp-2017.133.0.0.32svn44552-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484851" comment="texlive-lxfonts-2017.133.2.0bsvn32354-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484852" comment="texlive-lxfonts-fonts-2017.133.2.0bsvn32354-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484853" comment="texlive-ly1-2017.133.svn21086-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484854" comment="texlive-m-tx-2017.133.0.0.62asvn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484856" comment="texlive-macros2e-2017.133.0.0.4svn23236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484857" comment="texlive-macroswap-2017.133.1.1svn31498-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484858" comment="texlive-mafr-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484859" comment="texlive-magaz-2017.133.0.0.4svn24694-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484860" comment="texlive-mailing-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484861" comment="texlive-mailmerge-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484862" comment="texlive-make4ht-2017.133.0.0.1csvn44079-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484864" comment="texlive-makebarcode-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484865" comment="texlive-makebase-2017.133.0.0.2svn41012-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484866" comment="texlive-makebox-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484867" comment="texlive-makecell-2017.133.0.0.1esvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484868" comment="texlive-makecirc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484869" comment="texlive-makecmds-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484870" comment="texlive-makedtx-2017.133.0.0.94bsvn38769-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484872" comment="texlive-makeglos-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484873" comment="texlive-makeindex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484875" comment="texlive-makeplot-2017.133.1.0.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484876" comment="texlive-makeshape-2017.133.2.1svn28973-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484877" comment="texlive-mandi-2017.133.2.6.1svn41598-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484878" comment="texlive-manfnt-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484879" comment="texlive-manfnt-font-2017.133.svn35799-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484880" comment="texlive-manfnt-font-fonts-2017.133.svn35799-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484881" comment="texlive-manuscript-2017.133.1.7svn36110-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484882" comment="texlive-margbib-2017.133.1.0csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484883" comment="texlive-marginfix-2017.133.1.1svn31598-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484884" comment="texlive-marginnote-2017.133.1.2bsvn43979-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484885" comment="texlive-markdown-2017.133.2.5.3svn44237-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484886" comment="texlive-marvosym-2017.133.2.2asvn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484887" comment="texlive-marvosym-fonts-2017.133.2.2asvn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484888" comment="texlive-matc3-2017.133.1.0.1svn29845-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484889" comment="texlive-matc3mem-2017.133.1.1svn35773-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484890" comment="texlive-match_parens-2017.133.1.43svn36270-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484892" comment="texlive-math-e-2017.133.svn20062-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484893" comment="texlive-math-into-latex-4-2017.133.svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484894" comment="texlive-mathabx-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484895" comment="texlive-mathabx-type1-2017.133.svn21129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484896" comment="texlive-mathabx-type1-fonts-2017.133.svn21129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484897" comment="texlive-mathalfa-2017.133.1.09svn43332-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484898" comment="texlive-mathastext-2017.133.1.3rsvn42447-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484899" comment="texlive-mathcomp-2017.133.0.0.1fsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484900" comment="texlive-mathdesign-2017.133.2.31svn31639-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484901" comment="texlive-mathdesign-fonts-2017.133.2.31svn31639-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484902" comment="texlive-mathdots-2017.133.0.0.9svn34301-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484903" comment="texlive-mathexam-2017.133.1.00svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484904" comment="texlive-mathpartir-2017.133.1.3.2svn39864-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484905" comment="texlive-mathpazo-2017.133.1.003svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484906" comment="texlive-mathpazo-fonts-2017.133.1.003svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484907" comment="texlive-mathpunctspace-2017.133.1.0svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484908" comment="texlive-maths-symbols-2017.133.3.4svn37763-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484909" comment="texlive-mathspec-2017.133.0.0.2bsvn42773-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484910" comment="texlive-mathspic-2017.133.1.13svn31957-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484912" comment="texlive-mathtools-2017.133.1.19svn44504-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484913" comment="texlive-matlab-prettifier-2017.133.0.0.3svn34323-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484914" comment="texlive-mattens-2017.133.1.3svn17582-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484915" comment="texlive-maybemath-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484916" comment="texlive-mbenotes-2017.133.2svn31813-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484917" comment="texlive-mcaption-2017.133.3.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484918" comment="texlive-mceinleger-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484919" comment="texlive-mcexam-2017.133.0.0.3svn44171-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484920" comment="texlive-mcf2graph-2017.133.4.23svn44468-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484921" comment="texlive-mcite-2017.133.1.6svn18173-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484922" comment="texlive-mciteplus-2017.133.1.2svn31648-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484923" comment="texlive-mcmthesis-2017.133.6.2svn39515-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484924" comment="texlive-mdframed-2017.133.1.9bsvn31075-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484925" comment="texlive-mdputu-2017.133.1.2svn20298-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484926" comment="texlive-mdsymbol-2017.133.0.0.5svn28399-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484927" comment="texlive-mdsymbol-fonts-2017.133.0.0.5svn28399-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484928" comment="texlive-mdwtools-2017.133.1.05.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484929" comment="texlive-media9-2017.133.0.0.79svn44045-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484930" comment="texlive-medstarbeamer-2017.133.svn38828-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484931" comment="texlive-meetingmins-2017.133.1.6svn31878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484932" comment="texlive-memdesign-2017.133.svn34157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484933" comment="texlive-memexsupp-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484934" comment="texlive-memoir-2017.133.3.7fsvn41203-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484935" comment="texlive-memory-2017.133.1.2svn30452-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484936" comment="texlive-mendex-doc-2017.133.svn42767-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484937" comment="texlive-mentis-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484938" comment="texlive-menu-2017.133.0.0.994svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484939" comment="texlive-menukeys-2017.133.1.5svn41823-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484940" comment="texlive-merriweather-2017.133.svn34315-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484941" comment="texlive-merriweather-fonts-2017.133.svn34315-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484942" comment="texlive-metafont-2017.133.2.7182818svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484943" comment="texlive-metafont-beginners-2017.133.svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484945" comment="texlive-metago-2017.133.0.0.9svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484946" comment="texlive-metalogo-2017.133.0.0.12svn18611-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484947" comment="texlive-metaobj-2017.133.0.0.93svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484948" comment="texlive-metaplot-2017.133.0.0.91svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484949" comment="texlive-metapost-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484951" comment="texlive-metapost-examples-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484952" comment="texlive-metapost-fonts-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484953" comment="texlive-metatex-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484954" comment="texlive-metatype1-2017.133.0.0.56svn37105-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484955" comment="texlive-metauml-2017.133.0.0.2.5svn19692-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484956" comment="texlive-method-2017.133.2.0bsvn17485-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484957" comment="texlive-metre-2017.133.1.0svn18489-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484958" comment="texlive-metrix-2017.133.1.3svn40099-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484959" comment="texlive-mex-2017.133.1.05svn40855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484961" comment="texlive-mf2pt1-2017.133.2.5asvn33802-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484963" comment="texlive-mfirstuc-2017.133.2.04svn41785-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484964" comment="texlive-mflogo-2017.133.2.0svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484965" comment="texlive-mflogo-font-2017.133.1.002svn36898-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484966" comment="texlive-mflogo-font-fonts-2017.133.1.002svn36898-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484967" comment="texlive-mflua-2017.133.svn43947-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484969" comment="texlive-mfnfss-2017.133.svn19410-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484970" comment="texlive-mfpic-2017.133.1.10svn28444-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484971" comment="texlive-mfpic4ode-2017.133.0.0.4svn17745-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484972" comment="texlive-mftinc-2017.133.1.0asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484973" comment="texlive-mfware-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484975" comment="texlive-mgltex-2017.133.4.2svn41676-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484976" comment="texlive-mhchem-2017.133.svn44451-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484977" comment="texlive-mhequ-2017.133.1.7svn38224-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484978" comment="texlive-miama-2017.133.1.0svn39837-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484979" comment="texlive-miama-fonts-2017.133.1.0svn39837-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484980" comment="texlive-microtype-2017.133.2.6asvn41127-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484981" comment="texlive-microtype-de-2017.133.2.4svn24549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484982" comment="texlive-midnight-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484983" comment="texlive-midpage-2017.133.1.1asvn17484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484984" comment="texlive-miller-2017.133.1.2svn18789-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484985" comment="texlive-milog-2017.133.1.0svn41610-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484986" comment="texlive-minibox-2017.133.0.0.2asvn30914-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484987" comment="texlive-minidocument-2017.133.1.0svn43752-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484988" comment="texlive-minifp-2017.133.0.0.96svn32559-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484989" comment="texlive-minipage-marginpar-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484990" comment="texlive-miniplot-2017.133.svn17483-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484991" comment="texlive-minitoc-2017.133.61svn37852-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484992" comment="texlive-minorrevision-2017.133.1.1svn32165-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484993" comment="texlive-minted-2017.133.2.4.1svn42418-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484994" comment="texlive-mintspirit-2017.133.svn32069-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484995" comment="texlive-mintspirit-fonts-2017.133.svn32069-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484996" comment="texlive-minutes-2017.133.1.8fsvn42186-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484997" comment="texlive-missaali-2017.133.1.004svn42810-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484998" comment="texlive-missaali-fonts-2017.133.1.004svn42810-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009484999" comment="texlive-mkgrkindex-2017.133.2.0svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485001" comment="texlive-mkjobtexmf-2017.133.0.0.8svn29725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485003" comment="texlive-mkpattern-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485004" comment="texlive-mkpic-2017.133.1.02svn33700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485006" comment="texlive-mla-paper-2017.133.svn20885-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485007" comment="texlive-mlist-2017.133.0.0.6asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485008" comment="texlive-mltex-2017.133.2.2svn39057-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485010" comment="texlive-mmap-2017.133.1.03svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485011" comment="texlive-mnotes-2017.133.0.0.8svn35521-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485012" comment="texlive-mnras-2017.133.3.0svn37579-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485013" comment="texlive-mnsymbol-2017.133.1.4svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485014" comment="texlive-mnsymbol-fonts-2017.133.1.4svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485015" comment="texlive-moderncv-2017.133.2.0.0svn37992-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485016" comment="texlive-moderntimeline-2017.133.0.0.9svn38254-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485017" comment="texlive-modiagram-2017.133.0.0.2gsvn38448-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485018" comment="texlive-modref-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485019" comment="texlive-modroman-2017.133.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485020" comment="texlive-modular-2017.133.svn44142-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485021" comment="texlive-mongolian-babel-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485022" comment="texlive-monofill-2017.133.0.0.2svn28140-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485023" comment="texlive-montex-2017.133.ivu.04.092svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485024" comment="texlive-montex-fonts-2017.133.ivu.04.092svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485025" comment="texlive-montserrat-2017.133.1.01svn43347-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485026" comment="texlive-montserrat-fonts-2017.133.1.01svn43347-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485027" comment="texlive-moodle-2017.133.0.0.5svn39367-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485028" comment="texlive-moreenum-2017.133.1.03svn24479-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485029" comment="texlive-morefloats-2017.133.1.0hsvn37927-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485030" comment="texlive-morehype-2017.133.r0.83svn38815-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485031" comment="texlive-moresize-2017.133.1.9svn17513-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485032" comment="texlive-moreverb-2017.133.2.3asvn22126-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485033" comment="texlive-morewrites-2017.133.svn43945-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485034" comment="texlive-movie15-2017.133.svn26473-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485035" comment="texlive-mp3d-2017.133.1.34svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485036" comment="texlive-mparhack-2017.133.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485037" comment="texlive-mparrows-2017.133.0.0.1svn39729-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485038" comment="texlive-mpattern-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485039" comment="texlive-mpcolornames-2017.133.0.0.20svn23252-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485040" comment="texlive-mpgraphics-2017.133.0.0.3svn29776-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485041" comment="texlive-mpman-ru-2017.133.1.004svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485042" comment="texlive-mpostinl-2017.133.1.11svn43670-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485043" comment="texlive-mptopdf-2017.133.svn41282-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485045" comment="texlive-mptrees-2017.133.17.06svn44453-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485046" comment="texlive-ms-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485047" comment="texlive-msc-2017.133.1.16svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485048" comment="texlive-msg-2017.133.0.0.40svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485049" comment="texlive-mslapa-2017.133.svn17514-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485050" comment="texlive-msu-thesis-2017.133.2.6bsvn41345-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485051" comment="texlive-mtgreek-2017.133.1.1+svn17967-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485052" comment="texlive-mucproc-2017.133.1.02svn43445-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485053" comment="texlive-mugsthesis-2017.133.svn34878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485054" comment="texlive-multenum-2017.133.svn21775-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485055" comment="texlive-multiaudience-2017.133.1.03svn38035-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485056" comment="texlive-multibbl-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485057" comment="texlive-multibib-2017.133.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485058" comment="texlive-multibibliography-2017.133.1.03svn30939-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485060" comment="texlive-multicap-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485061" comment="texlive-multidef-2017.133.1.10svn40637-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485062" comment="texlive-multido-2017.133.1.42svn18302-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485063" comment="texlive-multienv-2017.133.1.0svn26544-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485064" comment="texlive-multiexpand-2017.133.1.4svn38416-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485065" comment="texlive-multiobjective-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485066" comment="texlive-multirow-2017.133.2.2svn42588-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485067" comment="texlive-munich-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485068" comment="texlive-musixguit-2017.133.1.2.2svn21649-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485069" comment="texlive-musixtex-2017.133.1.24svn43375-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485071" comment="texlive-musixtex-fonts-2017.133.svn37762-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485072" comment="texlive-musixtex-fonts-fonts-2017.133.svn37762-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485073" comment="texlive-musixtnt-2017.133.svn40307-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485075" comment="texlive-musuos-2017.133.1.1dsvn24857-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485076" comment="texlive-muthesis-2017.133.svn23861-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485077" comment="texlive-mversion-2017.133.1.0.1svn29370-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485078" comment="texlive-mwcls-2017.133.0.0.75svn44352-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485079" comment="texlive-mwe-2017.133.0.0.3svn26422-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485080" comment="texlive-mweights-2017.133.svn43647-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485081" comment="texlive-mxedruli-2017.133.3.3csvn30021-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485082" comment="texlive-mxedruli-fonts-2017.133.3.3csvn30021-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485083" comment="texlive-mychemistry-2017.133.1.99bsvn28611-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485084" comment="texlive-mycv-2017.133.1.5.6svn26807-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485085" comment="texlive-mylatexformat-2017.133.3.4svn21392-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485086" comment="texlive-mynsfc-2017.133.1.01svn41996-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485087" comment="texlive-nag-2017.133.0.0.7svn24741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485088" comment="texlive-nameauth-2017.133.3.2svn43586-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485089" comment="texlive-namespc-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485090" comment="texlive-nanumtype1-2017.133.3.0svn29558-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485091" comment="texlive-nanumtype1-fonts-2017.133.3.0svn29558-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485092" comment="texlive-nar-2017.133.3.19svn38100-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485093" comment="texlive-natbib-2017.133.8.31bsvn20668-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485094" comment="texlive-natded-2017.133.0.0.1svn32693-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485095" comment="texlive-nath-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485096" comment="texlive-nature-2017.133.1.0svn21819-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485097" comment="texlive-navigator-2017.133.1.1svn41413-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485098" comment="texlive-navydocs-2017.133.1.1svn41643-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485099" comment="texlive-ncclatex-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485100" comment="texlive-ncctools-2017.133.3.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485101" comment="texlive-ncntrsbk-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485102" comment="texlive-ncntrsbk-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485103" comment="texlive-nddiss-2017.133.3.0svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485104" comment="texlive-ndsu-thesis-2017.133.svn40536-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485105" comment="texlive-needspace-2017.133.1.3dsvn29601-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485106" comment="texlive-nestquot-2017.133.svn27323-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485107" comment="texlive-neuralnetwork-2017.133.1.0svn31500-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485108" comment="texlive-nevelok-2017.133.1.03svn39029-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485109" comment="texlive-newcommand-2017.133.2.0svn18704-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485110" comment="texlive-newenviron-2017.133.1.0svn29331-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485111" comment="texlive-newfile-2017.133.1.0csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485112" comment="texlive-newlfm-2017.133.9.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485113" comment="texlive-newpx-2017.133.1.32svn44457-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485114" comment="texlive-newpx-fonts-2017.133.1.32svn44457-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485115" comment="texlive-newsletr-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485116" comment="texlive-newspaper-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485117" comment="texlive-newtx-2017.133.1.525svn44520-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485118" comment="texlive-newtx-fonts-2017.133.1.525svn44520-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485119" comment="texlive-newtxsf-2017.133.1.05svn41918-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485120" comment="texlive-newtxsf-fonts-2017.133.1.05svn41918-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485121" comment="texlive-newtxtt-2017.133.1.055svn44510-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485122" comment="texlive-newtxtt-fonts-2017.133.1.055svn44510-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485123" comment="texlive-newunicodechar-2017.133.1.1svn28253-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485124" comment="texlive-newvbtm-2017.133.1.1svn23996-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485125" comment="texlive-newverbs-2017.133.1.3asvn26258-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485126" comment="texlive-nextpage-2017.133.1.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485127" comment="texlive-nfssext-cfr-2017.133.svn43640-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485128" comment="texlive-nicefilelist-2017.133.0.0.7asvn28527-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485129" comment="texlive-niceframe-2017.133.1.1csvn36086-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485130" comment="texlive-nicetext-2017.133.r0.67svn38914-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485131" comment="texlive-nih-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485132" comment="texlive-nihbiosketch-2017.133.svn39460-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485133" comment="texlive-nimbus15-2017.133.1.00svn39343-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485134" comment="texlive-nimbus15-fonts-2017.133.1.00svn39343-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485135" comment="texlive-nkarta-2017.133.0.0.2svn16437-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485136" comment="texlive-nlctdoc-2017.133.1.06svn44353-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485137" comment="texlive-nmbib-2017.133.1.04svn37984-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485138" comment="texlive-noconflict-2017.133.1.0svn30140-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485139" comment="texlive-nodetree-2017.133.1.2svn43011-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485140" comment="texlive-noindentafter-2017.133.0.0.2.2svn35709-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485141" comment="texlive-noitcrul-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485142" comment="texlive-nolbreaks-2017.133.1.2svn26786-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485143" comment="texlive-nomencl-2017.133.3.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485144" comment="texlive-nomentbl-2017.133.0.0.4svn16549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485145" comment="texlive-nonfloat-2017.133.1.0svn17598-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485146" comment="texlive-nonumonpart-2017.133.1svn22114-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485147" comment="texlive-nopageno-2017.133.svn18128-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485148" comment="texlive-norasi-c90-2017.133.svn37675-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485149" comment="texlive-normalcolor-2017.133.r11svn40125-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485150" comment="texlive-nostarch-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485151" comment="texlive-notes-2017.133.1.0.1svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485152" comment="texlive-notes2bib-2017.133.2.0ksvn31162-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485153" comment="texlive-notespages-2017.133.0.0.8.1svn41906-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485154" comment="texlive-notex-bst-2017.133.svn42361-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485155" comment="texlive-noto-2017.133.svn42881-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485156" comment="texlive-noto-fonts-2017.133.svn42881-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485157" comment="texlive-notoccite-2017.133.svn18129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485158" comment="texlive-novel-2017.133.1.2svn44529-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485159" comment="texlive-novel-fonts-2017.133.1.2svn44529-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485160" comment="texlive-nowidow-2017.133.1.0svn24066-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485161" comment="texlive-nox-2017.133.1.0svn30991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485162" comment="texlive-nrc-2017.133.2.01asvn29027-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485163" comment="texlive-ntgclass-2017.133.2.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485164" comment="texlive-ntheorem-2017.133.1.33svn27609-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485165" comment="texlive-ntheorem-vn-2017.133.1.203svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485166" comment="texlive-nuc-2017.133.0.0.1svn22256-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485167" comment="texlive-nucleardata-2017.133.1.01dsvn42307-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485168" comment="texlive-numberedblock-2017.133.1.10svn33109-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485169" comment="texlive-numericplots-2017.133.2.0.2svn31729-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485170" comment="texlive-numname-2017.133.svn18130-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485171" comment="texlive-numprint-2017.133.1.39svn27498-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485172" comment="texlive-numspell-2017.133.1.0svn43189-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485173" comment="texlive-nwejm-2017.133.0.0.98dsvn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485174" comment="texlive-oberdiek-2017.133.svn43610-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485175" comment="texlive-objectz-2017.133.svn19389-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485176" comment="texlive-obnov-2017.133.0.0.11svn33355-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485177" comment="texlive-ocg-p-2017.133.0.0.4svn28803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485178" comment="texlive-ocgx-2017.133.0.0.5svn28492-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485179" comment="texlive-ocgx2-2017.133.0.0.29svn44528-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485180" comment="texlive-ocherokee-2017.133.svn25689-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485181" comment="texlive-ocherokee-fonts-2017.133.svn25689-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485182" comment="texlive-ocr-b-2017.133.svn20852-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485183" comment="texlive-ocr-b-outline-2017.133.svn20969-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485184" comment="texlive-ocr-b-outline-fonts-2017.133.svn20969-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485185" comment="texlive-ocr-latex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485186" comment="texlive-octavo-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485187" comment="texlive-odsfile-2017.133.0.0.6svn38449-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485188" comment="texlive-ofs-2017.133.svn16991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485189" comment="texlive-ogham-2017.133.svn24876-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485190" comment="texlive-oinuit-2017.133.svn28668-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485191" comment="texlive-oinuit-fonts-2017.133.svn28668-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485192" comment="texlive-old-arrows-2017.133.2.0svn42872-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485193" comment="texlive-old-arrows-fonts-2017.133.2.0svn42872-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485194" comment="texlive-oldlatin-2017.133.1.00svn17932-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485195" comment="texlive-oldstandard-2017.133.2.2svn41735-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485196" comment="texlive-oldstandard-fonts-2017.133.2.2svn41735-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485197" comment="texlive-oldstyle-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485198" comment="texlive-olsak-misc-2017.133.svn41526-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485199" comment="texlive-omega-2017.133.svn33046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485200" comment="texlive-omega-fonts-2017.133.svn33046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485201" comment="texlive-omegaware-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485203" comment="texlive-onlyamsmath-2017.133.0.0.20svn42927-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485204" comment="texlive-onrannual-2017.133.1.1svn17474-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485205" comment="texlive-opcit-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485206" comment="texlive-opensans-2017.133.1.2svn24706-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485207" comment="texlive-opensans-fonts-2017.133.1.2svn24706-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485208" comment="texlive-oplotsymbl-2017.133.1.2svn43091-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485209" comment="texlive-opteng-2017.133.1.0svn27331-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485210" comment="texlive-optidef-2017.133.2.4svn44505-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485211" comment="texlive-optional-2017.133.2.2bsvn18131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485212" comment="texlive-options-2017.133.1.0svn39030-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485213" comment="texlive-ordinalpt-2017.133.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485214" comment="texlive-orkhun-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485215" comment="texlive-oscola-2017.133.1.5svn43599-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485216" comment="texlive-ot-tableau-2017.133.svn35095-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485217" comment="texlive-othello-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485218" comment="texlive-othelloboard-2017.133.1.2svn23714-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485219" comment="texlive-otibet-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485220" comment="texlive-oubraces-2017.133.svn21833-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485221" comment="texlive-outline-2017.133.svn18360-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485222" comment="texlive-outliner-2017.133.0.0.94svn21095-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485223" comment="texlive-outlines-2017.133.1.1svn25192-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485224" comment="texlive-overlays-2017.133.2.7svn43431-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485225" comment="texlive-overlock-2017.133.svn34409-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485226" comment="texlive-overlock-fonts-2017.133.svn34409-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485227" comment="texlive-overpic-2017.133.0.0.53svn19712-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485228" comment="texlive-pacioli-2017.133.svn24947-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485229" comment="texlive-padauk-2017.133.3.002svn42617-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485230" comment="texlive-padauk-fonts-2017.133.3.002svn42617-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485231" comment="texlive-pagecolor-2017.133.1.0isvn44487-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485232" comment="texlive-pagecont-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485233" comment="texlive-pagenote-2017.133.1.1asvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485234" comment="texlive-pagerange-2017.133.0.0.5svn16915-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485235" comment="texlive-pageslts-2017.133.1.2fsvn39164-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485236" comment="texlive-palatino-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485237" comment="texlive-palatino-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485238" comment="texlive-paper-2017.133.1.0lsvn34521-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485239" comment="texlive-papercdcase-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485240" comment="texlive-papermas-2017.133.1.0hsvn23667-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485241" comment="texlive-papertex-2017.133.1.2bsvn19230-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485242" comment="texlive-paracol-2017.133.1.32svn38621-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485243" comment="texlive-parades-2017.133.svn40042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485244" comment="texlive-paralist-2017.133.2.7svn43021-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485245" comment="texlive-parallel-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485246" comment="texlive-paratype-2017.133.svn32859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485247" comment="texlive-paratype-fonts-2017.133.svn32859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485248" comment="texlive-paresse-2017.133.4.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485249" comment="texlive-parnotes-2017.133.3svn41868-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485250" comment="texlive-parrun-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485251" comment="texlive-parselines-2017.133.1.4svn21475-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485252" comment="texlive-parskip-2017.133.2.0svn19963-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485253" comment="texlive-pas-cours-2017.133.1.6svn42036-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485254" comment="texlive-pas-crosswords-2017.133.1.03svn32313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485255" comment="texlive-pas-cv-2017.133.2.01svn32263-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485256" comment="texlive-pas-tableur-2017.133.2.01svn39542-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485257" comment="texlive-passivetex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485258" comment="texlive-patch-2017.133.svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485259" comment="texlive-patchcmd-2017.133.1.05svn41379-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485260" comment="texlive-patgen-2017.133.2.3svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485262" comment="texlive-patgen2-tutorial-2017.133.svn16490-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485263" comment="texlive-path-2017.133.3.05svn22045-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485264" comment="texlive-pauldoc-2017.133.0.0.5svn16005-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485265" comment="texlive-pawpict-2017.133.1.0svn21629-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485266" comment="texlive-pax-2017.133.0.0.1lsvn26112-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485268" comment="texlive-pb-diagram-2017.133.5.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485269" comment="texlive-pbibtex-base-2017.133.svn40986-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485270" comment="texlive-pbox-2017.133.1.2svn24807-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485271" comment="texlive-pbsheet-2017.133.0.0.1svn24830-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485272" comment="texlive-pdf-trans-2017.133.2.4svn32809-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485273" comment="texlive-pdf14-2017.133.0.0.1svn17583-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485274" comment="texlive-pdfbook2-2017.133.1.2svn37537-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485276" comment="texlive-pdfcomment-2017.133.2.4svn41484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485277" comment="texlive-pdfcprot-2017.133.1.7asvn18735-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485278" comment="texlive-pdfcrop-2017.133.1.37svn29348-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485280" comment="texlive-pdfjam-2017.133.2.02svn29752-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485282" comment="texlive-pdflatexpicscale-2017.133.0.0.31svn43117-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485284" comment="texlive-pdfmarginpar-2017.133.0.0.92svn23492-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485285" comment="texlive-pdfpagediff-2017.133.1.4svn37946-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485286" comment="texlive-pdfpages-2017.133.0.0.5hsvn42973-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485287" comment="texlive-pdfscreen-2017.133.1.5svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485288" comment="texlive-pdfslide-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485289" comment="texlive-pdfsync-2017.133.svn20373-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485290" comment="texlive-pdftex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485292" comment="texlive-pdftex-fonts-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485293" comment="texlive-pdftools-2017.133.0.0.86svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485295" comment="texlive-pdftricks-2017.133.1.16svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485296" comment="texlive-pdftricks2-2017.133.1.01svn31016-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485297" comment="texlive-pdfwin-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485298" comment="texlive-pdfx-2017.133.1.5.84svn44412-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485299" comment="texlive-pdfxup-2017.133.1.30svn40690-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485301" comment="texlive-pecha-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485302" comment="texlive-pedigree-perl-2017.133.1.0svn31990-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485304" comment="texlive-perception-2017.133.svn42683-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485305" comment="texlive-perfectcut-2017.133.2.2svn44175-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485306" comment="texlive-perltex-2017.133.2.1svn38719-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485308" comment="texlive-permute-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485309" comment="texlive-persian-bib-2017.133.0.0.9svn37297-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485310" comment="texlive-petiteannonce-2017.133.1.0001svn25915-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485311" comment="texlive-petri-nets-2017.133.svn39165-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485313" comment="texlive-pfarrei-2017.133.r36svn31934-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485315" comment="texlive-pgf-2017.133.3.0.1asvn44231-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485316" comment="texlive-pgf-blur-2017.133.1.01svn31693-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485317" comment="texlive-pgf-soroban-2017.133.1.1svn32269-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485318" comment="texlive-pgf-spectra-2017.133.1.0svn42986-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485319" comment="texlive-pgf-umlcd-2017.133.0.0.2.1.1svn33307-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485320" comment="texlive-pgf-umlsd-2017.133.0.0.7svn33045-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485321" comment="texlive-pgfgantt-2017.133.4.0svn31037-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485322" comment="texlive-pgfkeyx-2017.133.0.0.0.1svn26093-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485323" comment="texlive-pgfmolbio-2017.133.0.0.21svn35152-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485324" comment="texlive-pgfopts-2017.133.2.1asvn34573-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485325" comment="texlive-pgfornament-2017.133.0.0.21svn39988-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485326" comment="texlive-pgfplots-2017.133.1.15svn44469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485327" comment="texlive-phaistos-2017.133.1.0svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485328" comment="texlive-phaistos-fonts-2017.133.1.0svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485329" comment="texlive-phffullpagefigure-2017.133.1.0svn41857-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485330" comment="texlive-phfnote-2017.133.1.0svn41858-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485331" comment="texlive-phfparen-2017.133.1.0svn41859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485332" comment="texlive-phfqit-2017.133.1.0svn41860-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485333" comment="texlive-phfquotetext-2017.133.1.0svn41869-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485334" comment="texlive-phfsvnwatermark-2017.133.1.0svn41870-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485335" comment="texlive-phfthm-2017.133.1.0svn41871-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485336" comment="texlive-philex-2017.133.1.3svn36396-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485337" comment="texlive-philokalia-2017.133.1.1svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485338" comment="texlive-philokalia-fonts-2017.133.1.1svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485339" comment="texlive-philosophersimprint-2017.133.1.4svn41788-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485340" comment="texlive-phonenumbers-2017.133.1.2.1svn43482-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485341" comment="texlive-phonetic-2017.133.svn21871-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485342" comment="texlive-phonrule-2017.133.1.3.2svn43963-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485343" comment="texlive-photo-2017.133.svn18739-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485344" comment="texlive-physics-2017.133.1.3svn28590-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485345" comment="texlive-piano-2017.133.1.0svn21574-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485346" comment="texlive-picinpar-2017.133.1.2asvn20374-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485347" comment="texlive-pict2e-2017.133.0.0.3bsvn39591-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485348" comment="texlive-pictex-2017.133.1.1svn21943-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485349" comment="texlive-pictex2-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485350" comment="texlive-pictexsum-2017.133.svn24965-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485351" comment="texlive-piechartmp-2017.133.0.0.3.0svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485352" comment="texlive-piff-2017.133.svn21894-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485353" comment="texlive-pigpen-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485354" comment="texlive-pigpen-fonts-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485355" comment="texlive-pinlabel-2017.133.1.2svn24769-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485356" comment="texlive-pitex-2017.133.svn24731-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485357" comment="texlive-pittetd-2017.133.1.618svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485358" comment="texlive-pkfix-2017.133.1.7svn26032-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485360" comment="texlive-pkfix-helper-2017.133.1.4svn29725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485362" comment="texlive-pkgloader-2017.133.0.0.5.0svn35711-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485363" comment="texlive-pkuthss-2017.133.1.7.4svn43374-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485364" comment="texlive-pl-2017.133.1.09svn36012-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485365" comment="texlive-pl-fonts-2017.133.1.09svn36012-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485366" comment="texlive-placeat-2017.133.0.0.1svn33526-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485367" comment="texlive-placeins-2017.133.2.2svn19848-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485368" comment="texlive-placeins-plain-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485369" comment="texlive-plain-2017.133.3.141592653svn43076-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485370" comment="texlive-plain-doc-2017.133.svn28424-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485371" comment="texlive-plainpkg-2017.133.0.0.4asvn27765-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485372" comment="texlive-plantslabels-2017.133.1.0svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485373" comment="texlive-plari-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485374" comment="texlive-plates-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485375" comment="texlive-platex-2017.133.svn44209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485377" comment="texlive-platex-tools-2017.133.svn44208-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485378" comment="texlive-platexcheat-2017.133.2.0svn42918-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485379" comment="texlive-play-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485380" comment="texlive-playfair-2017.133.svn34236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485381" comment="texlive-playfair-fonts-2017.133.svn34236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485382" comment="texlive-plipsum-2017.133.4.3svn30353-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485383" comment="texlive-plnfss-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485384" comment="texlive-plstmary-2017.133.0.0.5csvn31088-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485385" comment="texlive-plweb-2017.133.3.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485386" comment="texlive-pmgraph-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485387" comment="texlive-pmx-2017.133.2.76svn43869-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485389" comment="texlive-pmxchords-2017.133.2.0.2svn39249-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485391" comment="texlive-pnas2009-2017.133.1.0svn16287-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485392" comment="texlive-poemscol-2017.133.2.72svn40613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485393" comment="texlive-poetrytex-2017.133.3.0.1svn39921-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485394" comment="texlive-polski-2017.133.1.3.4svn44213-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485395" comment="texlive-poltawski-2017.133.1.101svn20075-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485396" comment="texlive-poltawski-fonts-2017.133.1.101svn20075-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485397" comment="texlive-polyglossia-2017.133.1.42.4svn40138-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485398" comment="texlive-polynom-2017.133.0.0.18svn42664-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485399" comment="texlive-polynomial-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485400" comment="texlive-polytable-2017.133.0.0.8.2svn31235-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485401" comment="texlive-postcards-2017.133.svn21641-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485402" comment="texlive-poster-mac-2017.133.1.1svn18305-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485403" comment="texlive-powerdot-2017.133.1.5asvn38984-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485404" comment="texlive-powerdot-FUBerlin-2017.133.0.0.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485405" comment="texlive-ppr-prv-2017.133.0.0.13csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485406" comment="texlive-pracjourn-2017.133.0.0.4nsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485407" comment="texlive-preprint-2017.133.2011svn30447-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485408" comment="texlive-prerex-2017.133.svn40613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485409" comment="texlive-present-2017.133.2.2svn25953-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485410" comment="texlive-presentations-2017.133.svn43949-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485411" comment="texlive-presentations-en-2017.133.svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485412" comment="texlive-pressrelease-2017.133.1.0svn35147-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485413" comment="texlive-prettyref-2017.133.3.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485414" comment="texlive-preview-2017.133.11.90svn44227-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485415" comment="texlive-prftree-2017.133.1.5svn41985-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485416" comment="texlive-printlen-2017.133.1.1asvn19847-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485417" comment="texlive-proba-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485418" comment="texlive-probsoln-2017.133.3.04svn29371-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485419" comment="texlive-procIAGssymp-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485420" comment="texlive-prodint-2017.133.svn21893-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485421" comment="texlive-prodint-fonts-2017.133.svn21893-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485422" comment="texlive-productbox-2017.133.1.1svn20886-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485423" comment="texlive-program-2017.133.3.3.14svn44214-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485424" comment="texlive-progress-2017.133.1.10svn19519-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485425" comment="texlive-progressbar-2017.133.1.0b_4svn33822-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485426" comment="texlive-proofread-2017.133.1.02svn43370-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485427" comment="texlive-prooftrees-2017.133.0.0.6svn43184-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485428" comment="texlive-properties-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485429" comment="texlive-proposal-2017.133.svn40538-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485430" comment="texlive-prosper-2017.133.1.0hsvn33033-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485431" comment="texlive-protex-2017.133.svn41633-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485432" comment="texlive-protocol-2017.133.1.13svn25562-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485433" comment="texlive-przechlewski-book-2017.133.svn23552-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485434" comment="texlive-ps2pk-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485436" comment="texlive-psbao-2017.133.0.0.17svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485437" comment="texlive-pseudocode-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485438" comment="texlive-psfrag-2017.133.3.04svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485439" comment="texlive-psfrag-italian-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485440" comment="texlive-psfragx-2017.133.1.1svn26243-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485441" comment="texlive-psgo-2017.133.0.0.17svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485442" comment="texlive-psizzl-2017.133.0.0.35svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485443" comment="texlive-pslatex-2017.133.svn16416-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485444" comment="texlive-psnfss-2017.133.9.2asvn33946-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485445" comment="texlive-pspicture-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485446" comment="texlive-pst-2dplot-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485447" comment="texlive-pst-3d-2017.133.1.10svn17257-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485448" comment="texlive-pst-3dplot-2017.133.2.04svn43703-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485449" comment="texlive-pst-abspos-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485450" comment="texlive-pst-am-2017.133.1.02svn19591-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485451" comment="texlive-pst-arrow-2017.133.0.0.01svn41980-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485452" comment="texlive-pst-asr-2017.133.1.3svn22138-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485453" comment="texlive-pst-bar-2017.133.0.0.92svn18734-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485454" comment="texlive-pst-barcode-2017.133.0.0.16asvn43996-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485455" comment="texlive-pst-bezier-2017.133.0.0.03svn41981-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485456" comment="texlive-pst-blur-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485457" comment="texlive-pst-bspline-2017.133.1.62svn40685-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485458" comment="texlive-pst-calendar-2017.133.0.0.47svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485459" comment="texlive-pst-cie-2017.133.1.05svn41223-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485460" comment="texlive-pst-circ-2017.133.2.14svn41901-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485461" comment="texlive-pst-coil-2017.133.1.07svn37377-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485462" comment="texlive-pst-cox-2017.133.0.0.98_betasvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485463" comment="texlive-pst-dbicons-2017.133.0.0.16svn17556-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485464" comment="texlive-pst-diffraction-2017.133.2.03svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485465" comment="texlive-pst-electricfield-2017.133.0.0.14svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485466" comment="texlive-pst-eps-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485467" comment="texlive-pst-eucl-2017.133.1.56svn43911-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485468" comment="texlive-pst-eucl-translation-bg-2017.133.1.3.2svn19296-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485469" comment="texlive-pst-exa-2017.133.0.0.05svn35248-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485470" comment="texlive-pst-fill-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485471" comment="texlive-pst-fit-2017.133.0.0.01svn28155-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485472" comment="texlive-pst-fr3d-2017.133.1.10svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485473" comment="texlive-pst-fractal-2017.133.0.0.06svn16958-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485474" comment="texlive-pst-fun-2017.133.0.0.04svn17909-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485475" comment="texlive-pst-func-2017.133.0.0.85svn43912-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485476" comment="texlive-pst-gantt-2017.133.0.0.22asvn35832-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485477" comment="texlive-pst-geo-2017.133.0.0.06svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485478" comment="texlive-pst-ghsb-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485479" comment="texlive-pst-gr3d-2017.133.1.34svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485480" comment="texlive-pst-grad-2017.133.1.06svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485481" comment="texlive-pst-graphicx-2017.133.0.0.02svn21717-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485482" comment="texlive-pst-infixplot-2017.133.0.0.11svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485483" comment="texlive-pst-intersect-2017.133.0.0.4svn33210-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485484" comment="texlive-pst-jtree-2017.133.2.6svn20946-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485485" comment="texlive-pst-knot-2017.133.0.0.2svn16033-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485486" comment="texlive-pst-labo-2017.133.2.04svn39077-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485487" comment="texlive-pst-layout-2017.133.0.0.95svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485488" comment="texlive-pst-lens-2017.133.1.02svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485489" comment="texlive-pst-light3d-2017.133.0.0.12svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485490" comment="texlive-pst-magneticfield-2017.133.1.13svn18922-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485491" comment="texlive-pst-math-2017.133.0.0.63svn34786-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485492" comment="texlive-pst-mirror-2017.133.1.01svn32997-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485493" comment="texlive-pst-node-2017.133.1.39svn43015-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485494" comment="texlive-pst-ob3d-2017.133.0.0.21svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485495" comment="texlive-pst-ode-2017.133.0.0.7svn35418-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485496" comment="texlive-pst-optexp-2017.133.5.2svn35673-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485497" comment="texlive-pst-optic-2017.133.1.02svn41999-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485498" comment="texlive-pst-osci-2017.133.2.82svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485499" comment="texlive-pst-ovl-2017.133.0.0.07svn40873-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485500" comment="texlive-pst-pad-2017.133.0.0.3bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485501" comment="texlive-pst-pdf-2017.133.1.2csvn44047-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485503" comment="texlive-pst-pdgr-2017.133.0.0.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485504" comment="texlive-pst-perspective-2017.133.1.05svn39585-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485505" comment="texlive-pst-platon-2017.133.0.0.01svn16538-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485506" comment="texlive-pst-plot-2017.133.1.79svn44511-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485507" comment="texlive-pst-poly-2017.133.1.63svn35062-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485508" comment="texlive-pst-pulley-2017.133.0.0.01svn25142-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485509" comment="texlive-pst-qtree-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485510" comment="texlive-pst-rubans-2017.133.1.2svn23464-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485511" comment="texlive-pst-shell-2017.133.0.0.03svn42840-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485512" comment="texlive-pst-sigsys-2017.133.1.4svn21667-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485513" comment="texlive-pst-slpe-2017.133.1.31svn24391-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485514" comment="texlive-pst-solarsystem-2017.133.0.0.12svn24995-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485515" comment="texlive-pst-solides3d-2017.133.4.32asvn43401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485516" comment="texlive-pst-soroban-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485517" comment="texlive-pst-spectra-2017.133.0.0.91svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485518" comment="texlive-pst-spinner-2017.133.1.02svn44507-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485519" comment="texlive-pst-spirograph-2017.133.0.0.41svn35026-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485520" comment="texlive-pst-stru-2017.133.0.0.13svn38613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485521" comment="texlive-pst-support-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485522" comment="texlive-pst-text-2017.133.1.00svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485523" comment="texlive-pst-thick-2017.133.1.0svn16369-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485524" comment="texlive-pst-tools-2017.133.0.0.06svn44320-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485525" comment="texlive-pst-tree-2017.133.1.13svn43272-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485526" comment="texlive-pst-tvz-2017.133.1.01svn23451-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485527" comment="texlive-pst-uml-2017.133.0.0.83svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485528" comment="texlive-pst-vectorian-2017.133.0.0.4svn28801-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485529" comment="texlive-pst-vehicle-2017.133.1.1svn44466-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485530" comment="texlive-pst-vowel-2017.133.1.0svn25228-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485531" comment="texlive-pst-vue3d-2017.133.1.24svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485532" comment="texlive-pst2pdf-2017.133.0.0.16svn35247-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485534" comment="texlive-pstool-2017.133.1.5csvn34015-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485535" comment="texlive-pstools-2017.133.1.68svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485537" comment="texlive-pstricks-2017.133.2.73asvn44506-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485538" comment="texlive-pstricks-add-2017.133.3.83svn44281-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485539" comment="texlive-pstricks_calcnotes-2017.133.1.2svn34363-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485540" comment="texlive-pstring-2017.133.svn42857-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485541" comment="texlive-psu-thesis-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485542" comment="texlive-ptex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485543" comment="texlive-ptex-base-2017.133.svn43899-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485545" comment="texlive-ptex-fontmaps-2017.133.20170114.0svn44206-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485547" comment="texlive-ptex-fonts-2017.133.svn42950-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485548" comment="texlive-ptex-fonts-fonts-2017.133.svn42950-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485549" comment="texlive-ptex2pdf-2017.133.20170604.0svn44470-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485552" comment="texlive-ptext-2017.133.1.1svn30171-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485553" comment="texlive-ptptex-2017.133.0.0.91svn19440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485554" comment="texlive-punk-2017.133.svn27388-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485555" comment="texlive-punk-latex-2017.133.1.1svn27389-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485556" comment="texlive-punknova-2017.133.1.003svn24649-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485557" comment="texlive-punknova-fonts-2017.133.1.003svn24649-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485558" comment="texlive-purifyeps-2017.133.1.1svn29725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485560" comment="texlive-pxbase-2017.133.1.1svn44482-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485561" comment="texlive-pxchfon-2017.133.1.0svn44459-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485562" comment="texlive-pxcjkcat-2017.133.1.0svn27780-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485563" comment="texlive-pxfonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485564" comment="texlive-pxfonts-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485565" comment="texlive-pxgreeks-2017.133.1.0svn21838-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485566" comment="texlive-pxjahyper-2017.133.0.0.3svn40612-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485567" comment="texlive-pxpgfmark-2017.133.0.0.2svn30212-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485568" comment="texlive-pxrubrica-2017.133.1.3asvn44225-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485569" comment="texlive-pxtatescale-2017.133.0.0.4svn43009-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485570" comment="texlive-pxtxalfa-2017.133.1svn23682-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485571" comment="texlive-pygmentex-2017.133.0.0.8svn34996-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485573" comment="texlive-python-2017.133.0.0.21svn27064-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485574" comment="texlive-pythonhighlight-2017.133.svn43191-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485575" comment="texlive-pythontex-2017.133.0.0.15svn41746-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485577" comment="texlive-qcircuit-2017.133.2.5.3svn42816-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485578" comment="texlive-qcm-2017.133.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485579" comment="texlive-qobitree-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485580" comment="texlive-qpxqtx-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485581" comment="texlive-qrcode-2017.133.1.51svn36065-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485582" comment="texlive-qstest-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485583" comment="texlive-qsymbols-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485584" comment="texlive-qtree-2017.133.3.1bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485585" comment="texlive-quattrocento-2017.133.svn31763-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485586" comment="texlive-quattrocento-fonts-2017.133.svn31763-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485587" comment="texlive-quicktype-2017.133.0.0.1svn42183-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485588" comment="texlive-quotchap-2017.133.1.1svn28046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485589" comment="texlive-quoting-2017.133.0.0.1csvn32818-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485590" comment="texlive-quotmark-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485591" comment="texlive-quran-2017.133.1.252svn43360-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485592" comment="texlive-r_und_s-2017.133.1.3isvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485593" comment="texlive-raleway-2017.133.1.4svn42629-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485594" comment="texlive-raleway-fonts-2017.133.1.4svn42629-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485595" comment="texlive-ran_toks-2017.133.1.1svn44429-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485596" comment="texlive-randbild-2017.133.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485597" comment="texlive-randomlist-2017.133.1.2svn41727-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485598" comment="texlive-randomwalk-2017.133.0.0.4svn38418-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485599" comment="texlive-randtext-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485600" comment="texlive-rccol-2017.133.1.2csvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485601" comment="texlive-rcs-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485602" comment="texlive-rcs-multi-2017.133.0.0.1asvn21939-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485603" comment="texlive-rcsinfo-2017.133.1.11svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485604" comment="texlive-readarray-2017.133.2.0svn42467-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485605" comment="texlive-realboxes-2017.133.0.0.2svn23581-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485606" comment="texlive-realscripts-2017.133.0.0.3dsvn39706-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485607" comment="texlive-rec-thy-2017.133.1.3svn27225-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485608" comment="texlive-recipe-2017.133.0.0.9svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485609" comment="texlive-recipebook-2017.133.svn37026-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485610" comment="texlive-recipecard-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485611" comment="texlive-rectopma-2017.133.svn19980-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485612" comment="texlive-recycle-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485613" comment="texlive-recycle-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485614" comment="texlive-refcheck-2017.133.1.9.1svn29128-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485615" comment="texlive-refenums-2017.133.1.1.2svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485616" comment="texlive-reflectgraphics-2017.133.0.0.2csvn40612-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485617" comment="texlive-refman-2017.133.2.0esvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485618" comment="texlive-refstyle-2017.133.0.0.5svn20318-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485619" comment="texlive-regcount-2017.133.1.0svn19979-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485620" comment="texlive-regexpatch-2017.133.0.0.2bsvn41204-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485621" comment="texlive-register-2017.133.1.6svn21127-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485622" comment="texlive-regstats-2017.133.1.0hsvn25050-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485623" comment="texlive-reledmac-2017.133.2.22.0svn44545-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485624" comment="texlive-relenc-2017.133.svn22050-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485625" comment="texlive-relsize-2017.133.4.1svn30707-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485626" comment="texlive-reotex-2017.133.1.1svn34924-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485627" comment="texlive-repeatindex-2017.133.0.0.01svn24305-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485628" comment="texlive-repere-2017.133.17.05svn44298-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485629" comment="texlive-repltext-2017.133.1.0svn33442-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485630" comment="texlive-resphilosophica-2017.133.1.31svn43631-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485631" comment="texlive-resumecls-2017.133.0.0.3.2svn38427-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485632" comment="texlive-resumemac-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485633" comment="texlive-reverxii-2017.133.svn24976-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485634" comment="texlive-revquantum-2017.133.0.0.11svn43505-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485635" comment="texlive-revtex-2017.133.4.1rsvn19652-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485636" comment="texlive-revtex4-2017.133.svn16488-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485637" comment="texlive-ribbonproofs-2017.133.1.0svn31137-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485638" comment="texlive-rjlparshap-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485639" comment="texlive-rlepsf-2017.133.svn19082-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485640" comment="texlive-rmathbr-2017.133.1.0.3svn40415-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485641" comment="texlive-rmpage-2017.133.0.0.92svn20002-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485642" comment="texlive-roboto-2017.133.svn38386-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485643" comment="texlive-roboto-fonts-2017.133.svn38386-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485644" comment="texlive-robustcommand-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485645" comment="texlive-robustindex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485646" comment="texlive-roex-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485647" comment="texlive-romanbar-2017.133.1.0fsvn25005-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485648" comment="texlive-romanbarpagenumber-2017.133.1.0svn36236-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485649" comment="texlive-romande-2017.133.1.008_v7_scsvn19537-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485650" comment="texlive-romande-fonts-2017.133.1.008_v7_scsvn19537-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485651" comment="texlive-romanneg-2017.133.svn20087-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485652" comment="texlive-romannum-2017.133.1.0bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485653" comment="texlive-rosario-2017.133.1.0svn40843-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485654" comment="texlive-rosario-fonts-2017.133.1.0svn40843-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485655" comment="texlive-rotfloat-2017.133.1.2svn18292-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485656" comment="texlive-rotpages-2017.133.3.0svn18740-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485657" comment="texlive-roundbox-2017.133.0.0.2svn29675-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485658" comment="texlive-roundrect-2017.133.2.2svn39796-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485659" comment="texlive-rputover-2017.133.1.0svn43624-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485660" comment="texlive-rrgtrees-2017.133.1.1svn27322-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485661" comment="texlive-rsc-2017.133.3.1fsvn41923-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485662" comment="texlive-rsfs-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485663" comment="texlive-rsfs-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485664" comment="texlive-rsfso-2017.133.1.02svn37965-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485665" comment="texlive-rterface-2017.133.svn30084-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485666" comment="texlive-rtkinenc-2017.133.1.0svn20003-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485667" comment="texlive-rtklage-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485668" comment="texlive-rubik-2017.133.4.0svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485670" comment="texlive-ruhyphen-2017.133.1.6svn21081-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485671" comment="texlive-rulercompass-2017.133.1svn32392-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485672" comment="texlive-russ-2017.133.svn25209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485673" comment="texlive-rutitlepage-2017.133.1.0svn44485-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485674" comment="texlive-rviewport-2017.133.1.0svn23739-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485675" comment="texlive-rvwrite-2017.133.1.2svn19614-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485676" comment="texlive-ryethesis-2017.133.1.36svn33945-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485677" comment="texlive-sa-tikz-2017.133.0.0.7asvn32815-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485678" comment="texlive-sageep-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485679" comment="texlive-sanitize-umlaut-2017.133.1.00svn41365-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485680" comment="texlive-sanskrit-2017.133.2.2.1svn42925-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485681" comment="texlive-sanskrit-t1-2017.133.svn35737-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485682" comment="texlive-sanskrit-t1-fonts-2017.133.svn35737-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485683" comment="texlive-sansmath-2017.133.1.1svn17997-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485684" comment="texlive-sansmathaccent-2017.133.svn30187-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485685" comment="texlive-sansmathfonts-2017.133.svn43252-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485686" comment="texlive-sansmathfonts-fonts-2017.133.svn43252-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485687" comment="texlive-sapthesis-2017.133.3.8svn39014-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485688" comment="texlive-sasnrdisplay-2017.133.0.0.93svn33120-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485689" comment="texlive-sauerj-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485690" comment="texlive-sauter-2017.133.2.4svn13293-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485691" comment="texlive-sauterfonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485692" comment="texlive-savefnmark-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485693" comment="texlive-savesym-2017.133.1.2svn31565-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485694" comment="texlive-savetrees-2017.133.2.4svn40525-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485695" comment="texlive-scale-2017.133.1.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485696" comment="texlive-scalebar-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485697" comment="texlive-scalerel-2017.133.1.8svn42809-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485698" comment="texlive-scanpages-2017.133.1.05asvn42633-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485699" comment="texlive-scanpages-fonts-2017.133.1.05asvn42633-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485700" comment="texlive-schemabloc-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485701" comment="texlive-schemata-2017.133.0.0.8svn39510-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485702" comment="texlive-schule-2017.133.0.0.6svn37277-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485703" comment="texlive-schulschriften-2017.133.4svn35730-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485704" comment="texlive-schwalbe-chess-2017.133.2.1svn39318-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485705" comment="texlive-sciposter-2017.133.1.18svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485706" comment="texlive-sclang-prettifier-2017.133.0.0.1svn35087-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485707" comment="texlive-scratch-2017.133.0.0.2svn44490-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485708" comment="texlive-screenplay-2017.133.1.6svn27223-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485709" comment="texlive-screenplay-pkg-2017.133.1.0svn37893-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485710" comment="texlive-scrjrnl-2017.133.0.0.1svn27810-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485711" comment="texlive-scrlttr2copy-2017.133.0.0.1dsvn39734-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485712" comment="texlive-scsnowman-2017.133.1.1svn43017-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485713" comment="texlive-sdrt-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485714" comment="texlive-sduthesis-2017.133.1.2.1svn41401-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485715" comment="texlive-secdot-2017.133.1.0svn20208-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485716" comment="texlive-section-2017.133.svn20180-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485717" comment="texlive-sectionbox-2017.133.1.01svn37749-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485718" comment="texlive-sectsty-2017.133.2.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485719" comment="texlive-seealso-2017.133.1.2svn43595-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485720" comment="texlive-seetexk-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485722" comment="texlive-selectp-2017.133.1.0svn20185-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485723" comment="texlive-selnolig-2017.133.0.0.302svn38721-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485724" comment="texlive-semantic-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485725" comment="texlive-semantic-markup-2017.133.svn42374-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485726" comment="texlive-semaphor-2017.133.svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485727" comment="texlive-semaphor-fonts-2017.133.svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485728" comment="texlive-seminar-2017.133.1.62svn34011-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485729" comment="texlive-semioneside-2017.133.0.0.41svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485730" comment="texlive-semproc-2017.133.0.0.1svn37568-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485731" comment="texlive-sepfootnotes-2017.133.0.0.3csvn41732-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485732" comment="texlive-sepnum-2017.133.2.0svn20186-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485733" comment="texlive-seqsplit-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485734" comment="texlive-serbian-apostrophe-2017.133.svn23799-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485735" comment="texlive-serbian-date-lat-2017.133.svn23446-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485736" comment="texlive-serbian-def-cyr-2017.133.svn23734-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485737" comment="texlive-serbian-lig-2017.133.svn39096-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485738" comment="texlive-sesamanuel-2017.133.0.0.6svn36613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485739" comment="texlive-sesstime-2017.133.1.0svn44157-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485740" comment="texlive-setdeck-2017.133.0.0.1svn40613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485741" comment="texlive-setspace-2017.133.6.7asvn24881-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485742" comment="texlive-seuthesis-2017.133.2.1.2svn33042-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485743" comment="texlive-seuthesix-2017.133.1.0.1svn40088-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485744" comment="texlive-sf298-2017.133.1.3svn41653-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485745" comment="texlive-sffms-2017.133.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485746" comment="texlive-sfg-2017.133.0.0.91svn20209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485747" comment="texlive-sfmath-2017.133.0.0.8svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485748" comment="texlive-sgame-2017.133.2.15svn30959-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485749" comment="texlive-shade-2017.133.1svn22212-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485750" comment="texlive-shadethm-2017.133.svn20319-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485751" comment="texlive-shadow-2017.133.svn20312-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485752" comment="texlive-shadowtext-2017.133.0.0.3svn26522-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485753" comment="texlive-shapepar-2017.133.2.2svn30708-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485754" comment="texlive-shapes-2017.133.1.1svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485755" comment="texlive-shdoc-2017.133.2.1bsvn41991-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485756" comment="texlive-shipunov-2017.133.1.1svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485757" comment="texlive-shorttoc-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485758" comment="texlive-show2e-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485759" comment="texlive-showcharinbox-2017.133.0.0.1svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485760" comment="texlive-showdim-2017.133.1.2svn28918-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485761" comment="texlive-showexpl-2017.133.0.0.3osvn42677-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485762" comment="texlive-showhyphens-2017.133.0.0.5csvn39787-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485763" comment="texlive-showlabels-2017.133.1.8svn41322-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485764" comment="texlive-showtags-2017.133.1.05svn20336-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485765" comment="texlive-shuffle-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485766" comment="texlive-sidecap-2017.133.1.6fsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485767" comment="texlive-sidenotes-2017.133.1.00svn40658-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485768" comment="texlive-sides-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485769" comment="texlive-signchart-2017.133.1.01svn39707-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485770" comment="texlive-silence-2017.133.1.5bsvn27028-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485771" comment="texlive-simple-resume-cv-2017.133.svn43057-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485772" comment="texlive-simple-thesis-dissertation-2017.133.svn43058-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485773" comment="texlive-simplecd-2017.133.1.4svn29260-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485774" comment="texlive-simplecv-2017.133.1.6asvn35537-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485775" comment="texlive-simpler-wick-2017.133.1.0.0svn39074-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485776" comment="texlive-simplewick-2017.133.1.2asvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485777" comment="texlive-simplified-latex-2017.133.svn20620-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485778" comment="texlive-simurgh-2017.133.0.0.01bsvn31719-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485779" comment="texlive-sitem-2017.133.1.0svn22136-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485780" comment="texlive-siunitx-2017.133.2.7gsvn44428-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485781" comment="texlive-skak-2017.133.1.5.2svn32758-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485782" comment="texlive-skaknew-2017.133.svn20031-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485783" comment="texlive-skaknew-fonts-2017.133.svn20031-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485784" comment="texlive-skb-2017.133.0.0.52svn22781-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485785" comment="texlive-skdoc-2017.133.1.5svn43170-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485786" comment="texlive-skeycommand-2017.133.0.0.4svn24652-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485787" comment="texlive-skeyval-2017.133.1.3svn30560-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485788" comment="texlive-skmath-2017.133.0.0.4bsvn42902-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485789" comment="texlive-skrapport-2017.133.0.0.12gsvn42903-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485790" comment="texlive-skull-2017.133.0.0.1svn25608-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485791" comment="texlive-slantsc-2017.133.2.11svn25007-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485792" comment="texlive-slideshow-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485793" comment="texlive-smalltableof-2017.133.svn20333-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485794" comment="texlive-smartdiagram-2017.133.0.0.3bsvn42781-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485795" comment="texlive-smartref-2017.133.1.9svn20311-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485796" comment="texlive-smartunits-2017.133.1.2svn39592-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485797" comment="texlive-snapshot-2017.133.1.14svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485798" comment="texlive-snotez-2017.133.0.0.3svn30355-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485799" comment="texlive-songbook-2017.133.4.5svn18136-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485800" comment="texlive-songs-2017.133.3.0svn44553-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485801" comment="texlive-sort-by-letters-2017.133.svn27128-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485802" comment="texlive-soton-2017.133.0.0.1svn16215-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485803" comment="texlive-soul-2017.133.2.4svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485804" comment="texlive-soup-2017.133.1.0svn42992-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485805" comment="texlive-sourcecodepro-2017.133.2.6svn40597-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485806" comment="texlive-sourcecodepro-fonts-2017.133.2.6svn40597-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485807" comment="texlive-sourcesanspro-2017.133.2.6svn42852-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485808" comment="texlive-sourcesanspro-fonts-2017.133.2.6svn42852-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485809" comment="texlive-sourceserifpro-2017.133.1.2svn40598-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485810" comment="texlive-sourceserifpro-fonts-2017.133.1.2svn40598-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485811" comment="texlive-spalign-2017.133.svn42225-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485812" comment="texlive-spanish-mx-2017.133.1.1asvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485813" comment="texlive-sparklines-2017.133.1.7svn42821-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485814" comment="texlive-spath3-2017.133.1.1svn39794-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485815" comment="texlive-spelling-2017.133.0.0.41svn30715-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485816" comment="texlive-sphdthesis-2017.133.1.0svn34374-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485817" comment="texlive-spie-2017.133.3.25svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485818" comment="texlive-splines-2017.133.0.0.2svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485819" comment="texlive-splitbib-2017.133.1.17svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485820" comment="texlive-splitindex-2017.133.1.2csvn39766-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485822" comment="texlive-spot-2017.133.1.1svn22408-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485823" comment="texlive-spotcolor-2017.133.1.2svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485824" comment="texlive-spreadtab-2017.133.0.0.4csvn35531-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485825" comment="texlive-spverbatim-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485826" comment="texlive-sr-vorl-2017.133.1.1svn39529-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485827" comment="texlive-srbook-mem-2017.133.svn23454-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485828" comment="texlive-srcltx-2017.133.1.6svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485829" comment="texlive-srcredact-2017.133.1.0svn38710-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485831" comment="texlive-sseq-2017.133.2.01svn31585-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485832" comment="texlive-sslides-2017.133.svn32293-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485833" comment="texlive-stack-2017.133.1.00svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485834" comment="texlive-stackengine-2017.133.4.01svn43221-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485835" comment="texlive-stage-2017.133.1.00svn44100-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485836" comment="texlive-standalone-2017.133.1.2svn37875-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485837" comment="texlive-stanli-2017.133.3.0svn42765-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485838" comment="texlive-starfont-2017.133.1.2svn19982-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485839" comment="texlive-starfont-fonts-2017.133.1.2svn19982-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485840" comment="texlive-startex-2017.133.1.04svn35718-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485841" comment="texlive-statex-2017.133.1.6svn20306-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485842" comment="texlive-statex2-2017.133.2.1svn23961-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485843" comment="texlive-statistik-2017.133.0.0.03svn20334-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485844" comment="texlive-staves-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485845" comment="texlive-staves-fonts-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485846" comment="texlive-stdclsdv-2017.133.1.1asvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485847" comment="texlive-stdpage-2017.133.0.0.6svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485848" comment="texlive-steinmetz-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485849" comment="texlive-stellenbosch-2017.133.11asvn36696-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485850" comment="texlive-stex-2017.133.svn40320-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485851" comment="texlive-stix-2017.133.1.1.2svn36914-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485852" comment="texlive-stix-fonts-2017.133.1.1.2svn36914-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485853" comment="texlive-stmaryrd-2017.133.svn22027-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485854" comment="texlive-stmaryrd-fonts-2017.133.svn22027-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485855" comment="texlive-storebox-2017.133.1.3asvn24895-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485856" comment="texlive-storecmd-2017.133.0.0.0.2svn24431-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485857" comment="texlive-stringstrings-2017.133.1.23svn36203-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485858" comment="texlive-struktex-2017.133.141svn25916-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485859" comment="texlive-sttools-2017.133.2.0svn43684-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485860" comment="texlive-stubs-2017.133.0.0.1.1svn19440-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485861" comment="texlive-studenthandouts-2017.133.1.0svn43516-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485862" comment="texlive-sty2dtx-2017.133.2.3svn29743-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485864" comment="texlive-suanpan-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485865" comment="texlive-subdepth-2017.133.0.0.1svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485866" comment="texlive-subeqn-2017.133.2.0bsvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485867" comment="texlive-subeqnarray-2017.133.2.1csvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485868" comment="texlive-subfig-2017.133.1.3svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485869" comment="texlive-subfigmat-2017.133.1.0svn20308-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485870" comment="texlive-subfigure-2017.133.2.1.5svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485871" comment="texlive-subfiles-2017.133.1.1svn26645-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485872" comment="texlive-subfloat-2017.133.2.14svn29349-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485873" comment="texlive-substances-2017.133.0.0.2asvn40989-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485874" comment="texlive-substitutefont-2017.133.0.0.1.4svn32066-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485875" comment="texlive-substr-2017.133.1.2svn16117-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485876" comment="texlive-subsupscripts-2017.133.1.0svn16080-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485877" comment="texlive-sudoku-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485878" comment="texlive-sudokubundle-2017.133.1.0asvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485879" comment="texlive-suftesi-2017.133.2.9svn40238-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485880" comment="texlive-sugconf-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485881" comment="texlive-superiors-2017.133.1.05svn36422-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485882" comment="texlive-superiors-fonts-2017.133.1.05svn36422-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485883" comment="texlive-supertabular-2017.133.4.1asvn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485884" comment="texlive-susy-2017.133.svn19440-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485885" comment="texlive-svg-2017.133.2.00bsvn44503-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485886" comment="texlive-svg-inkscape-2017.133.svn32199-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485887" comment="texlive-svgcolor-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485888" comment="texlive-svn-2017.133.43svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485889" comment="texlive-svn-multi-2017.133.2.4dsvn26313-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485891" comment="texlive-svn-prov-2017.133.3.1862svn18017-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485892" comment="texlive-svninfo-2017.133.0.0.7.4svn17554-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485893" comment="texlive-svrsymbols-2017.133.2.0asvn40371-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485894" comment="texlive-svrsymbols-fonts-2017.133.2.0asvn40371-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485895" comment="texlive-swebib-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485896" comment="texlive-swimgraf-2017.133.svn25446-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485897" comment="texlive-syllogism-2017.133.1.2svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485898" comment="texlive-symbol-2017.133.svn31835-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485899" comment="texlive-symbol-fonts-2017.133.svn31835-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485900" comment="texlive-sympytexpackage-2017.133.svn41190-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485901" comment="texlive-synctex-2017.133.svn44166-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485904" comment="texlive-synproof-2017.133.1.0svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485905" comment="texlive-syntax-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485906" comment="texlive-syntrace-2017.133.1.1svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485907" comment="texlive-synttree-2017.133.1.4.2svn16252-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485908" comment="texlive-systeme-2017.133.0.0.3svn32473-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485909" comment="texlive-t-angles-2017.133.svn15878-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485910" comment="texlive-t2-2017.133.svn39024-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485911" comment="texlive-tabfigures-2017.133.1.1svn25202-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485912" comment="texlive-table-fct-2017.133.1.1svn41849-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485913" comment="texlive-tableaux-2017.133.svn42413-4.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485914" comment="texlive-tablefootnote-2017.134.1.1csvn32804-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485915" comment="texlive-tableof-2017.134.1.4asvn36489-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485916" comment="texlive-tablestyles-2017.134.svn34495-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485917" comment="texlive-tablists-2017.134.0.0.0esvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485918" comment="texlive-tablor-2017.134.4.07_gsvn31855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485919" comment="texlive-tabls-2017.134.3.5svn17255-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485920" comment="texlive-tabriz-thesis-2017.134.1.1svn29421-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485921" comment="texlive-tabstackengine-2017.134.2.01svn42610-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485922" comment="texlive-tabto-generic-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485923" comment="texlive-tabto-ltx-2017.134.1.3svn30710-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485924" comment="texlive-tabu-2017.134.2.8svn21534-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485925" comment="texlive-tabularborder-2017.134.1.0asvn17885-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485926" comment="texlive-tabularcalc-2017.134.0.0.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485927" comment="texlive-tabularew-2017.134.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485928" comment="texlive-tabulars-e-2017.134.1.0svn21191-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485929" comment="texlive-tabulary-2017.134.0.0.10svn34368-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485930" comment="texlive-tabvar-2017.134.1.7svn28908-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485931" comment="texlive-tabvar-fonts-2017.134.1.7svn28908-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485932" comment="texlive-tagging-2017.134.svn23761-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485933" comment="texlive-tagpair-2017.134.1.1svn42138-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485934" comment="texlive-talk-2017.134.1.1svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485935" comment="texlive-tamefloats-2017.134.0.0.42svn27345-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485936" comment="texlive-tamethebeast-2017.134.1.4svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485937" comment="texlive-tap-2017.134.0.0.77svn31731-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485938" comment="texlive-tapir-2017.134.0.0.2svn20484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485939" comment="texlive-tapir-fonts-2017.134.0.0.2svn20484-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485940" comment="texlive-tasks-2017.134.0.0.12svn41851-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485941" comment="texlive-tcldoc-2017.134.2.40svn22018-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485942" comment="texlive-tcolorbox-2017.134.4.03svn44046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485943" comment="texlive-tdclock-2017.134.2.5svn33043-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485944" comment="texlive-tds-2017.134.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485945" comment="texlive-tdsfrmath-2017.134.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485946" comment="texlive-technics-2017.134.1.0svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485947" comment="texlive-ted-2017.134.1.06svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485948" comment="texlive-templates-fenn-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485949" comment="texlive-templates-sommer-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485950" comment="texlive-templatetools-2017.134.svn34495-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485951" comment="texlive-tempora-2017.134.1.05svn39596-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485952" comment="texlive-tempora-fonts-2017.134.1.05svn39596-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485953" comment="texlive-tengwarscript-2017.134.1.3.1svn34594-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485954" comment="texlive-tensor-2017.134.2.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485955" comment="texlive-termcal-2017.134.1.8svn22514-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485956" comment="texlive-termlist-2017.134.1.1svn18923-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485957" comment="texlive-termmenu-2017.134.svn37700-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485958" comment="texlive-testhyphens-2017.134.0.0.7svn38928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485959" comment="texlive-testidx-2017.134.1.0svn42294-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485960" comment="texlive-tetex-2017.134.3.0svn44331-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485962" comment="texlive-teubner-2017.134.4.8svn40197-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485963" comment="texlive-tex-2017.134.3.14159265svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485965" comment="texlive-tex-ewd-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485966" comment="texlive-tex-font-errors-cheatsheet-2017.134.0.0.1svn18314-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485967" comment="texlive-tex-gyre-2017.134.2.004svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485968" comment="texlive-tex-gyre-fonts-2017.134.2.004svn18651-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485969" comment="texlive-tex-gyre-math-2017.134.svn41264-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485970" comment="texlive-tex-gyre-math-fonts-2017.134.svn41264-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485971" comment="texlive-tex-ini-files-2017.134.svn40533-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485972" comment="texlive-tex-label-2017.134.svn16372-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485973" comment="texlive-tex-overview-2017.134.0.0.2svn41403-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485974" comment="texlive-tex-ps-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485975" comment="texlive-tex-refs-2017.134.0.0.4.8svn44131-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485976" comment="texlive-tex-virtual-academy-pl-2017.134.svn34177-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485977" comment="texlive-tex4ebook-2017.134.0.0.1esvn44103-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485979" comment="texlive-tex4ht-2017.134.svn44379-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485981" comment="texlive-texapi-2017.134.1.04svn24237-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485982" comment="texlive-texbytopic-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485983" comment="texlive-texconfig-2017.134.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485985" comment="texlive-texcount-2017.134.3.0svn31323-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485987" comment="texlive-texdef-2017.134.1.7bsvn26420-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485989" comment="texlive-texdiff-2017.134.0.0.4svn29752-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485991" comment="texlive-texdirflatten-2017.134.1.1svn29725-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485993" comment="texlive-texdoc-2017.134.svn44432-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485995" comment="texlive-texdraw-2017.134.svn31894-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485996" comment="texlive-texfot-2017.134.1.32svn39660-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485998" comment="texlive-texilikechaps-2017.134.1.0asvn28553-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009485999" comment="texlive-texilikecover-2017.134.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486000" comment="texlive-texinfo-2017.134.5.1svn43137-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486001" comment="texlive-texlive-common-2017.134.svn44191-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486002" comment="texlive-texlive-cz-2017.134.svn44347-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486003" comment="texlive-texlive-de-2017.134.svn44366-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486004" comment="texlive-texlive-en-2017.134.svn44424-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486005" comment="texlive-texlive-es-2017.134.svn44356-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486006" comment="texlive-texlive-fr-2017.134.svn44342-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486007" comment="texlive-texlive-it-2017.134.svn44357-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486008" comment="texlive-texlive-pl-2017.134.svn44343-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486009" comment="texlive-texlive-ru-2017.134.svn44444-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486010" comment="texlive-texlive-sr-2017.134.svn44341-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486011" comment="texlive-texlive-zh-cn-2017.134.svn44333-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486012" comment="texlive-texlive.infra-2017.134.svn44462-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486013" comment="texlive-texliveonfly-2017.134.svn26313-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486015" comment="texlive-texloganalyser-2017.134.0.0.9svn35584-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486017" comment="texlive-texlogos-2017.134.1.3.1svn19083-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486020" comment="texlive-texmate-2017.134.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486021" comment="texlive-texments-2017.134.0.0.2.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486022" comment="texlive-texosquery-2017.134.1.5svn44509-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486024" comment="texlive-texpower-2017.134.0.0.2svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486025" comment="texlive-texproposal-2017.134.1.4svn43151-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486026" comment="texlive-texshade-2017.134.1.24svn24716-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486027" comment="texlive-texsis-2017.134.2.18svn39057-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486029" comment="texlive-textcase-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486030" comment="texlive-textfit-2017.134.5svn20591-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486031" comment="texlive-textglos-2017.134.1.0svn30788-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486032" comment="texlive-textgreek-2017.134.0.0.7svn44192-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486033" comment="texlive-textmerg-2017.134.2.01svn20677-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486034" comment="texlive-textopo-2017.134.1.5svn23796-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486035" comment="texlive-textpath-2017.134.1.6svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486036" comment="texlive-textpos-2017.134.1.8svn41331-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486037" comment="texlive-texvc-2017.134.1.0svn38809-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486038" comment="texlive-texware-2017.134.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486040" comment="texlive-tfrupee-2017.134.1.02svn20770-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486041" comment="texlive-tfrupee-fonts-2017.134.1.02svn20770-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486042" comment="texlive-thaienum-2017.134.0.0.2svn44140-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486043" comment="texlive-thalie-2017.134.0.0.9bsvn44048-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486044" comment="texlive-theoremref-2017.134.svn30640-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486045" comment="texlive-thesis-ekf-2017.134.2.1svn43745-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486046" comment="texlive-thesis-titlepage-fhac-2017.134.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486047" comment="texlive-thinsp-2017.134.0.0.2svn39669-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486048" comment="texlive-thmbox-2017.134.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486049" comment="texlive-thmtools-2017.134.66svn33624-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486050" comment="texlive-threadcol-2017.134.1.0svn28754-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486051" comment="texlive-threeddice-2017.134.1.0svn20675-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486052" comment="texlive-threeparttable-2017.134.svn17383-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486053" comment="texlive-threeparttablex-2017.134.0.0.3svn34206-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486054" comment="texlive-thumb-2017.134.1.0svn16549-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486055" comment="texlive-thumbpdf-2017.134.3.16svn34621-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486057" comment="texlive-thumbs-2017.134.1.0qsvn33134-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486058" comment="texlive-thumby-2017.134.0.0.1svn16736-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486059" comment="texlive-thuthesis-2017.134.5.3.2svn43609-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486060" comment="texlive-ticket-2017.134.0.0.4dsvn42280-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486061" comment="texlive-ticollege-2017.134.1.0svn36306-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486062" comment="texlive-tie-2017.134.2.4svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486064" comment="texlive-tikz-3dplot-2017.133.svn25087-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486065" comment="texlive-tikz-bayesnet-2017.133.0.0.1svn38295-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486066" comment="texlive-tikz-cd-2017.133.0.0.9esvn35485-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486067" comment="texlive-tikz-dependency-2017.133.1.2svn42454-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486068" comment="texlive-tikz-dimline-2017.133.1.0svn35805-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486069" comment="texlive-tikz-feynman-2017.133.1.1.0svn39582-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486070" comment="texlive-tikz-inet-2017.133.0.0.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486071" comment="texlive-tikz-kalender-2017.133.0.0.4asvn44393-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486072" comment="texlive-tikz-opm-2017.133.0.0.1.1svn32769-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486073" comment="texlive-tikz-optics-2017.133.0.0.2.3svn43466-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486074" comment="texlive-tikz-page-2017.133.1.0svn42039-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486075" comment="texlive-tikz-palattice-2017.133.2.3svn43442-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486076" comment="texlive-tikz-qtree-2017.133.1.2svn26108-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486077" comment="texlive-tikz-timing-2017.133.0.0.7dsvn21013-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486078" comment="texlive-tikzinclude-2017.133.1.0svn28715-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486079" comment="texlive-tikzmark-2017.133.1.3svn44475-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486080" comment="texlive-tikzorbital-2017.133.svn36439-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486081" comment="texlive-tikzpagenodes-2017.133.1.1svn27723-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486082" comment="texlive-tikzpeople-2017.133.0.0.4svn43978-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486083" comment="texlive-tikzpfeile-2017.133.1.0svn25777-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486084" comment="texlive-tikzposter-2017.133.2.0svn32732-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486085" comment="texlive-tikzscale-2017.133.0.0.2.6svn30637-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486086" comment="texlive-tikzsymbols-2017.133.4.02svn44350-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486087" comment="texlive-times-2017.133.svn35058-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486088" comment="texlive-times-fonts-2017.133.svn35058-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486089" comment="texlive-timetable-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486090" comment="texlive-timing-diagrams-2017.133.svn31491-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486091" comment="texlive-tinos-2017.133.svn42882-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486092" comment="texlive-tinos-fonts-2017.133.svn42882-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486093" comment="texlive-tipa-2017.133.1.3svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486094" comment="texlive-tipa-de-2017.133.1.3svn22005-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486095" comment="texlive-tipa-fonts-2017.133.1.3svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486096" comment="texlive-tipfr-2017.133.1.5svn38646-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486097" comment="texlive-titlecaps-2017.133.1.2svn36170-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486098" comment="texlive-titlefoot-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486099" comment="texlive-titlepages-2017.133.svn19457-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486100" comment="texlive-titlepic-2017.133.1.2svn43497-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486101" comment="texlive-titleref-2017.133.3.1svn18729-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486102" comment="texlive-titlesec-2017.133.2.10.2svn40129-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486103" comment="texlive-titling-2017.133.2.1dsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486104" comment="texlive-tkz-base-2017.133.1.16svn22961-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486105" comment="texlive-tkz-berge-2017.133.1.00csvn22891-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486106" comment="texlive-tkz-doc-2017.133.1.1csvn22959-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486107" comment="texlive-tkz-euclide-2017.133.1.16csvn22830-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486108" comment="texlive-tkz-fct-2017.133.1.16csvn22831-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486109" comment="texlive-tkz-graph-2017.133.1.00svn22832-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486110" comment="texlive-tkz-kiviat-2017.133.0.0.1svn22857-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486111" comment="texlive-tkz-linknodes-2017.133.1.0csvn22833-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486112" comment="texlive-tkz-orm-2017.133.0.0.1.4svn39408-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486113" comment="texlive-tkz-tab-2017.133.1.3csvn22834-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486114" comment="texlive-tlc2-2017.133.svn26096-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486115" comment="texlive-tocbibind-2017.133.1.5ksvn20085-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486116" comment="texlive-tocdata-2017.133.0.0.12svn42623-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486117" comment="texlive-tocloft-2017.133.2.3fsvn30209-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486118" comment="texlive-tocvsec2-2017.133.1.3asvn33146-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486119" comment="texlive-todo-2017.133.2.142svn17746-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486120" comment="texlive-todonotes-2017.133.1.0.5svn42423-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486121" comment="texlive-tokenizer-2017.133.1.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486122" comment="texlive-toolbox-2017.133.5.1svn32260-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486123" comment="texlive-tools-2017.133.svn43813-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486124" comment="texlive-topfloat-2017.133.svn19084-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486125" comment="texlive-toptesi-2017.133.5.9.06svn42586-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486126" comment="texlive-totcount-2017.133.1.2svn21178-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486127" comment="texlive-totpages-2017.133.2.00svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486128" comment="texlive-tpic2pdftex-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486130" comment="texlive-tpslifonts-2017.133.0.0.6svn42428-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486131" comment="texlive-tqft-2017.133.2.1svn44455-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486132" comment="texlive-tracklang-2017.133.1.3.4svn43605-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486133" comment="texlive-trajan-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486134" comment="texlive-trajan-fonts-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486135" comment="texlive-tram-2017.133.0.0.2svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486136" comment="texlive-translation-array-fr-2017.133.svn24344-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486137" comment="texlive-translation-arsclassica-de-2017.133.svn23803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486138" comment="texlive-translation-biblatex-de-2017.133.2.0svn42198-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486139" comment="texlive-translation-chemsym-de-2017.133.svn23804-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486140" comment="texlive-translation-dcolumn-fr-2017.133.svn24345-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486141" comment="texlive-translation-ecv-de-2017.133.svn24754-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486142" comment="texlive-translation-enumitem-de-2017.133.svn24196-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486143" comment="texlive-translation-europecv-de-2017.133.svn23840-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486144" comment="texlive-translation-filecontents-de-2017.133.svn24010-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486145" comment="texlive-translation-moreverb-de-2017.133.svn23957-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486146" comment="texlive-translation-natbib-fr-2017.133.svn25105-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486147" comment="texlive-translation-tabbing-fr-2017.133.svn24228-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486148" comment="texlive-translations-2017.133.1.6svn44381-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486149" comment="texlive-tree-dvips-2017.133.0.0.91svn21751-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486150" comment="texlive-treetex-2017.133.svn28176-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486151" comment="texlive-trfsigns-2017.133.1.01svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486152" comment="texlive-trigonometry-2017.133.svn43006-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486153" comment="texlive-trimspaces-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486154" comment="texlive-trivfloat-2017.133.1.3bsvn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486155" comment="texlive-trsym-2017.133.1.0svn18732-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486156" comment="texlive-truncate-2017.133.3.6svn18921-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486157" comment="texlive-tsemlines-2017.133.1.0svn23440-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486158" comment="texlive-ttfutils-2017.133.svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486160" comment="texlive-tucv-2017.133.1.0svn20680-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486161" comment="texlive-tudscr-2017.133.2.05msvn44480-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486162" comment="texlive-tufte-latex-2017.133.3.5.2svn37649-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486163" comment="texlive-tugboat-2017.133.2.18svn42465-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486164" comment="texlive-tugboat-plain-2017.133.1.23svn43560-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486165" comment="texlive-tui-2017.133.1.9svn27253-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486166" comment="texlive-turabian-2017.133.0.0.1.0svn36298-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486167" comment="texlive-turabian-formatting-2017.133.svn43537-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486168" comment="texlive-turkmen-2017.133.0.0.2svn17748-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486169" comment="texlive-turnstile-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486170" comment="texlive-turnthepage-2017.133.1.3asvn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486171" comment="texlive-twoinone-2017.133.svn17024-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486172" comment="texlive-twoup-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486173" comment="texlive-txfonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486174" comment="texlive-txfonts-fonts-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486175" comment="texlive-txfontsb-2017.133.1.1svn21578-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486176" comment="texlive-txfontsb-fonts-2017.133.1.1svn21578-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486177" comment="texlive-txgreeks-2017.133.1.0svn21839-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486178" comment="texlive-txuprcal-2017.133.1.00svn43327-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486179" comment="texlive-txuprcal-fonts-2017.133.1.00svn43327-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486180" comment="texlive-type1cm-2017.133.svn21820-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486181" comment="texlive-typed-checklist-2017.133.1.4svn40389-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486182" comment="texlive-typeface-2017.133.0.0.1svn27046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486183" comment="texlive-typehtml-2017.133.svn17134-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486184" comment="texlive-typeoutfileinfo-2017.133.0.0.31svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486186" comment="texlive-typicons-2017.133.2.0.7svn37623-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486187" comment="texlive-typicons-fonts-2017.133.2.0.7svn37623-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486188" comment="texlive-typoaid-2017.133.0.0.4.7svn44238-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486189" comment="texlive-typogrid-2017.133.0.0.21svn24994-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486190" comment="texlive-uaclasses-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486191" comment="texlive-uafthesis-2017.133.12.12svn29349-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486192" comment="texlive-uantwerpendocs-2017.133.1.8svn42912-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486193" comment="texlive-uassign-2017.133.1.01svn38459-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486194" comment="texlive-ucbthesis-2017.133.3.5svn37776-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486195" comment="texlive-ucdavisthesis-2017.133.1.3svn40772-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486196" comment="texlive-ucharcat-2017.133.0.0.03svn38907-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486197" comment="texlive-ucharclasses-2017.133.2.2.1svn40854-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486198" comment="texlive-ucs-2017.133.2.2svn35853-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487027" comment="texlive-ucthesis-2017.136.3.2svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487028" comment="texlive-udesoftec-2017.136.1.6.0svn44308-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487029" comment="texlive-uebungsblatt-2017.136.1.5.0svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487030" comment="texlive-uestcthesis-2017.136.1.1.0svn36371-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487031" comment="texlive-uhc-2017.136.svn16791-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487032" comment="texlive-uhc-fonts-2017.136.svn16791-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487033" comment="texlive-uhhassignment-2017.136.1.0svn44026-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487034" comment="texlive-uhrzeit-2017.136.0.0.2csvn39570-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487035" comment="texlive-uiucredborder-2017.136.1.00svn29974-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487036" comment="texlive-uiucthesis-2017.136.2.25svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487037" comment="texlive-ukrhyph-2017.136.svn21081-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487038" comment="texlive-ulem-2017.136.svn26785-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487039" comment="texlive-ulqda-2017.136.1.1svn26313-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487040" comment="texlive-ulthese-2017.136.4.4svn44456-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487041" comment="texlive-umbclegislation-2017.136.2016_6_8svn41348-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487042" comment="texlive-umich-thesis-2017.136.1.20svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487043" comment="texlive-uml-2017.136.0.0.11svn17476-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487044" comment="texlive-umlaute-2017.136.2.1svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487045" comment="texlive-umoline-2017.136.svn19085-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487046" comment="texlive-umthesis-2017.136.0.0.2svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487047" comment="texlive-umtypewriter-2017.136.001.002svn18651-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487048" comment="texlive-umtypewriter-fonts-2017.136.001.002svn18651-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487049" comment="texlive-unamth-template-2017.136.2.0svn33625-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487050" comment="texlive-unamthesis-2017.136.2.1svn43639-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487051" comment="texlive-undergradmath-2017.136.svn42926-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487052" comment="texlive-underlin-2017.136.1.01svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487053" comment="texlive-underoverlap-2017.136.0.0.0.1_r1svn29019-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487054" comment="texlive-underscore-2017.136.svn18261-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487055" comment="texlive-undolabl-2017.136.1.0lsvn36681-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487056" comment="texlive-unfonts-core-2017.136.svn44467-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487057" comment="texlive-unfonts-core-fonts-2017.136.svn44467-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487058" comment="texlive-unfonts-extra-2017.136.svn44465-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487059" comment="texlive-unfonts-extra-fonts-2017.136.svn44465-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487060" comment="texlive-uni-wtal-ger-2017.136.0.0.2svn31541-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487061" comment="texlive-uni-wtal-lin-2017.136.0.0.2svn31409-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487062" comment="texlive-unicode-bidi-2017.136.0.0.01svn42482-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487063" comment="texlive-unicode-data-2017.136.1.5svn41521-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487064" comment="texlive-unicode-math-2017.136.0.0.8dsvn43068-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487065" comment="texlive-unisugar-2017.136.0.0.92svn22357-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487066" comment="texlive-units-2017.136.0.0.9bsvn42428-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487067" comment="texlive-unitsdef-2017.136.0.0.2svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487068" comment="texlive-universa-2017.136.2.0svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487069" comment="texlive-universalis-2017.136.svn33860-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487070" comment="texlive-universalis-fonts-2017.136.svn33860-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487071" comment="texlive-unravel-2017.136.0.0.2svn38506-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487072" comment="texlive-unswcover-2017.136.1.0svn29476-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487073" comment="texlive-uothesis-2017.136.2.5.6svn25355-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487074" comment="texlive-uowthesis-2017.136.1.0asvn19700-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487075" comment="texlive-uowthesistitlepage-2017.136.2.0svn32626-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487076" comment="texlive-upca-2017.136.svn22511-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487077" comment="texlive-updmap-map-2017.136.svn43366-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487078" comment="texlive-uplatex-2017.136.svn44210-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487079" comment="texlive-upmethodology-2017.136.svn43453-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487080" comment="texlive-uppunctlm-2017.136.0.0.1svn42334-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487081" comment="texlive-upquote-2017.136.1.3svn26059-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487082" comment="texlive-uptex-2017.136.1.20svn42950-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487083" comment="texlive-uptex-base-2017.136.svn43900-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487084" comment="texlive-uptex-fonts-2017.136.svn42853-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487085" comment="texlive-urcls-2017.136.2.0svn43734-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487086" comment="texlive-uri-2017.136.1.0asvn21608-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487087" comment="texlive-url-2017.136.3.4svn32528-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487088" comment="texlive-urlbst-2017.136.0.0.7svn29803-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487089" comment="texlive-urwchancal-2017.136.1svn21701-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487090" comment="texlive-usebib-2017.136.1.0asvn25969-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487091" comment="texlive-ushort-2017.136.2.2svn32261-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487092" comment="texlive-uspace-2017.136.0.0.04svn42456-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487093" comment="texlive-uspatent-2017.136.1.0svn27744-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487094" comment="texlive-ut-thesis-2017.136.2.1svn38269-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487095" comment="texlive-utf8mex-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487096" comment="texlive-utopia-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487097" comment="texlive-utopia-fonts-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487098" comment="texlive-uwmslide-2017.136.svn27354-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487099" comment="texlive-uwthesis-2017.136.6.13svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487100" comment="texlive-vak-2017.136.svn23431-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487101" comment="texlive-vancouver-2017.136.svn34470-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487102" comment="texlive-variablelm-2017.136.1.1.1svn43686-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487103" comment="texlive-variations-2017.136.0.0.3svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487104" comment="texlive-varindex-2017.136.2.3svn32262-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487105" comment="texlive-varisize-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487106" comment="texlive-varsfromjobname-2017.136.1.0svn44154-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487107" comment="texlive-varwidth-2017.136.0.0.92svn24104-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487108" comment="texlive-vaucanson-g-2017.136.0.0.4svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487109" comment="texlive-vdmlisting-2017.136.1.0svn29944-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487110" comment="texlive-velthuis-2017.136.2.17svn44166-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487111" comment="texlive-velthuis-fonts-2017.136.2.17svn44166-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487112" comment="texlive-venn-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487113" comment="texlive-venndiagram-2017.136.1.1svn40058-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487114" comment="texlive-venturisadf-2017.136.1.005svn19444-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487115" comment="texlive-venturisadf-fonts-2017.136.1.005svn19444-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487116" comment="texlive-verbasef-2017.136.1.1svn21922-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487117" comment="texlive-verbatimbox-2017.136.3.13svn33197-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487118" comment="texlive-verbatimcopy-2017.136.0.0.06svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487119" comment="texlive-verbdef-2017.136.0.0.2svn17177-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487120" comment="texlive-verbments-2017.136.1.2svn23670-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487121" comment="texlive-verse-2017.136.2.4bsvn34017-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487122" comment="texlive-version-2017.136.2.0svn21920-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487123" comment="texlive-versions-2017.136.0.0.55svn21921-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487124" comment="texlive-versonotes-2017.136.0.0.3svn39084-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487125" comment="texlive-vertbars-2017.136.1.0bsvn20589-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487126" comment="texlive-vgrid-2017.136.0.0.1svn32457-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487127" comment="texlive-vhistory-2017.136.1.6.1svn30080-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487128" comment="texlive-visualfaq-2017.136.svn38647-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487129" comment="texlive-visualpstricks-2017.136.2.3svn39799-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487130" comment="texlive-visualtikz-2017.136.0.0.64svn43239-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487131" comment="texlive-vlna-2017.136.svn44166-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487132" comment="texlive-vmargin-2017.136.2.5svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487133" comment="texlive-vntex-2017.136.3.2svn30579-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487134" comment="texlive-vntex-fonts-2017.136.3.2svn30579-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487135" comment="texlive-vocaltract-2017.136.1svn25629-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487136" comment="texlive-volumes-2017.136.1.0svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487137" comment="texlive-voss-mathcol-2017.136.0.0.1svn32954-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487138" comment="texlive-vpe-2017.136.0.0.2svn26039-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487139" comment="texlive-vruler-2017.136.2.3svn21598-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487140" comment="texlive-vwcol-2017.136.0.0.2svn36254-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487141" comment="texlive-wadalab-2017.136.svn42428-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487142" comment="texlive-wadalab-fonts-2017.136.svn42428-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487143" comment="texlive-wallpaper-2017.136.1.10svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487144" comment="texlive-warning-2017.136.0.0.01svn22028-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487145" comment="texlive-warpcol-2017.136.1.0csvn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487146" comment="texlive-was-2017.136.svn21439-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487147" comment="texlive-wasy-2017.136.svn35831-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487148" comment="texlive-wasy2-ps-2017.136.svn35830-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487149" comment="texlive-wasy2-ps-fonts-2017.136.svn35830-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487150" comment="texlive-wasysym-2017.136.2.0svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487151" comment="texlive-web-2017.136.4.5svn44166-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487152" comment="texlive-webguide-2017.136.svn25813-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487153" comment="texlive-widetable-2017.136.1.1svn16082-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487154" comment="texlive-williams-2017.136.svn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487155" comment="texlive-withargs-2017.136.0.0.2.0svn42756-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487156" comment="texlive-wnri-2017.136.svn22459-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487157" comment="texlive-wnri-latex-2017.136.1.0bsvn22338-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487158" comment="texlive-wordcount-2017.136.1.7svn41381-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487159" comment="texlive-wordlike-2017.136.1.2bsvn15878-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487160" comment="texlive-wrapfig-2017.136.3.6svn22048-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487161" comment="texlive-wsemclassic-2017.136.1.0.1svn31532-10.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486342" comment="texlive-wsuipa-2017.133.svn25469-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486343" comment="texlive-wtref-2017.133.0.0.3.2svn42981-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486344" comment="texlive-xargs-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486345" comment="texlive-xassoccnt-2017.133.1.4svn44127-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486346" comment="texlive-xcharter-2017.133.1.08svn43465-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486347" comment="texlive-xcharter-fonts-2017.133.1.08svn43465-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486348" comment="texlive-xcite-2017.133.1.0svn23783-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486349" comment="texlive-xcjk2uni-2017.133.0.0.6svn41121-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486350" comment="texlive-xcntperchap-2017.133.0.0.4svn44128-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486351" comment="texlive-xcolor-2017.133.2.12svn41044-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486352" comment="texlive-xcolor-material-2017.133.0.0.1svn42289-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486353" comment="texlive-xcolor-solarized-2017.133.0.0.4svn41809-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486354" comment="texlive-xcomment-2017.133.1.3svn20031-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486355" comment="texlive-xcookybooky-2017.133.1.5svn36435-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486356" comment="texlive-xdoc-2017.133.prot2.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486357" comment="texlive-xduthesis-2017.133.1.00svn39694-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486358" comment="texlive-xdvi-2017.133.22.87.03svn44166-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486360" comment="texlive-xebaposter-2017.133.2.51svn42046-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486361" comment="texlive-xecjk-2017.133.3.4.8svn44370-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486362" comment="texlive-xecolor-2017.133.0.0.1svn29660-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486363" comment="texlive-xecyr-2017.133.1.1svn20221-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486364" comment="texlive-xeindex-2017.133.0.0.3svn35756-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486365" comment="texlive-xellipsis-2017.133.1.2svn42764-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486366" comment="texlive-xepersian-2017.133.18.7svn44547-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486367" comment="texlive-xesearch-2017.133.svn16041-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486368" comment="texlive-xespotcolor-2017.133.2.0asvn40118-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486369" comment="texlive-xetex-2017.133.svn41438-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486371" comment="texlive-xetex-devanagari-2017.133.0.0.5svn34296-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486372" comment="texlive-xetex-itrans-2017.133.4.2svn35088-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486373" comment="texlive-xetex-pstricks-2017.133.svn17055-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486374" comment="texlive-xetex-tibetan-2017.133.0.0.1svn28847-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486375" comment="texlive-xetexconfig-2017.133.svn41133-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486376" comment="texlive-xetexfontinfo-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486377" comment="texlive-xetexko-2017.133.2.16svn43173-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486378" comment="texlive-xetexref-2017.133.svn30636-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486379" comment="texlive-xevlna-2017.133.1.1svn43864-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486380" comment="texlive-xfor-2017.133.1.05svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486381" comment="texlive-xgreek-2017.133.3.0svn43222-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486382" comment="texlive-xhfill-2017.133.1.01svn22575-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486383" comment="texlive-xifthen-2017.133.1.4.0svn38929-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486384" comment="texlive-xii-2017.133.svn31683-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486385" comment="texlive-xint-2017.133.1.2ksvn42892-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486386" comment="texlive-xits-2017.133.1.108svn32763-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486387" comment="texlive-xits-fonts-2017.133.1.108svn32763-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486388" comment="texlive-xkeyval-2017.133.2.7asvn35741-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486389" comment="texlive-xlop-2017.133.0.0.26svn42899-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486390" comment="texlive-xltxtra-2017.133.0.0.6svn39453-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486391" comment="texlive-xmltex-2017.133.0.0.8svn40855-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486393" comment="texlive-xmltexconfig-2017.133.svn35743-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486394" comment="texlive-xmpincl-2017.133.2.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486395" comment="texlive-xnewcommand-2017.133.1.2svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486396" comment="texlive-xoptarg-2017.133.1.0svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486397" comment="texlive-xpatch-2017.133.0.0.2svn27897-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486398" comment="texlive-xpeek-2017.133.0.0.2svn27442-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486399" comment="texlive-xpiano-2017.133.1.0svn37604-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486400" comment="texlive-xpicture-2017.133.1.2asvn28770-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486401" comment="texlive-xpinyin-2017.133.2.4svn41940-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486402" comment="texlive-xprintlen-2017.133.1.0svn35928-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486403" comment="texlive-xpunctuate-2017.133.1.0svn26641-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486404" comment="texlive-xq-2017.133.0.0.4svn35211-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486405" comment="texlive-xsavebox-2017.133.0.0.6svn43589-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486406" comment="texlive-xsim-2017.133.0.0.8asvn44430-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486407" comment="texlive-xskak-2017.133.1.4svn35945-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486408" comment="texlive-xstring-2017.133.1.7csvn31900-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486409" comment="texlive-xtab-2017.133.2.3fsvn23347-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486410" comment="texlive-xunicode-2017.133.0.0.981svn30466-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486411" comment="texlive-xwatermark-2017.133.1.5.2dsvn28090-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486412" comment="texlive-xyling-2017.133.1.1svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486413" comment="texlive-xymtex-2017.133.5.06svn32182-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486414" comment="texlive-xypic-2017.133.3.8.9svn31859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486415" comment="texlive-xypic-fonts-2017.133.3.8.9svn31859-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486416" comment="texlive-xypic-tut-pt-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486417" comment="texlive-xytree-2017.133.1.5svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486418" comment="texlive-yafoot-2017.133.svn19086-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486419" comment="texlive-yagusylo-2017.133.1.2svn29803-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486420" comment="texlive-yaletter-2017.133.1.1svn42830-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486421" comment="texlive-yannisgr-2017.133.svn22613-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486422" comment="texlive-yathesis-2017.133.0.0.99psvn42671-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486423" comment="texlive-yax-2017.133.1.03svn21183-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486424" comment="texlive-ycbook-2017.133.svn43171-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486425" comment="texlive-ydoc-2017.133.0.0.6alphasvn26202-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486426" comment="texlive-yfonts-2017.133.1.3svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486427" comment="texlive-yfonts-t1-2017.133.1.0svn36013-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486428" comment="texlive-yfonts-t1-fonts-2017.133.1.0svn36013-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486429" comment="texlive-yhmath-2017.133.1.1svn31155-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486430" comment="texlive-yhmath-fonts-2017.133.1.1svn31155-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486431" comment="texlive-yinit-otf-2017.133.1.0svn40207-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486432" comment="texlive-yinit-otf-fonts-2017.133.1.0svn40207-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486433" comment="texlive-york-thesis-2017.133.3.6svn23348-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486434" comment="texlive-youngtab-2017.133.1.1svn17635-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486435" comment="texlive-yplan-2017.133.svn34398-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486437" comment="texlive-ytableau-2017.133.1.3svn27430-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486438" comment="texlive-zapfchan-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486439" comment="texlive-zapfchan-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486440" comment="texlive-zapfding-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486441" comment="texlive-zapfding-fonts-2017.133.svn31835-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486442" comment="texlive-zed-csp-2017.133.svn17258-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486443" comment="texlive-zhmetrics-2017.133.r206svn22207-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486444" comment="texlive-zhmetrics-uptex-2017.133.1.0svn40728-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486445" comment="texlive-zhnumber-2017.133.2.4svn41123-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486446" comment="texlive-zhspacing-2017.133.svn41145-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486447" comment="texlive-ziffer-2017.133.2.1svn32279-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486448" comment="texlive-zlmtt-2017.133.1.01svn34485-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486449" comment="texlive-zwgetfdate-2017.133.svn15878-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486450" comment="texlive-zwpagelayout-2017.133.1.4dsvn28846-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486451" comment="texlive-zxjafbfont-2017.133.0.0.2svn28539-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486452" comment="texlive-zxjafont-2017.133.0.0.3svn37281-5.18 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486453" comment="texlive-zxjatype-2017.133.0.0.6svn28541-5.18 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109789" version="1" class="patch">
	<metadata>
		<title>typelib-1_0-JavaScriptCore-4_0-2.28.2-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1856" ref_url="https://www.suse.com/security/cve/CVE-2016-1856/" source="CVE"/>
		<reference ref_id="CVE-2016-1857" ref_url="https://www.suse.com/security/cve/CVE-2016-1857/" source="CVE"/>
		<reference ref_id="CVE-2016-4590" ref_url="https://www.suse.com/security/cve/CVE-2016-4590/" source="CVE"/>
		<reference ref_id="CVE-2016-4591" ref_url="https://www.suse.com/security/cve/CVE-2016-4591/" source="CVE"/>
		<reference ref_id="CVE-2016-4622" ref_url="https://www.suse.com/security/cve/CVE-2016-4622/" source="CVE"/>
		<reference ref_id="CVE-2016-4624" ref_url="https://www.suse.com/security/cve/CVE-2016-4624/" source="CVE"/>
		<reference ref_id="CVE-2016-4692" ref_url="https://www.suse.com/security/cve/CVE-2016-4692/" source="CVE"/>
		<reference ref_id="CVE-2016-4743" ref_url="https://www.suse.com/security/cve/CVE-2016-4743/" source="CVE"/>
		<reference ref_id="CVE-2016-7586" ref_url="https://www.suse.com/security/cve/CVE-2016-7586/" source="CVE"/>
		<reference ref_id="CVE-2016-7587" ref_url="https://www.suse.com/security/cve/CVE-2016-7587/" source="CVE"/>
		<reference ref_id="CVE-2016-7589" ref_url="https://www.suse.com/security/cve/CVE-2016-7589/" source="CVE"/>
		<reference ref_id="CVE-2016-7592" ref_url="https://www.suse.com/security/cve/CVE-2016-7592/" source="CVE"/>
		<reference ref_id="CVE-2016-7598" ref_url="https://www.suse.com/security/cve/CVE-2016-7598/" source="CVE"/>
		<reference ref_id="CVE-2016-7599" ref_url="https://www.suse.com/security/cve/CVE-2016-7599/" source="CVE"/>
		<reference ref_id="CVE-2016-7610" ref_url="https://www.suse.com/security/cve/CVE-2016-7610/" source="CVE"/>
		<reference ref_id="CVE-2016-7623" ref_url="https://www.suse.com/security/cve/CVE-2016-7623/" source="CVE"/>
		<reference ref_id="CVE-2016-7632" ref_url="https://www.suse.com/security/cve/CVE-2016-7632/" source="CVE"/>
		<reference ref_id="CVE-2016-7635" ref_url="https://www.suse.com/security/cve/CVE-2016-7635/" source="CVE"/>
		<reference ref_id="CVE-2016-7639" ref_url="https://www.suse.com/security/cve/CVE-2016-7639/" source="CVE"/>
		<reference ref_id="CVE-2016-7641" ref_url="https://www.suse.com/security/cve/CVE-2016-7641/" source="CVE"/>
		<reference ref_id="CVE-2016-7645" ref_url="https://www.suse.com/security/cve/CVE-2016-7645/" source="CVE"/>
		<reference ref_id="CVE-2016-7652" ref_url="https://www.suse.com/security/cve/CVE-2016-7652/" source="CVE"/>
		<reference ref_id="CVE-2016-7654" ref_url="https://www.suse.com/security/cve/CVE-2016-7654/" source="CVE"/>
		<reference ref_id="CVE-2016-7656" ref_url="https://www.suse.com/security/cve/CVE-2016-7656/" source="CVE"/>
		<reference ref_id="CVE-2017-1000121" ref_url="https://www.suse.com/security/cve/CVE-2017-1000121/" source="CVE"/>
		<reference ref_id="CVE-2017-1000122" ref_url="https://www.suse.com/security/cve/CVE-2017-1000122/" source="CVE"/>
		<reference ref_id="CVE-2017-13788" ref_url="https://www.suse.com/security/cve/CVE-2017-13788/" source="CVE"/>
		<reference ref_id="CVE-2017-13798" ref_url="https://www.suse.com/security/cve/CVE-2017-13798/" source="CVE"/>
		<reference ref_id="CVE-2017-13803" ref_url="https://www.suse.com/security/cve/CVE-2017-13803/" source="CVE"/>
		<reference ref_id="CVE-2017-13856" ref_url="https://www.suse.com/security/cve/CVE-2017-13856/" source="CVE"/>
		<reference ref_id="CVE-2017-13866" ref_url="https://www.suse.com/security/cve/CVE-2017-13866/" source="CVE"/>
		<reference ref_id="CVE-2017-13870" ref_url="https://www.suse.com/security/cve/CVE-2017-13870/" source="CVE"/>
		<reference ref_id="CVE-2017-13884" ref_url="https://www.suse.com/security/cve/CVE-2017-13884/" source="CVE"/>
		<reference ref_id="CVE-2017-13885" ref_url="https://www.suse.com/security/cve/CVE-2017-13885/" source="CVE"/>
		<reference ref_id="CVE-2017-2350" ref_url="https://www.suse.com/security/cve/CVE-2017-2350/" source="CVE"/>
		<reference ref_id="CVE-2017-2354" ref_url="https://www.suse.com/security/cve/CVE-2017-2354/" source="CVE"/>
		<reference ref_id="CVE-2017-2355" ref_url="https://www.suse.com/security/cve/CVE-2017-2355/" source="CVE"/>
		<reference ref_id="CVE-2017-2356" ref_url="https://www.suse.com/security/cve/CVE-2017-2356/" source="CVE"/>
		<reference ref_id="CVE-2017-2362" ref_url="https://www.suse.com/security/cve/CVE-2017-2362/" source="CVE"/>
		<reference ref_id="CVE-2017-2363" ref_url="https://www.suse.com/security/cve/CVE-2017-2363/" source="CVE"/>
		<reference ref_id="CVE-2017-2364" ref_url="https://www.suse.com/security/cve/CVE-2017-2364/" source="CVE"/>
		<reference ref_id="CVE-2017-2365" ref_url="https://www.suse.com/security/cve/CVE-2017-2365/" source="CVE"/>
		<reference ref_id="CVE-2017-2366" ref_url="https://www.suse.com/security/cve/CVE-2017-2366/" source="CVE"/>
		<reference ref_id="CVE-2017-2369" ref_url="https://www.suse.com/security/cve/CVE-2017-2369/" source="CVE"/>
		<reference ref_id="CVE-2017-2371" ref_url="https://www.suse.com/security/cve/CVE-2017-2371/" source="CVE"/>
		<reference ref_id="CVE-2017-2373" ref_url="https://www.suse.com/security/cve/CVE-2017-2373/" source="CVE"/>
		<reference ref_id="CVE-2017-2496" ref_url="https://www.suse.com/security/cve/CVE-2017-2496/" source="CVE"/>
		<reference ref_id="CVE-2017-2510" ref_url="https://www.suse.com/security/cve/CVE-2017-2510/" source="CVE"/>
		<reference ref_id="CVE-2017-2538" ref_url="https://www.suse.com/security/cve/CVE-2017-2538/" source="CVE"/>
		<reference ref_id="CVE-2017-2539" ref_url="https://www.suse.com/security/cve/CVE-2017-2539/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-7006" ref_url="https://www.suse.com/security/cve/CVE-2017-7006/" source="CVE"/>
		<reference ref_id="CVE-2017-7011" ref_url="https://www.suse.com/security/cve/CVE-2017-7011/" source="CVE"/>
		<reference ref_id="CVE-2017-7012" ref_url="https://www.suse.com/security/cve/CVE-2017-7012/" source="CVE"/>
		<reference ref_id="CVE-2017-7018" ref_url="https://www.suse.com/security/cve/CVE-2017-7018/" source="CVE"/>
		<reference ref_id="CVE-2017-7019" ref_url="https://www.suse.com/security/cve/CVE-2017-7019/" source="CVE"/>
		<reference ref_id="CVE-2017-7020" ref_url="https://www.suse.com/security/cve/CVE-2017-7020/" source="CVE"/>
		<reference ref_id="CVE-2017-7030" ref_url="https://www.suse.com/security/cve/CVE-2017-7030/" source="CVE"/>
		<reference ref_id="CVE-2017-7034" ref_url="https://www.suse.com/security/cve/CVE-2017-7034/" source="CVE"/>
		<reference ref_id="CVE-2017-7037" ref_url="https://www.suse.com/security/cve/CVE-2017-7037/" source="CVE"/>
		<reference ref_id="CVE-2017-7038" ref_url="https://www.suse.com/security/cve/CVE-2017-7038/" source="CVE"/>
		<reference ref_id="CVE-2017-7039" ref_url="https://www.suse.com/security/cve/CVE-2017-7039/" source="CVE"/>
		<reference ref_id="CVE-2017-7040" ref_url="https://www.suse.com/security/cve/CVE-2017-7040/" source="CVE"/>
		<reference ref_id="CVE-2017-7041" ref_url="https://www.suse.com/security/cve/CVE-2017-7041/" source="CVE"/>
		<reference ref_id="CVE-2017-7042" ref_url="https://www.suse.com/security/cve/CVE-2017-7042/" source="CVE"/>
		<reference ref_id="CVE-2017-7043" ref_url="https://www.suse.com/security/cve/CVE-2017-7043/" source="CVE"/>
		<reference ref_id="CVE-2017-7046" ref_url="https://www.suse.com/security/cve/CVE-2017-7046/" source="CVE"/>
		<reference ref_id="CVE-2017-7048" ref_url="https://www.suse.com/security/cve/CVE-2017-7048/" source="CVE"/>
		<reference ref_id="CVE-2017-7049" ref_url="https://www.suse.com/security/cve/CVE-2017-7049/" source="CVE"/>
		<reference ref_id="CVE-2017-7052" ref_url="https://www.suse.com/security/cve/CVE-2017-7052/" source="CVE"/>
		<reference ref_id="CVE-2017-7055" ref_url="https://www.suse.com/security/cve/CVE-2017-7055/" source="CVE"/>
		<reference ref_id="CVE-2017-7056" ref_url="https://www.suse.com/security/cve/CVE-2017-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-7059" ref_url="https://www.suse.com/security/cve/CVE-2017-7059/" source="CVE"/>
		<reference ref_id="CVE-2017-7061" ref_url="https://www.suse.com/security/cve/CVE-2017-7061/" source="CVE"/>
		<reference ref_id="CVE-2017-7064" ref_url="https://www.suse.com/security/cve/CVE-2017-7064/" source="CVE"/>
		<reference ref_id="CVE-2017-7081" ref_url="https://www.suse.com/security/cve/CVE-2017-7081/" source="CVE"/>
		<reference ref_id="CVE-2017-7087" ref_url="https://www.suse.com/security/cve/CVE-2017-7087/" source="CVE"/>
		<reference ref_id="CVE-2017-7089" ref_url="https://www.suse.com/security/cve/CVE-2017-7089/" source="CVE"/>
		<reference ref_id="CVE-2017-7090" ref_url="https://www.suse.com/security/cve/CVE-2017-7090/" source="CVE"/>
		<reference ref_id="CVE-2017-7091" ref_url="https://www.suse.com/security/cve/CVE-2017-7091/" source="CVE"/>
		<reference ref_id="CVE-2017-7092" ref_url="https://www.suse.com/security/cve/CVE-2017-7092/" source="CVE"/>
		<reference ref_id="CVE-2017-7093" ref_url="https://www.suse.com/security/cve/CVE-2017-7093/" source="CVE"/>
		<reference ref_id="CVE-2017-7094" ref_url="https://www.suse.com/security/cve/CVE-2017-7094/" source="CVE"/>
		<reference ref_id="CVE-2017-7095" ref_url="https://www.suse.com/security/cve/CVE-2017-7095/" source="CVE"/>
		<reference ref_id="CVE-2017-7096" ref_url="https://www.suse.com/security/cve/CVE-2017-7096/" source="CVE"/>
		<reference ref_id="CVE-2017-7098" ref_url="https://www.suse.com/security/cve/CVE-2017-7098/" source="CVE"/>
		<reference ref_id="CVE-2017-7099" ref_url="https://www.suse.com/security/cve/CVE-2017-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-7100" ref_url="https://www.suse.com/security/cve/CVE-2017-7100/" source="CVE"/>
		<reference ref_id="CVE-2017-7102" ref_url="https://www.suse.com/security/cve/CVE-2017-7102/" source="CVE"/>
		<reference ref_id="CVE-2017-7104" ref_url="https://www.suse.com/security/cve/CVE-2017-7104/" source="CVE"/>
		<reference ref_id="CVE-2017-7107" ref_url="https://www.suse.com/security/cve/CVE-2017-7107/" source="CVE"/>
		<reference ref_id="CVE-2017-7109" ref_url="https://www.suse.com/security/cve/CVE-2017-7109/" source="CVE"/>
		<reference ref_id="CVE-2017-7111" ref_url="https://www.suse.com/security/cve/CVE-2017-7111/" source="CVE"/>
		<reference ref_id="CVE-2017-7117" ref_url="https://www.suse.com/security/cve/CVE-2017-7117/" source="CVE"/>
		<reference ref_id="CVE-2017-7120" ref_url="https://www.suse.com/security/cve/CVE-2017-7120/" source="CVE"/>
		<reference ref_id="CVE-2017-7142" ref_url="https://www.suse.com/security/cve/CVE-2017-7142/" source="CVE"/>
		<reference ref_id="CVE-2017-7153" ref_url="https://www.suse.com/security/cve/CVE-2017-7153/" source="CVE"/>
		<reference ref_id="CVE-2017-7156" ref_url="https://www.suse.com/security/cve/CVE-2017-7156/" source="CVE"/>
		<reference ref_id="CVE-2017-7157" ref_url="https://www.suse.com/security/cve/CVE-2017-7157/" source="CVE"/>
		<reference ref_id="CVE-2017-7160" ref_url="https://www.suse.com/security/cve/CVE-2017-7160/" source="CVE"/>
		<reference ref_id="CVE-2017-7161" ref_url="https://www.suse.com/security/cve/CVE-2017-7161/" source="CVE"/>
		<reference ref_id="CVE-2017-7165" ref_url="https://www.suse.com/security/cve/CVE-2017-7165/" source="CVE"/>
		<reference ref_id="CVE-2018-11646" ref_url="https://www.suse.com/security/cve/CVE-2018-11646/" source="CVE"/>
		<reference ref_id="CVE-2018-11712" ref_url="https://www.suse.com/security/cve/CVE-2018-11712/" source="CVE"/>
		<reference ref_id="CVE-2018-11713" ref_url="https://www.suse.com/security/cve/CVE-2018-11713/" source="CVE"/>
		<reference ref_id="CVE-2018-12911" ref_url="https://www.suse.com/security/cve/CVE-2018-12911/" source="CVE"/>
		<reference ref_id="CVE-2018-4088" ref_url="https://www.suse.com/security/cve/CVE-2018-4088/" source="CVE"/>
		<reference ref_id="CVE-2018-4096" ref_url="https://www.suse.com/security/cve/CVE-2018-4096/" source="CVE"/>
		<reference ref_id="CVE-2018-4101" ref_url="https://www.suse.com/security/cve/CVE-2018-4101/" source="CVE"/>
		<reference ref_id="CVE-2018-4113" ref_url="https://www.suse.com/security/cve/CVE-2018-4113/" source="CVE"/>
		<reference ref_id="CVE-2018-4114" ref_url="https://www.suse.com/security/cve/CVE-2018-4114/" source="CVE"/>
		<reference ref_id="CVE-2018-4117" ref_url="https://www.suse.com/security/cve/CVE-2018-4117/" source="CVE"/>
		<reference ref_id="CVE-2018-4118" ref_url="https://www.suse.com/security/cve/CVE-2018-4118/" source="CVE"/>
		<reference ref_id="CVE-2018-4119" ref_url="https://www.suse.com/security/cve/CVE-2018-4119/" source="CVE"/>
		<reference ref_id="CVE-2018-4120" ref_url="https://www.suse.com/security/cve/CVE-2018-4120/" source="CVE"/>
		<reference ref_id="CVE-2018-4122" ref_url="https://www.suse.com/security/cve/CVE-2018-4122/" source="CVE"/>
		<reference ref_id="CVE-2018-4125" ref_url="https://www.suse.com/security/cve/CVE-2018-4125/" source="CVE"/>
		<reference ref_id="CVE-2018-4127" ref_url="https://www.suse.com/security/cve/CVE-2018-4127/" source="CVE"/>
		<reference ref_id="CVE-2018-4128" ref_url="https://www.suse.com/security/cve/CVE-2018-4128/" source="CVE"/>
		<reference ref_id="CVE-2018-4129" ref_url="https://www.suse.com/security/cve/CVE-2018-4129/" source="CVE"/>
		<reference ref_id="CVE-2018-4133" ref_url="https://www.suse.com/security/cve/CVE-2018-4133/" source="CVE"/>
		<reference ref_id="CVE-2018-4146" ref_url="https://www.suse.com/security/cve/CVE-2018-4146/" source="CVE"/>
		<reference ref_id="CVE-2018-4161" ref_url="https://www.suse.com/security/cve/CVE-2018-4161/" source="CVE"/>
		<reference ref_id="CVE-2018-4162" ref_url="https://www.suse.com/security/cve/CVE-2018-4162/" source="CVE"/>
		<reference ref_id="CVE-2018-4163" ref_url="https://www.suse.com/security/cve/CVE-2018-4163/" source="CVE"/>
		<reference ref_id="CVE-2018-4165" ref_url="https://www.suse.com/security/cve/CVE-2018-4165/" source="CVE"/>
		<reference ref_id="CVE-2018-4190" ref_url="https://www.suse.com/security/cve/CVE-2018-4190/" source="CVE"/>
		<reference ref_id="CVE-2018-4191" ref_url="https://www.suse.com/security/cve/CVE-2018-4191/" source="CVE"/>
		<reference ref_id="CVE-2018-4197" ref_url="https://www.suse.com/security/cve/CVE-2018-4197/" source="CVE"/>
		<reference ref_id="CVE-2018-4199" ref_url="https://www.suse.com/security/cve/CVE-2018-4199/" source="CVE"/>
		<reference ref_id="CVE-2018-4200" ref_url="https://www.suse.com/security/cve/CVE-2018-4200/" source="CVE"/>
		<reference ref_id="CVE-2018-4204" ref_url="https://www.suse.com/security/cve/CVE-2018-4204/" source="CVE"/>
		<reference ref_id="CVE-2018-4207" ref_url="https://www.suse.com/security/cve/CVE-2018-4207/" source="CVE"/>
		<reference ref_id="CVE-2018-4208" ref_url="https://www.suse.com/security/cve/CVE-2018-4208/" source="CVE"/>
		<reference ref_id="CVE-2018-4209" ref_url="https://www.suse.com/security/cve/CVE-2018-4209/" source="CVE"/>
		<reference ref_id="CVE-2018-4210" ref_url="https://www.suse.com/security/cve/CVE-2018-4210/" source="CVE"/>
		<reference ref_id="CVE-2018-4212" ref_url="https://www.suse.com/security/cve/CVE-2018-4212/" source="CVE"/>
		<reference ref_id="CVE-2018-4213" ref_url="https://www.suse.com/security/cve/CVE-2018-4213/" source="CVE"/>
		<reference ref_id="CVE-2018-4218" ref_url="https://www.suse.com/security/cve/CVE-2018-4218/" source="CVE"/>
		<reference ref_id="CVE-2018-4222" ref_url="https://www.suse.com/security/cve/CVE-2018-4222/" source="CVE"/>
		<reference ref_id="CVE-2018-4232" ref_url="https://www.suse.com/security/cve/CVE-2018-4232/" source="CVE"/>
		<reference ref_id="CVE-2018-4233" ref_url="https://www.suse.com/security/cve/CVE-2018-4233/" source="CVE"/>
		<reference ref_id="CVE-2018-4246" ref_url="https://www.suse.com/security/cve/CVE-2018-4246/" source="CVE"/>
		<reference ref_id="CVE-2018-4261" ref_url="https://www.suse.com/security/cve/CVE-2018-4261/" source="CVE"/>
		<reference ref_id="CVE-2018-4262" ref_url="https://www.suse.com/security/cve/CVE-2018-4262/" source="CVE"/>
		<reference ref_id="CVE-2018-4263" ref_url="https://www.suse.com/security/cve/CVE-2018-4263/" source="CVE"/>
		<reference ref_id="CVE-2018-4264" ref_url="https://www.suse.com/security/cve/CVE-2018-4264/" source="CVE"/>
		<reference ref_id="CVE-2018-4265" ref_url="https://www.suse.com/security/cve/CVE-2018-4265/" source="CVE"/>
		<reference ref_id="CVE-2018-4266" ref_url="https://www.suse.com/security/cve/CVE-2018-4266/" source="CVE"/>
		<reference ref_id="CVE-2018-4267" ref_url="https://www.suse.com/security/cve/CVE-2018-4267/" source="CVE"/>
		<reference ref_id="CVE-2018-4270" ref_url="https://www.suse.com/security/cve/CVE-2018-4270/" source="CVE"/>
		<reference ref_id="CVE-2018-4272" ref_url="https://www.suse.com/security/cve/CVE-2018-4272/" source="CVE"/>
		<reference ref_id="CVE-2018-4273" ref_url="https://www.suse.com/security/cve/CVE-2018-4273/" source="CVE"/>
		<reference ref_id="CVE-2018-4278" ref_url="https://www.suse.com/security/cve/CVE-2018-4278/" source="CVE"/>
		<reference ref_id="CVE-2018-4284" ref_url="https://www.suse.com/security/cve/CVE-2018-4284/" source="CVE"/>
		<reference ref_id="CVE-2018-4299" ref_url="https://www.suse.com/security/cve/CVE-2018-4299/" source="CVE"/>
		<reference ref_id="CVE-2018-4306" ref_url="https://www.suse.com/security/cve/CVE-2018-4306/" source="CVE"/>
		<reference ref_id="CVE-2018-4309" ref_url="https://www.suse.com/security/cve/CVE-2018-4309/" source="CVE"/>
		<reference ref_id="CVE-2018-4312" ref_url="https://www.suse.com/security/cve/CVE-2018-4312/" source="CVE"/>
		<reference ref_id="CVE-2018-4314" ref_url="https://www.suse.com/security/cve/CVE-2018-4314/" source="CVE"/>
		<reference ref_id="CVE-2018-4315" ref_url="https://www.suse.com/security/cve/CVE-2018-4315/" source="CVE"/>
		<reference ref_id="CVE-2018-4316" ref_url="https://www.suse.com/security/cve/CVE-2018-4316/" source="CVE"/>
		<reference ref_id="CVE-2018-4317" ref_url="https://www.suse.com/security/cve/CVE-2018-4317/" source="CVE"/>
		<reference ref_id="CVE-2018-4318" ref_url="https://www.suse.com/security/cve/CVE-2018-4318/" source="CVE"/>
		<reference ref_id="CVE-2018-4319" ref_url="https://www.suse.com/security/cve/CVE-2018-4319/" source="CVE"/>
		<reference ref_id="CVE-2018-4323" ref_url="https://www.suse.com/security/cve/CVE-2018-4323/" source="CVE"/>
		<reference ref_id="CVE-2018-4328" ref_url="https://www.suse.com/security/cve/CVE-2018-4328/" source="CVE"/>
		<reference ref_id="CVE-2018-4345" ref_url="https://www.suse.com/security/cve/CVE-2018-4345/" source="CVE"/>
		<reference ref_id="CVE-2018-4358" ref_url="https://www.suse.com/security/cve/CVE-2018-4358/" source="CVE"/>
		<reference ref_id="CVE-2018-4359" ref_url="https://www.suse.com/security/cve/CVE-2018-4359/" source="CVE"/>
		<reference ref_id="CVE-2018-4361" ref_url="https://www.suse.com/security/cve/CVE-2018-4361/" source="CVE"/>
		<reference ref_id="CVE-2018-4372" ref_url="https://www.suse.com/security/cve/CVE-2018-4372/" source="CVE"/>
		<reference ref_id="CVE-2018-4373" ref_url="https://www.suse.com/security/cve/CVE-2018-4373/" source="CVE"/>
		<reference ref_id="CVE-2018-4375" ref_url="https://www.suse.com/security/cve/CVE-2018-4375/" source="CVE"/>
		<reference ref_id="CVE-2018-4376" ref_url="https://www.suse.com/security/cve/CVE-2018-4376/" source="CVE"/>
		<reference ref_id="CVE-2018-4378" ref_url="https://www.suse.com/security/cve/CVE-2018-4378/" source="CVE"/>
		<reference ref_id="CVE-2018-4382" ref_url="https://www.suse.com/security/cve/CVE-2018-4382/" source="CVE"/>
		<reference ref_id="CVE-2018-4386" ref_url="https://www.suse.com/security/cve/CVE-2018-4386/" source="CVE"/>
		<reference ref_id="CVE-2018-4392" ref_url="https://www.suse.com/security/cve/CVE-2018-4392/" source="CVE"/>
		<reference ref_id="CVE-2018-4416" ref_url="https://www.suse.com/security/cve/CVE-2018-4416/" source="CVE"/>
		<reference ref_id="CVE-2018-4437" ref_url="https://www.suse.com/security/cve/CVE-2018-4437/" source="CVE"/>
		<reference ref_id="CVE-2018-4438" ref_url="https://www.suse.com/security/cve/CVE-2018-4438/" source="CVE"/>
		<reference ref_id="CVE-2018-4441" ref_url="https://www.suse.com/security/cve/CVE-2018-4441/" source="CVE"/>
		<reference ref_id="CVE-2018-4442" ref_url="https://www.suse.com/security/cve/CVE-2018-4442/" source="CVE"/>
		<reference ref_id="CVE-2018-4443" ref_url="https://www.suse.com/security/cve/CVE-2018-4443/" source="CVE"/>
		<reference ref_id="CVE-2018-4464" ref_url="https://www.suse.com/security/cve/CVE-2018-4464/" source="CVE"/>
		<reference ref_id="CVE-2019-11070" ref_url="https://www.suse.com/security/cve/CVE-2019-11070/" source="CVE"/>
		<reference ref_id="CVE-2019-6201" ref_url="https://www.suse.com/security/cve/CVE-2019-6201/" source="CVE"/>
		<reference ref_id="CVE-2019-6212" ref_url="https://www.suse.com/security/cve/CVE-2019-6212/" source="CVE"/>
		<reference ref_id="CVE-2019-6215" ref_url="https://www.suse.com/security/cve/CVE-2019-6215/" source="CVE"/>
		<reference ref_id="CVE-2019-6216" ref_url="https://www.suse.com/security/cve/CVE-2019-6216/" source="CVE"/>
		<reference ref_id="CVE-2019-6217" ref_url="https://www.suse.com/security/cve/CVE-2019-6217/" source="CVE"/>
		<reference ref_id="CVE-2019-6226" ref_url="https://www.suse.com/security/cve/CVE-2019-6226/" source="CVE"/>
		<reference ref_id="CVE-2019-6227" ref_url="https://www.suse.com/security/cve/CVE-2019-6227/" source="CVE"/>
		<reference ref_id="CVE-2019-6229" ref_url="https://www.suse.com/security/cve/CVE-2019-6229/" source="CVE"/>
		<reference ref_id="CVE-2019-6233" ref_url="https://www.suse.com/security/cve/CVE-2019-6233/" source="CVE"/>
		<reference ref_id="CVE-2019-6234" ref_url="https://www.suse.com/security/cve/CVE-2019-6234/" source="CVE"/>
		<reference ref_id="CVE-2019-6251" ref_url="https://www.suse.com/security/cve/CVE-2019-6251/" source="CVE"/>
		<reference ref_id="CVE-2019-7285" ref_url="https://www.suse.com/security/cve/CVE-2019-7285/" source="CVE"/>
		<reference ref_id="CVE-2019-7292" ref_url="https://www.suse.com/security/cve/CVE-2019-7292/" source="CVE"/>
		<reference ref_id="CVE-2019-8375" ref_url="https://www.suse.com/security/cve/CVE-2019-8375/" source="CVE"/>
		<reference ref_id="CVE-2019-8503" ref_url="https://www.suse.com/security/cve/CVE-2019-8503/" source="CVE"/>
		<reference ref_id="CVE-2019-8506" ref_url="https://www.suse.com/security/cve/CVE-2019-8506/" source="CVE"/>
		<reference ref_id="CVE-2019-8515" ref_url="https://www.suse.com/security/cve/CVE-2019-8515/" source="CVE"/>
		<reference ref_id="CVE-2019-8518" ref_url="https://www.suse.com/security/cve/CVE-2019-8518/" source="CVE"/>
		<reference ref_id="CVE-2019-8523" ref_url="https://www.suse.com/security/cve/CVE-2019-8523/" source="CVE"/>
		<reference ref_id="CVE-2019-8524" ref_url="https://www.suse.com/security/cve/CVE-2019-8524/" source="CVE"/>
		<reference ref_id="CVE-2019-8535" ref_url="https://www.suse.com/security/cve/CVE-2019-8535/" source="CVE"/>
		<reference ref_id="CVE-2019-8536" ref_url="https://www.suse.com/security/cve/CVE-2019-8536/" source="CVE"/>
		<reference ref_id="CVE-2019-8544" ref_url="https://www.suse.com/security/cve/CVE-2019-8544/" source="CVE"/>
		<reference ref_id="CVE-2019-8551" ref_url="https://www.suse.com/security/cve/CVE-2019-8551/" source="CVE"/>
		<reference ref_id="CVE-2019-8558" ref_url="https://www.suse.com/security/cve/CVE-2019-8558/" source="CVE"/>
		<reference ref_id="CVE-2019-8559" ref_url="https://www.suse.com/security/cve/CVE-2019-8559/" source="CVE"/>
		<reference ref_id="CVE-2019-8563" ref_url="https://www.suse.com/security/cve/CVE-2019-8563/" source="CVE"/>
		<reference ref_id="CVE-2019-8595" ref_url="https://www.suse.com/security/cve/CVE-2019-8595/" source="CVE"/>
		<reference ref_id="CVE-2019-8607" ref_url="https://www.suse.com/security/cve/CVE-2019-8607/" source="CVE"/>
		<reference ref_id="CVE-2019-8615" ref_url="https://www.suse.com/security/cve/CVE-2019-8615/" source="CVE"/>
		<reference ref_id="CVE-2019-8625" ref_url="https://www.suse.com/security/cve/CVE-2019-8625/" source="CVE"/>
		<reference ref_id="CVE-2019-8644" ref_url="https://www.suse.com/security/cve/CVE-2019-8644/" source="CVE"/>
		<reference ref_id="CVE-2019-8649" ref_url="https://www.suse.com/security/cve/CVE-2019-8649/" source="CVE"/>
		<reference ref_id="CVE-2019-8658" ref_url="https://www.suse.com/security/cve/CVE-2019-8658/" source="CVE"/>
		<reference ref_id="CVE-2019-8666" ref_url="https://www.suse.com/security/cve/CVE-2019-8666/" source="CVE"/>
		<reference ref_id="CVE-2019-8669" ref_url="https://www.suse.com/security/cve/CVE-2019-8669/" source="CVE"/>
		<reference ref_id="CVE-2019-8671" ref_url="https://www.suse.com/security/cve/CVE-2019-8671/" source="CVE"/>
		<reference ref_id="CVE-2019-8672" ref_url="https://www.suse.com/security/cve/CVE-2019-8672/" source="CVE"/>
		<reference ref_id="CVE-2019-8673" ref_url="https://www.suse.com/security/cve/CVE-2019-8673/" source="CVE"/>
		<reference ref_id="CVE-2019-8674" ref_url="https://www.suse.com/security/cve/CVE-2019-8674/" source="CVE"/>
		<reference ref_id="CVE-2019-8676" ref_url="https://www.suse.com/security/cve/CVE-2019-8676/" source="CVE"/>
		<reference ref_id="CVE-2019-8677" ref_url="https://www.suse.com/security/cve/CVE-2019-8677/" source="CVE"/>
		<reference ref_id="CVE-2019-8678" ref_url="https://www.suse.com/security/cve/CVE-2019-8678/" source="CVE"/>
		<reference ref_id="CVE-2019-8679" ref_url="https://www.suse.com/security/cve/CVE-2019-8679/" source="CVE"/>
		<reference ref_id="CVE-2019-8680" ref_url="https://www.suse.com/security/cve/CVE-2019-8680/" source="CVE"/>
		<reference ref_id="CVE-2019-8681" ref_url="https://www.suse.com/security/cve/CVE-2019-8681/" source="CVE"/>
		<reference ref_id="CVE-2019-8683" ref_url="https://www.suse.com/security/cve/CVE-2019-8683/" source="CVE"/>
		<reference ref_id="CVE-2019-8684" ref_url="https://www.suse.com/security/cve/CVE-2019-8684/" source="CVE"/>
		<reference ref_id="CVE-2019-8686" ref_url="https://www.suse.com/security/cve/CVE-2019-8686/" source="CVE"/>
		<reference ref_id="CVE-2019-8687" ref_url="https://www.suse.com/security/cve/CVE-2019-8687/" source="CVE"/>
		<reference ref_id="CVE-2019-8688" ref_url="https://www.suse.com/security/cve/CVE-2019-8688/" source="CVE"/>
		<reference ref_id="CVE-2019-8689" ref_url="https://www.suse.com/security/cve/CVE-2019-8689/" source="CVE"/>
		<reference ref_id="CVE-2019-8690" ref_url="https://www.suse.com/security/cve/CVE-2019-8690/" source="CVE"/>
		<reference ref_id="CVE-2019-8707" ref_url="https://www.suse.com/security/cve/CVE-2019-8707/" source="CVE"/>
		<reference ref_id="CVE-2019-8710" ref_url="https://www.suse.com/security/cve/CVE-2019-8710/" source="CVE"/>
		<reference ref_id="CVE-2019-8719" ref_url="https://www.suse.com/security/cve/CVE-2019-8719/" source="CVE"/>
		<reference ref_id="CVE-2019-8720" ref_url="https://www.suse.com/security/cve/CVE-2019-8720/" source="CVE"/>
		<reference ref_id="CVE-2019-8726" ref_url="https://www.suse.com/security/cve/CVE-2019-8726/" source="CVE"/>
		<reference ref_id="CVE-2019-8733" ref_url="https://www.suse.com/security/cve/CVE-2019-8733/" source="CVE"/>
		<reference ref_id="CVE-2019-8735" ref_url="https://www.suse.com/security/cve/CVE-2019-8735/" source="CVE"/>
		<reference ref_id="CVE-2019-8743" ref_url="https://www.suse.com/security/cve/CVE-2019-8743/" source="CVE"/>
		<reference ref_id="CVE-2019-8763" ref_url="https://www.suse.com/security/cve/CVE-2019-8763/" source="CVE"/>
		<reference ref_id="CVE-2019-8764" ref_url="https://www.suse.com/security/cve/CVE-2019-8764/" source="CVE"/>
		<reference ref_id="CVE-2019-8765" ref_url="https://www.suse.com/security/cve/CVE-2019-8765/" source="CVE"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8768" ref_url="https://www.suse.com/security/cve/CVE-2019-8768/" source="CVE"/>
		<reference ref_id="CVE-2019-8769" ref_url="https://www.suse.com/security/cve/CVE-2019-8769/" source="CVE"/>
		<reference ref_id="CVE-2019-8771" ref_url="https://www.suse.com/security/cve/CVE-2019-8771/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8783" ref_url="https://www.suse.com/security/cve/CVE-2019-8783/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8811" ref_url="https://www.suse.com/security/cve/CVE-2019-8811/" source="CVE"/>
		<reference ref_id="CVE-2019-8812" ref_url="https://www.suse.com/security/cve/CVE-2019-8812/" source="CVE"/>
		<reference ref_id="CVE-2019-8813" ref_url="https://www.suse.com/security/cve/CVE-2019-8813/" source="CVE"/>
		<reference ref_id="CVE-2019-8814" ref_url="https://www.suse.com/security/cve/CVE-2019-8814/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2019-8816" ref_url="https://www.suse.com/security/cve/CVE-2019-8816/" source="CVE"/>
		<reference ref_id="CVE-2019-8819" ref_url="https://www.suse.com/security/cve/CVE-2019-8819/" source="CVE"/>
		<reference ref_id="CVE-2019-8820" ref_url="https://www.suse.com/security/cve/CVE-2019-8820/" source="CVE"/>
		<reference ref_id="CVE-2019-8821" ref_url="https://www.suse.com/security/cve/CVE-2019-8821/" source="CVE"/>
		<reference ref_id="CVE-2019-8822" ref_url="https://www.suse.com/security/cve/CVE-2019-8822/" source="CVE"/>
		<reference ref_id="CVE-2019-8823" ref_url="https://www.suse.com/security/cve/CVE-2019-8823/" source="CVE"/>
		<reference ref_id="CVE-2019-8835" ref_url="https://www.suse.com/security/cve/CVE-2019-8835/" source="CVE"/>
		<reference ref_id="CVE-2019-8844" ref_url="https://www.suse.com/security/cve/CVE-2019-8844/" source="CVE"/>
		<reference ref_id="CVE-2019-8846" ref_url="https://www.suse.com/security/cve/CVE-2019-8846/" source="CVE"/>
		<reference ref_id="CVE-2020-10018" ref_url="https://www.suse.com/security/cve/CVE-2020-10018/" source="CVE"/>
		<reference ref_id="CVE-2020-11793" ref_url="https://www.suse.com/security/cve/CVE-2020-11793/" source="CVE"/>
		<reference ref_id="CVE-2020-3862" ref_url="https://www.suse.com/security/cve/CVE-2020-3862/" source="CVE"/>
		<reference ref_id="CVE-2020-3864" ref_url="https://www.suse.com/security/cve/CVE-2020-3864/" source="CVE"/>
		<reference ref_id="CVE-2020-3865" ref_url="https://www.suse.com/security/cve/CVE-2020-3865/" source="CVE"/>
		<reference ref_id="CVE-2020-3867" ref_url="https://www.suse.com/security/cve/CVE-2020-3867/" source="CVE"/>
		<reference ref_id="CVE-2020-3868" ref_url="https://www.suse.com/security/cve/CVE-2020-3868/" source="CVE"/>
		<reference ref_id="CVE-2020-3885" ref_url="https://www.suse.com/security/cve/CVE-2020-3885/" source="CVE"/>
		<reference ref_id="CVE-2020-3894" ref_url="https://www.suse.com/security/cve/CVE-2020-3894/" source="CVE"/>
		<reference ref_id="CVE-2020-3895" ref_url="https://www.suse.com/security/cve/CVE-2020-3895/" source="CVE"/>
		<reference ref_id="CVE-2020-3897" ref_url="https://www.suse.com/security/cve/CVE-2020-3897/" source="CVE"/>
		<reference ref_id="CVE-2020-3899" ref_url="https://www.suse.com/security/cve/CVE-2020-3899/" source="CVE"/>
		<reference ref_id="CVE-2020-3900" ref_url="https://www.suse.com/security/cve/CVE-2020-3900/" source="CVE"/>
		<reference ref_id="CVE-2020-3901" ref_url="https://www.suse.com/security/cve/CVE-2020-3901/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<description>
These are all security issues fixed in the typelib-1_0-JavaScriptCore-4_0-2.28.2-1.11 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1856/">CVE-2016-1856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1857/">CVE-2016-1857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4590/">CVE-2016-4590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4591/">CVE-2016-4591</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4622/">CVE-2016-4622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4624/">CVE-2016-4624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4692/">CVE-2016-4692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4743/">CVE-2016-4743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7586/">CVE-2016-7586</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7587/">CVE-2016-7587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7589/">CVE-2016-7589</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7592/">CVE-2016-7592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7598/">CVE-2016-7598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7599/">CVE-2016-7599</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7610/">CVE-2016-7610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7623/">CVE-2016-7623</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7632/">CVE-2016-7632</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7635/">CVE-2016-7635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7639/">CVE-2016-7639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7641/">CVE-2016-7641</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7645/">CVE-2016-7645</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7652/">CVE-2016-7652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7654/">CVE-2016-7654</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7656/">CVE-2016-7656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-1000121/">CVE-2017-1000121</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000122/">CVE-2017-1000122</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13788/">CVE-2017-13788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13798/">CVE-2017-13798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13803/">CVE-2017-13803</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13856/">CVE-2017-13856</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13866/">CVE-2017-13866</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13870/">CVE-2017-13870</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13884/">CVE-2017-13884</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-13885/">CVE-2017-13885</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2350/">CVE-2017-2350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2354/">CVE-2017-2354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2355/">CVE-2017-2355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2356/">CVE-2017-2356</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2362/">CVE-2017-2362</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2363/">CVE-2017-2363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2364/">CVE-2017-2364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2365/">CVE-2017-2365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2366/">CVE-2017-2366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2369/">CVE-2017-2369</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2371/">CVE-2017-2371</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2373/">CVE-2017-2373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2496/">CVE-2017-2496</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2510/">CVE-2017-2510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2538/">CVE-2017-2538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2539/">CVE-2017-2539</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7006/">CVE-2017-7006</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7011/">CVE-2017-7011</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7012/">CVE-2017-7012</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7018/">CVE-2017-7018</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7019/">CVE-2017-7019</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7020/">CVE-2017-7020</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7030/">CVE-2017-7030</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7034/">CVE-2017-7034</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7037/">CVE-2017-7037</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7038/">CVE-2017-7038</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7039/">CVE-2017-7039</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7040/">CVE-2017-7040</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7041/">CVE-2017-7041</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7042/">CVE-2017-7042</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7043/">CVE-2017-7043</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7046/">CVE-2017-7046</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7048/">CVE-2017-7048</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7049/">CVE-2017-7049</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7052/">CVE-2017-7052</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7055/">CVE-2017-7055</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7056/">CVE-2017-7056</cve>
	<cve impact="critical" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7059/">CVE-2017-7059</cve>
	<cve impact="critical" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7061/">CVE-2017-7061</cve>
	<cve impact="critical" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7064/">CVE-2017-7064</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7081/">CVE-2017-7081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7087/">CVE-2017-7087</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7089/">CVE-2017-7089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7090/">CVE-2017-7090</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7091/">CVE-2017-7091</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7092/">CVE-2017-7092</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7093/">CVE-2017-7093</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7094/">CVE-2017-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7095/">CVE-2017-7095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7096/">CVE-2017-7096</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7098/">CVE-2017-7098</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7099/">CVE-2017-7099</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7100/">CVE-2017-7100</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7102/">CVE-2017-7102</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7104/">CVE-2017-7104</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7107/">CVE-2017-7107</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7109/">CVE-2017-7109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7111/">CVE-2017-7111</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7117/">CVE-2017-7117</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7120/">CVE-2017-7120</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7142/">CVE-2017-7142</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7153/">CVE-2017-7153</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7156/">CVE-2017-7156</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7157/">CVE-2017-7157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7160/">CVE-2017-7160</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7161/">CVE-2017-7161</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7165/">CVE-2017-7165</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11646/">CVE-2018-11646</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11712/">CVE-2018-11712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11713/">CVE-2018-11713</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12911/">CVE-2018-12911</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4088/">CVE-2018-4088</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4096/">CVE-2018-4096</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4101/">CVE-2018-4101</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4113/">CVE-2018-4113</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4114/">CVE-2018-4114</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4117/">CVE-2018-4117</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4118/">CVE-2018-4118</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4119/">CVE-2018-4119</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4120/">CVE-2018-4120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4122/">CVE-2018-4122</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4125/">CVE-2018-4125</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4127/">CVE-2018-4127</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4128/">CVE-2018-4128</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4129/">CVE-2018-4129</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4133/">CVE-2018-4133</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-4146/">CVE-2018-4146</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4161/">CVE-2018-4161</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4162/">CVE-2018-4162</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4163/">CVE-2018-4163</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4165/">CVE-2018-4165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4190/">CVE-2018-4190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4191/">CVE-2018-4191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4197/">CVE-2018-4197</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4199/">CVE-2018-4199</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4200/">CVE-2018-4200</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4204/">CVE-2018-4204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4207/">CVE-2018-4207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4208/">CVE-2018-4208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4209/">CVE-2018-4209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4210/">CVE-2018-4210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4212/">CVE-2018-4212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4213/">CVE-2018-4213</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4218/">CVE-2018-4218</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4222/">CVE-2018-4222</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4232/">CVE-2018-4232</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4233/">CVE-2018-4233</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4246/">CVE-2018-4246</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4261/">CVE-2018-4261</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4262/">CVE-2018-4262</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4263/">CVE-2018-4263</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4264/">CVE-2018-4264</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4265/">CVE-2018-4265</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-4266/">CVE-2018-4266</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4267/">CVE-2018-4267</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4270/">CVE-2018-4270</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4272/">CVE-2018-4272</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4273/">CVE-2018-4273</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4278/">CVE-2018-4278</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4284/">CVE-2018-4284</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4299/">CVE-2018-4299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4306/">CVE-2018-4306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4309/">CVE-2018-4309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4312/">CVE-2018-4312</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4314/">CVE-2018-4314</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4315/">CVE-2018-4315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4316/">CVE-2018-4316</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4317/">CVE-2018-4317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4318/">CVE-2018-4318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4319/">CVE-2018-4319</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4323/">CVE-2018-4323</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4328/">CVE-2018-4328</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4345/">CVE-2018-4345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4358/">CVE-2018-4358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4359/">CVE-2018-4359</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-4361/">CVE-2018-4361</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4372/">CVE-2018-4372</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4373/">CVE-2018-4373</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4375/">CVE-2018-4375</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4376/">CVE-2018-4376</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4378/">CVE-2018-4378</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4382/">CVE-2018-4382</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4386/">CVE-2018-4386</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4392/">CVE-2018-4392</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-4416/">CVE-2018-4416</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4437/">CVE-2018-4437</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4438/">CVE-2018-4438</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4441/">CVE-2018-4441</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4442/">CVE-2018-4442</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4443/">CVE-2018-4443</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-4464/">CVE-2018-4464</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11070/">CVE-2019-11070</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6201/">CVE-2019-6201</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6212/">CVE-2019-6212</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6215/">CVE-2019-6215</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6216/">CVE-2019-6216</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6217/">CVE-2019-6217</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6226/">CVE-2019-6226</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6227/">CVE-2019-6227</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6229/">CVE-2019-6229</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6233/">CVE-2019-6233</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6234/">CVE-2019-6234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6251/">CVE-2019-6251</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7285/">CVE-2019-7285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7292/">CVE-2019-7292</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8375/">CVE-2019-8375</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-8503/">CVE-2019-8503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8506/">CVE-2019-8506</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8515/">CVE-2019-8515</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8518/">CVE-2019-8518</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8523/">CVE-2019-8523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8524/">CVE-2019-8524</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8535/">CVE-2019-8535</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8536/">CVE-2019-8536</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8544/">CVE-2019-8544</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8551/">CVE-2019-8551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8558/">CVE-2019-8558</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8559/">CVE-2019-8559</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8563/">CVE-2019-8563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8595/">CVE-2019-8595</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8607/">CVE-2019-8607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8615/">CVE-2019-8615</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8625/">CVE-2019-8625</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8644/">CVE-2019-8644</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8649/">CVE-2019-8649</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8658/">CVE-2019-8658</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8666/">CVE-2019-8666</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8669/">CVE-2019-8669</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8671/">CVE-2019-8671</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8672/">CVE-2019-8672</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8673/">CVE-2019-8673</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8674/">CVE-2019-8674</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8676/">CVE-2019-8676</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8677/">CVE-2019-8677</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8678/">CVE-2019-8678</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8679/">CVE-2019-8679</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8680/">CVE-2019-8680</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8681/">CVE-2019-8681</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8683/">CVE-2019-8683</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8684/">CVE-2019-8684</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8686/">CVE-2019-8686</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8687/">CVE-2019-8687</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8688/">CVE-2019-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8689/">CVE-2019-8689</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8690/">CVE-2019-8690</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8707/">CVE-2019-8707</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8710/">CVE-2019-8710</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8719/">CVE-2019-8719</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8720/">CVE-2019-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8726/">CVE-2019-8726</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8733/">CVE-2019-8733</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8735/">CVE-2019-8735</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8743/">CVE-2019-8743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-8763/">CVE-2019-8763</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8764/">CVE-2019-8764</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8765/">CVE-2019-8765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8768/">CVE-2019-8768</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8769/">CVE-2019-8769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8771/">CVE-2019-8771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8783/">CVE-2019-8783</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8811/">CVE-2019-8811</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8812/">CVE-2019-8812</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8813/">CVE-2019-8813</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8814/">CVE-2019-8814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8816/">CVE-2019-8816</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8819/">CVE-2019-8819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8820/">CVE-2019-8820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8821/">CVE-2019-8821</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8822/">CVE-2019-8822</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8823/">CVE-2019-8823</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8835/">CVE-2019-8835</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8844/">CVE-2019-8844</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-8846/">CVE-2019-8846</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10018/">CVE-2020-10018</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11793/">CVE-2020-11793</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-3862/">CVE-2020-3862</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-3864/">CVE-2020-3864</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3865/">CVE-2020-3865</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3867/">CVE-2020-3867</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3868/">CVE-2020-3868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3885/">CVE-2020-3885</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3894/">CVE-2020-3894</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3895/">CVE-2020-3895</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-3897/">CVE-2020-3897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3899/">CVE-2020-3899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3900/">CVE-2020-3900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3901/">CVE-2020-3901</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487587" comment="typelib-1_0-JavaScriptCore-4_0-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487588" comment="typelib-1_0-WebKit2-4_0-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487589" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.2-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487590" comment="webkit2gtk3-devel-2.28.2-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109790" version="1" class="patch">
	<metadata>
		<title>vino-3.22.0-9.32 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<description>
These are all security issues fixed in the vino-3.22.0-9.32 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487591" comment="vino-3.22.0-9.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487592" comment="vino-lang-3.22.0-9.32 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109791" version="1" class="patch">
	<metadata>
		<title>vorbis-tools-1.4.0-1.53 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9638" ref_url="https://www.suse.com/security/cve/CVE-2014-9638/" source="CVE"/>
		<reference ref_id="CVE-2014-9639" ref_url="https://www.suse.com/security/cve/CVE-2014-9639/" source="CVE"/>
		<reference ref_id="CVE-2014-9640" ref_url="https://www.suse.com/security/cve/CVE-2014-9640/" source="CVE"/>
		<reference ref_id="CVE-2015-6749" ref_url="https://www.suse.com/security/cve/CVE-2015-6749/" source="CVE"/>
		<description>
These are all security issues fixed in the vorbis-tools-1.4.0-1.53 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9638/">CVE-2014-9638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9639/">CVE-2014-9639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9640/">CVE-2014-9640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6749/">CVE-2015-6749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009486554" comment="vorbis-tools-1.4.0-1.53 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009486555" comment="vorbis-tools-lang-1.4.0-1.53 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109792" version="1" class="patch">
	<metadata>
		<title>wavpack-5.1.0-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<description>
These are all security issues fixed in the wavpack-5.1.0-4.6.1 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487593" comment="wavpack-5.1.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487594" comment="wavpack-devel-5.1.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109793" version="1" class="patch">
	<metadata>
		<title>wireshark-devel-3.2.2-3.35.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8710" ref_url="https://www.suse.com/security/cve/CVE-2014-8710/" source="CVE"/>
		<reference ref_id="CVE-2014-8711" ref_url="https://www.suse.com/security/cve/CVE-2014-8711/" source="CVE"/>
		<reference ref_id="CVE-2014-8712" ref_url="https://www.suse.com/security/cve/CVE-2014-8712/" source="CVE"/>
		<reference ref_id="CVE-2014-8713" ref_url="https://www.suse.com/security/cve/CVE-2014-8713/" source="CVE"/>
		<reference ref_id="CVE-2014-8714" ref_url="https://www.suse.com/security/cve/CVE-2014-8714/" source="CVE"/>
		<reference ref_id="CVE-2015-0559" ref_url="https://www.suse.com/security/cve/CVE-2015-0559/" source="CVE"/>
		<reference ref_id="CVE-2015-0560" ref_url="https://www.suse.com/security/cve/CVE-2015-0560/" source="CVE"/>
		<reference ref_id="CVE-2015-0561" ref_url="https://www.suse.com/security/cve/CVE-2015-0561/" source="CVE"/>
		<reference ref_id="CVE-2015-0562" ref_url="https://www.suse.com/security/cve/CVE-2015-0562/" source="CVE"/>
		<reference ref_id="CVE-2015-0563" ref_url="https://www.suse.com/security/cve/CVE-2015-0563/" source="CVE"/>
		<reference ref_id="CVE-2015-0564" ref_url="https://www.suse.com/security/cve/CVE-2015-0564/" source="CVE"/>
		<reference ref_id="CVE-2015-2187" ref_url="https://www.suse.com/security/cve/CVE-2015-2187/" source="CVE"/>
		<reference ref_id="CVE-2015-2188" ref_url="https://www.suse.com/security/cve/CVE-2015-2188/" source="CVE"/>
		<reference ref_id="CVE-2015-2189" ref_url="https://www.suse.com/security/cve/CVE-2015-2189/" source="CVE"/>
		<reference ref_id="CVE-2015-2190" ref_url="https://www.suse.com/security/cve/CVE-2015-2190/" source="CVE"/>
		<reference ref_id="CVE-2015-2191" ref_url="https://www.suse.com/security/cve/CVE-2015-2191/" source="CVE"/>
		<reference ref_id="CVE-2015-2192" ref_url="https://www.suse.com/security/cve/CVE-2015-2192/" source="CVE"/>
		<reference ref_id="CVE-2015-3808" ref_url="https://www.suse.com/security/cve/CVE-2015-3808/" source="CVE"/>
		<reference ref_id="CVE-2015-3809" ref_url="https://www.suse.com/security/cve/CVE-2015-3809/" source="CVE"/>
		<reference ref_id="CVE-2015-3810" ref_url="https://www.suse.com/security/cve/CVE-2015-3810/" source="CVE"/>
		<reference ref_id="CVE-2015-3811" ref_url="https://www.suse.com/security/cve/CVE-2015-3811/" source="CVE"/>
		<reference ref_id="CVE-2015-3812" ref_url="https://www.suse.com/security/cve/CVE-2015-3812/" source="CVE"/>
		<reference ref_id="CVE-2015-3813" ref_url="https://www.suse.com/security/cve/CVE-2015-3813/" source="CVE"/>
		<reference ref_id="CVE-2015-3814" ref_url="https://www.suse.com/security/cve/CVE-2015-3814/" source="CVE"/>
		<reference ref_id="CVE-2015-3815" ref_url="https://www.suse.com/security/cve/CVE-2015-3815/" source="CVE"/>
		<reference ref_id="CVE-2015-4651" ref_url="https://www.suse.com/security/cve/CVE-2015-4651/" source="CVE"/>
		<reference ref_id="CVE-2015-4652" ref_url="https://www.suse.com/security/cve/CVE-2015-4652/" source="CVE"/>
		<reference ref_id="CVE-2015-6241" ref_url="https://www.suse.com/security/cve/CVE-2015-6241/" source="CVE"/>
		<reference ref_id="CVE-2015-6242" ref_url="https://www.suse.com/security/cve/CVE-2015-6242/" source="CVE"/>
		<reference ref_id="CVE-2015-6243" ref_url="https://www.suse.com/security/cve/CVE-2015-6243/" source="CVE"/>
		<reference ref_id="CVE-2015-6244" ref_url="https://www.suse.com/security/cve/CVE-2015-6244/" source="CVE"/>
		<reference ref_id="CVE-2015-6245" ref_url="https://www.suse.com/security/cve/CVE-2015-6245/" source="CVE"/>
		<reference ref_id="CVE-2015-6246" ref_url="https://www.suse.com/security/cve/CVE-2015-6246/" source="CVE"/>
		<reference ref_id="CVE-2015-6247" ref_url="https://www.suse.com/security/cve/CVE-2015-6247/" source="CVE"/>
		<reference ref_id="CVE-2015-6248" ref_url="https://www.suse.com/security/cve/CVE-2015-6248/" source="CVE"/>
		<reference ref_id="CVE-2015-6249" ref_url="https://www.suse.com/security/cve/CVE-2015-6249/" source="CVE"/>
		<reference ref_id="CVE-2015-7830" ref_url="https://www.suse.com/security/cve/CVE-2015-7830/" source="CVE"/>
		<reference ref_id="CVE-2015-8711" ref_url="https://www.suse.com/security/cve/CVE-2015-8711/" source="CVE"/>
		<reference ref_id="CVE-2015-8718" ref_url="https://www.suse.com/security/cve/CVE-2015-8718/" source="CVE"/>
		<reference ref_id="CVE-2015-8720" ref_url="https://www.suse.com/security/cve/CVE-2015-8720/" source="CVE"/>
		<reference ref_id="CVE-2015-8721" ref_url="https://www.suse.com/security/cve/CVE-2015-8721/" source="CVE"/>
		<reference ref_id="CVE-2015-8722" ref_url="https://www.suse.com/security/cve/CVE-2015-8722/" source="CVE"/>
		<reference ref_id="CVE-2015-8723" ref_url="https://www.suse.com/security/cve/CVE-2015-8723/" source="CVE"/>
		<reference ref_id="CVE-2015-8724" ref_url="https://www.suse.com/security/cve/CVE-2015-8724/" source="CVE"/>
		<reference ref_id="CVE-2015-8725" ref_url="https://www.suse.com/security/cve/CVE-2015-8725/" source="CVE"/>
		<reference ref_id="CVE-2015-8726" ref_url="https://www.suse.com/security/cve/CVE-2015-8726/" source="CVE"/>
		<reference ref_id="CVE-2015-8727" ref_url="https://www.suse.com/security/cve/CVE-2015-8727/" source="CVE"/>
		<reference ref_id="CVE-2015-8728" ref_url="https://www.suse.com/security/cve/CVE-2015-8728/" source="CVE"/>
		<reference ref_id="CVE-2015-8729" ref_url="https://www.suse.com/security/cve/CVE-2015-8729/" source="CVE"/>
		<reference ref_id="CVE-2015-8730" ref_url="https://www.suse.com/security/cve/CVE-2015-8730/" source="CVE"/>
		<reference ref_id="CVE-2015-8731" ref_url="https://www.suse.com/security/cve/CVE-2015-8731/" source="CVE"/>
		<reference ref_id="CVE-2015-8732" ref_url="https://www.suse.com/security/cve/CVE-2015-8732/" source="CVE"/>
		<reference ref_id="CVE-2015-8733" ref_url="https://www.suse.com/security/cve/CVE-2015-8733/" source="CVE"/>
		<reference ref_id="CVE-2015-8734" ref_url="https://www.suse.com/security/cve/CVE-2015-8734/" source="CVE"/>
		<reference ref_id="CVE-2015-8735" ref_url="https://www.suse.com/security/cve/CVE-2015-8735/" source="CVE"/>
		<reference ref_id="CVE-2015-8736" ref_url="https://www.suse.com/security/cve/CVE-2015-8736/" source="CVE"/>
		<reference ref_id="CVE-2015-8737" ref_url="https://www.suse.com/security/cve/CVE-2015-8737/" source="CVE"/>
		<reference ref_id="CVE-2015-8738" ref_url="https://www.suse.com/security/cve/CVE-2015-8738/" source="CVE"/>
		<reference ref_id="CVE-2015-8739" ref_url="https://www.suse.com/security/cve/CVE-2015-8739/" source="CVE"/>
		<reference ref_id="CVE-2015-8740" ref_url="https://www.suse.com/security/cve/CVE-2015-8740/" source="CVE"/>
		<reference ref_id="CVE-2015-8741" ref_url="https://www.suse.com/security/cve/CVE-2015-8741/" source="CVE"/>
		<reference ref_id="CVE-2015-8742" ref_url="https://www.suse.com/security/cve/CVE-2015-8742/" source="CVE"/>
		<reference ref_id="CVE-2016-2522" ref_url="https://www.suse.com/security/cve/CVE-2016-2522/" source="CVE"/>
		<reference ref_id="CVE-2016-2523" ref_url="https://www.suse.com/security/cve/CVE-2016-2523/" source="CVE"/>
		<reference ref_id="CVE-2016-2524" ref_url="https://www.suse.com/security/cve/CVE-2016-2524/" source="CVE"/>
		<reference ref_id="CVE-2016-2525" ref_url="https://www.suse.com/security/cve/CVE-2016-2525/" source="CVE"/>
		<reference ref_id="CVE-2016-2526" ref_url="https://www.suse.com/security/cve/CVE-2016-2526/" source="CVE"/>
		<reference ref_id="CVE-2016-2527" ref_url="https://www.suse.com/security/cve/CVE-2016-2527/" source="CVE"/>
		<reference ref_id="CVE-2016-2528" ref_url="https://www.suse.com/security/cve/CVE-2016-2528/" source="CVE"/>
		<reference ref_id="CVE-2016-2529" ref_url="https://www.suse.com/security/cve/CVE-2016-2529/" source="CVE"/>
		<reference ref_id="CVE-2016-2530" ref_url="https://www.suse.com/security/cve/CVE-2016-2530/" source="CVE"/>
		<reference ref_id="CVE-2016-2531" ref_url="https://www.suse.com/security/cve/CVE-2016-2531/" source="CVE"/>
		<reference ref_id="CVE-2016-2532" ref_url="https://www.suse.com/security/cve/CVE-2016-2532/" source="CVE"/>
		<reference ref_id="CVE-2016-5350" ref_url="https://www.suse.com/security/cve/CVE-2016-5350/" source="CVE"/>
		<reference ref_id="CVE-2016-5351" ref_url="https://www.suse.com/security/cve/CVE-2016-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-5352" ref_url="https://www.suse.com/security/cve/CVE-2016-5352/" source="CVE"/>
		<reference ref_id="CVE-2016-5353" ref_url="https://www.suse.com/security/cve/CVE-2016-5353/" source="CVE"/>
		<reference ref_id="CVE-2016-5354" ref_url="https://www.suse.com/security/cve/CVE-2016-5354/" source="CVE"/>
		<reference ref_id="CVE-2016-5355" ref_url="https://www.suse.com/security/cve/CVE-2016-5355/" source="CVE"/>
		<reference ref_id="CVE-2016-5356" ref_url="https://www.suse.com/security/cve/CVE-2016-5356/" source="CVE"/>
		<reference ref_id="CVE-2016-5357" ref_url="https://www.suse.com/security/cve/CVE-2016-5357/" source="CVE"/>
		<reference ref_id="CVE-2016-5358" ref_url="https://www.suse.com/security/cve/CVE-2016-5358/" source="CVE"/>
		<reference ref_id="CVE-2016-6505" ref_url="https://www.suse.com/security/cve/CVE-2016-6505/" source="CVE"/>
		<reference ref_id="CVE-2016-6508" ref_url="https://www.suse.com/security/cve/CVE-2016-6508/" source="CVE"/>
		<reference ref_id="CVE-2016-6509" ref_url="https://www.suse.com/security/cve/CVE-2016-6509/" source="CVE"/>
		<reference ref_id="CVE-2016-6510" ref_url="https://www.suse.com/security/cve/CVE-2016-6510/" source="CVE"/>
		<reference ref_id="CVE-2016-6511" ref_url="https://www.suse.com/security/cve/CVE-2016-6511/" source="CVE"/>
		<reference ref_id="CVE-2016-6512" ref_url="https://www.suse.com/security/cve/CVE-2016-6512/" source="CVE"/>
		<reference ref_id="CVE-2016-6513" ref_url="https://www.suse.com/security/cve/CVE-2016-6513/" source="CVE"/>
		<reference ref_id="CVE-2016-7175" ref_url="https://www.suse.com/security/cve/CVE-2016-7175/" source="CVE"/>
		<reference ref_id="CVE-2016-7176" ref_url="https://www.suse.com/security/cve/CVE-2016-7176/" source="CVE"/>
		<reference ref_id="CVE-2016-7177" ref_url="https://www.suse.com/security/cve/CVE-2016-7177/" source="CVE"/>
		<reference ref_id="CVE-2016-7178" ref_url="https://www.suse.com/security/cve/CVE-2016-7178/" source="CVE"/>
		<reference ref_id="CVE-2016-7179" ref_url="https://www.suse.com/security/cve/CVE-2016-7179/" source="CVE"/>
		<reference ref_id="CVE-2016-7180" ref_url="https://www.suse.com/security/cve/CVE-2016-7180/" source="CVE"/>
		<reference ref_id="CVE-2016-9372" ref_url="https://www.suse.com/security/cve/CVE-2016-9372/" source="CVE"/>
		<reference ref_id="CVE-2016-9373" ref_url="https://www.suse.com/security/cve/CVE-2016-9373/" source="CVE"/>
		<reference ref_id="CVE-2016-9374" ref_url="https://www.suse.com/security/cve/CVE-2016-9374/" source="CVE"/>
		<reference ref_id="CVE-2016-9375" ref_url="https://www.suse.com/security/cve/CVE-2016-9375/" source="CVE"/>
		<reference ref_id="CVE-2016-9376" ref_url="https://www.suse.com/security/cve/CVE-2016-9376/" source="CVE"/>
		<reference ref_id="CVE-2017-11406" ref_url="https://www.suse.com/security/cve/CVE-2017-11406/" source="CVE"/>
		<reference ref_id="CVE-2017-11407" ref_url="https://www.suse.com/security/cve/CVE-2017-11407/" source="CVE"/>
		<reference ref_id="CVE-2017-11408" ref_url="https://www.suse.com/security/cve/CVE-2017-11408/" source="CVE"/>
		<reference ref_id="CVE-2017-11410" ref_url="https://www.suse.com/security/cve/CVE-2017-11410/" source="CVE"/>
		<reference ref_id="CVE-2017-11411" ref_url="https://www.suse.com/security/cve/CVE-2017-11411/" source="CVE"/>
		<reference ref_id="CVE-2017-13764" ref_url="https://www.suse.com/security/cve/CVE-2017-13764/" source="CVE"/>
		<reference ref_id="CVE-2017-13765" ref_url="https://www.suse.com/security/cve/CVE-2017-13765/" source="CVE"/>
		<reference ref_id="CVE-2017-13766" ref_url="https://www.suse.com/security/cve/CVE-2017-13766/" source="CVE"/>
		<reference ref_id="CVE-2017-13767" ref_url="https://www.suse.com/security/cve/CVE-2017-13767/" source="CVE"/>
		<reference ref_id="CVE-2017-15189" ref_url="https://www.suse.com/security/cve/CVE-2017-15189/" source="CVE"/>
		<reference ref_id="CVE-2017-15190" ref_url="https://www.suse.com/security/cve/CVE-2017-15190/" source="CVE"/>
		<reference ref_id="CVE-2017-15191" ref_url="https://www.suse.com/security/cve/CVE-2017-15191/" source="CVE"/>
		<reference ref_id="CVE-2017-15192" ref_url="https://www.suse.com/security/cve/CVE-2017-15192/" source="CVE"/>
		<reference ref_id="CVE-2017-15193" ref_url="https://www.suse.com/security/cve/CVE-2017-15193/" source="CVE"/>
		<reference ref_id="CVE-2017-17083" ref_url="https://www.suse.com/security/cve/CVE-2017-17083/" source="CVE"/>
		<reference ref_id="CVE-2017-17084" ref_url="https://www.suse.com/security/cve/CVE-2017-17084/" source="CVE"/>
		<reference ref_id="CVE-2017-17085" ref_url="https://www.suse.com/security/cve/CVE-2017-17085/" source="CVE"/>
		<reference ref_id="CVE-2017-5596" ref_url="https://www.suse.com/security/cve/CVE-2017-5596/" source="CVE"/>
		<reference ref_id="CVE-2017-5597" ref_url="https://www.suse.com/security/cve/CVE-2017-5597/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-6467" ref_url="https://www.suse.com/security/cve/CVE-2017-6467/" source="CVE"/>
		<reference ref_id="CVE-2017-6468" ref_url="https://www.suse.com/security/cve/CVE-2017-6468/" source="CVE"/>
		<reference ref_id="CVE-2017-6469" ref_url="https://www.suse.com/security/cve/CVE-2017-6469/" source="CVE"/>
		<reference ref_id="CVE-2017-6470" ref_url="https://www.suse.com/security/cve/CVE-2017-6470/" source="CVE"/>
		<reference ref_id="CVE-2017-6471" ref_url="https://www.suse.com/security/cve/CVE-2017-6471/" source="CVE"/>
		<reference ref_id="CVE-2017-6472" ref_url="https://www.suse.com/security/cve/CVE-2017-6472/" source="CVE"/>
		<reference ref_id="CVE-2017-6473" ref_url="https://www.suse.com/security/cve/CVE-2017-6473/" source="CVE"/>
		<reference ref_id="CVE-2017-6474" ref_url="https://www.suse.com/security/cve/CVE-2017-6474/" source="CVE"/>
		<reference ref_id="CVE-2017-7700" ref_url="https://www.suse.com/security/cve/CVE-2017-7700/" source="CVE"/>
		<reference ref_id="CVE-2017-7701" ref_url="https://www.suse.com/security/cve/CVE-2017-7701/" source="CVE"/>
		<reference ref_id="CVE-2017-7702" ref_url="https://www.suse.com/security/cve/CVE-2017-7702/" source="CVE"/>
		<reference ref_id="CVE-2017-7703" ref_url="https://www.suse.com/security/cve/CVE-2017-7703/" source="CVE"/>
		<reference ref_id="CVE-2017-7704" ref_url="https://www.suse.com/security/cve/CVE-2017-7704/" source="CVE"/>
		<reference ref_id="CVE-2017-7705" ref_url="https://www.suse.com/security/cve/CVE-2017-7705/" source="CVE"/>
		<reference ref_id="CVE-2017-7745" ref_url="https://www.suse.com/security/cve/CVE-2017-7745/" source="CVE"/>
		<reference ref_id="CVE-2017-7746" ref_url="https://www.suse.com/security/cve/CVE-2017-7746/" source="CVE"/>
		<reference ref_id="CVE-2017-7747" ref_url="https://www.suse.com/security/cve/CVE-2017-7747/" source="CVE"/>
		<reference ref_id="CVE-2017-7748" ref_url="https://www.suse.com/security/cve/CVE-2017-7748/" source="CVE"/>
		<reference ref_id="CVE-2017-9343" ref_url="https://www.suse.com/security/cve/CVE-2017-9343/" source="CVE"/>
		<reference ref_id="CVE-2017-9344" ref_url="https://www.suse.com/security/cve/CVE-2017-9344/" source="CVE"/>
		<reference ref_id="CVE-2017-9345" ref_url="https://www.suse.com/security/cve/CVE-2017-9345/" source="CVE"/>
		<reference ref_id="CVE-2017-9346" ref_url="https://www.suse.com/security/cve/CVE-2017-9346/" source="CVE"/>
		<reference ref_id="CVE-2017-9347" ref_url="https://www.suse.com/security/cve/CVE-2017-9347/" source="CVE"/>
		<reference ref_id="CVE-2017-9348" ref_url="https://www.suse.com/security/cve/CVE-2017-9348/" source="CVE"/>
		<reference ref_id="CVE-2017-9349" ref_url="https://www.suse.com/security/cve/CVE-2017-9349/" source="CVE"/>
		<reference ref_id="CVE-2017-9350" ref_url="https://www.suse.com/security/cve/CVE-2017-9350/" source="CVE"/>
		<reference ref_id="CVE-2017-9351" ref_url="https://www.suse.com/security/cve/CVE-2017-9351/" source="CVE"/>
		<reference ref_id="CVE-2017-9352" ref_url="https://www.suse.com/security/cve/CVE-2017-9352/" source="CVE"/>
		<reference ref_id="CVE-2017-9353" ref_url="https://www.suse.com/security/cve/CVE-2017-9353/" source="CVE"/>
		<reference ref_id="CVE-2017-9354" ref_url="https://www.suse.com/security/cve/CVE-2017-9354/" source="CVE"/>
		<reference ref_id="CVE-2018-11354" ref_url="https://www.suse.com/security/cve/CVE-2018-11354/" source="CVE"/>
		<reference ref_id="CVE-2018-11355" ref_url="https://www.suse.com/security/cve/CVE-2018-11355/" source="CVE"/>
		<reference ref_id="CVE-2018-11356" ref_url="https://www.suse.com/security/cve/CVE-2018-11356/" source="CVE"/>
		<reference ref_id="CVE-2018-11357" ref_url="https://www.suse.com/security/cve/CVE-2018-11357/" source="CVE"/>
		<reference ref_id="CVE-2018-11358" ref_url="https://www.suse.com/security/cve/CVE-2018-11358/" source="CVE"/>
		<reference ref_id="CVE-2018-11359" ref_url="https://www.suse.com/security/cve/CVE-2018-11359/" source="CVE"/>
		<reference ref_id="CVE-2018-11360" ref_url="https://www.suse.com/security/cve/CVE-2018-11360/" source="CVE"/>
		<reference ref_id="CVE-2018-11361" ref_url="https://www.suse.com/security/cve/CVE-2018-11361/" source="CVE"/>
		<reference ref_id="CVE-2018-11362" ref_url="https://www.suse.com/security/cve/CVE-2018-11362/" source="CVE"/>
		<reference ref_id="CVE-2018-12086" ref_url="https://www.suse.com/security/cve/CVE-2018-12086/" source="CVE"/>
		<reference ref_id="CVE-2018-14339" ref_url="https://www.suse.com/security/cve/CVE-2018-14339/" source="CVE"/>
		<reference ref_id="CVE-2018-14340" ref_url="https://www.suse.com/security/cve/CVE-2018-14340/" source="CVE"/>
		<reference ref_id="CVE-2018-14341" ref_url="https://www.suse.com/security/cve/CVE-2018-14341/" source="CVE"/>
		<reference ref_id="CVE-2018-14342" ref_url="https://www.suse.com/security/cve/CVE-2018-14342/" source="CVE"/>
		<reference ref_id="CVE-2018-14343" ref_url="https://www.suse.com/security/cve/CVE-2018-14343/" source="CVE"/>
		<reference ref_id="CVE-2018-14344" ref_url="https://www.suse.com/security/cve/CVE-2018-14344/" source="CVE"/>
		<reference ref_id="CVE-2018-14367" ref_url="https://www.suse.com/security/cve/CVE-2018-14367/" source="CVE"/>
		<reference ref_id="CVE-2018-14368" ref_url="https://www.suse.com/security/cve/CVE-2018-14368/" source="CVE"/>
		<reference ref_id="CVE-2018-14369" ref_url="https://www.suse.com/security/cve/CVE-2018-14369/" source="CVE"/>
		<reference ref_id="CVE-2018-14370" ref_url="https://www.suse.com/security/cve/CVE-2018-14370/" source="CVE"/>
		<reference ref_id="CVE-2018-16056" ref_url="https://www.suse.com/security/cve/CVE-2018-16056/" source="CVE"/>
		<reference ref_id="CVE-2018-16057" ref_url="https://www.suse.com/security/cve/CVE-2018-16057/" source="CVE"/>
		<reference ref_id="CVE-2018-16058" ref_url="https://www.suse.com/security/cve/CVE-2018-16058/" source="CVE"/>
		<reference ref_id="CVE-2018-18225" ref_url="https://www.suse.com/security/cve/CVE-2018-18225/" source="CVE"/>
		<reference ref_id="CVE-2018-18226" ref_url="https://www.suse.com/security/cve/CVE-2018-18226/" source="CVE"/>
		<reference ref_id="CVE-2018-18227" ref_url="https://www.suse.com/security/cve/CVE-2018-18227/" source="CVE"/>
		<reference ref_id="CVE-2018-19622" ref_url="https://www.suse.com/security/cve/CVE-2018-19622/" source="CVE"/>
		<reference ref_id="CVE-2018-19623" ref_url="https://www.suse.com/security/cve/CVE-2018-19623/" source="CVE"/>
		<reference ref_id="CVE-2018-19624" ref_url="https://www.suse.com/security/cve/CVE-2018-19624/" source="CVE"/>
		<reference ref_id="CVE-2018-19625" ref_url="https://www.suse.com/security/cve/CVE-2018-19625/" source="CVE"/>
		<reference ref_id="CVE-2018-19626" ref_url="https://www.suse.com/security/cve/CVE-2018-19626/" source="CVE"/>
		<reference ref_id="CVE-2018-19627" ref_url="https://www.suse.com/security/cve/CVE-2018-19627/" source="CVE"/>
		<reference ref_id="CVE-2018-19628" ref_url="https://www.suse.com/security/cve/CVE-2018-19628/" source="CVE"/>
		<reference ref_id="CVE-2018-5334" ref_url="https://www.suse.com/security/cve/CVE-2018-5334/" source="CVE"/>
		<reference ref_id="CVE-2018-5335" ref_url="https://www.suse.com/security/cve/CVE-2018-5335/" source="CVE"/>
		<reference ref_id="CVE-2018-5336" ref_url="https://www.suse.com/security/cve/CVE-2018-5336/" source="CVE"/>
		<reference ref_id="CVE-2018-7320" ref_url="https://www.suse.com/security/cve/CVE-2018-7320/" source="CVE"/>
		<reference ref_id="CVE-2018-7321" ref_url="https://www.suse.com/security/cve/CVE-2018-7321/" source="CVE"/>
		<reference ref_id="CVE-2018-7322" ref_url="https://www.suse.com/security/cve/CVE-2018-7322/" source="CVE"/>
		<reference ref_id="CVE-2018-7323" ref_url="https://www.suse.com/security/cve/CVE-2018-7323/" source="CVE"/>
		<reference ref_id="CVE-2018-7324" ref_url="https://www.suse.com/security/cve/CVE-2018-7324/" source="CVE"/>
		<reference ref_id="CVE-2018-7325" ref_url="https://www.suse.com/security/cve/CVE-2018-7325/" source="CVE"/>
		<reference ref_id="CVE-2018-7326" ref_url="https://www.suse.com/security/cve/CVE-2018-7326/" source="CVE"/>
		<reference ref_id="CVE-2018-7327" ref_url="https://www.suse.com/security/cve/CVE-2018-7327/" source="CVE"/>
		<reference ref_id="CVE-2018-7328" ref_url="https://www.suse.com/security/cve/CVE-2018-7328/" source="CVE"/>
		<reference ref_id="CVE-2018-7329" ref_url="https://www.suse.com/security/cve/CVE-2018-7329/" source="CVE"/>
		<reference ref_id="CVE-2018-7330" ref_url="https://www.suse.com/security/cve/CVE-2018-7330/" source="CVE"/>
		<reference ref_id="CVE-2018-7331" ref_url="https://www.suse.com/security/cve/CVE-2018-7331/" source="CVE"/>
		<reference ref_id="CVE-2018-7332" ref_url="https://www.suse.com/security/cve/CVE-2018-7332/" source="CVE"/>
		<reference ref_id="CVE-2018-7333" ref_url="https://www.suse.com/security/cve/CVE-2018-7333/" source="CVE"/>
		<reference ref_id="CVE-2018-7334" ref_url="https://www.suse.com/security/cve/CVE-2018-7334/" source="CVE"/>
		<reference ref_id="CVE-2018-7335" ref_url="https://www.suse.com/security/cve/CVE-2018-7335/" source="CVE"/>
		<reference ref_id="CVE-2018-7336" ref_url="https://www.suse.com/security/cve/CVE-2018-7336/" source="CVE"/>
		<reference ref_id="CVE-2018-7337" ref_url="https://www.suse.com/security/cve/CVE-2018-7337/" source="CVE"/>
		<reference ref_id="CVE-2018-7417" ref_url="https://www.suse.com/security/cve/CVE-2018-7417/" source="CVE"/>
		<reference ref_id="CVE-2018-7418" ref_url="https://www.suse.com/security/cve/CVE-2018-7418/" source="CVE"/>
		<reference ref_id="CVE-2018-7419" ref_url="https://www.suse.com/security/cve/CVE-2018-7419/" source="CVE"/>
		<reference ref_id="CVE-2018-7420" ref_url="https://www.suse.com/security/cve/CVE-2018-7420/" source="CVE"/>
		<reference ref_id="CVE-2018-7421" ref_url="https://www.suse.com/security/cve/CVE-2018-7421/" source="CVE"/>
		<reference ref_id="CVE-2018-9256" ref_url="https://www.suse.com/security/cve/CVE-2018-9256/" source="CVE"/>
		<reference ref_id="CVE-2018-9257" ref_url="https://www.suse.com/security/cve/CVE-2018-9257/" source="CVE"/>
		<reference ref_id="CVE-2018-9258" ref_url="https://www.suse.com/security/cve/CVE-2018-9258/" source="CVE"/>
		<reference ref_id="CVE-2018-9260" ref_url="https://www.suse.com/security/cve/CVE-2018-9260/" source="CVE"/>
		<reference ref_id="CVE-2018-9261" ref_url="https://www.suse.com/security/cve/CVE-2018-9261/" source="CVE"/>
		<reference ref_id="CVE-2018-9262" ref_url="https://www.suse.com/security/cve/CVE-2018-9262/" source="CVE"/>
		<reference ref_id="CVE-2018-9263" ref_url="https://www.suse.com/security/cve/CVE-2018-9263/" source="CVE"/>
		<reference ref_id="CVE-2018-9264" ref_url="https://www.suse.com/security/cve/CVE-2018-9264/" source="CVE"/>
		<reference ref_id="CVE-2018-9265" ref_url="https://www.suse.com/security/cve/CVE-2018-9265/" source="CVE"/>
		<reference ref_id="CVE-2018-9266" ref_url="https://www.suse.com/security/cve/CVE-2018-9266/" source="CVE"/>
		<reference ref_id="CVE-2018-9267" ref_url="https://www.suse.com/security/cve/CVE-2018-9267/" source="CVE"/>
		<reference ref_id="CVE-2018-9268" ref_url="https://www.suse.com/security/cve/CVE-2018-9268/" source="CVE"/>
		<reference ref_id="CVE-2018-9269" ref_url="https://www.suse.com/security/cve/CVE-2018-9269/" source="CVE"/>
		<reference ref_id="CVE-2018-9270" ref_url="https://www.suse.com/security/cve/CVE-2018-9270/" source="CVE"/>
		<reference ref_id="CVE-2018-9271" ref_url="https://www.suse.com/security/cve/CVE-2018-9271/" source="CVE"/>
		<reference ref_id="CVE-2018-9272" ref_url="https://www.suse.com/security/cve/CVE-2018-9272/" source="CVE"/>
		<reference ref_id="CVE-2018-9273" ref_url="https://www.suse.com/security/cve/CVE-2018-9273/" source="CVE"/>
		<reference ref_id="CVE-2018-9274" ref_url="https://www.suse.com/security/cve/CVE-2018-9274/" source="CVE"/>
		<reference ref_id="CVE-2019-10894" ref_url="https://www.suse.com/security/cve/CVE-2019-10894/" source="CVE"/>
		<reference ref_id="CVE-2019-10895" ref_url="https://www.suse.com/security/cve/CVE-2019-10895/" source="CVE"/>
		<reference ref_id="CVE-2019-10896" ref_url="https://www.suse.com/security/cve/CVE-2019-10896/" source="CVE"/>
		<reference ref_id="CVE-2019-10897" ref_url="https://www.suse.com/security/cve/CVE-2019-10897/" source="CVE"/>
		<reference ref_id="CVE-2019-10898" ref_url="https://www.suse.com/security/cve/CVE-2019-10898/" source="CVE"/>
		<reference ref_id="CVE-2019-10899" ref_url="https://www.suse.com/security/cve/CVE-2019-10899/" source="CVE"/>
		<reference ref_id="CVE-2019-10900" ref_url="https://www.suse.com/security/cve/CVE-2019-10900/" source="CVE"/>
		<reference ref_id="CVE-2019-10901" ref_url="https://www.suse.com/security/cve/CVE-2019-10901/" source="CVE"/>
		<reference ref_id="CVE-2019-10902" ref_url="https://www.suse.com/security/cve/CVE-2019-10902/" source="CVE"/>
		<reference ref_id="CVE-2019-10903" ref_url="https://www.suse.com/security/cve/CVE-2019-10903/" source="CVE"/>
		<reference ref_id="CVE-2019-13619" ref_url="https://www.suse.com/security/cve/CVE-2019-13619/" source="CVE"/>
		<reference ref_id="CVE-2019-16319" ref_url="https://www.suse.com/security/cve/CVE-2019-16319/" source="CVE"/>
		<reference ref_id="CVE-2019-19553" ref_url="https://www.suse.com/security/cve/CVE-2019-19553/" source="CVE"/>
		<reference ref_id="CVE-2019-5716" ref_url="https://www.suse.com/security/cve/CVE-2019-5716/" source="CVE"/>
		<reference ref_id="CVE-2019-5717" ref_url="https://www.suse.com/security/cve/CVE-2019-5717/" source="CVE"/>
		<reference ref_id="CVE-2019-5718" ref_url="https://www.suse.com/security/cve/CVE-2019-5718/" source="CVE"/>
		<reference ref_id="CVE-2019-5719" ref_url="https://www.suse.com/security/cve/CVE-2019-5719/" source="CVE"/>
		<reference ref_id="CVE-2019-5721" ref_url="https://www.suse.com/security/cve/CVE-2019-5721/" source="CVE"/>
		<reference ref_id="CVE-2019-9208" ref_url="https://www.suse.com/security/cve/CVE-2019-9208/" source="CVE"/>
		<reference ref_id="CVE-2019-9209" ref_url="https://www.suse.com/security/cve/CVE-2019-9209/" source="CVE"/>
		<reference ref_id="CVE-2019-9214" ref_url="https://www.suse.com/security/cve/CVE-2019-9214/" source="CVE"/>
		<reference ref_id="CVE-2020-7044" ref_url="https://www.suse.com/security/cve/CVE-2020-7044/" source="CVE"/>
		<reference ref_id="CVE-2020-9428" ref_url="https://www.suse.com/security/cve/CVE-2020-9428/" source="CVE"/>
		<reference ref_id="CVE-2020-9429" ref_url="https://www.suse.com/security/cve/CVE-2020-9429/" source="CVE"/>
		<reference ref_id="CVE-2020-9430" ref_url="https://www.suse.com/security/cve/CVE-2020-9430/" source="CVE"/>
		<reference ref_id="CVE-2020-9431" ref_url="https://www.suse.com/security/cve/CVE-2020-9431/" source="CVE"/>
		<description>
These are all security issues fixed in the wireshark-devel-3.2.2-3.35.2 package on the GA media of SUSE Linux Enterprise Module for Desktop Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8710/">CVE-2014-8710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8711/">CVE-2014-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8712/">CVE-2014-8712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8713/">CVE-2014-8713</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8714/">CVE-2014-8714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0559/">CVE-2015-0559</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0560/">CVE-2015-0560</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0561/">CVE-2015-0561</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0562/">CVE-2015-0562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0563/">CVE-2015-0563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0564/">CVE-2015-0564</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2187/">CVE-2015-2187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2188/">CVE-2015-2188</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2189/">CVE-2015-2189</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2190/">CVE-2015-2190</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2191/">CVE-2015-2191</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2192/">CVE-2015-2192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3808/">CVE-2015-3808</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3809/">CVE-2015-3809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3810/">CVE-2015-3810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3811/">CVE-2015-3811</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3812/">CVE-2015-3812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3813/">CVE-2015-3813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3814/">CVE-2015-3814</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3815/">CVE-2015-3815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4651/">CVE-2015-4651</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4652/">CVE-2015-4652</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6241/">CVE-2015-6241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6242/">CVE-2015-6242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6243/">CVE-2015-6243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6244/">CVE-2015-6244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6245/">CVE-2015-6245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6246/">CVE-2015-6246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6247/">CVE-2015-6247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6248/">CVE-2015-6248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-6249/">CVE-2015-6249</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7830/">CVE-2015-7830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8711/">CVE-2015-8711</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8718/">CVE-2015-8718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8720/">CVE-2015-8720</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8721/">CVE-2015-8721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8722/">CVE-2015-8722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8723/">CVE-2015-8723</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8724/">CVE-2015-8724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8725/">CVE-2015-8725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8726/">CVE-2015-8726</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8727/">CVE-2015-8727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8728/">CVE-2015-8728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8729/">CVE-2015-8729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8730/">CVE-2015-8730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8731/">CVE-2015-8731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8732/">CVE-2015-8732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8733/">CVE-2015-8733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8734/">CVE-2015-8734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8735/">CVE-2015-8735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8736/">CVE-2015-8736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8737/">CVE-2015-8737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8738/">CVE-2015-8738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8739/">CVE-2015-8739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8740/">CVE-2015-8740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8741/">CVE-2015-8741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8742/">CVE-2015-8742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2522/">CVE-2016-2522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2523/">CVE-2016-2523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2524/">CVE-2016-2524</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2525/">CVE-2016-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2526/">CVE-2016-2526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2527/">CVE-2016-2527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2528/">CVE-2016-2528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2529/">CVE-2016-2529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2530/">CVE-2016-2530</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2531/">CVE-2016-2531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2532/">CVE-2016-2532</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5350/">CVE-2016-5350</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5351/">CVE-2016-5351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5352/">CVE-2016-5352</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5353/">CVE-2016-5353</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5354/">CVE-2016-5354</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5355/">CVE-2016-5355</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5356/">CVE-2016-5356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5357/">CVE-2016-5357</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-5358/">CVE-2016-5358</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6505/">CVE-2016-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6508/">CVE-2016-6508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6509/">CVE-2016-6509</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6510/">CVE-2016-6510</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6511/">CVE-2016-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6512/">CVE-2016-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6513/">CVE-2016-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7175/">CVE-2016-7175</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7176/">CVE-2016-7176</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7177/">CVE-2016-7177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7178/">CVE-2016-7178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7179/">CVE-2016-7179</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7180/">CVE-2016-7180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9372/">CVE-2016-9372</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9373/">CVE-2016-9373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9374/">CVE-2016-9374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9375/">CVE-2016-9375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9376/">CVE-2016-9376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11406/">CVE-2017-11406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11407/">CVE-2017-11407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11408/">CVE-2017-11408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11410/">CVE-2017-11410</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11411/">CVE-2017-11411</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13764/">CVE-2017-13764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13765/">CVE-2017-13765</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13766/">CVE-2017-13766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13767/">CVE-2017-13767</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15189/">CVE-2017-15189</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15190/">CVE-2017-15190</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15191/">CVE-2017-15191</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15192/">CVE-2017-15192</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15193/">CVE-2017-15193</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17083/">CVE-2017-17083</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17084/">CVE-2017-17084</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17085/">CVE-2017-17085</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5596/">CVE-2017-5596</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5597/">CVE-2017-5597</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6467/">CVE-2017-6467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6468/">CVE-2017-6468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6469/">CVE-2017-6469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6470/">CVE-2017-6470</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6471/">CVE-2017-6471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6472/">CVE-2017-6472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6473/">CVE-2017-6473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6474/">CVE-2017-6474</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7700/">CVE-2017-7700</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7701/">CVE-2017-7701</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7702/">CVE-2017-7702</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7703/">CVE-2017-7703</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7704/">CVE-2017-7704</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7705/">CVE-2017-7705</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7745/">CVE-2017-7745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7746/">CVE-2017-7746</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7747/">CVE-2017-7747</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7748/">CVE-2017-7748</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9343/">CVE-2017-9343</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9344/">CVE-2017-9344</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9345/">CVE-2017-9345</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9346/">CVE-2017-9346</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9347/">CVE-2017-9347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9348/">CVE-2017-9348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9349/">CVE-2017-9349</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9350/">CVE-2017-9350</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9351/">CVE-2017-9351</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9352/">CVE-2017-9352</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9353/">CVE-2017-9353</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9354/">CVE-2017-9354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11354/">CVE-2018-11354</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11355/">CVE-2018-11355</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11356/">CVE-2018-11356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11357/">CVE-2018-11357</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11358/">CVE-2018-11358</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11359/">CVE-2018-11359</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11360/">CVE-2018-11360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11361/">CVE-2018-11361</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11362/">CVE-2018-11362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12086/">CVE-2018-12086</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14339/">CVE-2018-14339</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14340/">CVE-2018-14340</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14341/">CVE-2018-14341</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14342/">CVE-2018-14342</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14343/">CVE-2018-14343</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14344/">CVE-2018-14344</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14367/">CVE-2018-14367</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14368/">CVE-2018-14368</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14369/">CVE-2018-14369</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14370/">CVE-2018-14370</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16056/">CVE-2018-16056</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16057/">CVE-2018-16057</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16058/">CVE-2018-16058</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18225/">CVE-2018-18225</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18226/">CVE-2018-18226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18227/">CVE-2018-18227</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19622/">CVE-2018-19622</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19623/">CVE-2018-19623</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19624/">CVE-2018-19624</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19625/">CVE-2018-19625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19626/">CVE-2018-19626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19627/">CVE-2018-19627</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19628/">CVE-2018-19628</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5334/">CVE-2018-5334</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5335/">CVE-2018-5335</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5336/">CVE-2018-5336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7320/">CVE-2018-7320</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7321/">CVE-2018-7321</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7322/">CVE-2018-7322</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7323/">CVE-2018-7323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7324/">CVE-2018-7324</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7325/">CVE-2018-7325</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7326/">CVE-2018-7326</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7327/">CVE-2018-7327</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7328/">CVE-2018-7328</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7329/">CVE-2018-7329</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7330/">CVE-2018-7330</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7331/">CVE-2018-7331</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7332/">CVE-2018-7332</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7333/">CVE-2018-7333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7334/">CVE-2018-7334</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7335/">CVE-2018-7335</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7336/">CVE-2018-7336</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7337/">CVE-2018-7337</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7417/">CVE-2018-7417</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7418/">CVE-2018-7418</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7419/">CVE-2018-7419</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7420/">CVE-2018-7420</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7421/">CVE-2018-7421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9256/">CVE-2018-9256</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9257/">CVE-2018-9257</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9258/">CVE-2018-9258</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9260/">CVE-2018-9260</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9261/">CVE-2018-9261</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9262/">CVE-2018-9262</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9263/">CVE-2018-9263</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9264/">CVE-2018-9264</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9265/">CVE-2018-9265</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9266/">CVE-2018-9266</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9267/">CVE-2018-9267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9268/">CVE-2018-9268</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9269/">CVE-2018-9269</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9270/">CVE-2018-9270</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9271/">CVE-2018-9271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9272/">CVE-2018-9272</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9273/">CVE-2018-9273</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9274/">CVE-2018-9274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10894/">CVE-2019-10894</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10895/">CVE-2019-10895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10896/">CVE-2019-10896</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10897/">CVE-2019-10897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10898/">CVE-2019-10898</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10899/">CVE-2019-10899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10900/">CVE-2019-10900</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10901/">CVE-2019-10901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-10902/">CVE-2019-10902</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10903/">CVE-2019-10903</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13619/">CVE-2019-13619</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16319/">CVE-2019-16319</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19553/">CVE-2019-19553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5716/">CVE-2019-5716</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5717/">CVE-2019-5717</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5718/">CVE-2019-5718</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5719/">CVE-2019-5719</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5721/">CVE-2019-5721</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9208/">CVE-2019-9208</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9209/">CVE-2019-9209</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9214/">CVE-2019-9214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-7044/">CVE-2020-7044</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9428/">CVE-2020-9428</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9429/">CVE-2020-9429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9430/">CVE-2020-9430</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9431/">CVE-2020-9431</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487595" comment="wireshark-devel-3.2.2-3.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487596" comment="wireshark-ui-qt-3.2.2-3.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109794" version="1" class="patch">
	<metadata>
		<title>FastCGI-2.4.0-2.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-2766" ref_url="https://www.suse.com/security/cve/CVE-2011-2766/" source="CVE"/>
		<description>
These are all security issues fixed in the FastCGI-2.4.0-2.23 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-2766/">CVE-2011-2766</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487597" comment="FastCGI-2.4.0-2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487598" comment="FastCGI-devel-2.4.0-2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487599" comment="libfcgi0-2.4.0-2.23 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487600" comment="perl-FastCGI-2.4.0-2.23 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109795" version="1" class="patch">
	<metadata>
		<title>ant-1.10.7-2.79 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10886" ref_url="https://www.suse.com/security/cve/CVE-2018-10886/" source="CVE"/>
		<description>
These are all security issues fixed in the ant-1.10.7-2.79 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10886/">CVE-2018-10886</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487794" comment="ant-1.10.7-2.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487795" comment="ant-antlr-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487796" comment="ant-apache-bcel-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487797" comment="ant-apache-bsf-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487798" comment="ant-apache-log4j-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487799" comment="ant-apache-oro-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487800" comment="ant-apache-regexp-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487801" comment="ant-apache-resolver-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487802" comment="ant-commons-logging-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487803" comment="ant-javamail-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487804" comment="ant-jdepend-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487805" comment="ant-jmf-1.10.7-2.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487806" comment="ant-junit-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487807" comment="ant-manual-1.10.7-2.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487808" comment="ant-scripts-1.10.7-2.79 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487809" comment="ant-swing-1.10.7-2.79 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109796" version="1" class="patch">
	<metadata>
		<title>apache-commons-compress-1.19-1.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-12402" ref_url="https://www.suse.com/security/cve/CVE-2019-12402/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-compress-1.19-1.63 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12402/">CVE-2019-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487810" comment="apache-commons-compress-1.19-1.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109797" version="1" class="patch">
	<metadata>
		<title>apache-pdfbox-1.8.16-1.68 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-2175" ref_url="https://www.suse.com/security/cve/CVE-2016-2175/" source="CVE"/>
		<reference ref_id="CVE-2018-11797" ref_url="https://www.suse.com/security/cve/CVE-2018-11797/" source="CVE"/>
		<reference ref_id="CVE-2018-8036" ref_url="https://www.suse.com/security/cve/CVE-2018-8036/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-pdfbox-1.8.16-1.68 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2175/">CVE-2016-2175</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11797/">CVE-2018-11797</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8036/">CVE-2018-8036</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487811" comment="apache-pdfbox-1.8.16-1.68 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109798" version="1" class="patch">
	<metadata>
		<title>binutils-devel-32bit-2.32-7.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9939" ref_url="https://www.suse.com/security/cve/CVE-2014-9939/" source="CVE"/>
		<reference ref_id="CVE-2017-12448" ref_url="https://www.suse.com/security/cve/CVE-2017-12448/" source="CVE"/>
		<reference ref_id="CVE-2017-12450" ref_url="https://www.suse.com/security/cve/CVE-2017-12450/" source="CVE"/>
		<reference ref_id="CVE-2017-12452" ref_url="https://www.suse.com/security/cve/CVE-2017-12452/" source="CVE"/>
		<reference ref_id="CVE-2017-12453" ref_url="https://www.suse.com/security/cve/CVE-2017-12453/" source="CVE"/>
		<reference ref_id="CVE-2017-12454" ref_url="https://www.suse.com/security/cve/CVE-2017-12454/" source="CVE"/>
		<reference ref_id="CVE-2017-12456" ref_url="https://www.suse.com/security/cve/CVE-2017-12456/" source="CVE"/>
		<reference ref_id="CVE-2017-12799" ref_url="https://www.suse.com/security/cve/CVE-2017-12799/" source="CVE"/>
		<reference ref_id="CVE-2017-13757" ref_url="https://www.suse.com/security/cve/CVE-2017-13757/" source="CVE"/>
		<reference ref_id="CVE-2017-14128" ref_url="https://www.suse.com/security/cve/CVE-2017-14128/" source="CVE"/>
		<reference ref_id="CVE-2017-14129" ref_url="https://www.suse.com/security/cve/CVE-2017-14129/" source="CVE"/>
		<reference ref_id="CVE-2017-14130" ref_url="https://www.suse.com/security/cve/CVE-2017-14130/" source="CVE"/>
		<reference ref_id="CVE-2017-14333" ref_url="https://www.suse.com/security/cve/CVE-2017-14333/" source="CVE"/>
		<reference ref_id="CVE-2017-14529" ref_url="https://www.suse.com/security/cve/CVE-2017-14529/" source="CVE"/>
		<reference ref_id="CVE-2017-14729" ref_url="https://www.suse.com/security/cve/CVE-2017-14729/" source="CVE"/>
		<reference ref_id="CVE-2017-14745" ref_url="https://www.suse.com/security/cve/CVE-2017-14745/" source="CVE"/>
		<reference ref_id="CVE-2017-14974" ref_url="https://www.suse.com/security/cve/CVE-2017-14974/" source="CVE"/>
		<reference ref_id="CVE-2017-15938" ref_url="https://www.suse.com/security/cve/CVE-2017-15938/" source="CVE"/>
		<reference ref_id="CVE-2017-15939" ref_url="https://www.suse.com/security/cve/CVE-2017-15939/" source="CVE"/>
		<reference ref_id="CVE-2017-15996" ref_url="https://www.suse.com/security/cve/CVE-2017-15996/" source="CVE"/>
		<reference ref_id="CVE-2017-16826" ref_url="https://www.suse.com/security/cve/CVE-2017-16826/" source="CVE"/>
		<reference ref_id="CVE-2017-16827" ref_url="https://www.suse.com/security/cve/CVE-2017-16827/" source="CVE"/>
		<reference ref_id="CVE-2017-16828" ref_url="https://www.suse.com/security/cve/CVE-2017-16828/" source="CVE"/>
		<reference ref_id="CVE-2017-16829" ref_url="https://www.suse.com/security/cve/CVE-2017-16829/" source="CVE"/>
		<reference ref_id="CVE-2017-16830" ref_url="https://www.suse.com/security/cve/CVE-2017-16830/" source="CVE"/>
		<reference ref_id="CVE-2017-16831" ref_url="https://www.suse.com/security/cve/CVE-2017-16831/" source="CVE"/>
		<reference ref_id="CVE-2017-16832" ref_url="https://www.suse.com/security/cve/CVE-2017-16832/" source="CVE"/>
		<reference ref_id="CVE-2017-6965" ref_url="https://www.suse.com/security/cve/CVE-2017-6965/" source="CVE"/>
		<reference ref_id="CVE-2017-6966" ref_url="https://www.suse.com/security/cve/CVE-2017-6966/" source="CVE"/>
		<reference ref_id="CVE-2017-6969" ref_url="https://www.suse.com/security/cve/CVE-2017-6969/" source="CVE"/>
		<reference ref_id="CVE-2017-7209" ref_url="https://www.suse.com/security/cve/CVE-2017-7209/" source="CVE"/>
		<reference ref_id="CVE-2017-7210" ref_url="https://www.suse.com/security/cve/CVE-2017-7210/" source="CVE"/>
		<reference ref_id="CVE-2017-7223" ref_url="https://www.suse.com/security/cve/CVE-2017-7223/" source="CVE"/>
		<reference ref_id="CVE-2017-7224" ref_url="https://www.suse.com/security/cve/CVE-2017-7224/" source="CVE"/>
		<reference ref_id="CVE-2017-7225" ref_url="https://www.suse.com/security/cve/CVE-2017-7225/" source="CVE"/>
		<reference ref_id="CVE-2017-7226" ref_url="https://www.suse.com/security/cve/CVE-2017-7226/" source="CVE"/>
		<reference ref_id="CVE-2017-7299" ref_url="https://www.suse.com/security/cve/CVE-2017-7299/" source="CVE"/>
		<reference ref_id="CVE-2017-7300" ref_url="https://www.suse.com/security/cve/CVE-2017-7300/" source="CVE"/>
		<reference ref_id="CVE-2017-7301" ref_url="https://www.suse.com/security/cve/CVE-2017-7301/" source="CVE"/>
		<reference ref_id="CVE-2017-7302" ref_url="https://www.suse.com/security/cve/CVE-2017-7302/" source="CVE"/>
		<reference ref_id="CVE-2017-7303" ref_url="https://www.suse.com/security/cve/CVE-2017-7303/" source="CVE"/>
		<reference ref_id="CVE-2017-7304" ref_url="https://www.suse.com/security/cve/CVE-2017-7304/" source="CVE"/>
		<reference ref_id="CVE-2017-8392" ref_url="https://www.suse.com/security/cve/CVE-2017-8392/" source="CVE"/>
		<reference ref_id="CVE-2017-8393" ref_url="https://www.suse.com/security/cve/CVE-2017-8393/" source="CVE"/>
		<reference ref_id="CVE-2017-8394" ref_url="https://www.suse.com/security/cve/CVE-2017-8394/" source="CVE"/>
		<reference ref_id="CVE-2017-8396" ref_url="https://www.suse.com/security/cve/CVE-2017-8396/" source="CVE"/>
		<reference ref_id="CVE-2017-8421" ref_url="https://www.suse.com/security/cve/CVE-2017-8421/" source="CVE"/>
		<reference ref_id="CVE-2017-9746" ref_url="https://www.suse.com/security/cve/CVE-2017-9746/" source="CVE"/>
		<reference ref_id="CVE-2017-9747" ref_url="https://www.suse.com/security/cve/CVE-2017-9747/" source="CVE"/>
		<reference ref_id="CVE-2017-9748" ref_url="https://www.suse.com/security/cve/CVE-2017-9748/" source="CVE"/>
		<reference ref_id="CVE-2017-9750" ref_url="https://www.suse.com/security/cve/CVE-2017-9750/" source="CVE"/>
		<reference ref_id="CVE-2017-9755" ref_url="https://www.suse.com/security/cve/CVE-2017-9755/" source="CVE"/>
		<reference ref_id="CVE-2017-9756" ref_url="https://www.suse.com/security/cve/CVE-2017-9756/" source="CVE"/>
		<reference ref_id="CVE-2018-1000876" ref_url="https://www.suse.com/security/cve/CVE-2018-1000876/" source="CVE"/>
		<reference ref_id="CVE-2018-10372" ref_url="https://www.suse.com/security/cve/CVE-2018-10372/" source="CVE"/>
		<reference ref_id="CVE-2018-10373" ref_url="https://www.suse.com/security/cve/CVE-2018-10373/" source="CVE"/>
		<reference ref_id="CVE-2018-10534" ref_url="https://www.suse.com/security/cve/CVE-2018-10534/" source="CVE"/>
		<reference ref_id="CVE-2018-10535" ref_url="https://www.suse.com/security/cve/CVE-2018-10535/" source="CVE"/>
		<reference ref_id="CVE-2018-17358" ref_url="https://www.suse.com/security/cve/CVE-2018-17358/" source="CVE"/>
		<reference ref_id="CVE-2018-17359" ref_url="https://www.suse.com/security/cve/CVE-2018-17359/" source="CVE"/>
		<reference ref_id="CVE-2018-17360" ref_url="https://www.suse.com/security/cve/CVE-2018-17360/" source="CVE"/>
		<reference ref_id="CVE-2018-17985" ref_url="https://www.suse.com/security/cve/CVE-2018-17985/" source="CVE"/>
		<reference ref_id="CVE-2018-18309" ref_url="https://www.suse.com/security/cve/CVE-2018-18309/" source="CVE"/>
		<reference ref_id="CVE-2018-18483" ref_url="https://www.suse.com/security/cve/CVE-2018-18483/" source="CVE"/>
		<reference ref_id="CVE-2018-18484" ref_url="https://www.suse.com/security/cve/CVE-2018-18484/" source="CVE"/>
		<reference ref_id="CVE-2018-18605" ref_url="https://www.suse.com/security/cve/CVE-2018-18605/" source="CVE"/>
		<reference ref_id="CVE-2018-18606" ref_url="https://www.suse.com/security/cve/CVE-2018-18606/" source="CVE"/>
		<reference ref_id="CVE-2018-18607" ref_url="https://www.suse.com/security/cve/CVE-2018-18607/" source="CVE"/>
		<reference ref_id="CVE-2018-19931" ref_url="https://www.suse.com/security/cve/CVE-2018-19931/" source="CVE"/>
		<reference ref_id="CVE-2018-19932" ref_url="https://www.suse.com/security/cve/CVE-2018-19932/" source="CVE"/>
		<reference ref_id="CVE-2018-20623" ref_url="https://www.suse.com/security/cve/CVE-2018-20623/" source="CVE"/>
		<reference ref_id="CVE-2018-20651" ref_url="https://www.suse.com/security/cve/CVE-2018-20651/" source="CVE"/>
		<reference ref_id="CVE-2018-20671" ref_url="https://www.suse.com/security/cve/CVE-2018-20671/" source="CVE"/>
		<reference ref_id="CVE-2018-6323" ref_url="https://www.suse.com/security/cve/CVE-2018-6323/" source="CVE"/>
		<reference ref_id="CVE-2018-6543" ref_url="https://www.suse.com/security/cve/CVE-2018-6543/" source="CVE"/>
		<reference ref_id="CVE-2018-6759" ref_url="https://www.suse.com/security/cve/CVE-2018-6759/" source="CVE"/>
		<reference ref_id="CVE-2018-6872" ref_url="https://www.suse.com/security/cve/CVE-2018-6872/" source="CVE"/>
		<reference ref_id="CVE-2018-7208" ref_url="https://www.suse.com/security/cve/CVE-2018-7208/" source="CVE"/>
		<reference ref_id="CVE-2018-7568" ref_url="https://www.suse.com/security/cve/CVE-2018-7568/" source="CVE"/>
		<reference ref_id="CVE-2018-7569" ref_url="https://www.suse.com/security/cve/CVE-2018-7569/" source="CVE"/>
		<reference ref_id="CVE-2018-7570" ref_url="https://www.suse.com/security/cve/CVE-2018-7570/" source="CVE"/>
		<reference ref_id="CVE-2018-7642" ref_url="https://www.suse.com/security/cve/CVE-2018-7642/" source="CVE"/>
		<reference ref_id="CVE-2018-7643" ref_url="https://www.suse.com/security/cve/CVE-2018-7643/" source="CVE"/>
		<reference ref_id="CVE-2018-8945" ref_url="https://www.suse.com/security/cve/CVE-2018-8945/" source="CVE"/>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
These are all security issues fixed in the binutils-devel-32bit-2.32-7.8.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9939/">CVE-2014-9939</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12448/">CVE-2017-12448</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12450/">CVE-2017-12450</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12452/">CVE-2017-12452</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12453/">CVE-2017-12453</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12454/">CVE-2017-12454</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12456/">CVE-2017-12456</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12799/">CVE-2017-12799</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13757/">CVE-2017-13757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14128/">CVE-2017-14128</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14129/">CVE-2017-14129</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14130/">CVE-2017-14130</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14333/">CVE-2017-14333</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14529/">CVE-2017-14529</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14729/">CVE-2017-14729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14745/">CVE-2017-14745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14974/">CVE-2017-14974</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15938/">CVE-2017-15938</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15939/">CVE-2017-15939</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15996/">CVE-2017-15996</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16826/">CVE-2017-16826</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16827/">CVE-2017-16827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16828/">CVE-2017-16828</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16829/">CVE-2017-16829</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-16830/">CVE-2017-16830</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16831/">CVE-2017-16831</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16832/">CVE-2017-16832</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-6965/">CVE-2017-6965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-6966/">CVE-2017-6966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6969/">CVE-2017-6969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7209/">CVE-2017-7209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7210/">CVE-2017-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7223/">CVE-2017-7223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7224/">CVE-2017-7224</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7225/">CVE-2017-7225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7226/">CVE-2017-7226</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7299/">CVE-2017-7299</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7300/">CVE-2017-7300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7301/">CVE-2017-7301</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7302/">CVE-2017-7302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7303/">CVE-2017-7303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7304/">CVE-2017-7304</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8392/">CVE-2017-8392</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-8393/">CVE-2017-8393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8394/">CVE-2017-8394</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8396/">CVE-2017-8396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8421/">CVE-2017-8421</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9746/">CVE-2017-9746</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9747/">CVE-2017-9747</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9748/">CVE-2017-9748</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9750/">CVE-2017-9750</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9755/">CVE-2017-9755</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9756/">CVE-2017-9756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000876/">CVE-2018-1000876</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10372/">CVE-2018-10372</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10373/">CVE-2018-10373</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10534/">CVE-2018-10534</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10535/">CVE-2018-10535</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17358/">CVE-2018-17358</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17359/">CVE-2018-17359</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17360/">CVE-2018-17360</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17985/">CVE-2018-17985</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18309/">CVE-2018-18309</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18483/">CVE-2018-18483</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18484/">CVE-2018-18484</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18605/">CVE-2018-18605</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18606/">CVE-2018-18606</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18607/">CVE-2018-18607</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19931/">CVE-2018-19931</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19932/">CVE-2018-19932</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20623/">CVE-2018-20623</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20651/">CVE-2018-20651</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20671/">CVE-2018-20671</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6323/">CVE-2018-6323</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6543/">CVE-2018-6543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6759/">CVE-2018-6759</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6872/">CVE-2018-6872</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7208/">CVE-2018-7208</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7568/">CVE-2018-7568</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7569/">CVE-2018-7569</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7570/">CVE-2018-7570</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7642/">CVE-2018-7642</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7643/">CVE-2018-7643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8945/">CVE-2018-8945</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487812" comment="binutils-devel-32bit-2.32-7.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109799" version="1" class="patch">
	<metadata>
		<title>blktrace-1.1.0+git.20170126-3.3.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10689" ref_url="https://www.suse.com/security/cve/CVE-2018-10689/" source="CVE"/>
		<description>
These are all security issues fixed in the blktrace-1.1.0+git.20170126-3.3.28 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-10689/">CVE-2018-10689</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487734" comment="blktrace-1.1.0+git.20170126-3.3.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109800" version="1" class="patch">
	<metadata>
		<title>bouncycastle-1.64-1.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-7940" ref_url="https://www.suse.com/security/cve/CVE-2015-7940/" source="CVE"/>
		<reference ref_id="CVE-2016-1000338" ref_url="https://www.suse.com/security/cve/CVE-2016-1000338/" source="CVE"/>
		<reference ref_id="CVE-2016-1000339" ref_url="https://www.suse.com/security/cve/CVE-2016-1000339/" source="CVE"/>
		<reference ref_id="CVE-2016-1000340" ref_url="https://www.suse.com/security/cve/CVE-2016-1000340/" source="CVE"/>
		<reference ref_id="CVE-2016-1000341" ref_url="https://www.suse.com/security/cve/CVE-2016-1000341/" source="CVE"/>
		<reference ref_id="CVE-2016-1000342" ref_url="https://www.suse.com/security/cve/CVE-2016-1000342/" source="CVE"/>
		<reference ref_id="CVE-2016-1000343" ref_url="https://www.suse.com/security/cve/CVE-2016-1000343/" source="CVE"/>
		<reference ref_id="CVE-2016-1000344" ref_url="https://www.suse.com/security/cve/CVE-2016-1000344/" source="CVE"/>
		<reference ref_id="CVE-2016-1000345" ref_url="https://www.suse.com/security/cve/CVE-2016-1000345/" source="CVE"/>
		<reference ref_id="CVE-2016-1000346" ref_url="https://www.suse.com/security/cve/CVE-2016-1000346/" source="CVE"/>
		<reference ref_id="CVE-2016-1000352" ref_url="https://www.suse.com/security/cve/CVE-2016-1000352/" source="CVE"/>
		<reference ref_id="CVE-2017-13098" ref_url="https://www.suse.com/security/cve/CVE-2017-13098/" source="CVE"/>
		<reference ref_id="CVE-2018-1000180" ref_url="https://www.suse.com/security/cve/CVE-2018-1000180/" source="CVE"/>
		<reference ref_id="CVE-2018-1000613" ref_url="https://www.suse.com/security/cve/CVE-2018-1000613/" source="CVE"/>
		<reference ref_id="CVE-2019-17359" ref_url="https://www.suse.com/security/cve/CVE-2019-17359/" source="CVE"/>
		<description>
These are all security issues fixed in the bouncycastle-1.64-1.63 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7940/">CVE-2015-7940</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000338/">CVE-2016-1000338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000339/">CVE-2016-1000339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000340/">CVE-2016-1000340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000341/">CVE-2016-1000341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000342/">CVE-2016-1000342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000343/">CVE-2016-1000343</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000344/">CVE-2016-1000344</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000345/">CVE-2016-1000345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000346/">CVE-2016-1000346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000352/">CVE-2016-1000352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-13098/">CVE-2017-13098</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000180/">CVE-2018-1000180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000613/">CVE-2018-1000613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17359/">CVE-2019-17359</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487813" comment="bouncycastle-1.64-1.63 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487814" comment="bouncycastle-pg-1.64-1.63 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109801" version="1" class="patch">
	<metadata>
		<title>bsdtar-3.4.2-2.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-0211" ref_url="https://www.suse.com/security/cve/CVE-2013-0211/" source="CVE"/>
		<reference ref_id="CVE-2015-2304" ref_url="https://www.suse.com/security/cve/CVE-2015-2304/" source="CVE"/>
		<reference ref_id="CVE-2015-8917" ref_url="https://www.suse.com/security/cve/CVE-2015-8917/" source="CVE"/>
		<reference ref_id="CVE-2015-8928" ref_url="https://www.suse.com/security/cve/CVE-2015-8928/" source="CVE"/>
		<reference ref_id="CVE-2015-8933" ref_url="https://www.suse.com/security/cve/CVE-2015-8933/" source="CVE"/>
		<reference ref_id="CVE-2015-8934" ref_url="https://www.suse.com/security/cve/CVE-2015-8934/" source="CVE"/>
		<reference ref_id="CVE-2016-1541" ref_url="https://www.suse.com/security/cve/CVE-2016-1541/" source="CVE"/>
		<reference ref_id="CVE-2016-4300" ref_url="https://www.suse.com/security/cve/CVE-2016-4300/" source="CVE"/>
		<reference ref_id="CVE-2016-4301" ref_url="https://www.suse.com/security/cve/CVE-2016-4301/" source="CVE"/>
		<reference ref_id="CVE-2016-4809" ref_url="https://www.suse.com/security/cve/CVE-2016-4809/" source="CVE"/>
		<reference ref_id="CVE-2016-5418" ref_url="https://www.suse.com/security/cve/CVE-2016-5418/" source="CVE"/>
		<reference ref_id="CVE-2016-5844" ref_url="https://www.suse.com/security/cve/CVE-2016-5844/" source="CVE"/>
		<reference ref_id="CVE-2016-6250" ref_url="https://www.suse.com/security/cve/CVE-2016-6250/" source="CVE"/>
		<reference ref_id="CVE-2016-8687" ref_url="https://www.suse.com/security/cve/CVE-2016-8687/" source="CVE"/>
		<reference ref_id="CVE-2016-8688" ref_url="https://www.suse.com/security/cve/CVE-2016-8688/" source="CVE"/>
		<reference ref_id="CVE-2016-8689" ref_url="https://www.suse.com/security/cve/CVE-2016-8689/" source="CVE"/>
		<reference ref_id="CVE-2017-14166" ref_url="https://www.suse.com/security/cve/CVE-2017-14166/" source="CVE"/>
		<reference ref_id="CVE-2017-14501" ref_url="https://www.suse.com/security/cve/CVE-2017-14501/" source="CVE"/>
		<reference ref_id="CVE-2017-14502" ref_url="https://www.suse.com/security/cve/CVE-2017-14502/" source="CVE"/>
		<reference ref_id="CVE-2017-14503" ref_url="https://www.suse.com/security/cve/CVE-2017-14503/" source="CVE"/>
		<reference ref_id="CVE-2018-1000877" ref_url="https://www.suse.com/security/cve/CVE-2018-1000877/" source="CVE"/>
		<reference ref_id="CVE-2018-1000878" ref_url="https://www.suse.com/security/cve/CVE-2018-1000878/" source="CVE"/>
		<reference ref_id="CVE-2018-1000879" ref_url="https://www.suse.com/security/cve/CVE-2018-1000879/" source="CVE"/>
		<reference ref_id="CVE-2018-1000880" ref_url="https://www.suse.com/security/cve/CVE-2018-1000880/" source="CVE"/>
		<reference ref_id="CVE-2019-1000019" ref_url="https://www.suse.com/security/cve/CVE-2019-1000019/" source="CVE"/>
		<reference ref_id="CVE-2019-1000020" ref_url="https://www.suse.com/security/cve/CVE-2019-1000020/" source="CVE"/>
		<reference ref_id="CVE-2019-18408" ref_url="https://www.suse.com/security/cve/CVE-2019-18408/" source="CVE"/>
		<reference ref_id="CVE-2019-19221" ref_url="https://www.suse.com/security/cve/CVE-2019-19221/" source="CVE"/>
		<description>
These are all security issues fixed in the bsdtar-3.4.2-2.24 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-0211/">CVE-2013-0211</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2304/">CVE-2015-2304</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8917/">CVE-2015-8917</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8928/">CVE-2015-8928</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8933/">CVE-2015-8933</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8934/">CVE-2015-8934</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1541/">CVE-2016-1541</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4300/">CVE-2016-4300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4301/">CVE-2016-4301</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4809/">CVE-2016-4809</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5418/">CVE-2016-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5844/">CVE-2016-5844</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6250/">CVE-2016-6250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8687/">CVE-2016-8687</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8688/">CVE-2016-8688</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8689/">CVE-2016-8689</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14166/">CVE-2017-14166</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14501/">CVE-2017-14501</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14502/">CVE-2017-14502</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14503/">CVE-2017-14503</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000877/">CVE-2018-1000877</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000878/">CVE-2018-1000878</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000879/">CVE-2018-1000879</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000880/">CVE-2018-1000880</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000019/">CVE-2019-1000019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1000020/">CVE-2019-1000020</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18408/">CVE-2019-18408</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19221/">CVE-2019-19221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487815" comment="bsdtar-3.4.2-2.24 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109802" version="1" class="patch">
	<metadata>
		<title>bsh2-2.0.0.b6-10.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-2510" ref_url="https://www.suse.com/security/cve/CVE-2016-2510/" source="CVE"/>
		<description>
These are all security issues fixed in the bsh2-2.0.0.b6-10.65 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2510/">CVE-2016-2510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487816" comment="bsh2-2.0.0.b6-10.65 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487817" comment="bsh2-classgen-2.0.0.b6-10.65 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109803" version="1" class="patch">
	<metadata>
		<title>build-20200124.1-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14804" ref_url="https://www.suse.com/security/cve/CVE-2017-14804/" source="CVE"/>
		<description>
These are all security issues fixed in the build-20200124.1-1.21 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="9.9/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14804/">CVE-2017-14804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487818" comment="build-20200124.1-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487819" comment="build-mkbaselibs-20200124.1-1.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109804" version="1" class="patch">
	<metadata>
		<title>cargo-1.36.0-7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000622" ref_url="https://www.suse.com/security/cve/CVE-2018-1000622/" source="CVE"/>
		<reference ref_id="CVE-2019-12083" ref_url="https://www.suse.com/security/cve/CVE-2019-12083/" source="CVE"/>
		<description>
These are all security issues fixed in the cargo-1.36.0-7.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000622/">CVE-2018-1000622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12083/">CVE-2019-12083</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487820" comment="cargo-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487821" comment="clippy-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487822" comment="rls-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487823" comment="rust-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487824" comment="rust-analysis-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487825" comment="rust-src-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487826" comment="rust-std-static-1.36.0-7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487827" comment="rustfmt-1.36.0-7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109805" version="1" class="patch">
	<metadata>
		<title>checkbashisms-2.15.1-1.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2240" ref_url="https://www.suse.com/security/cve/CVE-2012-2240/" source="CVE"/>
		<reference ref_id="CVE-2012-2241" ref_url="https://www.suse.com/security/cve/CVE-2012-2241/" source="CVE"/>
		<reference ref_id="CVE-2012-3500" ref_url="https://www.suse.com/security/cve/CVE-2012-3500/" source="CVE"/>
		<description>
These are all security issues fixed in the checkbashisms-2.15.1-1.49 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2240/">CVE-2012-2240</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2241/">CVE-2012-2241</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3500/">CVE-2012-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487626" comment="checkbashisms-2.15.1-1.49 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109806" version="1" class="patch">
	<metadata>
		<title>cpp9-9.3.1+git1296-1.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-15847" ref_url="https://www.suse.com/security/cve/CVE-2019-15847/" source="CVE"/>
		<description>
These are all security issues fixed in the cpp9-9.3.1+git1296-1.6.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15847/">CVE-2019-15847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487828" comment="cpp9-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487829" comment="cross-nvptx-gcc7-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487830" comment="cross-nvptx-newlib7-devel-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487831" comment="gcc7-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487832" comment="gcc7-ada-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487833" comment="gcc7-c++-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487834" comment="gcc7-fortran-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487835" comment="gcc7-info-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487836" comment="gcc7-locale-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487837" comment="gcc7-objc-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487838" comment="gcc9-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487839" comment="gcc9-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487840" comment="gcc9-ada-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487841" comment="gcc9-ada-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487842" comment="gcc9-c++-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487843" comment="gcc9-c++-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487844" comment="gcc9-fortran-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487845" comment="gcc9-go-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487846" comment="gcc9-go-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487847" comment="gcc9-info-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487848" comment="gcc9-locale-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487849" comment="libada7-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487850" comment="libasan4-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487851" comment="libcilkrts5-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487852" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-4.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487853" comment="libstdc++6-devel-gcc9-32bit-9.3.1+git1296-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487854" comment="libubsan0-32bit-7.5.0+r278197-4.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109807" version="1" class="patch">
	<metadata>
		<title>crash-7.2.8-16.19 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-2524" ref_url="https://www.suse.com/security/cve/CVE-2014-2524/" source="CVE"/>
		<description>
These are all security issues fixed in the crash-7.2.8-16.19 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-2524/">CVE-2014-2524</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487855" comment="crash-7.2.8-16.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487856" comment="crash-devel-7.2.8-16.19 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487857" comment="crash-kmp-default-7.2.8_k5.3.18_22-16.19 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109808" version="1" class="patch">
	<metadata>
		<title>ctags-5.8-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7204" ref_url="https://www.suse.com/security/cve/CVE-2014-7204/" source="CVE"/>
		<description>
These are all security issues fixed in the ctags-5.8-1.27 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7204/">CVE-2014-7204</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487630" comment="ctags-5.8-1.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109809" version="1" class="patch">
	<metadata>
		<title>cups-ddk-2.2.7-3.17.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-5519" ref_url="https://www.suse.com/security/cve/CVE-2012-5519/" source="CVE"/>
		<reference ref_id="CVE-2014-3537" ref_url="https://www.suse.com/security/cve/CVE-2014-3537/" source="CVE"/>
		<reference ref_id="CVE-2014-5029" ref_url="https://www.suse.com/security/cve/CVE-2014-5029/" source="CVE"/>
		<reference ref_id="CVE-2014-5030" ref_url="https://www.suse.com/security/cve/CVE-2014-5030/" source="CVE"/>
		<reference ref_id="CVE-2014-5031" ref_url="https://www.suse.com/security/cve/CVE-2014-5031/" source="CVE"/>
		<reference ref_id="CVE-2015-1158" ref_url="https://www.suse.com/security/cve/CVE-2015-1158/" source="CVE"/>
		<reference ref_id="CVE-2015-1159" ref_url="https://www.suse.com/security/cve/CVE-2015-1159/" source="CVE"/>
		<reference ref_id="CVE-2017-18248" ref_url="https://www.suse.com/security/cve/CVE-2017-18248/" source="CVE"/>
		<reference ref_id="CVE-2018-4180" ref_url="https://www.suse.com/security/cve/CVE-2018-4180/" source="CVE"/>
		<reference ref_id="CVE-2018-4181" ref_url="https://www.suse.com/security/cve/CVE-2018-4181/" source="CVE"/>
		<reference ref_id="CVE-2018-4182" ref_url="https://www.suse.com/security/cve/CVE-2018-4182/" source="CVE"/>
		<reference ref_id="CVE-2018-4183" ref_url="https://www.suse.com/security/cve/CVE-2018-4183/" source="CVE"/>
		<reference ref_id="CVE-2018-4700" ref_url="https://www.suse.com/security/cve/CVE-2018-4700/" source="CVE"/>
		<reference ref_id="CVE-2019-8675" ref_url="https://www.suse.com/security/cve/CVE-2019-8675/" source="CVE"/>
		<reference ref_id="CVE-2019-8696" ref_url="https://www.suse.com/security/cve/CVE-2019-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-3898" ref_url="https://www.suse.com/security/cve/CVE-2020-3898/" source="CVE"/>
		<description>
These are all security issues fixed in the cups-ddk-2.2.7-3.17.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5519/">CVE-2012-5519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3537/">CVE-2014-3537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5029/">CVE-2014-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5030/">CVE-2014-5030</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5031/">CVE-2014-5031</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1158/">CVE-2015-1158</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1159/">CVE-2015-1159</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18248/">CVE-2017-18248</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4180/">CVE-2018-4180</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-4181/">CVE-2018-4181</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4182/">CVE-2018-4182</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4183/">CVE-2018-4183</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-4700/">CVE-2018-4700</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8675/">CVE-2019-8675</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8696/">CVE-2019-8696</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3898/">CVE-2020-3898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487858" comment="cups-ddk-2.2.7-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109810" version="1" class="patch">
	<metadata>
		<title>cvs-1.12.12-2.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-0804" ref_url="https://www.suse.com/security/cve/CVE-2012-0804/" source="CVE"/>
		<reference ref_id="CVE-2017-12836" ref_url="https://www.suse.com/security/cve/CVE-2017-12836/" source="CVE"/>
		<description>
These are all security issues fixed in the cvs-1.12.12-2.30 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-0804/">CVE-2012-0804</cve>
	<cve impact="important" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12836/">CVE-2017-12836</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487632" comment="cvs-1.12.12-2.30 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109811" version="1" class="patch">
	<metadata>
		<title>dom4j-1.6.1-10.12 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000632" ref_url="https://www.suse.com/security/cve/CVE-2018-1000632/" source="CVE"/>
		<reference ref_id="CVE-2020-10683" ref_url="https://www.suse.com/security/cve/CVE-2020-10683/" source="CVE"/>
		<description>
These are all security issues fixed in the dom4j-1.6.1-10.12 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000632/">CVE-2018-1000632</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10683/">CVE-2020-10683</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487859" comment="dom4j-1.6.1-10.12 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109812" version="1" class="patch">
	<metadata>
		<title>dpkg-1.19.0.4-2.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0840" ref_url="https://www.suse.com/security/cve/CVE-2015-0840/" source="CVE"/>
		<description>
These are all security issues fixed in the dpkg-1.19.0.4-2.30 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0840/">CVE-2015-0840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487633" comment="dpkg-1.19.0.4-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487634" comment="dpkg-devel-1.19.0.4-2.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109813" version="1" class="patch">
	<metadata>
		<title>gdb-8.3.1-8.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-1010180" ref_url="https://www.suse.com/security/cve/CVE-2019-1010180/" source="CVE"/>
		<description>
These are all security issues fixed in the gdb-8.3.1-8.14.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-1010180/">CVE-2019-1010180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487860" comment="gdb-8.3.1-8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487861" comment="gdbserver-8.3.1-8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109814" version="1" class="patch">
	<metadata>
		<title>git-2.26.2-3.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2014-9390" ref_url="https://www.suse.com/security/cve/CVE-2014-9390/" source="CVE"/>
		<reference ref_id="CVE-2016-2315" ref_url="https://www.suse.com/security/cve/CVE-2016-2315/" source="CVE"/>
		<reference ref_id="CVE-2016-2324" ref_url="https://www.suse.com/security/cve/CVE-2016-2324/" source="CVE"/>
		<reference ref_id="CVE-2017-1000117" ref_url="https://www.suse.com/security/cve/CVE-2017-1000117/" source="CVE"/>
		<reference ref_id="CVE-2017-14867" ref_url="https://www.suse.com/security/cve/CVE-2017-14867/" source="CVE"/>
		<reference ref_id="CVE-2017-15298" ref_url="https://www.suse.com/security/cve/CVE-2017-15298/" source="CVE"/>
		<reference ref_id="CVE-2017-8386" ref_url="https://www.suse.com/security/cve/CVE-2017-8386/" source="CVE"/>
		<reference ref_id="CVE-2018-11233" ref_url="https://www.suse.com/security/cve/CVE-2018-11233/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-19486" ref_url="https://www.suse.com/security/cve/CVE-2018-19486/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<reference ref_id="CVE-2019-19604" ref_url="https://www.suse.com/security/cve/CVE-2019-19604/" source="CVE"/>
		<reference ref_id="CVE-2020-11008" ref_url="https://www.suse.com/security/cve/CVE-2020-11008/" source="CVE"/>
		<reference ref_id="CVE-2020-5260" ref_url="https://www.suse.com/security/cve/CVE-2020-5260/" source="CVE"/>
		<description>
These are all security issues fixed in the git-2.26.2-3.28.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9390/">CVE-2014-9390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2315/">CVE-2016-2315</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2324/">CVE-2016-2324</cve>
	<cve impact="moderate" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000117/">CVE-2017-1000117</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14867/">CVE-2017-14867</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15298/">CVE-2017-15298</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8386/">CVE-2017-8386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-11233/">CVE-2018-11233</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19486/">CVE-2018-19486</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-19604/">CVE-2019-19604</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11008/">CVE-2020-11008</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-5260/">CVE-2020-5260</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487862" comment="git-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487863" comment="git-arch-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487864" comment="git-cvs-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487865" comment="git-daemon-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487866" comment="git-doc-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487867" comment="git-email-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487868" comment="git-gui-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487869" comment="git-svn-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487870" comment="git-web-2.26.2-3.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487871" comment="gitk-2.26.2-3.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109815" version="1" class="patch">
	<metadata>
		<title>glibc-devel-32bit-2.26-13.48.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5155" ref_url="https://www.suse.com/security/cve/CVE-2009-5155/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-10739" ref_url="https://www.suse.com/security/cve/CVE-2016-10739/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2017-18269" ref_url="https://www.suse.com/security/cve/CVE-2017-18269/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-11236" ref_url="https://www.suse.com/security/cve/CVE-2018-11236/" source="CVE"/>
		<reference ref_id="CVE-2018-11237" ref_url="https://www.suse.com/security/cve/CVE-2018-11237/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<reference ref_id="CVE-2019-19126" ref_url="https://www.suse.com/security/cve/CVE-2019-19126/" source="CVE"/>
		<reference ref_id="CVE-2019-9169" ref_url="https://www.suse.com/security/cve/CVE-2019-9169/" source="CVE"/>
		<reference ref_id="CVE-2020-10029" ref_url="https://www.suse.com/security/cve/CVE-2020-10029/" source="CVE"/>
		<reference ref_id="CVE-2020-1751" ref_url="https://www.suse.com/security/cve/CVE-2020-1751/" source="CVE"/>
		<reference ref_id="CVE-2020-1752" ref_url="https://www.suse.com/security/cve/CVE-2020-1752/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-devel-32bit-2.26-13.48.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2009-5155/">CVE-2009-5155</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10739/">CVE-2016-10739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18269/">CVE-2017-18269</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11236/">CVE-2018-11236</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11237/">CVE-2018-11237</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19126/">CVE-2019-19126</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9169/">CVE-2019-9169</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10029/">CVE-2020-10029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1751/">CVE-2020-1751</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1752/">CVE-2020-1752</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487872" comment="glibc-devel-32bit-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487873" comment="glibc-devel-static-2.26-13.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487874" comment="glibc-utils-2.26-13.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109816" version="1" class="patch">
	<metadata>
		<title>glibc-devel-32bit-2.26-8.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5029" ref_url="https://www.suse.com/security/cve/CVE-2009-5029/" source="CVE"/>
		<reference ref_id="CVE-2009-5064" ref_url="https://www.suse.com/security/cve/CVE-2009-5064/" source="CVE"/>
		<reference ref_id="CVE-2010-3192" ref_url="https://www.suse.com/security/cve/CVE-2010-3192/" source="CVE"/>
		<reference ref_id="CVE-2012-3406" ref_url="https://www.suse.com/security/cve/CVE-2012-3406/" source="CVE"/>
		<reference ref_id="CVE-2012-4412" ref_url="https://www.suse.com/security/cve/CVE-2012-4412/" source="CVE"/>
		<reference ref_id="CVE-2013-0242" ref_url="https://www.suse.com/security/cve/CVE-2013-0242/" source="CVE"/>
		<reference ref_id="CVE-2013-1914" ref_url="https://www.suse.com/security/cve/CVE-2013-1914/" source="CVE"/>
		<reference ref_id="CVE-2013-2207" ref_url="https://www.suse.com/security/cve/CVE-2013-2207/" source="CVE"/>
		<reference ref_id="CVE-2013-4237" ref_url="https://www.suse.com/security/cve/CVE-2013-4237/" source="CVE"/>
		<reference ref_id="CVE-2013-4332" ref_url="https://www.suse.com/security/cve/CVE-2013-4332/" source="CVE"/>
		<reference ref_id="CVE-2013-4458" ref_url="https://www.suse.com/security/cve/CVE-2013-4458/" source="CVE"/>
		<reference ref_id="CVE-2013-7423" ref_url="https://www.suse.com/security/cve/CVE-2013-7423/" source="CVE"/>
		<reference ref_id="CVE-2014-0475" ref_url="https://www.suse.com/security/cve/CVE-2014-0475/" source="CVE"/>
		<reference ref_id="CVE-2014-4043" ref_url="https://www.suse.com/security/cve/CVE-2014-4043/" source="CVE"/>
		<reference ref_id="CVE-2014-5119" ref_url="https://www.suse.com/security/cve/CVE-2014-5119/" source="CVE"/>
		<reference ref_id="CVE-2014-6040" ref_url="https://www.suse.com/security/cve/CVE-2014-6040/" source="CVE"/>
		<reference ref_id="CVE-2014-7817" ref_url="https://www.suse.com/security/cve/CVE-2014-7817/" source="CVE"/>
		<reference ref_id="CVE-2014-8121" ref_url="https://www.suse.com/security/cve/CVE-2014-8121/" source="CVE"/>
		<reference ref_id="CVE-2014-9402" ref_url="https://www.suse.com/security/cve/CVE-2014-9402/" source="CVE"/>
		<reference ref_id="CVE-2014-9761" ref_url="https://www.suse.com/security/cve/CVE-2014-9761/" source="CVE"/>
		<reference ref_id="CVE-2015-1472" ref_url="https://www.suse.com/security/cve/CVE-2015-1472/" source="CVE"/>
		<reference ref_id="CVE-2015-1473" ref_url="https://www.suse.com/security/cve/CVE-2015-1473/" source="CVE"/>
		<reference ref_id="CVE-2015-1781" ref_url="https://www.suse.com/security/cve/CVE-2015-1781/" source="CVE"/>
		<reference ref_id="CVE-2015-5180" ref_url="https://www.suse.com/security/cve/CVE-2015-5180/" source="CVE"/>
		<reference ref_id="CVE-2015-7547" ref_url="https://www.suse.com/security/cve/CVE-2015-7547/" source="CVE"/>
		<reference ref_id="CVE-2015-8776" ref_url="https://www.suse.com/security/cve/CVE-2015-8776/" source="CVE"/>
		<reference ref_id="CVE-2015-8777" ref_url="https://www.suse.com/security/cve/CVE-2015-8777/" source="CVE"/>
		<reference ref_id="CVE-2015-8778" ref_url="https://www.suse.com/security/cve/CVE-2015-8778/" source="CVE"/>
		<reference ref_id="CVE-2015-8779" ref_url="https://www.suse.com/security/cve/CVE-2015-8779/" source="CVE"/>
		<reference ref_id="CVE-2016-1234" ref_url="https://www.suse.com/security/cve/CVE-2016-1234/" source="CVE"/>
		<reference ref_id="CVE-2016-3075" ref_url="https://www.suse.com/security/cve/CVE-2016-3075/" source="CVE"/>
		<reference ref_id="CVE-2016-3706" ref_url="https://www.suse.com/security/cve/CVE-2016-3706/" source="CVE"/>
		<reference ref_id="CVE-2016-4429" ref_url="https://www.suse.com/security/cve/CVE-2016-4429/" source="CVE"/>
		<reference ref_id="CVE-2016-5417" ref_url="https://www.suse.com/security/cve/CVE-2016-5417/" source="CVE"/>
		<reference ref_id="CVE-2016-6323" ref_url="https://www.suse.com/security/cve/CVE-2016-6323/" source="CVE"/>
		<reference ref_id="CVE-2017-1000366" ref_url="https://www.suse.com/security/cve/CVE-2017-1000366/" source="CVE"/>
		<reference ref_id="CVE-2017-1000408" ref_url="https://www.suse.com/security/cve/CVE-2017-1000408/" source="CVE"/>
		<reference ref_id="CVE-2017-1000409" ref_url="https://www.suse.com/security/cve/CVE-2017-1000409/" source="CVE"/>
		<reference ref_id="CVE-2017-12132" ref_url="https://www.suse.com/security/cve/CVE-2017-12132/" source="CVE"/>
		<reference ref_id="CVE-2017-12133" ref_url="https://www.suse.com/security/cve/CVE-2017-12133/" source="CVE"/>
		<reference ref_id="CVE-2017-15670" ref_url="https://www.suse.com/security/cve/CVE-2017-15670/" source="CVE"/>
		<reference ref_id="CVE-2017-15671" ref_url="https://www.suse.com/security/cve/CVE-2017-15671/" source="CVE"/>
		<reference ref_id="CVE-2017-15804" ref_url="https://www.suse.com/security/cve/CVE-2017-15804/" source="CVE"/>
		<reference ref_id="CVE-2017-16997" ref_url="https://www.suse.com/security/cve/CVE-2017-16997/" source="CVE"/>
		<reference ref_id="CVE-2017-17426" ref_url="https://www.suse.com/security/cve/CVE-2017-17426/" source="CVE"/>
		<reference ref_id="CVE-2018-1000001" ref_url="https://www.suse.com/security/cve/CVE-2018-1000001/" source="CVE"/>
		<reference ref_id="CVE-2018-6485" ref_url="https://www.suse.com/security/cve/CVE-2018-6485/" source="CVE"/>
		<reference ref_id="CVE-2018-6551" ref_url="https://www.suse.com/security/cve/CVE-2018-6551/" source="CVE"/>
		<description>
These are all security issues fixed in the glibc-devel-32bit-2.26-8.21 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5029/">CVE-2009-5029</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5064/">CVE-2009-5064</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-3192/">CVE-2010-3192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3406/">CVE-2012-3406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4412/">CVE-2012-4412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-0242/">CVE-2013-0242</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1914/">CVE-2013-1914</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2207/">CVE-2013-2207</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4237/">CVE-2013-4237</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4332/">CVE-2013-4332</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4458/">CVE-2013-4458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7423/">CVE-2013-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0475/">CVE-2014-0475</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4043/">CVE-2014-4043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5119/">CVE-2014-5119</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6040/">CVE-2014-6040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7817/">CVE-2014-7817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8121/">CVE-2014-8121</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9402/">CVE-2014-9402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9761/">CVE-2014-9761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1472/">CVE-2015-1472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1473/">CVE-2015-1473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1781/">CVE-2015-1781</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5180/">CVE-2015-5180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7547/">CVE-2015-7547</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8776/">CVE-2015-8776</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8777/">CVE-2015-8777</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8778/">CVE-2015-8778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8779/">CVE-2015-8779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1234/">CVE-2016-1234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3075/">CVE-2016-3075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3706/">CVE-2016-3706</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4429/">CVE-2016-4429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5417/">CVE-2016-5417</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6323/">CVE-2016-6323</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000366/">CVE-2017-1000366</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000408/">CVE-2017-1000408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000409/">CVE-2017-1000409</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-12132/">CVE-2017-12132</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12133/">CVE-2017-12133</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15670/">CVE-2017-15670</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15671/">CVE-2017-15671</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15804/">CVE-2017-15804</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16997/">CVE-2017-16997</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17426/">CVE-2017-17426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000001/">CVE-2018-1000001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6485/">CVE-2018-6485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6551/">CVE-2018-6551</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487760" comment="glibc-devel-32bit-2.26-8.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109817" version="1" class="patch">
	<metadata>
		<title>gradle-4.4.1-1.87 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-16370" ref_url="https://www.suse.com/security/cve/CVE-2019-16370/" source="CVE"/>
		<description>
These are all security issues fixed in the gradle-4.4.1-1.87 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16370/">CVE-2019-16370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487875" comment="gradle-4.4.1-1.87 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109818" version="1" class="patch">
	<metadata>
		<title>graphviz-perl-2.40.1-6.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-perl-2.40.1-6.3.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487876" comment="graphviz-perl-2.40.1-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109819" version="1" class="patch">
	<metadata>
		<title>guile-2.0.14-5.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8605" ref_url="https://www.suse.com/security/cve/CVE-2016-8605/" source="CVE"/>
		<reference ref_id="CVE-2016-8606" ref_url="https://www.suse.com/security/cve/CVE-2016-8606/" source="CVE"/>
		<description>
These are all security issues fixed in the guile-2.0.14-5.3.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8605/">CVE-2016-8605</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8606/">CVE-2016-8606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487763" comment="guile-2.0.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487764" comment="guile-devel-2.0.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487765" comment="guile-modules-2_0-2.0.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487766" comment="libguile-2_0-22-2.0.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487767" comment="libguilereadline-v-18-18-2.0.14-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109820" version="1" class="patch">
	<metadata>
		<title>jackson-databind-2.10.2-1.74 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-11307" ref_url="https://www.suse.com/security/cve/CVE-2018-11307/" source="CVE"/>
		<reference ref_id="CVE-2018-12022" ref_url="https://www.suse.com/security/cve/CVE-2018-12022/" source="CVE"/>
		<reference ref_id="CVE-2018-12023" ref_url="https://www.suse.com/security/cve/CVE-2018-12023/" source="CVE"/>
		<reference ref_id="CVE-2018-14718" ref_url="https://www.suse.com/security/cve/CVE-2018-14718/" source="CVE"/>
		<reference ref_id="CVE-2018-14721" ref_url="https://www.suse.com/security/cve/CVE-2018-14721/" source="CVE"/>
		<reference ref_id="CVE-2018-19360" ref_url="https://www.suse.com/security/cve/CVE-2018-19360/" source="CVE"/>
		<reference ref_id="CVE-2018-19361" ref_url="https://www.suse.com/security/cve/CVE-2018-19361/" source="CVE"/>
		<reference ref_id="CVE-2018-19362" ref_url="https://www.suse.com/security/cve/CVE-2018-19362/" source="CVE"/>
		<reference ref_id="CVE-2018-7489" ref_url="https://www.suse.com/security/cve/CVE-2018-7489/" source="CVE"/>
		<reference ref_id="CVE-2019-12086" ref_url="https://www.suse.com/security/cve/CVE-2019-12086/" source="CVE"/>
		<reference ref_id="CVE-2019-12384" ref_url="https://www.suse.com/security/cve/CVE-2019-12384/" source="CVE"/>
		<reference ref_id="CVE-2019-12814" ref_url="https://www.suse.com/security/cve/CVE-2019-12814/" source="CVE"/>
		<reference ref_id="CVE-2019-14379" ref_url="https://www.suse.com/security/cve/CVE-2019-14379/" source="CVE"/>
		<reference ref_id="CVE-2019-14439" ref_url="https://www.suse.com/security/cve/CVE-2019-14439/" source="CVE"/>
		<reference ref_id="CVE-2019-14540" ref_url="https://www.suse.com/security/cve/CVE-2019-14540/" source="CVE"/>
		<reference ref_id="CVE-2019-14893" ref_url="https://www.suse.com/security/cve/CVE-2019-14893/" source="CVE"/>
		<reference ref_id="CVE-2019-16942" ref_url="https://www.suse.com/security/cve/CVE-2019-16942/" source="CVE"/>
		<reference ref_id="CVE-2019-16943" ref_url="https://www.suse.com/security/cve/CVE-2019-16943/" source="CVE"/>
		<reference ref_id="CVE-2019-17267" ref_url="https://www.suse.com/security/cve/CVE-2019-17267/" source="CVE"/>
		<reference ref_id="CVE-2019-17531" ref_url="https://www.suse.com/security/cve/CVE-2019-17531/" source="CVE"/>
		<reference ref_id="CVE-2019-20330" ref_url="https://www.suse.com/security/cve/CVE-2019-20330/" source="CVE"/>
		<description>
These are all security issues fixed in the jackson-databind-2.10.2-1.74 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11307/">CVE-2018-11307</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12022/">CVE-2018-12022</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12023/">CVE-2018-12023</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-14718/">CVE-2018-14718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-14721/">CVE-2018-14721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-19360/">CVE-2018-19360</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-19361/">CVE-2018-19361</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-19362/">CVE-2018-19362</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7489/">CVE-2018-7489</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12086/">CVE-2019-12086</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12384/">CVE-2019-12384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-12814/">CVE-2019-12814</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14379/">CVE-2019-14379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-14439/">CVE-2019-14439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14540/">CVE-2019-14540</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14893/">CVE-2019-14893</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-16942/">CVE-2019-16942</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-16943/">CVE-2019-16943</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17267/">CVE-2019-17267</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17531/">CVE-2019-17531</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-20330/">CVE-2019-20330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487877" comment="jackson-databind-2.10.2-1.74 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109821" version="1" class="patch">
	<metadata>
		<title>jcl-over-slf4j-1.7.30-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-8088" ref_url="https://www.suse.com/security/cve/CVE-2018-8088/" source="CVE"/>
		<description>
These are all security issues fixed in the jcl-over-slf4j-1.7.30-1.34 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8088/">CVE-2018-8088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487878" comment="jcl-over-slf4j-1.7.30-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487879" comment="jul-to-slf4j-1.7.30-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487880" comment="log4j-over-slf4j-1.7.30-1.34 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487881" comment="slf4j-1.7.30-1.34 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109822" version="1" class="patch">
	<metadata>
		<title>jython-2.2.1-11.65 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2027" ref_url="https://www.suse.com/security/cve/CVE-2013-2027/" source="CVE"/>
		<description>
These are all security issues fixed in the jython-2.2.1-11.65 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-2027/">CVE-2013-2027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487882" comment="jython-2.2.1-11.65 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109823" version="1" class="patch">
	<metadata>
		<title>kernel-docs-5.3.18-22.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-docs-5.3.18-22.3 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487883" comment="kernel-docs-5.3.18-22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487884" comment="kernel-obs-build-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487885" comment="kernel-preempt-devel-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487886" comment="kernel-source-5.3.18-22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487887" comment="kernel-syms-5.3.18-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109824" version="1" class="patch">
	<metadata>
		<title>libgit2-26-0.26.8-3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2016-10128" ref_url="https://www.suse.com/security/cve/CVE-2016-10128/" source="CVE"/>
		<reference ref_id="CVE-2016-10129" ref_url="https://www.suse.com/security/cve/CVE-2016-10129/" source="CVE"/>
		<reference ref_id="CVE-2016-10130" ref_url="https://www.suse.com/security/cve/CVE-2016-10130/" source="CVE"/>
		<reference ref_id="CVE-2016-8568" ref_url="https://www.suse.com/security/cve/CVE-2016-8568/" source="CVE"/>
		<reference ref_id="CVE-2016-8569" ref_url="https://www.suse.com/security/cve/CVE-2016-8569/" source="CVE"/>
		<reference ref_id="CVE-2017-5338" ref_url="https://www.suse.com/security/cve/CVE-2017-5338/" source="CVE"/>
		<reference ref_id="CVE-2017-5339" ref_url="https://www.suse.com/security/cve/CVE-2017-5339/" source="CVE"/>
		<reference ref_id="CVE-2018-10887" ref_url="https://www.suse.com/security/cve/CVE-2018-10887/" source="CVE"/>
		<reference ref_id="CVE-2018-10888" ref_url="https://www.suse.com/security/cve/CVE-2018-10888/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-8098" ref_url="https://www.suse.com/security/cve/CVE-2018-8098/" source="CVE"/>
		<reference ref_id="CVE-2018-8099" ref_url="https://www.suse.com/security/cve/CVE-2018-8099/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-26-0.26.8-3.8.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10128/">CVE-2016-10128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10129/">CVE-2016-10129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10130/">CVE-2016-10130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8568/">CVE-2016-8568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8569/">CVE-2016-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5338/">CVE-2017-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5339/">CVE-2017-5339</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10887/">CVE-2018-10887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10888/">CVE-2018-10888</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8098/">CVE-2018-8098</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8099/">CVE-2018-8099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487772" comment="libgit2-26-0.26.8-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109825" version="1" class="patch">
	<metadata>
		<title>libgit2-28-0.28.4-1.28 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2005-4900" ref_url="https://www.suse.com/security/cve/CVE-2005-4900/" source="CVE"/>
		<reference ref_id="CVE-2016-10128" ref_url="https://www.suse.com/security/cve/CVE-2016-10128/" source="CVE"/>
		<reference ref_id="CVE-2016-10129" ref_url="https://www.suse.com/security/cve/CVE-2016-10129/" source="CVE"/>
		<reference ref_id="CVE-2016-10130" ref_url="https://www.suse.com/security/cve/CVE-2016-10130/" source="CVE"/>
		<reference ref_id="CVE-2016-8568" ref_url="https://www.suse.com/security/cve/CVE-2016-8568/" source="CVE"/>
		<reference ref_id="CVE-2016-8569" ref_url="https://www.suse.com/security/cve/CVE-2016-8569/" source="CVE"/>
		<reference ref_id="CVE-2017-5338" ref_url="https://www.suse.com/security/cve/CVE-2017-5338/" source="CVE"/>
		<reference ref_id="CVE-2017-5339" ref_url="https://www.suse.com/security/cve/CVE-2017-5339/" source="CVE"/>
		<reference ref_id="CVE-2018-10887" ref_url="https://www.suse.com/security/cve/CVE-2018-10887/" source="CVE"/>
		<reference ref_id="CVE-2018-10888" ref_url="https://www.suse.com/security/cve/CVE-2018-10888/" source="CVE"/>
		<reference ref_id="CVE-2018-11235" ref_url="https://www.suse.com/security/cve/CVE-2018-11235/" source="CVE"/>
		<reference ref_id="CVE-2018-17456" ref_url="https://www.suse.com/security/cve/CVE-2018-17456/" source="CVE"/>
		<reference ref_id="CVE-2018-8098" ref_url="https://www.suse.com/security/cve/CVE-2018-8098/" source="CVE"/>
		<reference ref_id="CVE-2018-8099" ref_url="https://www.suse.com/security/cve/CVE-2018-8099/" source="CVE"/>
		<reference ref_id="CVE-2019-1348" ref_url="https://www.suse.com/security/cve/CVE-2019-1348/" source="CVE"/>
		<reference ref_id="CVE-2019-1349" ref_url="https://www.suse.com/security/cve/CVE-2019-1349/" source="CVE"/>
		<reference ref_id="CVE-2019-1350" ref_url="https://www.suse.com/security/cve/CVE-2019-1350/" source="CVE"/>
		<reference ref_id="CVE-2019-1351" ref_url="https://www.suse.com/security/cve/CVE-2019-1351/" source="CVE"/>
		<reference ref_id="CVE-2019-1352" ref_url="https://www.suse.com/security/cve/CVE-2019-1352/" source="CVE"/>
		<reference ref_id="CVE-2019-1353" ref_url="https://www.suse.com/security/cve/CVE-2019-1353/" source="CVE"/>
		<reference ref_id="CVE-2019-1354" ref_url="https://www.suse.com/security/cve/CVE-2019-1354/" source="CVE"/>
		<reference ref_id="CVE-2019-1387" ref_url="https://www.suse.com/security/cve/CVE-2019-1387/" source="CVE"/>
		<description>
These are all security issues fixed in the libgit2-28-0.28.4-1.28 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2005-4900/">CVE-2005-4900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10128/">CVE-2016-10128</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10129/">CVE-2016-10129</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10130/">CVE-2016-10130</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8568/">CVE-2016-8568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8569/">CVE-2016-8569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5338/">CVE-2017-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5339/">CVE-2017-5339</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10887/">CVE-2018-10887</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10888/">CVE-2018-10888</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11235/">CVE-2018-11235</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17456/">CVE-2018-17456</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8098/">CVE-2018-8098</cve>
	<cve impact="low" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8099/">CVE-2018-8099</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-1348/">CVE-2019-1348</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1349/">CVE-2019-1349</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1350/">CVE-2019-1350</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1351/">CVE-2019-1351</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-1352/">CVE-2019-1352</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-1353/">CVE-2019-1353</cve>
	<cve impact="moderate" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1354/">CVE-2019-1354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-1387/">CVE-2019-1387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487888" comment="libgit2-28-0.28.4-1.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487889" comment="libgit2-devel-0.28.4-1.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109826" version="1" class="patch">
	<metadata>
		<title>libpcp-devel-4.3.1-3.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-3695" ref_url="https://www.suse.com/security/cve/CVE-2019-3695/" source="CVE"/>
		<reference ref_id="CVE-2019-3696" ref_url="https://www.suse.com/security/cve/CVE-2019-3696/" source="CVE"/>
		<description>
These are all security issues fixed in the libpcp-devel-4.3.1-3.8.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3695/">CVE-2019-3695</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3696/">CVE-2019-3696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487890" comment="libpcp-devel-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487891" comment="libpcp3-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487892" comment="libpcp_gui2-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487893" comment="libpcp_import1-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487894" comment="libpcp_mmv1-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487895" comment="libpcp_trace2-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487896" comment="libpcp_web1-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487897" comment="pcp-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487898" comment="pcp-conf-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487899" comment="pcp-devel-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487900" comment="pcp-doc-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487901" comment="pcp-import-iostat2pcp-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487902" comment="pcp-import-mrtg2pcp-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487903" comment="pcp-import-sar2pcp-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487904" comment="pcp-pmda-perfevent-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487905" comment="pcp-system-tools-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487906" comment="perl-PCP-LogImport-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487907" comment="perl-PCP-LogSummary-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487908" comment="perl-PCP-MMV-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487909" comment="perl-PCP-PMDA-4.3.1-3.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487910" comment="python3-pcp-4.3.1-3.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109827" version="1" class="patch">
	<metadata>
		<title>libtidy-devel-5.4.0-3.2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5522" ref_url="https://www.suse.com/security/cve/CVE-2015-5522/" source="CVE"/>
		<reference ref_id="CVE-2015-5523" ref_url="https://www.suse.com/security/cve/CVE-2015-5523/" source="CVE"/>
		<reference ref_id="CVE-2016-6583" ref_url="https://www.suse.com/security/cve/CVE-2016-6583/" source="CVE"/>
		<description>
These are all security issues fixed in the libtidy-devel-5.4.0-3.2.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5522/">CVE-2015-5522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5523/">CVE-2015-5523</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2016-6583/">CVE-2016-6583</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487911" comment="libtidy-devel-5.4.0-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487912" comment="tidy-5.4.0-3.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109828" version="1" class="patch">
	<metadata>
		<title>libtool-32bit-2.4.6-1.406 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-3736" ref_url="https://www.suse.com/security/cve/CVE-2009-3736/" source="CVE"/>
		<description>
These are all security issues fixed in the libtool-32bit-2.4.6-1.406 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3736/">CVE-2009-3736</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487683" comment="libtool-32bit-2.4.6-1.406 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109829" version="1" class="patch">
	<metadata>
		<title>log4j12-javadoc-1.2.17-2.26 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5645" ref_url="https://www.suse.com/security/cve/CVE-2017-5645/" source="CVE"/>
		<reference ref_id="CVE-2019-17571" ref_url="https://www.suse.com/security/cve/CVE-2019-17571/" source="CVE"/>
		<description>
These are all security issues fixed in the log4j12-javadoc-1.2.17-2.26 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5645/">CVE-2017-5645</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17571/">CVE-2019-17571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487913" comment="log4j12-javadoc-1.2.17-2.26 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487914" comment="log4j12-manual-1.2.17-2.26 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109830" version="1" class="patch">
	<metadata>
		<title>nasm-2.13.02-1.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-10686" ref_url="https://www.suse.com/security/cve/CVE-2017-10686/" source="CVE"/>
		<reference ref_id="CVE-2017-11111" ref_url="https://www.suse.com/security/cve/CVE-2017-11111/" source="CVE"/>
		<reference ref_id="CVE-2017-14228" ref_url="https://www.suse.com/security/cve/CVE-2017-14228/" source="CVE"/>
		<reference ref_id="CVE-2017-17810" ref_url="https://www.suse.com/security/cve/CVE-2017-17810/" source="CVE"/>
		<reference ref_id="CVE-2017-17811" ref_url="https://www.suse.com/security/cve/CVE-2017-17811/" source="CVE"/>
		<reference ref_id="CVE-2017-17812" ref_url="https://www.suse.com/security/cve/CVE-2017-17812/" source="CVE"/>
		<reference ref_id="CVE-2017-17813" ref_url="https://www.suse.com/security/cve/CVE-2017-17813/" source="CVE"/>
		<reference ref_id="CVE-2017-17814" ref_url="https://www.suse.com/security/cve/CVE-2017-17814/" source="CVE"/>
		<reference ref_id="CVE-2017-17815" ref_url="https://www.suse.com/security/cve/CVE-2017-17815/" source="CVE"/>
		<reference ref_id="CVE-2017-17816" ref_url="https://www.suse.com/security/cve/CVE-2017-17816/" source="CVE"/>
		<reference ref_id="CVE-2017-17817" ref_url="https://www.suse.com/security/cve/CVE-2017-17817/" source="CVE"/>
		<reference ref_id="CVE-2017-17818" ref_url="https://www.suse.com/security/cve/CVE-2017-17818/" source="CVE"/>
		<reference ref_id="CVE-2017-17819" ref_url="https://www.suse.com/security/cve/CVE-2017-17819/" source="CVE"/>
		<reference ref_id="CVE-2017-17820" ref_url="https://www.suse.com/security/cve/CVE-2017-17820/" source="CVE"/>
		<description>
These are all security issues fixed in the nasm-2.13.02-1.17 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10686/">CVE-2017-10686</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-11111/">CVE-2017-11111</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14228/">CVE-2017-14228</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17810/">CVE-2017-17810</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17811/">CVE-2017-17811</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17812/">CVE-2017-17812</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17813/">CVE-2017-17813</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17814/">CVE-2017-17814</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17815/">CVE-2017-17815</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17816/">CVE-2017-17816</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17817/">CVE-2017-17817</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17818/">CVE-2017-17818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17819/">CVE-2017-17819</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17820/">CVE-2017-17820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487685" comment="nasm-2.13.02-1.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109831" version="1" class="patch">
	<metadata>
		<title>ncurses-devel-32bit-6.1-5.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
These are all security issues fixed in the ncurses-devel-32bit-6.1-5.6.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487915" comment="ncurses-devel-32bit-6.1-5.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109832" version="1" class="patch">
	<metadata>
		<title>ocaml-4.05.0-13.5 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8869" ref_url="https://www.suse.com/security/cve/CVE-2015-8869/" source="CVE"/>
		<reference ref_id="CVE-2017-9772" ref_url="https://www.suse.com/security/cve/CVE-2017-9772/" source="CVE"/>
		<reference ref_id="CVE-2018-9838" ref_url="https://www.suse.com/security/cve/CVE-2018-9838/" source="CVE"/>
		<description>
These are all security issues fixed in the ocaml-4.05.0-13.5 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8869/">CVE-2015-8869</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-9772/">CVE-2017-9772</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9838/">CVE-2018-9838</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487916" comment="ocaml-4.05.0-13.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487917" comment="ocaml-compiler-libs-4.05.0-13.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487918" comment="ocaml-compiler-libs-devel-4.05.0-13.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487919" comment="ocaml-ocamldoc-4.05.0-13.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487920" comment="ocaml-runtime-4.05.0-13.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109833" version="1" class="patch">
	<metadata>
		<title>openldap2-devel-32bit-2.4.46-9.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
These are all security issues fixed in the openldap2-devel-32bit-2.4.46-9.28.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487921" comment="openldap2-devel-32bit-2.4.46-9.28.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109834" version="1" class="patch">
	<metadata>
		<title>osc-0.168.2-3.15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0778" ref_url="https://www.suse.com/security/cve/CVE-2015-0778/" source="CVE"/>
		<reference ref_id="CVE-2019-3685" ref_url="https://www.suse.com/security/cve/CVE-2019-3685/" source="CVE"/>
		<description>
These are all security issues fixed in the osc-0.168.2-3.15.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2015-0778/">CVE-2015-0778</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3685/">CVE-2019-3685</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487922" comment="osc-0.168.2-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109835" version="1" class="patch">
	<metadata>
		<title>pam-devel-32bit-1.3.0-6.16.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3238" ref_url="https://www.suse.com/security/cve/CVE-2015-3238/" source="CVE"/>
		<reference ref_id="CVE-2018-17953" ref_url="https://www.suse.com/security/cve/CVE-2018-17953/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-devel-32bit-1.3.0-6.16.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3238/">CVE-2015-3238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-17953/">CVE-2018-17953</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487923" comment="pam-devel-32bit-1.3.0-6.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109836" version="1" class="patch">
	<metadata>
		<title>perl-Archive-Extract-0.80-1.24 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Archive-Extract-0.80-1.24 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487694" comment="perl-Archive-Extract-0.80-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487695" comment="perl-ExtUtils-MakeMaker-7.30-1.24 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487696" comment="perl-Module-Load-Conditional-0.68-1.25 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109837" version="1" class="patch">
	<metadata>
		<title>perl-Config-IniFiles-2.94-1.23 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2451" ref_url="https://www.suse.com/security/cve/CVE-2012-2451/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Config-IniFiles-2.94-1.23 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2012-2451/">CVE-2012-2451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487697" comment="perl-Config-IniFiles-2.94-1.23 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109838" version="1" class="patch">
	<metadata>
		<title>perl-DNS-LDNS-1.7.0-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000231" ref_url="https://www.suse.com/security/cve/CVE-2017-1000231/" source="CVE"/>
		<reference ref_id="CVE-2017-1000232" ref_url="https://www.suse.com/security/cve/CVE-2017-1000232/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-DNS-LDNS-1.7.0-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000231/">CVE-2017-1000231</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000232/">CVE-2017-1000232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487924" comment="perl-DNS-LDNS-1.7.0-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109839" version="1" class="patch">
	<metadata>
		<title>perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-12.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1238" ref_url="https://www.suse.com/security/cve/CVE-2016-1238/" source="CVE"/>
		<reference ref_id="CVE-2017-15705" ref_url="https://www.suse.com/security/cve/CVE-2017-15705/" source="CVE"/>
		<reference ref_id="CVE-2018-11780" ref_url="https://www.suse.com/security/cve/CVE-2018-11780/" source="CVE"/>
		<reference ref_id="CVE-2018-11781" ref_url="https://www.suse.com/security/cve/CVE-2018-11781/" source="CVE"/>
		<reference ref_id="CVE-2018-11805" ref_url="https://www.suse.com/security/cve/CVE-2018-11805/" source="CVE"/>
		<reference ref_id="CVE-2020-1930" ref_url="https://www.suse.com/security/cve/CVE-2020-1930/" source="CVE"/>
		<reference ref_id="CVE-2020-1931" ref_url="https://www.suse.com/security/cve/CVE-2020-1931/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-12.5.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-1238/">CVE-2016-1238</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15705/">CVE-2017-15705</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11780/">CVE-2018-11780</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-11781/">CVE-2018-11781</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-11805/">CVE-2018-11805</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1930/">CVE-2020-1930</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1931/">CVE-2020-1931</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487925" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-12.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109840" version="1" class="patch">
	<metadata>
		<title>perl-Net-Libproxy-0.4.15-2.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-Net-Libproxy-0.4.15-2.42 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487699" comment="perl-Net-Libproxy-0.4.15-2.42 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109841" version="1" class="patch">
	<metadata>
		<title>perl-PerlMagick-7.0.7.34-8.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-3714" ref_url="https://www.suse.com/security/cve/CVE-2016-3714/" source="CVE"/>
		<reference ref_id="CVE-2016-3715" ref_url="https://www.suse.com/security/cve/CVE-2016-3715/" source="CVE"/>
		<reference ref_id="CVE-2016-3716" ref_url="https://www.suse.com/security/cve/CVE-2016-3716/" source="CVE"/>
		<reference ref_id="CVE-2016-3717" ref_url="https://www.suse.com/security/cve/CVE-2016-3717/" source="CVE"/>
		<reference ref_id="CVE-2016-3718" ref_url="https://www.suse.com/security/cve/CVE-2016-3718/" source="CVE"/>
		<reference ref_id="CVE-2016-5118" ref_url="https://www.suse.com/security/cve/CVE-2016-5118/" source="CVE"/>
		<reference ref_id="CVE-2018-10805" ref_url="https://www.suse.com/security/cve/CVE-2018-10805/" source="CVE"/>
		<reference ref_id="CVE-2018-11624" ref_url="https://www.suse.com/security/cve/CVE-2018-11624/" source="CVE"/>
		<reference ref_id="CVE-2018-11625" ref_url="https://www.suse.com/security/cve/CVE-2018-11625/" source="CVE"/>
		<reference ref_id="CVE-2018-12599" ref_url="https://www.suse.com/security/cve/CVE-2018-12599/" source="CVE"/>
		<reference ref_id="CVE-2018-12600" ref_url="https://www.suse.com/security/cve/CVE-2018-12600/" source="CVE"/>
		<reference ref_id="CVE-2018-14434" ref_url="https://www.suse.com/security/cve/CVE-2018-14434/" source="CVE"/>
		<reference ref_id="CVE-2018-14435" ref_url="https://www.suse.com/security/cve/CVE-2018-14435/" source="CVE"/>
		<reference ref_id="CVE-2018-14436" ref_url="https://www.suse.com/security/cve/CVE-2018-14436/" source="CVE"/>
		<reference ref_id="CVE-2018-14437" ref_url="https://www.suse.com/security/cve/CVE-2018-14437/" source="CVE"/>
		<reference ref_id="CVE-2018-16323" ref_url="https://www.suse.com/security/cve/CVE-2018-16323/" source="CVE"/>
		<reference ref_id="CVE-2018-16328" ref_url="https://www.suse.com/security/cve/CVE-2018-16328/" source="CVE"/>
		<reference ref_id="CVE-2018-16329" ref_url="https://www.suse.com/security/cve/CVE-2018-16329/" source="CVE"/>
		<reference ref_id="CVE-2018-16412" ref_url="https://www.suse.com/security/cve/CVE-2018-16412/" source="CVE"/>
		<reference ref_id="CVE-2018-16413" ref_url="https://www.suse.com/security/cve/CVE-2018-16413/" source="CVE"/>
		<reference ref_id="CVE-2018-16640" ref_url="https://www.suse.com/security/cve/CVE-2018-16640/" source="CVE"/>
		<reference ref_id="CVE-2018-16641" ref_url="https://www.suse.com/security/cve/CVE-2018-16641/" source="CVE"/>
		<reference ref_id="CVE-2018-16642" ref_url="https://www.suse.com/security/cve/CVE-2018-16642/" source="CVE"/>
		<reference ref_id="CVE-2018-16643" ref_url="https://www.suse.com/security/cve/CVE-2018-16643/" source="CVE"/>
		<reference ref_id="CVE-2018-16644" ref_url="https://www.suse.com/security/cve/CVE-2018-16644/" source="CVE"/>
		<reference ref_id="CVE-2018-16645" ref_url="https://www.suse.com/security/cve/CVE-2018-16645/" source="CVE"/>
		<reference ref_id="CVE-2018-17966" ref_url="https://www.suse.com/security/cve/CVE-2018-17966/" source="CVE"/>
		<reference ref_id="CVE-2018-18024" ref_url="https://www.suse.com/security/cve/CVE-2018-18024/" source="CVE"/>
		<reference ref_id="CVE-2018-18544" ref_url="https://www.suse.com/security/cve/CVE-2018-18544/" source="CVE"/>
		<reference ref_id="CVE-2018-20467" ref_url="https://www.suse.com/security/cve/CVE-2018-20467/" source="CVE"/>
		<reference ref_id="CVE-2018-9135" ref_url="https://www.suse.com/security/cve/CVE-2018-9135/" source="CVE"/>
		<reference ref_id="CVE-2019-10650" ref_url="https://www.suse.com/security/cve/CVE-2019-10650/" source="CVE"/>
		<reference ref_id="CVE-2019-11007" ref_url="https://www.suse.com/security/cve/CVE-2019-11007/" source="CVE"/>
		<reference ref_id="CVE-2019-11008" ref_url="https://www.suse.com/security/cve/CVE-2019-11008/" source="CVE"/>
		<reference ref_id="CVE-2019-11470" ref_url="https://www.suse.com/security/cve/CVE-2019-11470/" source="CVE"/>
		<reference ref_id="CVE-2019-11472" ref_url="https://www.suse.com/security/cve/CVE-2019-11472/" source="CVE"/>
		<reference ref_id="CVE-2019-11505" ref_url="https://www.suse.com/security/cve/CVE-2019-11505/" source="CVE"/>
		<reference ref_id="CVE-2019-11506" ref_url="https://www.suse.com/security/cve/CVE-2019-11506/" source="CVE"/>
		<reference ref_id="CVE-2019-11597" ref_url="https://www.suse.com/security/cve/CVE-2019-11597/" source="CVE"/>
		<reference ref_id="CVE-2019-11598" ref_url="https://www.suse.com/security/cve/CVE-2019-11598/" source="CVE"/>
		<reference ref_id="CVE-2019-12974" ref_url="https://www.suse.com/security/cve/CVE-2019-12974/" source="CVE"/>
		<reference ref_id="CVE-2019-12975" ref_url="https://www.suse.com/security/cve/CVE-2019-12975/" source="CVE"/>
		<reference ref_id="CVE-2019-12976" ref_url="https://www.suse.com/security/cve/CVE-2019-12976/" source="CVE"/>
		<reference ref_id="CVE-2019-12977" ref_url="https://www.suse.com/security/cve/CVE-2019-12977/" source="CVE"/>
		<reference ref_id="CVE-2019-12978" ref_url="https://www.suse.com/security/cve/CVE-2019-12978/" source="CVE"/>
		<reference ref_id="CVE-2019-12979" ref_url="https://www.suse.com/security/cve/CVE-2019-12979/" source="CVE"/>
		<reference ref_id="CVE-2019-13133" ref_url="https://www.suse.com/security/cve/CVE-2019-13133/" source="CVE"/>
		<reference ref_id="CVE-2019-13134" ref_url="https://www.suse.com/security/cve/CVE-2019-13134/" source="CVE"/>
		<reference ref_id="CVE-2019-13135" ref_url="https://www.suse.com/security/cve/CVE-2019-13135/" source="CVE"/>
		<reference ref_id="CVE-2019-13136" ref_url="https://www.suse.com/security/cve/CVE-2019-13136/" source="CVE"/>
		<reference ref_id="CVE-2019-13137" ref_url="https://www.suse.com/security/cve/CVE-2019-13137/" source="CVE"/>
		<reference ref_id="CVE-2019-13295" ref_url="https://www.suse.com/security/cve/CVE-2019-13295/" source="CVE"/>
		<reference ref_id="CVE-2019-13296" ref_url="https://www.suse.com/security/cve/CVE-2019-13296/" source="CVE"/>
		<reference ref_id="CVE-2019-13297" ref_url="https://www.suse.com/security/cve/CVE-2019-13297/" source="CVE"/>
		<reference ref_id="CVE-2019-13298" ref_url="https://www.suse.com/security/cve/CVE-2019-13298/" source="CVE"/>
		<reference ref_id="CVE-2019-13299" ref_url="https://www.suse.com/security/cve/CVE-2019-13299/" source="CVE"/>
		<reference ref_id="CVE-2019-13300" ref_url="https://www.suse.com/security/cve/CVE-2019-13300/" source="CVE"/>
		<reference ref_id="CVE-2019-13301" ref_url="https://www.suse.com/security/cve/CVE-2019-13301/" source="CVE"/>
		<reference ref_id="CVE-2019-13302" ref_url="https://www.suse.com/security/cve/CVE-2019-13302/" source="CVE"/>
		<reference ref_id="CVE-2019-13303" ref_url="https://www.suse.com/security/cve/CVE-2019-13303/" source="CVE"/>
		<reference ref_id="CVE-2019-13304" ref_url="https://www.suse.com/security/cve/CVE-2019-13304/" source="CVE"/>
		<reference ref_id="CVE-2019-13305" ref_url="https://www.suse.com/security/cve/CVE-2019-13305/" source="CVE"/>
		<reference ref_id="CVE-2019-13306" ref_url="https://www.suse.com/security/cve/CVE-2019-13306/" source="CVE"/>
		<reference ref_id="CVE-2019-13307" ref_url="https://www.suse.com/security/cve/CVE-2019-13307/" source="CVE"/>
		<reference ref_id="CVE-2019-13308" ref_url="https://www.suse.com/security/cve/CVE-2019-13308/" source="CVE"/>
		<reference ref_id="CVE-2019-13309" ref_url="https://www.suse.com/security/cve/CVE-2019-13309/" source="CVE"/>
		<reference ref_id="CVE-2019-13310" ref_url="https://www.suse.com/security/cve/CVE-2019-13310/" source="CVE"/>
		<reference ref_id="CVE-2019-13311" ref_url="https://www.suse.com/security/cve/CVE-2019-13311/" source="CVE"/>
		<reference ref_id="CVE-2019-13391" ref_url="https://www.suse.com/security/cve/CVE-2019-13391/" source="CVE"/>
		<reference ref_id="CVE-2019-13454" ref_url="https://www.suse.com/security/cve/CVE-2019-13454/" source="CVE"/>
		<reference ref_id="CVE-2019-14980" ref_url="https://www.suse.com/security/cve/CVE-2019-14980/" source="CVE"/>
		<reference ref_id="CVE-2019-14981" ref_url="https://www.suse.com/security/cve/CVE-2019-14981/" source="CVE"/>
		<reference ref_id="CVE-2019-15139" ref_url="https://www.suse.com/security/cve/CVE-2019-15139/" source="CVE"/>
		<reference ref_id="CVE-2019-15140" ref_url="https://www.suse.com/security/cve/CVE-2019-15140/" source="CVE"/>
		<reference ref_id="CVE-2019-15141" ref_url="https://www.suse.com/security/cve/CVE-2019-15141/" source="CVE"/>
		<reference ref_id="CVE-2019-16708" ref_url="https://www.suse.com/security/cve/CVE-2019-16708/" source="CVE"/>
		<reference ref_id="CVE-2019-16709" ref_url="https://www.suse.com/security/cve/CVE-2019-16709/" source="CVE"/>
		<reference ref_id="CVE-2019-16710" ref_url="https://www.suse.com/security/cve/CVE-2019-16710/" source="CVE"/>
		<reference ref_id="CVE-2019-16711" ref_url="https://www.suse.com/security/cve/CVE-2019-16711/" source="CVE"/>
		<reference ref_id="CVE-2019-16712" ref_url="https://www.suse.com/security/cve/CVE-2019-16712/" source="CVE"/>
		<reference ref_id="CVE-2019-16713" ref_url="https://www.suse.com/security/cve/CVE-2019-16713/" source="CVE"/>
		<reference ref_id="CVE-2019-19948" ref_url="https://www.suse.com/security/cve/CVE-2019-19948/" source="CVE"/>
		<reference ref_id="CVE-2019-19949" ref_url="https://www.suse.com/security/cve/CVE-2019-19949/" source="CVE"/>
		<reference ref_id="CVE-2019-7175" ref_url="https://www.suse.com/security/cve/CVE-2019-7175/" source="CVE"/>
		<reference ref_id="CVE-2019-7395" ref_url="https://www.suse.com/security/cve/CVE-2019-7395/" source="CVE"/>
		<reference ref_id="CVE-2019-7396" ref_url="https://www.suse.com/security/cve/CVE-2019-7396/" source="CVE"/>
		<reference ref_id="CVE-2019-7397" ref_url="https://www.suse.com/security/cve/CVE-2019-7397/" source="CVE"/>
		<reference ref_id="CVE-2019-7398" ref_url="https://www.suse.com/security/cve/CVE-2019-7398/" source="CVE"/>
		<reference ref_id="CVE-2019-9956" ref_url="https://www.suse.com/security/cve/CVE-2019-9956/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-PerlMagick-7.0.7.34-8.3 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3714/">CVE-2016-3714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3715/">CVE-2016-3715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3716/">CVE-2016-3716</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3717/">CVE-2016-3717</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3718/">CVE-2016-3718</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5118/">CVE-2016-5118</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10805/">CVE-2018-10805</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11624/">CVE-2018-11624</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11625/">CVE-2018-11625</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12599/">CVE-2018-12599</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12600/">CVE-2018-12600</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14434/">CVE-2018-14434</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14435/">CVE-2018-14435</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14436/">CVE-2018-14436</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14437/">CVE-2018-14437</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16323/">CVE-2018-16323</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16328/">CVE-2018-16328</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16329/">CVE-2018-16329</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16412/">CVE-2018-16412</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16413/">CVE-2018-16413</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16640/">CVE-2018-16640</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16641/">CVE-2018-16641</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16642/">CVE-2018-16642</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16643/">CVE-2018-16643</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16644/">CVE-2018-16644</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16645/">CVE-2018-16645</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-17966/">CVE-2018-17966</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18024/">CVE-2018-18024</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18544/">CVE-2018-18544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20467/">CVE-2018-20467</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-9135/">CVE-2018-9135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10650/">CVE-2019-10650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11007/">CVE-2019-11007</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11008/">CVE-2019-11008</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11470/">CVE-2019-11470</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11472/">CVE-2019-11472</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11505/">CVE-2019-11505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11506/">CVE-2019-11506</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11597/">CVE-2019-11597</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11598/">CVE-2019-11598</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12974/">CVE-2019-12974</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12975/">CVE-2019-12975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12976/">CVE-2019-12976</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12977/">CVE-2019-12977</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12978/">CVE-2019-12978</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12979/">CVE-2019-12979</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13133/">CVE-2019-13133</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13134/">CVE-2019-13134</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13135/">CVE-2019-13135</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-13136/">CVE-2019-13136</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13137/">CVE-2019-13137</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13295/">CVE-2019-13295</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13296/">CVE-2019-13296</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13297/">CVE-2019-13297</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13298/">CVE-2019-13298</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13299/">CVE-2019-13299</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13300/">CVE-2019-13300</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13301/">CVE-2019-13301</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13302/">CVE-2019-13302</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13303/">CVE-2019-13303</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13304/">CVE-2019-13304</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13305/">CVE-2019-13305</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13306/">CVE-2019-13306</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13307/">CVE-2019-13307</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13308/">CVE-2019-13308</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13309/">CVE-2019-13309</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13310/">CVE-2019-13310</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13311/">CVE-2019-13311</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13391/">CVE-2019-13391</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13454/">CVE-2019-13454</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14980/">CVE-2019-14980</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14981/">CVE-2019-14981</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15139/">CVE-2019-15139</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15140/">CVE-2019-15140</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15141/">CVE-2019-15141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16708/">CVE-2019-16708</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16709/">CVE-2019-16709</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16710/">CVE-2019-16710</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16711/">CVE-2019-16711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16712/">CVE-2019-16712</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16713/">CVE-2019-16713</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19948/">CVE-2019-19948</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19949/">CVE-2019-19949</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7175/">CVE-2019-7175</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7395/">CVE-2019-7395</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-7396/">CVE-2019-7396</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7397/">CVE-2019-7397</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-7398/">CVE-2019-7398</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9956/">CVE-2019-9956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487926" comment="perl-PerlMagick-7.0.7.34-8.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109842" version="1" class="patch">
	<metadata>
		<title>perl-YAML-LibYAML-0.59-1.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-1152" ref_url="https://www.suse.com/security/cve/CVE-2012-1152/" source="CVE"/>
		<reference ref_id="CVE-2013-6393" ref_url="https://www.suse.com/security/cve/CVE-2013-6393/" source="CVE"/>
		<reference ref_id="CVE-2014-2525" ref_url="https://www.suse.com/security/cve/CVE-2014-2525/" source="CVE"/>
		<reference ref_id="CVE-2014-9130" ref_url="https://www.suse.com/security/cve/CVE-2014-9130/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-YAML-LibYAML-0.59-1.16 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1152/">CVE-2012-1152</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6393/">CVE-2013-6393</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-2525/">CVE-2014-2525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9130/">CVE-2014-9130</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487702" comment="perl-YAML-LibYAML-0.59-1.16 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109843" version="1" class="patch">
	<metadata>
		<title>perl-doc-5.26.1-7.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12837" ref_url="https://www.suse.com/security/cve/CVE-2017-12837/" source="CVE"/>
		<reference ref_id="CVE-2017-12883" ref_url="https://www.suse.com/security/cve/CVE-2017-12883/" source="CVE"/>
		<reference ref_id="CVE-2018-12015" ref_url="https://www.suse.com/security/cve/CVE-2018-12015/" source="CVE"/>
		<reference ref_id="CVE-2018-18311" ref_url="https://www.suse.com/security/cve/CVE-2018-18311/" source="CVE"/>
		<reference ref_id="CVE-2018-18312" ref_url="https://www.suse.com/security/cve/CVE-2018-18312/" source="CVE"/>
		<reference ref_id="CVE-2018-18313" ref_url="https://www.suse.com/security/cve/CVE-2018-18313/" source="CVE"/>
		<reference ref_id="CVE-2018-18314" ref_url="https://www.suse.com/security/cve/CVE-2018-18314/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-doc-5.26.1-7.9.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12837/">CVE-2017-12837</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12883/">CVE-2017-12883</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12015/">CVE-2018-12015</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18311/">CVE-2018-18311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18312/">CVE-2018-18312</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18313/">CVE-2018-18313</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-18314/">CVE-2018-18314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487927" comment="perl-doc-5.26.1-7.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109844" version="1" class="patch">
	<metadata>
		<title>perl-solv-0.7.14-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-20532" ref_url="https://www.suse.com/security/cve/CVE-2018-20532/" source="CVE"/>
		<reference ref_id="CVE-2018-20533" ref_url="https://www.suse.com/security/cve/CVE-2018-20533/" source="CVE"/>
		<reference ref_id="CVE-2018-20534" ref_url="https://www.suse.com/security/cve/CVE-2018-20534/" source="CVE"/>
		<description>
These are all security issues fixed in the perl-solv-0.7.14-1.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20532/">CVE-2018-20532</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20533/">CVE-2018-20533</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20534/">CVE-2018-20534</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487928" comment="perl-solv-0.7.14-1.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109845" version="1" class="patch">
	<metadata>
		<title>policycoreutils-devel-3.0-1.20 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-7545" ref_url="https://www.suse.com/security/cve/CVE-2016-7545/" source="CVE"/>
		<reference ref_id="CVE-2018-1063" ref_url="https://www.suse.com/security/cve/CVE-2018-1063/" source="CVE"/>
		<description>
These are all security issues fixed in the policycoreutils-devel-3.0-1.20 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7545/">CVE-2016-7545</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1063/">CVE-2018-1063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487929" comment="policycoreutils-devel-3.0-1.20 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109846" version="1" class="patch">
	<metadata>
		<title>python3-tools-3.6.10-3.53.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4650" ref_url="https://www.suse.com/security/cve/CVE-2014-4650/" source="CVE"/>
		<reference ref_id="CVE-2016-0772" ref_url="https://www.suse.com/security/cve/CVE-2016-0772/" source="CVE"/>
		<reference ref_id="CVE-2016-1000110" ref_url="https://www.suse.com/security/cve/CVE-2016-1000110/" source="CVE"/>
		<reference ref_id="CVE-2016-5636" ref_url="https://www.suse.com/security/cve/CVE-2016-5636/" source="CVE"/>
		<reference ref_id="CVE-2016-5699" ref_url="https://www.suse.com/security/cve/CVE-2016-5699/" source="CVE"/>
		<reference ref_id="CVE-2017-18207" ref_url="https://www.suse.com/security/cve/CVE-2017-18207/" source="CVE"/>
		<reference ref_id="CVE-2018-1000802" ref_url="https://www.suse.com/security/cve/CVE-2018-1000802/" source="CVE"/>
		<reference ref_id="CVE-2018-1060" ref_url="https://www.suse.com/security/cve/CVE-2018-1060/" source="CVE"/>
		<reference ref_id="CVE-2018-1061" ref_url="https://www.suse.com/security/cve/CVE-2018-1061/" source="CVE"/>
		<reference ref_id="CVE-2018-14647" ref_url="https://www.suse.com/security/cve/CVE-2018-14647/" source="CVE"/>
		<reference ref_id="CVE-2018-20406" ref_url="https://www.suse.com/security/cve/CVE-2018-20406/" source="CVE"/>
		<reference ref_id="CVE-2018-20852" ref_url="https://www.suse.com/security/cve/CVE-2018-20852/" source="CVE"/>
		<reference ref_id="CVE-2019-10160" ref_url="https://www.suse.com/security/cve/CVE-2019-10160/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-16056" ref_url="https://www.suse.com/security/cve/CVE-2019-16056/" source="CVE"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2019-9636" ref_url="https://www.suse.com/security/cve/CVE-2019-9636/" source="CVE"/>
		<reference ref_id="CVE-2019-9674" ref_url="https://www.suse.com/security/cve/CVE-2019-9674/" source="CVE"/>
		<reference ref_id="CVE-2019-9947" ref_url="https://www.suse.com/security/cve/CVE-2019-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-tools-3.6.10-3.53.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-4650/">CVE-2014-4650</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0772/">CVE-2016-0772</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1000110/">CVE-2016-1000110</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-5636/">CVE-2016-5636</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5699/">CVE-2016-5699</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18207/">CVE-2017-18207</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000802/">CVE-2018-1000802</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1060/">CVE-2018-1060</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1061/">CVE-2018-1061</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14647/">CVE-2018-14647</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20406/">CVE-2018-20406</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20852/">CVE-2018-20852</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10160/">CVE-2019-10160</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16056/">CVE-2019-16056</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9636/">CVE-2019-9636</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9674/">CVE-2019-9674</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9947/">CVE-2019-9947</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487930" comment="python3-tools-3.6.10-3.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109847" version="1" class="patch">
	<metadata>
		<title>rpm-build-4.14.1-20.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-7500" ref_url="https://www.suse.com/security/cve/CVE-2017-7500/" source="CVE"/>
		<description>
These are all security issues fixed in the rpm-build-4.14.1-20.3 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7500/">CVE-2017-7500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487931" comment="rpm-build-4.14.1-20.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109848" version="1" class="patch">
	<metadata>
		<title>subversion-bash-completion-1.10.6-3.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<reference ref_id="CVE-2015-0202" ref_url="https://www.suse.com/security/cve/CVE-2015-0202/" source="CVE"/>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<reference ref_id="CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184/" source="CVE"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<reference ref_id="CVE-2015-5259" ref_url="https://www.suse.com/security/cve/CVE-2015-5259/" source="CVE"/>
		<reference ref_id="CVE-2015-5343" ref_url="https://www.suse.com/security/cve/CVE-2015-5343/" source="CVE"/>
		<reference ref_id="CVE-2016-2167" ref_url="https://www.suse.com/security/cve/CVE-2016-2167/" source="CVE"/>
		<reference ref_id="CVE-2016-2168" ref_url="https://www.suse.com/security/cve/CVE-2016-2168/" source="CVE"/>
		<reference ref_id="CVE-2016-8734" ref_url="https://www.suse.com/security/cve/CVE-2016-8734/" source="CVE"/>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<reference ref_id="CVE-2018-11803" ref_url="https://www.suse.com/security/cve/CVE-2018-11803/" source="CVE"/>
		<reference ref_id="CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203/" source="CVE"/>
		<description>
These are all security issues fixed in the subversion-bash-completion-1.10.6-3.6.2 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0202/">CVE-2015-0202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5259/">CVE-2015-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5343/">CVE-2015-5343</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2167/">CVE-2016-2167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2168/">CVE-2016-2168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8734/">CVE-2016-8734</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11803/">CVE-2018-11803</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487932" comment="subversion-bash-completion-1.10.6-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487933" comment="subversion-perl-1.10.6-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487934" comment="subversion-python-1.10.6-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487935" comment="subversion-tools-1.10.6-3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109849" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-sdk-1.20.3-20.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-sdk-1.20.3-20.11 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487936" comment="xorg-x11-server-sdk-1.20.3-20.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109850" version="1" class="patch">
	<metadata>
		<title>zlib-devel-32bit-1.2.11-3.12.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<description>
These are all security issues fixed in the zlib-devel-32bit-1.2.11-3.12.1 package on the GA media of SUSE Linux Enterprise Module for Development Tools 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487937" comment="zlib-devel-32bit-1.2.11-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109851" version="1" class="patch">
	<metadata>
		<title>libmunge2-0.5.14-4.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2019-3691" ref_url="https://www.suse.com/security/cve/CVE-2019-3691/" source="CVE"/>
		<description>
These are all security issues fixed in the libmunge2-0.5.14-4.9.1 package on the GA media of SUSE Linux Enterprise Module for High Performance Computing 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3691/">CVE-2019-3691</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487988" comment="libmunge2-0.5.14-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487989" comment="munge-0.5.14-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487990" comment="munge-devel-0.5.14-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109852" version="1" class="patch">
	<metadata>
		<title>libnss_slurm2-20.02.3-1.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-10030" ref_url="https://www.suse.com/security/cve/CVE-2016-10030/" source="CVE"/>
		<reference ref_id="CVE-2017-15566" ref_url="https://www.suse.com/security/cve/CVE-2017-15566/" source="CVE"/>
		<reference ref_id="CVE-2018-10995" ref_url="https://www.suse.com/security/cve/CVE-2018-10995/" source="CVE"/>
		<reference ref_id="CVE-2018-7033" ref_url="https://www.suse.com/security/cve/CVE-2018-7033/" source="CVE"/>
		<reference ref_id="CVE-2019-12838" ref_url="https://www.suse.com/security/cve/CVE-2019-12838/" source="CVE"/>
		<reference ref_id="CVE-2019-19727" ref_url="https://www.suse.com/security/cve/CVE-2019-19727/" source="CVE"/>
		<reference ref_id="CVE-2019-19728" ref_url="https://www.suse.com/security/cve/CVE-2019-19728/" source="CVE"/>
		<reference ref_id="CVE-2019-6438" ref_url="https://www.suse.com/security/cve/CVE-2019-6438/" source="CVE"/>
		<reference ref_id="CVE-2020-12693" ref_url="https://www.suse.com/security/cve/CVE-2020-12693/" source="CVE"/>
		<description>
These are all security issues fixed in the libnss_slurm2-20.02.3-1.7 package on the GA media of SUSE Linux Enterprise Module for High Performance Computing 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10030/">CVE-2016-10030</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15566/">CVE-2017-15566</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10995/">CVE-2018-10995</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7033/">CVE-2018-7033</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12838/">CVE-2019-12838</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19727/">CVE-2019-19727</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19728/">CVE-2019-19728</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-6438/">CVE-2019-6438</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-12693/">CVE-2020-12693</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009487991" comment="libnss_slurm2-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487992" comment="libpmi0-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487993" comment="libslurm35-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487994" comment="perl-slurm-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487995" comment="slurm-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487996" comment="slurm-auth-none-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487997" comment="slurm-config-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487998" comment="slurm-config-man-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009487999" comment="slurm-devel-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488000" comment="slurm-doc-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488001" comment="slurm-lua-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488002" comment="slurm-munge-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488003" comment="slurm-node-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488004" comment="slurm-pam_slurm-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488005" comment="slurm-plugins-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488006" comment="slurm-slurmdbd-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488007" comment="slurm-sql-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488008" comment="slurm-sview-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488009" comment="slurm-torque-20.02.3-1.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488010" comment="slurm-webdoc-20.02.3-1.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109853" version="1" class="patch">
	<metadata>
		<title>python2-numpy-gnu-hpc-1.16.5-1.164 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-12852" ref_url="https://www.suse.com/security/cve/CVE-2017-12852/" source="CVE"/>
		<reference ref_id="CVE-2019-6446" ref_url="https://www.suse.com/security/cve/CVE-2019-6446/" source="CVE"/>
		<description>
These are all security issues fixed in the python2-numpy-gnu-hpc-1.16.5-1.164 package on the GA media of SUSE Linux Enterprise Module for High Performance Computing 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12852/">CVE-2017-12852</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6446/">CVE-2019-6446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488011" comment="python2-numpy-gnu-hpc-1.16.5-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488012" comment="python2-numpy-gnu-hpc-devel-1.16.5-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488013" comment="python2-numpy_1_16_5-gnu-hpc-1.16.5-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488014" comment="python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-1.164 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488015" comment="python3-numpy-gnu-hpc-1.17.3-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488016" comment="python3-numpy-gnu-hpc-devel-1.17.3-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488017" comment="python3-numpy_1_17_3-gnu-hpc-1.17.3-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488018" comment="python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109854" version="1" class="patch">
	<metadata>
		<title>gv-3.7.4-1.41 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-3386" ref_url="https://www.suse.com/security/cve/CVE-2012-3386/" source="CVE"/>
		<description>
These are all security issues fixed in the gv-3.7.4-1.41 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-3386/">CVE-2012-3386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488019" comment="gv-3.7.4-1.41 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109855" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-ibm-1.8.0_sr6.5-3.33.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3065" ref_url="https://www.suse.com/security/cve/CVE-2014-3065/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2014-4288" ref_url="https://www.suse.com/security/cve/CVE-2014-4288/" source="CVE"/>
		<reference ref_id="CVE-2014-6456" ref_url="https://www.suse.com/security/cve/CVE-2014-6456/" source="CVE"/>
		<reference ref_id="CVE-2014-6457" ref_url="https://www.suse.com/security/cve/CVE-2014-6457/" source="CVE"/>
		<reference ref_id="CVE-2014-6458" ref_url="https://www.suse.com/security/cve/CVE-2014-6458/" source="CVE"/>
		<reference ref_id="CVE-2014-6466" ref_url="https://www.suse.com/security/cve/CVE-2014-6466/" source="CVE"/>
		<reference ref_id="CVE-2014-6476" ref_url="https://www.suse.com/security/cve/CVE-2014-6476/" source="CVE"/>
		<reference ref_id="CVE-2014-6492" ref_url="https://www.suse.com/security/cve/CVE-2014-6492/" source="CVE"/>
		<reference ref_id="CVE-2014-6493" ref_url="https://www.suse.com/security/cve/CVE-2014-6493/" source="CVE"/>
		<reference ref_id="CVE-2014-6502" ref_url="https://www.suse.com/security/cve/CVE-2014-6502/" source="CVE"/>
		<reference ref_id="CVE-2014-6503" ref_url="https://www.suse.com/security/cve/CVE-2014-6503/" source="CVE"/>
		<reference ref_id="CVE-2014-6506" ref_url="https://www.suse.com/security/cve/CVE-2014-6506/" source="CVE"/>
		<reference ref_id="CVE-2014-6511" ref_url="https://www.suse.com/security/cve/CVE-2014-6511/" source="CVE"/>
		<reference ref_id="CVE-2014-6512" ref_url="https://www.suse.com/security/cve/CVE-2014-6512/" source="CVE"/>
		<reference ref_id="CVE-2014-6513" ref_url="https://www.suse.com/security/cve/CVE-2014-6513/" source="CVE"/>
		<reference ref_id="CVE-2014-6515" ref_url="https://www.suse.com/security/cve/CVE-2014-6515/" source="CVE"/>
		<reference ref_id="CVE-2014-6527" ref_url="https://www.suse.com/security/cve/CVE-2014-6527/" source="CVE"/>
		<reference ref_id="CVE-2014-6531" ref_url="https://www.suse.com/security/cve/CVE-2014-6531/" source="CVE"/>
		<reference ref_id="CVE-2014-6532" ref_url="https://www.suse.com/security/cve/CVE-2014-6532/" source="CVE"/>
		<reference ref_id="CVE-2014-6558" ref_url="https://www.suse.com/security/cve/CVE-2014-6558/" source="CVE"/>
		<reference ref_id="CVE-2014-8891" ref_url="https://www.suse.com/security/cve/CVE-2014-8891/" source="CVE"/>
		<reference ref_id="CVE-2014-8892" ref_url="https://www.suse.com/security/cve/CVE-2014-8892/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0458" ref_url="https://www.suse.com/security/cve/CVE-2015-0458/" source="CVE"/>
		<reference ref_id="CVE-2015-0459" ref_url="https://www.suse.com/security/cve/CVE-2015-0459/" source="CVE"/>
		<reference ref_id="CVE-2015-0469" ref_url="https://www.suse.com/security/cve/CVE-2015-0469/" source="CVE"/>
		<reference ref_id="CVE-2015-0477" ref_url="https://www.suse.com/security/cve/CVE-2015-0477/" source="CVE"/>
		<reference ref_id="CVE-2015-0478" ref_url="https://www.suse.com/security/cve/CVE-2015-0478/" source="CVE"/>
		<reference ref_id="CVE-2015-0480" ref_url="https://www.suse.com/security/cve/CVE-2015-0480/" source="CVE"/>
		<reference ref_id="CVE-2015-0486" ref_url="https://www.suse.com/security/cve/CVE-2015-0486/" source="CVE"/>
		<reference ref_id="CVE-2015-0488" ref_url="https://www.suse.com/security/cve/CVE-2015-0488/" source="CVE"/>
		<reference ref_id="CVE-2015-0491" ref_url="https://www.suse.com/security/cve/CVE-2015-0491/" source="CVE"/>
		<reference ref_id="CVE-2015-1931" ref_url="https://www.suse.com/security/cve/CVE-2015-1931/" source="CVE"/>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4871" ref_url="https://www.suse.com/security/cve/CVE-2015-4871/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-5006" ref_url="https://www.suse.com/security/cve/CVE-2015-5006/" source="CVE"/>
		<reference ref_id="CVE-2015-5041" ref_url="https://www.suse.com/security/cve/CVE-2015-5041/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2015-8472" ref_url="https://www.suse.com/security/cve/CVE-2015-8472/" source="CVE"/>
		<reference ref_id="CVE-2016-0264" ref_url="https://www.suse.com/security/cve/CVE-2016-0264/" source="CVE"/>
		<reference ref_id="CVE-2016-0363" ref_url="https://www.suse.com/security/cve/CVE-2016-0363/" source="CVE"/>
		<reference ref_id="CVE-2016-0376" ref_url="https://www.suse.com/security/cve/CVE-2016-0376/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3422" ref_url="https://www.suse.com/security/cve/CVE-2016-3422/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3443" ref_url="https://www.suse.com/security/cve/CVE-2016-3443/" source="CVE"/>
		<reference ref_id="CVE-2016-3449" ref_url="https://www.suse.com/security/cve/CVE-2016-3449/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10293" ref_url="https://www.suse.com/security/cve/CVE-2017-10293/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10309" ref_url="https://www.suse.com/security/cve/CVE-2017-10309/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="CVE-2017-1289" ref_url="https://www.suse.com/security/cve/CVE-2017-1289/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3259" ref_url="https://www.suse.com/security/cve/CVE-2017-3259/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-12539" ref_url="https://www.suse.com/security/cve/CVE-2018-12539/" source="CVE"/>
		<reference ref_id="CVE-2018-12547" ref_url="https://www.suse.com/security/cve/CVE-2018-12547/" source="CVE"/>
		<reference ref_id="CVE-2018-12549" ref_url="https://www.suse.com/security/cve/CVE-2018-12549/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-1417" ref_url="https://www.suse.com/security/cve/CVE-2018-1417/" source="CVE"/>
		<reference ref_id="CVE-2018-1517" ref_url="https://www.suse.com/security/cve/CVE-2018-1517/" source="CVE"/>
		<reference ref_id="CVE-2018-1656" ref_url="https://www.suse.com/security/cve/CVE-2018-1656/" source="CVE"/>
		<reference ref_id="CVE-2018-1890" ref_url="https://www.suse.com/security/cve/CVE-2018-1890/" source="CVE"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2638" ref_url="https://www.suse.com/security/cve/CVE-2018-2638/" source="CVE"/>
		<reference ref_id="CVE-2018-2639" ref_url="https://www.suse.com/security/cve/CVE-2018-2639/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="CVE-2018-2783" ref_url="https://www.suse.com/security/cve/CVE-2018-2783/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2825" ref_url="https://www.suse.com/security/cve/CVE-2018-2825/" source="CVE"/>
		<reference ref_id="CVE-2018-2826" ref_url="https://www.suse.com/security/cve/CVE-2018-2826/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2964" ref_url="https://www.suse.com/security/cve/CVE-2018-2964/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2019-10245" ref_url="https://www.suse.com/security/cve/CVE-2019-10245/" source="CVE"/>
		<reference ref_id="CVE-2019-11771" ref_url="https://www.suse.com/security/cve/CVE-2019-11771/" source="CVE"/>
		<reference ref_id="CVE-2019-11772" ref_url="https://www.suse.com/security/cve/CVE-2019-11772/" source="CVE"/>
		<reference ref_id="CVE-2019-11775" ref_url="https://www.suse.com/security/cve/CVE-2019-11775/" source="CVE"/>
		<reference ref_id="CVE-2019-17631" ref_url="https://www.suse.com/security/cve/CVE-2019-17631/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2449" ref_url="https://www.suse.com/security/cve/CVE-2019-2449/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2697" ref_url="https://www.suse.com/security/cve/CVE-2019-2697/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2996" ref_url="https://www.suse.com/security/cve/CVE-2019-2996/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-4473" ref_url="https://www.suse.com/security/cve/CVE-2019-4473/" source="CVE"/>
		<reference ref_id="CVE-2019-4732" ref_url="https://www.suse.com/security/cve/CVE-2019-4732/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-ibm-1.8.0_sr6.5-3.33.2 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3065/">CVE-2014-3065</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4288/">CVE-2014-4288</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6456/">CVE-2014-6456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6457/">CVE-2014-6457</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6458/">CVE-2014-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6466/">CVE-2014-6466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6476/">CVE-2014-6476</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6492/">CVE-2014-6492</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6493/">CVE-2014-6493</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6502/">CVE-2014-6502</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6503/">CVE-2014-6503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6506/">CVE-2014-6506</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6511/">CVE-2014-6511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6512/">CVE-2014-6512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6513/">CVE-2014-6513</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6515/">CVE-2014-6515</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6527/">CVE-2014-6527</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6531/">CVE-2014-6531</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6532/">CVE-2014-6532</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-6558/">CVE-2014-6558</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8891/">CVE-2014-8891</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8892/">CVE-2014-8892</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0458/">CVE-2015-0458</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0459/">CVE-2015-0459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0469/">CVE-2015-0469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0477/">CVE-2015-0477</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0478/">CVE-2015-0478</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0480/">CVE-2015-0480</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0486/">CVE-2015-0486</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0488/">CVE-2015-0488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0491/">CVE-2015-0491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1931/">CVE-2015-1931</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4871/">CVE-2015-4871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5006/">CVE-2015-5006</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5041/">CVE-2015-5041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8472/">CVE-2015-8472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0264/">CVE-2016-0264</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0363/">CVE-2016-0363</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0376/">CVE-2016-0376</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3422/">CVE-2016-3422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3443/">CVE-2016-3443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3449/">CVE-2016-3449</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10293/">CVE-2017-10293</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10309/">CVE-2017-10309</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1289/">CVE-2017-1289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3259/">CVE-2017-3259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12539/">CVE-2018-12539</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12547/">CVE-2018-12547</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-12549/">CVE-2018-12549</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2018-1417/">CVE-2018-1417</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1517/">CVE-2018-1517</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1656/">CVE-2018-1656</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1890/">CVE-2018-1890</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2638/">CVE-2018-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2639/">CVE-2018-2639</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2783/">CVE-2018-2783</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2825/">CVE-2018-2825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-2826/">CVE-2018-2826</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2964/">CVE-2018-2964</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10245/">CVE-2019-10245</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11771/">CVE-2019-11771</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11772/">CVE-2019-11772</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11775/">CVE-2019-11775</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2019-17631/">CVE-2019-17631</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2449/">CVE-2019-2449</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2697/">CVE-2019-2697</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2996/">CVE-2019-2996</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-4473/">CVE-2019-4473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-4732/">CVE-2019-4732</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488062" comment="java-1_8_0-ibm-1.8.0_sr6.5-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488063" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.5-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488064" comment="java-1_8_0-ibm-devel-1.8.0_sr6.5-3.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488065" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.5-3.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109856" version="1" class="patch">
	<metadata>
		<title>java-1_8_0-openjdk-1.8.0.242-3.30.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-2590" ref_url="https://www.suse.com/security/cve/CVE-2015-2590/" source="CVE"/>
		<reference ref_id="CVE-2015-2597" ref_url="https://www.suse.com/security/cve/CVE-2015-2597/" source="CVE"/>
		<reference ref_id="CVE-2015-2601" ref_url="https://www.suse.com/security/cve/CVE-2015-2601/" source="CVE"/>
		<reference ref_id="CVE-2015-2613" ref_url="https://www.suse.com/security/cve/CVE-2015-2613/" source="CVE"/>
		<reference ref_id="CVE-2015-2619" ref_url="https://www.suse.com/security/cve/CVE-2015-2619/" source="CVE"/>
		<reference ref_id="CVE-2015-2621" ref_url="https://www.suse.com/security/cve/CVE-2015-2621/" source="CVE"/>
		<reference ref_id="CVE-2015-2625" ref_url="https://www.suse.com/security/cve/CVE-2015-2625/" source="CVE"/>
		<reference ref_id="CVE-2015-2627" ref_url="https://www.suse.com/security/cve/CVE-2015-2627/" source="CVE"/>
		<reference ref_id="CVE-2015-2628" ref_url="https://www.suse.com/security/cve/CVE-2015-2628/" source="CVE"/>
		<reference ref_id="CVE-2015-2632" ref_url="https://www.suse.com/security/cve/CVE-2015-2632/" source="CVE"/>
		<reference ref_id="CVE-2015-2637" ref_url="https://www.suse.com/security/cve/CVE-2015-2637/" source="CVE"/>
		<reference ref_id="CVE-2015-2638" ref_url="https://www.suse.com/security/cve/CVE-2015-2638/" source="CVE"/>
		<reference ref_id="CVE-2015-2659" ref_url="https://www.suse.com/security/cve/CVE-2015-2659/" source="CVE"/>
		<reference ref_id="CVE-2015-2664" ref_url="https://www.suse.com/security/cve/CVE-2015-2664/" source="CVE"/>
		<reference ref_id="CVE-2015-2808" ref_url="https://www.suse.com/security/cve/CVE-2015-2808/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4729" ref_url="https://www.suse.com/security/cve/CVE-2015-4729/" source="CVE"/>
		<reference ref_id="CVE-2015-4731" ref_url="https://www.suse.com/security/cve/CVE-2015-4731/" source="CVE"/>
		<reference ref_id="CVE-2015-4732" ref_url="https://www.suse.com/security/cve/CVE-2015-4732/" source="CVE"/>
		<reference ref_id="CVE-2015-4733" ref_url="https://www.suse.com/security/cve/CVE-2015-4733/" source="CVE"/>
		<reference ref_id="CVE-2015-4734" ref_url="https://www.suse.com/security/cve/CVE-2015-4734/" source="CVE"/>
		<reference ref_id="CVE-2015-4736" ref_url="https://www.suse.com/security/cve/CVE-2015-4736/" source="CVE"/>
		<reference ref_id="CVE-2015-4748" ref_url="https://www.suse.com/security/cve/CVE-2015-4748/" source="CVE"/>
		<reference ref_id="CVE-2015-4749" ref_url="https://www.suse.com/security/cve/CVE-2015-4749/" source="CVE"/>
		<reference ref_id="CVE-2015-4760" ref_url="https://www.suse.com/security/cve/CVE-2015-4760/" source="CVE"/>
		<reference ref_id="CVE-2015-4803" ref_url="https://www.suse.com/security/cve/CVE-2015-4803/" source="CVE"/>
		<reference ref_id="CVE-2015-4805" ref_url="https://www.suse.com/security/cve/CVE-2015-4805/" source="CVE"/>
		<reference ref_id="CVE-2015-4806" ref_url="https://www.suse.com/security/cve/CVE-2015-4806/" source="CVE"/>
		<reference ref_id="CVE-2015-4810" ref_url="https://www.suse.com/security/cve/CVE-2015-4810/" source="CVE"/>
		<reference ref_id="CVE-2015-4835" ref_url="https://www.suse.com/security/cve/CVE-2015-4835/" source="CVE"/>
		<reference ref_id="CVE-2015-4840" ref_url="https://www.suse.com/security/cve/CVE-2015-4840/" source="CVE"/>
		<reference ref_id="CVE-2015-4842" ref_url="https://www.suse.com/security/cve/CVE-2015-4842/" source="CVE"/>
		<reference ref_id="CVE-2015-4843" ref_url="https://www.suse.com/security/cve/CVE-2015-4843/" source="CVE"/>
		<reference ref_id="CVE-2015-4844" ref_url="https://www.suse.com/security/cve/CVE-2015-4844/" source="CVE"/>
		<reference ref_id="CVE-2015-4860" ref_url="https://www.suse.com/security/cve/CVE-2015-4860/" source="CVE"/>
		<reference ref_id="CVE-2015-4868" ref_url="https://www.suse.com/security/cve/CVE-2015-4868/" source="CVE"/>
		<reference ref_id="CVE-2015-4872" ref_url="https://www.suse.com/security/cve/CVE-2015-4872/" source="CVE"/>
		<reference ref_id="CVE-2015-4881" ref_url="https://www.suse.com/security/cve/CVE-2015-4881/" source="CVE"/>
		<reference ref_id="CVE-2015-4882" ref_url="https://www.suse.com/security/cve/CVE-2015-4882/" source="CVE"/>
		<reference ref_id="CVE-2015-4883" ref_url="https://www.suse.com/security/cve/CVE-2015-4883/" source="CVE"/>
		<reference ref_id="CVE-2015-4893" ref_url="https://www.suse.com/security/cve/CVE-2015-4893/" source="CVE"/>
		<reference ref_id="CVE-2015-4901" ref_url="https://www.suse.com/security/cve/CVE-2015-4901/" source="CVE"/>
		<reference ref_id="CVE-2015-4902" ref_url="https://www.suse.com/security/cve/CVE-2015-4902/" source="CVE"/>
		<reference ref_id="CVE-2015-4903" ref_url="https://www.suse.com/security/cve/CVE-2015-4903/" source="CVE"/>
		<reference ref_id="CVE-2015-4906" ref_url="https://www.suse.com/security/cve/CVE-2015-4906/" source="CVE"/>
		<reference ref_id="CVE-2015-4908" ref_url="https://www.suse.com/security/cve/CVE-2015-4908/" source="CVE"/>
		<reference ref_id="CVE-2015-4911" ref_url="https://www.suse.com/security/cve/CVE-2015-4911/" source="CVE"/>
		<reference ref_id="CVE-2015-4916" ref_url="https://www.suse.com/security/cve/CVE-2015-4916/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2015-8126" ref_url="https://www.suse.com/security/cve/CVE-2015-8126/" source="CVE"/>
		<reference ref_id="CVE-2016-0402" ref_url="https://www.suse.com/security/cve/CVE-2016-0402/" source="CVE"/>
		<reference ref_id="CVE-2016-0448" ref_url="https://www.suse.com/security/cve/CVE-2016-0448/" source="CVE"/>
		<reference ref_id="CVE-2016-0466" ref_url="https://www.suse.com/security/cve/CVE-2016-0466/" source="CVE"/>
		<reference ref_id="CVE-2016-0475" ref_url="https://www.suse.com/security/cve/CVE-2016-0475/" source="CVE"/>
		<reference ref_id="CVE-2016-0483" ref_url="https://www.suse.com/security/cve/CVE-2016-0483/" source="CVE"/>
		<reference ref_id="CVE-2016-0494" ref_url="https://www.suse.com/security/cve/CVE-2016-0494/" source="CVE"/>
		<reference ref_id="CVE-2016-0636" ref_url="https://www.suse.com/security/cve/CVE-2016-0636/" source="CVE"/>
		<reference ref_id="CVE-2016-0686" ref_url="https://www.suse.com/security/cve/CVE-2016-0686/" source="CVE"/>
		<reference ref_id="CVE-2016-0687" ref_url="https://www.suse.com/security/cve/CVE-2016-0687/" source="CVE"/>
		<reference ref_id="CVE-2016-0695" ref_url="https://www.suse.com/security/cve/CVE-2016-0695/" source="CVE"/>
		<reference ref_id="CVE-2016-10165" ref_url="https://www.suse.com/security/cve/CVE-2016-10165/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-3425" ref_url="https://www.suse.com/security/cve/CVE-2016-3425/" source="CVE"/>
		<reference ref_id="CVE-2016-3426" ref_url="https://www.suse.com/security/cve/CVE-2016-3426/" source="CVE"/>
		<reference ref_id="CVE-2016-3427" ref_url="https://www.suse.com/security/cve/CVE-2016-3427/" source="CVE"/>
		<reference ref_id="CVE-2016-3458" ref_url="https://www.suse.com/security/cve/CVE-2016-3458/" source="CVE"/>
		<reference ref_id="CVE-2016-3485" ref_url="https://www.suse.com/security/cve/CVE-2016-3485/" source="CVE"/>
		<reference ref_id="CVE-2016-3498" ref_url="https://www.suse.com/security/cve/CVE-2016-3498/" source="CVE"/>
		<reference ref_id="CVE-2016-3500" ref_url="https://www.suse.com/security/cve/CVE-2016-3500/" source="CVE"/>
		<reference ref_id="CVE-2016-3503" ref_url="https://www.suse.com/security/cve/CVE-2016-3503/" source="CVE"/>
		<reference ref_id="CVE-2016-3508" ref_url="https://www.suse.com/security/cve/CVE-2016-3508/" source="CVE"/>
		<reference ref_id="CVE-2016-3511" ref_url="https://www.suse.com/security/cve/CVE-2016-3511/" source="CVE"/>
		<reference ref_id="CVE-2016-3550" ref_url="https://www.suse.com/security/cve/CVE-2016-3550/" source="CVE"/>
		<reference ref_id="CVE-2016-3552" ref_url="https://www.suse.com/security/cve/CVE-2016-3552/" source="CVE"/>
		<reference ref_id="CVE-2016-3587" ref_url="https://www.suse.com/security/cve/CVE-2016-3587/" source="CVE"/>
		<reference ref_id="CVE-2016-3598" ref_url="https://www.suse.com/security/cve/CVE-2016-3598/" source="CVE"/>
		<reference ref_id="CVE-2016-3606" ref_url="https://www.suse.com/security/cve/CVE-2016-3606/" source="CVE"/>
		<reference ref_id="CVE-2016-3610" ref_url="https://www.suse.com/security/cve/CVE-2016-3610/" source="CVE"/>
		<reference ref_id="CVE-2016-5542" ref_url="https://www.suse.com/security/cve/CVE-2016-5542/" source="CVE"/>
		<reference ref_id="CVE-2016-5546" ref_url="https://www.suse.com/security/cve/CVE-2016-5546/" source="CVE"/>
		<reference ref_id="CVE-2016-5547" ref_url="https://www.suse.com/security/cve/CVE-2016-5547/" source="CVE"/>
		<reference ref_id="CVE-2016-5548" ref_url="https://www.suse.com/security/cve/CVE-2016-5548/" source="CVE"/>
		<reference ref_id="CVE-2016-5549" ref_url="https://www.suse.com/security/cve/CVE-2016-5549/" source="CVE"/>
		<reference ref_id="CVE-2016-5552" ref_url="https://www.suse.com/security/cve/CVE-2016-5552/" source="CVE"/>
		<reference ref_id="CVE-2016-5554" ref_url="https://www.suse.com/security/cve/CVE-2016-5554/" source="CVE"/>
		<reference ref_id="CVE-2016-5556" ref_url="https://www.suse.com/security/cve/CVE-2016-5556/" source="CVE"/>
		<reference ref_id="CVE-2016-5568" ref_url="https://www.suse.com/security/cve/CVE-2016-5568/" source="CVE"/>
		<reference ref_id="CVE-2016-5573" ref_url="https://www.suse.com/security/cve/CVE-2016-5573/" source="CVE"/>
		<reference ref_id="CVE-2016-5582" ref_url="https://www.suse.com/security/cve/CVE-2016-5582/" source="CVE"/>
		<reference ref_id="CVE-2016-5597" ref_url="https://www.suse.com/security/cve/CVE-2016-5597/" source="CVE"/>
		<reference ref_id="CVE-2016-9840" ref_url="https://www.suse.com/security/cve/CVE-2016-9840/" source="CVE"/>
		<reference ref_id="CVE-2016-9841" ref_url="https://www.suse.com/security/cve/CVE-2016-9841/" source="CVE"/>
		<reference ref_id="CVE-2016-9842" ref_url="https://www.suse.com/security/cve/CVE-2016-9842/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10053" ref_url="https://www.suse.com/security/cve/CVE-2017-10053/" source="CVE"/>
		<reference ref_id="CVE-2017-10067" ref_url="https://www.suse.com/security/cve/CVE-2017-10067/" source="CVE"/>
		<reference ref_id="CVE-2017-10074" ref_url="https://www.suse.com/security/cve/CVE-2017-10074/" source="CVE"/>
		<reference ref_id="CVE-2017-10078" ref_url="https://www.suse.com/security/cve/CVE-2017-10078/" source="CVE"/>
		<reference ref_id="CVE-2017-10081" ref_url="https://www.suse.com/security/cve/CVE-2017-10081/" source="CVE"/>
		<reference ref_id="CVE-2017-10086" ref_url="https://www.suse.com/security/cve/CVE-2017-10086/" source="CVE"/>
		<reference ref_id="CVE-2017-10087" ref_url="https://www.suse.com/security/cve/CVE-2017-10087/" source="CVE"/>
		<reference ref_id="CVE-2017-10089" ref_url="https://www.suse.com/security/cve/CVE-2017-10089/" source="CVE"/>
		<reference ref_id="CVE-2017-10090" ref_url="https://www.suse.com/security/cve/CVE-2017-10090/" source="CVE"/>
		<reference ref_id="CVE-2017-10096" ref_url="https://www.suse.com/security/cve/CVE-2017-10096/" source="CVE"/>
		<reference ref_id="CVE-2017-10101" ref_url="https://www.suse.com/security/cve/CVE-2017-10101/" source="CVE"/>
		<reference ref_id="CVE-2017-10102" ref_url="https://www.suse.com/security/cve/CVE-2017-10102/" source="CVE"/>
		<reference ref_id="CVE-2017-10105" ref_url="https://www.suse.com/security/cve/CVE-2017-10105/" source="CVE"/>
		<reference ref_id="CVE-2017-10107" ref_url="https://www.suse.com/security/cve/CVE-2017-10107/" source="CVE"/>
		<reference ref_id="CVE-2017-10108" ref_url="https://www.suse.com/security/cve/CVE-2017-10108/" source="CVE"/>
		<reference ref_id="CVE-2017-10109" ref_url="https://www.suse.com/security/cve/CVE-2017-10109/" source="CVE"/>
		<reference ref_id="CVE-2017-10110" ref_url="https://www.suse.com/security/cve/CVE-2017-10110/" source="CVE"/>
		<reference ref_id="CVE-2017-10111" ref_url="https://www.suse.com/security/cve/CVE-2017-10111/" source="CVE"/>
		<reference ref_id="CVE-2017-10114" ref_url="https://www.suse.com/security/cve/CVE-2017-10114/" source="CVE"/>
		<reference ref_id="CVE-2017-10115" ref_url="https://www.suse.com/security/cve/CVE-2017-10115/" source="CVE"/>
		<reference ref_id="CVE-2017-10116" ref_url="https://www.suse.com/security/cve/CVE-2017-10116/" source="CVE"/>
		<reference ref_id="CVE-2017-10118" ref_url="https://www.suse.com/security/cve/CVE-2017-10118/" source="CVE"/>
		<reference ref_id="CVE-2017-10125" ref_url="https://www.suse.com/security/cve/CVE-2017-10125/" source="CVE"/>
		<reference ref_id="CVE-2017-10135" ref_url="https://www.suse.com/security/cve/CVE-2017-10135/" source="CVE"/>
		<reference ref_id="CVE-2017-10176" ref_url="https://www.suse.com/security/cve/CVE-2017-10176/" source="CVE"/>
		<reference ref_id="CVE-2017-10193" ref_url="https://www.suse.com/security/cve/CVE-2017-10193/" source="CVE"/>
		<reference ref_id="CVE-2017-10198" ref_url="https://www.suse.com/security/cve/CVE-2017-10198/" source="CVE"/>
		<reference ref_id="CVE-2017-10243" ref_url="https://www.suse.com/security/cve/CVE-2017-10243/" source="CVE"/>
		<reference ref_id="CVE-2017-10274" ref_url="https://www.suse.com/security/cve/CVE-2017-10274/" source="CVE"/>
		<reference ref_id="CVE-2017-10281" ref_url="https://www.suse.com/security/cve/CVE-2017-10281/" source="CVE"/>
		<reference ref_id="CVE-2017-10285" ref_url="https://www.suse.com/security/cve/CVE-2017-10285/" source="CVE"/>
		<reference ref_id="CVE-2017-10295" ref_url="https://www.suse.com/security/cve/CVE-2017-10295/" source="CVE"/>
		<reference ref_id="CVE-2017-10345" ref_url="https://www.suse.com/security/cve/CVE-2017-10345/" source="CVE"/>
		<reference ref_id="CVE-2017-10346" ref_url="https://www.suse.com/security/cve/CVE-2017-10346/" source="CVE"/>
		<reference ref_id="CVE-2017-10347" ref_url="https://www.suse.com/security/cve/CVE-2017-10347/" source="CVE"/>
		<reference ref_id="CVE-2017-10348" ref_url="https://www.suse.com/security/cve/CVE-2017-10348/" source="CVE"/>
		<reference ref_id="CVE-2017-10349" ref_url="https://www.suse.com/security/cve/CVE-2017-10349/" source="CVE"/>
		<reference ref_id="CVE-2017-10350" ref_url="https://www.suse.com/security/cve/CVE-2017-10350/" source="CVE"/>
		<reference ref_id="CVE-2017-10355" ref_url="https://www.suse.com/security/cve/CVE-2017-10355/" source="CVE"/>
		<reference ref_id="CVE-2017-10356" ref_url="https://www.suse.com/security/cve/CVE-2017-10356/" source="CVE"/>
		<reference ref_id="CVE-2017-10357" ref_url="https://www.suse.com/security/cve/CVE-2017-10357/" source="CVE"/>
		<reference ref_id="CVE-2017-10388" ref_url="https://www.suse.com/security/cve/CVE-2017-10388/" source="CVE"/>
		<reference ref_id="CVE-2017-3231" ref_url="https://www.suse.com/security/cve/CVE-2017-3231/" source="CVE"/>
		<reference ref_id="CVE-2017-3241" ref_url="https://www.suse.com/security/cve/CVE-2017-3241/" source="CVE"/>
		<reference ref_id="CVE-2017-3252" ref_url="https://www.suse.com/security/cve/CVE-2017-3252/" source="CVE"/>
		<reference ref_id="CVE-2017-3253" ref_url="https://www.suse.com/security/cve/CVE-2017-3253/" source="CVE"/>
		<reference ref_id="CVE-2017-3260" ref_url="https://www.suse.com/security/cve/CVE-2017-3260/" source="CVE"/>
		<reference ref_id="CVE-2017-3261" ref_url="https://www.suse.com/security/cve/CVE-2017-3261/" source="CVE"/>
		<reference ref_id="CVE-2017-3272" ref_url="https://www.suse.com/security/cve/CVE-2017-3272/" source="CVE"/>
		<reference ref_id="CVE-2017-3289" ref_url="https://www.suse.com/security/cve/CVE-2017-3289/" source="CVE"/>
		<reference ref_id="CVE-2017-3509" ref_url="https://www.suse.com/security/cve/CVE-2017-3509/" source="CVE"/>
		<reference ref_id="CVE-2017-3511" ref_url="https://www.suse.com/security/cve/CVE-2017-3511/" source="CVE"/>
		<reference ref_id="CVE-2017-3512" ref_url="https://www.suse.com/security/cve/CVE-2017-3512/" source="CVE"/>
		<reference ref_id="CVE-2017-3514" ref_url="https://www.suse.com/security/cve/CVE-2017-3514/" source="CVE"/>
		<reference ref_id="CVE-2017-3526" ref_url="https://www.suse.com/security/cve/CVE-2017-3526/" source="CVE"/>
		<reference ref_id="CVE-2017-3533" ref_url="https://www.suse.com/security/cve/CVE-2017-3533/" source="CVE"/>
		<reference ref_id="CVE-2017-3539" ref_url="https://www.suse.com/security/cve/CVE-2017-3539/" source="CVE"/>
		<reference ref_id="CVE-2017-3544" ref_url="https://www.suse.com/security/cve/CVE-2017-3544/" source="CVE"/>
		<reference ref_id="CVE-2018-11212" ref_url="https://www.suse.com/security/cve/CVE-2018-11212/" source="CVE"/>
		<reference ref_id="CVE-2018-13785" ref_url="https://www.suse.com/security/cve/CVE-2018-13785/" source="CVE"/>
		<reference ref_id="CVE-2018-16435" ref_url="https://www.suse.com/security/cve/CVE-2018-16435/" source="CVE"/>
		<reference ref_id="CVE-2018-2579" ref_url="https://www.suse.com/security/cve/CVE-2018-2579/" source="CVE"/>
		<reference ref_id="CVE-2018-2582" ref_url="https://www.suse.com/security/cve/CVE-2018-2582/" source="CVE"/>
		<reference ref_id="CVE-2018-2588" ref_url="https://www.suse.com/security/cve/CVE-2018-2588/" source="CVE"/>
		<reference ref_id="CVE-2018-2599" ref_url="https://www.suse.com/security/cve/CVE-2018-2599/" source="CVE"/>
		<reference ref_id="CVE-2018-2602" ref_url="https://www.suse.com/security/cve/CVE-2018-2602/" source="CVE"/>
		<reference ref_id="CVE-2018-2603" ref_url="https://www.suse.com/security/cve/CVE-2018-2603/" source="CVE"/>
		<reference ref_id="CVE-2018-2618" ref_url="https://www.suse.com/security/cve/CVE-2018-2618/" source="CVE"/>
		<reference ref_id="CVE-2018-2629" ref_url="https://www.suse.com/security/cve/CVE-2018-2629/" source="CVE"/>
		<reference ref_id="CVE-2018-2633" ref_url="https://www.suse.com/security/cve/CVE-2018-2633/" source="CVE"/>
		<reference ref_id="CVE-2018-2634" ref_url="https://www.suse.com/security/cve/CVE-2018-2634/" source="CVE"/>
		<reference ref_id="CVE-2018-2637" ref_url="https://www.suse.com/security/cve/CVE-2018-2637/" source="CVE"/>
		<reference ref_id="CVE-2018-2641" ref_url="https://www.suse.com/security/cve/CVE-2018-2641/" source="CVE"/>
		<reference ref_id="CVE-2018-2663" ref_url="https://www.suse.com/security/cve/CVE-2018-2663/" source="CVE"/>
		<reference ref_id="CVE-2018-2677" ref_url="https://www.suse.com/security/cve/CVE-2018-2677/" source="CVE"/>
		<reference ref_id="CVE-2018-2678" ref_url="https://www.suse.com/security/cve/CVE-2018-2678/" source="CVE"/>
		<reference ref_id="CVE-2018-2790" ref_url="https://www.suse.com/security/cve/CVE-2018-2790/" source="CVE"/>
		<reference ref_id="CVE-2018-2794" ref_url="https://www.suse.com/security/cve/CVE-2018-2794/" source="CVE"/>
		<reference ref_id="CVE-2018-2795" ref_url="https://www.suse.com/security/cve/CVE-2018-2795/" source="CVE"/>
		<reference ref_id="CVE-2018-2796" ref_url="https://www.suse.com/security/cve/CVE-2018-2796/" source="CVE"/>
		<reference ref_id="CVE-2018-2797" ref_url="https://www.suse.com/security/cve/CVE-2018-2797/" source="CVE"/>
		<reference ref_id="CVE-2018-2798" ref_url="https://www.suse.com/security/cve/CVE-2018-2798/" source="CVE"/>
		<reference ref_id="CVE-2018-2799" ref_url="https://www.suse.com/security/cve/CVE-2018-2799/" source="CVE"/>
		<reference ref_id="CVE-2018-2800" ref_url="https://www.suse.com/security/cve/CVE-2018-2800/" source="CVE"/>
		<reference ref_id="CVE-2018-2814" ref_url="https://www.suse.com/security/cve/CVE-2018-2814/" source="CVE"/>
		<reference ref_id="CVE-2018-2815" ref_url="https://www.suse.com/security/cve/CVE-2018-2815/" source="CVE"/>
		<reference ref_id="CVE-2018-2938" ref_url="https://www.suse.com/security/cve/CVE-2018-2938/" source="CVE"/>
		<reference ref_id="CVE-2018-2940" ref_url="https://www.suse.com/security/cve/CVE-2018-2940/" source="CVE"/>
		<reference ref_id="CVE-2018-2952" ref_url="https://www.suse.com/security/cve/CVE-2018-2952/" source="CVE"/>
		<reference ref_id="CVE-2018-2973" ref_url="https://www.suse.com/security/cve/CVE-2018-2973/" source="CVE"/>
		<reference ref_id="CVE-2018-3136" ref_url="https://www.suse.com/security/cve/CVE-2018-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-3139" ref_url="https://www.suse.com/security/cve/CVE-2018-3139/" source="CVE"/>
		<reference ref_id="CVE-2018-3149" ref_url="https://www.suse.com/security/cve/CVE-2018-3149/" source="CVE"/>
		<reference ref_id="CVE-2018-3169" ref_url="https://www.suse.com/security/cve/CVE-2018-3169/" source="CVE"/>
		<reference ref_id="CVE-2018-3180" ref_url="https://www.suse.com/security/cve/CVE-2018-3180/" source="CVE"/>
		<reference ref_id="CVE-2018-3183" ref_url="https://www.suse.com/security/cve/CVE-2018-3183/" source="CVE"/>
		<reference ref_id="CVE-2018-3214" ref_url="https://www.suse.com/security/cve/CVE-2018-3214/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2019-2422" ref_url="https://www.suse.com/security/cve/CVE-2019-2422/" source="CVE"/>
		<reference ref_id="CVE-2019-2426" ref_url="https://www.suse.com/security/cve/CVE-2019-2426/" source="CVE"/>
		<reference ref_id="CVE-2019-2602" ref_url="https://www.suse.com/security/cve/CVE-2019-2602/" source="CVE"/>
		<reference ref_id="CVE-2019-2684" ref_url="https://www.suse.com/security/cve/CVE-2019-2684/" source="CVE"/>
		<reference ref_id="CVE-2019-2698" ref_url="https://www.suse.com/security/cve/CVE-2019-2698/" source="CVE"/>
		<reference ref_id="CVE-2019-2745" ref_url="https://www.suse.com/security/cve/CVE-2019-2745/" source="CVE"/>
		<reference ref_id="CVE-2019-2762" ref_url="https://www.suse.com/security/cve/CVE-2019-2762/" source="CVE"/>
		<reference ref_id="CVE-2019-2766" ref_url="https://www.suse.com/security/cve/CVE-2019-2766/" source="CVE"/>
		<reference ref_id="CVE-2019-2769" ref_url="https://www.suse.com/security/cve/CVE-2019-2769/" source="CVE"/>
		<reference ref_id="CVE-2019-2786" ref_url="https://www.suse.com/security/cve/CVE-2019-2786/" source="CVE"/>
		<reference ref_id="CVE-2019-2816" ref_url="https://www.suse.com/security/cve/CVE-2019-2816/" source="CVE"/>
		<reference ref_id="CVE-2019-2842" ref_url="https://www.suse.com/security/cve/CVE-2019-2842/" source="CVE"/>
		<reference ref_id="CVE-2019-2894" ref_url="https://www.suse.com/security/cve/CVE-2019-2894/" source="CVE"/>
		<reference ref_id="CVE-2019-2933" ref_url="https://www.suse.com/security/cve/CVE-2019-2933/" source="CVE"/>
		<reference ref_id="CVE-2019-2945" ref_url="https://www.suse.com/security/cve/CVE-2019-2945/" source="CVE"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2019-2958" ref_url="https://www.suse.com/security/cve/CVE-2019-2958/" source="CVE"/>
		<reference ref_id="CVE-2019-2962" ref_url="https://www.suse.com/security/cve/CVE-2019-2962/" source="CVE"/>
		<reference ref_id="CVE-2019-2964" ref_url="https://www.suse.com/security/cve/CVE-2019-2964/" source="CVE"/>
		<reference ref_id="CVE-2019-2973" ref_url="https://www.suse.com/security/cve/CVE-2019-2973/" source="CVE"/>
		<reference ref_id="CVE-2019-2975" ref_url="https://www.suse.com/security/cve/CVE-2019-2975/" source="CVE"/>
		<reference ref_id="CVE-2019-2978" ref_url="https://www.suse.com/security/cve/CVE-2019-2978/" source="CVE"/>
		<reference ref_id="CVE-2019-2981" ref_url="https://www.suse.com/security/cve/CVE-2019-2981/" source="CVE"/>
		<reference ref_id="CVE-2019-2983" ref_url="https://www.suse.com/security/cve/CVE-2019-2983/" source="CVE"/>
		<reference ref_id="CVE-2019-2987" ref_url="https://www.suse.com/security/cve/CVE-2019-2987/" source="CVE"/>
		<reference ref_id="CVE-2019-2988" ref_url="https://www.suse.com/security/cve/CVE-2019-2988/" source="CVE"/>
		<reference ref_id="CVE-2019-2989" ref_url="https://www.suse.com/security/cve/CVE-2019-2989/" source="CVE"/>
		<reference ref_id="CVE-2019-2992" ref_url="https://www.suse.com/security/cve/CVE-2019-2992/" source="CVE"/>
		<reference ref_id="CVE-2019-2999" ref_url="https://www.suse.com/security/cve/CVE-2019-2999/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2020-2583" ref_url="https://www.suse.com/security/cve/CVE-2020-2583/" source="CVE"/>
		<reference ref_id="CVE-2020-2590" ref_url="https://www.suse.com/security/cve/CVE-2020-2590/" source="CVE"/>
		<reference ref_id="CVE-2020-2593" ref_url="https://www.suse.com/security/cve/CVE-2020-2593/" source="CVE"/>
		<reference ref_id="CVE-2020-2601" ref_url="https://www.suse.com/security/cve/CVE-2020-2601/" source="CVE"/>
		<reference ref_id="CVE-2020-2604" ref_url="https://www.suse.com/security/cve/CVE-2020-2604/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2659" ref_url="https://www.suse.com/security/cve/CVE-2020-2659/" source="CVE"/>
		<description>
These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.242-3.30.2 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2590/">CVE-2015-2590</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2597/">CVE-2015-2597</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2601/">CVE-2015-2601</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2613/">CVE-2015-2613</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2619/">CVE-2015-2619</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2621/">CVE-2015-2621</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2625/">CVE-2015-2625</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2627/">CVE-2015-2627</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2628/">CVE-2015-2628</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2632/">CVE-2015-2632</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2637/">CVE-2015-2637</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2638/">CVE-2015-2638</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2659/">CVE-2015-2659</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2664/">CVE-2015-2664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2808/">CVE-2015-2808</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4729/">CVE-2015-4729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4731/">CVE-2015-4731</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4732/">CVE-2015-4732</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4733/">CVE-2015-4733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4734/">CVE-2015-4734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4736/">CVE-2015-4736</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4748/">CVE-2015-4748</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4749/">CVE-2015-4749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4760/">CVE-2015-4760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4803/">CVE-2015-4803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4805/">CVE-2015-4805</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4806/">CVE-2015-4806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4810/">CVE-2015-4810</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4835/">CVE-2015-4835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4840/">CVE-2015-4840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4842/">CVE-2015-4842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4843/">CVE-2015-4843</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4844/">CVE-2015-4844</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4860/">CVE-2015-4860</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4868/">CVE-2015-4868</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4872/">CVE-2015-4872</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4881/">CVE-2015-4881</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4882/">CVE-2015-4882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4883/">CVE-2015-4883</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4893/">CVE-2015-4893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4901/">CVE-2015-4901</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4902/">CVE-2015-4902</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4903/">CVE-2015-4903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4906/">CVE-2015-4906</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4908/">CVE-2015-4908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4911/">CVE-2015-4911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4916/">CVE-2015-4916</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8126/">CVE-2015-8126</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0402/">CVE-2016-0402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0448/">CVE-2016-0448</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0466/">CVE-2016-0466</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0475/">CVE-2016-0475</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0483/">CVE-2016-0483</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0494/">CVE-2016-0494</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0636/">CVE-2016-0636</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0686/">CVE-2016-0686</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0687/">CVE-2016-0687</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0695/">CVE-2016-0695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10165/">CVE-2016-10165</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3425/">CVE-2016-3425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3426/">CVE-2016-3426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3427/">CVE-2016-3427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3458/">CVE-2016-3458</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3485/">CVE-2016-3485</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3498/">CVE-2016-3498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3500/">CVE-2016-3500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3503/">CVE-2016-3503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3508/">CVE-2016-3508</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3511/">CVE-2016-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3550/">CVE-2016-3550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3552/">CVE-2016-3552</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3587/">CVE-2016-3587</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3598/">CVE-2016-3598</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-3606/">CVE-2016-3606</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3610/">CVE-2016-3610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5542/">CVE-2016-5542</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5546/">CVE-2016-5546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5547/">CVE-2016-5547</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5548/">CVE-2016-5548</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5549/">CVE-2016-5549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5552/">CVE-2016-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5554/">CVE-2016-5554</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5556/">CVE-2016-5556</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5568/">CVE-2016-5568</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5573/">CVE-2016-5573</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-5582/">CVE-2016-5582</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5597/">CVE-2016-5597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9840/">CVE-2016-9840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9841/">CVE-2016-9841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9842/">CVE-2016-9842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10053/">CVE-2017-10053</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10067/">CVE-2017-10067</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10074/">CVE-2017-10074</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10078/">CVE-2017-10078</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10081/">CVE-2017-10081</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10086/">CVE-2017-10086</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10087/">CVE-2017-10087</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10089/">CVE-2017-10089</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10090/">CVE-2017-10090</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10096/">CVE-2017-10096</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10101/">CVE-2017-10101</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10102/">CVE-2017-10102</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10105/">CVE-2017-10105</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10107/">CVE-2017-10107</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10108/">CVE-2017-10108</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10109/">CVE-2017-10109</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10110/">CVE-2017-10110</cve>
	<cve impact="important" cvss3="9.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10111/">CVE-2017-10111</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10114/">CVE-2017-10114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-10115/">CVE-2017-10115</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10116/">CVE-2017-10116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10118/">CVE-2017-10118</cve>
	<cve impact="moderate" cvss3="7.1/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10125/">CVE-2017-10125</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10135/">CVE-2017-10135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10176/">CVE-2017-10176</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10193/">CVE-2017-10193</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10198/">CVE-2017-10198</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10243/">CVE-2017-10243</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10274/">CVE-2017-10274</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10281/">CVE-2017-10281</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10285/">CVE-2017-10285</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-10295/">CVE-2017-10295</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10345/">CVE-2017-10345</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10346/">CVE-2017-10346</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10347/">CVE-2017-10347</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10348/">CVE-2017-10348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10349/">CVE-2017-10349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10350/">CVE-2017-10350</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10355/">CVE-2017-10355</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10356/">CVE-2017-10356</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10357/">CVE-2017-10357</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-10388/">CVE-2017-10388</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3231/">CVE-2017-3231</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3241/">CVE-2017-3241</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3252/">CVE-2017-3252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3253/">CVE-2017-3253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3260/">CVE-2017-3260</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3261/">CVE-2017-3261</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3272/">CVE-2017-3272</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-3289/">CVE-2017-3289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3509/">CVE-2017-3509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3511/">CVE-2017-3511</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3512/">CVE-2017-3512</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3514/">CVE-2017-3514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3526/">CVE-2017-3526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3533/">CVE-2017-3533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3539/">CVE-2017-3539</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3544/">CVE-2017-3544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11212/">CVE-2018-11212</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13785/">CVE-2018-13785</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16435/">CVE-2018-16435</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2579/">CVE-2018-2579</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2582/">CVE-2018-2582</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2588/">CVE-2018-2588</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2599/">CVE-2018-2599</cve>
	<cve impact="moderate" cvss3="4.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-2602/">CVE-2018-2602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2603/">CVE-2018-2603</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2618/">CVE-2018-2618</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2629/">CVE-2018-2629</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2633/">CVE-2018-2633</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2634/">CVE-2018-2634</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2637/">CVE-2018-2637</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2641/">CVE-2018-2641</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2663/">CVE-2018-2663</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2677/">CVE-2018-2677</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2678/">CVE-2018-2678</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2790/">CVE-2018-2790</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2794/">CVE-2018-2794</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2795/">CVE-2018-2795</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2796/">CVE-2018-2796</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2797/">CVE-2018-2797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2798/">CVE-2018-2798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2799/">CVE-2018-2799</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-2800/">CVE-2018-2800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2814/">CVE-2018-2814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-2815/">CVE-2018-2815</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2938/">CVE-2018-2938</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2940/">CVE-2018-2940</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-2952/">CVE-2018-2952</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-2973/">CVE-2018-2973</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3136/">CVE-2018-3136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3139/">CVE-2018-3139</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3149/">CVE-2018-3149</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3169/">CVE-2018-3169</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-3180/">CVE-2018-3180</cve>
	<cve impact="important" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3183/">CVE-2018-3183</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-3214/">CVE-2018-3214</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2422/">CVE-2019-2422</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2426/">CVE-2019-2426</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2602/">CVE-2019-2602</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2684/">CVE-2019-2684</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-2698/">CVE-2019-2698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2745/">CVE-2019-2745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2762/">CVE-2019-2762</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2766/">CVE-2019-2766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2769/">CVE-2019-2769</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2786/">CVE-2019-2786</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2816/">CVE-2019-2816</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2842/">CVE-2019-2842</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2894/">CVE-2019-2894</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2933/">CVE-2019-2933</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2945/">CVE-2019-2945</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2958/">CVE-2019-2958</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2962/">CVE-2019-2962</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2964/">CVE-2019-2964</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2973/">CVE-2019-2973</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-2975/">CVE-2019-2975</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2978/">CVE-2019-2978</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2981/">CVE-2019-2981</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2983/">CVE-2019-2983</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2987/">CVE-2019-2987</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2988/">CVE-2019-2988</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-2989/">CVE-2019-2989</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-2992/">CVE-2019-2992</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-2999/">CVE-2019-2999</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2583/">CVE-2020-2583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2590/">CVE-2020-2590</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2593/">CVE-2020-2593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2601/">CVE-2020-2601</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2604/">CVE-2020-2604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2659/">CVE-2020-2659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488066" comment="java-1_8_0-openjdk-1.8.0.242-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488067" comment="java-1_8_0-openjdk-demo-1.8.0.242-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488068" comment="java-1_8_0-openjdk-devel-1.8.0.242-3.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488069" comment="java-1_8_0-openjdk-headless-1.8.0.242-3.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109857" version="1" class="patch">
	<metadata>
		<title>libcgroup-devel-0.41.rc1-1.10.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14348" ref_url="https://www.suse.com/security/cve/CVE-2018-14348/" source="CVE"/>
		<description>
These are all security issues fixed in the libcgroup-devel-0.41.rc1-1.10.1 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14348/">CVE-2018-14348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488070" comment="libcgroup-devel-0.41.rc1-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488071" comment="libcgroup-tools-0.41.rc1-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488072" comment="libcgroup1-0.41.rc1-1.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488073" comment="libcgroup1-32bit-0.41.rc1-1.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109858" version="1" class="patch">
	<metadata>
		<title>libncurses5-32bit-6.1-5.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19211" ref_url="https://www.suse.com/security/cve/CVE-2018-19211/" source="CVE"/>
		<reference ref_id="CVE-2019-17594" ref_url="https://www.suse.com/security/cve/CVE-2019-17594/" source="CVE"/>
		<reference ref_id="CVE-2019-17595" ref_url="https://www.suse.com/security/cve/CVE-2019-17595/" source="CVE"/>
		<description>
These are all security issues fixed in the libncurses5-32bit-6.1-5.6.2 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19211/">CVE-2018-19211</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17594/">CVE-2019-17594</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17595/">CVE-2019-17595</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488074" comment="libncurses5-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488075" comment="libncurses5-32bit-6.1-5.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488076" comment="ncurses5-devel-6.1-5.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109859" version="1" class="patch">
	<metadata>
		<title>libopenssl-1_0_0-devel-1.0.2p-3.25.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3513" ref_url="https://www.suse.com/security/cve/CVE-2014-3513/" source="CVE"/>
		<reference ref_id="CVE-2014-3567" ref_url="https://www.suse.com/security/cve/CVE-2014-3567/" source="CVE"/>
		<reference ref_id="CVE-2014-3568" ref_url="https://www.suse.com/security/cve/CVE-2014-3568/" source="CVE"/>
		<reference ref_id="CVE-2014-3569" ref_url="https://www.suse.com/security/cve/CVE-2014-3569/" source="CVE"/>
		<reference ref_id="CVE-2014-3570" ref_url="https://www.suse.com/security/cve/CVE-2014-3570/" source="CVE"/>
		<reference ref_id="CVE-2014-3571" ref_url="https://www.suse.com/security/cve/CVE-2014-3571/" source="CVE"/>
		<reference ref_id="CVE-2014-3572" ref_url="https://www.suse.com/security/cve/CVE-2014-3572/" source="CVE"/>
		<reference ref_id="CVE-2014-8275" ref_url="https://www.suse.com/security/cve/CVE-2014-8275/" source="CVE"/>
		<reference ref_id="CVE-2015-0204" ref_url="https://www.suse.com/security/cve/CVE-2015-0204/" source="CVE"/>
		<reference ref_id="CVE-2015-0205" ref_url="https://www.suse.com/security/cve/CVE-2015-0205/" source="CVE"/>
		<reference ref_id="CVE-2015-0206" ref_url="https://www.suse.com/security/cve/CVE-2015-0206/" source="CVE"/>
		<reference ref_id="CVE-2015-0209" ref_url="https://www.suse.com/security/cve/CVE-2015-0209/" source="CVE"/>
		<reference ref_id="CVE-2015-0286" ref_url="https://www.suse.com/security/cve/CVE-2015-0286/" source="CVE"/>
		<reference ref_id="CVE-2015-0287" ref_url="https://www.suse.com/security/cve/CVE-2015-0287/" source="CVE"/>
		<reference ref_id="CVE-2015-0288" ref_url="https://www.suse.com/security/cve/CVE-2015-0288/" source="CVE"/>
		<reference ref_id="CVE-2015-0289" ref_url="https://www.suse.com/security/cve/CVE-2015-0289/" source="CVE"/>
		<reference ref_id="CVE-2015-0293" ref_url="https://www.suse.com/security/cve/CVE-2015-0293/" source="CVE"/>
		<reference ref_id="CVE-2015-1788" ref_url="https://www.suse.com/security/cve/CVE-2015-1788/" source="CVE"/>
		<reference ref_id="CVE-2015-1789" ref_url="https://www.suse.com/security/cve/CVE-2015-1789/" source="CVE"/>
		<reference ref_id="CVE-2015-1790" ref_url="https://www.suse.com/security/cve/CVE-2015-1790/" source="CVE"/>
		<reference ref_id="CVE-2015-1791" ref_url="https://www.suse.com/security/cve/CVE-2015-1791/" source="CVE"/>
		<reference ref_id="CVE-2015-1792" ref_url="https://www.suse.com/security/cve/CVE-2015-1792/" source="CVE"/>
		<reference ref_id="CVE-2015-1793" ref_url="https://www.suse.com/security/cve/CVE-2015-1793/" source="CVE"/>
		<reference ref_id="CVE-2015-1794" ref_url="https://www.suse.com/security/cve/CVE-2015-1794/" source="CVE"/>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-3195" ref_url="https://www.suse.com/security/cve/CVE-2015-3195/" source="CVE"/>
		<reference ref_id="CVE-2015-3196" ref_url="https://www.suse.com/security/cve/CVE-2015-3196/" source="CVE"/>
		<reference ref_id="CVE-2015-3197" ref_url="https://www.suse.com/security/cve/CVE-2015-3197/" source="CVE"/>
		<reference ref_id="CVE-2016-0701" ref_url="https://www.suse.com/security/cve/CVE-2016-0701/" source="CVE"/>
		<reference ref_id="CVE-2016-0702" ref_url="https://www.suse.com/security/cve/CVE-2016-0702/" source="CVE"/>
		<reference ref_id="CVE-2016-0705" ref_url="https://www.suse.com/security/cve/CVE-2016-0705/" source="CVE"/>
		<reference ref_id="CVE-2016-0797" ref_url="https://www.suse.com/security/cve/CVE-2016-0797/" source="CVE"/>
		<reference ref_id="CVE-2016-0798" ref_url="https://www.suse.com/security/cve/CVE-2016-0798/" source="CVE"/>
		<reference ref_id="CVE-2016-0800" ref_url="https://www.suse.com/security/cve/CVE-2016-0800/" source="CVE"/>
		<reference ref_id="CVE-2016-2105" ref_url="https://www.suse.com/security/cve/CVE-2016-2105/" source="CVE"/>
		<reference ref_id="CVE-2016-2106" ref_url="https://www.suse.com/security/cve/CVE-2016-2106/" source="CVE"/>
		<reference ref_id="CVE-2016-2107" ref_url="https://www.suse.com/security/cve/CVE-2016-2107/" source="CVE"/>
		<reference ref_id="CVE-2016-2109" ref_url="https://www.suse.com/security/cve/CVE-2016-2109/" source="CVE"/>
		<reference ref_id="CVE-2016-2176" ref_url="https://www.suse.com/security/cve/CVE-2016-2176/" source="CVE"/>
		<reference ref_id="CVE-2016-2177" ref_url="https://www.suse.com/security/cve/CVE-2016-2177/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2179" ref_url="https://www.suse.com/security/cve/CVE-2016-2179/" source="CVE"/>
		<reference ref_id="CVE-2016-2180" ref_url="https://www.suse.com/security/cve/CVE-2016-2180/" source="CVE"/>
		<reference ref_id="CVE-2016-2181" ref_url="https://www.suse.com/security/cve/CVE-2016-2181/" source="CVE"/>
		<reference ref_id="CVE-2016-2182" ref_url="https://www.suse.com/security/cve/CVE-2016-2182/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-6302" ref_url="https://www.suse.com/security/cve/CVE-2016-6302/" source="CVE"/>
		<reference ref_id="CVE-2016-6303" ref_url="https://www.suse.com/security/cve/CVE-2016-6303/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7055" ref_url="https://www.suse.com/security/cve/CVE-2016-7055/" source="CVE"/>
		<reference ref_id="CVE-2016-7056" ref_url="https://www.suse.com/security/cve/CVE-2016-7056/" source="CVE"/>
		<reference ref_id="CVE-2017-3731" ref_url="https://www.suse.com/security/cve/CVE-2017-3731/" source="CVE"/>
		<reference ref_id="CVE-2017-3732" ref_url="https://www.suse.com/security/cve/CVE-2017-3732/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3737" ref_url="https://www.suse.com/security/cve/CVE-2017-3737/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0737" ref_url="https://www.suse.com/security/cve/CVE-2018-0737/" source="CVE"/>
		<reference ref_id="CVE-2018-5407" ref_url="https://www.suse.com/security/cve/CVE-2018-5407/" source="CVE"/>
		<reference ref_id="CVE-2019-1547" ref_url="https://www.suse.com/security/cve/CVE-2019-1547/" source="CVE"/>
		<reference ref_id="CVE-2019-1551" ref_url="https://www.suse.com/security/cve/CVE-2019-1551/" source="CVE"/>
		<reference ref_id="CVE-2019-1559" ref_url="https://www.suse.com/security/cve/CVE-2019-1559/" source="CVE"/>
		<reference ref_id="CVE-2019-1563" ref_url="https://www.suse.com/security/cve/CVE-2019-1563/" source="CVE"/>
		<description>
These are all security issues fixed in the libopenssl-1_0_0-devel-1.0.2p-3.25.1 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2014-3513/">CVE-2014-3513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3567/">CVE-2014-3567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3568/">CVE-2014-3568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3569/">CVE-2014-3569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3570/">CVE-2014-3570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3571/">CVE-2014-3571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3572/">CVE-2014-3572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8275/">CVE-2014-8275</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0204/">CVE-2015-0204</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0205/">CVE-2015-0205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0206/">CVE-2015-0206</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0209/">CVE-2015-0209</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0286/">CVE-2015-0286</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0287/">CVE-2015-0287</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0288/">CVE-2015-0288</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0289/">CVE-2015-0289</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-0293/">CVE-2015-0293</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1788/">CVE-2015-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1789/">CVE-2015-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1790/">CVE-2015-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1791/">CVE-2015-1791</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1792/">CVE-2015-1792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1793/">CVE-2015-1793</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1794/">CVE-2015-1794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3195/">CVE-2015-3195</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3196/">CVE-2015-3196</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3197/">CVE-2015-3197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0701/">CVE-2016-0701</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0702/">CVE-2016-0702</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0705/">CVE-2016-0705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0797/">CVE-2016-0797</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0798/">CVE-2016-0798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0800/">CVE-2016-0800</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2105/">CVE-2016-2105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2106/">CVE-2016-2106</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2107/">CVE-2016-2107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2109/">CVE-2016-2109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2176/">CVE-2016-2176</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2177/">CVE-2016-2177</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2179/">CVE-2016-2179</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2180/">CVE-2016-2180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2181/">CVE-2016-2181</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2182/">CVE-2016-2182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6302/">CVE-2016-6302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6303/">CVE-2016-6303</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7055/">CVE-2016-7055</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7056/">CVE-2016-7056</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3731/">CVE-2017-3731</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3732/">CVE-2017-3732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3737/">CVE-2017-3737</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0737/">CVE-2018-0737</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-5407/">CVE-2018-5407</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1547/">CVE-2019-1547</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1551/">CVE-2019-1551</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1559/">CVE-2019-1559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1563/">CVE-2019-1563</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488077" comment="libopenssl-1_0_0-devel-1.0.2p-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488078" comment="libopenssl1_0_0-1.0.2p-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488079" comment="openssl-1_0_0-1.0.2p-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109860" version="1" class="patch">
	<metadata>
		<title>ntp-4.2.8p13-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-0159" ref_url="https://www.suse.com/security/cve/CVE-2009-0159/" source="CVE"/>
		<reference ref_id="CVE-2009-1252" ref_url="https://www.suse.com/security/cve/CVE-2009-1252/" source="CVE"/>
		<reference ref_id="CVE-2013-5211" ref_url="https://www.suse.com/security/cve/CVE-2013-5211/" source="CVE"/>
		<reference ref_id="CVE-2014-9293" ref_url="https://www.suse.com/security/cve/CVE-2014-9293/" source="CVE"/>
		<reference ref_id="CVE-2014-9294" ref_url="https://www.suse.com/security/cve/CVE-2014-9294/" source="CVE"/>
		<reference ref_id="CVE-2014-9295" ref_url="https://www.suse.com/security/cve/CVE-2014-9295/" source="CVE"/>
		<reference ref_id="CVE-2014-9296" ref_url="https://www.suse.com/security/cve/CVE-2014-9296/" source="CVE"/>
		<reference ref_id="CVE-2014-9297" ref_url="https://www.suse.com/security/cve/CVE-2014-9297/" source="CVE"/>
		<reference ref_id="CVE-2014-9298" ref_url="https://www.suse.com/security/cve/CVE-2014-9298/" source="CVE"/>
		<reference ref_id="CVE-2015-1798" ref_url="https://www.suse.com/security/cve/CVE-2015-1798/" source="CVE"/>
		<reference ref_id="CVE-2015-1799" ref_url="https://www.suse.com/security/cve/CVE-2015-1799/" source="CVE"/>
		<reference ref_id="CVE-2015-5300" ref_url="https://www.suse.com/security/cve/CVE-2015-5300/" source="CVE"/>
		<reference ref_id="CVE-2015-7691" ref_url="https://www.suse.com/security/cve/CVE-2015-7691/" source="CVE"/>
		<reference ref_id="CVE-2015-7692" ref_url="https://www.suse.com/security/cve/CVE-2015-7692/" source="CVE"/>
		<reference ref_id="CVE-2015-7701" ref_url="https://www.suse.com/security/cve/CVE-2015-7701/" source="CVE"/>
		<reference ref_id="CVE-2015-7702" ref_url="https://www.suse.com/security/cve/CVE-2015-7702/" source="CVE"/>
		<reference ref_id="CVE-2015-7703" ref_url="https://www.suse.com/security/cve/CVE-2015-7703/" source="CVE"/>
		<reference ref_id="CVE-2015-7704" ref_url="https://www.suse.com/security/cve/CVE-2015-7704/" source="CVE"/>
		<reference ref_id="CVE-2015-7705" ref_url="https://www.suse.com/security/cve/CVE-2015-7705/" source="CVE"/>
		<reference ref_id="CVE-2015-7848" ref_url="https://www.suse.com/security/cve/CVE-2015-7848/" source="CVE"/>
		<reference ref_id="CVE-2015-7849" ref_url="https://www.suse.com/security/cve/CVE-2015-7849/" source="CVE"/>
		<reference ref_id="CVE-2015-7850" ref_url="https://www.suse.com/security/cve/CVE-2015-7850/" source="CVE"/>
		<reference ref_id="CVE-2015-7851" ref_url="https://www.suse.com/security/cve/CVE-2015-7851/" source="CVE"/>
		<reference ref_id="CVE-2015-7852" ref_url="https://www.suse.com/security/cve/CVE-2015-7852/" source="CVE"/>
		<reference ref_id="CVE-2015-7853" ref_url="https://www.suse.com/security/cve/CVE-2015-7853/" source="CVE"/>
		<reference ref_id="CVE-2015-7854" ref_url="https://www.suse.com/security/cve/CVE-2015-7854/" source="CVE"/>
		<reference ref_id="CVE-2015-7855" ref_url="https://www.suse.com/security/cve/CVE-2015-7855/" source="CVE"/>
		<reference ref_id="CVE-2015-7871" ref_url="https://www.suse.com/security/cve/CVE-2015-7871/" source="CVE"/>
		<reference ref_id="CVE-2015-7973" ref_url="https://www.suse.com/security/cve/CVE-2015-7973/" source="CVE"/>
		<reference ref_id="CVE-2015-7974" ref_url="https://www.suse.com/security/cve/CVE-2015-7974/" source="CVE"/>
		<reference ref_id="CVE-2015-7975" ref_url="https://www.suse.com/security/cve/CVE-2015-7975/" source="CVE"/>
		<reference ref_id="CVE-2015-7976" ref_url="https://www.suse.com/security/cve/CVE-2015-7976/" source="CVE"/>
		<reference ref_id="CVE-2015-7977" ref_url="https://www.suse.com/security/cve/CVE-2015-7977/" source="CVE"/>
		<reference ref_id="CVE-2015-7978" ref_url="https://www.suse.com/security/cve/CVE-2015-7978/" source="CVE"/>
		<reference ref_id="CVE-2015-7979" ref_url="https://www.suse.com/security/cve/CVE-2015-7979/" source="CVE"/>
		<reference ref_id="CVE-2015-8138" ref_url="https://www.suse.com/security/cve/CVE-2015-8138/" source="CVE"/>
		<reference ref_id="CVE-2015-8158" ref_url="https://www.suse.com/security/cve/CVE-2015-8158/" source="CVE"/>
		<reference ref_id="CVE-2016-1547" ref_url="https://www.suse.com/security/cve/CVE-2016-1547/" source="CVE"/>
		<reference ref_id="CVE-2016-1548" ref_url="https://www.suse.com/security/cve/CVE-2016-1548/" source="CVE"/>
		<reference ref_id="CVE-2016-1549" ref_url="https://www.suse.com/security/cve/CVE-2016-1549/" source="CVE"/>
		<reference ref_id="CVE-2016-1550" ref_url="https://www.suse.com/security/cve/CVE-2016-1550/" source="CVE"/>
		<reference ref_id="CVE-2016-1551" ref_url="https://www.suse.com/security/cve/CVE-2016-1551/" source="CVE"/>
		<reference ref_id="CVE-2016-2516" ref_url="https://www.suse.com/security/cve/CVE-2016-2516/" source="CVE"/>
		<reference ref_id="CVE-2016-2517" ref_url="https://www.suse.com/security/cve/CVE-2016-2517/" source="CVE"/>
		<reference ref_id="CVE-2016-2518" ref_url="https://www.suse.com/security/cve/CVE-2016-2518/" source="CVE"/>
		<reference ref_id="CVE-2016-2519" ref_url="https://www.suse.com/security/cve/CVE-2016-2519/" source="CVE"/>
		<reference ref_id="CVE-2016-4953" ref_url="https://www.suse.com/security/cve/CVE-2016-4953/" source="CVE"/>
		<reference ref_id="CVE-2016-4954" ref_url="https://www.suse.com/security/cve/CVE-2016-4954/" source="CVE"/>
		<reference ref_id="CVE-2016-4955" ref_url="https://www.suse.com/security/cve/CVE-2016-4955/" source="CVE"/>
		<reference ref_id="CVE-2016-4956" ref_url="https://www.suse.com/security/cve/CVE-2016-4956/" source="CVE"/>
		<reference ref_id="CVE-2016-4957" ref_url="https://www.suse.com/security/cve/CVE-2016-4957/" source="CVE"/>
		<reference ref_id="CVE-2016-7426" ref_url="https://www.suse.com/security/cve/CVE-2016-7426/" source="CVE"/>
		<reference ref_id="CVE-2016-7427" ref_url="https://www.suse.com/security/cve/CVE-2016-7427/" source="CVE"/>
		<reference ref_id="CVE-2016-7428" ref_url="https://www.suse.com/security/cve/CVE-2016-7428/" source="CVE"/>
		<reference ref_id="CVE-2016-7429" ref_url="https://www.suse.com/security/cve/CVE-2016-7429/" source="CVE"/>
		<reference ref_id="CVE-2016-7431" ref_url="https://www.suse.com/security/cve/CVE-2016-7431/" source="CVE"/>
		<reference ref_id="CVE-2016-7433" ref_url="https://www.suse.com/security/cve/CVE-2016-7433/" source="CVE"/>
		<reference ref_id="CVE-2016-7434" ref_url="https://www.suse.com/security/cve/CVE-2016-7434/" source="CVE"/>
		<reference ref_id="CVE-2016-9042" ref_url="https://www.suse.com/security/cve/CVE-2016-9042/" source="CVE"/>
		<reference ref_id="CVE-2016-9310" ref_url="https://www.suse.com/security/cve/CVE-2016-9310/" source="CVE"/>
		<reference ref_id="CVE-2016-9311" ref_url="https://www.suse.com/security/cve/CVE-2016-9311/" source="CVE"/>
		<reference ref_id="CVE-2017-6451" ref_url="https://www.suse.com/security/cve/CVE-2017-6451/" source="CVE"/>
		<reference ref_id="CVE-2017-6458" ref_url="https://www.suse.com/security/cve/CVE-2017-6458/" source="CVE"/>
		<reference ref_id="CVE-2017-6460" ref_url="https://www.suse.com/security/cve/CVE-2017-6460/" source="CVE"/>
		<reference ref_id="CVE-2017-6462" ref_url="https://www.suse.com/security/cve/CVE-2017-6462/" source="CVE"/>
		<reference ref_id="CVE-2017-6463" ref_url="https://www.suse.com/security/cve/CVE-2017-6463/" source="CVE"/>
		<reference ref_id="CVE-2017-6464" ref_url="https://www.suse.com/security/cve/CVE-2017-6464/" source="CVE"/>
		<reference ref_id="CVE-2018-12327" ref_url="https://www.suse.com/security/cve/CVE-2018-12327/" source="CVE"/>
		<reference ref_id="CVE-2018-7170" ref_url="https://www.suse.com/security/cve/CVE-2018-7170/" source="CVE"/>
		<reference ref_id="CVE-2018-7182" ref_url="https://www.suse.com/security/cve/CVE-2018-7182/" source="CVE"/>
		<reference ref_id="CVE-2018-7183" ref_url="https://www.suse.com/security/cve/CVE-2018-7183/" source="CVE"/>
		<reference ref_id="CVE-2018-7184" ref_url="https://www.suse.com/security/cve/CVE-2018-7184/" source="CVE"/>
		<reference ref_id="CVE-2018-7185" ref_url="https://www.suse.com/security/cve/CVE-2018-7185/" source="CVE"/>
		<reference ref_id="CVE-2019-8936" ref_url="https://www.suse.com/security/cve/CVE-2019-8936/" source="CVE"/>
		<description>
These are all security issues fixed in the ntp-4.2.8p13-4.6.1 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0159/">CVE-2009-0159</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1252/">CVE-2009-1252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-5211/">CVE-2013-5211</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9293/">CVE-2014-9293</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9294/">CVE-2014-9294</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9295/">CVE-2014-9295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9296/">CVE-2014-9296</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9297/">CVE-2014-9297</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-9298/">CVE-2014-9298</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1798/">CVE-2015-1798</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-1799/">CVE-2015-1799</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5300/">CVE-2015-5300</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7691/">CVE-2015-7691</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7692/">CVE-2015-7692</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7701/">CVE-2015-7701</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7702/">CVE-2015-7702</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7703/">CVE-2015-7703</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7704/">CVE-2015-7704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7705/">CVE-2015-7705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7848/">CVE-2015-7848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7849/">CVE-2015-7849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7850/">CVE-2015-7850</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7851/">CVE-2015-7851</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7852/">CVE-2015-7852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7853/">CVE-2015-7853</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7854/">CVE-2015-7854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7855/">CVE-2015-7855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7871/">CVE-2015-7871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7973/">CVE-2015-7973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7974/">CVE-2015-7974</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7975/">CVE-2015-7975</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7976/">CVE-2015-7976</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7977/">CVE-2015-7977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7978/">CVE-2015-7978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7979/">CVE-2015-7979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8138/">CVE-2015-8138</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8158/">CVE-2015-8158</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1547/">CVE-2016-1547</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1548/">CVE-2016-1548</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1549/">CVE-2016-1549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1550/">CVE-2016-1550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1551/">CVE-2016-1551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2516/">CVE-2016-2516</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2517/">CVE-2016-2517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2518/">CVE-2016-2518</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2519/">CVE-2016-2519</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4953/">CVE-2016-4953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4954/">CVE-2016-4954</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4955/">CVE-2016-4955</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4956/">CVE-2016-4956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4957/">CVE-2016-4957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7426/">CVE-2016-7426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7427/">CVE-2016-7427</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7428/">CVE-2016-7428</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7429/">CVE-2016-7429</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7431/">CVE-2016-7431</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7433/">CVE-2016-7433</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7434/">CVE-2016-7434</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9042/">CVE-2016-9042</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9310/">CVE-2016-9310</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9311/">CVE-2016-9311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6451/">CVE-2017-6451</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6458/">CVE-2017-6458</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6460/">CVE-2017-6460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6462/">CVE-2017-6462</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6463/">CVE-2017-6463</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6464/">CVE-2017-6464</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12327/">CVE-2018-12327</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-7170/">CVE-2018-7170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-7182/">CVE-2018-7182</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-7183/">CVE-2018-7183</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7184/">CVE-2018-7184</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7185/">CVE-2018-7185</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-8936/">CVE-2019-8936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488057" comment="ntp-4.2.8p13-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109861" version="1" class="patch">
	<metadata>
		<title>openldap2-back-meta-2.4.46-9.28.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1545" ref_url="https://www.suse.com/security/cve/CVE-2015-1545/" source="CVE"/>
		<reference ref_id="CVE-2015-1546" ref_url="https://www.suse.com/security/cve/CVE-2015-1546/" source="CVE"/>
		<reference ref_id="CVE-2015-6908" ref_url="https://www.suse.com/security/cve/CVE-2015-6908/" source="CVE"/>
		<reference ref_id="CVE-2017-17740" ref_url="https://www.suse.com/security/cve/CVE-2017-17740/" source="CVE"/>
		<reference ref_id="CVE-2019-13057" ref_url="https://www.suse.com/security/cve/CVE-2019-13057/" source="CVE"/>
		<reference ref_id="CVE-2019-13565" ref_url="https://www.suse.com/security/cve/CVE-2019-13565/" source="CVE"/>
		<reference ref_id="CVE-2020-12243" ref_url="https://www.suse.com/security/cve/CVE-2020-12243/" source="CVE"/>
		<description>
These are all security issues fixed in the openldap2-back-meta-2.4.46-9.28.2 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1545/">CVE-2015-1545</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1546/">CVE-2015-1546</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-6908/">CVE-2015-6908</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17740/">CVE-2017-17740</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13057/">CVE-2019-13057</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13565/">CVE-2019-13565</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12243/">CVE-2020-12243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488080" comment="openldap2-back-meta-2.4.46-9.28.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488081" comment="openldap2-back-perl-2.4.46-9.28.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109862" version="1" class="patch">
	<metadata>
		<title>pam-modules-12.1-3.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2011-3172" ref_url="https://www.suse.com/security/cve/CVE-2011-3172/" source="CVE"/>
		<description>
These are all security issues fixed in the pam-modules-12.1-3.17 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2011-3172/">CVE-2011-3172</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488036" comment="pam-modules-12.1-3.17 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488037" comment="pam-modules-32bit-12.1-3.17 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109863" version="1" class="patch">
	<metadata>
		<title>reiserfs-kmp-default-5.3.18-22.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the reiserfs-kmp-default-5.3.18-22.2 package on the GA media of SUSE Linux Enterprise Module for Legacy 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488082" comment="reiserfs-kmp-default-5.3.18-22.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109864" version="1" class="patch">
	<metadata>
		<title>apache2-mod_wsgi-4.5.18-2.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0240" ref_url="https://www.suse.com/security/cve/CVE-2014-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_wsgi-4.5.18-2.27 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0240/">CVE-2014-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488084" comment="apache2-mod_wsgi-4.5.18-2.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109865" version="1" class="patch">
	<metadata>
		<title>aws-cli-1.18.38-8.8.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-15869" ref_url="https://www.suse.com/security/cve/CVE-2018-15869/" source="CVE"/>
		<description>
These are all security issues fixed in the aws-cli-1.18.38-8.8.2 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15869/">CVE-2018-15869</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488090" comment="aws-cli-1.18.38-8.8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109866" version="1" class="patch">
	<metadata>
		<title>cloud-init-19.4-8.20.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-0816" ref_url="https://www.suse.com/security/cve/CVE-2019-0816/" source="CVE"/>
		<reference ref_id="CVE-2020-8631" ref_url="https://www.suse.com/security/cve/CVE-2020-8631/" source="CVE"/>
		<reference ref_id="CVE-2020-8632" ref_url="https://www.suse.com/security/cve/CVE-2020-8632/" source="CVE"/>
		<description>
These are all security issues fixed in the cloud-init-19.4-8.20.1 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-0816/">CVE-2019-0816</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8631/">CVE-2020-8631</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8632/">CVE-2020-8632</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488091" comment="cloud-init-19.4-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488092" comment="cloud-init-config-suse-19.4-8.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109867" version="1" class="patch">
	<metadata>
		<title>kernel-azure-5.3.18-16.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-azure-5.3.18-16.2 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488093" comment="kernel-azure-5.3.18-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488094" comment="kernel-azure-devel-5.3.18-16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488095" comment="kernel-devel-azure-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488096" comment="kernel-source-azure-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488097" comment="kernel-syms-azure-5.3.18-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109868" version="1" class="patch">
	<metadata>
		<title>kernel-azure-base-4.12.14-8.30.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255/" source="CVE"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127/" source="CVE"/>
		<reference ref_id="CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15537" ref_url="https://www.suse.com/security/cve/CVE-2017-15537/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16650" ref_url="https://www.suse.com/security/cve/CVE-2017-16650/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075/" source="CVE"/>
		<reference ref_id="CVE-2017-18202" ref_url="https://www.suse.com/security/cve/CVE-2017-18202/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1000028" ref_url="https://www.suse.com/security/cve/CVE-2018-1000028/" source="CVE"/>
		<reference ref_id="CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397/" source="CVE"/>
		<reference ref_id="CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-11811" ref_url="https://www.suse.com/security/cve/CVE-2019-11811/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12817" ref_url="https://www.suse.com/security/cve/CVE-2019-12817/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="CVE-2019-13233" ref_url="https://www.suse.com/security/cve/CVE-2019-13233/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15213" ref_url="https://www.suse.com/security/cve/CVE-2019-15213/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919/" source="CVE"/>
		<reference ref_id="CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920/" source="CVE"/>
		<reference ref_id="CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16746" ref_url="https://www.suse.com/security/cve/CVE-2019-16746/" source="CVE"/>
		<reference ref_id="CVE-2019-16994" ref_url="https://www.suse.com/security/cve/CVE-2019-16994/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-19036" ref_url="https://www.suse.com/security/cve/CVE-2019-19036/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19318" ref_url="https://www.suse.com/security/cve/CVE-2019-19318/" source="CVE"/>
		<reference ref_id="CVE-2019-19319" ref_url="https://www.suse.com/security/cve/CVE-2019-19319/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19527" ref_url="https://www.suse.com/security/cve/CVE-2019-19527/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19535" ref_url="https://www.suse.com/security/cve/CVE-2019-19535/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19537" ref_url="https://www.suse.com/security/cve/CVE-2019-19537/" source="CVE"/>
		<reference ref_id="CVE-2019-19543" ref_url="https://www.suse.com/security/cve/CVE-2019-19543/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19927" ref_url="https://www.suse.com/security/cve/CVE-2019-19927/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-19966" ref_url="https://www.suse.com/security/cve/CVE-2019-19966/" source="CVE"/>
		<reference ref_id="CVE-2019-20054" ref_url="https://www.suse.com/security/cve/CVE-2019-20054/" source="CVE"/>
		<reference ref_id="CVE-2019-20095" ref_url="https://www.suse.com/security/cve/CVE-2019-20095/" source="CVE"/>
		<reference ref_id="CVE-2019-20096" ref_url="https://www.suse.com/security/cve/CVE-2019-20096/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3560" ref_url="https://www.suse.com/security/cve/CVE-2019-3560/" source="CVE"/>
		<reference ref_id="CVE-2019-3701" ref_url="https://www.suse.com/security/cve/CVE-2019-3701/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980/" source="CVE"/>
		<reference ref_id="CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9458" ref_url="https://www.suse.com/security/cve/CVE-2019-9458/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11669" ref_url="https://www.suse.com/security/cve/CVE-2020-11669/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-7053" ref_url="https://www.suse.com/security/cve/CVE-2020-7053/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8834" ref_url="https://www.suse.com/security/cve/CVE-2020-8834/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-azure-base-4.12.14-8.30.1 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15537/">CVE-2017-15537</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16650/">CVE-2017-16650</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18202/">CVE-2017-18202</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000028/">CVE-2018-1000028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11811/">CVE-2019-11811</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-12817/">CVE-2019-12817</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13233/">CVE-2019-13233</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15213/">CVE-2019-15213</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16746/">CVE-2019-16746</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16994/">CVE-2019-16994</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19036/">CVE-2019-19036</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19318/">CVE-2019-19318</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19319/">CVE-2019-19319</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19527/">CVE-2019-19527</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19535/">CVE-2019-19535</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19537/">CVE-2019-19537</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19543/">CVE-2019-19543</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19927/">CVE-2019-19927</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19966/">CVE-2019-19966</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20054/">CVE-2019-20054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20095/">CVE-2019-20095</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20096/">CVE-2019-20096</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3560/">CVE-2019-3560</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3701/">CVE-2019-3701</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9458/">CVE-2019-9458</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11669/">CVE-2020-11669</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-7053/">CVE-2020-7053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8834/">CVE-2020-8834</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488098" comment="kernel-azure-base-4.12.14-8.30.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109869" version="1" class="patch">
	<metadata>
		<title>kernel-devel-azure-4.12.14-5.47.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-1000252" ref_url="https://www.suse.com/security/cve/CVE-2017-1000252/" source="CVE"/>
		<reference ref_id="CVE-2017-1000255" ref_url="https://www.suse.com/security/cve/CVE-2017-1000255/" source="CVE"/>
		<reference ref_id="CVE-2017-1000410" ref_url="https://www.suse.com/security/cve/CVE-2017-1000410/" source="CVE"/>
		<reference ref_id="CVE-2017-11473" ref_url="https://www.suse.com/security/cve/CVE-2017-11473/" source="CVE"/>
		<reference ref_id="CVE-2017-11600" ref_url="https://www.suse.com/security/cve/CVE-2017-11600/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-12154" ref_url="https://www.suse.com/security/cve/CVE-2017-12154/" source="CVE"/>
		<reference ref_id="CVE-2017-12190" ref_url="https://www.suse.com/security/cve/CVE-2017-12190/" source="CVE"/>
		<reference ref_id="CVE-2017-12193" ref_url="https://www.suse.com/security/cve/CVE-2017-12193/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13166" ref_url="https://www.suse.com/security/cve/CVE-2017-13166/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-14489" ref_url="https://www.suse.com/security/cve/CVE-2017-14489/" source="CVE"/>
		<reference ref_id="CVE-2017-15115" ref_url="https://www.suse.com/security/cve/CVE-2017-15115/" source="CVE"/>
		<reference ref_id="CVE-2017-15127" ref_url="https://www.suse.com/security/cve/CVE-2017-15127/" source="CVE"/>
		<reference ref_id="CVE-2017-15128" ref_url="https://www.suse.com/security/cve/CVE-2017-15128/" source="CVE"/>
		<reference ref_id="CVE-2017-15129" ref_url="https://www.suse.com/security/cve/CVE-2017-15129/" source="CVE"/>
		<reference ref_id="CVE-2017-15265" ref_url="https://www.suse.com/security/cve/CVE-2017-15265/" source="CVE"/>
		<reference ref_id="CVE-2017-15537" ref_url="https://www.suse.com/security/cve/CVE-2017-15537/" source="CVE"/>
		<reference ref_id="CVE-2017-15649" ref_url="https://www.suse.com/security/cve/CVE-2017-15649/" source="CVE"/>
		<reference ref_id="CVE-2017-15951" ref_url="https://www.suse.com/security/cve/CVE-2017-15951/" source="CVE"/>
		<reference ref_id="CVE-2017-16525" ref_url="https://www.suse.com/security/cve/CVE-2017-16525/" source="CVE"/>
		<reference ref_id="CVE-2017-16527" ref_url="https://www.suse.com/security/cve/CVE-2017-16527/" source="CVE"/>
		<reference ref_id="CVE-2017-16528" ref_url="https://www.suse.com/security/cve/CVE-2017-16528/" source="CVE"/>
		<reference ref_id="CVE-2017-16529" ref_url="https://www.suse.com/security/cve/CVE-2017-16529/" source="CVE"/>
		<reference ref_id="CVE-2017-16531" ref_url="https://www.suse.com/security/cve/CVE-2017-16531/" source="CVE"/>
		<reference ref_id="CVE-2017-16533" ref_url="https://www.suse.com/security/cve/CVE-2017-16533/" source="CVE"/>
		<reference ref_id="CVE-2017-16534" ref_url="https://www.suse.com/security/cve/CVE-2017-16534/" source="CVE"/>
		<reference ref_id="CVE-2017-16535" ref_url="https://www.suse.com/security/cve/CVE-2017-16535/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16538" ref_url="https://www.suse.com/security/cve/CVE-2017-16538/" source="CVE"/>
		<reference ref_id="CVE-2017-16644" ref_url="https://www.suse.com/security/cve/CVE-2017-16644/" source="CVE"/>
		<reference ref_id="CVE-2017-16645" ref_url="https://www.suse.com/security/cve/CVE-2017-16645/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16647" ref_url="https://www.suse.com/security/cve/CVE-2017-16647/" source="CVE"/>
		<reference ref_id="CVE-2017-16649" ref_url="https://www.suse.com/security/cve/CVE-2017-16649/" source="CVE"/>
		<reference ref_id="CVE-2017-16650" ref_url="https://www.suse.com/security/cve/CVE-2017-16650/" source="CVE"/>
		<reference ref_id="CVE-2017-16911" ref_url="https://www.suse.com/security/cve/CVE-2017-16911/" source="CVE"/>
		<reference ref_id="CVE-2017-16912" ref_url="https://www.suse.com/security/cve/CVE-2017-16912/" source="CVE"/>
		<reference ref_id="CVE-2017-16913" ref_url="https://www.suse.com/security/cve/CVE-2017-16913/" source="CVE"/>
		<reference ref_id="CVE-2017-16914" ref_url="https://www.suse.com/security/cve/CVE-2017-16914/" source="CVE"/>
		<reference ref_id="CVE-2017-16939" ref_url="https://www.suse.com/security/cve/CVE-2017-16939/" source="CVE"/>
		<reference ref_id="CVE-2017-16994" ref_url="https://www.suse.com/security/cve/CVE-2017-16994/" source="CVE"/>
		<reference ref_id="CVE-2017-16995" ref_url="https://www.suse.com/security/cve/CVE-2017-16995/" source="CVE"/>
		<reference ref_id="CVE-2017-16996" ref_url="https://www.suse.com/security/cve/CVE-2017-16996/" source="CVE"/>
		<reference ref_id="CVE-2017-17052" ref_url="https://www.suse.com/security/cve/CVE-2017-17052/" source="CVE"/>
		<reference ref_id="CVE-2017-17448" ref_url="https://www.suse.com/security/cve/CVE-2017-17448/" source="CVE"/>
		<reference ref_id="CVE-2017-17449" ref_url="https://www.suse.com/security/cve/CVE-2017-17449/" source="CVE"/>
		<reference ref_id="CVE-2017-17450" ref_url="https://www.suse.com/security/cve/CVE-2017-17450/" source="CVE"/>
		<reference ref_id="CVE-2017-17558" ref_url="https://www.suse.com/security/cve/CVE-2017-17558/" source="CVE"/>
		<reference ref_id="CVE-2017-17712" ref_url="https://www.suse.com/security/cve/CVE-2017-17712/" source="CVE"/>
		<reference ref_id="CVE-2017-17741" ref_url="https://www.suse.com/security/cve/CVE-2017-17741/" source="CVE"/>
		<reference ref_id="CVE-2017-17805" ref_url="https://www.suse.com/security/cve/CVE-2017-17805/" source="CVE"/>
		<reference ref_id="CVE-2017-17806" ref_url="https://www.suse.com/security/cve/CVE-2017-17806/" source="CVE"/>
		<reference ref_id="CVE-2017-17852" ref_url="https://www.suse.com/security/cve/CVE-2017-17852/" source="CVE"/>
		<reference ref_id="CVE-2017-17853" ref_url="https://www.suse.com/security/cve/CVE-2017-17853/" source="CVE"/>
		<reference ref_id="CVE-2017-17854" ref_url="https://www.suse.com/security/cve/CVE-2017-17854/" source="CVE"/>
		<reference ref_id="CVE-2017-17855" ref_url="https://www.suse.com/security/cve/CVE-2017-17855/" source="CVE"/>
		<reference ref_id="CVE-2017-17856" ref_url="https://www.suse.com/security/cve/CVE-2017-17856/" source="CVE"/>
		<reference ref_id="CVE-2017-17857" ref_url="https://www.suse.com/security/cve/CVE-2017-17857/" source="CVE"/>
		<reference ref_id="CVE-2017-17862" ref_url="https://www.suse.com/security/cve/CVE-2017-17862/" source="CVE"/>
		<reference ref_id="CVE-2017-17864" ref_url="https://www.suse.com/security/cve/CVE-2017-17864/" source="CVE"/>
		<reference ref_id="CVE-2017-17975" ref_url="https://www.suse.com/security/cve/CVE-2017-17975/" source="CVE"/>
		<reference ref_id="CVE-2017-18075" ref_url="https://www.suse.com/security/cve/CVE-2017-18075/" source="CVE"/>
		<reference ref_id="CVE-2017-18202" ref_url="https://www.suse.com/security/cve/CVE-2017-18202/" source="CVE"/>
		<reference ref_id="CVE-2017-18203" ref_url="https://www.suse.com/security/cve/CVE-2017-18203/" source="CVE"/>
		<reference ref_id="CVE-2017-18204" ref_url="https://www.suse.com/security/cve/CVE-2017-18204/" source="CVE"/>
		<reference ref_id="CVE-2017-18208" ref_url="https://www.suse.com/security/cve/CVE-2017-18208/" source="CVE"/>
		<reference ref_id="CVE-2017-18224" ref_url="https://www.suse.com/security/cve/CVE-2017-18224/" source="CVE"/>
		<reference ref_id="CVE-2017-18344" ref_url="https://www.suse.com/security/cve/CVE-2017-18344/" source="CVE"/>
		<reference ref_id="CVE-2017-18551" ref_url="https://www.suse.com/security/cve/CVE-2017-18551/" source="CVE"/>
		<reference ref_id="CVE-2017-18595" ref_url="https://www.suse.com/security/cve/CVE-2017-18595/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-7541" ref_url="https://www.suse.com/security/cve/CVE-2017-7541/" source="CVE"/>
		<reference ref_id="CVE-2017-7542" ref_url="https://www.suse.com/security/cve/CVE-2017-7542/" source="CVE"/>
		<reference ref_id="CVE-2017-8824" ref_url="https://www.suse.com/security/cve/CVE-2017-8824/" source="CVE"/>
		<reference ref_id="CVE-2017-8831" ref_url="https://www.suse.com/security/cve/CVE-2017-8831/" source="CVE"/>
		<reference ref_id="CVE-2018-1000004" ref_url="https://www.suse.com/security/cve/CVE-2018-1000004/" source="CVE"/>
		<reference ref_id="CVE-2018-1000028" ref_url="https://www.suse.com/security/cve/CVE-2018-1000028/" source="CVE"/>
		<reference ref_id="CVE-2018-1000200" ref_url="https://www.suse.com/security/cve/CVE-2018-1000200/" source="CVE"/>
		<reference ref_id="CVE-2018-1000204" ref_url="https://www.suse.com/security/cve/CVE-2018-1000204/" source="CVE"/>
		<reference ref_id="CVE-2018-10087" ref_url="https://www.suse.com/security/cve/CVE-2018-10087/" source="CVE"/>
		<reference ref_id="CVE-2018-10124" ref_url="https://www.suse.com/security/cve/CVE-2018-10124/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-1065" ref_url="https://www.suse.com/security/cve/CVE-2018-1065/" source="CVE"/>
		<reference ref_id="CVE-2018-1068" ref_url="https://www.suse.com/security/cve/CVE-2018-1068/" source="CVE"/>
		<reference ref_id="CVE-2018-10853" ref_url="https://www.suse.com/security/cve/CVE-2018-10853/" source="CVE"/>
		<reference ref_id="CVE-2018-10902" ref_url="https://www.suse.com/security/cve/CVE-2018-10902/" source="CVE"/>
		<reference ref_id="CVE-2018-1091" ref_url="https://www.suse.com/security/cve/CVE-2018-1091/" source="CVE"/>
		<reference ref_id="CVE-2018-10938" ref_url="https://www.suse.com/security/cve/CVE-2018-10938/" source="CVE"/>
		<reference ref_id="CVE-2018-1094" ref_url="https://www.suse.com/security/cve/CVE-2018-1094/" source="CVE"/>
		<reference ref_id="CVE-2018-10940" ref_url="https://www.suse.com/security/cve/CVE-2018-10940/" source="CVE"/>
		<reference ref_id="CVE-2018-1108" ref_url="https://www.suse.com/security/cve/CVE-2018-1108/" source="CVE"/>
		<reference ref_id="CVE-2018-1118" ref_url="https://www.suse.com/security/cve/CVE-2018-1118/" source="CVE"/>
		<reference ref_id="CVE-2018-1120" ref_url="https://www.suse.com/security/cve/CVE-2018-1120/" source="CVE"/>
		<reference ref_id="CVE-2018-1128" ref_url="https://www.suse.com/security/cve/CVE-2018-1128/" source="CVE"/>
		<reference ref_id="CVE-2018-1129" ref_url="https://www.suse.com/security/cve/CVE-2018-1129/" source="CVE"/>
		<reference ref_id="CVE-2018-1130" ref_url="https://www.suse.com/security/cve/CVE-2018-1130/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-12233" ref_url="https://www.suse.com/security/cve/CVE-2018-12233/" source="CVE"/>
		<reference ref_id="CVE-2018-12896" ref_url="https://www.suse.com/security/cve/CVE-2018-12896/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-13093" ref_url="https://www.suse.com/security/cve/CVE-2018-13093/" source="CVE"/>
		<reference ref_id="CVE-2018-13094" ref_url="https://www.suse.com/security/cve/CVE-2018-13094/" source="CVE"/>
		<reference ref_id="CVE-2018-13095" ref_url="https://www.suse.com/security/cve/CVE-2018-13095/" source="CVE"/>
		<reference ref_id="CVE-2018-13405" ref_url="https://www.suse.com/security/cve/CVE-2018-13405/" source="CVE"/>
		<reference ref_id="CVE-2018-13406" ref_url="https://www.suse.com/security/cve/CVE-2018-13406/" source="CVE"/>
		<reference ref_id="CVE-2018-14613" ref_url="https://www.suse.com/security/cve/CVE-2018-14613/" source="CVE"/>
		<reference ref_id="CVE-2018-14617" ref_url="https://www.suse.com/security/cve/CVE-2018-14617/" source="CVE"/>
		<reference ref_id="CVE-2018-14625" ref_url="https://www.suse.com/security/cve/CVE-2018-14625/" source="CVE"/>
		<reference ref_id="CVE-2018-14633" ref_url="https://www.suse.com/security/cve/CVE-2018-14633/" source="CVE"/>
		<reference ref_id="CVE-2018-15572" ref_url="https://www.suse.com/security/cve/CVE-2018-15572/" source="CVE"/>
		<reference ref_id="CVE-2018-16658" ref_url="https://www.suse.com/security/cve/CVE-2018-16658/" source="CVE"/>
		<reference ref_id="CVE-2018-16862" ref_url="https://www.suse.com/security/cve/CVE-2018-16862/" source="CVE"/>
		<reference ref_id="CVE-2018-16871" ref_url="https://www.suse.com/security/cve/CVE-2018-16871/" source="CVE"/>
		<reference ref_id="CVE-2018-16880" ref_url="https://www.suse.com/security/cve/CVE-2018-16880/" source="CVE"/>
		<reference ref_id="CVE-2018-16884" ref_url="https://www.suse.com/security/cve/CVE-2018-16884/" source="CVE"/>
		<reference ref_id="CVE-2018-17182" ref_url="https://www.suse.com/security/cve/CVE-2018-17182/" source="CVE"/>
		<reference ref_id="CVE-2018-18281" ref_url="https://www.suse.com/security/cve/CVE-2018-18281/" source="CVE"/>
		<reference ref_id="CVE-2018-18386" ref_url="https://www.suse.com/security/cve/CVE-2018-18386/" source="CVE"/>
		<reference ref_id="CVE-2018-18397" ref_url="https://www.suse.com/security/cve/CVE-2018-18397/" source="CVE"/>
		<reference ref_id="CVE-2018-18445" ref_url="https://www.suse.com/security/cve/CVE-2018-18445/" source="CVE"/>
		<reference ref_id="CVE-2018-18710" ref_url="https://www.suse.com/security/cve/CVE-2018-18710/" source="CVE"/>
		<reference ref_id="CVE-2018-19407" ref_url="https://www.suse.com/security/cve/CVE-2018-19407/" source="CVE"/>
		<reference ref_id="CVE-2018-19824" ref_url="https://www.suse.com/security/cve/CVE-2018-19824/" source="CVE"/>
		<reference ref_id="CVE-2018-19854" ref_url="https://www.suse.com/security/cve/CVE-2018-19854/" source="CVE"/>
		<reference ref_id="CVE-2018-19985" ref_url="https://www.suse.com/security/cve/CVE-2018-19985/" source="CVE"/>
		<reference ref_id="CVE-2018-20169" ref_url="https://www.suse.com/security/cve/CVE-2018-20169/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2018-20836" ref_url="https://www.suse.com/security/cve/CVE-2018-20836/" source="CVE"/>
		<reference ref_id="CVE-2018-20855" ref_url="https://www.suse.com/security/cve/CVE-2018-20855/" source="CVE"/>
		<reference ref_id="CVE-2018-20976" ref_url="https://www.suse.com/security/cve/CVE-2018-20976/" source="CVE"/>
		<reference ref_id="CVE-2018-21008" ref_url="https://www.suse.com/security/cve/CVE-2018-21008/" source="CVE"/>
		<reference ref_id="CVE-2018-3620" ref_url="https://www.suse.com/security/cve/CVE-2018-3620/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-5332" ref_url="https://www.suse.com/security/cve/CVE-2018-5332/" source="CVE"/>
		<reference ref_id="CVE-2018-5333" ref_url="https://www.suse.com/security/cve/CVE-2018-5333/" source="CVE"/>
		<reference ref_id="CVE-2018-5390" ref_url="https://www.suse.com/security/cve/CVE-2018-5390/" source="CVE"/>
		<reference ref_id="CVE-2018-5391" ref_url="https://www.suse.com/security/cve/CVE-2018-5391/" source="CVE"/>
		<reference ref_id="CVE-2018-5803" ref_url="https://www.suse.com/security/cve/CVE-2018-5803/" source="CVE"/>
		<reference ref_id="CVE-2018-5848" ref_url="https://www.suse.com/security/cve/CVE-2018-5848/" source="CVE"/>
		<reference ref_id="CVE-2018-6554" ref_url="https://www.suse.com/security/cve/CVE-2018-6554/" source="CVE"/>
		<reference ref_id="CVE-2018-6555" ref_url="https://www.suse.com/security/cve/CVE-2018-6555/" source="CVE"/>
		<reference ref_id="CVE-2018-6927" ref_url="https://www.suse.com/security/cve/CVE-2018-6927/" source="CVE"/>
		<reference ref_id="CVE-2018-7191" ref_url="https://www.suse.com/security/cve/CVE-2018-7191/" source="CVE"/>
		<reference ref_id="CVE-2018-7492" ref_url="https://www.suse.com/security/cve/CVE-2018-7492/" source="CVE"/>
		<reference ref_id="CVE-2018-7566" ref_url="https://www.suse.com/security/cve/CVE-2018-7566/" source="CVE"/>
		<reference ref_id="CVE-2018-7740" ref_url="https://www.suse.com/security/cve/CVE-2018-7740/" source="CVE"/>
		<reference ref_id="CVE-2018-8043" ref_url="https://www.suse.com/security/cve/CVE-2018-8043/" source="CVE"/>
		<reference ref_id="CVE-2018-8087" ref_url="https://www.suse.com/security/cve/CVE-2018-8087/" source="CVE"/>
		<reference ref_id="CVE-2018-8781" ref_url="https://www.suse.com/security/cve/CVE-2018-8781/" source="CVE"/>
		<reference ref_id="CVE-2018-8822" ref_url="https://www.suse.com/security/cve/CVE-2018-8822/" source="CVE"/>
		<reference ref_id="CVE-2018-9363" ref_url="https://www.suse.com/security/cve/CVE-2018-9363/" source="CVE"/>
		<reference ref_id="CVE-2018-9385" ref_url="https://www.suse.com/security/cve/CVE-2018-9385/" source="CVE"/>
		<reference ref_id="CVE-2018-9568" ref_url="https://www.suse.com/security/cve/CVE-2018-9568/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10124" ref_url="https://www.suse.com/security/cve/CVE-2019-10124/" source="CVE"/>
		<reference ref_id="CVE-2019-10126" ref_url="https://www.suse.com/security/cve/CVE-2019-10126/" source="CVE"/>
		<reference ref_id="CVE-2019-10207" ref_url="https://www.suse.com/security/cve/CVE-2019-10207/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-10638" ref_url="https://www.suse.com/security/cve/CVE-2019-10638/" source="CVE"/>
		<reference ref_id="CVE-2019-10639" ref_url="https://www.suse.com/security/cve/CVE-2019-10639/" source="CVE"/>
		<reference ref_id="CVE-2019-11085" ref_url="https://www.suse.com/security/cve/CVE-2019-11085/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-1125" ref_url="https://www.suse.com/security/cve/CVE-2019-1125/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-11486" ref_url="https://www.suse.com/security/cve/CVE-2019-11486/" source="CVE"/>
		<reference ref_id="CVE-2019-11487" ref_url="https://www.suse.com/security/cve/CVE-2019-11487/" source="CVE"/>
		<reference ref_id="CVE-2019-11599" ref_url="https://www.suse.com/security/cve/CVE-2019-11599/" source="CVE"/>
		<reference ref_id="CVE-2019-11810" ref_url="https://www.suse.com/security/cve/CVE-2019-11810/" source="CVE"/>
		<reference ref_id="CVE-2019-11815" ref_url="https://www.suse.com/security/cve/CVE-2019-11815/" source="CVE"/>
		<reference ref_id="CVE-2019-11833" ref_url="https://www.suse.com/security/cve/CVE-2019-11833/" source="CVE"/>
		<reference ref_id="CVE-2019-11884" ref_url="https://www.suse.com/security/cve/CVE-2019-11884/" source="CVE"/>
		<reference ref_id="CVE-2019-12380" ref_url="https://www.suse.com/security/cve/CVE-2019-12380/" source="CVE"/>
		<reference ref_id="CVE-2019-12382" ref_url="https://www.suse.com/security/cve/CVE-2019-12382/" source="CVE"/>
		<reference ref_id="CVE-2019-12456" ref_url="https://www.suse.com/security/cve/CVE-2019-12456/" source="CVE"/>
		<reference ref_id="CVE-2019-12614" ref_url="https://www.suse.com/security/cve/CVE-2019-12614/" source="CVE"/>
		<reference ref_id="CVE-2019-12818" ref_url="https://www.suse.com/security/cve/CVE-2019-12818/" source="CVE"/>
		<reference ref_id="CVE-2019-12819" ref_url="https://www.suse.com/security/cve/CVE-2019-12819/" source="CVE"/>
		<reference ref_id="CVE-2019-13631" ref_url="https://www.suse.com/security/cve/CVE-2019-13631/" source="CVE"/>
		<reference ref_id="CVE-2019-13648" ref_url="https://www.suse.com/security/cve/CVE-2019-13648/" source="CVE"/>
		<reference ref_id="CVE-2019-14283" ref_url="https://www.suse.com/security/cve/CVE-2019-14283/" source="CVE"/>
		<reference ref_id="CVE-2019-14284" ref_url="https://www.suse.com/security/cve/CVE-2019-14284/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14821" ref_url="https://www.suse.com/security/cve/CVE-2019-14821/" source="CVE"/>
		<reference ref_id="CVE-2019-14835" ref_url="https://www.suse.com/security/cve/CVE-2019-14835/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15090" ref_url="https://www.suse.com/security/cve/CVE-2019-15090/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15117" ref_url="https://www.suse.com/security/cve/CVE-2019-15117/" source="CVE"/>
		<reference ref_id="CVE-2019-15118" ref_url="https://www.suse.com/security/cve/CVE-2019-15118/" source="CVE"/>
		<reference ref_id="CVE-2019-15211" ref_url="https://www.suse.com/security/cve/CVE-2019-15211/" source="CVE"/>
		<reference ref_id="CVE-2019-15212" ref_url="https://www.suse.com/security/cve/CVE-2019-15212/" source="CVE"/>
		<reference ref_id="CVE-2019-15214" ref_url="https://www.suse.com/security/cve/CVE-2019-15214/" source="CVE"/>
		<reference ref_id="CVE-2019-15215" ref_url="https://www.suse.com/security/cve/CVE-2019-15215/" source="CVE"/>
		<reference ref_id="CVE-2019-15216" ref_url="https://www.suse.com/security/cve/CVE-2019-15216/" source="CVE"/>
		<reference ref_id="CVE-2019-15217" ref_url="https://www.suse.com/security/cve/CVE-2019-15217/" source="CVE"/>
		<reference ref_id="CVE-2019-15218" ref_url="https://www.suse.com/security/cve/CVE-2019-15218/" source="CVE"/>
		<reference ref_id="CVE-2019-15219" ref_url="https://www.suse.com/security/cve/CVE-2019-15219/" source="CVE"/>
		<reference ref_id="CVE-2019-15220" ref_url="https://www.suse.com/security/cve/CVE-2019-15220/" source="CVE"/>
		<reference ref_id="CVE-2019-15221" ref_url="https://www.suse.com/security/cve/CVE-2019-15221/" source="CVE"/>
		<reference ref_id="CVE-2019-15222" ref_url="https://www.suse.com/security/cve/CVE-2019-15222/" source="CVE"/>
		<reference ref_id="CVE-2019-15239" ref_url="https://www.suse.com/security/cve/CVE-2019-15239/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15292" ref_url="https://www.suse.com/security/cve/CVE-2019-15292/" source="CVE"/>
		<reference ref_id="CVE-2019-15538" ref_url="https://www.suse.com/security/cve/CVE-2019-15538/" source="CVE"/>
		<reference ref_id="CVE-2019-15666" ref_url="https://www.suse.com/security/cve/CVE-2019-15666/" source="CVE"/>
		<reference ref_id="CVE-2019-15902" ref_url="https://www.suse.com/security/cve/CVE-2019-15902/" source="CVE"/>
		<reference ref_id="CVE-2019-15916" ref_url="https://www.suse.com/security/cve/CVE-2019-15916/" source="CVE"/>
		<reference ref_id="CVE-2019-15917" ref_url="https://www.suse.com/security/cve/CVE-2019-15917/" source="CVE"/>
		<reference ref_id="CVE-2019-15919" ref_url="https://www.suse.com/security/cve/CVE-2019-15919/" source="CVE"/>
		<reference ref_id="CVE-2019-15920" ref_url="https://www.suse.com/security/cve/CVE-2019-15920/" source="CVE"/>
		<reference ref_id="CVE-2019-15921" ref_url="https://www.suse.com/security/cve/CVE-2019-15921/" source="CVE"/>
		<reference ref_id="CVE-2019-15924" ref_url="https://www.suse.com/security/cve/CVE-2019-15924/" source="CVE"/>
		<reference ref_id="CVE-2019-15926" ref_url="https://www.suse.com/security/cve/CVE-2019-15926/" source="CVE"/>
		<reference ref_id="CVE-2019-15927" ref_url="https://www.suse.com/security/cve/CVE-2019-15927/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-16995" ref_url="https://www.suse.com/security/cve/CVE-2019-16995/" source="CVE"/>
		<reference ref_id="CVE-2019-17055" ref_url="https://www.suse.com/security/cve/CVE-2019-17055/" source="CVE"/>
		<reference ref_id="CVE-2019-17056" ref_url="https://www.suse.com/security/cve/CVE-2019-17056/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18805" ref_url="https://www.suse.com/security/cve/CVE-2019-18805/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19227" ref_url="https://www.suse.com/security/cve/CVE-2019-19227/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19530" ref_url="https://www.suse.com/security/cve/CVE-2019-19530/" source="CVE"/>
		<reference ref_id="CVE-2019-19531" ref_url="https://www.suse.com/security/cve/CVE-2019-19531/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19536" ref_url="https://www.suse.com/security/cve/CVE-2019-19536/" source="CVE"/>
		<reference ref_id="CVE-2019-19543" ref_url="https://www.suse.com/security/cve/CVE-2019-19543/" source="CVE"/>
		<reference ref_id="CVE-2019-2024" ref_url="https://www.suse.com/security/cve/CVE-2019-2024/" source="CVE"/>
		<reference ref_id="CVE-2019-3459" ref_url="https://www.suse.com/security/cve/CVE-2019-3459/" source="CVE"/>
		<reference ref_id="CVE-2019-3460" ref_url="https://www.suse.com/security/cve/CVE-2019-3460/" source="CVE"/>
		<reference ref_id="CVE-2019-3560" ref_url="https://www.suse.com/security/cve/CVE-2019-3560/" source="CVE"/>
		<reference ref_id="CVE-2019-3819" ref_url="https://www.suse.com/security/cve/CVE-2019-3819/" source="CVE"/>
		<reference ref_id="CVE-2019-3846" ref_url="https://www.suse.com/security/cve/CVE-2019-3846/" source="CVE"/>
		<reference ref_id="CVE-2019-3882" ref_url="https://www.suse.com/security/cve/CVE-2019-3882/" source="CVE"/>
		<reference ref_id="CVE-2019-5489" ref_url="https://www.suse.com/security/cve/CVE-2019-5489/" source="CVE"/>
		<reference ref_id="CVE-2019-6974" ref_url="https://www.suse.com/security/cve/CVE-2019-6974/" source="CVE"/>
		<reference ref_id="CVE-2019-7221" ref_url="https://www.suse.com/security/cve/CVE-2019-7221/" source="CVE"/>
		<reference ref_id="CVE-2019-7222" ref_url="https://www.suse.com/security/cve/CVE-2019-7222/" source="CVE"/>
		<reference ref_id="CVE-2019-7308" ref_url="https://www.suse.com/security/cve/CVE-2019-7308/" source="CVE"/>
		<reference ref_id="CVE-2019-8564" ref_url="https://www.suse.com/security/cve/CVE-2019-8564/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2019-8980" ref_url="https://www.suse.com/security/cve/CVE-2019-8980/" source="CVE"/>
		<reference ref_id="CVE-2019-9003" ref_url="https://www.suse.com/security/cve/CVE-2019-9003/" source="CVE"/>
		<reference ref_id="CVE-2019-9213" ref_url="https://www.suse.com/security/cve/CVE-2019-9213/" source="CVE"/>
		<reference ref_id="CVE-2019-9456" ref_url="https://www.suse.com/security/cve/CVE-2019-9456/" source="CVE"/>
		<reference ref_id="CVE-2019-9500" ref_url="https://www.suse.com/security/cve/CVE-2019-9500/" source="CVE"/>
		<reference ref_id="CVE-2019-9503" ref_url="https://www.suse.com/security/cve/CVE-2019-9503/" source="CVE"/>
		<reference ref_id="CVE-2019-9506" ref_url="https://www.suse.com/security/cve/CVE-2019-9506/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-devel-azure-4.12.14-5.47.1 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000252/">CVE-2017-1000252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000255/">CVE-2017-1000255</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-1000410/">CVE-2017-1000410</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-11473/">CVE-2017-11473</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-11600/">CVE-2017-11600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12154/">CVE-2017-12154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12190/">CVE-2017-12190</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12193/">CVE-2017-12193</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-13166/">CVE-2017-13166</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14489/">CVE-2017-14489</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15115/">CVE-2017-15115</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15127/">CVE-2017-15127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15128/">CVE-2017-15128</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-15129/">CVE-2017-15129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15265/">CVE-2017-15265</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15537/">CVE-2017-15537</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15649/">CVE-2017-15649</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15951/">CVE-2017-15951</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16525/">CVE-2017-16525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16527/">CVE-2017-16527</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16528/">CVE-2017-16528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16529/">CVE-2017-16529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16531/">CVE-2017-16531</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16533/">CVE-2017-16533</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16534/">CVE-2017-16534</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16535/">CVE-2017-16535</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16538/">CVE-2017-16538</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16644/">CVE-2017-16644</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16645/">CVE-2017-16645</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16647/">CVE-2017-16647</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16649/">CVE-2017-16649</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16650/">CVE-2017-16650</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16911/">CVE-2017-16911</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16912/">CVE-2017-16912</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16913/">CVE-2017-16913</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16914/">CVE-2017-16914</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16939/">CVE-2017-16939</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16994/">CVE-2017-16994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16995/">CVE-2017-16995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16996/">CVE-2017-16996</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17052/">CVE-2017-17052</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-17448/">CVE-2017-17448</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17449/">CVE-2017-17449</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-17450/">CVE-2017-17450</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17558/">CVE-2017-17558</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17712/">CVE-2017-17712</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17741/">CVE-2017-17741</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-17805/">CVE-2017-17805</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17806/">CVE-2017-17806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17852/">CVE-2017-17852</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17853/">CVE-2017-17853</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17854/">CVE-2017-17854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17855/">CVE-2017-17855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17856/">CVE-2017-17856</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17857/">CVE-2017-17857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17862/">CVE-2017-17862</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17864/">CVE-2017-17864</cve>
	<cve impact="low" cvss3="3.5/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-17975/">CVE-2017-17975</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18075/">CVE-2017-18075</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18202/">CVE-2017-18202</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18203/">CVE-2017-18203</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18204/">CVE-2017-18204</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18208/">CVE-2017-18208</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18224/">CVE-2017-18224</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-18344/">CVE-2017-18344</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-18551/">CVE-2017-18551</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-18595/">CVE-2017-18595</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7541/">CVE-2017-7541</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7542/">CVE-2017-7542</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8824/">CVE-2017-8824</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-8831/">CVE-2017-8831</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000004/">CVE-2018-1000004</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000028/">CVE-2018-1000028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000200/">CVE-2018-1000200</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000204/">CVE-2018-1000204</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10087/">CVE-2018-10087</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10124/">CVE-2018-10124</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1065/">CVE-2018-1065</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1068/">CVE-2018-1068</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10853/">CVE-2018-10853</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10902/">CVE-2018-10902</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1091/">CVE-2018-1091</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10938/">CVE-2018-10938</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1094/">CVE-2018-1094</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10940/">CVE-2018-10940</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1108/">CVE-2018-1108</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1118/">CVE-2018-1118</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1120/">CVE-2018-1120</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-1128/">CVE-2018-1128</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1129/">CVE-2018-1129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1130/">CVE-2018-1130</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12233/">CVE-2018-12233</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12896/">CVE-2018-12896</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13093/">CVE-2018-13093</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13094/">CVE-2018-13094</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-13095/">CVE-2018-13095</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-13405/">CVE-2018-13405</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-13406/">CVE-2018-13406</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14613/">CVE-2018-14613</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14617/">CVE-2018-14617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-14625/">CVE-2018-14625</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14633/">CVE-2018-14633</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-15572/">CVE-2018-15572</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-16658/">CVE-2018-16658</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16862/">CVE-2018-16862</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16871/">CVE-2018-16871</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16880/">CVE-2018-16880</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-16884/">CVE-2018-16884</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17182/">CVE-2018-17182</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18281/">CVE-2018-18281</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18386/">CVE-2018-18386</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-18397/">CVE-2018-18397</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18445/">CVE-2018-18445</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18710/">CVE-2018-18710</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19407/">CVE-2018-19407</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19824/">CVE-2018-19824</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19854/">CVE-2018-19854</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-19985/">CVE-2018-19985</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20169/">CVE-2018-20169</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20836/">CVE-2018-20836</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20855/">CVE-2018-20855</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20976/">CVE-2018-20976</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-21008/">CVE-2018-21008</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3620/">CVE-2018-3620</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5332/">CVE-2018-5332</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5333/">CVE-2018-5333</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5390/">CVE-2018-5390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5391/">CVE-2018-5391</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5803/">CVE-2018-5803</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5848/">CVE-2018-5848</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6554/">CVE-2018-6554</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-6555/">CVE-2018-6555</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6927/">CVE-2018-6927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7191/">CVE-2018-7191</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7492/">CVE-2018-7492</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7566/">CVE-2018-7566</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7740/">CVE-2018-7740</cve>
	<cve impact="low" cvss3="0/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8043/">CVE-2018-8043</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-8087/">CVE-2018-8087</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8781/">CVE-2018-8781</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8822/">CVE-2018-8822</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9363/">CVE-2018-9363</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9385/">CVE-2018-9385</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-9568/">CVE-2018-9568</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10124/">CVE-2019-10124</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10126/">CVE-2019-10126</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10207/">CVE-2019-10207</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10638/">CVE-2019-10638</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10639/">CVE-2019-10639</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11085/">CVE-2019-11085</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1125/">CVE-2019-1125</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11486/">CVE-2019-11486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11487/">CVE-2019-11487</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11599/">CVE-2019-11599</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11810/">CVE-2019-11810</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11815/">CVE-2019-11815</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11833/">CVE-2019-11833</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11884/">CVE-2019-11884</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12380/">CVE-2019-12380</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12382/">CVE-2019-12382</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12456/">CVE-2019-12456</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12614/">CVE-2019-12614</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12818/">CVE-2019-12818</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-12819/">CVE-2019-12819</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13631/">CVE-2019-13631</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-13648/">CVE-2019-13648</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14283/">CVE-2019-14283</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14284/">CVE-2019-14284</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-14821/">CVE-2019-14821</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14835/">CVE-2019-14835</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15090/">CVE-2019-15090</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15117/">CVE-2019-15117</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15118/">CVE-2019-15118</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15211/">CVE-2019-15211</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-15212/">CVE-2019-15212</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15214/">CVE-2019-15214</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15215/">CVE-2019-15215</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15216/">CVE-2019-15216</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15217/">CVE-2019-15217</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15218/">CVE-2019-15218</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15219/">CVE-2019-15219</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15220/">CVE-2019-15220</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15221/">CVE-2019-15221</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15222/">CVE-2019-15222</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15239/">CVE-2019-15239</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15292/">CVE-2019-15292</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15538/">CVE-2019-15538</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15666/">CVE-2019-15666</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15902/">CVE-2019-15902</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15916/">CVE-2019-15916</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15917/">CVE-2019-15917</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15919/">CVE-2019-15919</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15920/">CVE-2019-15920</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15921/">CVE-2019-15921</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15924/">CVE-2019-15924</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15926/">CVE-2019-15926</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15927/">CVE-2019-15927</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16995/">CVE-2019-16995</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17055/">CVE-2019-17055</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17056/">CVE-2019-17056</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18805/">CVE-2019-18805</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19227/">CVE-2019-19227</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19530/">CVE-2019-19530</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19531/">CVE-2019-19531</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19536/">CVE-2019-19536</cve>
	<cve impact="low" cvss3="2.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19543/">CVE-2019-19543</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2024/">CVE-2019-2024</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3459/">CVE-2019-3459</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3460/">CVE-2019-3460</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3560/">CVE-2019-3560</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3819/">CVE-2019-3819</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3846/">CVE-2019-3846</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3882/">CVE-2019-3882</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5489/">CVE-2019-5489</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6974/">CVE-2019-6974</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-7221/">CVE-2019-7221</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7222/">CVE-2019-7222</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-7308/">CVE-2019-7308</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8564/">CVE-2019-8564</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-8980/">CVE-2019-8980</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9003/">CVE-2019-9003</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9213/">CVE-2019-9213</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9456/">CVE-2019-9456</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9500/">CVE-2019-9500</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9503/">CVE-2019-9503</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9506/">CVE-2019-9506</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488099" comment="kernel-devel-azure-4.12.14-5.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488100" comment="kernel-source-azure-4.12.14-5.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109870" version="1" class="patch">
	<metadata>
		<title>python-azure-agent-2.2.45-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-0804" ref_url="https://www.suse.com/security/cve/CVE-2019-0804/" source="CVE"/>
		<description>
These are all security issues fixed in the python-azure-agent-2.2.45-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-0804/">CVE-2019-0804</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488101" comment="python-azure-agent-2.2.45-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109871" version="1" class="patch">
	<metadata>
		<title>python3-keystoneclient-3.15.0-2.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0105" ref_url="https://www.suse.com/security/cve/CVE-2014-0105/" source="CVE"/>
		<reference ref_id="CVE-2014-7144" ref_url="https://www.suse.com/security/cve/CVE-2014-7144/" source="CVE"/>
		<reference ref_id="CVE-2015-1852" ref_url="https://www.suse.com/security/cve/CVE-2015-1852/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-keystoneclient-3.15.0-2.33 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0105/">CVE-2014-0105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7144/">CVE-2014-7144</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1852/">CVE-2015-1852</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488086" comment="python3-keystoneclient-3.15.0-2.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109872" version="1" class="patch">
	<metadata>
		<title>rmt-server-pubcloud-2.5.4-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-16470" ref_url="https://www.suse.com/security/cve/CVE-2018-16470/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-18904" ref_url="https://www.suse.com/security/cve/CVE-2019-18904/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<description>
These are all security issues fixed in the rmt-server-pubcloud-2.5.4-1.39 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16470/">CVE-2018-16470</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18904/">CVE-2019-18904</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488102" comment="rmt-server-pubcloud-2.5.4-1.39 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109873" version="1" class="patch">
	<metadata>
		<title>terraform-0.12.19-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-19316" ref_url="https://www.suse.com/security/cve/CVE-2019-19316/" source="CVE"/>
		<description>
These are all security issues fixed in the terraform-0.12.19-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Public Cloud 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-19316/">CVE-2019-19316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488103" comment="terraform-0.12.19-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109874" version="1" class="patch">
	<metadata>
		<title>clamsap-0.99.25-2.37 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-2278" ref_url="https://www.suse.com/security/cve/CVE-2015-2278/" source="CVE"/>
		<reference ref_id="CVE-2015-2282" ref_url="https://www.suse.com/security/cve/CVE-2015-2282/" source="CVE"/>
		<description>
These are all security issues fixed in the clamsap-0.99.25-2.37 package on the GA media of SUSE Linux Enterprise Module for SAP Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2278/">CVE-2015-2278</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2282/">CVE-2015-2282</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-sap-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009301516" comment="SUSE Linux Enterprise Module for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488104" comment="clamsap-0.99.25-2.37 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109875" version="1" class="patch">
	<metadata>
		<title>389-ds-1.4.3.9~git0.3eb8617f6-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8105" ref_url="https://www.suse.com/security/cve/CVE-2014-8105/" source="CVE"/>
		<reference ref_id="CVE-2014-8112" ref_url="https://www.suse.com/security/cve/CVE-2014-8112/" source="CVE"/>
		<reference ref_id="CVE-2015-1854" ref_url="https://www.suse.com/security/cve/CVE-2015-1854/" source="CVE"/>
		<reference ref_id="CVE-2015-3230" ref_url="https://www.suse.com/security/cve/CVE-2015-3230/" source="CVE"/>
		<reference ref_id="CVE-2016-4992" ref_url="https://www.suse.com/security/cve/CVE-2016-4992/" source="CVE"/>
		<reference ref_id="CVE-2016-5416" ref_url="https://www.suse.com/security/cve/CVE-2016-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-15134" ref_url="https://www.suse.com/security/cve/CVE-2017-15134/" source="CVE"/>
		<reference ref_id="CVE-2017-15135" ref_url="https://www.suse.com/security/cve/CVE-2017-15135/" source="CVE"/>
		<reference ref_id="CVE-2018-1054" ref_url="https://www.suse.com/security/cve/CVE-2018-1054/" source="CVE"/>
		<reference ref_id="CVE-2018-10850" ref_url="https://www.suse.com/security/cve/CVE-2018-10850/" source="CVE"/>
		<reference ref_id="CVE-2018-10871" ref_url="https://www.suse.com/security/cve/CVE-2018-10871/" source="CVE"/>
		<reference ref_id="CVE-2018-1089" ref_url="https://www.suse.com/security/cve/CVE-2018-1089/" source="CVE"/>
		<reference ref_id="CVE-2018-10935" ref_url="https://www.suse.com/security/cve/CVE-2018-10935/" source="CVE"/>
		<reference ref_id="CVE-2018-14624" ref_url="https://www.suse.com/security/cve/CVE-2018-14624/" source="CVE"/>
		<reference ref_id="CVE-2018-14638" ref_url="https://www.suse.com/security/cve/CVE-2018-14638/" source="CVE"/>
		<reference ref_id="CVE-2018-14648" ref_url="https://www.suse.com/security/cve/CVE-2018-14648/" source="CVE"/>
		<reference ref_id="CVE-2019-14824" ref_url="https://www.suse.com/security/cve/CVE-2019-14824/" source="CVE"/>
		<reference ref_id="CVE-2019-3883" ref_url="https://www.suse.com/security/cve/CVE-2019-3883/" source="CVE"/>
		<description>
These are all security issues fixed in the 389-ds-1.4.3.9~git0.3eb8617f6-1.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-8105/">CVE-2014-8105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8112/">CVE-2014-8112</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1854/">CVE-2015-1854</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3230/">CVE-2015-3230</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4992/">CVE-2016-4992</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5416/">CVE-2016-5416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15134/">CVE-2017-15134</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15135/">CVE-2017-15135</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1054/">CVE-2018-1054</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10850/">CVE-2018-10850</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-10871/">CVE-2018-10871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1089/">CVE-2018-1089</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10935/">CVE-2018-10935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14624/">CVE-2018-14624</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14638/">CVE-2018-14638</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-14648/">CVE-2018-14648</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-14824/">CVE-2019-14824</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3883/">CVE-2019-3883</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488458" comment="389-ds-1.4.3.9~git0.3eb8617f6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488459" comment="389-ds-devel-1.4.3.9~git0.3eb8617f6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488460" comment="lib389-1.4.3.9~git0.3eb8617f6-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488461" comment="libsvrcore0-1.4.3.9~git0.3eb8617f6-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109876" version="1" class="patch">
	<metadata>
		<title>apache2-devel-2.4.43-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-5704" ref_url="https://www.suse.com/security/cve/CVE-2013-5704/" source="CVE"/>
		<reference ref_id="CVE-2014-3581" ref_url="https://www.suse.com/security/cve/CVE-2014-3581/" source="CVE"/>
		<reference ref_id="CVE-2014-3583" ref_url="https://www.suse.com/security/cve/CVE-2014-3583/" source="CVE"/>
		<reference ref_id="CVE-2014-8109" ref_url="https://www.suse.com/security/cve/CVE-2014-8109/" source="CVE"/>
		<reference ref_id="CVE-2015-0228" ref_url="https://www.suse.com/security/cve/CVE-2015-0228/" source="CVE"/>
		<reference ref_id="CVE-2015-0253" ref_url="https://www.suse.com/security/cve/CVE-2015-0253/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2016-0736" ref_url="https://www.suse.com/security/cve/CVE-2016-0736/" source="CVE"/>
		<reference ref_id="CVE-2016-2161" ref_url="https://www.suse.com/security/cve/CVE-2016-2161/" source="CVE"/>
		<reference ref_id="CVE-2016-4979" ref_url="https://www.suse.com/security/cve/CVE-2016-4979/" source="CVE"/>
		<reference ref_id="CVE-2016-5387" ref_url="https://www.suse.com/security/cve/CVE-2016-5387/" source="CVE"/>
		<reference ref_id="CVE-2016-8740" ref_url="https://www.suse.com/security/cve/CVE-2016-8740/" source="CVE"/>
		<reference ref_id="CVE-2016-8743" ref_url="https://www.suse.com/security/cve/CVE-2016-8743/" source="CVE"/>
		<reference ref_id="CVE-2017-9798" ref_url="https://www.suse.com/security/cve/CVE-2017-9798/" source="CVE"/>
		<reference ref_id="CVE-2019-10081" ref_url="https://www.suse.com/security/cve/CVE-2019-10081/" source="CVE"/>
		<reference ref_id="CVE-2019-10082" ref_url="https://www.suse.com/security/cve/CVE-2019-10082/" source="CVE"/>
		<reference ref_id="CVE-2019-10092" ref_url="https://www.suse.com/security/cve/CVE-2019-10092/" source="CVE"/>
		<reference ref_id="CVE-2019-10097" ref_url="https://www.suse.com/security/cve/CVE-2019-10097/" source="CVE"/>
		<reference ref_id="CVE-2019-10098" ref_url="https://www.suse.com/security/cve/CVE-2019-10098/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-devel-2.4.43-1.15 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2013-5704/">CVE-2013-5704</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3581/">CVE-2014-3581</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-3583/">CVE-2014-3583</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8109/">CVE-2014-8109</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0228/">CVE-2015-0228</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0253/">CVE-2015-0253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0736/">CVE-2016-0736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2161/">CVE-2016-2161</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4979/">CVE-2016-4979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5387/">CVE-2016-5387</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8740/">CVE-2016-8740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8743/">CVE-2016-8743</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9798/">CVE-2017-9798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10081/">CVE-2019-10081</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10082/">CVE-2019-10082</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10092/">CVE-2019-10092</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-10097/">CVE-2019-10097</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-10098/">CVE-2019-10098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488462" comment="apache2-devel-2.4.43-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488463" comment="apache2-doc-2.4.43-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488464" comment="apache2-worker-2.4.43-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109877" version="1" class="patch">
	<metadata>
		<title>apache2-mod_apparmor-2.13.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6507" ref_url="https://www.suse.com/security/cve/CVE-2017-6507/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_apparmor-2.13.4-1.4 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6507/">CVE-2017-6507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488465" comment="apache2-mod_apparmor-2.13.4-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109878" version="1" class="patch">
	<metadata>
		<title>apache2-mod_auth_openidc-2.3.8-3.7.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-14857" ref_url="https://www.suse.com/security/cve/CVE-2019-14857/" source="CVE"/>
		<reference ref_id="CVE-2019-20479" ref_url="https://www.suse.com/security/cve/CVE-2019-20479/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_auth_openidc-2.3.8-3.7.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14857/">CVE-2019-14857</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20479/">CVE-2019-20479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488466" comment="apache2-mod_auth_openidc-2.3.8-3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109879" version="1" class="patch">
	<metadata>
		<title>apache2-mod_jk-1.2.43-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-8111" ref_url="https://www.suse.com/security/cve/CVE-2014-8111/" source="CVE"/>
		<reference ref_id="CVE-2018-11759" ref_url="https://www.suse.com/security/cve/CVE-2018-11759/" source="CVE"/>
		<reference ref_id="CVE-2018-1323" ref_url="https://www.suse.com/security/cve/CVE-2018-1323/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_jk-1.2.43-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8111/">CVE-2014-8111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-11759/">CVE-2018-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1323/">CVE-2018-1323</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488467" comment="apache2-mod_jk-1.2.43-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109880" version="1" class="patch">
	<metadata>
		<title>apache2-mod_nss-1.0.17-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-4566" ref_url="https://www.suse.com/security/cve/CVE-2013-4566/" source="CVE"/>
		<reference ref_id="CVE-2014-3566" ref_url="https://www.suse.com/security/cve/CVE-2014-3566/" source="CVE"/>
		<reference ref_id="CVE-2015-5244" ref_url="https://www.suse.com/security/cve/CVE-2015-5244/" source="CVE"/>
		<reference ref_id="CVE-2016-3099" ref_url="https://www.suse.com/security/cve/CVE-2016-3099/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_nss-1.0.17-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4566/">CVE-2013-4566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3566/">CVE-2014-3566</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5244/">CVE-2015-5244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3099/">CVE-2016-3099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488468" comment="apache2-mod_nss-1.0.17-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109881" version="1" class="patch">
	<metadata>
		<title>apache2-mod_security2-2.9.2-1.34 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2009-5031" ref_url="https://www.suse.com/security/cve/CVE-2009-5031/" source="CVE"/>
		<reference ref_id="CVE-2012-2751" ref_url="https://www.suse.com/security/cve/CVE-2012-2751/" source="CVE"/>
		<reference ref_id="CVE-2012-4528" ref_url="https://www.suse.com/security/cve/CVE-2012-4528/" source="CVE"/>
		<reference ref_id="CVE-2013-1915" ref_url="https://www.suse.com/security/cve/CVE-2013-1915/" source="CVE"/>
		<reference ref_id="CVE-2013-2765" ref_url="https://www.suse.com/security/cve/CVE-2013-2765/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_security2-2.9.2-1.34 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-5031/">CVE-2009-5031</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2751/">CVE-2012-2751</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4528/">CVE-2012-4528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1915/">CVE-2013-1915</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2765/">CVE-2013-2765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488116" comment="apache2-mod_security2-2.9.2-1.34 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109882" version="1" class="patch">
	<metadata>
		<title>apache2-mod_wsgi-python3-4.5.18-2.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0240" ref_url="https://www.suse.com/security/cve/CVE-2014-0240/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_wsgi-python3-4.5.18-2.27 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0240/">CVE-2014-0240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488085" comment="apache2-mod_wsgi-python3-4.5.18-2.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109883" version="1" class="patch">
	<metadata>
		<title>bind-9.11.2-12.13.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3214" ref_url="https://www.suse.com/security/cve/CVE-2014-3214/" source="CVE"/>
		<reference ref_id="CVE-2014-3859" ref_url="https://www.suse.com/security/cve/CVE-2014-3859/" source="CVE"/>
		<reference ref_id="CVE-2014-8500" ref_url="https://www.suse.com/security/cve/CVE-2014-8500/" source="CVE"/>
		<reference ref_id="CVE-2014-8680" ref_url="https://www.suse.com/security/cve/CVE-2014-8680/" source="CVE"/>
		<reference ref_id="CVE-2015-1349" ref_url="https://www.suse.com/security/cve/CVE-2015-1349/" source="CVE"/>
		<reference ref_id="CVE-2015-4620" ref_url="https://www.suse.com/security/cve/CVE-2015-4620/" source="CVE"/>
		<reference ref_id="CVE-2015-5477" ref_url="https://www.suse.com/security/cve/CVE-2015-5477/" source="CVE"/>
		<reference ref_id="CVE-2015-5722" ref_url="https://www.suse.com/security/cve/CVE-2015-5722/" source="CVE"/>
		<reference ref_id="CVE-2015-5986" ref_url="https://www.suse.com/security/cve/CVE-2015-5986/" source="CVE"/>
		<reference ref_id="CVE-2015-8000" ref_url="https://www.suse.com/security/cve/CVE-2015-8000/" source="CVE"/>
		<reference ref_id="CVE-2015-8461" ref_url="https://www.suse.com/security/cve/CVE-2015-8461/" source="CVE"/>
		<reference ref_id="CVE-2015-8704" ref_url="https://www.suse.com/security/cve/CVE-2015-8704/" source="CVE"/>
		<reference ref_id="CVE-2015-8705" ref_url="https://www.suse.com/security/cve/CVE-2015-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-1285" ref_url="https://www.suse.com/security/cve/CVE-2016-1285/" source="CVE"/>
		<reference ref_id="CVE-2016-1286" ref_url="https://www.suse.com/security/cve/CVE-2016-1286/" source="CVE"/>
		<reference ref_id="CVE-2016-2088" ref_url="https://www.suse.com/security/cve/CVE-2016-2088/" source="CVE"/>
		<reference ref_id="CVE-2016-2775" ref_url="https://www.suse.com/security/cve/CVE-2016-2775/" source="CVE"/>
		<reference ref_id="CVE-2016-2776" ref_url="https://www.suse.com/security/cve/CVE-2016-2776/" source="CVE"/>
		<reference ref_id="CVE-2016-8864" ref_url="https://www.suse.com/security/cve/CVE-2016-8864/" source="CVE"/>
		<reference ref_id="CVE-2016-9131" ref_url="https://www.suse.com/security/cve/CVE-2016-9131/" source="CVE"/>
		<reference ref_id="CVE-2016-9147" ref_url="https://www.suse.com/security/cve/CVE-2016-9147/" source="CVE"/>
		<reference ref_id="CVE-2016-9444" ref_url="https://www.suse.com/security/cve/CVE-2016-9444/" source="CVE"/>
		<reference ref_id="CVE-2016-9778" ref_url="https://www.suse.com/security/cve/CVE-2016-9778/" source="CVE"/>
		<reference ref_id="CVE-2017-3135" ref_url="https://www.suse.com/security/cve/CVE-2017-3135/" source="CVE"/>
		<reference ref_id="CVE-2017-3137" ref_url="https://www.suse.com/security/cve/CVE-2017-3137/" source="CVE"/>
		<reference ref_id="CVE-2017-3138" ref_url="https://www.suse.com/security/cve/CVE-2017-3138/" source="CVE"/>
		<reference ref_id="CVE-2017-3140" ref_url="https://www.suse.com/security/cve/CVE-2017-3140/" source="CVE"/>
		<reference ref_id="CVE-2017-3141" ref_url="https://www.suse.com/security/cve/CVE-2017-3141/" source="CVE"/>
		<reference ref_id="CVE-2017-3142" ref_url="https://www.suse.com/security/cve/CVE-2017-3142/" source="CVE"/>
		<reference ref_id="CVE-2017-3143" ref_url="https://www.suse.com/security/cve/CVE-2017-3143/" source="CVE"/>
		<reference ref_id="CVE-2017-3145" ref_url="https://www.suse.com/security/cve/CVE-2017-3145/" source="CVE"/>
		<reference ref_id="CVE-2018-5740" ref_url="https://www.suse.com/security/cve/CVE-2018-5740/" source="CVE"/>
		<reference ref_id="CVE-2018-5743" ref_url="https://www.suse.com/security/cve/CVE-2018-5743/" source="CVE"/>
		<reference ref_id="CVE-2018-5745" ref_url="https://www.suse.com/security/cve/CVE-2018-5745/" source="CVE"/>
		<reference ref_id="CVE-2019-6465" ref_url="https://www.suse.com/security/cve/CVE-2019-6465/" source="CVE"/>
		<reference ref_id="CVE-2019-6471" ref_url="https://www.suse.com/security/cve/CVE-2019-6471/" source="CVE"/>
		<description>
These are all security issues fixed in the bind-9.11.2-12.13.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3214/">CVE-2014-3214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-3859/">CVE-2014-3859</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8500/">CVE-2014-8500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8680/">CVE-2014-8680</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1349/">CVE-2015-1349</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4620/">CVE-2015-4620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5477/">CVE-2015-5477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5722/">CVE-2015-5722</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5986/">CVE-2015-5986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8000/">CVE-2015-8000</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8461/">CVE-2015-8461</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8704/">CVE-2015-8704</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8705/">CVE-2015-8705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1285/">CVE-2016-1285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1286/">CVE-2016-1286</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2088/">CVE-2016-2088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2775/">CVE-2016-2775</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-2776/">CVE-2016-2776</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-8864/">CVE-2016-8864</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9131/">CVE-2016-9131</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9147/">CVE-2016-9147</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9444/">CVE-2016-9444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9778/">CVE-2016-9778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3135/">CVE-2017-3135</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3137/">CVE-2017-3137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3138/">CVE-2017-3138</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3140/">CVE-2017-3140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3141/">CVE-2017-3141</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3142/">CVE-2017-3142</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3143/">CVE-2017-3143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3145/">CVE-2017-3145</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5740/">CVE-2018-5740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5743/">CVE-2018-5743</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5745/">CVE-2018-5745</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-6465/">CVE-2019-6465</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-6471/">CVE-2019-6471</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488469" comment="bind-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488470" comment="bind-chrootenv-9.11.2-12.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488471" comment="bind-doc-9.11.2-12.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109884" version="1" class="patch">
	<metadata>
		<title>davfs2-1.5.4-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-4362" ref_url="https://www.suse.com/security/cve/CVE-2014-4362/" source="CVE"/>
		<description>
These are all security issues fixed in the davfs2-1.5.4-1.4 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4362/">CVE-2014-4362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488121" comment="davfs2-1.5.4-1.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109885" version="1" class="patch">
	<metadata>
		<title>dhcp-relay-4.3.5-6.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8605" ref_url="https://www.suse.com/security/cve/CVE-2015-8605/" source="CVE"/>
		<reference ref_id="CVE-2017-3144" ref_url="https://www.suse.com/security/cve/CVE-2017-3144/" source="CVE"/>
		<reference ref_id="CVE-2018-5732" ref_url="https://www.suse.com/security/cve/CVE-2018-5732/" source="CVE"/>
		<reference ref_id="CVE-2018-5733" ref_url="https://www.suse.com/security/cve/CVE-2018-5733/" source="CVE"/>
		<reference ref_id="CVE-2019-6470" ref_url="https://www.suse.com/security/cve/CVE-2019-6470/" source="CVE"/>
		<description>
These are all security issues fixed in the dhcp-relay-4.3.5-6.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8605/">CVE-2015-8605</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-3144/">CVE-2017-3144</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5732/">CVE-2018-5732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5733/">CVE-2018-5733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6470/">CVE-2019-6470</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488472" comment="dhcp-relay-4.3.5-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488473" comment="dhcp-server-4.3.5-6.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109886" version="1" class="patch">
	<metadata>
		<title>dovecot23-2.3.10-15.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14461" ref_url="https://www.suse.com/security/cve/CVE-2017-14461/" source="CVE"/>
		<reference ref_id="CVE-2017-15130" ref_url="https://www.suse.com/security/cve/CVE-2017-15130/" source="CVE"/>
		<reference ref_id="CVE-2017-15132" ref_url="https://www.suse.com/security/cve/CVE-2017-15132/" source="CVE"/>
		<reference ref_id="CVE-2019-11494" ref_url="https://www.suse.com/security/cve/CVE-2019-11494/" source="CVE"/>
		<reference ref_id="CVE-2019-11499" ref_url="https://www.suse.com/security/cve/CVE-2019-11499/" source="CVE"/>
		<reference ref_id="CVE-2019-11500" ref_url="https://www.suse.com/security/cve/CVE-2019-11500/" source="CVE"/>
		<reference ref_id="CVE-2019-19722" ref_url="https://www.suse.com/security/cve/CVE-2019-19722/" source="CVE"/>
		<reference ref_id="CVE-2020-10957" ref_url="https://www.suse.com/security/cve/CVE-2020-10957/" source="CVE"/>
		<reference ref_id="CVE-2020-10958" ref_url="https://www.suse.com/security/cve/CVE-2020-10958/" source="CVE"/>
		<reference ref_id="CVE-2020-10967" ref_url="https://www.suse.com/security/cve/CVE-2020-10967/" source="CVE"/>
		<reference ref_id="CVE-2020-7046" ref_url="https://www.suse.com/security/cve/CVE-2020-7046/" source="CVE"/>
		<reference ref_id="CVE-2020-7957" ref_url="https://www.suse.com/security/cve/CVE-2020-7957/" source="CVE"/>
		<description>
These are all security issues fixed in the dovecot23-2.3.10-15.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14461/">CVE-2017-14461</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15130/">CVE-2017-15130</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15132/">CVE-2017-15132</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11494/">CVE-2019-11494</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-11499/">CVE-2019-11499</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11500/">CVE-2019-11500</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19722/">CVE-2019-19722</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10957/">CVE-2020-10957</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10958/">CVE-2020-10958</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10967/">CVE-2020-10967</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7046/">CVE-2020-7046</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7957/">CVE-2020-7957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488474" comment="dovecot23-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488475" comment="dovecot23-backend-mysql-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488476" comment="dovecot23-backend-pgsql-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488477" comment="dovecot23-backend-sqlite-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488478" comment="dovecot23-devel-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488479" comment="dovecot23-fts-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488480" comment="dovecot23-fts-lucene-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488481" comment="dovecot23-fts-solr-2.3.10-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488482" comment="dovecot23-fts-squat-2.3.10-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109887" version="1" class="patch">
	<metadata>
		<title>dpdk-19.11.1-1.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1059" ref_url="https://www.suse.com/security/cve/CVE-2018-1059/" source="CVE"/>
		<reference ref_id="CVE-2019-14818" ref_url="https://www.suse.com/security/cve/CVE-2019-14818/" source="CVE"/>
		<reference ref_id="CVE-2020-10722" ref_url="https://www.suse.com/security/cve/CVE-2020-10722/" source="CVE"/>
		<reference ref_id="CVE-2020-10723" ref_url="https://www.suse.com/security/cve/CVE-2020-10723/" source="CVE"/>
		<reference ref_id="CVE-2020-10724" ref_url="https://www.suse.com/security/cve/CVE-2020-10724/" source="CVE"/>
		<reference ref_id="CVE-2020-10725" ref_url="https://www.suse.com/security/cve/CVE-2020-10725/" source="CVE"/>
		<reference ref_id="CVE-2020-10726" ref_url="https://www.suse.com/security/cve/CVE-2020-10726/" source="CVE"/>
		<description>
These are all security issues fixed in the dpdk-19.11.1-1.3 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1059/">CVE-2018-1059</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14818/">CVE-2019-14818</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10722/">CVE-2020-10722</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10723/">CVE-2020-10723</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10724/">CVE-2020-10724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-10725/">CVE-2020-10725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10726/">CVE-2020-10726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488483" comment="dpdk-19.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488484" comment="dpdk-devel-19.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488485" comment="dpdk-kmp-default-19.11.1_k5.3.18_22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488486" comment="dpdk-thunderx-19.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488487" comment="dpdk-thunderx-devel-19.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488488" comment="dpdk-thunderx-kmp-default-19.11.1_k5.3.18_22-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488489" comment="dpdk-tools-19.11.1-1.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488490" comment="libdpdk-20_0-19.11.1-1.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109888" version="1" class="patch">
	<metadata>
		<title>erlang-rabbitmq-client-3.8.3-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9494" ref_url="https://www.suse.com/security/cve/CVE-2014-9494/" source="CVE"/>
		<reference ref_id="CVE-2015-0862" ref_url="https://www.suse.com/security/cve/CVE-2015-0862/" source="CVE"/>
		<reference ref_id="CVE-2016-9877" ref_url="https://www.suse.com/security/cve/CVE-2016-9877/" source="CVE"/>
		<description>
These are all security issues fixed in the erlang-rabbitmq-client-3.8.3-1.27 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9494/">CVE-2014-9494</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0862/">CVE-2015-0862</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-9877/">CVE-2016-9877</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488491" comment="erlang-rabbitmq-client-3.8.3-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488492" comment="rabbitmq-server-3.8.3-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488493" comment="rabbitmq-server-plugins-3.8.3-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109889" version="1" class="patch">
	<metadata>
		<title>freeradius-server-3.0.21-1.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-4680" ref_url="https://www.suse.com/security/cve/CVE-2015-4680/" source="CVE"/>
		<reference ref_id="CVE-2015-8763" ref_url="https://www.suse.com/security/cve/CVE-2015-8763/" source="CVE"/>
		<reference ref_id="CVE-2017-10978" ref_url="https://www.suse.com/security/cve/CVE-2017-10978/" source="CVE"/>
		<reference ref_id="CVE-2017-10983" ref_url="https://www.suse.com/security/cve/CVE-2017-10983/" source="CVE"/>
		<reference ref_id="CVE-2017-10984" ref_url="https://www.suse.com/security/cve/CVE-2017-10984/" source="CVE"/>
		<reference ref_id="CVE-2017-10985" ref_url="https://www.suse.com/security/cve/CVE-2017-10985/" source="CVE"/>
		<reference ref_id="CVE-2017-10986" ref_url="https://www.suse.com/security/cve/CVE-2017-10986/" source="CVE"/>
		<reference ref_id="CVE-2017-10987" ref_url="https://www.suse.com/security/cve/CVE-2017-10987/" source="CVE"/>
		<reference ref_id="CVE-2017-10988" ref_url="https://www.suse.com/security/cve/CVE-2017-10988/" source="CVE"/>
		<reference ref_id="CVE-2017-9148" ref_url="https://www.suse.com/security/cve/CVE-2017-9148/" source="CVE"/>
		<reference ref_id="CVE-2019-11234" ref_url="https://www.suse.com/security/cve/CVE-2019-11234/" source="CVE"/>
		<reference ref_id="CVE-2019-11235" ref_url="https://www.suse.com/security/cve/CVE-2019-11235/" source="CVE"/>
		<reference ref_id="CVE-2019-13456" ref_url="https://www.suse.com/security/cve/CVE-2019-13456/" source="CVE"/>
		<reference ref_id="CVE-2019-17185" ref_url="https://www.suse.com/security/cve/CVE-2019-17185/" source="CVE"/>
		<description>
These are all security issues fixed in the freeradius-server-3.0.21-1.33 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4680/">CVE-2015-4680</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8763/">CVE-2015-8763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10978/">CVE-2017-10978</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10983/">CVE-2017-10983</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-10984/">CVE-2017-10984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10985/">CVE-2017-10985</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10986/">CVE-2017-10986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10987/">CVE-2017-10987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10988/">CVE-2017-10988</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-9148/">CVE-2017-9148</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11234/">CVE-2019-11234</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11235/">CVE-2019-11235</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13456/">CVE-2019-13456</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17185/">CVE-2019-17185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488494" comment="freeradius-server-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488495" comment="freeradius-server-devel-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488496" comment="freeradius-server-krb5-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488497" comment="freeradius-server-ldap-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488498" comment="freeradius-server-libs-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488499" comment="freeradius-server-mysql-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488500" comment="freeradius-server-perl-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488501" comment="freeradius-server-postgresql-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488502" comment="freeradius-server-python3-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488503" comment="freeradius-server-sqlite-3.0.21-1.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488504" comment="freeradius-server-utils-3.0.21-1.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109890" version="1" class="patch">
	<metadata>
		<title>gnuplot-5.2.2-3.3.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-9670" ref_url="https://www.suse.com/security/cve/CVE-2017-9670/" source="CVE"/>
		<reference ref_id="CVE-2018-19490" ref_url="https://www.suse.com/security/cve/CVE-2018-19490/" source="CVE"/>
		<reference ref_id="CVE-2018-19491" ref_url="https://www.suse.com/security/cve/CVE-2018-19491/" source="CVE"/>
		<reference ref_id="CVE-2018-19492" ref_url="https://www.suse.com/security/cve/CVE-2018-19492/" source="CVE"/>
		<description>
These are all security issues fixed in the gnuplot-5.2.2-3.3.29 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9670/">CVE-2017-9670</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19490/">CVE-2018-19490</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19491/">CVE-2018-19491</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19492/">CVE-2018-19492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488340" comment="gnuplot-5.2.2-3.3.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488341" comment="gnuplot-doc-5.2.2-3.3.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109891" version="1" class="patch">
	<metadata>
		<title>graphviz-tcl-2.40.1-6.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<description>
These are all security issues fixed in the graphviz-tcl-2.40.1-6.3.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488505" comment="graphviz-tcl-2.40.1-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109892" version="1" class="patch">
	<metadata>
		<title>grub2-x86_64-xen-2.04-7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8370" ref_url="https://www.suse.com/security/cve/CVE-2015-8370/" source="CVE"/>
		<description>
These are all security issues fixed in the grub2-x86_64-xen-2.04-7.9 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8370/">CVE-2015-8370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488506" comment="grub2-x86_64-xen-2.04-7.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109893" version="1" class="patch">
	<metadata>
		<title>gtk-vnc-devel-1.0.0-2.35 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5884" ref_url="https://www.suse.com/security/cve/CVE-2017-5884/" source="CVE"/>
		<reference ref_id="CVE-2017-5885" ref_url="https://www.suse.com/security/cve/CVE-2017-5885/" source="CVE"/>
		<description>
These are all security issues fixed in the gtk-vnc-devel-1.0.0-2.35 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5884/">CVE-2017-5884</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5885/">CVE-2017-5885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488507" comment="gtk-vnc-devel-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488508" comment="libgvncpulse-1_0-0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488509" comment="typelib-1_0-GVnc-1_0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488510" comment="typelib-1_0-GVncPulse-1_0-1.0.0-2.35 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488156" comment="typelib-1_0-GtkVnc-1_0-0.7.2-1.32 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488511" comment="typelib-1_0-GtkVnc-2_0-1.0.0-2.35 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109894" version="1" class="patch">
	<metadata>
		<title>ipmitool-bmc-snmp-proxy-1.8.18+git20200204.7ccea28-1.22 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-5208" ref_url="https://www.suse.com/security/cve/CVE-2020-5208/" source="CVE"/>
		<description>
These are all security issues fixed in the ipmitool-bmc-snmp-proxy-1.8.18+git20200204.7ccea28-1.22 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-5208/">CVE-2020-5208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488512" comment="ipmitool-bmc-snmp-proxy-1.8.18+git20200204.7ccea28-1.22 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109895" version="1" class="patch">
	<metadata>
		<title>krb5-plugin-kdb-ldap-1.16.3-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-5351" ref_url="https://www.suse.com/security/cve/CVE-2014-5351/" source="CVE"/>
		<reference ref_id="CVE-2014-5352" ref_url="https://www.suse.com/security/cve/CVE-2014-5352/" source="CVE"/>
		<reference ref_id="CVE-2014-5353" ref_url="https://www.suse.com/security/cve/CVE-2014-5353/" source="CVE"/>
		<reference ref_id="CVE-2014-5354" ref_url="https://www.suse.com/security/cve/CVE-2014-5354/" source="CVE"/>
		<reference ref_id="CVE-2014-5355" ref_url="https://www.suse.com/security/cve/CVE-2014-5355/" source="CVE"/>
		<reference ref_id="CVE-2014-9421" ref_url="https://www.suse.com/security/cve/CVE-2014-9421/" source="CVE"/>
		<reference ref_id="CVE-2014-9422" ref_url="https://www.suse.com/security/cve/CVE-2014-9422/" source="CVE"/>
		<reference ref_id="CVE-2014-9423" ref_url="https://www.suse.com/security/cve/CVE-2014-9423/" source="CVE"/>
		<reference ref_id="CVE-2015-2694" ref_url="https://www.suse.com/security/cve/CVE-2015-2694/" source="CVE"/>
		<reference ref_id="CVE-2015-2695" ref_url="https://www.suse.com/security/cve/CVE-2015-2695/" source="CVE"/>
		<reference ref_id="CVE-2015-2696" ref_url="https://www.suse.com/security/cve/CVE-2015-2696/" source="CVE"/>
		<reference ref_id="CVE-2015-2697" ref_url="https://www.suse.com/security/cve/CVE-2015-2697/" source="CVE"/>
		<reference ref_id="CVE-2015-2698" ref_url="https://www.suse.com/security/cve/CVE-2015-2698/" source="CVE"/>
		<reference ref_id="CVE-2015-8629" ref_url="https://www.suse.com/security/cve/CVE-2015-8629/" source="CVE"/>
		<reference ref_id="CVE-2015-8630" ref_url="https://www.suse.com/security/cve/CVE-2015-8630/" source="CVE"/>
		<reference ref_id="CVE-2015-8631" ref_url="https://www.suse.com/security/cve/CVE-2015-8631/" source="CVE"/>
		<reference ref_id="CVE-2016-3119" ref_url="https://www.suse.com/security/cve/CVE-2016-3119/" source="CVE"/>
		<reference ref_id="CVE-2016-3120" ref_url="https://www.suse.com/security/cve/CVE-2016-3120/" source="CVE"/>
		<reference ref_id="CVE-2017-11368" ref_url="https://www.suse.com/security/cve/CVE-2017-11368/" source="CVE"/>
		<reference ref_id="CVE-2017-11462" ref_url="https://www.suse.com/security/cve/CVE-2017-11462/" source="CVE"/>
		<reference ref_id="CVE-2018-20217" ref_url="https://www.suse.com/security/cve/CVE-2018-20217/" source="CVE"/>
		<reference ref_id="CVE-2018-5729" ref_url="https://www.suse.com/security/cve/CVE-2018-5729/" source="CVE"/>
		<reference ref_id="CVE-2018-5730" ref_url="https://www.suse.com/security/cve/CVE-2018-5730/" source="CVE"/>
		<description>
These are all security issues fixed in the krb5-plugin-kdb-ldap-1.16.3-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5351/">CVE-2014-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5352/">CVE-2014-5352</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5353/">CVE-2014-5353</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-5354/">CVE-2014-5354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-5355/">CVE-2014-5355</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9421/">CVE-2014-9421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9422/">CVE-2014-9422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9423/">CVE-2014-9423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2694/">CVE-2015-2694</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2695/">CVE-2015-2695</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-2696/">CVE-2015-2696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2697/">CVE-2015-2697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2698/">CVE-2015-2698</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8629/">CVE-2015-8629</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8630/">CVE-2015-8630</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8631/">CVE-2015-8631</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3119/">CVE-2016-3119</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-3120/">CVE-2016-3120</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11368/">CVE-2017-11368</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-11462/">CVE-2017-11462</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20217/">CVE-2018-20217</cve>
	<cve impact="moderate" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5729/">CVE-2018-5729</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5730/">CVE-2018-5730</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488513" comment="krb5-plugin-kdb-ldap-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488514" comment="krb5-server-1.16.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109896" version="1" class="patch">
	<metadata>
		<title>libapr-util1-dbd-mysql-1.6.1-10.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-12618" ref_url="https://www.suse.com/security/cve/CVE-2017-12618/" source="CVE"/>
		<description>
These are all security issues fixed in the libapr-util1-dbd-mysql-1.6.1-10.21 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="2.3/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-12618/">CVE-2017-12618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488515" comment="libapr-util1-dbd-mysql-1.6.1-10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488516" comment="libapr-util1-dbd-pgsql-1.6.1-10.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488517" comment="libapr-util1-dbd-sqlite3-1.6.1-10.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109897" version="1" class="patch">
	<metadata>
		<title>libcacard-devel-2.5.3-1.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-6414" ref_url="https://www.suse.com/security/cve/CVE-2017-6414/" source="CVE"/>
		<description>
These are all security issues fixed in the libcacard-devel-2.5.3-1.27 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6414/">CVE-2017-6414</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488172" comment="libcacard-devel-2.5.3-1.27 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488173" comment="libcacard0-2.5.3-1.27 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109898" version="1" class="patch">
	<metadata>
		<title>libct4-1.1.36-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508/" source="CVE"/>
		<description>
These are all security issues fixed in the libct4-1.1.36-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488518" comment="libct4-1.1.36-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109899" version="1" class="patch">
	<metadata>
		<title>libecpg6-12.2-6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
These are all security issues fixed in the libecpg6-12.2-6.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488519" comment="libecpg6-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488520" comment="postgresql12-contrib-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488521" comment="postgresql12-devel-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488522" comment="postgresql12-docs-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488523" comment="postgresql12-plperl-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488524" comment="postgresql12-plpython-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488525" comment="postgresql12-pltcl-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488526" comment="postgresql12-server-12.2-6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488527" comment="postgresql12-server-devel-12.2-6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109900" version="1" class="patch">
	<metadata>
		<title>libfpm_pb0-1.1.1-2.29 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-1674" ref_url="https://www.suse.com/security/cve/CVE-2010-1674/" source="CVE"/>
		<reference ref_id="CVE-2010-1675" ref_url="https://www.suse.com/security/cve/CVE-2010-1675/" source="CVE"/>
		<reference ref_id="CVE-2013-2236" ref_url="https://www.suse.com/security/cve/CVE-2013-2236/" source="CVE"/>
		<reference ref_id="CVE-2016-1245" ref_url="https://www.suse.com/security/cve/CVE-2016-1245/" source="CVE"/>
		<reference ref_id="CVE-2016-2342" ref_url="https://www.suse.com/security/cve/CVE-2016-2342/" source="CVE"/>
		<reference ref_id="CVE-2016-4049" ref_url="https://www.suse.com/security/cve/CVE-2016-4049/" source="CVE"/>
		<reference ref_id="CVE-2017-16227" ref_url="https://www.suse.com/security/cve/CVE-2017-16227/" source="CVE"/>
		<reference ref_id="CVE-2017-5495" ref_url="https://www.suse.com/security/cve/CVE-2017-5495/" source="CVE"/>
		<reference ref_id="CVE-2018-5378" ref_url="https://www.suse.com/security/cve/CVE-2018-5378/" source="CVE"/>
		<reference ref_id="CVE-2018-5379" ref_url="https://www.suse.com/security/cve/CVE-2018-5379/" source="CVE"/>
		<reference ref_id="CVE-2018-5380" ref_url="https://www.suse.com/security/cve/CVE-2018-5380/" source="CVE"/>
		<reference ref_id="CVE-2018-5381" ref_url="https://www.suse.com/security/cve/CVE-2018-5381/" source="CVE"/>
		<description>
These are all security issues fixed in the libfpm_pb0-1.1.1-2.29 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2010-1674/">CVE-2010-1674</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-1675/">CVE-2010-1675</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2236/">CVE-2013-2236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1245/">CVE-2016-1245</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2342/">CVE-2016-2342</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4049/">CVE-2016-4049</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-16227/">CVE-2017-16227</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5495/">CVE-2017-5495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5378/">CVE-2018-5378</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5379/">CVE-2018-5379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5380/">CVE-2018-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5381/">CVE-2018-5381</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488182" comment="libfpm_pb0-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488183" comment="libospf0-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488184" comment="libospfapiclient0-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488185" comment="libquagga_pb0-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488186" comment="libzebra1-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488187" comment="quagga-1.1.1-2.29 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488188" comment="quagga-devel-1.1.1-2.29 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109901" version="1" class="patch">
	<metadata>
		<title>libfreebl3-hmac-3.47.1-3.37.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-1569" ref_url="https://www.suse.com/security/cve/CVE-2014-1569/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2834" ref_url="https://www.suse.com/security/cve/CVE-2016-2834/" source="CVE"/>
		<reference ref_id="CVE-2018-0495" ref_url="https://www.suse.com/security/cve/CVE-2018-0495/" source="CVE"/>
		<reference ref_id="CVE-2018-12384" ref_url="https://www.suse.com/security/cve/CVE-2018-12384/" source="CVE"/>
		<reference ref_id="CVE-2018-12404" ref_url="https://www.suse.com/security/cve/CVE-2018-12404/" source="CVE"/>
		<reference ref_id="CVE-2018-18508" ref_url="https://www.suse.com/security/cve/CVE-2018-18508/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<description>
These are all security issues fixed in the libfreebl3-hmac-3.47.1-3.37.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1569/">CVE-2014-1569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2834/">CVE-2016-2834</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0495/">CVE-2018-0495</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12384/">CVE-2018-12384</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12404/">CVE-2018-12404</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18508/">CVE-2018-18508</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488528" comment="libfreebl3-hmac-3.47.1-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488529" comment="libsoftokn3-hmac-3.47.1-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109902" version="1" class="patch">
	<metadata>
		<title>libicu60_2-60.2-3.9.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<description>
These are all security issues fixed in the libicu60_2-60.2-3.9.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488530" comment="libicu60_2-60.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488531" comment="libicu60_2-bedata-60.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488532" comment="libicu60_2-ledata-60.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109903" version="1" class="patch">
	<metadata>
		<title>libmariadb-devel-3.1.8-3.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadb-devel-3.1.8-3.18.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488533" comment="libmariadb-devel-3.1.8-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488534" comment="libmariadb_plugins-3.1.8-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109904" version="1" class="patch">
	<metadata>
		<title>libmariadbd-devel-10.4.13-1.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-4792" ref_url="https://www.suse.com/security/cve/CVE-2015-4792/" source="CVE"/>
		<reference ref_id="CVE-2015-4802" ref_url="https://www.suse.com/security/cve/CVE-2015-4802/" source="CVE"/>
		<reference ref_id="CVE-2015-4807" ref_url="https://www.suse.com/security/cve/CVE-2015-4807/" source="CVE"/>
		<reference ref_id="CVE-2015-4815" ref_url="https://www.suse.com/security/cve/CVE-2015-4815/" source="CVE"/>
		<reference ref_id="CVE-2015-4816" ref_url="https://www.suse.com/security/cve/CVE-2015-4816/" source="CVE"/>
		<reference ref_id="CVE-2015-4819" ref_url="https://www.suse.com/security/cve/CVE-2015-4819/" source="CVE"/>
		<reference ref_id="CVE-2015-4826" ref_url="https://www.suse.com/security/cve/CVE-2015-4826/" source="CVE"/>
		<reference ref_id="CVE-2015-4830" ref_url="https://www.suse.com/security/cve/CVE-2015-4830/" source="CVE"/>
		<reference ref_id="CVE-2015-4836" ref_url="https://www.suse.com/security/cve/CVE-2015-4836/" source="CVE"/>
		<reference ref_id="CVE-2015-4858" ref_url="https://www.suse.com/security/cve/CVE-2015-4858/" source="CVE"/>
		<reference ref_id="CVE-2015-4861" ref_url="https://www.suse.com/security/cve/CVE-2015-4861/" source="CVE"/>
		<reference ref_id="CVE-2015-4864" ref_url="https://www.suse.com/security/cve/CVE-2015-4864/" source="CVE"/>
		<reference ref_id="CVE-2015-4866" ref_url="https://www.suse.com/security/cve/CVE-2015-4866/" source="CVE"/>
		<reference ref_id="CVE-2015-4870" ref_url="https://www.suse.com/security/cve/CVE-2015-4870/" source="CVE"/>
		<reference ref_id="CVE-2015-4879" ref_url="https://www.suse.com/security/cve/CVE-2015-4879/" source="CVE"/>
		<reference ref_id="CVE-2015-4895" ref_url="https://www.suse.com/security/cve/CVE-2015-4895/" source="CVE"/>
		<reference ref_id="CVE-2015-4913" ref_url="https://www.suse.com/security/cve/CVE-2015-4913/" source="CVE"/>
		<reference ref_id="CVE-2015-5969" ref_url="https://www.suse.com/security/cve/CVE-2015-5969/" source="CVE"/>
		<reference ref_id="CVE-2015-7744" ref_url="https://www.suse.com/security/cve/CVE-2015-7744/" source="CVE"/>
		<reference ref_id="CVE-2016-0505" ref_url="https://www.suse.com/security/cve/CVE-2016-0505/" source="CVE"/>
		<reference ref_id="CVE-2016-0546" ref_url="https://www.suse.com/security/cve/CVE-2016-0546/" source="CVE"/>
		<reference ref_id="CVE-2016-0596" ref_url="https://www.suse.com/security/cve/CVE-2016-0596/" source="CVE"/>
		<reference ref_id="CVE-2016-0597" ref_url="https://www.suse.com/security/cve/CVE-2016-0597/" source="CVE"/>
		<reference ref_id="CVE-2016-0598" ref_url="https://www.suse.com/security/cve/CVE-2016-0598/" source="CVE"/>
		<reference ref_id="CVE-2016-0600" ref_url="https://www.suse.com/security/cve/CVE-2016-0600/" source="CVE"/>
		<reference ref_id="CVE-2016-0606" ref_url="https://www.suse.com/security/cve/CVE-2016-0606/" source="CVE"/>
		<reference ref_id="CVE-2016-0608" ref_url="https://www.suse.com/security/cve/CVE-2016-0608/" source="CVE"/>
		<reference ref_id="CVE-2016-0609" ref_url="https://www.suse.com/security/cve/CVE-2016-0609/" source="CVE"/>
		<reference ref_id="CVE-2016-0610" ref_url="https://www.suse.com/security/cve/CVE-2016-0610/" source="CVE"/>
		<reference ref_id="CVE-2016-0616" ref_url="https://www.suse.com/security/cve/CVE-2016-0616/" source="CVE"/>
		<reference ref_id="CVE-2016-0640" ref_url="https://www.suse.com/security/cve/CVE-2016-0640/" source="CVE"/>
		<reference ref_id="CVE-2016-0641" ref_url="https://www.suse.com/security/cve/CVE-2016-0641/" source="CVE"/>
		<reference ref_id="CVE-2016-0642" ref_url="https://www.suse.com/security/cve/CVE-2016-0642/" source="CVE"/>
		<reference ref_id="CVE-2016-0644" ref_url="https://www.suse.com/security/cve/CVE-2016-0644/" source="CVE"/>
		<reference ref_id="CVE-2016-0646" ref_url="https://www.suse.com/security/cve/CVE-2016-0646/" source="CVE"/>
		<reference ref_id="CVE-2016-0649" ref_url="https://www.suse.com/security/cve/CVE-2016-0649/" source="CVE"/>
		<reference ref_id="CVE-2016-0650" ref_url="https://www.suse.com/security/cve/CVE-2016-0650/" source="CVE"/>
		<reference ref_id="CVE-2016-0651" ref_url="https://www.suse.com/security/cve/CVE-2016-0651/" source="CVE"/>
		<reference ref_id="CVE-2016-0668" ref_url="https://www.suse.com/security/cve/CVE-2016-0668/" source="CVE"/>
		<reference ref_id="CVE-2016-2047" ref_url="https://www.suse.com/security/cve/CVE-2016-2047/" source="CVE"/>
		<reference ref_id="CVE-2016-3477" ref_url="https://www.suse.com/security/cve/CVE-2016-3477/" source="CVE"/>
		<reference ref_id="CVE-2016-3492" ref_url="https://www.suse.com/security/cve/CVE-2016-3492/" source="CVE"/>
		<reference ref_id="CVE-2016-3521" ref_url="https://www.suse.com/security/cve/CVE-2016-3521/" source="CVE"/>
		<reference ref_id="CVE-2016-3615" ref_url="https://www.suse.com/security/cve/CVE-2016-3615/" source="CVE"/>
		<reference ref_id="CVE-2016-5440" ref_url="https://www.suse.com/security/cve/CVE-2016-5440/" source="CVE"/>
		<reference ref_id="CVE-2016-5584" ref_url="https://www.suse.com/security/cve/CVE-2016-5584/" source="CVE"/>
		<reference ref_id="CVE-2016-5624" ref_url="https://www.suse.com/security/cve/CVE-2016-5624/" source="CVE"/>
		<reference ref_id="CVE-2016-5626" ref_url="https://www.suse.com/security/cve/CVE-2016-5626/" source="CVE"/>
		<reference ref_id="CVE-2016-5629" ref_url="https://www.suse.com/security/cve/CVE-2016-5629/" source="CVE"/>
		<reference ref_id="CVE-2016-6662" ref_url="https://www.suse.com/security/cve/CVE-2016-6662/" source="CVE"/>
		<reference ref_id="CVE-2016-6663" ref_url="https://www.suse.com/security/cve/CVE-2016-6663/" source="CVE"/>
		<reference ref_id="CVE-2016-6664" ref_url="https://www.suse.com/security/cve/CVE-2016-6664/" source="CVE"/>
		<reference ref_id="CVE-2016-7440" ref_url="https://www.suse.com/security/cve/CVE-2016-7440/" source="CVE"/>
		<reference ref_id="CVE-2016-8283" ref_url="https://www.suse.com/security/cve/CVE-2016-8283/" source="CVE"/>
		<reference ref_id="CVE-2016-9843" ref_url="https://www.suse.com/security/cve/CVE-2016-9843/" source="CVE"/>
		<reference ref_id="CVE-2017-10268" ref_url="https://www.suse.com/security/cve/CVE-2017-10268/" source="CVE"/>
		<reference ref_id="CVE-2017-10286" ref_url="https://www.suse.com/security/cve/CVE-2017-10286/" source="CVE"/>
		<reference ref_id="CVE-2017-10320" ref_url="https://www.suse.com/security/cve/CVE-2017-10320/" source="CVE"/>
		<reference ref_id="CVE-2017-10365" ref_url="https://www.suse.com/security/cve/CVE-2017-10365/" source="CVE"/>
		<reference ref_id="CVE-2017-10378" ref_url="https://www.suse.com/security/cve/CVE-2017-10378/" source="CVE"/>
		<reference ref_id="CVE-2017-10379" ref_url="https://www.suse.com/security/cve/CVE-2017-10379/" source="CVE"/>
		<reference ref_id="CVE-2017-10384" ref_url="https://www.suse.com/security/cve/CVE-2017-10384/" source="CVE"/>
		<reference ref_id="CVE-2017-15365" ref_url="https://www.suse.com/security/cve/CVE-2017-15365/" source="CVE"/>
		<reference ref_id="CVE-2017-3238" ref_url="https://www.suse.com/security/cve/CVE-2017-3238/" source="CVE"/>
		<reference ref_id="CVE-2017-3243" ref_url="https://www.suse.com/security/cve/CVE-2017-3243/" source="CVE"/>
		<reference ref_id="CVE-2017-3244" ref_url="https://www.suse.com/security/cve/CVE-2017-3244/" source="CVE"/>
		<reference ref_id="CVE-2017-3257" ref_url="https://www.suse.com/security/cve/CVE-2017-3257/" source="CVE"/>
		<reference ref_id="CVE-2017-3258" ref_url="https://www.suse.com/security/cve/CVE-2017-3258/" source="CVE"/>
		<reference ref_id="CVE-2017-3265" ref_url="https://www.suse.com/security/cve/CVE-2017-3265/" source="CVE"/>
		<reference ref_id="CVE-2017-3291" ref_url="https://www.suse.com/security/cve/CVE-2017-3291/" source="CVE"/>
		<reference ref_id="CVE-2017-3302" ref_url="https://www.suse.com/security/cve/CVE-2017-3302/" source="CVE"/>
		<reference ref_id="CVE-2017-3308" ref_url="https://www.suse.com/security/cve/CVE-2017-3308/" source="CVE"/>
		<reference ref_id="CVE-2017-3309" ref_url="https://www.suse.com/security/cve/CVE-2017-3309/" source="CVE"/>
		<reference ref_id="CVE-2017-3312" ref_url="https://www.suse.com/security/cve/CVE-2017-3312/" source="CVE"/>
		<reference ref_id="CVE-2017-3313" ref_url="https://www.suse.com/security/cve/CVE-2017-3313/" source="CVE"/>
		<reference ref_id="CVE-2017-3317" ref_url="https://www.suse.com/security/cve/CVE-2017-3317/" source="CVE"/>
		<reference ref_id="CVE-2017-3318" ref_url="https://www.suse.com/security/cve/CVE-2017-3318/" source="CVE"/>
		<reference ref_id="CVE-2017-3453" ref_url="https://www.suse.com/security/cve/CVE-2017-3453/" source="CVE"/>
		<reference ref_id="CVE-2017-3456" ref_url="https://www.suse.com/security/cve/CVE-2017-3456/" source="CVE"/>
		<reference ref_id="CVE-2017-3464" ref_url="https://www.suse.com/security/cve/CVE-2017-3464/" source="CVE"/>
		<reference ref_id="CVE-2017-3636" ref_url="https://www.suse.com/security/cve/CVE-2017-3636/" source="CVE"/>
		<reference ref_id="CVE-2017-3641" ref_url="https://www.suse.com/security/cve/CVE-2017-3641/" source="CVE"/>
		<reference ref_id="CVE-2017-3653" ref_url="https://www.suse.com/security/cve/CVE-2017-3653/" source="CVE"/>
		<reference ref_id="CVE-2018-2562" ref_url="https://www.suse.com/security/cve/CVE-2018-2562/" source="CVE"/>
		<reference ref_id="CVE-2018-2612" ref_url="https://www.suse.com/security/cve/CVE-2018-2612/" source="CVE"/>
		<reference ref_id="CVE-2018-2622" ref_url="https://www.suse.com/security/cve/CVE-2018-2622/" source="CVE"/>
		<reference ref_id="CVE-2018-2640" ref_url="https://www.suse.com/security/cve/CVE-2018-2640/" source="CVE"/>
		<reference ref_id="CVE-2018-2665" ref_url="https://www.suse.com/security/cve/CVE-2018-2665/" source="CVE"/>
		<reference ref_id="CVE-2018-2668" ref_url="https://www.suse.com/security/cve/CVE-2018-2668/" source="CVE"/>
		<reference ref_id="CVE-2018-2755" ref_url="https://www.suse.com/security/cve/CVE-2018-2755/" source="CVE"/>
		<reference ref_id="CVE-2018-2759" ref_url="https://www.suse.com/security/cve/CVE-2018-2759/" source="CVE"/>
		<reference ref_id="CVE-2018-2761" ref_url="https://www.suse.com/security/cve/CVE-2018-2761/" source="CVE"/>
		<reference ref_id="CVE-2018-2766" ref_url="https://www.suse.com/security/cve/CVE-2018-2766/" source="CVE"/>
		<reference ref_id="CVE-2018-2767" ref_url="https://www.suse.com/security/cve/CVE-2018-2767/" source="CVE"/>
		<reference ref_id="CVE-2018-2771" ref_url="https://www.suse.com/security/cve/CVE-2018-2771/" source="CVE"/>
		<reference ref_id="CVE-2018-2777" ref_url="https://www.suse.com/security/cve/CVE-2018-2777/" source="CVE"/>
		<reference ref_id="CVE-2018-2781" ref_url="https://www.suse.com/security/cve/CVE-2018-2781/" source="CVE"/>
		<reference ref_id="CVE-2018-2782" ref_url="https://www.suse.com/security/cve/CVE-2018-2782/" source="CVE"/>
		<reference ref_id="CVE-2018-2784" ref_url="https://www.suse.com/security/cve/CVE-2018-2784/" source="CVE"/>
		<reference ref_id="CVE-2018-2786" ref_url="https://www.suse.com/security/cve/CVE-2018-2786/" source="CVE"/>
		<reference ref_id="CVE-2018-2787" ref_url="https://www.suse.com/security/cve/CVE-2018-2787/" source="CVE"/>
		<reference ref_id="CVE-2018-2810" ref_url="https://www.suse.com/security/cve/CVE-2018-2810/" source="CVE"/>
		<reference ref_id="CVE-2018-2813" ref_url="https://www.suse.com/security/cve/CVE-2018-2813/" source="CVE"/>
		<reference ref_id="CVE-2018-2817" ref_url="https://www.suse.com/security/cve/CVE-2018-2817/" source="CVE"/>
		<reference ref_id="CVE-2018-2819" ref_url="https://www.suse.com/security/cve/CVE-2018-2819/" source="CVE"/>
		<reference ref_id="CVE-2018-3058" ref_url="https://www.suse.com/security/cve/CVE-2018-3058/" source="CVE"/>
		<reference ref_id="CVE-2018-3060" ref_url="https://www.suse.com/security/cve/CVE-2018-3060/" source="CVE"/>
		<reference ref_id="CVE-2018-3063" ref_url="https://www.suse.com/security/cve/CVE-2018-3063/" source="CVE"/>
		<reference ref_id="CVE-2018-3064" ref_url="https://www.suse.com/security/cve/CVE-2018-3064/" source="CVE"/>
		<reference ref_id="CVE-2018-3066" ref_url="https://www.suse.com/security/cve/CVE-2018-3066/" source="CVE"/>
		<reference ref_id="CVE-2018-3143" ref_url="https://www.suse.com/security/cve/CVE-2018-3143/" source="CVE"/>
		<reference ref_id="CVE-2018-3156" ref_url="https://www.suse.com/security/cve/CVE-2018-3156/" source="CVE"/>
		<reference ref_id="CVE-2018-3162" ref_url="https://www.suse.com/security/cve/CVE-2018-3162/" source="CVE"/>
		<reference ref_id="CVE-2018-3173" ref_url="https://www.suse.com/security/cve/CVE-2018-3173/" source="CVE"/>
		<reference ref_id="CVE-2018-3174" ref_url="https://www.suse.com/security/cve/CVE-2018-3174/" source="CVE"/>
		<reference ref_id="CVE-2018-3185" ref_url="https://www.suse.com/security/cve/CVE-2018-3185/" source="CVE"/>
		<reference ref_id="CVE-2018-3200" ref_url="https://www.suse.com/security/cve/CVE-2018-3200/" source="CVE"/>
		<reference ref_id="CVE-2018-3251" ref_url="https://www.suse.com/security/cve/CVE-2018-3251/" source="CVE"/>
		<reference ref_id="CVE-2018-3277" ref_url="https://www.suse.com/security/cve/CVE-2018-3277/" source="CVE"/>
		<reference ref_id="CVE-2018-3282" ref_url="https://www.suse.com/security/cve/CVE-2018-3282/" source="CVE"/>
		<reference ref_id="CVE-2018-3284" ref_url="https://www.suse.com/security/cve/CVE-2018-3284/" source="CVE"/>
		<reference ref_id="CVE-2019-18901" ref_url="https://www.suse.com/security/cve/CVE-2019-18901/" source="CVE"/>
		<reference ref_id="CVE-2019-2510" ref_url="https://www.suse.com/security/cve/CVE-2019-2510/" source="CVE"/>
		<reference ref_id="CVE-2019-2537" ref_url="https://www.suse.com/security/cve/CVE-2019-2537/" source="CVE"/>
		<reference ref_id="CVE-2019-2614" ref_url="https://www.suse.com/security/cve/CVE-2019-2614/" source="CVE"/>
		<reference ref_id="CVE-2019-2627" ref_url="https://www.suse.com/security/cve/CVE-2019-2627/" source="CVE"/>
		<reference ref_id="CVE-2019-2628" ref_url="https://www.suse.com/security/cve/CVE-2019-2628/" source="CVE"/>
		<reference ref_id="CVE-2019-2737" ref_url="https://www.suse.com/security/cve/CVE-2019-2737/" source="CVE"/>
		<reference ref_id="CVE-2019-2739" ref_url="https://www.suse.com/security/cve/CVE-2019-2739/" source="CVE"/>
		<reference ref_id="CVE-2019-2740" ref_url="https://www.suse.com/security/cve/CVE-2019-2740/" source="CVE"/>
		<reference ref_id="CVE-2019-2758" ref_url="https://www.suse.com/security/cve/CVE-2019-2758/" source="CVE"/>
		<reference ref_id="CVE-2019-2805" ref_url="https://www.suse.com/security/cve/CVE-2019-2805/" source="CVE"/>
		<reference ref_id="CVE-2019-2938" ref_url="https://www.suse.com/security/cve/CVE-2019-2938/" source="CVE"/>
		<reference ref_id="CVE-2019-2974" ref_url="https://www.suse.com/security/cve/CVE-2019-2974/" source="CVE"/>
		<reference ref_id="CVE-2020-13249" ref_url="https://www.suse.com/security/cve/CVE-2020-13249/" source="CVE"/>
		<reference ref_id="CVE-2020-2574" ref_url="https://www.suse.com/security/cve/CVE-2020-2574/" source="CVE"/>
		<reference ref_id="CVE-2020-2752" ref_url="https://www.suse.com/security/cve/CVE-2020-2752/" source="CVE"/>
		<reference ref_id="CVE-2020-2760" ref_url="https://www.suse.com/security/cve/CVE-2020-2760/" source="CVE"/>
		<reference ref_id="CVE-2020-2812" ref_url="https://www.suse.com/security/cve/CVE-2020-2812/" source="CVE"/>
		<reference ref_id="CVE-2020-2814" ref_url="https://www.suse.com/security/cve/CVE-2020-2814/" source="CVE"/>
		<reference ref_id="CVE-2020-7221" ref_url="https://www.suse.com/security/cve/CVE-2020-7221/" source="CVE"/>
		<description>
These are all security issues fixed in the libmariadbd-devel-10.4.13-1.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4792/">CVE-2015-4792</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4802/">CVE-2015-4802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4807/">CVE-2015-4807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4815/">CVE-2015-4815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4816/">CVE-2015-4816</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4819/">CVE-2015-4819</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4826/">CVE-2015-4826</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4830/">CVE-2015-4830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4836/">CVE-2015-4836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4858/">CVE-2015-4858</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4861/">CVE-2015-4861</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4864/">CVE-2015-4864</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4866/">CVE-2015-4866</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4870/">CVE-2015-4870</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4879/">CVE-2015-4879</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4895/">CVE-2015-4895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4913/">CVE-2015-4913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5969/">CVE-2015-5969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7744/">CVE-2015-7744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0505/">CVE-2016-0505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0546/">CVE-2016-0546</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0596/">CVE-2016-0596</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0597/">CVE-2016-0597</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0598/">CVE-2016-0598</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0600/">CVE-2016-0600</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0606/">CVE-2016-0606</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0608/">CVE-2016-0608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0609/">CVE-2016-0609</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0610/">CVE-2016-0610</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0616/">CVE-2016-0616</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0640/">CVE-2016-0640</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0641/">CVE-2016-0641</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0642/">CVE-2016-0642</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0644/">CVE-2016-0644</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0646/">CVE-2016-0646</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0649/">CVE-2016-0649</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0650/">CVE-2016-0650</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0651/">CVE-2016-0651</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0668/">CVE-2016-0668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2047/">CVE-2016-2047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3477/">CVE-2016-3477</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3492/">CVE-2016-3492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-3521/">CVE-2016-3521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3615/">CVE-2016-3615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5440/">CVE-2016-5440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5584/">CVE-2016-5584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5624/">CVE-2016-5624</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5626/">CVE-2016-5626</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5629/">CVE-2016-5629</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6662/">CVE-2016-6662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-6663/">CVE-2016-6663</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6664/">CVE-2016-6664</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7440/">CVE-2016-7440</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8283/">CVE-2016-8283</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9843/">CVE-2016-9843</cve>
	<cve impact="moderate" cvss3="4.1/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-10268/">CVE-2017-10268</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10286/">CVE-2017-10286</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10320/">CVE-2017-10320</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-10365/">CVE-2017-10365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10378/">CVE-2017-10378</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10379/">CVE-2017-10379</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10384/">CVE-2017-10384</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-15365/">CVE-2017-15365</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3238/">CVE-2017-3238</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3243/">CVE-2017-3243</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3244/">CVE-2017-3244</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3257/">CVE-2017-3257</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3258/">CVE-2017-3258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3265/">CVE-2017-3265</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3291/">CVE-2017-3291</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3302/">CVE-2017-3302</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3308/">CVE-2017-3308</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3309/">CVE-2017-3309</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3312/">CVE-2017-3312</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3313/">CVE-2017-3313</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3317/">CVE-2017-3317</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-3318/">CVE-2017-3318</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3453/">CVE-2017-3453</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3456/">CVE-2017-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3464/">CVE-2017-3464</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-3636/">CVE-2017-3636</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-3641/">CVE-2017-3641</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3653/">CVE-2017-3653</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-2562/">CVE-2018-2562</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2612/">CVE-2018-2612</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2622/">CVE-2018-2622</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2640/">CVE-2018-2640</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2665/">CVE-2018-2665</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2668/">CVE-2018-2668</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-2755/">CVE-2018-2755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2759/">CVE-2018-2759</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2761/">CVE-2018-2761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2766/">CVE-2018-2766</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2767/">CVE-2018-2767</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2771/">CVE-2018-2771</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2777/">CVE-2018-2777</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2781/">CVE-2018-2781</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2782/">CVE-2018-2782</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2784/">CVE-2018-2784</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2786/">CVE-2018-2786</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2787/">CVE-2018-2787</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-2810/">CVE-2018-2810</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-2813/">CVE-2018-2813</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2817/">CVE-2018-2817</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-2819/">CVE-2018-2819</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3058/">CVE-2018-3058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3060/">CVE-2018-3060</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3063/">CVE-2018-3063</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-3064/">CVE-2018-3064</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-3066/">CVE-2018-3066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3143/">CVE-2018-3143</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3156/">CVE-2018-3156</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3162/">CVE-2018-3162</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3173/">CVE-2018-3173</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3174/">CVE-2018-3174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3185/">CVE-2018-3185</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3200/">CVE-2018-3200</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3251/">CVE-2018-3251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-3277/">CVE-2018-3277</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3282/">CVE-2018-3282</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-3284/">CVE-2018-3284</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18901/">CVE-2019-18901</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2510/">CVE-2019-2510</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2537/">CVE-2019-2537</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2614/">CVE-2019-2614</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2627/">CVE-2019-2627</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-2628/">CVE-2019-2628</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2737/">CVE-2019-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2739/">CVE-2019-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2740/">CVE-2019-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2758/">CVE-2019-2758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-2805/">CVE-2019-2805</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2938/">CVE-2019-2938</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-2974/">CVE-2019-2974</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13249/">CVE-2020-13249</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-2574/">CVE-2020-2574</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2752/">CVE-2020-2752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2760/">CVE-2020-2760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2812/">CVE-2020-2812</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2814/">CVE-2020-2814</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7221/">CVE-2020-7221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488535" comment="libmariadbd-devel-10.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488536" comment="libmariadbd19-10.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488537" comment="mariadb-10.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488538" comment="mariadb-client-10.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488539" comment="mariadb-errormessages-10.4.13-1.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488540" comment="mariadb-tools-10.4.13-1.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109905" version="1" class="patch">
	<metadata>
		<title>libosinfo-devel-1.7.1-1.52 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-13313" ref_url="https://www.suse.com/security/cve/CVE-2019-13313/" source="CVE"/>
		<description>
These are all security issues fixed in the libosinfo-devel-1.7.1-1.52 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13313/">CVE-2019-13313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488541" comment="libosinfo-devel-1.7.1-1.52 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488542" comment="typelib-1_0-Libosinfo-1_0-1.7.1-1.52 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109906" version="1" class="patch">
	<metadata>
		<title>librelp-devel-1.2.15-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-1000140" ref_url="https://www.suse.com/security/cve/CVE-2018-1000140/" source="CVE"/>
		<description>
These are all security issues fixed in the librelp-devel-1.2.15-1.15 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000140/">CVE-2018-1000140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488198" comment="librelp-devel-1.2.15-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488199" comment="librelp0-1.2.15-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109907" version="1" class="patch">
	<metadata>
		<title>libsaml-devel-2.6.1-1.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-16853" ref_url="https://www.suse.com/security/cve/CVE-2017-16853/" source="CVE"/>
		<description>
These are all security issues fixed in the libsaml-devel-2.6.1-1.31 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16853/">CVE-2017-16853</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488200" comment="libsaml-devel-2.6.1-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488201" comment="libsaml9-2.6.1-1.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488202" comment="opensaml-schemas-2.6.1-1.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109908" version="1" class="patch">
	<metadata>
		<title>libshibsp-lite7-2.6.1-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-16852" ref_url="https://www.suse.com/security/cve/CVE-2017-16852/" source="CVE"/>
		<reference ref_id="CVE-2019-19191" ref_url="https://www.suse.com/security/cve/CVE-2019-19191/" source="CVE"/>
		<description>
These are all security issues fixed in the libshibsp-lite7-2.6.1-3.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-16852/">CVE-2017-16852</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19191/">CVE-2019-19191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488543" comment="libshibsp-lite7-2.6.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488544" comment="libshibsp7-2.6.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488545" comment="shibboleth-sp-2.6.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488546" comment="shibboleth-sp-devel-2.6.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109909" version="1" class="patch">
	<metadata>
		<title>libspice-server-devel-0.14.2-1.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-4282" ref_url="https://www.suse.com/security/cve/CVE-2013-4282/" source="CVE"/>
		<reference ref_id="CVE-2015-3247" ref_url="https://www.suse.com/security/cve/CVE-2015-3247/" source="CVE"/>
		<reference ref_id="CVE-2015-5260" ref_url="https://www.suse.com/security/cve/CVE-2015-5260/" source="CVE"/>
		<reference ref_id="CVE-2015-5261" ref_url="https://www.suse.com/security/cve/CVE-2015-5261/" source="CVE"/>
		<reference ref_id="CVE-2016-0749" ref_url="https://www.suse.com/security/cve/CVE-2016-0749/" source="CVE"/>
		<reference ref_id="CVE-2016-2150" ref_url="https://www.suse.com/security/cve/CVE-2016-2150/" source="CVE"/>
		<reference ref_id="CVE-2016-9577" ref_url="https://www.suse.com/security/cve/CVE-2016-9577/" source="CVE"/>
		<reference ref_id="CVE-2016-9578" ref_url="https://www.suse.com/security/cve/CVE-2016-9578/" source="CVE"/>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<reference ref_id="CVE-2019-3813" ref_url="https://www.suse.com/security/cve/CVE-2019-3813/" source="CVE"/>
		<description>
These are all security issues fixed in the libspice-server-devel-0.14.2-1.58 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2013-4282/">CVE-2013-4282</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3247/">CVE-2015-3247</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-5260/">CVE-2015-5260</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2015-5261/">CVE-2015-5261</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-0749/">CVE-2016-0749</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2016-2150/">CVE-2016-2150</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9577/">CVE-2016-9577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-9578/">CVE-2016-9578</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<cve impact="important" cvss3="8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3813/">CVE-2019-3813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488547" comment="libspice-server-devel-0.14.2-1.58 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488548" comment="libspice-server1-0.14.2-1.58 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109910" version="1" class="patch">
	<metadata>
		<title>libvirglrenderer0-0.6.0-4.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-10214" ref_url="https://www.suse.com/security/cve/CVE-2016-10214/" source="CVE"/>
		<reference ref_id="CVE-2017-5937" ref_url="https://www.suse.com/security/cve/CVE-2017-5937/" source="CVE"/>
		<reference ref_id="CVE-2017-5957" ref_url="https://www.suse.com/security/cve/CVE-2017-5957/" source="CVE"/>
		<reference ref_id="CVE-2017-5993" ref_url="https://www.suse.com/security/cve/CVE-2017-5993/" source="CVE"/>
		<reference ref_id="CVE-2017-5994" ref_url="https://www.suse.com/security/cve/CVE-2017-5994/" source="CVE"/>
		<reference ref_id="CVE-2017-6386" ref_url="https://www.suse.com/security/cve/CVE-2017-6386/" source="CVE"/>
		<reference ref_id="CVE-2019-18388" ref_url="https://www.suse.com/security/cve/CVE-2019-18388/" source="CVE"/>
		<reference ref_id="CVE-2019-18389" ref_url="https://www.suse.com/security/cve/CVE-2019-18389/" source="CVE"/>
		<reference ref_id="CVE-2019-18390" ref_url="https://www.suse.com/security/cve/CVE-2019-18390/" source="CVE"/>
		<reference ref_id="CVE-2019-18391" ref_url="https://www.suse.com/security/cve/CVE-2019-18391/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirglrenderer0-0.6.0-4.3.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10214/">CVE-2016-10214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5937/">CVE-2017-5937</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5957/">CVE-2017-5957</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5993/">CVE-2017-5993</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5994/">CVE-2017-5994</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-6386/">CVE-2017-6386</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-18388/">CVE-2019-18388</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18389/">CVE-2019-18389</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18390/">CVE-2019-18390</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18391/">CVE-2019-18391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488549" comment="libvirglrenderer0-0.6.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488550" comment="virglrenderer-devel-0.6.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109911" version="1" class="patch">
	<metadata>
		<title>libvirt-6.0.0-11.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7823" ref_url="https://www.suse.com/security/cve/CVE-2014-7823/" source="CVE"/>
		<reference ref_id="CVE-2014-8131" ref_url="https://www.suse.com/security/cve/CVE-2014-8131/" source="CVE"/>
		<reference ref_id="CVE-2015-0236" ref_url="https://www.suse.com/security/cve/CVE-2015-0236/" source="CVE"/>
		<reference ref_id="CVE-2015-5247" ref_url="https://www.suse.com/security/cve/CVE-2015-5247/" source="CVE"/>
		<reference ref_id="CVE-2015-5313" ref_url="https://www.suse.com/security/cve/CVE-2015-5313/" source="CVE"/>
		<reference ref_id="CVE-2017-1000256" ref_url="https://www.suse.com/security/cve/CVE-2017-1000256/" source="CVE"/>
		<reference ref_id="CVE-2017-2635" ref_url="https://www.suse.com/security/cve/CVE-2017-2635/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2018-1064" ref_url="https://www.suse.com/security/cve/CVE-2018-1064/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-5748" ref_url="https://www.suse.com/security/cve/CVE-2018-5748/" source="CVE"/>
		<reference ref_id="CVE-2019-10132" ref_url="https://www.suse.com/security/cve/CVE-2019-10132/" source="CVE"/>
		<reference ref_id="CVE-2019-10161" ref_url="https://www.suse.com/security/cve/CVE-2019-10161/" source="CVE"/>
		<reference ref_id="CVE-2019-10166" ref_url="https://www.suse.com/security/cve/CVE-2019-10166/" source="CVE"/>
		<reference ref_id="CVE-2019-10167" ref_url="https://www.suse.com/security/cve/CVE-2019-10167/" source="CVE"/>
		<reference ref_id="CVE-2019-10168" ref_url="https://www.suse.com/security/cve/CVE-2019-10168/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-3886" ref_url="https://www.suse.com/security/cve/CVE-2019-3886/" source="CVE"/>
		<reference ref_id="CVE-2020-10701" ref_url="https://www.suse.com/security/cve/CVE-2020-10701/" source="CVE"/>
		<reference ref_id="CVE-2020-12430" ref_url="https://www.suse.com/security/cve/CVE-2020-12430/" source="CVE"/>
		<description>
These are all security issues fixed in the libvirt-6.0.0-11.3 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7823/">CVE-2014-7823</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-8131/">CVE-2014-8131</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0236/">CVE-2015-0236</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5247/">CVE-2015-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5313/">CVE-2015-5313</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-1000256/">CVE-2017-1000256</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2635/">CVE-2017-2635</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1064/">CVE-2018-1064</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5748/">CVE-2018-5748</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-10132/">CVE-2019-10132</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10161/">CVE-2019-10161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10166/">CVE-2019-10166</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10167/">CVE-2019-10167</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10168/">CVE-2019-10168</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-3886/">CVE-2019-3886</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10701/">CVE-2020-10701</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12430/">CVE-2020-12430</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488551" comment="libvirt-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488552" comment="libvirt-admin-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488553" comment="libvirt-bash-completion-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488554" comment="libvirt-client-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488555" comment="libvirt-daemon-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488556" comment="libvirt-daemon-config-network-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488557" comment="libvirt-daemon-config-nwfilter-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488558" comment="libvirt-daemon-driver-interface-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488559" comment="libvirt-daemon-driver-libxl-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488560" comment="libvirt-daemon-driver-lxc-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488561" comment="libvirt-daemon-driver-network-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488562" comment="libvirt-daemon-driver-nodedev-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488563" comment="libvirt-daemon-driver-nwfilter-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488564" comment="libvirt-daemon-driver-qemu-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488565" comment="libvirt-daemon-driver-secret-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488566" comment="libvirt-daemon-driver-storage-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488567" comment="libvirt-daemon-driver-storage-core-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488568" comment="libvirt-daemon-driver-storage-disk-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488569" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488570" comment="libvirt-daemon-driver-storage-logical-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488571" comment="libvirt-daemon-driver-storage-mpath-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488572" comment="libvirt-daemon-driver-storage-rbd-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488573" comment="libvirt-daemon-driver-storage-scsi-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488574" comment="libvirt-daemon-hooks-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488575" comment="libvirt-daemon-lxc-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488576" comment="libvirt-daemon-qemu-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488577" comment="libvirt-daemon-xen-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488578" comment="libvirt-devel-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488579" comment="libvirt-doc-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488580" comment="libvirt-lock-sanlock-6.0.0-11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488581" comment="libvirt-nss-6.0.0-11.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109912" version="1" class="patch">
	<metadata>
		<title>libwsman-devel-2.6.7-3.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2019-3816" ref_url="https://www.suse.com/security/cve/CVE-2019-3816/" source="CVE"/>
		<reference ref_id="CVE-2019-3833" ref_url="https://www.suse.com/security/cve/CVE-2019-3833/" source="CVE"/>
		<description>
These are all security issues fixed in the libwsman-devel-2.6.7-3.6.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-3816/">CVE-2019-3816</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-3833/">CVE-2019-3833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488582" comment="libwsman-devel-2.6.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488583" comment="libwsman3-2.6.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488584" comment="openwsman-server-2.6.7-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109913" version="1" class="patch">
	<metadata>
		<title>libxmltooling-devel-1.6.4-3.3.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-0486" ref_url="https://www.suse.com/security/cve/CVE-2018-0486/" source="CVE"/>
		<reference ref_id="CVE-2018-0489" ref_url="https://www.suse.com/security/cve/CVE-2018-0489/" source="CVE"/>
		<reference ref_id="CVE-2019-9628" ref_url="https://www.suse.com/security/cve/CVE-2019-9628/" source="CVE"/>
		<description>
These are all security issues fixed in the libxmltooling-devel-1.6.4-3.3.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0486/">CVE-2018-0486</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-0489/">CVE-2018-0489</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9628/">CVE-2019-9628</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488400" comment="libxmltooling-devel-1.6.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488401" comment="libxmltooling7-1.6.4-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488402" comment="xmltooling-schemas-1.6.4-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109914" version="1" class="patch">
	<metadata>
		<title>memcached-1.5.6-4.5.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-8704" ref_url="https://www.suse.com/security/cve/CVE-2016-8704/" source="CVE"/>
		<reference ref_id="CVE-2016-8705" ref_url="https://www.suse.com/security/cve/CVE-2016-8705/" source="CVE"/>
		<reference ref_id="CVE-2016-8706" ref_url="https://www.suse.com/security/cve/CVE-2016-8706/" source="CVE"/>
		<reference ref_id="CVE-2017-9951" ref_url="https://www.suse.com/security/cve/CVE-2017-9951/" source="CVE"/>
		<reference ref_id="CVE-2018-1000115" ref_url="https://www.suse.com/security/cve/CVE-2018-1000115/" source="CVE"/>
		<reference ref_id="CVE-2018-1000127" ref_url="https://www.suse.com/security/cve/CVE-2018-1000127/" source="CVE"/>
		<reference ref_id="CVE-2019-11596" ref_url="https://www.suse.com/security/cve/CVE-2019-11596/" source="CVE"/>
		<reference ref_id="CVE-2019-15026" ref_url="https://www.suse.com/security/cve/CVE-2019-15026/" source="CVE"/>
		<description>
These are all security issues fixed in the memcached-1.5.6-4.5.30 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8704/">CVE-2016-8704</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-8705/">CVE-2016-8705</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8706/">CVE-2016-8706</cve>
	<cve impact="moderate" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9951/">CVE-2017-9951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1000115/">CVE-2018-1000115</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000127/">CVE-2018-1000127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11596/">CVE-2019-11596</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-15026/">CVE-2019-15026</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488585" comment="memcached-1.5.6-4.5.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488586" comment="memcached-devel-1.5.6-4.5.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109915" version="1" class="patch">
	<metadata>
		<title>nginx-1.16.1-1.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-0742" ref_url="https://www.suse.com/security/cve/CVE-2016-0742/" source="CVE"/>
		<reference ref_id="CVE-2016-0746" ref_url="https://www.suse.com/security/cve/CVE-2016-0746/" source="CVE"/>
		<reference ref_id="CVE-2016-0747" ref_url="https://www.suse.com/security/cve/CVE-2016-0747/" source="CVE"/>
		<reference ref_id="CVE-2016-4450" ref_url="https://www.suse.com/security/cve/CVE-2016-4450/" source="CVE"/>
		<reference ref_id="CVE-2017-7529" ref_url="https://www.suse.com/security/cve/CVE-2017-7529/" source="CVE"/>
		<reference ref_id="CVE-2018-16843" ref_url="https://www.suse.com/security/cve/CVE-2018-16843/" source="CVE"/>
		<reference ref_id="CVE-2018-16844" ref_url="https://www.suse.com/security/cve/CVE-2018-16844/" source="CVE"/>
		<reference ref_id="CVE-2018-16845" ref_url="https://www.suse.com/security/cve/CVE-2018-16845/" source="CVE"/>
		<reference ref_id="CVE-2019-20372" ref_url="https://www.suse.com/security/cve/CVE-2019-20372/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<description>
These are all security issues fixed in the nginx-1.16.1-1.21 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0742/">CVE-2016-0742</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0746/">CVE-2016-0746</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0747/">CVE-2016-0747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4450/">CVE-2016-4450</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7529/">CVE-2017-7529</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16843/">CVE-2018-16843</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16844/">CVE-2018-16844</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-16845/">CVE-2018-16845</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-20372/">CVE-2019-20372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488587" comment="nginx-1.16.1-1.21 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488588" comment="nginx-source-1.16.1-1.21 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109916" version="1" class="patch">
	<metadata>
		<title>nut-2.7.4-4.72 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2012-2944" ref_url="https://www.suse.com/security/cve/CVE-2012-2944/" source="CVE"/>
		<description>
These are all security issues fixed in the nut-2.7.4-4.72 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-2944/">CVE-2012-2944</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488209" comment="nut-2.7.4-4.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488210" comment="nut-devel-2.7.4-4.72 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488211" comment="nut-drivers-net-2.7.4-4.72 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109917" version="1" class="patch">
	<metadata>
		<title>openslp-server-2.0.0-6.12.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-4912" ref_url="https://www.suse.com/security/cve/CVE-2016-4912/" source="CVE"/>
		<reference ref_id="CVE-2016-7567" ref_url="https://www.suse.com/security/cve/CVE-2016-7567/" source="CVE"/>
		<reference ref_id="CVE-2017-17833" ref_url="https://www.suse.com/security/cve/CVE-2017-17833/" source="CVE"/>
		<description>
These are all security issues fixed in the openslp-server-2.0.0-6.12.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4912/">CVE-2016-4912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7567/">CVE-2016-7567</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-17833/">CVE-2017-17833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488589" comment="openslp-server-2.0.0-6.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109918" version="1" class="patch">
	<metadata>
		<title>openssh-fips-8.1p1-3.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-8325" ref_url="https://www.suse.com/security/cve/CVE-2015-8325/" source="CVE"/>
		<reference ref_id="CVE-2016-0777" ref_url="https://www.suse.com/security/cve/CVE-2016-0777/" source="CVE"/>
		<reference ref_id="CVE-2016-0778" ref_url="https://www.suse.com/security/cve/CVE-2016-0778/" source="CVE"/>
		<reference ref_id="CVE-2016-10009" ref_url="https://www.suse.com/security/cve/CVE-2016-10009/" source="CVE"/>
		<reference ref_id="CVE-2016-10010" ref_url="https://www.suse.com/security/cve/CVE-2016-10010/" source="CVE"/>
		<reference ref_id="CVE-2016-10011" ref_url="https://www.suse.com/security/cve/CVE-2016-10011/" source="CVE"/>
		<reference ref_id="CVE-2016-10012" ref_url="https://www.suse.com/security/cve/CVE-2016-10012/" source="CVE"/>
		<reference ref_id="CVE-2016-6210" ref_url="https://www.suse.com/security/cve/CVE-2016-6210/" source="CVE"/>
		<reference ref_id="CVE-2016-6515" ref_url="https://www.suse.com/security/cve/CVE-2016-6515/" source="CVE"/>
		<reference ref_id="CVE-2016-8858" ref_url="https://www.suse.com/security/cve/CVE-2016-8858/" source="CVE"/>
		<reference ref_id="CVE-2018-20685" ref_url="https://www.suse.com/security/cve/CVE-2018-20685/" source="CVE"/>
		<reference ref_id="CVE-2019-6109" ref_url="https://www.suse.com/security/cve/CVE-2019-6109/" source="CVE"/>
		<reference ref_id="CVE-2019-6110" ref_url="https://www.suse.com/security/cve/CVE-2019-6110/" source="CVE"/>
		<reference ref_id="CVE-2019-6111" ref_url="https://www.suse.com/security/cve/CVE-2019-6111/" source="CVE"/>
		<description>
These are all security issues fixed in the openssh-fips-8.1p1-3.21 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8325/">CVE-2015-8325</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-0777/">CVE-2016-0777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0778/">CVE-2016-0778</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10009/">CVE-2016-10009</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-10010/">CVE-2016-10010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10011/">CVE-2016-10011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10012/">CVE-2016-10012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6210/">CVE-2016-6210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6515/">CVE-2016-6515</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-8858/">CVE-2016-8858</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20685/">CVE-2018-20685</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6109/">CVE-2019-6109</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-6110/">CVE-2019-6110</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-6111/">CVE-2019-6111</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488590" comment="openssh-fips-8.1p1-3.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109919" version="1" class="patch">
	<metadata>
		<title>ovmf-201911-5.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-5731" ref_url="https://www.suse.com/security/cve/CVE-2017-5731/" source="CVE"/>
		<reference ref_id="CVE-2017-5732" ref_url="https://www.suse.com/security/cve/CVE-2017-5732/" source="CVE"/>
		<reference ref_id="CVE-2017-5733" ref_url="https://www.suse.com/security/cve/CVE-2017-5733/" source="CVE"/>
		<reference ref_id="CVE-2017-5734" ref_url="https://www.suse.com/security/cve/CVE-2017-5734/" source="CVE"/>
		<reference ref_id="CVE-2017-5735" ref_url="https://www.suse.com/security/cve/CVE-2017-5735/" source="CVE"/>
		<reference ref_id="CVE-2018-0739" ref_url="https://www.suse.com/security/cve/CVE-2018-0739/" source="CVE"/>
		<reference ref_id="CVE-2018-12178" ref_url="https://www.suse.com/security/cve/CVE-2018-12178/" source="CVE"/>
		<reference ref_id="CVE-2018-12180" ref_url="https://www.suse.com/security/cve/CVE-2018-12180/" source="CVE"/>
		<reference ref_id="CVE-2018-12181" ref_url="https://www.suse.com/security/cve/CVE-2018-12181/" source="CVE"/>
		<reference ref_id="CVE-2018-3613" ref_url="https://www.suse.com/security/cve/CVE-2018-3613/" source="CVE"/>
		<reference ref_id="CVE-2018-3630" ref_url="https://www.suse.com/security/cve/CVE-2018-3630/" source="CVE"/>
		<reference ref_id="CVE-2019-0160" ref_url="https://www.suse.com/security/cve/CVE-2019-0160/" source="CVE"/>
		<reference ref_id="CVE-2019-0161" ref_url="https://www.suse.com/security/cve/CVE-2019-0161/" source="CVE"/>
		<reference ref_id="CVE-2019-14553" ref_url="https://www.suse.com/security/cve/CVE-2019-14553/" source="CVE"/>
		<reference ref_id="CVE-2019-14559" ref_url="https://www.suse.com/security/cve/CVE-2019-14559/" source="CVE"/>
		<reference ref_id="CVE-2019-14563" ref_url="https://www.suse.com/security/cve/CVE-2019-14563/" source="CVE"/>
		<reference ref_id="CVE-2019-14575" ref_url="https://www.suse.com/security/cve/CVE-2019-14575/" source="CVE"/>
		<description>
These are all security issues fixed in the ovmf-201911-5.33 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5731/">CVE-2017-5731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5732/">CVE-2017-5732</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5733/">CVE-2017-5733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5734/">CVE-2017-5734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5735/">CVE-2017-5735</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-0739/">CVE-2018-0739</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12178/">CVE-2018-12178</cve>
	<cve impact="important" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12180/">CVE-2018-12180</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12181/">CVE-2018-12181</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3613/">CVE-2018-3613</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-3630/">CVE-2018-3630</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0160/">CVE-2019-0160</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0161/">CVE-2019-0161</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14553/">CVE-2019-14553</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14559/">CVE-2019-14559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-14563/">CVE-2019-14563</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14575/">CVE-2019-14575</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488591" comment="ovmf-201911-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488592" comment="ovmf-tools-201911-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488593" comment="qemu-ovmf-x86_64-201911-5.33 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488594" comment="qemu-uefi-aarch64-201911-5.33 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109920" version="1" class="patch">
	<metadata>
		<title>postgresql-contrib-12-2.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14798" ref_url="https://www.suse.com/security/cve/CVE-2017-14798/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql-contrib-12-2.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14798/">CVE-2017-14798</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488595" comment="postgresql-contrib-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488596" comment="postgresql-devel-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488597" comment="postgresql-docs-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488598" comment="postgresql-plperl-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488599" comment="postgresql-plpython-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488600" comment="postgresql-pltcl-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488601" comment="postgresql-server-12-2.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488602" comment="postgresql-server-devel-12-2.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109921" version="1" class="patch">
	<metadata>
		<title>postgresql10-contrib-10.12-8.13.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-15098" ref_url="https://www.suse.com/security/cve/CVE-2017-15098/" source="CVE"/>
		<reference ref_id="CVE-2017-15099" ref_url="https://www.suse.com/security/cve/CVE-2017-15099/" source="CVE"/>
		<reference ref_id="CVE-2018-1052" ref_url="https://www.suse.com/security/cve/CVE-2018-1052/" source="CVE"/>
		<reference ref_id="CVE-2018-1053" ref_url="https://www.suse.com/security/cve/CVE-2018-1053/" source="CVE"/>
		<reference ref_id="CVE-2018-1058" ref_url="https://www.suse.com/security/cve/CVE-2018-1058/" source="CVE"/>
		<reference ref_id="CVE-2018-10915" ref_url="https://www.suse.com/security/cve/CVE-2018-10915/" source="CVE"/>
		<reference ref_id="CVE-2018-10925" ref_url="https://www.suse.com/security/cve/CVE-2018-10925/" source="CVE"/>
		<reference ref_id="CVE-2018-1115" ref_url="https://www.suse.com/security/cve/CVE-2018-1115/" source="CVE"/>
		<reference ref_id="CVE-2018-16850" ref_url="https://www.suse.com/security/cve/CVE-2018-16850/" source="CVE"/>
		<reference ref_id="CVE-2019-10130" ref_url="https://www.suse.com/security/cve/CVE-2019-10130/" source="CVE"/>
		<reference ref_id="CVE-2019-10164" ref_url="https://www.suse.com/security/cve/CVE-2019-10164/" source="CVE"/>
		<reference ref_id="CVE-2019-10208" ref_url="https://www.suse.com/security/cve/CVE-2019-10208/" source="CVE"/>
		<reference ref_id="CVE-2020-1720" ref_url="https://www.suse.com/security/cve/CVE-2020-1720/" source="CVE"/>
		<description>
These are all security issues fixed in the postgresql10-contrib-10.12-8.13.10 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15098/">CVE-2017-15098</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15099/">CVE-2017-15099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1052/">CVE-2018-1052</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1053/">CVE-2018-1053</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1058/">CVE-2018-1058</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10915/">CVE-2018-10915</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-10925/">CVE-2018-10925</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1115/">CVE-2018-1115</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-16850/">CVE-2018-16850</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10130/">CVE-2019-10130</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-10164/">CVE-2019-10164</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10208/">CVE-2019-10208</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1720/">CVE-2020-1720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488603" comment="postgresql10-contrib-10.12-8.13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488604" comment="postgresql10-devel-10.12-8.13.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488605" comment="postgresql10-docs-10.12-8.13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488606" comment="postgresql10-plperl-10.12-8.13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488607" comment="postgresql10-plpython-10.12-8.13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488608" comment="postgresql10-pltcl-10.12-8.13.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488609" comment="postgresql10-server-10.12-8.13.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109922" version="1" class="patch">
	<metadata>
		<title>python3-pywbem-0.11.0-2.21 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-6418" ref_url="https://www.suse.com/security/cve/CVE-2013-6418/" source="CVE"/>
		<description>
These are all security issues fixed in the python3-pywbem-0.11.0-2.21 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6418/">CVE-2013-6418</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488262" comment="python3-pywbem-0.11.0-2.21 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109923" version="1" class="patch">
	<metadata>
		<title>qemu-4.2.0-9.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-10702" ref_url="https://www.suse.com/security/cve/CVE-2020-10702/" source="CVE"/>
		<reference ref_id="CVE-2020-11102" ref_url="https://www.suse.com/security/cve/CVE-2020-11102/" source="CVE"/>
		<reference ref_id="CVE-2020-11869" ref_url="https://www.suse.com/security/cve/CVE-2020-11869/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-4.2.0-9.4 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10702/">CVE-2020-10702</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11102/">CVE-2020-11102</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11869/">CVE-2020-11869</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488610" comment="qemu-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488611" comment="qemu-arm-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488612" comment="qemu-audio-alsa-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488613" comment="qemu-audio-pa-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488614" comment="qemu-block-curl-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488615" comment="qemu-block-iscsi-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488616" comment="qemu-block-rbd-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488617" comment="qemu-block-ssh-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488618" comment="qemu-guest-agent-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488619" comment="qemu-ipxe-1.0.0+-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488620" comment="qemu-kvm-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488621" comment="qemu-lang-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488622" comment="qemu-microvm-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488623" comment="qemu-ppc-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488624" comment="qemu-s390-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488625" comment="qemu-seabios-1.12.1+-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009232226" comment="qemu-sgabios-8-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488626" comment="qemu-ui-curses-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488627" comment="qemu-ui-gtk-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488628" comment="qemu-ui-spice-app-4.2.0-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488629" comment="qemu-vgabios-1.12.1+-9.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488630" comment="qemu-x86-4.2.0-9.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109924" version="1" class="patch">
	<metadata>
		<title>qemu-audio-oss-3.1.1.1-9.21.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-0223" ref_url="https://www.suse.com/security/cve/CVE-2014-0223/" source="CVE"/>
		<reference ref_id="CVE-2014-3461" ref_url="https://www.suse.com/security/cve/CVE-2014-3461/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-7840" ref_url="https://www.suse.com/security/cve/CVE-2014-7840/" source="CVE"/>
		<reference ref_id="CVE-2014-8106" ref_url="https://www.suse.com/security/cve/CVE-2014-8106/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3209" ref_url="https://www.suse.com/security/cve/CVE-2015-3209/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5225" ref_url="https://www.suse.com/security/cve/CVE-2015-5225/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5279" ref_url="https://www.suse.com/security/cve/CVE-2015-5279/" source="CVE"/>
		<reference ref_id="CVE-2015-5745" ref_url="https://www.suse.com/security/cve/CVE-2015-5745/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7295" ref_url="https://www.suse.com/security/cve/CVE-2015-7295/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10028" ref_url="https://www.suse.com/security/cve/CVE-2016-10028/" source="CVE"/>
		<reference ref_id="CVE-2016-10155" ref_url="https://www.suse.com/security/cve/CVE-2016-10155/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-3710" ref_url="https://www.suse.com/security/cve/CVE-2016-3710/" source="CVE"/>
		<reference ref_id="CVE-2016-3712" ref_url="https://www.suse.com/security/cve/CVE-2016-3712/" source="CVE"/>
		<reference ref_id="CVE-2016-4002" ref_url="https://www.suse.com/security/cve/CVE-2016-4002/" source="CVE"/>
		<reference ref_id="CVE-2016-4020" ref_url="https://www.suse.com/security/cve/CVE-2016-4020/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-4453" ref_url="https://www.suse.com/security/cve/CVE-2016-4453/" source="CVE"/>
		<reference ref_id="CVE-2016-4454" ref_url="https://www.suse.com/security/cve/CVE-2016-4454/" source="CVE"/>
		<reference ref_id="CVE-2016-4952" ref_url="https://www.suse.com/security/cve/CVE-2016-4952/" source="CVE"/>
		<reference ref_id="CVE-2016-4964" ref_url="https://www.suse.com/security/cve/CVE-2016-4964/" source="CVE"/>
		<reference ref_id="CVE-2016-5105" ref_url="https://www.suse.com/security/cve/CVE-2016-5105/" source="CVE"/>
		<reference ref_id="CVE-2016-5106" ref_url="https://www.suse.com/security/cve/CVE-2016-5106/" source="CVE"/>
		<reference ref_id="CVE-2016-5107" ref_url="https://www.suse.com/security/cve/CVE-2016-5107/" source="CVE"/>
		<reference ref_id="CVE-2016-5126" ref_url="https://www.suse.com/security/cve/CVE-2016-5126/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5337" ref_url="https://www.suse.com/security/cve/CVE-2016-5337/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-5403" ref_url="https://www.suse.com/security/cve/CVE-2016-5403/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-6490" ref_url="https://www.suse.com/security/cve/CVE-2016-6490/" source="CVE"/>
		<reference ref_id="CVE-2016-6833" ref_url="https://www.suse.com/security/cve/CVE-2016-6833/" source="CVE"/>
		<reference ref_id="CVE-2016-6836" ref_url="https://www.suse.com/security/cve/CVE-2016-6836/" source="CVE"/>
		<reference ref_id="CVE-2016-6888" ref_url="https://www.suse.com/security/cve/CVE-2016-6888/" source="CVE"/>
		<reference ref_id="CVE-2016-7116" ref_url="https://www.suse.com/security/cve/CVE-2016-7116/" source="CVE"/>
		<reference ref_id="CVE-2016-7155" ref_url="https://www.suse.com/security/cve/CVE-2016-7155/" source="CVE"/>
		<reference ref_id="CVE-2016-7156" ref_url="https://www.suse.com/security/cve/CVE-2016-7156/" source="CVE"/>
		<reference ref_id="CVE-2016-7157" ref_url="https://www.suse.com/security/cve/CVE-2016-7157/" source="CVE"/>
		<reference ref_id="CVE-2016-7161" ref_url="https://www.suse.com/security/cve/CVE-2016-7161/" source="CVE"/>
		<reference ref_id="CVE-2016-7170" ref_url="https://www.suse.com/security/cve/CVE-2016-7170/" source="CVE"/>
		<reference ref_id="CVE-2016-7421" ref_url="https://www.suse.com/security/cve/CVE-2016-7421/" source="CVE"/>
		<reference ref_id="CVE-2016-7422" ref_url="https://www.suse.com/security/cve/CVE-2016-7422/" source="CVE"/>
		<reference ref_id="CVE-2016-7423" ref_url="https://www.suse.com/security/cve/CVE-2016-7423/" source="CVE"/>
		<reference ref_id="CVE-2016-7466" ref_url="https://www.suse.com/security/cve/CVE-2016-7466/" source="CVE"/>
		<reference ref_id="CVE-2016-7907" ref_url="https://www.suse.com/security/cve/CVE-2016-7907/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-7994" ref_url="https://www.suse.com/security/cve/CVE-2016-7994/" source="CVE"/>
		<reference ref_id="CVE-2016-7995" ref_url="https://www.suse.com/security/cve/CVE-2016-7995/" source="CVE"/>
		<reference ref_id="CVE-2016-8576" ref_url="https://www.suse.com/security/cve/CVE-2016-8576/" source="CVE"/>
		<reference ref_id="CVE-2016-8577" ref_url="https://www.suse.com/security/cve/CVE-2016-8577/" source="CVE"/>
		<reference ref_id="CVE-2016-8578" ref_url="https://www.suse.com/security/cve/CVE-2016-8578/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8668" ref_url="https://www.suse.com/security/cve/CVE-2016-8668/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8909" ref_url="https://www.suse.com/security/cve/CVE-2016-8909/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9101" ref_url="https://www.suse.com/security/cve/CVE-2016-9101/" source="CVE"/>
		<reference ref_id="CVE-2016-9102" ref_url="https://www.suse.com/security/cve/CVE-2016-9102/" source="CVE"/>
		<reference ref_id="CVE-2016-9103" ref_url="https://www.suse.com/security/cve/CVE-2016-9103/" source="CVE"/>
		<reference ref_id="CVE-2016-9104" ref_url="https://www.suse.com/security/cve/CVE-2016-9104/" source="CVE"/>
		<reference ref_id="CVE-2016-9105" ref_url="https://www.suse.com/security/cve/CVE-2016-9105/" source="CVE"/>
		<reference ref_id="CVE-2016-9106" ref_url="https://www.suse.com/security/cve/CVE-2016-9106/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9602" ref_url="https://www.suse.com/security/cve/CVE-2016-9602/" source="CVE"/>
		<reference ref_id="CVE-2016-9776" ref_url="https://www.suse.com/security/cve/CVE-2016-9776/" source="CVE"/>
		<reference ref_id="CVE-2016-9845" ref_url="https://www.suse.com/security/cve/CVE-2016-9845/" source="CVE"/>
		<reference ref_id="CVE-2016-9846" ref_url="https://www.suse.com/security/cve/CVE-2016-9846/" source="CVE"/>
		<reference ref_id="CVE-2016-9907" ref_url="https://www.suse.com/security/cve/CVE-2016-9907/" source="CVE"/>
		<reference ref_id="CVE-2016-9908" ref_url="https://www.suse.com/security/cve/CVE-2016-9908/" source="CVE"/>
		<reference ref_id="CVE-2016-9911" ref_url="https://www.suse.com/security/cve/CVE-2016-9911/" source="CVE"/>
		<reference ref_id="CVE-2016-9912" ref_url="https://www.suse.com/security/cve/CVE-2016-9912/" source="CVE"/>
		<reference ref_id="CVE-2016-9913" ref_url="https://www.suse.com/security/cve/CVE-2016-9913/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9923" ref_url="https://www.suse.com/security/cve/CVE-2016-9923/" source="CVE"/>
		<reference ref_id="CVE-2017-10664" ref_url="https://www.suse.com/security/cve/CVE-2017-10664/" source="CVE"/>
		<reference ref_id="CVE-2017-10806" ref_url="https://www.suse.com/security/cve/CVE-2017-10806/" source="CVE"/>
		<reference ref_id="CVE-2017-11334" ref_url="https://www.suse.com/security/cve/CVE-2017-11334/" source="CVE"/>
		<reference ref_id="CVE-2017-11434" ref_url="https://www.suse.com/security/cve/CVE-2017-11434/" source="CVE"/>
		<reference ref_id="CVE-2017-13672" ref_url="https://www.suse.com/security/cve/CVE-2017-13672/" source="CVE"/>
		<reference ref_id="CVE-2017-13673" ref_url="https://www.suse.com/security/cve/CVE-2017-13673/" source="CVE"/>
		<reference ref_id="CVE-2017-13711" ref_url="https://www.suse.com/security/cve/CVE-2017-13711/" source="CVE"/>
		<reference ref_id="CVE-2017-14167" ref_url="https://www.suse.com/security/cve/CVE-2017-14167/" source="CVE"/>
		<reference ref_id="CVE-2017-15038" ref_url="https://www.suse.com/security/cve/CVE-2017-15038/" source="CVE"/>
		<reference ref_id="CVE-2017-15118" ref_url="https://www.suse.com/security/cve/CVE-2017-15118/" source="CVE"/>
		<reference ref_id="CVE-2017-15119" ref_url="https://www.suse.com/security/cve/CVE-2017-15119/" source="CVE"/>
		<reference ref_id="CVE-2017-15268" ref_url="https://www.suse.com/security/cve/CVE-2017-15268/" source="CVE"/>
		<reference ref_id="CVE-2017-15289" ref_url="https://www.suse.com/security/cve/CVE-2017-15289/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-2630" ref_url="https://www.suse.com/security/cve/CVE-2017-2630/" source="CVE"/>
		<reference ref_id="CVE-2017-2633" ref_url="https://www.suse.com/security/cve/CVE-2017-2633/" source="CVE"/>
		<reference ref_id="CVE-2017-5525" ref_url="https://www.suse.com/security/cve/CVE-2017-5525/" source="CVE"/>
		<reference ref_id="CVE-2017-5526" ref_url="https://www.suse.com/security/cve/CVE-2017-5526/" source="CVE"/>
		<reference ref_id="CVE-2017-5552" ref_url="https://www.suse.com/security/cve/CVE-2017-5552/" source="CVE"/>
		<reference ref_id="CVE-2017-5578" ref_url="https://www.suse.com/security/cve/CVE-2017-5578/" source="CVE"/>
		<reference ref_id="CVE-2017-5579" ref_url="https://www.suse.com/security/cve/CVE-2017-5579/" source="CVE"/>
		<reference ref_id="CVE-2017-5667" ref_url="https://www.suse.com/security/cve/CVE-2017-5667/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5856" ref_url="https://www.suse.com/security/cve/CVE-2017-5856/" source="CVE"/>
		<reference ref_id="CVE-2017-5857" ref_url="https://www.suse.com/security/cve/CVE-2017-5857/" source="CVE"/>
		<reference ref_id="CVE-2017-5898" ref_url="https://www.suse.com/security/cve/CVE-2017-5898/" source="CVE"/>
		<reference ref_id="CVE-2017-5931" ref_url="https://www.suse.com/security/cve/CVE-2017-5931/" source="CVE"/>
		<reference ref_id="CVE-2017-5973" ref_url="https://www.suse.com/security/cve/CVE-2017-5973/" source="CVE"/>
		<reference ref_id="CVE-2017-5987" ref_url="https://www.suse.com/security/cve/CVE-2017-5987/" source="CVE"/>
		<reference ref_id="CVE-2017-6058" ref_url="https://www.suse.com/security/cve/CVE-2017-6058/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-7471" ref_url="https://www.suse.com/security/cve/CVE-2017-7471/" source="CVE"/>
		<reference ref_id="CVE-2017-7493" ref_url="https://www.suse.com/security/cve/CVE-2017-7493/" source="CVE"/>
		<reference ref_id="CVE-2017-8112" ref_url="https://www.suse.com/security/cve/CVE-2017-8112/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-8379" ref_url="https://www.suse.com/security/cve/CVE-2017-8379/" source="CVE"/>
		<reference ref_id="CVE-2017-8380" ref_url="https://www.suse.com/security/cve/CVE-2017-8380/" source="CVE"/>
		<reference ref_id="CVE-2017-9503" ref_url="https://www.suse.com/security/cve/CVE-2017-9503/" source="CVE"/>
		<reference ref_id="CVE-2017-9524" ref_url="https://www.suse.com/security/cve/CVE-2017-9524/" source="CVE"/>
		<reference ref_id="CVE-2018-10839" ref_url="https://www.suse.com/security/cve/CVE-2018-10839/" source="CVE"/>
		<reference ref_id="CVE-2018-11806" ref_url="https://www.suse.com/security/cve/CVE-2018-11806/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12207" ref_url="https://www.suse.com/security/cve/CVE-2018-12207/" source="CVE"/>
		<reference ref_id="CVE-2018-12617" ref_url="https://www.suse.com/security/cve/CVE-2018-12617/" source="CVE"/>
		<reference ref_id="CVE-2018-15746" ref_url="https://www.suse.com/security/cve/CVE-2018-15746/" source="CVE"/>
		<reference ref_id="CVE-2018-16847" ref_url="https://www.suse.com/security/cve/CVE-2018-16847/" source="CVE"/>
		<reference ref_id="CVE-2018-16872" ref_url="https://www.suse.com/security/cve/CVE-2018-16872/" source="CVE"/>
		<reference ref_id="CVE-2018-17958" ref_url="https://www.suse.com/security/cve/CVE-2018-17958/" source="CVE"/>
		<reference ref_id="CVE-2018-17962" ref_url="https://www.suse.com/security/cve/CVE-2018-17962/" source="CVE"/>
		<reference ref_id="CVE-2018-17963" ref_url="https://www.suse.com/security/cve/CVE-2018-17963/" source="CVE"/>
		<reference ref_id="CVE-2018-18849" ref_url="https://www.suse.com/security/cve/CVE-2018-18849/" source="CVE"/>
		<reference ref_id="CVE-2018-20123" ref_url="https://www.suse.com/security/cve/CVE-2018-20123/" source="CVE"/>
		<reference ref_id="CVE-2018-20124" ref_url="https://www.suse.com/security/cve/CVE-2018-20124/" source="CVE"/>
		<reference ref_id="CVE-2018-20125" ref_url="https://www.suse.com/security/cve/CVE-2018-20125/" source="CVE"/>
		<reference ref_id="CVE-2018-20126" ref_url="https://www.suse.com/security/cve/CVE-2018-20126/" source="CVE"/>
		<reference ref_id="CVE-2018-20191" ref_url="https://www.suse.com/security/cve/CVE-2018-20191/" source="CVE"/>
		<reference ref_id="CVE-2018-20216" ref_url="https://www.suse.com/security/cve/CVE-2018-20216/" source="CVE"/>
		<reference ref_id="CVE-2018-20815" ref_url="https://www.suse.com/security/cve/CVE-2018-20815/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-7550" ref_url="https://www.suse.com/security/cve/CVE-2018-7550/" source="CVE"/>
		<reference ref_id="CVE-2018-7858" ref_url="https://www.suse.com/security/cve/CVE-2018-7858/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-11135" ref_url="https://www.suse.com/security/cve/CVE-2019-11135/" source="CVE"/>
		<reference ref_id="CVE-2019-12068" ref_url="https://www.suse.com/security/cve/CVE-2019-12068/" source="CVE"/>
		<reference ref_id="CVE-2019-12155" ref_url="https://www.suse.com/security/cve/CVE-2019-12155/" source="CVE"/>
		<reference ref_id="CVE-2019-13164" ref_url="https://www.suse.com/security/cve/CVE-2019-13164/" source="CVE"/>
		<reference ref_id="CVE-2019-14378" ref_url="https://www.suse.com/security/cve/CVE-2019-14378/" source="CVE"/>
		<reference ref_id="CVE-2019-15034" ref_url="https://www.suse.com/security/cve/CVE-2019-15034/" source="CVE"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2019-20382" ref_url="https://www.suse.com/security/cve/CVE-2019-20382/" source="CVE"/>
		<reference ref_id="CVE-2019-5008" ref_url="https://www.suse.com/security/cve/CVE-2019-5008/" source="CVE"/>
		<reference ref_id="CVE-2019-6778" ref_url="https://www.suse.com/security/cve/CVE-2019-6778/" source="CVE"/>
		<reference ref_id="CVE-2019-8934" ref_url="https://www.suse.com/security/cve/CVE-2019-8934/" source="CVE"/>
		<reference ref_id="CVE-2019-9824" ref_url="https://www.suse.com/security/cve/CVE-2019-9824/" source="CVE"/>
		<reference ref_id="CVE-2020-1711" ref_url="https://www.suse.com/security/cve/CVE-2020-1711/" source="CVE"/>
		<reference ref_id="CVE-2020-1983" ref_url="https://www.suse.com/security/cve/CVE-2020-1983/" source="CVE"/>
		<reference ref_id="CVE-2020-7039" ref_url="https://www.suse.com/security/cve/CVE-2020-7039/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<description>
These are all security issues fixed in the qemu-audio-oss-3.1.1.1-9.21.4 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0223/">CVE-2014-0223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3461/">CVE-2014-3461</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7840/">CVE-2014-7840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8106/">CVE-2014-8106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3209/">CVE-2015-3209</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5225/">CVE-2015-5225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5279/">CVE-2015-5279</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5745/">CVE-2015-5745</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7295/">CVE-2015-7295</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-10028/">CVE-2016-10028</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10155/">CVE-2016-10155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3710/">CVE-2016-3710</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3712/">CVE-2016-3712</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4002/">CVE-2016-4002</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4020/">CVE-2016-4020</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4453/">CVE-2016-4453</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4454/">CVE-2016-4454</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4952/">CVE-2016-4952</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-4964/">CVE-2016-4964</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5105/">CVE-2016-5105</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5106/">CVE-2016-5106</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5107/">CVE-2016-5107</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5126/">CVE-2016-5126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5337/">CVE-2016-5337</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5403/">CVE-2016-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6490/">CVE-2016-6490</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6833/">CVE-2016-6833</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6836/">CVE-2016-6836</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6888/">CVE-2016-6888</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7116/">CVE-2016-7116</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7155/">CVE-2016-7155</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7156/">CVE-2016-7156</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7157/">CVE-2016-7157</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7161/">CVE-2016-7161</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7170/">CVE-2016-7170</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-7421/">CVE-2016-7421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7422/">CVE-2016-7422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7423/">CVE-2016-7423</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7466/">CVE-2016-7466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7907/">CVE-2016-7907</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7994/">CVE-2016-7994</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7995/">CVE-2016-7995</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8576/">CVE-2016-8576</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8577/">CVE-2016-8577</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8578/">CVE-2016-8578</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8668/">CVE-2016-8668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8909/">CVE-2016-8909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9101/">CVE-2016-9101</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9102/">CVE-2016-9102</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9103/">CVE-2016-9103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9104/">CVE-2016-9104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9105/">CVE-2016-9105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9106/">CVE-2016-9106</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9602/">CVE-2016-9602</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9776/">CVE-2016-9776</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9845/">CVE-2016-9845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9846/">CVE-2016-9846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9907/">CVE-2016-9907</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9908/">CVE-2016-9908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9911/">CVE-2016-9911</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9912/">CVE-2016-9912</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9913/">CVE-2016-9913</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9923/">CVE-2016-9923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-10664/">CVE-2017-10664</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-10806/">CVE-2017-10806</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11334/">CVE-2017-11334</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11434/">CVE-2017-11434</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13672/">CVE-2017-13672</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13673/">CVE-2017-13673</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13711/">CVE-2017-13711</cve>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14167/">CVE-2017-14167</cve>
	<cve impact="low" cvss3="3/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-15038/">CVE-2017-15038</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-15118/">CVE-2017-15118</cve>
	<cve impact="low" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15119/">CVE-2017-15119</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15268/">CVE-2017-15268</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-15289/">CVE-2017-15289</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2630/">CVE-2017-2630</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-2633/">CVE-2017-2633</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5525/">CVE-2017-5525</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5526/">CVE-2017-5526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5552/">CVE-2017-5552</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5578/">CVE-2017-5578</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5579/">CVE-2017-5579</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5667/">CVE-2017-5667</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5856/">CVE-2017-5856</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5857/">CVE-2017-5857</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5898/">CVE-2017-5898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5931/">CVE-2017-5931</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5973/">CVE-2017-5973</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5987/">CVE-2017-5987</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6058/">CVE-2017-6058</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7471/">CVE-2017-7471</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7493/">CVE-2017-7493</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8112/">CVE-2017-8112</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8379/">CVE-2017-8379</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8380/">CVE-2017-8380</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9503/">CVE-2017-9503</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9524/">CVE-2017-9524</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-10839/">CVE-2018-10839</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-11806/">CVE-2018-11806</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12207/">CVE-2018-12207</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12617/">CVE-2018-12617</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-15746/">CVE-2018-15746</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-16847/">CVE-2018-16847</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16872/">CVE-2018-16872</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17958/">CVE-2018-17958</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17962/">CVE-2018-17962</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17963/">CVE-2018-17963</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18849/">CVE-2018-18849</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20123/">CVE-2018-20123</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-20124/">CVE-2018-20124</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20125/">CVE-2018-20125</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20126/">CVE-2018-20126</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20191/">CVE-2018-20191</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-20216/">CVE-2018-20216</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-20815/">CVE-2018-20815</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7550/">CVE-2018-7550</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7858/">CVE-2018-7858</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11135/">CVE-2019-11135</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12068/">CVE-2019-12068</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12155/">CVE-2019-12155</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13164/">CVE-2019-13164</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14378/">CVE-2019-14378</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15034/">CVE-2019-15034</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20382/">CVE-2019-20382</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-5008/">CVE-2019-5008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-6778/">CVE-2019-6778</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-8934/">CVE-2019-8934</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9824/">CVE-2019-9824</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-1711/">CVE-2020-1711</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1983/">CVE-2020-1983</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-7039/">CVE-2020-7039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488631" comment="qemu-audio-oss-3.1.1.1-9.21.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109925" version="1" class="patch">
	<metadata>
		<title>rarpd-s20161105-6.10 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2010-2529" ref_url="https://www.suse.com/security/cve/CVE-2010-2529/" source="CVE"/>
		<description>
These are all security issues fixed in the rarpd-s20161105-6.10 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2010-2529/">CVE-2010-2529</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488276" comment="rarpd-s20161105-6.10 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109926" version="1" class="patch">
	<metadata>
		<title>rmt-server-2.5.4-1.39 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-14404" ref_url="https://www.suse.com/security/cve/CVE-2018-14404/" source="CVE"/>
		<reference ref_id="CVE-2018-16468" ref_url="https://www.suse.com/security/cve/CVE-2018-16468/" source="CVE"/>
		<reference ref_id="CVE-2018-16470" ref_url="https://www.suse.com/security/cve/CVE-2018-16470/" source="CVE"/>
		<reference ref_id="CVE-2019-11068" ref_url="https://www.suse.com/security/cve/CVE-2019-11068/" source="CVE"/>
		<reference ref_id="CVE-2019-18904" ref_url="https://www.suse.com/security/cve/CVE-2019-18904/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<description>
These are all security issues fixed in the rmt-server-2.5.4-1.39 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14404/">CVE-2018-14404</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16468/">CVE-2018-16468</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16470/">CVE-2018-16470</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-11068/">CVE-2019-11068</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18904/">CVE-2019-18904</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488632" comment="rmt-server-2.5.4-1.39 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488633" comment="rmt-server-config-2.5.4-1.39 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109927" version="1" class="patch">
	<metadata>
		<title>rsyslog-module-gssapi-8.39.0-2.90 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3243" ref_url="https://www.suse.com/security/cve/CVE-2015-3243/" source="CVE"/>
		<description>
These are all security issues fixed in the rsyslog-module-gssapi-8.39.0-2.90 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2015-3243/">CVE-2015-3243</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488634" comment="rsyslog-module-gssapi-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488635" comment="rsyslog-module-gtls-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488636" comment="rsyslog-module-mysql-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488637" comment="rsyslog-module-pgsql-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488638" comment="rsyslog-module-relp-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488639" comment="rsyslog-module-snmp-8.39.0-2.90 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488640" comment="rsyslog-module-udpspoof-8.39.0-2.90 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109928" version="1" class="patch">
	<metadata>
		<title>salt-api-3000-2.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2016-1866" ref_url="https://www.suse.com/security/cve/CVE-2016-1866/" source="CVE"/>
		<reference ref_id="CVE-2016-9639" ref_url="https://www.suse.com/security/cve/CVE-2016-9639/" source="CVE"/>
		<reference ref_id="CVE-2017-12791" ref_url="https://www.suse.com/security/cve/CVE-2017-12791/" source="CVE"/>
		<reference ref_id="CVE-2017-14695" ref_url="https://www.suse.com/security/cve/CVE-2017-14695/" source="CVE"/>
		<reference ref_id="CVE-2017-14696" ref_url="https://www.suse.com/security/cve/CVE-2017-14696/" source="CVE"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2019-17361" ref_url="https://www.suse.com/security/cve/CVE-2019-17361/" source="CVE"/>
		<reference ref_id="CVE-2019-18897" ref_url="https://www.suse.com/security/cve/CVE-2019-18897/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<description>
These are all security issues fixed in the salt-api-3000-2.9 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1866/">CVE-2016-1866</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9639/">CVE-2016-9639</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-12791/">CVE-2017-12791</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-14695/">CVE-2017-14695</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14696/">CVE-2017-14696</cve>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17361/">CVE-2019-17361</cve>
	<cve impact="moderate" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18897/">CVE-2019-18897</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488641" comment="salt-api-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488642" comment="salt-cloud-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488643" comment="salt-fish-completion-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488644" comment="salt-master-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488645" comment="salt-proxy-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488646" comment="salt-ssh-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488647" comment="salt-standalone-formulas-configuration-3000-2.9 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488648" comment="salt-syndic-3000-2.9 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109929" version="1" class="patch">
	<metadata>
		<title>sblim-sfcb-1.4.9-3.7 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-6644" ref_url="https://www.suse.com/security/cve/CVE-2018-6644/" source="CVE"/>
		<description>
These are all security issues fixed in the sblim-sfcb-1.4.9-3.7 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6644/">CVE-2018-6644</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488290" comment="sblim-sfcb-1.4.9-3.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109930" version="1" class="patch">
	<metadata>
		<title>skopeo-0.1.41-4.11.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-14992" ref_url="https://www.suse.com/security/cve/CVE-2017-14992/" source="CVE"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<description>
These are all security issues fixed in the skopeo-0.1.41-4.11.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-14992/">CVE-2017-14992</cve>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488649" comment="skopeo-0.1.41-4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109931" version="1" class="patch">
	<metadata>
		<title>spice-gtk-devel-0.37-1.92 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-10873" ref_url="https://www.suse.com/security/cve/CVE-2018-10873/" source="CVE"/>
		<reference ref_id="CVE-2018-10893" ref_url="https://www.suse.com/security/cve/CVE-2018-10893/" source="CVE"/>
		<description>
These are all security issues fixed in the spice-gtk-devel-0.37-1.92 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10873/">CVE-2018-10873</cve>
	<cve impact="moderate" cvss3="7.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-10893/">CVE-2018-10893</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488650" comment="spice-gtk-devel-0.37-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488651" comment="typelib-1_0-SpiceClientGlib-2_0-0.37-1.92 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488652" comment="typelib-1_0-SpiceClientGtk-3_0-0.37-1.92 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109932" version="1" class="patch">
	<metadata>
		<title>squid-4.11-5.17.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-7141" ref_url="https://www.suse.com/security/cve/CVE-2014-7141/" source="CVE"/>
		<reference ref_id="CVE-2014-7142" ref_url="https://www.suse.com/security/cve/CVE-2014-7142/" source="CVE"/>
		<reference ref_id="CVE-2014-9749" ref_url="https://www.suse.com/security/cve/CVE-2014-9749/" source="CVE"/>
		<reference ref_id="CVE-2015-5400" ref_url="https://www.suse.com/security/cve/CVE-2015-5400/" source="CVE"/>
		<reference ref_id="CVE-2016-10002" ref_url="https://www.suse.com/security/cve/CVE-2016-10002/" source="CVE"/>
		<reference ref_id="CVE-2016-10003" ref_url="https://www.suse.com/security/cve/CVE-2016-10003/" source="CVE"/>
		<reference ref_id="CVE-2016-2390" ref_url="https://www.suse.com/security/cve/CVE-2016-2390/" source="CVE"/>
		<reference ref_id="CVE-2016-2569" ref_url="https://www.suse.com/security/cve/CVE-2016-2569/" source="CVE"/>
		<reference ref_id="CVE-2016-2570" ref_url="https://www.suse.com/security/cve/CVE-2016-2570/" source="CVE"/>
		<reference ref_id="CVE-2016-2571" ref_url="https://www.suse.com/security/cve/CVE-2016-2571/" source="CVE"/>
		<reference ref_id="CVE-2016-2572" ref_url="https://www.suse.com/security/cve/CVE-2016-2572/" source="CVE"/>
		<reference ref_id="CVE-2016-3947" ref_url="https://www.suse.com/security/cve/CVE-2016-3947/" source="CVE"/>
		<reference ref_id="CVE-2016-3948" ref_url="https://www.suse.com/security/cve/CVE-2016-3948/" source="CVE"/>
		<reference ref_id="CVE-2016-4051" ref_url="https://www.suse.com/security/cve/CVE-2016-4051/" source="CVE"/>
		<reference ref_id="CVE-2016-4052" ref_url="https://www.suse.com/security/cve/CVE-2016-4052/" source="CVE"/>
		<reference ref_id="CVE-2016-4053" ref_url="https://www.suse.com/security/cve/CVE-2016-4053/" source="CVE"/>
		<reference ref_id="CVE-2016-4054" ref_url="https://www.suse.com/security/cve/CVE-2016-4054/" source="CVE"/>
		<reference ref_id="CVE-2016-4553" ref_url="https://www.suse.com/security/cve/CVE-2016-4553/" source="CVE"/>
		<reference ref_id="CVE-2016-4554" ref_url="https://www.suse.com/security/cve/CVE-2016-4554/" source="CVE"/>
		<reference ref_id="CVE-2016-4555" ref_url="https://www.suse.com/security/cve/CVE-2016-4555/" source="CVE"/>
		<reference ref_id="CVE-2016-4556" ref_url="https://www.suse.com/security/cve/CVE-2016-4556/" source="CVE"/>
		<reference ref_id="CVE-2018-1000024" ref_url="https://www.suse.com/security/cve/CVE-2018-1000024/" source="CVE"/>
		<reference ref_id="CVE-2018-1000027" ref_url="https://www.suse.com/security/cve/CVE-2018-1000027/" source="CVE"/>
		<reference ref_id="CVE-2018-1172" ref_url="https://www.suse.com/security/cve/CVE-2018-1172/" source="CVE"/>
		<reference ref_id="CVE-2018-19131" ref_url="https://www.suse.com/security/cve/CVE-2018-19131/" source="CVE"/>
		<reference ref_id="CVE-2018-19132" ref_url="https://www.suse.com/security/cve/CVE-2018-19132/" source="CVE"/>
		<reference ref_id="CVE-2019-12519" ref_url="https://www.suse.com/security/cve/CVE-2019-12519/" source="CVE"/>
		<reference ref_id="CVE-2019-12521" ref_url="https://www.suse.com/security/cve/CVE-2019-12521/" source="CVE"/>
		<reference ref_id="CVE-2019-12523" ref_url="https://www.suse.com/security/cve/CVE-2019-12523/" source="CVE"/>
		<reference ref_id="CVE-2019-12525" ref_url="https://www.suse.com/security/cve/CVE-2019-12525/" source="CVE"/>
		<reference ref_id="CVE-2019-12526" ref_url="https://www.suse.com/security/cve/CVE-2019-12526/" source="CVE"/>
		<reference ref_id="CVE-2019-12527" ref_url="https://www.suse.com/security/cve/CVE-2019-12527/" source="CVE"/>
		<reference ref_id="CVE-2019-12528" ref_url="https://www.suse.com/security/cve/CVE-2019-12528/" source="CVE"/>
		<reference ref_id="CVE-2019-12529" ref_url="https://www.suse.com/security/cve/CVE-2019-12529/" source="CVE"/>
		<reference ref_id="CVE-2019-12854" ref_url="https://www.suse.com/security/cve/CVE-2019-12854/" source="CVE"/>
		<reference ref_id="CVE-2019-13345" ref_url="https://www.suse.com/security/cve/CVE-2019-13345/" source="CVE"/>
		<reference ref_id="CVE-2019-18676" ref_url="https://www.suse.com/security/cve/CVE-2019-18676/" source="CVE"/>
		<reference ref_id="CVE-2019-18677" ref_url="https://www.suse.com/security/cve/CVE-2019-18677/" source="CVE"/>
		<reference ref_id="CVE-2019-18678" ref_url="https://www.suse.com/security/cve/CVE-2019-18678/" source="CVE"/>
		<reference ref_id="CVE-2019-18679" ref_url="https://www.suse.com/security/cve/CVE-2019-18679/" source="CVE"/>
		<reference ref_id="CVE-2019-18860" ref_url="https://www.suse.com/security/cve/CVE-2019-18860/" source="CVE"/>
		<reference ref_id="CVE-2020-11945" ref_url="https://www.suse.com/security/cve/CVE-2020-11945/" source="CVE"/>
		<reference ref_id="CVE-2020-8449" ref_url="https://www.suse.com/security/cve/CVE-2020-8449/" source="CVE"/>
		<reference ref_id="CVE-2020-8450" ref_url="https://www.suse.com/security/cve/CVE-2020-8450/" source="CVE"/>
		<reference ref_id="CVE-2020-8517" ref_url="https://www.suse.com/security/cve/CVE-2020-8517/" source="CVE"/>
		<description>
These are all security issues fixed in the squid-4.11-5.17.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7141/">CVE-2014-7141</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-7142/">CVE-2014-7142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9749/">CVE-2014-9749</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5400/">CVE-2015-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10002/">CVE-2016-10002</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10003/">CVE-2016-10003</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-2390/">CVE-2016-2390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2569/">CVE-2016-2569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2570/">CVE-2016-2570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2571/">CVE-2016-2571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2572/">CVE-2016-2572</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3947/">CVE-2016-3947</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2016-3948/">CVE-2016-3948</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4051/">CVE-2016-4051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4052/">CVE-2016-4052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4053/">CVE-2016-4053</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-4054/">CVE-2016-4054</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4553/">CVE-2016-4553</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4554/">CVE-2016-4554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4555/">CVE-2016-4555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4556/">CVE-2016-4556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000024/">CVE-2018-1000024</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000027/">CVE-2018-1000027</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1172/">CVE-2018-1172</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19131/">CVE-2018-19131</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19132/">CVE-2018-19132</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-12519/">CVE-2019-12519</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12521/">CVE-2019-12521</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12523/">CVE-2019-12523</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12525/">CVE-2019-12525</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12526/">CVE-2019-12526</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12527/">CVE-2019-12527</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12528/">CVE-2019-12528</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12529/">CVE-2019-12529</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-12854/">CVE-2019-12854</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-13345/">CVE-2019-13345</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18676/">CVE-2019-18676</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18677/">CVE-2019-18677</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-18678/">CVE-2019-18678</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18679/">CVE-2019-18679</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18860/">CVE-2019-18860</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11945/">CVE-2020-11945</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8449/">CVE-2020-8449</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8450/">CVE-2020-8450</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8517/">CVE-2020-8517</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488653" comment="squid-4.11-5.17.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109933" version="1" class="patch">
	<metadata>
		<title>subversion-server-1.10.6-3.6.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3580" ref_url="https://www.suse.com/security/cve/CVE-2014-3580/" source="CVE"/>
		<reference ref_id="CVE-2014-8108" ref_url="https://www.suse.com/security/cve/CVE-2014-8108/" source="CVE"/>
		<reference ref_id="CVE-2015-0202" ref_url="https://www.suse.com/security/cve/CVE-2015-0202/" source="CVE"/>
		<reference ref_id="CVE-2015-0248" ref_url="https://www.suse.com/security/cve/CVE-2015-0248/" source="CVE"/>
		<reference ref_id="CVE-2015-0251" ref_url="https://www.suse.com/security/cve/CVE-2015-0251/" source="CVE"/>
		<reference ref_id="CVE-2015-3184" ref_url="https://www.suse.com/security/cve/CVE-2015-3184/" source="CVE"/>
		<reference ref_id="CVE-2015-3187" ref_url="https://www.suse.com/security/cve/CVE-2015-3187/" source="CVE"/>
		<reference ref_id="CVE-2015-5259" ref_url="https://www.suse.com/security/cve/CVE-2015-5259/" source="CVE"/>
		<reference ref_id="CVE-2015-5343" ref_url="https://www.suse.com/security/cve/CVE-2015-5343/" source="CVE"/>
		<reference ref_id="CVE-2016-2167" ref_url="https://www.suse.com/security/cve/CVE-2016-2167/" source="CVE"/>
		<reference ref_id="CVE-2016-2168" ref_url="https://www.suse.com/security/cve/CVE-2016-2168/" source="CVE"/>
		<reference ref_id="CVE-2016-8734" ref_url="https://www.suse.com/security/cve/CVE-2016-8734/" source="CVE"/>
		<reference ref_id="CVE-2017-9800" ref_url="https://www.suse.com/security/cve/CVE-2017-9800/" source="CVE"/>
		<reference ref_id="CVE-2018-11782" ref_url="https://www.suse.com/security/cve/CVE-2018-11782/" source="CVE"/>
		<reference ref_id="CVE-2018-11803" ref_url="https://www.suse.com/security/cve/CVE-2018-11803/" source="CVE"/>
		<reference ref_id="CVE-2019-0203" ref_url="https://www.suse.com/security/cve/CVE-2019-0203/" source="CVE"/>
		<description>
These are all security issues fixed in the subversion-server-1.10.6-3.6.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3580/">CVE-2014-3580</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8108/">CVE-2014-8108</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0202/">CVE-2015-0202</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0248/">CVE-2015-0248</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0251/">CVE-2015-0251</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3184/">CVE-2015-3184</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3187/">CVE-2015-3187</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-5259/">CVE-2015-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5343/">CVE-2015-5343</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2167/">CVE-2016-2167</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2168/">CVE-2016-2168</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-8734/">CVE-2016-8734</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-9800/">CVE-2017-9800</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-11782/">CVE-2018-11782</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11803/">CVE-2018-11803</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0203/">CVE-2019-0203</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488654" comment="subversion-server-1.10.6-3.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109934" version="1" class="patch">
	<metadata>
		<title>sysstat-isag-12.0.2-3.21.18 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-19416" ref_url="https://www.suse.com/security/cve/CVE-2018-19416/" source="CVE"/>
		<reference ref_id="CVE-2018-19517" ref_url="https://www.suse.com/security/cve/CVE-2018-19517/" source="CVE"/>
		<reference ref_id="CVE-2019-16167" ref_url="https://www.suse.com/security/cve/CVE-2019-16167/" source="CVE"/>
		<reference ref_id="CVE-2019-19725" ref_url="https://www.suse.com/security/cve/CVE-2019-19725/" source="CVE"/>
		<description>
These are all security issues fixed in the sysstat-isag-12.0.2-3.21.18 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19416/">CVE-2018-19416</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19517/">CVE-2018-19517</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16167/">CVE-2019-16167</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19725/">CVE-2019-19725</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488655" comment="sysstat-isag-12.0.2-3.21.18 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109935" version="1" class="patch">
	<metadata>
		<title>uuidd-2.33.1-4.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-9114" ref_url="https://www.suse.com/security/cve/CVE-2014-9114/" source="CVE"/>
		<reference ref_id="CVE-2015-5218" ref_url="https://www.suse.com/security/cve/CVE-2015-5218/" source="CVE"/>
		<reference ref_id="CVE-2016-2779" ref_url="https://www.suse.com/security/cve/CVE-2016-2779/" source="CVE"/>
		<reference ref_id="CVE-2016-5011" ref_url="https://www.suse.com/security/cve/CVE-2016-5011/" source="CVE"/>
		<reference ref_id="CVE-2017-2616" ref_url="https://www.suse.com/security/cve/CVE-2017-2616/" source="CVE"/>
		<reference ref_id="CVE-2018-7738" ref_url="https://www.suse.com/security/cve/CVE-2018-7738/" source="CVE"/>
		<description>
These are all security issues fixed in the uuidd-2.33.1-4.5.1 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9114/">CVE-2014-9114</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-5218/">CVE-2015-5218</cve>
	<cve impact="moderate" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-2779/">CVE-2016-2779</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5011/">CVE-2016-5011</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2616/">CVE-2017-2616</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7738/">CVE-2018-7738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488656" comment="uuidd-2.33.1-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109936" version="1" class="patch">
	<metadata>
		<title>virt-install-2.2.1-8.38 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-10183" ref_url="https://www.suse.com/security/cve/CVE-2019-10183/" source="CVE"/>
		<description>
These are all security issues fixed in the virt-install-2.2.1-8.38 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10183/">CVE-2019-10183</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488657" comment="virt-install-2.2.1-8.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488658" comment="virt-manager-2.2.1-8.38 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488659" comment="virt-manager-common-2.2.1-8.38 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109937" version="1" class="patch">
	<metadata>
		<title>vsftpd-3.0.3-7.7.9 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-1419" ref_url="https://www.suse.com/security/cve/CVE-2015-1419/" source="CVE"/>
		<description>
These are all security issues fixed in the vsftpd-3.0.3-7.7.9 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1419/">CVE-2015-1419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488453" comment="vsftpd-3.0.3-7.7.9 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109938" version="1" class="patch">
	<metadata>
		<title>xen-4.13.1_02-1.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-3495" ref_url="https://www.suse.com/security/cve/CVE-2013-3495/" source="CVE"/>
		<reference ref_id="CVE-2013-4533" ref_url="https://www.suse.com/security/cve/CVE-2013-4533/" source="CVE"/>
		<reference ref_id="CVE-2013-4534" ref_url="https://www.suse.com/security/cve/CVE-2013-4534/" source="CVE"/>
		<reference ref_id="CVE-2013-4537" ref_url="https://www.suse.com/security/cve/CVE-2013-4537/" source="CVE"/>
		<reference ref_id="CVE-2013-4538" ref_url="https://www.suse.com/security/cve/CVE-2013-4538/" source="CVE"/>
		<reference ref_id="CVE-2013-4539" ref_url="https://www.suse.com/security/cve/CVE-2013-4539/" source="CVE"/>
		<reference ref_id="CVE-2013-4540" ref_url="https://www.suse.com/security/cve/CVE-2013-4540/" source="CVE"/>
		<reference ref_id="CVE-2014-0222" ref_url="https://www.suse.com/security/cve/CVE-2014-0222/" source="CVE"/>
		<reference ref_id="CVE-2014-3640" ref_url="https://www.suse.com/security/cve/CVE-2014-3640/" source="CVE"/>
		<reference ref_id="CVE-2014-3672" ref_url="https://www.suse.com/security/cve/CVE-2014-3672/" source="CVE"/>
		<reference ref_id="CVE-2014-7815" ref_url="https://www.suse.com/security/cve/CVE-2014-7815/" source="CVE"/>
		<reference ref_id="CVE-2015-1779" ref_url="https://www.suse.com/security/cve/CVE-2015-1779/" source="CVE"/>
		<reference ref_id="CVE-2015-3259" ref_url="https://www.suse.com/security/cve/CVE-2015-3259/" source="CVE"/>
		<reference ref_id="CVE-2015-3340" ref_url="https://www.suse.com/security/cve/CVE-2015-3340/" source="CVE"/>
		<reference ref_id="CVE-2015-3456" ref_url="https://www.suse.com/security/cve/CVE-2015-3456/" source="CVE"/>
		<reference ref_id="CVE-2015-4037" ref_url="https://www.suse.com/security/cve/CVE-2015-4037/" source="CVE"/>
		<reference ref_id="CVE-2015-4103" ref_url="https://www.suse.com/security/cve/CVE-2015-4103/" source="CVE"/>
		<reference ref_id="CVE-2015-4104" ref_url="https://www.suse.com/security/cve/CVE-2015-4104/" source="CVE"/>
		<reference ref_id="CVE-2015-4105" ref_url="https://www.suse.com/security/cve/CVE-2015-4105/" source="CVE"/>
		<reference ref_id="CVE-2015-4106" ref_url="https://www.suse.com/security/cve/CVE-2015-4106/" source="CVE"/>
		<reference ref_id="CVE-2015-5154" ref_url="https://www.suse.com/security/cve/CVE-2015-5154/" source="CVE"/>
		<reference ref_id="CVE-2015-5239" ref_url="https://www.suse.com/security/cve/CVE-2015-5239/" source="CVE"/>
		<reference ref_id="CVE-2015-5278" ref_url="https://www.suse.com/security/cve/CVE-2015-5278/" source="CVE"/>
		<reference ref_id="CVE-2015-5307" ref_url="https://www.suse.com/security/cve/CVE-2015-5307/" source="CVE"/>
		<reference ref_id="CVE-2015-6815" ref_url="https://www.suse.com/security/cve/CVE-2015-6815/" source="CVE"/>
		<reference ref_id="CVE-2015-6855" ref_url="https://www.suse.com/security/cve/CVE-2015-6855/" source="CVE"/>
		<reference ref_id="CVE-2015-7311" ref_url="https://www.suse.com/security/cve/CVE-2015-7311/" source="CVE"/>
		<reference ref_id="CVE-2015-7504" ref_url="https://www.suse.com/security/cve/CVE-2015-7504/" source="CVE"/>
		<reference ref_id="CVE-2015-7512" ref_url="https://www.suse.com/security/cve/CVE-2015-7512/" source="CVE"/>
		<reference ref_id="CVE-2015-7549" ref_url="https://www.suse.com/security/cve/CVE-2015-7549/" source="CVE"/>
		<reference ref_id="CVE-2015-7835" ref_url="https://www.suse.com/security/cve/CVE-2015-7835/" source="CVE"/>
		<reference ref_id="CVE-2015-7969" ref_url="https://www.suse.com/security/cve/CVE-2015-7969/" source="CVE"/>
		<reference ref_id="CVE-2015-7970" ref_url="https://www.suse.com/security/cve/CVE-2015-7970/" source="CVE"/>
		<reference ref_id="CVE-2015-7971" ref_url="https://www.suse.com/security/cve/CVE-2015-7971/" source="CVE"/>
		<reference ref_id="CVE-2015-7972" ref_url="https://www.suse.com/security/cve/CVE-2015-7972/" source="CVE"/>
		<reference ref_id="CVE-2015-8104" ref_url="https://www.suse.com/security/cve/CVE-2015-8104/" source="CVE"/>
		<reference ref_id="CVE-2015-8339" ref_url="https://www.suse.com/security/cve/CVE-2015-8339/" source="CVE"/>
		<reference ref_id="CVE-2015-8340" ref_url="https://www.suse.com/security/cve/CVE-2015-8340/" source="CVE"/>
		<reference ref_id="CVE-2015-8341" ref_url="https://www.suse.com/security/cve/CVE-2015-8341/" source="CVE"/>
		<reference ref_id="CVE-2015-8345" ref_url="https://www.suse.com/security/cve/CVE-2015-8345/" source="CVE"/>
		<reference ref_id="CVE-2015-8504" ref_url="https://www.suse.com/security/cve/CVE-2015-8504/" source="CVE"/>
		<reference ref_id="CVE-2015-8550" ref_url="https://www.suse.com/security/cve/CVE-2015-8550/" source="CVE"/>
		<reference ref_id="CVE-2015-8554" ref_url="https://www.suse.com/security/cve/CVE-2015-8554/" source="CVE"/>
		<reference ref_id="CVE-2015-8555" ref_url="https://www.suse.com/security/cve/CVE-2015-8555/" source="CVE"/>
		<reference ref_id="CVE-2015-8558" ref_url="https://www.suse.com/security/cve/CVE-2015-8558/" source="CVE"/>
		<reference ref_id="CVE-2015-8567" ref_url="https://www.suse.com/security/cve/CVE-2015-8567/" source="CVE"/>
		<reference ref_id="CVE-2015-8568" ref_url="https://www.suse.com/security/cve/CVE-2015-8568/" source="CVE"/>
		<reference ref_id="CVE-2015-8613" ref_url="https://www.suse.com/security/cve/CVE-2015-8613/" source="CVE"/>
		<reference ref_id="CVE-2015-8615" ref_url="https://www.suse.com/security/cve/CVE-2015-8615/" source="CVE"/>
		<reference ref_id="CVE-2015-8619" ref_url="https://www.suse.com/security/cve/CVE-2015-8619/" source="CVE"/>
		<reference ref_id="CVE-2015-8743" ref_url="https://www.suse.com/security/cve/CVE-2015-8743/" source="CVE"/>
		<reference ref_id="CVE-2015-8744" ref_url="https://www.suse.com/security/cve/CVE-2015-8744/" source="CVE"/>
		<reference ref_id="CVE-2015-8745" ref_url="https://www.suse.com/security/cve/CVE-2015-8745/" source="CVE"/>
		<reference ref_id="CVE-2016-10013" ref_url="https://www.suse.com/security/cve/CVE-2016-10013/" source="CVE"/>
		<reference ref_id="CVE-2016-10024" ref_url="https://www.suse.com/security/cve/CVE-2016-10024/" source="CVE"/>
		<reference ref_id="CVE-2016-10025" ref_url="https://www.suse.com/security/cve/CVE-2016-10025/" source="CVE"/>
		<reference ref_id="CVE-2016-1568" ref_url="https://www.suse.com/security/cve/CVE-2016-1568/" source="CVE"/>
		<reference ref_id="CVE-2016-1570" ref_url="https://www.suse.com/security/cve/CVE-2016-1570/" source="CVE"/>
		<reference ref_id="CVE-2016-1571" ref_url="https://www.suse.com/security/cve/CVE-2016-1571/" source="CVE"/>
		<reference ref_id="CVE-2016-1714" ref_url="https://www.suse.com/security/cve/CVE-2016-1714/" source="CVE"/>
		<reference ref_id="CVE-2016-1922" ref_url="https://www.suse.com/security/cve/CVE-2016-1922/" source="CVE"/>
		<reference ref_id="CVE-2016-1981" ref_url="https://www.suse.com/security/cve/CVE-2016-1981/" source="CVE"/>
		<reference ref_id="CVE-2016-2198" ref_url="https://www.suse.com/security/cve/CVE-2016-2198/" source="CVE"/>
		<reference ref_id="CVE-2016-2270" ref_url="https://www.suse.com/security/cve/CVE-2016-2270/" source="CVE"/>
		<reference ref_id="CVE-2016-2271" ref_url="https://www.suse.com/security/cve/CVE-2016-2271/" source="CVE"/>
		<reference ref_id="CVE-2016-2391" ref_url="https://www.suse.com/security/cve/CVE-2016-2391/" source="CVE"/>
		<reference ref_id="CVE-2016-2392" ref_url="https://www.suse.com/security/cve/CVE-2016-2392/" source="CVE"/>
		<reference ref_id="CVE-2016-2538" ref_url="https://www.suse.com/security/cve/CVE-2016-2538/" source="CVE"/>
		<reference ref_id="CVE-2016-2841" ref_url="https://www.suse.com/security/cve/CVE-2016-2841/" source="CVE"/>
		<reference ref_id="CVE-2016-4439" ref_url="https://www.suse.com/security/cve/CVE-2016-4439/" source="CVE"/>
		<reference ref_id="CVE-2016-4441" ref_url="https://www.suse.com/security/cve/CVE-2016-4441/" source="CVE"/>
		<reference ref_id="CVE-2016-5238" ref_url="https://www.suse.com/security/cve/CVE-2016-5238/" source="CVE"/>
		<reference ref_id="CVE-2016-5338" ref_url="https://www.suse.com/security/cve/CVE-2016-5338/" source="CVE"/>
		<reference ref_id="CVE-2016-6258" ref_url="https://www.suse.com/security/cve/CVE-2016-6258/" source="CVE"/>
		<reference ref_id="CVE-2016-6259" ref_url="https://www.suse.com/security/cve/CVE-2016-6259/" source="CVE"/>
		<reference ref_id="CVE-2016-6351" ref_url="https://www.suse.com/security/cve/CVE-2016-6351/" source="CVE"/>
		<reference ref_id="CVE-2016-7092" ref_url="https://www.suse.com/security/cve/CVE-2016-7092/" source="CVE"/>
		<reference ref_id="CVE-2016-7093" ref_url="https://www.suse.com/security/cve/CVE-2016-7093/" source="CVE"/>
		<reference ref_id="CVE-2016-7094" ref_url="https://www.suse.com/security/cve/CVE-2016-7094/" source="CVE"/>
		<reference ref_id="CVE-2016-7777" ref_url="https://www.suse.com/security/cve/CVE-2016-7777/" source="CVE"/>
		<reference ref_id="CVE-2016-7908" ref_url="https://www.suse.com/security/cve/CVE-2016-7908/" source="CVE"/>
		<reference ref_id="CVE-2016-7909" ref_url="https://www.suse.com/security/cve/CVE-2016-7909/" source="CVE"/>
		<reference ref_id="CVE-2016-8667" ref_url="https://www.suse.com/security/cve/CVE-2016-8667/" source="CVE"/>
		<reference ref_id="CVE-2016-8669" ref_url="https://www.suse.com/security/cve/CVE-2016-8669/" source="CVE"/>
		<reference ref_id="CVE-2016-8910" ref_url="https://www.suse.com/security/cve/CVE-2016-8910/" source="CVE"/>
		<reference ref_id="CVE-2016-9377" ref_url="https://www.suse.com/security/cve/CVE-2016-9377/" source="CVE"/>
		<reference ref_id="CVE-2016-9378" ref_url="https://www.suse.com/security/cve/CVE-2016-9378/" source="CVE"/>
		<reference ref_id="CVE-2016-9379" ref_url="https://www.suse.com/security/cve/CVE-2016-9379/" source="CVE"/>
		<reference ref_id="CVE-2016-9380" ref_url="https://www.suse.com/security/cve/CVE-2016-9380/" source="CVE"/>
		<reference ref_id="CVE-2016-9381" ref_url="https://www.suse.com/security/cve/CVE-2016-9381/" source="CVE"/>
		<reference ref_id="CVE-2016-9382" ref_url="https://www.suse.com/security/cve/CVE-2016-9382/" source="CVE"/>
		<reference ref_id="CVE-2016-9383" ref_url="https://www.suse.com/security/cve/CVE-2016-9383/" source="CVE"/>
		<reference ref_id="CVE-2016-9384" ref_url="https://www.suse.com/security/cve/CVE-2016-9384/" source="CVE"/>
		<reference ref_id="CVE-2016-9385" ref_url="https://www.suse.com/security/cve/CVE-2016-9385/" source="CVE"/>
		<reference ref_id="CVE-2016-9386" ref_url="https://www.suse.com/security/cve/CVE-2016-9386/" source="CVE"/>
		<reference ref_id="CVE-2016-9637" ref_url="https://www.suse.com/security/cve/CVE-2016-9637/" source="CVE"/>
		<reference ref_id="CVE-2016-9921" ref_url="https://www.suse.com/security/cve/CVE-2016-9921/" source="CVE"/>
		<reference ref_id="CVE-2016-9922" ref_url="https://www.suse.com/security/cve/CVE-2016-9922/" source="CVE"/>
		<reference ref_id="CVE-2016-9932" ref_url="https://www.suse.com/security/cve/CVE-2016-9932/" source="CVE"/>
		<reference ref_id="CVE-2017-12135" ref_url="https://www.suse.com/security/cve/CVE-2017-12135/" source="CVE"/>
		<reference ref_id="CVE-2017-12136" ref_url="https://www.suse.com/security/cve/CVE-2017-12136/" source="CVE"/>
		<reference ref_id="CVE-2017-12137" ref_url="https://www.suse.com/security/cve/CVE-2017-12137/" source="CVE"/>
		<reference ref_id="CVE-2017-2615" ref_url="https://www.suse.com/security/cve/CVE-2017-2615/" source="CVE"/>
		<reference ref_id="CVE-2017-2620" ref_url="https://www.suse.com/security/cve/CVE-2017-2620/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2017-6505" ref_url="https://www.suse.com/security/cve/CVE-2017-6505/" source="CVE"/>
		<reference ref_id="CVE-2017-8309" ref_url="https://www.suse.com/security/cve/CVE-2017-8309/" source="CVE"/>
		<reference ref_id="CVE-2017-9330" ref_url="https://www.suse.com/security/cve/CVE-2017-9330/" source="CVE"/>
		<reference ref_id="CVE-2018-10471" ref_url="https://www.suse.com/security/cve/CVE-2018-10471/" source="CVE"/>
		<reference ref_id="CVE-2018-10472" ref_url="https://www.suse.com/security/cve/CVE-2018-10472/" source="CVE"/>
		<reference ref_id="CVE-2018-10981" ref_url="https://www.suse.com/security/cve/CVE-2018-10981/" source="CVE"/>
		<reference ref_id="CVE-2018-10982" ref_url="https://www.suse.com/security/cve/CVE-2018-10982/" source="CVE"/>
		<reference ref_id="CVE-2018-12126" ref_url="https://www.suse.com/security/cve/CVE-2018-12126/" source="CVE"/>
		<reference ref_id="CVE-2018-12127" ref_url="https://www.suse.com/security/cve/CVE-2018-12127/" source="CVE"/>
		<reference ref_id="CVE-2018-12130" ref_url="https://www.suse.com/security/cve/CVE-2018-12130/" source="CVE"/>
		<reference ref_id="CVE-2018-12891" ref_url="https://www.suse.com/security/cve/CVE-2018-12891/" source="CVE"/>
		<reference ref_id="CVE-2018-12892" ref_url="https://www.suse.com/security/cve/CVE-2018-12892/" source="CVE"/>
		<reference ref_id="CVE-2018-12893" ref_url="https://www.suse.com/security/cve/CVE-2018-12893/" source="CVE"/>
		<reference ref_id="CVE-2018-15468" ref_url="https://www.suse.com/security/cve/CVE-2018-15468/" source="CVE"/>
		<reference ref_id="CVE-2018-15469" ref_url="https://www.suse.com/security/cve/CVE-2018-15469/" source="CVE"/>
		<reference ref_id="CVE-2018-15470" ref_url="https://www.suse.com/security/cve/CVE-2018-15470/" source="CVE"/>
		<reference ref_id="CVE-2018-18883" ref_url="https://www.suse.com/security/cve/CVE-2018-18883/" source="CVE"/>
		<reference ref_id="CVE-2018-19961" ref_url="https://www.suse.com/security/cve/CVE-2018-19961/" source="CVE"/>
		<reference ref_id="CVE-2018-19962" ref_url="https://www.suse.com/security/cve/CVE-2018-19962/" source="CVE"/>
		<reference ref_id="CVE-2018-19963" ref_url="https://www.suse.com/security/cve/CVE-2018-19963/" source="CVE"/>
		<reference ref_id="CVE-2018-19964" ref_url="https://www.suse.com/security/cve/CVE-2018-19964/" source="CVE"/>
		<reference ref_id="CVE-2018-19965" ref_url="https://www.suse.com/security/cve/CVE-2018-19965/" source="CVE"/>
		<reference ref_id="CVE-2018-19966" ref_url="https://www.suse.com/security/cve/CVE-2018-19966/" source="CVE"/>
		<reference ref_id="CVE-2018-19967" ref_url="https://www.suse.com/security/cve/CVE-2018-19967/" source="CVE"/>
		<reference ref_id="CVE-2018-3639" ref_url="https://www.suse.com/security/cve/CVE-2018-3639/" source="CVE"/>
		<reference ref_id="CVE-2018-3646" ref_url="https://www.suse.com/security/cve/CVE-2018-3646/" source="CVE"/>
		<reference ref_id="CVE-2018-3665" ref_url="https://www.suse.com/security/cve/CVE-2018-3665/" source="CVE"/>
		<reference ref_id="CVE-2018-5244" ref_url="https://www.suse.com/security/cve/CVE-2018-5244/" source="CVE"/>
		<reference ref_id="CVE-2018-7540" ref_url="https://www.suse.com/security/cve/CVE-2018-7540/" source="CVE"/>
		<reference ref_id="CVE-2018-7541" ref_url="https://www.suse.com/security/cve/CVE-2018-7541/" source="CVE"/>
		<reference ref_id="CVE-2018-7542" ref_url="https://www.suse.com/security/cve/CVE-2018-7542/" source="CVE"/>
		<reference ref_id="CVE-2018-8897" ref_url="https://www.suse.com/security/cve/CVE-2018-8897/" source="CVE"/>
		<reference ref_id="CVE-2019-11091" ref_url="https://www.suse.com/security/cve/CVE-2019-11091/" source="CVE"/>
		<reference ref_id="CVE-2019-17349" ref_url="https://www.suse.com/security/cve/CVE-2019-17349/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-11739" ref_url="https://www.suse.com/security/cve/CVE-2020-11739/" source="CVE"/>
		<reference ref_id="CVE-2020-11740" ref_url="https://www.suse.com/security/cve/CVE-2020-11740/" source="CVE"/>
		<reference ref_id="CVE-2020-11741" ref_url="https://www.suse.com/security/cve/CVE-2020-11741/" source="CVE"/>
		<reference ref_id="CVE-2020-11742" ref_url="https://www.suse.com/security/cve/CVE-2020-11742/" source="CVE"/>
		<reference ref_id="CVE-2020-11743" ref_url="https://www.suse.com/security/cve/CVE-2020-11743/" source="CVE"/>
		<description>
These are all security issues fixed in the xen-4.13.1_02-1.2 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-3495/">CVE-2013-3495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4533/">CVE-2013-4533</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4534/">CVE-2013-4534</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4537/">CVE-2013-4537</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4538/">CVE-2013-4538</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4539/">CVE-2013-4539</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4540/">CVE-2013-4540</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0222/">CVE-2014-0222</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2014-3640/">CVE-2014-3640</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3672/">CVE-2014-3672</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-7815/">CVE-2014-7815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1779/">CVE-2015-1779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3259/">CVE-2015-3259</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-3340/">CVE-2015-3340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3456/">CVE-2015-3456</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4037/">CVE-2015-4037</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4103/">CVE-2015-4103</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4104/">CVE-2015-4104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4105/">CVE-2015-4105</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4106/">CVE-2015-4106</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5154/">CVE-2015-5154</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5239/">CVE-2015-5239</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5278/">CVE-2015-5278</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5307/">CVE-2015-5307</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6815/">CVE-2015-6815</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-6855/">CVE-2015-6855</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7311/">CVE-2015-7311</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7504/">CVE-2015-7504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7512/">CVE-2015-7512</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-7549/">CVE-2015-7549</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7835/">CVE-2015-7835</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7969/">CVE-2015-7969</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7970/">CVE-2015-7970</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7971/">CVE-2015-7971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7972/">CVE-2015-7972</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8104/">CVE-2015-8104</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8339/">CVE-2015-8339</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8340/">CVE-2015-8340</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8341/">CVE-2015-8341</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8345/">CVE-2015-8345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8504/">CVE-2015-8504</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8550/">CVE-2015-8550</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8554/">CVE-2015-8554</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8555/">CVE-2015-8555</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8558/">CVE-2015-8558</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8567/">CVE-2015-8567</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8568/">CVE-2015-8568</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8613/">CVE-2015-8613</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8615/">CVE-2015-8615</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8619/">CVE-2015-8619</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8743/">CVE-2015-8743</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8744/">CVE-2015-8744</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8745/">CVE-2015-8745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10013/">CVE-2016-10013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10024/">CVE-2016-10024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10025/">CVE-2016-10025</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1568/">CVE-2016-1568</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1570/">CVE-2016-1570</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1571/">CVE-2016-1571</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1714/">CVE-2016-1714</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1922/">CVE-2016-1922</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-1981/">CVE-2016-1981</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2198/">CVE-2016-2198</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2270/">CVE-2016-2270</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2271/">CVE-2016-2271</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2391/">CVE-2016-2391</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2392/">CVE-2016-2392</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2538/">CVE-2016-2538</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2841/">CVE-2016-2841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4439/">CVE-2016-4439</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4441/">CVE-2016-4441</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5238/">CVE-2016-5238</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-5338/">CVE-2016-5338</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6258/">CVE-2016-6258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6259/">CVE-2016-6259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6351/">CVE-2016-6351</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-7092/">CVE-2016-7092</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7093/">CVE-2016-7093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7094/">CVE-2016-7094</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7777/">CVE-2016-7777</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7908/">CVE-2016-7908</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7909/">CVE-2016-7909</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8667/">CVE-2016-8667</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8669/">CVE-2016-8669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8910/">CVE-2016-8910</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9377/">CVE-2016-9377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9378/">CVE-2016-9378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9379/">CVE-2016-9379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9380/">CVE-2016-9380</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2016-9381/">CVE-2016-9381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9382/">CVE-2016-9382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9383/">CVE-2016-9383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9384/">CVE-2016-9384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9385/">CVE-2016-9385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9386/">CVE-2016-9386</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9637/">CVE-2016-9637</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9921/">CVE-2016-9921</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9922/">CVE-2016-9922</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9932/">CVE-2016-9932</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-12135/">CVE-2017-12135</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12136/">CVE-2017-12136</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12137/">CVE-2017-12137</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2615/">CVE-2017-2615</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-2620/">CVE-2017-2620</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6505/">CVE-2017-6505</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-8309/">CVE-2017-8309</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9330/">CVE-2017-9330</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10471/">CVE-2018-10471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10472/">CVE-2018-10472</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10981/">CVE-2018-10981</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-10982/">CVE-2018-10982</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12126/">CVE-2018-12126</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12127/">CVE-2018-12127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12130/">CVE-2018-12130</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12891/">CVE-2018-12891</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12892/">CVE-2018-12892</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12893/">CVE-2018-12893</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15468/">CVE-2018-15468</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15469/">CVE-2018-15469</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-15470/">CVE-2018-15470</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-18883/">CVE-2018-18883</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19961/">CVE-2018-19961</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19962/">CVE-2018-19962</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-19963/">CVE-2018-19963</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19964/">CVE-2018-19964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-19965/">CVE-2018-19965</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-19966/">CVE-2018-19966</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19967/">CVE-2018-19967</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3639/">CVE-2018-3639</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3646/">CVE-2018-3646</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-3665/">CVE-2018-3665</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5244/">CVE-2018-5244</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7540/">CVE-2018-7540</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-7541/">CVE-2018-7541</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7542/">CVE-2018-7542</cve>
	<cve impact="moderate" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8897/">CVE-2018-8897</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11091/">CVE-2019-11091</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-17349/">CVE-2019-17349</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-11739/">CVE-2020-11739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11740/">CVE-2020-11740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11741/">CVE-2020-11741</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11742/">CVE-2020-11742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11743/">CVE-2020-11743</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488660" comment="xen-4.13.1_02-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488661" comment="xen-devel-4.13.1_02-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488662" comment="xen-tools-4.13.1_02-1.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488663" comment="xen-tools-xendomains-wait-disk-4.13.1_02-1.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109939" version="1" class="patch">
	<metadata>
		<title>yast2-rmt-1.3.0-1.43 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2018-17957" ref_url="https://www.suse.com/security/cve/CVE-2018-17957/" source="CVE"/>
		<reference ref_id="CVE-2018-20105" ref_url="https://www.suse.com/security/cve/CVE-2018-20105/" source="CVE"/>
		<description>
These are all security issues fixed in the yast2-rmt-1.3.0-1.43 package on the GA media of SUSE Linux Enterprise Module for Server Applications 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17957/">CVE-2018-17957</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20105/">CVE-2018-20105</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488664" comment="yast2-rmt-1.3.0-1.43 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109940" version="1" class="patch">
	<metadata>
		<title>apache-commons-beanutils-1.9.4-1.68 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-0114" ref_url="https://www.suse.com/security/cve/CVE-2014-0114/" source="CVE"/>
		<reference ref_id="CVE-2015-4852" ref_url="https://www.suse.com/security/cve/CVE-2015-4852/" source="CVE"/>
		<reference ref_id="CVE-2019-10086" ref_url="https://www.suse.com/security/cve/CVE-2019-10086/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-beanutils-1.9.4-1.68 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2014-0114/">CVE-2014-0114</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4852/">CVE-2015-4852</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10086/">CVE-2019-10086</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488798" comment="apache-commons-beanutils-1.9.4-1.68 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109941" version="1" class="patch">
	<metadata>
		<title>apache-commons-fileupload-1.4-1.63 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2013-2186" ref_url="https://www.suse.com/security/cve/CVE-2013-2186/" source="CVE"/>
		<reference ref_id="CVE-2014-0050" ref_url="https://www.suse.com/security/cve/CVE-2014-0050/" source="CVE"/>
		<description>
These are all security issues fixed in the apache-commons-fileupload-1.4-1.63 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2013-2186/">CVE-2013-2186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0050/">CVE-2014-0050</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488799" comment="apache-commons-fileupload-1.4-1.63 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109942" version="1" class="patch">
	<metadata>
		<title>apache2-mod_php7-7.4.6-1.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2014-3622" ref_url="https://www.suse.com/security/cve/CVE-2014-3622/" source="CVE"/>
		<reference ref_id="CVE-2014-3668" ref_url="https://www.suse.com/security/cve/CVE-2014-3668/" source="CVE"/>
		<reference ref_id="CVE-2014-3669" ref_url="https://www.suse.com/security/cve/CVE-2014-3669/" source="CVE"/>
		<reference ref_id="CVE-2014-3670" ref_url="https://www.suse.com/security/cve/CVE-2014-3670/" source="CVE"/>
		<reference ref_id="CVE-2014-9426" ref_url="https://www.suse.com/security/cve/CVE-2014-9426/" source="CVE"/>
		<reference ref_id="CVE-2014-9427" ref_url="https://www.suse.com/security/cve/CVE-2014-9427/" source="CVE"/>
		<reference ref_id="CVE-2015-0231" ref_url="https://www.suse.com/security/cve/CVE-2015-0231/" source="CVE"/>
		<reference ref_id="CVE-2015-0232" ref_url="https://www.suse.com/security/cve/CVE-2015-0232/" source="CVE"/>
		<reference ref_id="CVE-2015-0235" ref_url="https://www.suse.com/security/cve/CVE-2015-0235/" source="CVE"/>
		<reference ref_id="CVE-2015-0273" ref_url="https://www.suse.com/security/cve/CVE-2015-0273/" source="CVE"/>
		<reference ref_id="CVE-2015-1351" ref_url="https://www.suse.com/security/cve/CVE-2015-1351/" source="CVE"/>
		<reference ref_id="CVE-2015-1352" ref_url="https://www.suse.com/security/cve/CVE-2015-1352/" source="CVE"/>
		<reference ref_id="CVE-2015-2305" ref_url="https://www.suse.com/security/cve/CVE-2015-2305/" source="CVE"/>
		<reference ref_id="CVE-2015-2325" ref_url="https://www.suse.com/security/cve/CVE-2015-2325/" source="CVE"/>
		<reference ref_id="CVE-2015-2326" ref_url="https://www.suse.com/security/cve/CVE-2015-2326/" source="CVE"/>
		<reference ref_id="CVE-2015-2331" ref_url="https://www.suse.com/security/cve/CVE-2015-2331/" source="CVE"/>
		<reference ref_id="CVE-2015-3152" ref_url="https://www.suse.com/security/cve/CVE-2015-3152/" source="CVE"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2015-3416" ref_url="https://www.suse.com/security/cve/CVE-2015-3416/" source="CVE"/>
		<reference ref_id="CVE-2017-9120" ref_url="https://www.suse.com/security/cve/CVE-2017-9120/" source="CVE"/>
		<reference ref_id="CVE-2018-1000222" ref_url="https://www.suse.com/security/cve/CVE-2018-1000222/" source="CVE"/>
		<reference ref_id="CVE-2018-1000888" ref_url="https://www.suse.com/security/cve/CVE-2018-1000888/" source="CVE"/>
		<reference ref_id="CVE-2018-12882" ref_url="https://www.suse.com/security/cve/CVE-2018-12882/" source="CVE"/>
		<reference ref_id="CVE-2018-14851" ref_url="https://www.suse.com/security/cve/CVE-2018-14851/" source="CVE"/>
		<reference ref_id="CVE-2018-17082" ref_url="https://www.suse.com/security/cve/CVE-2018-17082/" source="CVE"/>
		<reference ref_id="CVE-2018-19935" ref_url="https://www.suse.com/security/cve/CVE-2018-19935/" source="CVE"/>
		<reference ref_id="CVE-2018-20783" ref_url="https://www.suse.com/security/cve/CVE-2018-20783/" source="CVE"/>
		<reference ref_id="CVE-2019-11034" ref_url="https://www.suse.com/security/cve/CVE-2019-11034/" source="CVE"/>
		<reference ref_id="CVE-2019-11035" ref_url="https://www.suse.com/security/cve/CVE-2019-11035/" source="CVE"/>
		<reference ref_id="CVE-2019-11036" ref_url="https://www.suse.com/security/cve/CVE-2019-11036/" source="CVE"/>
		<reference ref_id="CVE-2019-11039" ref_url="https://www.suse.com/security/cve/CVE-2019-11039/" source="CVE"/>
		<reference ref_id="CVE-2019-11040" ref_url="https://www.suse.com/security/cve/CVE-2019-11040/" source="CVE"/>
		<reference ref_id="CVE-2019-11041" ref_url="https://www.suse.com/security/cve/CVE-2019-11041/" source="CVE"/>
		<reference ref_id="CVE-2019-11042" ref_url="https://www.suse.com/security/cve/CVE-2019-11042/" source="CVE"/>
		<reference ref_id="CVE-2019-11043" ref_url="https://www.suse.com/security/cve/CVE-2019-11043/" source="CVE"/>
		<reference ref_id="CVE-2019-11045" ref_url="https://www.suse.com/security/cve/CVE-2019-11045/" source="CVE"/>
		<reference ref_id="CVE-2019-11046" ref_url="https://www.suse.com/security/cve/CVE-2019-11046/" source="CVE"/>
		<reference ref_id="CVE-2019-11047" ref_url="https://www.suse.com/security/cve/CVE-2019-11047/" source="CVE"/>
		<reference ref_id="CVE-2019-11050" ref_url="https://www.suse.com/security/cve/CVE-2019-11050/" source="CVE"/>
		<reference ref_id="CVE-2019-9020" ref_url="https://www.suse.com/security/cve/CVE-2019-9020/" source="CVE"/>
		<reference ref_id="CVE-2019-9021" ref_url="https://www.suse.com/security/cve/CVE-2019-9021/" source="CVE"/>
		<reference ref_id="CVE-2019-9022" ref_url="https://www.suse.com/security/cve/CVE-2019-9022/" source="CVE"/>
		<reference ref_id="CVE-2019-9023" ref_url="https://www.suse.com/security/cve/CVE-2019-9023/" source="CVE"/>
		<reference ref_id="CVE-2019-9024" ref_url="https://www.suse.com/security/cve/CVE-2019-9024/" source="CVE"/>
		<reference ref_id="CVE-2019-9637" ref_url="https://www.suse.com/security/cve/CVE-2019-9637/" source="CVE"/>
		<reference ref_id="CVE-2019-9638" ref_url="https://www.suse.com/security/cve/CVE-2019-9638/" source="CVE"/>
		<reference ref_id="CVE-2019-9639" ref_url="https://www.suse.com/security/cve/CVE-2019-9639/" source="CVE"/>
		<reference ref_id="CVE-2019-9640" ref_url="https://www.suse.com/security/cve/CVE-2019-9640/" source="CVE"/>
		<reference ref_id="CVE-2019-9641" ref_url="https://www.suse.com/security/cve/CVE-2019-9641/" source="CVE"/>
		<reference ref_id="CVE-2019-9675" ref_url="https://www.suse.com/security/cve/CVE-2019-9675/" source="CVE"/>
		<reference ref_id="CVE-2020-7062" ref_url="https://www.suse.com/security/cve/CVE-2020-7062/" source="CVE"/>
		<reference ref_id="CVE-2020-7063" ref_url="https://www.suse.com/security/cve/CVE-2020-7063/" source="CVE"/>
		<description>
These are all security issues fixed in the apache2-mod_php7-7.4.6-1.11 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3622/">CVE-2014-3622</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3668/">CVE-2014-3668</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3669/">CVE-2014-3669</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3670/">CVE-2014-3670</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2014-9426/">CVE-2014-9426</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9427/">CVE-2014-9427</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-0231/">CVE-2015-0231</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0232/">CVE-2015-0232</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0235/">CVE-2015-0235</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0273/">CVE-2015-0273</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-1351/">CVE-2015-1351</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-1352/">CVE-2015-1352</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2305/">CVE-2015-2305</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2325/">CVE-2015-2325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2326/">CVE-2015-2326</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2331/">CVE-2015-2331</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3152/">CVE-2015-3152</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3416/">CVE-2015-3416</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9120/">CVE-2017-9120</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000222/">CVE-2018-1000222</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-1000888/">CVE-2018-1000888</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12882/">CVE-2018-12882</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14851/">CVE-2018-14851</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-17082/">CVE-2018-17082</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19935/">CVE-2018-19935</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20783/">CVE-2018-20783</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11034/">CVE-2019-11034</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11035/">CVE-2019-11035</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11036/">CVE-2019-11036</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11039/">CVE-2019-11039</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11040/">CVE-2019-11040</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11041/">CVE-2019-11041</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11042/">CVE-2019-11042</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11043/">CVE-2019-11043</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11045/">CVE-2019-11045</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11046/">CVE-2019-11046</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11047/">CVE-2019-11047</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11050/">CVE-2019-11050</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9020/">CVE-2019-9020</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9021/">CVE-2019-9021</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9022/">CVE-2019-9022</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9023/">CVE-2019-9023</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9024/">CVE-2019-9024</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9637/">CVE-2019-9637</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9638/">CVE-2019-9638</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-9639/">CVE-2019-9639</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9640/">CVE-2019-9640</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9641/">CVE-2019-9641</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9675/">CVE-2019-9675</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7062/">CVE-2020-7062</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-7063/">CVE-2020-7063</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488800" comment="apache2-mod_php7-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488801" comment="php7-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488802" comment="php7-bcmath-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488803" comment="php7-bz2-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488804" comment="php7-calendar-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488805" comment="php7-ctype-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488806" comment="php7-curl-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488807" comment="php7-dba-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488808" comment="php7-devel-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488809" comment="php7-dom-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488810" comment="php7-enchant-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488811" comment="php7-exif-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488812" comment="php7-fastcgi-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488813" comment="php7-fileinfo-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488814" comment="php7-fpm-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488815" comment="php7-ftp-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488816" comment="php7-gd-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488817" comment="php7-gettext-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488818" comment="php7-gmp-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488819" comment="php7-iconv-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488820" comment="php7-intl-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488821" comment="php7-json-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488822" comment="php7-ldap-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488823" comment="php7-mbstring-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488824" comment="php7-mysql-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488825" comment="php7-odbc-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488826" comment="php7-opcache-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488827" comment="php7-openssl-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488828" comment="php7-pcntl-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488829" comment="php7-pdo-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488830" comment="php7-pgsql-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488831" comment="php7-phar-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488832" comment="php7-posix-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488833" comment="php7-readline-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488834" comment="php7-shmop-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488835" comment="php7-snmp-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488836" comment="php7-soap-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488837" comment="php7-sockets-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488838" comment="php7-sodium-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488839" comment="php7-sqlite-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488840" comment="php7-sysvmsg-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488841" comment="php7-sysvsem-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488842" comment="php7-sysvshm-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488843" comment="php7-tidy-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488844" comment="php7-tokenizer-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488845" comment="php7-xmlreader-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488846" comment="php7-xmlrpc-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488847" comment="php7-xmlwriter-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488848" comment="php7-xsl-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488849" comment="php7-zip-7.4.6-1.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488850" comment="php7-zlib-7.4.6-1.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109943" version="1" class="patch">
	<metadata>
		<title>jakarta-taglibs-standard-1.1.1-2.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-0254" ref_url="https://www.suse.com/security/cve/CVE-2015-0254/" source="CVE"/>
		<description>
These are all security issues fixed in the jakarta-taglibs-standard-1.1.1-2.42 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0254/">CVE-2015-0254</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488719" comment="jakarta-taglibs-standard-1.1.1-2.42 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109944" version="1" class="patch">
	<metadata>
		<title>nodejs10-10.19.0-1.18.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-0734" ref_url="https://www.suse.com/security/cve/CVE-2018-0734/" source="CVE"/>
		<reference ref_id="CVE-2018-0735" ref_url="https://www.suse.com/security/cve/CVE-2018-0735/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7162" ref_url="https://www.suse.com/security/cve/CVE-2018-7162/" source="CVE"/>
		<reference ref_id="CVE-2018-7164" ref_url="https://www.suse.com/security/cve/CVE-2018-7164/" source="CVE"/>
		<reference ref_id="CVE-2018-7166" ref_url="https://www.suse.com/security/cve/CVE-2018-7166/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs10-10.19.0-1.18.1 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0734/">CVE-2018-0734</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-0735/">CVE-2018-0735</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7162/">CVE-2018-7162</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-7164/">CVE-2018-7164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-7166/">CVE-2018-7166</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488851" comment="nodejs10-10.19.0-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488852" comment="nodejs10-devel-10.19.0-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488853" comment="nodejs10-docs-10.19.0-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488854" comment="npm10-10.19.0-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109945" version="1" class="patch">
	<metadata>
		<title>nodejs12-12.18.0-2.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8172" ref_url="https://www.suse.com/security/cve/CVE-2020-8172/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs12-12.18.0-2.1 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8172/">CVE-2020-8172</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488855" comment="nodejs12-12.18.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488856" comment="nodejs12-devel-12.18.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488857" comment="nodejs12-docs-12.18.0-2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488858" comment="npm12-12.18.0-2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109946" version="1" class="patch">
	<metadata>
		<title>nodejs8-8.17.0-8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-3193" ref_url="https://www.suse.com/security/cve/CVE-2015-3193/" source="CVE"/>
		<reference ref_id="CVE-2015-3194" ref_url="https://www.suse.com/security/cve/CVE-2015-3194/" source="CVE"/>
		<reference ref_id="CVE-2015-5380" ref_url="https://www.suse.com/security/cve/CVE-2015-5380/" source="CVE"/>
		<reference ref_id="CVE-2015-7384" ref_url="https://www.suse.com/security/cve/CVE-2015-7384/" source="CVE"/>
		<reference ref_id="CVE-2016-2086" ref_url="https://www.suse.com/security/cve/CVE-2016-2086/" source="CVE"/>
		<reference ref_id="CVE-2016-2178" ref_url="https://www.suse.com/security/cve/CVE-2016-2178/" source="CVE"/>
		<reference ref_id="CVE-2016-2183" ref_url="https://www.suse.com/security/cve/CVE-2016-2183/" source="CVE"/>
		<reference ref_id="CVE-2016-2216" ref_url="https://www.suse.com/security/cve/CVE-2016-2216/" source="CVE"/>
		<reference ref_id="CVE-2016-5172" ref_url="https://www.suse.com/security/cve/CVE-2016-5172/" source="CVE"/>
		<reference ref_id="CVE-2016-5325" ref_url="https://www.suse.com/security/cve/CVE-2016-5325/" source="CVE"/>
		<reference ref_id="CVE-2016-6304" ref_url="https://www.suse.com/security/cve/CVE-2016-6304/" source="CVE"/>
		<reference ref_id="CVE-2016-6306" ref_url="https://www.suse.com/security/cve/CVE-2016-6306/" source="CVE"/>
		<reference ref_id="CVE-2016-7052" ref_url="https://www.suse.com/security/cve/CVE-2016-7052/" source="CVE"/>
		<reference ref_id="CVE-2016-7099" ref_url="https://www.suse.com/security/cve/CVE-2016-7099/" source="CVE"/>
		<reference ref_id="CVE-2017-1000381" ref_url="https://www.suse.com/security/cve/CVE-2017-1000381/" source="CVE"/>
		<reference ref_id="CVE-2017-11499" ref_url="https://www.suse.com/security/cve/CVE-2017-11499/" source="CVE"/>
		<reference ref_id="CVE-2017-14849" ref_url="https://www.suse.com/security/cve/CVE-2017-14849/" source="CVE"/>
		<reference ref_id="CVE-2017-14919" ref_url="https://www.suse.com/security/cve/CVE-2017-14919/" source="CVE"/>
		<reference ref_id="CVE-2017-15896" ref_url="https://www.suse.com/security/cve/CVE-2017-15896/" source="CVE"/>
		<reference ref_id="CVE-2017-15897" ref_url="https://www.suse.com/security/cve/CVE-2017-15897/" source="CVE"/>
		<reference ref_id="CVE-2017-3735" ref_url="https://www.suse.com/security/cve/CVE-2017-3735/" source="CVE"/>
		<reference ref_id="CVE-2017-3736" ref_url="https://www.suse.com/security/cve/CVE-2017-3736/" source="CVE"/>
		<reference ref_id="CVE-2017-3738" ref_url="https://www.suse.com/security/cve/CVE-2017-3738/" source="CVE"/>
		<reference ref_id="CVE-2018-0732" ref_url="https://www.suse.com/security/cve/CVE-2018-0732/" source="CVE"/>
		<reference ref_id="CVE-2018-1000168" ref_url="https://www.suse.com/security/cve/CVE-2018-1000168/" source="CVE"/>
		<reference ref_id="CVE-2018-12115" ref_url="https://www.suse.com/security/cve/CVE-2018-12115/" source="CVE"/>
		<reference ref_id="CVE-2018-12116" ref_url="https://www.suse.com/security/cve/CVE-2018-12116/" source="CVE"/>
		<reference ref_id="CVE-2018-12121" ref_url="https://www.suse.com/security/cve/CVE-2018-12121/" source="CVE"/>
		<reference ref_id="CVE-2018-12122" ref_url="https://www.suse.com/security/cve/CVE-2018-12122/" source="CVE"/>
		<reference ref_id="CVE-2018-12123" ref_url="https://www.suse.com/security/cve/CVE-2018-12123/" source="CVE"/>
		<reference ref_id="CVE-2018-7158" ref_url="https://www.suse.com/security/cve/CVE-2018-7158/" source="CVE"/>
		<reference ref_id="CVE-2018-7159" ref_url="https://www.suse.com/security/cve/CVE-2018-7159/" source="CVE"/>
		<reference ref_id="CVE-2018-7160" ref_url="https://www.suse.com/security/cve/CVE-2018-7160/" source="CVE"/>
		<reference ref_id="CVE-2018-7161" ref_url="https://www.suse.com/security/cve/CVE-2018-7161/" source="CVE"/>
		<reference ref_id="CVE-2018-7167" ref_url="https://www.suse.com/security/cve/CVE-2018-7167/" source="CVE"/>
		<reference ref_id="CVE-2019-13173" ref_url="https://www.suse.com/security/cve/CVE-2019-13173/" source="CVE"/>
		<reference ref_id="CVE-2019-15604" ref_url="https://www.suse.com/security/cve/CVE-2019-15604/" source="CVE"/>
		<reference ref_id="CVE-2019-15605" ref_url="https://www.suse.com/security/cve/CVE-2019-15605/" source="CVE"/>
		<reference ref_id="CVE-2019-15606" ref_url="https://www.suse.com/security/cve/CVE-2019-15606/" source="CVE"/>
		<reference ref_id="CVE-2019-16775" ref_url="https://www.suse.com/security/cve/CVE-2019-16775/" source="CVE"/>
		<reference ref_id="CVE-2019-16776" ref_url="https://www.suse.com/security/cve/CVE-2019-16776/" source="CVE"/>
		<reference ref_id="CVE-2019-16777" ref_url="https://www.suse.com/security/cve/CVE-2019-16777/" source="CVE"/>
		<reference ref_id="CVE-2019-5737" ref_url="https://www.suse.com/security/cve/CVE-2019-5737/" source="CVE"/>
		<reference ref_id="CVE-2019-9511" ref_url="https://www.suse.com/security/cve/CVE-2019-9511/" source="CVE"/>
		<reference ref_id="CVE-2019-9512" ref_url="https://www.suse.com/security/cve/CVE-2019-9512/" source="CVE"/>
		<reference ref_id="CVE-2019-9513" ref_url="https://www.suse.com/security/cve/CVE-2019-9513/" source="CVE"/>
		<reference ref_id="CVE-2019-9514" ref_url="https://www.suse.com/security/cve/CVE-2019-9514/" source="CVE"/>
		<reference ref_id="CVE-2019-9515" ref_url="https://www.suse.com/security/cve/CVE-2019-9515/" source="CVE"/>
		<reference ref_id="CVE-2019-9516" ref_url="https://www.suse.com/security/cve/CVE-2019-9516/" source="CVE"/>
		<reference ref_id="CVE-2019-9517" ref_url="https://www.suse.com/security/cve/CVE-2019-9517/" source="CVE"/>
		<reference ref_id="CVE-2019-9518" ref_url="https://www.suse.com/security/cve/CVE-2019-9518/" source="CVE"/>
		<description>
These are all security issues fixed in the nodejs8-8.17.0-8.1 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3193/">CVE-2015-3193</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3194/">CVE-2015-3194</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5380/">CVE-2015-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7384/">CVE-2015-7384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2086/">CVE-2016-2086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2178/">CVE-2016-2178</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2183/">CVE-2016-2183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2216/">CVE-2016-2216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5172/">CVE-2016-5172</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5325/">CVE-2016-5325</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6304/">CVE-2016-6304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6306/">CVE-2016-6306</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-7052/">CVE-2016-7052</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-7099/">CVE-2016-7099</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-1000381/">CVE-2017-1000381</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11499/">CVE-2017-11499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14849/">CVE-2017-14849</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14919/">CVE-2017-14919</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-15896/">CVE-2017-15896</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15897/">CVE-2017-15897</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-3735/">CVE-2017-3735</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-3736/">CVE-2017-3736</cve>
	<cve impact="low" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-3738/">CVE-2017-3738</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-0732/">CVE-2018-0732</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1000168/">CVE-2018-1000168</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12115/">CVE-2018-12115</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12116/">CVE-2018-12116</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12121/">CVE-2018-12121</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12122/">CVE-2018-12122</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12123/">CVE-2018-12123</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7158/">CVE-2018-7158</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7159/">CVE-2018-7159</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-7160/">CVE-2018-7160</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7161/">CVE-2018-7161</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7167/">CVE-2018-7167</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-13173/">CVE-2019-13173</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-15604/">CVE-2019-15604</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2019-15605/">CVE-2019-15605</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-15606/">CVE-2019-15606</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16775/">CVE-2019-16775</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16776/">CVE-2019-16776</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16777/">CVE-2019-16777</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2019-5737/">CVE-2019-5737</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9511/">CVE-2019-9511</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9512/">CVE-2019-9512</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9513/">CVE-2019-9513</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9514/">CVE-2019-9514</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9515/">CVE-2019-9515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9516/">CVE-2019-9516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9517/">CVE-2019-9517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9518/">CVE-2019-9518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488859" comment="nodejs8-8.17.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488860" comment="nodejs8-devel-8.17.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488861" comment="nodejs8-docs-8.17.0-8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488862" comment="npm8-8.17.0-8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109947" version="1" class="patch">
	<metadata>
		<title>tomcat-9.0.35-1.4 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2015-5174" ref_url="https://www.suse.com/security/cve/CVE-2015-5174/" source="CVE"/>
		<reference ref_id="CVE-2015-5345" ref_url="https://www.suse.com/security/cve/CVE-2015-5345/" source="CVE"/>
		<reference ref_id="CVE-2015-5346" ref_url="https://www.suse.com/security/cve/CVE-2015-5346/" source="CVE"/>
		<reference ref_id="CVE-2015-5351" ref_url="https://www.suse.com/security/cve/CVE-2015-5351/" source="CVE"/>
		<reference ref_id="CVE-2016-0706" ref_url="https://www.suse.com/security/cve/CVE-2016-0706/" source="CVE"/>
		<reference ref_id="CVE-2016-0714" ref_url="https://www.suse.com/security/cve/CVE-2016-0714/" source="CVE"/>
		<reference ref_id="CVE-2016-0763" ref_url="https://www.suse.com/security/cve/CVE-2016-0763/" source="CVE"/>
		<reference ref_id="CVE-2016-3092" ref_url="https://www.suse.com/security/cve/CVE-2016-3092/" source="CVE"/>
		<reference ref_id="CVE-2016-8745" ref_url="https://www.suse.com/security/cve/CVE-2016-8745/" source="CVE"/>
		<reference ref_id="CVE-2017-12617" ref_url="https://www.suse.com/security/cve/CVE-2017-12617/" source="CVE"/>
		<reference ref_id="CVE-2017-5647" ref_url="https://www.suse.com/security/cve/CVE-2017-5647/" source="CVE"/>
		<reference ref_id="CVE-2017-5648" ref_url="https://www.suse.com/security/cve/CVE-2017-5648/" source="CVE"/>
		<reference ref_id="CVE-2017-5664" ref_url="https://www.suse.com/security/cve/CVE-2017-5664/" source="CVE"/>
		<reference ref_id="CVE-2018-11784" ref_url="https://www.suse.com/security/cve/CVE-2018-11784/" source="CVE"/>
		<reference ref_id="CVE-2018-1336" ref_url="https://www.suse.com/security/cve/CVE-2018-1336/" source="CVE"/>
		<reference ref_id="CVE-2018-8014" ref_url="https://www.suse.com/security/cve/CVE-2018-8014/" source="CVE"/>
		<reference ref_id="CVE-2018-8034" ref_url="https://www.suse.com/security/cve/CVE-2018-8034/" source="CVE"/>
		<reference ref_id="CVE-2018-8037" ref_url="https://www.suse.com/security/cve/CVE-2018-8037/" source="CVE"/>
		<reference ref_id="CVE-2019-0199" ref_url="https://www.suse.com/security/cve/CVE-2019-0199/" source="CVE"/>
		<reference ref_id="CVE-2019-0221" ref_url="https://www.suse.com/security/cve/CVE-2019-0221/" source="CVE"/>
		<reference ref_id="CVE-2019-10072" ref_url="https://www.suse.com/security/cve/CVE-2019-10072/" source="CVE"/>
		<reference ref_id="CVE-2019-12418" ref_url="https://www.suse.com/security/cve/CVE-2019-12418/" source="CVE"/>
		<reference ref_id="CVE-2019-17563" ref_url="https://www.suse.com/security/cve/CVE-2019-17563/" source="CVE"/>
		<reference ref_id="CVE-2019-17569" ref_url="https://www.suse.com/security/cve/CVE-2019-17569/" source="CVE"/>
		<reference ref_id="CVE-2020-1935" ref_url="https://www.suse.com/security/cve/CVE-2020-1935/" source="CVE"/>
		<reference ref_id="CVE-2020-1938" ref_url="https://www.suse.com/security/cve/CVE-2020-1938/" source="CVE"/>
		<reference ref_id="CVE-2020-9484" ref_url="https://www.suse.com/security/cve/CVE-2020-9484/" source="CVE"/>
		<description>
These are all security issues fixed in the tomcat-9.0.35-1.4 package on the GA media of SUSE Linux Enterprise Module for Web Scripting 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5174/">CVE-2015-5174</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5345/">CVE-2015-5345</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5346/">CVE-2015-5346</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5351/">CVE-2015-5351</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0706/">CVE-2016-0706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-0714/">CVE-2016-0714</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0763/">CVE-2016-0763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3092/">CVE-2016-3092</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-8745/">CVE-2016-8745</cve>
	<cve impact="moderate" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-12617/">CVE-2017-12617</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5647/">CVE-2017-5647</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-5648/">CVE-2017-5648</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-5664/">CVE-2017-5664</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-11784/">CVE-2018-11784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-1336/">CVE-2018-1336</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-8014/">CVE-2018-8014</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-8034/">CVE-2018-8034</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-8037/">CVE-2018-8037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0199/">CVE-2019-0199</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-0221/">CVE-2019-0221</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10072/">CVE-2019-10072</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12418/">CVE-2019-12418</cve>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-17563/">CVE-2019-17563</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17569/">CVE-2019-17569</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1935/">CVE-2020-1935</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-1938/">CVE-2020-1938</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9484/">CVE-2020-9484</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488863" comment="tomcat-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488864" comment="tomcat-admin-webapps-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488865" comment="tomcat-el-3_0-api-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488866" comment="tomcat-jsp-2_3-api-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488867" comment="tomcat-lib-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488868" comment="tomcat-servlet-4_0-api-9.0.35-1.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488869" comment="tomcat-webapps-9.0.35-1.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109948" version="1" class="patch">
	<metadata>
		<title>Mesa-dri-nouveau-19.3.4-45.31 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2019-5068" ref_url="https://www.suse.com/security/cve/CVE-2019-5068/" source="CVE"/>
		<description>
These are all security issues fixed in the Mesa-dri-nouveau-19.3.4-45.31 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-5068/">CVE-2019-5068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489171" comment="Mesa-dri-nouveau-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489172" comment="libXvMC_nouveau-19.3.4-45.31 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489173" comment="libvdpau_nouveau-19.3.4-45.31 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109949" version="1" class="patch">
	<metadata>
		<title>MozillaThunderbird-68.8.0-3.80.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-3079" ref_url="https://www.suse.com/security/cve/CVE-2011-3079/" source="CVE"/>
		<reference ref_id="CVE-2014-1587" ref_url="https://www.suse.com/security/cve/CVE-2014-1587/" source="CVE"/>
		<reference ref_id="CVE-2014-1590" ref_url="https://www.suse.com/security/cve/CVE-2014-1590/" source="CVE"/>
		<reference ref_id="CVE-2014-1592" ref_url="https://www.suse.com/security/cve/CVE-2014-1592/" source="CVE"/>
		<reference ref_id="CVE-2014-1593" ref_url="https://www.suse.com/security/cve/CVE-2014-1593/" source="CVE"/>
		<reference ref_id="CVE-2014-1594" ref_url="https://www.suse.com/security/cve/CVE-2014-1594/" source="CVE"/>
		<reference ref_id="CVE-2014-8634" ref_url="https://www.suse.com/security/cve/CVE-2014-8634/" source="CVE"/>
		<reference ref_id="CVE-2014-8635" ref_url="https://www.suse.com/security/cve/CVE-2014-8635/" source="CVE"/>
		<reference ref_id="CVE-2014-8638" ref_url="https://www.suse.com/security/cve/CVE-2014-8638/" source="CVE"/>
		<reference ref_id="CVE-2014-8639" ref_url="https://www.suse.com/security/cve/CVE-2014-8639/" source="CVE"/>
		<reference ref_id="CVE-2015-0801" ref_url="https://www.suse.com/security/cve/CVE-2015-0801/" source="CVE"/>
		<reference ref_id="CVE-2015-0807" ref_url="https://www.suse.com/security/cve/CVE-2015-0807/" source="CVE"/>
		<reference ref_id="CVE-2015-0813" ref_url="https://www.suse.com/security/cve/CVE-2015-0813/" source="CVE"/>
		<reference ref_id="CVE-2015-0815" ref_url="https://www.suse.com/security/cve/CVE-2015-0815/" source="CVE"/>
		<reference ref_id="CVE-2015-0816" ref_url="https://www.suse.com/security/cve/CVE-2015-0816/" source="CVE"/>
		<reference ref_id="CVE-2015-0822" ref_url="https://www.suse.com/security/cve/CVE-2015-0822/" source="CVE"/>
		<reference ref_id="CVE-2015-0827" ref_url="https://www.suse.com/security/cve/CVE-2015-0827/" source="CVE"/>
		<reference ref_id="CVE-2015-0831" ref_url="https://www.suse.com/security/cve/CVE-2015-0831/" source="CVE"/>
		<reference ref_id="CVE-2015-0833" ref_url="https://www.suse.com/security/cve/CVE-2015-0833/" source="CVE"/>
		<reference ref_id="CVE-2015-0836" ref_url="https://www.suse.com/security/cve/CVE-2015-0836/" source="CVE"/>
		<reference ref_id="CVE-2015-2708" ref_url="https://www.suse.com/security/cve/CVE-2015-2708/" source="CVE"/>
		<reference ref_id="CVE-2015-2710" ref_url="https://www.suse.com/security/cve/CVE-2015-2710/" source="CVE"/>
		<reference ref_id="CVE-2015-2713" ref_url="https://www.suse.com/security/cve/CVE-2015-2713/" source="CVE"/>
		<reference ref_id="CVE-2015-2716" ref_url="https://www.suse.com/security/cve/CVE-2015-2716/" source="CVE"/>
		<reference ref_id="CVE-2015-2721" ref_url="https://www.suse.com/security/cve/CVE-2015-2721/" source="CVE"/>
		<reference ref_id="CVE-2015-2722" ref_url="https://www.suse.com/security/cve/CVE-2015-2722/" source="CVE"/>
		<reference ref_id="CVE-2015-2724" ref_url="https://www.suse.com/security/cve/CVE-2015-2724/" source="CVE"/>
		<reference ref_id="CVE-2015-2725" ref_url="https://www.suse.com/security/cve/CVE-2015-2725/" source="CVE"/>
		<reference ref_id="CVE-2015-2727" ref_url="https://www.suse.com/security/cve/CVE-2015-2727/" source="CVE"/>
		<reference ref_id="CVE-2015-2728" ref_url="https://www.suse.com/security/cve/CVE-2015-2728/" source="CVE"/>
		<reference ref_id="CVE-2015-2729" ref_url="https://www.suse.com/security/cve/CVE-2015-2729/" source="CVE"/>
		<reference ref_id="CVE-2015-2730" ref_url="https://www.suse.com/security/cve/CVE-2015-2730/" source="CVE"/>
		<reference ref_id="CVE-2015-2731" ref_url="https://www.suse.com/security/cve/CVE-2015-2731/" source="CVE"/>
		<reference ref_id="CVE-2015-2733" ref_url="https://www.suse.com/security/cve/CVE-2015-2733/" source="CVE"/>
		<reference ref_id="CVE-2015-2734" ref_url="https://www.suse.com/security/cve/CVE-2015-2734/" source="CVE"/>
		<reference ref_id="CVE-2015-2735" ref_url="https://www.suse.com/security/cve/CVE-2015-2735/" source="CVE"/>
		<reference ref_id="CVE-2015-2736" ref_url="https://www.suse.com/security/cve/CVE-2015-2736/" source="CVE"/>
		<reference ref_id="CVE-2015-2737" ref_url="https://www.suse.com/security/cve/CVE-2015-2737/" source="CVE"/>
		<reference ref_id="CVE-2015-2738" ref_url="https://www.suse.com/security/cve/CVE-2015-2738/" source="CVE"/>
		<reference ref_id="CVE-2015-2739" ref_url="https://www.suse.com/security/cve/CVE-2015-2739/" source="CVE"/>
		<reference ref_id="CVE-2015-2740" ref_url="https://www.suse.com/security/cve/CVE-2015-2740/" source="CVE"/>
		<reference ref_id="CVE-2015-2741" ref_url="https://www.suse.com/security/cve/CVE-2015-2741/" source="CVE"/>
		<reference ref_id="CVE-2015-2743" ref_url="https://www.suse.com/security/cve/CVE-2015-2743/" source="CVE"/>
		<reference ref_id="CVE-2015-4000" ref_url="https://www.suse.com/security/cve/CVE-2015-4000/" source="CVE"/>
		<reference ref_id="CVE-2015-4473" ref_url="https://www.suse.com/security/cve/CVE-2015-4473/" source="CVE"/>
		<reference ref_id="CVE-2015-4475" ref_url="https://www.suse.com/security/cve/CVE-2015-4475/" source="CVE"/>
		<reference ref_id="CVE-2015-4477" ref_url="https://www.suse.com/security/cve/CVE-2015-4477/" source="CVE"/>
		<reference ref_id="CVE-2015-4478" ref_url="https://www.suse.com/security/cve/CVE-2015-4478/" source="CVE"/>
		<reference ref_id="CVE-2015-4479" ref_url="https://www.suse.com/security/cve/CVE-2015-4479/" source="CVE"/>
		<reference ref_id="CVE-2015-4480" ref_url="https://www.suse.com/security/cve/CVE-2015-4480/" source="CVE"/>
		<reference ref_id="CVE-2015-4481" ref_url="https://www.suse.com/security/cve/CVE-2015-4481/" source="CVE"/>
		<reference ref_id="CVE-2015-4482" ref_url="https://www.suse.com/security/cve/CVE-2015-4482/" source="CVE"/>
		<reference ref_id="CVE-2015-4484" ref_url="https://www.suse.com/security/cve/CVE-2015-4484/" source="CVE"/>
		<reference ref_id="CVE-2015-4485" ref_url="https://www.suse.com/security/cve/CVE-2015-4485/" source="CVE"/>
		<reference ref_id="CVE-2015-4486" ref_url="https://www.suse.com/security/cve/CVE-2015-4486/" source="CVE"/>
		<reference ref_id="CVE-2015-4487" ref_url="https://www.suse.com/security/cve/CVE-2015-4487/" source="CVE"/>
		<reference ref_id="CVE-2015-4488" ref_url="https://www.suse.com/security/cve/CVE-2015-4488/" source="CVE"/>
		<reference ref_id="CVE-2015-4489" ref_url="https://www.suse.com/security/cve/CVE-2015-4489/" source="CVE"/>
		<reference ref_id="CVE-2015-4491" ref_url="https://www.suse.com/security/cve/CVE-2015-4491/" source="CVE"/>
		<reference ref_id="CVE-2015-4492" ref_url="https://www.suse.com/security/cve/CVE-2015-4492/" source="CVE"/>
		<reference ref_id="CVE-2015-4493" ref_url="https://www.suse.com/security/cve/CVE-2015-4493/" source="CVE"/>
		<reference ref_id="CVE-2015-4500" ref_url="https://www.suse.com/security/cve/CVE-2015-4500/" source="CVE"/>
		<reference ref_id="CVE-2015-4505" ref_url="https://www.suse.com/security/cve/CVE-2015-4505/" source="CVE"/>
		<reference ref_id="CVE-2015-4506" ref_url="https://www.suse.com/security/cve/CVE-2015-4506/" source="CVE"/>
		<reference ref_id="CVE-2015-4509" ref_url="https://www.suse.com/security/cve/CVE-2015-4509/" source="CVE"/>
		<reference ref_id="CVE-2015-4511" ref_url="https://www.suse.com/security/cve/CVE-2015-4511/" source="CVE"/>
		<reference ref_id="CVE-2015-4513" ref_url="https://www.suse.com/security/cve/CVE-2015-4513/" source="CVE"/>
		<reference ref_id="CVE-2015-4514" ref_url="https://www.suse.com/security/cve/CVE-2015-4514/" source="CVE"/>
		<reference ref_id="CVE-2015-4517" ref_url="https://www.suse.com/security/cve/CVE-2015-4517/" source="CVE"/>
		<reference ref_id="CVE-2015-4519" ref_url="https://www.suse.com/security/cve/CVE-2015-4519/" source="CVE"/>
		<reference ref_id="CVE-2015-4520" ref_url="https://www.suse.com/security/cve/CVE-2015-4520/" source="CVE"/>
		<reference ref_id="CVE-2015-4521" ref_url="https://www.suse.com/security/cve/CVE-2015-4521/" source="CVE"/>
		<reference ref_id="CVE-2015-4522" ref_url="https://www.suse.com/security/cve/CVE-2015-4522/" source="CVE"/>
		<reference ref_id="CVE-2015-7174" ref_url="https://www.suse.com/security/cve/CVE-2015-7174/" source="CVE"/>
		<reference ref_id="CVE-2015-7175" ref_url="https://www.suse.com/security/cve/CVE-2015-7175/" source="CVE"/>
		<reference ref_id="CVE-2015-7176" ref_url="https://www.suse.com/security/cve/CVE-2015-7176/" source="CVE"/>
		<reference ref_id="CVE-2015-7177" ref_url="https://www.suse.com/security/cve/CVE-2015-7177/" source="CVE"/>
		<reference ref_id="CVE-2015-7178" ref_url="https://www.suse.com/security/cve/CVE-2015-7178/" source="CVE"/>
		<reference ref_id="CVE-2015-7179" ref_url="https://www.suse.com/security/cve/CVE-2015-7179/" source="CVE"/>
		<reference ref_id="CVE-2015-7180" ref_url="https://www.suse.com/security/cve/CVE-2015-7180/" source="CVE"/>
		<reference ref_id="CVE-2015-7181" ref_url="https://www.suse.com/security/cve/CVE-2015-7181/" source="CVE"/>
		<reference ref_id="CVE-2015-7182" ref_url="https://www.suse.com/security/cve/CVE-2015-7182/" source="CVE"/>
		<reference ref_id="CVE-2015-7183" ref_url="https://www.suse.com/security/cve/CVE-2015-7183/" source="CVE"/>
		<reference ref_id="CVE-2015-7188" ref_url="https://www.suse.com/security/cve/CVE-2015-7188/" source="CVE"/>
		<reference ref_id="CVE-2015-7189" ref_url="https://www.suse.com/security/cve/CVE-2015-7189/" source="CVE"/>
		<reference ref_id="CVE-2015-7193" ref_url="https://www.suse.com/security/cve/CVE-2015-7193/" source="CVE"/>
		<reference ref_id="CVE-2015-7194" ref_url="https://www.suse.com/security/cve/CVE-2015-7194/" source="CVE"/>
		<reference ref_id="CVE-2015-7196" ref_url="https://www.suse.com/security/cve/CVE-2015-7196/" source="CVE"/>
		<reference ref_id="CVE-2015-7197" ref_url="https://www.suse.com/security/cve/CVE-2015-7197/" source="CVE"/>
		<reference ref_id="CVE-2015-7198" ref_url="https://www.suse.com/security/cve/CVE-2015-7198/" source="CVE"/>
		<reference ref_id="CVE-2015-7199" ref_url="https://www.suse.com/security/cve/CVE-2015-7199/" source="CVE"/>
		<reference ref_id="CVE-2015-7200" ref_url="https://www.suse.com/security/cve/CVE-2015-7200/" source="CVE"/>
		<reference ref_id="CVE-2015-7201" ref_url="https://www.suse.com/security/cve/CVE-2015-7201/" source="CVE"/>
		<reference ref_id="CVE-2015-7205" ref_url="https://www.suse.com/security/cve/CVE-2015-7205/" source="CVE"/>
		<reference ref_id="CVE-2015-7207" ref_url="https://www.suse.com/security/cve/CVE-2015-7207/" source="CVE"/>
		<reference ref_id="CVE-2015-7210" ref_url="https://www.suse.com/security/cve/CVE-2015-7210/" source="CVE"/>
		<reference ref_id="CVE-2015-7212" ref_url="https://www.suse.com/security/cve/CVE-2015-7212/" source="CVE"/>
		<reference ref_id="CVE-2015-7213" ref_url="https://www.suse.com/security/cve/CVE-2015-7213/" source="CVE"/>
		<reference ref_id="CVE-2015-7214" ref_url="https://www.suse.com/security/cve/CVE-2015-7214/" source="CVE"/>
		<reference ref_id="CVE-2015-7222" ref_url="https://www.suse.com/security/cve/CVE-2015-7222/" source="CVE"/>
		<reference ref_id="CVE-2015-7575" ref_url="https://www.suse.com/security/cve/CVE-2015-7575/" source="CVE"/>
		<reference ref_id="CVE-2016-1930" ref_url="https://www.suse.com/security/cve/CVE-2016-1930/" source="CVE"/>
		<reference ref_id="CVE-2016-1935" ref_url="https://www.suse.com/security/cve/CVE-2016-1935/" source="CVE"/>
		<reference ref_id="CVE-2016-1950" ref_url="https://www.suse.com/security/cve/CVE-2016-1950/" source="CVE"/>
		<reference ref_id="CVE-2016-1952" ref_url="https://www.suse.com/security/cve/CVE-2016-1952/" source="CVE"/>
		<reference ref_id="CVE-2016-1953" ref_url="https://www.suse.com/security/cve/CVE-2016-1953/" source="CVE"/>
		<reference ref_id="CVE-2016-1954" ref_url="https://www.suse.com/security/cve/CVE-2016-1954/" source="CVE"/>
		<reference ref_id="CVE-2016-1955" ref_url="https://www.suse.com/security/cve/CVE-2016-1955/" source="CVE"/>
		<reference ref_id="CVE-2016-1956" ref_url="https://www.suse.com/security/cve/CVE-2016-1956/" source="CVE"/>
		<reference ref_id="CVE-2016-1957" ref_url="https://www.suse.com/security/cve/CVE-2016-1957/" source="CVE"/>
		<reference ref_id="CVE-2016-1958" ref_url="https://www.suse.com/security/cve/CVE-2016-1958/" source="CVE"/>
		<reference ref_id="CVE-2016-1960" ref_url="https://www.suse.com/security/cve/CVE-2016-1960/" source="CVE"/>
		<reference ref_id="CVE-2016-1961" ref_url="https://www.suse.com/security/cve/CVE-2016-1961/" source="CVE"/>
		<reference ref_id="CVE-2016-1962" ref_url="https://www.suse.com/security/cve/CVE-2016-1962/" source="CVE"/>
		<reference ref_id="CVE-2016-1964" ref_url="https://www.suse.com/security/cve/CVE-2016-1964/" source="CVE"/>
		<reference ref_id="CVE-2016-1965" ref_url="https://www.suse.com/security/cve/CVE-2016-1965/" source="CVE"/>
		<reference ref_id="CVE-2016-1966" ref_url="https://www.suse.com/security/cve/CVE-2016-1966/" source="CVE"/>
		<reference ref_id="CVE-2016-1974" ref_url="https://www.suse.com/security/cve/CVE-2016-1974/" source="CVE"/>
		<reference ref_id="CVE-2016-1977" ref_url="https://www.suse.com/security/cve/CVE-2016-1977/" source="CVE"/>
		<reference ref_id="CVE-2016-1979" ref_url="https://www.suse.com/security/cve/CVE-2016-1979/" source="CVE"/>
		<reference ref_id="CVE-2016-2790" ref_url="https://www.suse.com/security/cve/CVE-2016-2790/" source="CVE"/>
		<reference ref_id="CVE-2016-2791" ref_url="https://www.suse.com/security/cve/CVE-2016-2791/" source="CVE"/>
		<reference ref_id="CVE-2016-2792" ref_url="https://www.suse.com/security/cve/CVE-2016-2792/" source="CVE"/>
		<reference ref_id="CVE-2016-2793" ref_url="https://www.suse.com/security/cve/CVE-2016-2793/" source="CVE"/>
		<reference ref_id="CVE-2016-2794" ref_url="https://www.suse.com/security/cve/CVE-2016-2794/" source="CVE"/>
		<reference ref_id="CVE-2016-2795" ref_url="https://www.suse.com/security/cve/CVE-2016-2795/" source="CVE"/>
		<reference ref_id="CVE-2016-2796" ref_url="https://www.suse.com/security/cve/CVE-2016-2796/" source="CVE"/>
		<reference ref_id="CVE-2016-2797" ref_url="https://www.suse.com/security/cve/CVE-2016-2797/" source="CVE"/>
		<reference ref_id="CVE-2016-2798" ref_url="https://www.suse.com/security/cve/CVE-2016-2798/" source="CVE"/>
		<reference ref_id="CVE-2016-2799" ref_url="https://www.suse.com/security/cve/CVE-2016-2799/" source="CVE"/>
		<reference ref_id="CVE-2016-2800" ref_url="https://www.suse.com/security/cve/CVE-2016-2800/" source="CVE"/>
		<reference ref_id="CVE-2016-2801" ref_url="https://www.suse.com/security/cve/CVE-2016-2801/" source="CVE"/>
		<reference ref_id="CVE-2016-2802" ref_url="https://www.suse.com/security/cve/CVE-2016-2802/" source="CVE"/>
		<reference ref_id="CVE-2016-2806" ref_url="https://www.suse.com/security/cve/CVE-2016-2806/" source="CVE"/>
		<reference ref_id="CVE-2016-2807" ref_url="https://www.suse.com/security/cve/CVE-2016-2807/" source="CVE"/>
		<reference ref_id="CVE-2016-2815" ref_url="https://www.suse.com/security/cve/CVE-2016-2815/" source="CVE"/>
		<reference ref_id="CVE-2016-2818" ref_url="https://www.suse.com/security/cve/CVE-2016-2818/" source="CVE"/>
		<reference ref_id="CVE-2016-2830" ref_url="https://www.suse.com/security/cve/CVE-2016-2830/" source="CVE"/>
		<reference ref_id="CVE-2016-2836" ref_url="https://www.suse.com/security/cve/CVE-2016-2836/" source="CVE"/>
		<reference ref_id="CVE-2016-2837" ref_url="https://www.suse.com/security/cve/CVE-2016-2837/" source="CVE"/>
		<reference ref_id="CVE-2016-2838" ref_url="https://www.suse.com/security/cve/CVE-2016-2838/" source="CVE"/>
		<reference ref_id="CVE-2016-2839" ref_url="https://www.suse.com/security/cve/CVE-2016-2839/" source="CVE"/>
		<reference ref_id="CVE-2016-5252" ref_url="https://www.suse.com/security/cve/CVE-2016-5252/" source="CVE"/>
		<reference ref_id="CVE-2016-5254" ref_url="https://www.suse.com/security/cve/CVE-2016-5254/" source="CVE"/>
		<reference ref_id="CVE-2016-5258" ref_url="https://www.suse.com/security/cve/CVE-2016-5258/" source="CVE"/>
		<reference ref_id="CVE-2016-5259" ref_url="https://www.suse.com/security/cve/CVE-2016-5259/" source="CVE"/>
		<reference ref_id="CVE-2016-5262" ref_url="https://www.suse.com/security/cve/CVE-2016-5262/" source="CVE"/>
		<reference ref_id="CVE-2016-5263" ref_url="https://www.suse.com/security/cve/CVE-2016-5263/" source="CVE"/>
		<reference ref_id="CVE-2016-5264" ref_url="https://www.suse.com/security/cve/CVE-2016-5264/" source="CVE"/>
		<reference ref_id="CVE-2016-5265" ref_url="https://www.suse.com/security/cve/CVE-2016-5265/" source="CVE"/>
		<reference ref_id="CVE-2016-5290" ref_url="https://www.suse.com/security/cve/CVE-2016-5290/" source="CVE"/>
		<reference ref_id="CVE-2016-5291" ref_url="https://www.suse.com/security/cve/CVE-2016-5291/" source="CVE"/>
		<reference ref_id="CVE-2016-5296" ref_url="https://www.suse.com/security/cve/CVE-2016-5296/" source="CVE"/>
		<reference ref_id="CVE-2016-5297" ref_url="https://www.suse.com/security/cve/CVE-2016-5297/" source="CVE"/>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-6354" ref_url="https://www.suse.com/security/cve/CVE-2016-6354/" source="CVE"/>
		<reference ref_id="CVE-2016-9066" ref_url="https://www.suse.com/security/cve/CVE-2016-9066/" source="CVE"/>
		<reference ref_id="CVE-2016-9079" ref_url="https://www.suse.com/security/cve/CVE-2016-9079/" source="CVE"/>
		<reference ref_id="CVE-2016-9893" ref_url="https://www.suse.com/security/cve/CVE-2016-9893/" source="CVE"/>
		<reference ref_id="CVE-2016-9895" ref_url="https://www.suse.com/security/cve/CVE-2016-9895/" source="CVE"/>
		<reference ref_id="CVE-2016-9897" ref_url="https://www.suse.com/security/cve/CVE-2016-9897/" source="CVE"/>
		<reference ref_id="CVE-2016-9898" ref_url="https://www.suse.com/security/cve/CVE-2016-9898/" source="CVE"/>
		<reference ref_id="CVE-2016-9899" ref_url="https://www.suse.com/security/cve/CVE-2016-9899/" source="CVE"/>
		<reference ref_id="CVE-2016-9900" ref_url="https://www.suse.com/security/cve/CVE-2016-9900/" source="CVE"/>
		<reference ref_id="CVE-2016-9904" ref_url="https://www.suse.com/security/cve/CVE-2016-9904/" source="CVE"/>
		<reference ref_id="CVE-2016-9905" ref_url="https://www.suse.com/security/cve/CVE-2016-9905/" source="CVE"/>
		<reference ref_id="CVE-2017-16541" ref_url="https://www.suse.com/security/cve/CVE-2017-16541/" source="CVE"/>
		<reference ref_id="CVE-2017-5373" ref_url="https://www.suse.com/security/cve/CVE-2017-5373/" source="CVE"/>
		<reference ref_id="CVE-2017-5375" ref_url="https://www.suse.com/security/cve/CVE-2017-5375/" source="CVE"/>
		<reference ref_id="CVE-2017-5376" ref_url="https://www.suse.com/security/cve/CVE-2017-5376/" source="CVE"/>
		<reference ref_id="CVE-2017-5378" ref_url="https://www.suse.com/security/cve/CVE-2017-5378/" source="CVE"/>
		<reference ref_id="CVE-2017-5380" ref_url="https://www.suse.com/security/cve/CVE-2017-5380/" source="CVE"/>
		<reference ref_id="CVE-2017-5383" ref_url="https://www.suse.com/security/cve/CVE-2017-5383/" source="CVE"/>
		<reference ref_id="CVE-2017-5390" ref_url="https://www.suse.com/security/cve/CVE-2017-5390/" source="CVE"/>
		<reference ref_id="CVE-2017-5396" ref_url="https://www.suse.com/security/cve/CVE-2017-5396/" source="CVE"/>
		<reference ref_id="CVE-2017-5398" ref_url="https://www.suse.com/security/cve/CVE-2017-5398/" source="CVE"/>
		<reference ref_id="CVE-2017-5399" ref_url="https://www.suse.com/security/cve/CVE-2017-5399/" source="CVE"/>
		<reference ref_id="CVE-2017-5400" ref_url="https://www.suse.com/security/cve/CVE-2017-5400/" source="CVE"/>
		<reference ref_id="CVE-2017-5401" ref_url="https://www.suse.com/security/cve/CVE-2017-5401/" source="CVE"/>
		<reference ref_id="CVE-2017-5402" ref_url="https://www.suse.com/security/cve/CVE-2017-5402/" source="CVE"/>
		<reference ref_id="CVE-2017-5403" ref_url="https://www.suse.com/security/cve/CVE-2017-5403/" source="CVE"/>
		<reference ref_id="CVE-2017-5404" ref_url="https://www.suse.com/security/cve/CVE-2017-5404/" source="CVE"/>
		<reference ref_id="CVE-2017-5405" ref_url="https://www.suse.com/security/cve/CVE-2017-5405/" source="CVE"/>
		<reference ref_id="CVE-2017-5406" ref_url="https://www.suse.com/security/cve/CVE-2017-5406/" source="CVE"/>
		<reference ref_id="CVE-2017-5407" ref_url="https://www.suse.com/security/cve/CVE-2017-5407/" source="CVE"/>
		<reference ref_id="CVE-2017-5408" ref_url="https://www.suse.com/security/cve/CVE-2017-5408/" source="CVE"/>
		<reference ref_id="CVE-2017-5410" ref_url="https://www.suse.com/security/cve/CVE-2017-5410/" source="CVE"/>
		<reference ref_id="CVE-2017-5412" ref_url="https://www.suse.com/security/cve/CVE-2017-5412/" source="CVE"/>
		<reference ref_id="CVE-2017-5413" ref_url="https://www.suse.com/security/cve/CVE-2017-5413/" source="CVE"/>
		<reference ref_id="CVE-2017-5414" ref_url="https://www.suse.com/security/cve/CVE-2017-5414/" source="CVE"/>
		<reference ref_id="CVE-2017-5416" ref_url="https://www.suse.com/security/cve/CVE-2017-5416/" source="CVE"/>
		<reference ref_id="CVE-2017-5418" ref_url="https://www.suse.com/security/cve/CVE-2017-5418/" source="CVE"/>
		<reference ref_id="CVE-2017-5419" ref_url="https://www.suse.com/security/cve/CVE-2017-5419/" source="CVE"/>
		<reference ref_id="CVE-2017-5421" ref_url="https://www.suse.com/security/cve/CVE-2017-5421/" source="CVE"/>
		<reference ref_id="CVE-2017-5422" ref_url="https://www.suse.com/security/cve/CVE-2017-5422/" source="CVE"/>
		<reference ref_id="CVE-2017-5426" ref_url="https://www.suse.com/security/cve/CVE-2017-5426/" source="CVE"/>
		<reference ref_id="CVE-2017-5429" ref_url="https://www.suse.com/security/cve/CVE-2017-5429/" source="CVE"/>
		<reference ref_id="CVE-2017-5430" ref_url="https://www.suse.com/security/cve/CVE-2017-5430/" source="CVE"/>
		<reference ref_id="CVE-2017-5432" ref_url="https://www.suse.com/security/cve/CVE-2017-5432/" source="CVE"/>
		<reference ref_id="CVE-2017-5433" ref_url="https://www.suse.com/security/cve/CVE-2017-5433/" source="CVE"/>
		<reference ref_id="CVE-2017-5434" ref_url="https://www.suse.com/security/cve/CVE-2017-5434/" source="CVE"/>
		<reference ref_id="CVE-2017-5435" ref_url="https://www.suse.com/security/cve/CVE-2017-5435/" source="CVE"/>
		<reference ref_id="CVE-2017-5436" ref_url="https://www.suse.com/security/cve/CVE-2017-5436/" source="CVE"/>
		<reference ref_id="CVE-2017-5437" ref_url="https://www.suse.com/security/cve/CVE-2017-5437/" source="CVE"/>
		<reference ref_id="CVE-2017-5438" ref_url="https://www.suse.com/security/cve/CVE-2017-5438/" source="CVE"/>
		<reference ref_id="CVE-2017-5439" ref_url="https://www.suse.com/security/cve/CVE-2017-5439/" source="CVE"/>
		<reference ref_id="CVE-2017-5440" ref_url="https://www.suse.com/security/cve/CVE-2017-5440/" source="CVE"/>
		<reference ref_id="CVE-2017-5441" ref_url="https://www.suse.com/security/cve/CVE-2017-5441/" source="CVE"/>
		<reference ref_id="CVE-2017-5442" ref_url="https://www.suse.com/security/cve/CVE-2017-5442/" source="CVE"/>
		<reference ref_id="CVE-2017-5443" ref_url="https://www.suse.com/security/cve/CVE-2017-5443/" source="CVE"/>
		<reference ref_id="CVE-2017-5444" ref_url="https://www.suse.com/security/cve/CVE-2017-5444/" source="CVE"/>
		<reference ref_id="CVE-2017-5445" ref_url="https://www.suse.com/security/cve/CVE-2017-5445/" source="CVE"/>
		<reference ref_id="CVE-2017-5446" ref_url="https://www.suse.com/security/cve/CVE-2017-5446/" source="CVE"/>
		<reference ref_id="CVE-2017-5447" ref_url="https://www.suse.com/security/cve/CVE-2017-5447/" source="CVE"/>
		<reference ref_id="CVE-2017-5449" ref_url="https://www.suse.com/security/cve/CVE-2017-5449/" source="CVE"/>
		<reference ref_id="CVE-2017-5451" ref_url="https://www.suse.com/security/cve/CVE-2017-5451/" source="CVE"/>
		<reference ref_id="CVE-2017-5454" ref_url="https://www.suse.com/security/cve/CVE-2017-5454/" source="CVE"/>
		<reference ref_id="CVE-2017-5459" ref_url="https://www.suse.com/security/cve/CVE-2017-5459/" source="CVE"/>
		<reference ref_id="CVE-2017-5460" ref_url="https://www.suse.com/security/cve/CVE-2017-5460/" source="CVE"/>
		<reference ref_id="CVE-2017-5461" ref_url="https://www.suse.com/security/cve/CVE-2017-5461/" source="CVE"/>
		<reference ref_id="CVE-2017-5462" ref_url="https://www.suse.com/security/cve/CVE-2017-5462/" source="CVE"/>
		<reference ref_id="CVE-2017-5464" ref_url="https://www.suse.com/security/cve/CVE-2017-5464/" source="CVE"/>
		<reference ref_id="CVE-2017-5465" ref_url="https://www.suse.com/security/cve/CVE-2017-5465/" source="CVE"/>
		<reference ref_id="CVE-2017-5466" ref_url="https://www.suse.com/security/cve/CVE-2017-5466/" source="CVE"/>
		<reference ref_id="CVE-2017-5467" ref_url="https://www.suse.com/security/cve/CVE-2017-5467/" source="CVE"/>
		<reference ref_id="CVE-2017-5469" ref_url="https://www.suse.com/security/cve/CVE-2017-5469/" source="CVE"/>
		<reference ref_id="CVE-2017-5470" ref_url="https://www.suse.com/security/cve/CVE-2017-5470/" source="CVE"/>
		<reference ref_id="CVE-2017-5472" ref_url="https://www.suse.com/security/cve/CVE-2017-5472/" source="CVE"/>
		<reference ref_id="CVE-2017-7749" ref_url="https://www.suse.com/security/cve/CVE-2017-7749/" source="CVE"/>
		<reference ref_id="CVE-2017-7750" ref_url="https://www.suse.com/security/cve/CVE-2017-7750/" source="CVE"/>
		<reference ref_id="CVE-2017-7751" ref_url="https://www.suse.com/security/cve/CVE-2017-7751/" source="CVE"/>
		<reference ref_id="CVE-2017-7752" ref_url="https://www.suse.com/security/cve/CVE-2017-7752/" source="CVE"/>
		<reference ref_id="CVE-2017-7753" ref_url="https://www.suse.com/security/cve/CVE-2017-7753/" source="CVE"/>
		<reference ref_id="CVE-2017-7754" ref_url="https://www.suse.com/security/cve/CVE-2017-7754/" source="CVE"/>
		<reference ref_id="CVE-2017-7756" ref_url="https://www.suse.com/security/cve/CVE-2017-7756/" source="CVE"/>
		<reference ref_id="CVE-2017-7757" ref_url="https://www.suse.com/security/cve/CVE-2017-7757/" source="CVE"/>
		<reference ref_id="CVE-2017-7758" ref_url="https://www.suse.com/security/cve/CVE-2017-7758/" source="CVE"/>
		<reference ref_id="CVE-2017-7763" ref_url="https://www.suse.com/security/cve/CVE-2017-7763/" source="CVE"/>
		<reference ref_id="CVE-2017-7764" ref_url="https://www.suse.com/security/cve/CVE-2017-7764/" source="CVE"/>
		<reference ref_id="CVE-2017-7765" ref_url="https://www.suse.com/security/cve/CVE-2017-7765/" source="CVE"/>
		<reference ref_id="CVE-2017-7771" ref_url="https://www.suse.com/security/cve/CVE-2017-7771/" source="CVE"/>
		<reference ref_id="CVE-2017-7772" ref_url="https://www.suse.com/security/cve/CVE-2017-7772/" source="CVE"/>
		<reference ref_id="CVE-2017-7773" ref_url="https://www.suse.com/security/cve/CVE-2017-7773/" source="CVE"/>
		<reference ref_id="CVE-2017-7774" ref_url="https://www.suse.com/security/cve/CVE-2017-7774/" source="CVE"/>
		<reference ref_id="CVE-2017-7775" ref_url="https://www.suse.com/security/cve/CVE-2017-7775/" source="CVE"/>
		<reference ref_id="CVE-2017-7776" ref_url="https://www.suse.com/security/cve/CVE-2017-7776/" source="CVE"/>
		<reference ref_id="CVE-2017-7777" ref_url="https://www.suse.com/security/cve/CVE-2017-7777/" source="CVE"/>
		<reference ref_id="CVE-2017-7778" ref_url="https://www.suse.com/security/cve/CVE-2017-7778/" source="CVE"/>
		<reference ref_id="CVE-2017-7779" ref_url="https://www.suse.com/security/cve/CVE-2017-7779/" source="CVE"/>
		<reference ref_id="CVE-2017-7782" ref_url="https://www.suse.com/security/cve/CVE-2017-7782/" source="CVE"/>
		<reference ref_id="CVE-2017-7784" ref_url="https://www.suse.com/security/cve/CVE-2017-7784/" source="CVE"/>
		<reference ref_id="CVE-2017-7785" ref_url="https://www.suse.com/security/cve/CVE-2017-7785/" source="CVE"/>
		<reference ref_id="CVE-2017-7786" ref_url="https://www.suse.com/security/cve/CVE-2017-7786/" source="CVE"/>
		<reference ref_id="CVE-2017-7787" ref_url="https://www.suse.com/security/cve/CVE-2017-7787/" source="CVE"/>
		<reference ref_id="CVE-2017-7791" ref_url="https://www.suse.com/security/cve/CVE-2017-7791/" source="CVE"/>
		<reference ref_id="CVE-2017-7792" ref_url="https://www.suse.com/security/cve/CVE-2017-7792/" source="CVE"/>
		<reference ref_id="CVE-2017-7793" ref_url="https://www.suse.com/security/cve/CVE-2017-7793/" source="CVE"/>
		<reference ref_id="CVE-2017-7798" ref_url="https://www.suse.com/security/cve/CVE-2017-7798/" source="CVE"/>
		<reference ref_id="CVE-2017-7800" ref_url="https://www.suse.com/security/cve/CVE-2017-7800/" source="CVE"/>
		<reference ref_id="CVE-2017-7801" ref_url="https://www.suse.com/security/cve/CVE-2017-7801/" source="CVE"/>
		<reference ref_id="CVE-2017-7802" ref_url="https://www.suse.com/security/cve/CVE-2017-7802/" source="CVE"/>
		<reference ref_id="CVE-2017-7803" ref_url="https://www.suse.com/security/cve/CVE-2017-7803/" source="CVE"/>
		<reference ref_id="CVE-2017-7804" ref_url="https://www.suse.com/security/cve/CVE-2017-7804/" source="CVE"/>
		<reference ref_id="CVE-2017-7805" ref_url="https://www.suse.com/security/cve/CVE-2017-7805/" source="CVE"/>
		<reference ref_id="CVE-2017-7807" ref_url="https://www.suse.com/security/cve/CVE-2017-7807/" source="CVE"/>
		<reference ref_id="CVE-2017-7810" ref_url="https://www.suse.com/security/cve/CVE-2017-7810/" source="CVE"/>
		<reference ref_id="CVE-2017-7814" ref_url="https://www.suse.com/security/cve/CVE-2017-7814/" source="CVE"/>
		<reference ref_id="CVE-2017-7818" ref_url="https://www.suse.com/security/cve/CVE-2017-7818/" source="CVE"/>
		<reference ref_id="CVE-2017-7819" ref_url="https://www.suse.com/security/cve/CVE-2017-7819/" source="CVE"/>
		<reference ref_id="CVE-2017-7823" ref_url="https://www.suse.com/security/cve/CVE-2017-7823/" source="CVE"/>
		<reference ref_id="CVE-2017-7824" ref_url="https://www.suse.com/security/cve/CVE-2017-7824/" source="CVE"/>
		<reference ref_id="CVE-2017-7825" ref_url="https://www.suse.com/security/cve/CVE-2017-7825/" source="CVE"/>
		<reference ref_id="CVE-2017-7826" ref_url="https://www.suse.com/security/cve/CVE-2017-7826/" source="CVE"/>
		<reference ref_id="CVE-2017-7828" ref_url="https://www.suse.com/security/cve/CVE-2017-7828/" source="CVE"/>
		<reference ref_id="CVE-2017-7829" ref_url="https://www.suse.com/security/cve/CVE-2017-7829/" source="CVE"/>
		<reference ref_id="CVE-2017-7830" ref_url="https://www.suse.com/security/cve/CVE-2017-7830/" source="CVE"/>
		<reference ref_id="CVE-2017-7845" ref_url="https://www.suse.com/security/cve/CVE-2017-7845/" source="CVE"/>
		<reference ref_id="CVE-2017-7846" ref_url="https://www.suse.com/security/cve/CVE-2017-7846/" source="CVE"/>
		<reference ref_id="CVE-2017-7847" ref_url="https://www.suse.com/security/cve/CVE-2017-7847/" source="CVE"/>
		<reference ref_id="CVE-2017-7848" ref_url="https://www.suse.com/security/cve/CVE-2017-7848/" source="CVE"/>
		<reference ref_id="CVE-2018-12359" ref_url="https://www.suse.com/security/cve/CVE-2018-12359/" source="CVE"/>
		<reference ref_id="CVE-2018-12360" ref_url="https://www.suse.com/security/cve/CVE-2018-12360/" source="CVE"/>
		<reference ref_id="CVE-2018-12361" ref_url="https://www.suse.com/security/cve/CVE-2018-12361/" source="CVE"/>
		<reference ref_id="CVE-2018-12362" ref_url="https://www.suse.com/security/cve/CVE-2018-12362/" source="CVE"/>
		<reference ref_id="CVE-2018-12363" ref_url="https://www.suse.com/security/cve/CVE-2018-12363/" source="CVE"/>
		<reference ref_id="CVE-2018-12364" ref_url="https://www.suse.com/security/cve/CVE-2018-12364/" source="CVE"/>
		<reference ref_id="CVE-2018-12365" ref_url="https://www.suse.com/security/cve/CVE-2018-12365/" source="CVE"/>
		<reference ref_id="CVE-2018-12366" ref_url="https://www.suse.com/security/cve/CVE-2018-12366/" source="CVE"/>
		<reference ref_id="CVE-2018-12367" ref_url="https://www.suse.com/security/cve/CVE-2018-12367/" source="CVE"/>
		<reference ref_id="CVE-2018-12371" ref_url="https://www.suse.com/security/cve/CVE-2018-12371/" source="CVE"/>
		<reference ref_id="CVE-2018-12372" ref_url="https://www.suse.com/security/cve/CVE-2018-12372/" source="CVE"/>
		<reference ref_id="CVE-2018-12373" ref_url="https://www.suse.com/security/cve/CVE-2018-12373/" source="CVE"/>
		<reference ref_id="CVE-2018-12374" ref_url="https://www.suse.com/security/cve/CVE-2018-12374/" source="CVE"/>
		<reference ref_id="CVE-2018-12376" ref_url="https://www.suse.com/security/cve/CVE-2018-12376/" source="CVE"/>
		<reference ref_id="CVE-2018-12377" ref_url="https://www.suse.com/security/cve/CVE-2018-12377/" source="CVE"/>
		<reference ref_id="CVE-2018-12378" ref_url="https://www.suse.com/security/cve/CVE-2018-12378/" source="CVE"/>
		<reference ref_id="CVE-2018-12383" ref_url="https://www.suse.com/security/cve/CVE-2018-12383/" source="CVE"/>
		<reference ref_id="CVE-2018-12385" ref_url="https://www.suse.com/security/cve/CVE-2018-12385/" source="CVE"/>
		<reference ref_id="CVE-2018-12389" ref_url="https://www.suse.com/security/cve/CVE-2018-12389/" source="CVE"/>
		<reference ref_id="CVE-2018-12390" ref_url="https://www.suse.com/security/cve/CVE-2018-12390/" source="CVE"/>
		<reference ref_id="CVE-2018-12391" ref_url="https://www.suse.com/security/cve/CVE-2018-12391/" source="CVE"/>
		<reference ref_id="CVE-2018-12392" ref_url="https://www.suse.com/security/cve/CVE-2018-12392/" source="CVE"/>
		<reference ref_id="CVE-2018-12393" ref_url="https://www.suse.com/security/cve/CVE-2018-12393/" source="CVE"/>
		<reference ref_id="CVE-2018-12405" ref_url="https://www.suse.com/security/cve/CVE-2018-12405/" source="CVE"/>
		<reference ref_id="CVE-2018-17466" ref_url="https://www.suse.com/security/cve/CVE-2018-17466/" source="CVE"/>
		<reference ref_id="CVE-2018-18335" ref_url="https://www.suse.com/security/cve/CVE-2018-18335/" source="CVE"/>
		<reference ref_id="CVE-2018-18356" ref_url="https://www.suse.com/security/cve/CVE-2018-18356/" source="CVE"/>
		<reference ref_id="CVE-2018-18492" ref_url="https://www.suse.com/security/cve/CVE-2018-18492/" source="CVE"/>
		<reference ref_id="CVE-2018-18493" ref_url="https://www.suse.com/security/cve/CVE-2018-18493/" source="CVE"/>
		<reference ref_id="CVE-2018-18494" ref_url="https://www.suse.com/security/cve/CVE-2018-18494/" source="CVE"/>
		<reference ref_id="CVE-2018-18498" ref_url="https://www.suse.com/security/cve/CVE-2018-18498/" source="CVE"/>
		<reference ref_id="CVE-2018-18500" ref_url="https://www.suse.com/security/cve/CVE-2018-18500/" source="CVE"/>
		<reference ref_id="CVE-2018-18501" ref_url="https://www.suse.com/security/cve/CVE-2018-18501/" source="CVE"/>
		<reference ref_id="CVE-2018-18505" ref_url="https://www.suse.com/security/cve/CVE-2018-18505/" source="CVE"/>
		<reference ref_id="CVE-2018-18509" ref_url="https://www.suse.com/security/cve/CVE-2018-18509/" source="CVE"/>
		<reference ref_id="CVE-2018-18511" ref_url="https://www.suse.com/security/cve/CVE-2018-18511/" source="CVE"/>
		<reference ref_id="CVE-2018-5089" ref_url="https://www.suse.com/security/cve/CVE-2018-5089/" source="CVE"/>
		<reference ref_id="CVE-2018-5095" ref_url="https://www.suse.com/security/cve/CVE-2018-5095/" source="CVE"/>
		<reference ref_id="CVE-2018-5096" ref_url="https://www.suse.com/security/cve/CVE-2018-5096/" source="CVE"/>
		<reference ref_id="CVE-2018-5097" ref_url="https://www.suse.com/security/cve/CVE-2018-5097/" source="CVE"/>
		<reference ref_id="CVE-2018-5098" ref_url="https://www.suse.com/security/cve/CVE-2018-5098/" source="CVE"/>
		<reference ref_id="CVE-2018-5099" ref_url="https://www.suse.com/security/cve/CVE-2018-5099/" source="CVE"/>
		<reference ref_id="CVE-2018-5102" ref_url="https://www.suse.com/security/cve/CVE-2018-5102/" source="CVE"/>
		<reference ref_id="CVE-2018-5103" ref_url="https://www.suse.com/security/cve/CVE-2018-5103/" source="CVE"/>
		<reference ref_id="CVE-2018-5104" ref_url="https://www.suse.com/security/cve/CVE-2018-5104/" source="CVE"/>
		<reference ref_id="CVE-2018-5117" ref_url="https://www.suse.com/security/cve/CVE-2018-5117/" source="CVE"/>
		<reference ref_id="CVE-2018-5125" ref_url="https://www.suse.com/security/cve/CVE-2018-5125/" source="CVE"/>
		<reference ref_id="CVE-2018-5127" ref_url="https://www.suse.com/security/cve/CVE-2018-5127/" source="CVE"/>
		<reference ref_id="CVE-2018-5129" ref_url="https://www.suse.com/security/cve/CVE-2018-5129/" source="CVE"/>
		<reference ref_id="CVE-2018-5144" ref_url="https://www.suse.com/security/cve/CVE-2018-5144/" source="CVE"/>
		<reference ref_id="CVE-2018-5145" ref_url="https://www.suse.com/security/cve/CVE-2018-5145/" source="CVE"/>
		<reference ref_id="CVE-2018-5146" ref_url="https://www.suse.com/security/cve/CVE-2018-5146/" source="CVE"/>
		<reference ref_id="CVE-2018-5150" ref_url="https://www.suse.com/security/cve/CVE-2018-5150/" source="CVE"/>
		<reference ref_id="CVE-2018-5154" ref_url="https://www.suse.com/security/cve/CVE-2018-5154/" source="CVE"/>
		<reference ref_id="CVE-2018-5155" ref_url="https://www.suse.com/security/cve/CVE-2018-5155/" source="CVE"/>
		<reference ref_id="CVE-2018-5156" ref_url="https://www.suse.com/security/cve/CVE-2018-5156/" source="CVE"/>
		<reference ref_id="CVE-2018-5159" ref_url="https://www.suse.com/security/cve/CVE-2018-5159/" source="CVE"/>
		<reference ref_id="CVE-2018-5161" ref_url="https://www.suse.com/security/cve/CVE-2018-5161/" source="CVE"/>
		<reference ref_id="CVE-2018-5162" ref_url="https://www.suse.com/security/cve/CVE-2018-5162/" source="CVE"/>
		<reference ref_id="CVE-2018-5168" ref_url="https://www.suse.com/security/cve/CVE-2018-5168/" source="CVE"/>
		<reference ref_id="CVE-2018-5170" ref_url="https://www.suse.com/security/cve/CVE-2018-5170/" source="CVE"/>
		<reference ref_id="CVE-2018-5174" ref_url="https://www.suse.com/security/cve/CVE-2018-5174/" source="CVE"/>
		<reference ref_id="CVE-2018-5178" ref_url="https://www.suse.com/security/cve/CVE-2018-5178/" source="CVE"/>
		<reference ref_id="CVE-2018-5183" ref_url="https://www.suse.com/security/cve/CVE-2018-5183/" source="CVE"/>
		<reference ref_id="CVE-2018-5184" ref_url="https://www.suse.com/security/cve/CVE-2018-5184/" source="CVE"/>
		<reference ref_id="CVE-2018-5185" ref_url="https://www.suse.com/security/cve/CVE-2018-5185/" source="CVE"/>
		<reference ref_id="CVE-2018-5187" ref_url="https://www.suse.com/security/cve/CVE-2018-5187/" source="CVE"/>
		<reference ref_id="CVE-2018-5188" ref_url="https://www.suse.com/security/cve/CVE-2018-5188/" source="CVE"/>
		<reference ref_id="CVE-2019-11691" ref_url="https://www.suse.com/security/cve/CVE-2019-11691/" source="CVE"/>
		<reference ref_id="CVE-2019-11692" ref_url="https://www.suse.com/security/cve/CVE-2019-11692/" source="CVE"/>
		<reference ref_id="CVE-2019-11693" ref_url="https://www.suse.com/security/cve/CVE-2019-11693/" source="CVE"/>
		<reference ref_id="CVE-2019-11694" ref_url="https://www.suse.com/security/cve/CVE-2019-11694/" source="CVE"/>
		<reference ref_id="CVE-2019-11698" ref_url="https://www.suse.com/security/cve/CVE-2019-11698/" source="CVE"/>
		<reference ref_id="CVE-2019-11703" ref_url="https://www.suse.com/security/cve/CVE-2019-11703/" source="CVE"/>
		<reference ref_id="CVE-2019-11704" ref_url="https://www.suse.com/security/cve/CVE-2019-11704/" source="CVE"/>
		<reference ref_id="CVE-2019-11705" ref_url="https://www.suse.com/security/cve/CVE-2019-11705/" source="CVE"/>
		<reference ref_id="CVE-2019-11706" ref_url="https://www.suse.com/security/cve/CVE-2019-11706/" source="CVE"/>
		<reference ref_id="CVE-2019-11707" ref_url="https://www.suse.com/security/cve/CVE-2019-11707/" source="CVE"/>
		<reference ref_id="CVE-2019-11708" ref_url="https://www.suse.com/security/cve/CVE-2019-11708/" source="CVE"/>
		<reference ref_id="CVE-2019-11709" ref_url="https://www.suse.com/security/cve/CVE-2019-11709/" source="CVE"/>
		<reference ref_id="CVE-2019-11710" ref_url="https://www.suse.com/security/cve/CVE-2019-11710/" source="CVE"/>
		<reference ref_id="CVE-2019-11711" ref_url="https://www.suse.com/security/cve/CVE-2019-11711/" source="CVE"/>
		<reference ref_id="CVE-2019-11712" ref_url="https://www.suse.com/security/cve/CVE-2019-11712/" source="CVE"/>
		<reference ref_id="CVE-2019-11713" ref_url="https://www.suse.com/security/cve/CVE-2019-11713/" source="CVE"/>
		<reference ref_id="CVE-2019-11714" ref_url="https://www.suse.com/security/cve/CVE-2019-11714/" source="CVE"/>
		<reference ref_id="CVE-2019-11715" ref_url="https://www.suse.com/security/cve/CVE-2019-11715/" source="CVE"/>
		<reference ref_id="CVE-2019-11716" ref_url="https://www.suse.com/security/cve/CVE-2019-11716/" source="CVE"/>
		<reference ref_id="CVE-2019-11717" ref_url="https://www.suse.com/security/cve/CVE-2019-11717/" source="CVE"/>
		<reference ref_id="CVE-2019-11719" ref_url="https://www.suse.com/security/cve/CVE-2019-11719/" source="CVE"/>
		<reference ref_id="CVE-2019-11720" ref_url="https://www.suse.com/security/cve/CVE-2019-11720/" source="CVE"/>
		<reference ref_id="CVE-2019-11721" ref_url="https://www.suse.com/security/cve/CVE-2019-11721/" source="CVE"/>
		<reference ref_id="CVE-2019-11723" ref_url="https://www.suse.com/security/cve/CVE-2019-11723/" source="CVE"/>
		<reference ref_id="CVE-2019-11724" ref_url="https://www.suse.com/security/cve/CVE-2019-11724/" source="CVE"/>
		<reference ref_id="CVE-2019-11725" ref_url="https://www.suse.com/security/cve/CVE-2019-11725/" source="CVE"/>
		<reference ref_id="CVE-2019-11727" ref_url="https://www.suse.com/security/cve/CVE-2019-11727/" source="CVE"/>
		<reference ref_id="CVE-2019-11728" ref_url="https://www.suse.com/security/cve/CVE-2019-11728/" source="CVE"/>
		<reference ref_id="CVE-2019-11729" ref_url="https://www.suse.com/security/cve/CVE-2019-11729/" source="CVE"/>
		<reference ref_id="CVE-2019-11730" ref_url="https://www.suse.com/security/cve/CVE-2019-11730/" source="CVE"/>
		<reference ref_id="CVE-2019-11739" ref_url="https://www.suse.com/security/cve/CVE-2019-11739/" source="CVE"/>
		<reference ref_id="CVE-2019-11740" ref_url="https://www.suse.com/security/cve/CVE-2019-11740/" source="CVE"/>
		<reference ref_id="CVE-2019-11742" ref_url="https://www.suse.com/security/cve/CVE-2019-11742/" source="CVE"/>
		<reference ref_id="CVE-2019-11743" ref_url="https://www.suse.com/security/cve/CVE-2019-11743/" source="CVE"/>
		<reference ref_id="CVE-2019-11744" ref_url="https://www.suse.com/security/cve/CVE-2019-11744/" source="CVE"/>
		<reference ref_id="CVE-2019-11745" ref_url="https://www.suse.com/security/cve/CVE-2019-11745/" source="CVE"/>
		<reference ref_id="CVE-2019-11746" ref_url="https://www.suse.com/security/cve/CVE-2019-11746/" source="CVE"/>
		<reference ref_id="CVE-2019-11752" ref_url="https://www.suse.com/security/cve/CVE-2019-11752/" source="CVE"/>
		<reference ref_id="CVE-2019-11755" ref_url="https://www.suse.com/security/cve/CVE-2019-11755/" source="CVE"/>
		<reference ref_id="CVE-2019-11757" ref_url="https://www.suse.com/security/cve/CVE-2019-11757/" source="CVE"/>
		<reference ref_id="CVE-2019-11758" ref_url="https://www.suse.com/security/cve/CVE-2019-11758/" source="CVE"/>
		<reference ref_id="CVE-2019-11759" ref_url="https://www.suse.com/security/cve/CVE-2019-11759/" source="CVE"/>
		<reference ref_id="CVE-2019-11760" ref_url="https://www.suse.com/security/cve/CVE-2019-11760/" source="CVE"/>
		<reference ref_id="CVE-2019-11761" ref_url="https://www.suse.com/security/cve/CVE-2019-11761/" source="CVE"/>
		<reference ref_id="CVE-2019-11762" ref_url="https://www.suse.com/security/cve/CVE-2019-11762/" source="CVE"/>
		<reference ref_id="CVE-2019-11763" ref_url="https://www.suse.com/security/cve/CVE-2019-11763/" source="CVE"/>
		<reference ref_id="CVE-2019-11764" ref_url="https://www.suse.com/security/cve/CVE-2019-11764/" source="CVE"/>
		<reference ref_id="CVE-2019-13722" ref_url="https://www.suse.com/security/cve/CVE-2019-13722/" source="CVE"/>
		<reference ref_id="CVE-2019-15903" ref_url="https://www.suse.com/security/cve/CVE-2019-15903/" source="CVE"/>
		<reference ref_id="CVE-2019-17005" ref_url="https://www.suse.com/security/cve/CVE-2019-17005/" source="CVE"/>
		<reference ref_id="CVE-2019-17008" ref_url="https://www.suse.com/security/cve/CVE-2019-17008/" source="CVE"/>
		<reference ref_id="CVE-2019-17009" ref_url="https://www.suse.com/security/cve/CVE-2019-17009/" source="CVE"/>
		<reference ref_id="CVE-2019-17010" ref_url="https://www.suse.com/security/cve/CVE-2019-17010/" source="CVE"/>
		<reference ref_id="CVE-2019-17011" ref_url="https://www.suse.com/security/cve/CVE-2019-17011/" source="CVE"/>
		<reference ref_id="CVE-2019-17012" ref_url="https://www.suse.com/security/cve/CVE-2019-17012/" source="CVE"/>
		<reference ref_id="CVE-2019-17015" ref_url="https://www.suse.com/security/cve/CVE-2019-17015/" source="CVE"/>
		<reference ref_id="CVE-2019-17016" ref_url="https://www.suse.com/security/cve/CVE-2019-17016/" source="CVE"/>
		<reference ref_id="CVE-2019-17017" ref_url="https://www.suse.com/security/cve/CVE-2019-17017/" source="CVE"/>
		<reference ref_id="CVE-2019-17021" ref_url="https://www.suse.com/security/cve/CVE-2019-17021/" source="CVE"/>
		<reference ref_id="CVE-2019-17022" ref_url="https://www.suse.com/security/cve/CVE-2019-17022/" source="CVE"/>
		<reference ref_id="CVE-2019-17024" ref_url="https://www.suse.com/security/cve/CVE-2019-17024/" source="CVE"/>
		<reference ref_id="CVE-2019-17026" ref_url="https://www.suse.com/security/cve/CVE-2019-17026/" source="CVE"/>
		<reference ref_id="CVE-2019-20503" ref_url="https://www.suse.com/security/cve/CVE-2019-20503/" source="CVE"/>
		<reference ref_id="CVE-2019-5785" ref_url="https://www.suse.com/security/cve/CVE-2019-5785/" source="CVE"/>
		<reference ref_id="CVE-2019-5798" ref_url="https://www.suse.com/security/cve/CVE-2019-5798/" source="CVE"/>
		<reference ref_id="CVE-2019-7317" ref_url="https://www.suse.com/security/cve/CVE-2019-7317/" source="CVE"/>
		<reference ref_id="CVE-2019-9797" ref_url="https://www.suse.com/security/cve/CVE-2019-9797/" source="CVE"/>
		<reference ref_id="CVE-2019-9800" ref_url="https://www.suse.com/security/cve/CVE-2019-9800/" source="CVE"/>
		<reference ref_id="CVE-2019-9810" ref_url="https://www.suse.com/security/cve/CVE-2019-9810/" source="CVE"/>
		<reference ref_id="CVE-2019-9811" ref_url="https://www.suse.com/security/cve/CVE-2019-9811/" source="CVE"/>
		<reference ref_id="CVE-2019-9813" ref_url="https://www.suse.com/security/cve/CVE-2019-9813/" source="CVE"/>
		<reference ref_id="CVE-2019-9815" ref_url="https://www.suse.com/security/cve/CVE-2019-9815/" source="CVE"/>
		<reference ref_id="CVE-2019-9816" ref_url="https://www.suse.com/security/cve/CVE-2019-9816/" source="CVE"/>
		<reference ref_id="CVE-2019-9817" ref_url="https://www.suse.com/security/cve/CVE-2019-9817/" source="CVE"/>
		<reference ref_id="CVE-2019-9818" ref_url="https://www.suse.com/security/cve/CVE-2019-9818/" source="CVE"/>
		<reference ref_id="CVE-2019-9819" ref_url="https://www.suse.com/security/cve/CVE-2019-9819/" source="CVE"/>
		<reference ref_id="CVE-2019-9820" ref_url="https://www.suse.com/security/cve/CVE-2019-9820/" source="CVE"/>
		<reference ref_id="CVE-2020-12387" ref_url="https://www.suse.com/security/cve/CVE-2020-12387/" source="CVE"/>
		<reference ref_id="CVE-2020-12392" ref_url="https://www.suse.com/security/cve/CVE-2020-12392/" source="CVE"/>
		<reference ref_id="CVE-2020-12393" ref_url="https://www.suse.com/security/cve/CVE-2020-12393/" source="CVE"/>
		<reference ref_id="CVE-2020-12395" ref_url="https://www.suse.com/security/cve/CVE-2020-12395/" source="CVE"/>
		<reference ref_id="CVE-2020-12397" ref_url="https://www.suse.com/security/cve/CVE-2020-12397/" source="CVE"/>
		<reference ref_id="CVE-2020-6792" ref_url="https://www.suse.com/security/cve/CVE-2020-6792/" source="CVE"/>
		<reference ref_id="CVE-2020-6793" ref_url="https://www.suse.com/security/cve/CVE-2020-6793/" source="CVE"/>
		<reference ref_id="CVE-2020-6794" ref_url="https://www.suse.com/security/cve/CVE-2020-6794/" source="CVE"/>
		<reference ref_id="CVE-2020-6795" ref_url="https://www.suse.com/security/cve/CVE-2020-6795/" source="CVE"/>
		<reference ref_id="CVE-2020-6797" ref_url="https://www.suse.com/security/cve/CVE-2020-6797/" source="CVE"/>
		<reference ref_id="CVE-2020-6798" ref_url="https://www.suse.com/security/cve/CVE-2020-6798/" source="CVE"/>
		<reference ref_id="CVE-2020-6800" ref_url="https://www.suse.com/security/cve/CVE-2020-6800/" source="CVE"/>
		<reference ref_id="CVE-2020-6805" ref_url="https://www.suse.com/security/cve/CVE-2020-6805/" source="CVE"/>
		<reference ref_id="CVE-2020-6806" ref_url="https://www.suse.com/security/cve/CVE-2020-6806/" source="CVE"/>
		<reference ref_id="CVE-2020-6807" ref_url="https://www.suse.com/security/cve/CVE-2020-6807/" source="CVE"/>
		<reference ref_id="CVE-2020-6811" ref_url="https://www.suse.com/security/cve/CVE-2020-6811/" source="CVE"/>
		<reference ref_id="CVE-2020-6812" ref_url="https://www.suse.com/security/cve/CVE-2020-6812/" source="CVE"/>
		<reference ref_id="CVE-2020-6814" ref_url="https://www.suse.com/security/cve/CVE-2020-6814/" source="CVE"/>
		<reference ref_id="CVE-2020-6819" ref_url="https://www.suse.com/security/cve/CVE-2020-6819/" source="CVE"/>
		<reference ref_id="CVE-2020-6820" ref_url="https://www.suse.com/security/cve/CVE-2020-6820/" source="CVE"/>
		<reference ref_id="CVE-2020-6821" ref_url="https://www.suse.com/security/cve/CVE-2020-6821/" source="CVE"/>
		<reference ref_id="CVE-2020-6822" ref_url="https://www.suse.com/security/cve/CVE-2020-6822/" source="CVE"/>
		<reference ref_id="CVE-2020-6825" ref_url="https://www.suse.com/security/cve/CVE-2020-6825/" source="CVE"/>
		<reference ref_id="CVE-2020-6831" ref_url="https://www.suse.com/security/cve/CVE-2020-6831/" source="CVE"/>
		<description>
These are all security issues fixed in the MozillaThunderbird-68.8.0-3.80.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2011-3079/">CVE-2011-3079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1587/">CVE-2014-1587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1590/">CVE-2014-1590</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1592/">CVE-2014-1592</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1593/">CVE-2014-1593</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-1594/">CVE-2014-1594</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8634/">CVE-2014-8634</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2014-8635/">CVE-2014-8635</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8638/">CVE-2014-8638</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8639/">CVE-2014-8639</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0801/">CVE-2015-0801</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0807/">CVE-2015-0807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0813/">CVE-2015-0813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0815/">CVE-2015-0815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0816/">CVE-2015-0816</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0822/">CVE-2015-0822</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0827/">CVE-2015-0827</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0831/">CVE-2015-0831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0833/">CVE-2015-0833</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-0836/">CVE-2015-0836</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2708/">CVE-2015-2708</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2710/">CVE-2015-2710</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2713/">CVE-2015-2713</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-2716/">CVE-2015-2716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2721/">CVE-2015-2721</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2722/">CVE-2015-2722</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2724/">CVE-2015-2724</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2725/">CVE-2015-2725</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2727/">CVE-2015-2727</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2728/">CVE-2015-2728</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2729/">CVE-2015-2729</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2730/">CVE-2015-2730</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2731/">CVE-2015-2731</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2733/">CVE-2015-2733</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2734/">CVE-2015-2734</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2735/">CVE-2015-2735</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2736/">CVE-2015-2736</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2737/">CVE-2015-2737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2738/">CVE-2015-2738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2739/">CVE-2015-2739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2740/">CVE-2015-2740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2741/">CVE-2015-2741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2743/">CVE-2015-2743</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4000/">CVE-2015-4000</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4473/">CVE-2015-4473</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4475/">CVE-2015-4475</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4477/">CVE-2015-4477</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4478/">CVE-2015-4478</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4479/">CVE-2015-4479</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4480/">CVE-2015-4480</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4481/">CVE-2015-4481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4482/">CVE-2015-4482</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4484/">CVE-2015-4484</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4485/">CVE-2015-4485</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4486/">CVE-2015-4486</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4487/">CVE-2015-4487</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4488/">CVE-2015-4488</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4489/">CVE-2015-4489</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4491/">CVE-2015-4491</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4492/">CVE-2015-4492</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4493/">CVE-2015-4493</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4500/">CVE-2015-4500</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4505/">CVE-2015-4505</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4506/">CVE-2015-4506</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-4509/">CVE-2015-4509</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4511/">CVE-2015-4511</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4513/">CVE-2015-4513</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4514/">CVE-2015-4514</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4517/">CVE-2015-4517</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4519/">CVE-2015-4519</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4520/">CVE-2015-4520</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4521/">CVE-2015-4521</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-4522/">CVE-2015-4522</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7174/">CVE-2015-7174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7175/">CVE-2015-7175</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7176/">CVE-2015-7176</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7177/">CVE-2015-7177</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7178/">CVE-2015-7178</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7179/">CVE-2015-7179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7180/">CVE-2015-7180</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7181/">CVE-2015-7181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7182/">CVE-2015-7182</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7183/">CVE-2015-7183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7188/">CVE-2015-7188</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7189/">CVE-2015-7189</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7193/">CVE-2015-7193</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7194/">CVE-2015-7194</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7196/">CVE-2015-7196</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7197/">CVE-2015-7197</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7198/">CVE-2015-7198</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7199/">CVE-2015-7199</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7200/">CVE-2015-7200</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7201/">CVE-2015-7201</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7205/">CVE-2015-7205</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7207/">CVE-2015-7207</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2015-7210/">CVE-2015-7210</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7212/">CVE-2015-7212</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7213/">CVE-2015-7213</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7214/">CVE-2015-7214</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-7222/">CVE-2015-7222</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-7575/">CVE-2015-7575</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1930/">CVE-2016-1930</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1935/">CVE-2016-1935</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1950/">CVE-2016-1950</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1952/">CVE-2016-1952</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1953/">CVE-2016-1953</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1954/">CVE-2016-1954</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1955/">CVE-2016-1955</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1956/">CVE-2016-1956</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1957/">CVE-2016-1957</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1958/">CVE-2016-1958</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1960/">CVE-2016-1960</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1961/">CVE-2016-1961</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1962/">CVE-2016-1962</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1964/">CVE-2016-1964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1965/">CVE-2016-1965</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-1966/">CVE-2016-1966</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1974/">CVE-2016-1974</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-1977/">CVE-2016-1977</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1979/">CVE-2016-1979</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2790/">CVE-2016-2790</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2791/">CVE-2016-2791</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2792/">CVE-2016-2792</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2793/">CVE-2016-2793</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2794/">CVE-2016-2794</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2795/">CVE-2016-2795</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2796/">CVE-2016-2796</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2797/">CVE-2016-2797</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2798/">CVE-2016-2798</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2799/">CVE-2016-2799</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2800/">CVE-2016-2800</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2801/">CVE-2016-2801</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2016-2802/">CVE-2016-2802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2806/">CVE-2016-2806</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2807/">CVE-2016-2807</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2815/">CVE-2016-2815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2818/">CVE-2016-2818</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2830/">CVE-2016-2830</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2836/">CVE-2016-2836</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2837/">CVE-2016-2837</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2838/">CVE-2016-2838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2839/">CVE-2016-2839</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5252/">CVE-2016-5252</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5254/">CVE-2016-5254</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5258/">CVE-2016-5258</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5259/">CVE-2016-5259</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5262/">CVE-2016-5262</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5263/">CVE-2016-5263</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5264/">CVE-2016-5264</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5265/">CVE-2016-5265</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5290/">CVE-2016-5290</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5291/">CVE-2016-5291</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-5296/">CVE-2016-5296</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5297/">CVE-2016-5297</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-6354/">CVE-2016-6354</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9066/">CVE-2016-9066</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9079/">CVE-2016-9079</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9893/">CVE-2016-9893</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9895/">CVE-2016-9895</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9897/">CVE-2016-9897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9898/">CVE-2016-9898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9899/">CVE-2016-9899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9900/">CVE-2016-9900</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9904/">CVE-2016-9904</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9905/">CVE-2016-9905</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-16541/">CVE-2017-16541</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5373/">CVE-2017-5373</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5375/">CVE-2017-5375</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5376/">CVE-2017-5376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5378/">CVE-2017-5378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5380/">CVE-2017-5380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5383/">CVE-2017-5383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5390/">CVE-2017-5390</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5396/">CVE-2017-5396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5398/">CVE-2017-5398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5399/">CVE-2017-5399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5400/">CVE-2017-5400</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5401/">CVE-2017-5401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5402/">CVE-2017-5402</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5403/">CVE-2017-5403</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5404/">CVE-2017-5404</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5405/">CVE-2017-5405</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5406/">CVE-2017-5406</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5407/">CVE-2017-5407</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5408/">CVE-2017-5408</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5410/">CVE-2017-5410</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5412/">CVE-2017-5412</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5413/">CVE-2017-5413</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5414/">CVE-2017-5414</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5416/">CVE-2017-5416</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5418/">CVE-2017-5418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5419/">CVE-2017-5419</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5421/">CVE-2017-5421</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5422/">CVE-2017-5422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5426/">CVE-2017-5426</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5429/">CVE-2017-5429</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5430/">CVE-2017-5430</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5432/">CVE-2017-5432</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5433/">CVE-2017-5433</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5434/">CVE-2017-5434</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5435/">CVE-2017-5435</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5436/">CVE-2017-5436</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5437/">CVE-2017-5437</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5438/">CVE-2017-5438</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5439/">CVE-2017-5439</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5440/">CVE-2017-5440</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5441/">CVE-2017-5441</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5442/">CVE-2017-5442</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5443/">CVE-2017-5443</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5444/">CVE-2017-5444</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5445/">CVE-2017-5445</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5446/">CVE-2017-5446</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5447/">CVE-2017-5447</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5449/">CVE-2017-5449</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5451/">CVE-2017-5451</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5454/">CVE-2017-5454</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5459/">CVE-2017-5459</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5460/">CVE-2017-5460</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5461/">CVE-2017-5461</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5462/">CVE-2017-5462</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5464/">CVE-2017-5464</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5465/">CVE-2017-5465</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-5466/">CVE-2017-5466</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5467/">CVE-2017-5467</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-5469/">CVE-2017-5469</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5470/">CVE-2017-5470</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-5472/">CVE-2017-5472</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7749/">CVE-2017-7749</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7750/">CVE-2017-7750</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7751/">CVE-2017-7751</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7752/">CVE-2017-7752</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-7753/">CVE-2017-7753</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7754/">CVE-2017-7754</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7756/">CVE-2017-7756</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7757/">CVE-2017-7757</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7758/">CVE-2017-7758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7763/">CVE-2017-7763</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7764/">CVE-2017-7764</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7765/">CVE-2017-7765</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7771/">CVE-2017-7771</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7772/">CVE-2017-7772</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7773/">CVE-2017-7773</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7774/">CVE-2017-7774</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7775/">CVE-2017-7775</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7776/">CVE-2017-7776</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7777/">CVE-2017-7777</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7778/">CVE-2017-7778</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7779/">CVE-2017-7779</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7782/">CVE-2017-7782</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7784/">CVE-2017-7784</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7785/">CVE-2017-7785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7786/">CVE-2017-7786</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-7787/">CVE-2017-7787</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7791/">CVE-2017-7791</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7792/">CVE-2017-7792</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7793/">CVE-2017-7793</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7798/">CVE-2017-7798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7800/">CVE-2017-7800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7801/">CVE-2017-7801</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7802/">CVE-2017-7802</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7803/">CVE-2017-7803</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7804/">CVE-2017-7804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7805/">CVE-2017-7805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7807/">CVE-2017-7807</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7810/">CVE-2017-7810</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7814/">CVE-2017-7814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7818/">CVE-2017-7818</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7819/">CVE-2017-7819</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7823/">CVE-2017-7823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7824/">CVE-2017-7824</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2017-7825/">CVE-2017-7825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7826/">CVE-2017-7826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7828/">CVE-2017-7828</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2017-7829/">CVE-2017-7829</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7830/">CVE-2017-7830</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-7845/">CVE-2017-7845</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7846/">CVE-2017-7846</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7847/">CVE-2017-7847</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-7848/">CVE-2017-7848</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12359/">CVE-2018-12359</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12360/">CVE-2018-12360</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12361/">CVE-2018-12361</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12362/">CVE-2018-12362</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12363/">CVE-2018-12363</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12364/">CVE-2018-12364</cve>
	<cve impact="important" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12365/">CVE-2018-12365</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12366/">CVE-2018-12366</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12367/">CVE-2018-12367</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12371/">CVE-2018-12371</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12372/">CVE-2018-12372</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12373/">CVE-2018-12373</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-12374/">CVE-2018-12374</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2018-12376/">CVE-2018-12376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12377/">CVE-2018-12377</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12378/">CVE-2018-12378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-12383/">CVE-2018-12383</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-12385/">CVE-2018-12385</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-12389/">CVE-2018-12389</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12390/">CVE-2018-12390</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12391/">CVE-2018-12391</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12392/">CVE-2018-12392</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12393/">CVE-2018-12393</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-12405/">CVE-2018-12405</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-17466/">CVE-2018-17466</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18335/">CVE-2018-18335</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18356/">CVE-2018-18356</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18492/">CVE-2018-18492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18493/">CVE-2018-18493</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18494/">CVE-2018-18494</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18498/">CVE-2018-18498</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18500/">CVE-2018-18500</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18501/">CVE-2018-18501</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-18505/">CVE-2018-18505</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-18509/">CVE-2018-18509</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-18511/">CVE-2018-18511</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5089/">CVE-2018-5089</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5095/">CVE-2018-5095</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5096/">CVE-2018-5096</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5097/">CVE-2018-5097</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5098/">CVE-2018-5098</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5099/">CVE-2018-5099</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5102/">CVE-2018-5102</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5103/">CVE-2018-5103</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5104/">CVE-2018-5104</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5117/">CVE-2018-5117</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5125/">CVE-2018-5125</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5127/">CVE-2018-5127</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5129/">CVE-2018-5129</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-5144/">CVE-2018-5144</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5145/">CVE-2018-5145</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5146/">CVE-2018-5146</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5150/">CVE-2018-5150</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5154/">CVE-2018-5154</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5155/">CVE-2018-5155</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5156/">CVE-2018-5156</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5159/">CVE-2018-5159</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5161/">CVE-2018-5161</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5162/">CVE-2018-5162</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5168/">CVE-2018-5168</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5170/">CVE-2018-5170</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5174/">CVE-2018-5174</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5178/">CVE-2018-5178</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5183/">CVE-2018-5183</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5184/">CVE-2018-5184</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-5185/">CVE-2018-5185</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5187/">CVE-2018-5187</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-5188/">CVE-2018-5188</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11691/">CVE-2019-11691</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11692/">CVE-2019-11692</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11693/">CVE-2019-11693</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11694/">CVE-2019-11694</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11698/">CVE-2019-11698</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11703/">CVE-2019-11703</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11704/">CVE-2019-11704</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11705/">CVE-2019-11705</cve>
	<cve impact="critical" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11706/">CVE-2019-11706</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11707/">CVE-2019-11707</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11708/">CVE-2019-11708</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11709/">CVE-2019-11709</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11710/">CVE-2019-11710</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11711/">CVE-2019-11711</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11712/">CVE-2019-11712</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11713/">CVE-2019-11713</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11714/">CVE-2019-11714</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11715/">CVE-2019-11715</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11716/">CVE-2019-11716</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11717/">CVE-2019-11717</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11719/">CVE-2019-11719</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11720/">CVE-2019-11720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11721/">CVE-2019-11721</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11723/">CVE-2019-11723</cve>
	<cve impact="important" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11724/">CVE-2019-11724</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11725/">CVE-2019-11725</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-11727/">CVE-2019-11727</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11728/">CVE-2019-11728</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11729/">CVE-2019-11729</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-11730/">CVE-2019-11730</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-11739/">CVE-2019-11739</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11740/">CVE-2019-11740</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11742/">CVE-2019-11742</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-11743/">CVE-2019-11743</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11744/">CVE-2019-11744</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11745/">CVE-2019-11745</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11746/">CVE-2019-11746</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-11752/">CVE-2019-11752</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11755/">CVE-2019-11755</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11757/">CVE-2019-11757</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11758/">CVE-2019-11758</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11759/">CVE-2019-11759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11760/">CVE-2019-11760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11761/">CVE-2019-11761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11762/">CVE-2019-11762</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11763/">CVE-2019-11763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-11764/">CVE-2019-11764</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-13722/">CVE-2019-13722</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15903/">CVE-2019-15903</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17005/">CVE-2019-17005</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17008/">CVE-2019-17008</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17009/">CVE-2019-17009</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17010/">CVE-2019-17010</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17011/">CVE-2019-17011</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17012/">CVE-2019-17012</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17015/">CVE-2019-17015</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17016/">CVE-2019-17016</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-17017/">CVE-2019-17017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17021/">CVE-2019-17021</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17022/">CVE-2019-17022</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17024/">CVE-2019-17024</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17026/">CVE-2019-17026</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-20503/">CVE-2019-20503</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5785/">CVE-2019-5785</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-5798/">CVE-2019-5798</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-7317/">CVE-2019-7317</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9797/">CVE-2019-9797</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9800/">CVE-2019-9800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9810/">CVE-2019-9810</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9811/">CVE-2019-9811</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9813/">CVE-2019-9813</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-9815/">CVE-2019-9815</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9816/">CVE-2019-9816</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9817/">CVE-2019-9817</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9818/">CVE-2019-9818</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9819/">CVE-2019-9819</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9820/">CVE-2019-9820</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12387/">CVE-2020-12387</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12392/">CVE-2020-12392</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12393/">CVE-2020-12393</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12395/">CVE-2020-12395</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12397/">CVE-2020-12397</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6792/">CVE-2020-6792</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6793/">CVE-2020-6793</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6794/">CVE-2020-6794</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-6795/">CVE-2020-6795</cve>
	<cve impact="important" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6797/">CVE-2020-6797</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-6798/">CVE-2020-6798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6800/">CVE-2020-6800</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6805/">CVE-2020-6805</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6806/">CVE-2020-6806</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6807/">CVE-2020-6807</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6811/">CVE-2020-6811</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6812/">CVE-2020-6812</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6814/">CVE-2020-6814</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6819/">CVE-2020-6819</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6820/">CVE-2020-6820</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-6821/">CVE-2020-6821</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-6822/">CVE-2020-6822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6825/">CVE-2020-6825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6831/">CVE-2020-6831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489174" comment="MozillaThunderbird-68.8.0-3.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489175" comment="MozillaThunderbird-translations-common-68.8.0-3.80.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489176" comment="MozillaThunderbird-translations-other-68.8.0-3.80.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109950" version="1" class="patch">
	<metadata>
		<title>NetworkManager-applet-1.8.24-5.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-6590" ref_url="https://www.suse.com/security/cve/CVE-2017-6590/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-applet-1.8.24-5.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6590/">CVE-2017-6590</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489177" comment="NetworkManager-applet-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489178" comment="NetworkManager-applet-lang-1.8.24-5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489179" comment="NetworkManager-connection-editor-1.8.24-5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109951" version="1" class="patch">
	<metadata>
		<title>NetworkManager-lang-1.22.6-1.36 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2006-7246" ref_url="https://www.suse.com/security/cve/CVE-2006-7246/" source="CVE"/>
		<reference ref_id="CVE-2015-2924" ref_url="https://www.suse.com/security/cve/CVE-2015-2924/" source="CVE"/>
		<reference ref_id="CVE-2016-0764" ref_url="https://www.suse.com/security/cve/CVE-2016-0764/" source="CVE"/>
		<reference ref_id="CVE-2018-1000135" ref_url="https://www.suse.com/security/cve/CVE-2018-1000135/" source="CVE"/>
		<reference ref_id="CVE-2018-15688" ref_url="https://www.suse.com/security/cve/CVE-2018-15688/" source="CVE"/>
		<description>
These are all security issues fixed in the NetworkManager-lang-1.22.6-1.36 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2006-7246/">CVE-2006-7246</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-2924/">CVE-2015-2924</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-0764/">CVE-2016-0764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000135/">CVE-2018-1000135</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15688/">CVE-2018-15688</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489180" comment="NetworkManager-lang-1.22.6-1.36 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109952" version="1" class="patch">
	<metadata>
		<title>PackageKit-gstreamer-plugin-1.1.13-2.16 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2018-1106" ref_url="https://www.suse.com/security/cve/CVE-2018-1106/" source="CVE"/>
		<description>
These are all security issues fixed in the PackageKit-gstreamer-plugin-1.1.13-2.16 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-1106/">CVE-2018-1106</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489181" comment="PackageKit-gstreamer-plugin-1.1.13-2.16 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489182" comment="PackageKit-gtk3-module-1.1.13-2.16 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109953" version="1" class="patch">
	<metadata>
		<title>argyllcms-1.9.2-2.27 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-1616" ref_url="https://www.suse.com/security/cve/CVE-2012-1616/" source="CVE"/>
		<description>
These are all security issues fixed in the argyllcms-1.9.2-2.27 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-1616/">CVE-2012-1616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488880" comment="argyllcms-1.9.2-2.27 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109954" version="1" class="patch">
	<metadata>
		<title>bluez-cups-5.48-11.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-9797" ref_url="https://www.suse.com/security/cve/CVE-2016-9797/" source="CVE"/>
		<reference ref_id="CVE-2016-9798" ref_url="https://www.suse.com/security/cve/CVE-2016-9798/" source="CVE"/>
		<reference ref_id="CVE-2016-9800" ref_url="https://www.suse.com/security/cve/CVE-2016-9800/" source="CVE"/>
		<reference ref_id="CVE-2016-9801" ref_url="https://www.suse.com/security/cve/CVE-2016-9801/" source="CVE"/>
		<reference ref_id="CVE-2016-9802" ref_url="https://www.suse.com/security/cve/CVE-2016-9802/" source="CVE"/>
		<reference ref_id="CVE-2016-9804" ref_url="https://www.suse.com/security/cve/CVE-2016-9804/" source="CVE"/>
		<reference ref_id="CVE-2016-9917" ref_url="https://www.suse.com/security/cve/CVE-2016-9917/" source="CVE"/>
		<reference ref_id="CVE-2016-9918" ref_url="https://www.suse.com/security/cve/CVE-2016-9918/" source="CVE"/>
		<description>
These are all security issues fixed in the bluez-cups-5.48-11.58 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9797/">CVE-2016-9797</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9798/">CVE-2016-9798</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9800/">CVE-2016-9800</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9801/">CVE-2016-9801</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-9802/">CVE-2016-9802</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9804/">CVE-2016-9804</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9917/">CVE-2016-9917</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2016-9918/">CVE-2016-9918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489183" comment="bluez-cups-5.48-11.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109955" version="1" class="patch">
	<metadata>
		<title>bogofilter-common-1.2.4-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2010-2494" ref_url="https://www.suse.com/security/cve/CVE-2010-2494/" source="CVE"/>
		<reference ref_id="CVE-2012-5468" ref_url="https://www.suse.com/security/cve/CVE-2012-5468/" source="CVE"/>
		<description>
These are all security issues fixed in the bogofilter-common-1.2.4-1.40 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2010-2494/">CVE-2010-2494</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2012-5468/">CVE-2012-5468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488882" comment="bogofilter-common-1.2.4-1.40 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488883" comment="bogofilter-db-1.2.4-1.40 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109956" version="1" class="patch">
	<metadata>
		<title>colord-gtk-lang-0.1.26-1.48 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2011-4349" ref_url="https://www.suse.com/security/cve/CVE-2011-4349/" source="CVE"/>
		<description>
These are all security issues fixed in the colord-gtk-lang-0.1.26-1.48 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-4349/">CVE-2011-4349</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488885" comment="colord-gtk-lang-0.1.26-1.48 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109957" version="1" class="patch">
	<metadata>
		<title>dia-0.97.3-4.3.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2019-19451" ref_url="https://www.suse.com/security/cve/CVE-2019-19451/" source="CVE"/>
		<description>
These are all security issues fixed in the dia-0.97.3-4.3.3 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19451/">CVE-2019-19451</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489184" comment="dia-0.97.3-4.3.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489185" comment="dia-lang-0.97.3-4.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109958" version="1" class="patch">
	<metadata>
		<title>enigmail-2.1.5-3.22.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-17688" ref_url="https://www.suse.com/security/cve/CVE-2017-17688/" source="CVE"/>
		<reference ref_id="CVE-2017-17689" ref_url="https://www.suse.com/security/cve/CVE-2017-17689/" source="CVE"/>
		<reference ref_id="CVE-2018-12019" ref_url="https://www.suse.com/security/cve/CVE-2018-12019/" source="CVE"/>
		<reference ref_id="CVE-2018-12020" ref_url="https://www.suse.com/security/cve/CVE-2018-12020/" source="CVE"/>
		<reference ref_id="CVE-2019-12269" ref_url="https://www.suse.com/security/cve/CVE-2019-12269/" source="CVE"/>
		<description>
These are all security issues fixed in the enigmail-2.1.5-3.22.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17688/">CVE-2017-17688</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-17689/">CVE-2017-17689</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-12019/">CVE-2018-12019</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-12020/">CVE-2018-12020</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-12269/">CVE-2019-12269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489186" comment="enigmail-2.1.5-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109959" version="1" class="patch">
	<metadata>
		<title>evolution-3.34.4-1.49 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2018-15587" ref_url="https://www.suse.com/security/cve/CVE-2018-15587/" source="CVE"/>
		<description>
These are all security issues fixed in the evolution-3.34.4-1.49 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15587/">CVE-2018-15587</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489187" comment="evolution-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489188" comment="evolution-devel-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489189" comment="evolution-lang-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489190" comment="evolution-plugin-bogofilter-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489191" comment="evolution-plugin-pst-import-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489192" comment="evolution-plugin-spamassassin-3.34.4-1.49 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489193" comment="evolution-plugin-text-highlight-3.34.4-1.49 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109960" version="1" class="patch">
	<metadata>
		<title>freerdp-2.0.0~rc4-13.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-0250" ref_url="https://www.suse.com/security/cve/CVE-2014-0250/" source="CVE"/>
		<reference ref_id="CVE-2014-0791" ref_url="https://www.suse.com/security/cve/CVE-2014-0791/" source="CVE"/>
		<reference ref_id="CVE-2017-2834" ref_url="https://www.suse.com/security/cve/CVE-2017-2834/" source="CVE"/>
		<reference ref_id="CVE-2017-2835" ref_url="https://www.suse.com/security/cve/CVE-2017-2835/" source="CVE"/>
		<reference ref_id="CVE-2017-2836" ref_url="https://www.suse.com/security/cve/CVE-2017-2836/" source="CVE"/>
		<reference ref_id="CVE-2017-2837" ref_url="https://www.suse.com/security/cve/CVE-2017-2837/" source="CVE"/>
		<reference ref_id="CVE-2017-2838" ref_url="https://www.suse.com/security/cve/CVE-2017-2838/" source="CVE"/>
		<reference ref_id="CVE-2017-2839" ref_url="https://www.suse.com/security/cve/CVE-2017-2839/" source="CVE"/>
		<reference ref_id="CVE-2018-0886" ref_url="https://www.suse.com/security/cve/CVE-2018-0886/" source="CVE"/>
		<reference ref_id="CVE-2018-1000852" ref_url="https://www.suse.com/security/cve/CVE-2018-1000852/" source="CVE"/>
		<reference ref_id="CVE-2018-8784" ref_url="https://www.suse.com/security/cve/CVE-2018-8784/" source="CVE"/>
		<reference ref_id="CVE-2018-8785" ref_url="https://www.suse.com/security/cve/CVE-2018-8785/" source="CVE"/>
		<reference ref_id="CVE-2018-8786" ref_url="https://www.suse.com/security/cve/CVE-2018-8786/" source="CVE"/>
		<reference ref_id="CVE-2018-8787" ref_url="https://www.suse.com/security/cve/CVE-2018-8787/" source="CVE"/>
		<reference ref_id="CVE-2018-8788" ref_url="https://www.suse.com/security/cve/CVE-2018-8788/" source="CVE"/>
		<reference ref_id="CVE-2018-8789" ref_url="https://www.suse.com/security/cve/CVE-2018-8789/" source="CVE"/>
		<reference ref_id="CVE-2019-17177" ref_url="https://www.suse.com/security/cve/CVE-2019-17177/" source="CVE"/>
		<reference ref_id="CVE-2019-17178" ref_url="https://www.suse.com/security/cve/CVE-2019-17178/" source="CVE"/>
		<description>
These are all security issues fixed in the freerdp-2.0.0~rc4-13.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0250/">CVE-2014-0250</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-0791/">CVE-2014-0791</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2834/">CVE-2017-2834</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-2835/">CVE-2017-2835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2836/">CVE-2017-2836</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2837/">CVE-2017-2837</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2838/">CVE-2017-2838</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-2839/">CVE-2017-2839</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-0886/">CVE-2018-0886</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000852/">CVE-2018-1000852</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8784/">CVE-2018-8784</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8785/">CVE-2018-8785</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8786/">CVE-2018-8786</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8787/">CVE-2018-8787</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-8788/">CVE-2018-8788</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8789/">CVE-2018-8789</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17177/">CVE-2019-17177</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17178/">CVE-2019-17178</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489194" comment="freerdp-2.0.0~rc4-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489195" comment="freerdp-devel-2.0.0~rc4-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489196" comment="libfreerdp2-2.0.0~rc4-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489197" comment="libwinpr2-2.0.0~rc4-13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489198" comment="winpr2-devel-2.0.0~rc4-13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109961" version="1" class="patch">
	<metadata>
		<title>gegl-0_3-0.3.34-1.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4433" ref_url="https://www.suse.com/security/cve/CVE-2012-4433/" source="CVE"/>
		<reference ref_id="CVE-2018-10114" ref_url="https://www.suse.com/security/cve/CVE-2018-10114/" source="CVE"/>
		<description>
These are all security issues fixed in the gegl-0_3-0.3.34-1.30 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4433/">CVE-2012-4433</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10114/">CVE-2018-10114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488895" comment="gegl-0_3-0.3.34-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489199" comment="gegl-0_4-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489200" comment="gegl-0_4-lang-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489201" comment="gegl-devel-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488898" comment="libgegl-0_3-0-0.3.34-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489202" comment="libgegl-0_4-0-0.4.16-1.99 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488899" comment="typelib-1_0-Gegl-0_3-0.3.34-1.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489203" comment="typelib-1_0-Gegl-0_4-0.4.16-1.99 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109962" version="1" class="patch">
	<metadata>
		<title>gimp-2.10.12-1.100 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2007-3126" ref_url="https://www.suse.com/security/cve/CVE-2007-3126/" source="CVE"/>
		<reference ref_id="CVE-2016-4994" ref_url="https://www.suse.com/security/cve/CVE-2016-4994/" source="CVE"/>
		<description>
These are all security issues fixed in the gimp-2.10.12-1.100 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2007-3126/">CVE-2007-3126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4994/">CVE-2016-4994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489204" comment="gimp-2.10.12-1.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489205" comment="gimp-devel-2.10.12-1.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489206" comment="gimp-lang-2.10.12-1.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489207" comment="gimp-plugins-python-2.10.12-1.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489208" comment="libgimp-2_0-0-2.10.12-1.100 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489209" comment="libgimpui-2_0-0-2.10.12-1.100 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109963" version="1" class="patch">
	<metadata>
		<title>gnome-photos-3.34.1-1.62 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7447" ref_url="https://www.suse.com/security/cve/CVE-2013-7447/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-photos-3.34.1-1.62 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7447/">CVE-2013-7447</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489210" comment="gnome-photos-3.34.1-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489211" comment="gnome-photos-lang-3.34.1-1.62 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489212" comment="gnome-shell-search-provider-gnome-photos-3.34.1-1.62 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109964" version="1" class="patch">
	<metadata>
		<title>gnome-shell-calendar-3.34.4+4-1.58 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-8288" ref_url="https://www.suse.com/security/cve/CVE-2017-8288/" source="CVE"/>
		<reference ref_id="CVE-2019-3820" ref_url="https://www.suse.com/security/cve/CVE-2019-3820/" source="CVE"/>
		<description>
These are all security issues fixed in the gnome-shell-calendar-3.34.4+4-1.58 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8288/">CVE-2017-8288</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3820/">CVE-2019-3820</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489213" comment="gnome-shell-calendar-3.34.4+4-1.58 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109965" version="1" class="patch">
	<metadata>
		<title>gstreamer-plugins-ugly-1.16.2-1.75 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-5838" ref_url="https://www.suse.com/security/cve/CVE-2017-5838/" source="CVE"/>
		<reference ref_id="CVE-2017-5847" ref_url="https://www.suse.com/security/cve/CVE-2017-5847/" source="CVE"/>
		<description>
These are all security issues fixed in the gstreamer-plugins-ugly-1.16.2-1.75 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5838/">CVE-2017-5838</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5847/">CVE-2017-5847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489214" comment="gstreamer-plugins-ugly-1.16.2-1.75 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489215" comment="gstreamer-plugins-ugly-lang-1.16.2-1.75 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109966" version="1" class="patch">
	<metadata>
		<title>icedtea-web-1.7.1-5.13 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-5234" ref_url="https://www.suse.com/security/cve/CVE-2015-5234/" source="CVE"/>
		<reference ref_id="CVE-2015-5235" ref_url="https://www.suse.com/security/cve/CVE-2015-5235/" source="CVE"/>
		<description>
These are all security issues fixed in the icedtea-web-1.7.1-5.13 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5234/">CVE-2015-5234</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5235/">CVE-2015-5235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489065" comment="icedtea-web-1.7.1-5.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109967" version="1" class="patch">
	<metadata>
		<title>imobiledevice-tools-1.2.0+git20180427.26373b3-1.40 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5104" ref_url="https://www.suse.com/security/cve/CVE-2016-5104/" source="CVE"/>
		<description>
These are all security issues fixed in the imobiledevice-tools-1.2.0+git20180427.26373b3-1.40 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5104/">CVE-2016-5104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489216" comment="imobiledevice-tools-1.2.0+git20180427.26373b3-1.40 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109968" version="1" class="patch">
	<metadata>
		<title>kernel-default-extra-5.3.18-22.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-1000251" ref_url="https://www.suse.com/security/cve/CVE-2017-1000251/" source="CVE"/>
		<reference ref_id="CVE-2017-12153" ref_url="https://www.suse.com/security/cve/CVE-2017-12153/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-14051" ref_url="https://www.suse.com/security/cve/CVE-2017-14051/" source="CVE"/>
		<reference ref_id="CVE-2017-16536" ref_url="https://www.suse.com/security/cve/CVE-2017-16536/" source="CVE"/>
		<reference ref_id="CVE-2017-16537" ref_url="https://www.suse.com/security/cve/CVE-2017-16537/" source="CVE"/>
		<reference ref_id="CVE-2017-16646" ref_url="https://www.suse.com/security/cve/CVE-2017-16646/" source="CVE"/>
		<reference ref_id="CVE-2017-16648" ref_url="https://www.suse.com/security/cve/CVE-2017-16648/" source="CVE"/>
		<reference ref_id="CVE-2017-5715" ref_url="https://www.suse.com/security/cve/CVE-2017-5715/" source="CVE"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="CVE-2017-5754" ref_url="https://www.suse.com/security/cve/CVE-2017-5754/" source="CVE"/>
		<reference ref_id="CVE-2018-10323" ref_url="https://www.suse.com/security/cve/CVE-2018-10323/" source="CVE"/>
		<reference ref_id="CVE-2018-12232" ref_url="https://www.suse.com/security/cve/CVE-2018-12232/" source="CVE"/>
		<reference ref_id="CVE-2018-13053" ref_url="https://www.suse.com/security/cve/CVE-2018-13053/" source="CVE"/>
		<reference ref_id="CVE-2018-20669" ref_url="https://www.suse.com/security/cve/CVE-2018-20669/" source="CVE"/>
		<reference ref_id="CVE-2019-0154" ref_url="https://www.suse.com/security/cve/CVE-2019-0154/" source="CVE"/>
		<reference ref_id="CVE-2019-0155" ref_url="https://www.suse.com/security/cve/CVE-2019-0155/" source="CVE"/>
		<reference ref_id="CVE-2019-10220" ref_url="https://www.suse.com/security/cve/CVE-2019-10220/" source="CVE"/>
		<reference ref_id="CVE-2019-11477" ref_url="https://www.suse.com/security/cve/CVE-2019-11477/" source="CVE"/>
		<reference ref_id="CVE-2019-11478" ref_url="https://www.suse.com/security/cve/CVE-2019-11478/" source="CVE"/>
		<reference ref_id="CVE-2019-11479" ref_url="https://www.suse.com/security/cve/CVE-2019-11479/" source="CVE"/>
		<reference ref_id="CVE-2019-14615" ref_url="https://www.suse.com/security/cve/CVE-2019-14615/" source="CVE"/>
		<reference ref_id="CVE-2019-14814" ref_url="https://www.suse.com/security/cve/CVE-2019-14814/" source="CVE"/>
		<reference ref_id="CVE-2019-14815" ref_url="https://www.suse.com/security/cve/CVE-2019-14815/" source="CVE"/>
		<reference ref_id="CVE-2019-14816" ref_url="https://www.suse.com/security/cve/CVE-2019-14816/" source="CVE"/>
		<reference ref_id="CVE-2019-14895" ref_url="https://www.suse.com/security/cve/CVE-2019-14895/" source="CVE"/>
		<reference ref_id="CVE-2019-14896" ref_url="https://www.suse.com/security/cve/CVE-2019-14896/" source="CVE"/>
		<reference ref_id="CVE-2019-14897" ref_url="https://www.suse.com/security/cve/CVE-2019-14897/" source="CVE"/>
		<reference ref_id="CVE-2019-14901" ref_url="https://www.suse.com/security/cve/CVE-2019-14901/" source="CVE"/>
		<reference ref_id="CVE-2019-15030" ref_url="https://www.suse.com/security/cve/CVE-2019-15030/" source="CVE"/>
		<reference ref_id="CVE-2019-15031" ref_url="https://www.suse.com/security/cve/CVE-2019-15031/" source="CVE"/>
		<reference ref_id="CVE-2019-15098" ref_url="https://www.suse.com/security/cve/CVE-2019-15098/" source="CVE"/>
		<reference ref_id="CVE-2019-15099" ref_url="https://www.suse.com/security/cve/CVE-2019-15099/" source="CVE"/>
		<reference ref_id="CVE-2019-15290" ref_url="https://www.suse.com/security/cve/CVE-2019-15290/" source="CVE"/>
		<reference ref_id="CVE-2019-15291" ref_url="https://www.suse.com/security/cve/CVE-2019-15291/" source="CVE"/>
		<reference ref_id="CVE-2019-15504" ref_url="https://www.suse.com/security/cve/CVE-2019-15504/" source="CVE"/>
		<reference ref_id="CVE-2019-16231" ref_url="https://www.suse.com/security/cve/CVE-2019-16231/" source="CVE"/>
		<reference ref_id="CVE-2019-16232" ref_url="https://www.suse.com/security/cve/CVE-2019-16232/" source="CVE"/>
		<reference ref_id="CVE-2019-16233" ref_url="https://www.suse.com/security/cve/CVE-2019-16233/" source="CVE"/>
		<reference ref_id="CVE-2019-16234" ref_url="https://www.suse.com/security/cve/CVE-2019-16234/" source="CVE"/>
		<reference ref_id="CVE-2019-17133" ref_url="https://www.suse.com/security/cve/CVE-2019-17133/" source="CVE"/>
		<reference ref_id="CVE-2019-17666" ref_url="https://www.suse.com/security/cve/CVE-2019-17666/" source="CVE"/>
		<reference ref_id="CVE-2019-18198" ref_url="https://www.suse.com/security/cve/CVE-2019-18198/" source="CVE"/>
		<reference ref_id="CVE-2019-18660" ref_url="https://www.suse.com/security/cve/CVE-2019-18660/" source="CVE"/>
		<reference ref_id="CVE-2019-18683" ref_url="https://www.suse.com/security/cve/CVE-2019-18683/" source="CVE"/>
		<reference ref_id="CVE-2019-18786" ref_url="https://www.suse.com/security/cve/CVE-2019-18786/" source="CVE"/>
		<reference ref_id="CVE-2019-18808" ref_url="https://www.suse.com/security/cve/CVE-2019-18808/" source="CVE"/>
		<reference ref_id="CVE-2019-18809" ref_url="https://www.suse.com/security/cve/CVE-2019-18809/" source="CVE"/>
		<reference ref_id="CVE-2019-18811" ref_url="https://www.suse.com/security/cve/CVE-2019-18811/" source="CVE"/>
		<reference ref_id="CVE-2019-18812" ref_url="https://www.suse.com/security/cve/CVE-2019-18812/" source="CVE"/>
		<reference ref_id="CVE-2019-18813" ref_url="https://www.suse.com/security/cve/CVE-2019-18813/" source="CVE"/>
		<reference ref_id="CVE-2019-19037" ref_url="https://www.suse.com/security/cve/CVE-2019-19037/" source="CVE"/>
		<reference ref_id="CVE-2019-19043" ref_url="https://www.suse.com/security/cve/CVE-2019-19043/" source="CVE"/>
		<reference ref_id="CVE-2019-19044" ref_url="https://www.suse.com/security/cve/CVE-2019-19044/" source="CVE"/>
		<reference ref_id="CVE-2019-19045" ref_url="https://www.suse.com/security/cve/CVE-2019-19045/" source="CVE"/>
		<reference ref_id="CVE-2019-19046" ref_url="https://www.suse.com/security/cve/CVE-2019-19046/" source="CVE"/>
		<reference ref_id="CVE-2019-19047" ref_url="https://www.suse.com/security/cve/CVE-2019-19047/" source="CVE"/>
		<reference ref_id="CVE-2019-19048" ref_url="https://www.suse.com/security/cve/CVE-2019-19048/" source="CVE"/>
		<reference ref_id="CVE-2019-19049" ref_url="https://www.suse.com/security/cve/CVE-2019-19049/" source="CVE"/>
		<reference ref_id="CVE-2019-19050" ref_url="https://www.suse.com/security/cve/CVE-2019-19050/" source="CVE"/>
		<reference ref_id="CVE-2019-19051" ref_url="https://www.suse.com/security/cve/CVE-2019-19051/" source="CVE"/>
		<reference ref_id="CVE-2019-19052" ref_url="https://www.suse.com/security/cve/CVE-2019-19052/" source="CVE"/>
		<reference ref_id="CVE-2019-19053" ref_url="https://www.suse.com/security/cve/CVE-2019-19053/" source="CVE"/>
		<reference ref_id="CVE-2019-19054" ref_url="https://www.suse.com/security/cve/CVE-2019-19054/" source="CVE"/>
		<reference ref_id="CVE-2019-19055" ref_url="https://www.suse.com/security/cve/CVE-2019-19055/" source="CVE"/>
		<reference ref_id="CVE-2019-19056" ref_url="https://www.suse.com/security/cve/CVE-2019-19056/" source="CVE"/>
		<reference ref_id="CVE-2019-19057" ref_url="https://www.suse.com/security/cve/CVE-2019-19057/" source="CVE"/>
		<reference ref_id="CVE-2019-19058" ref_url="https://www.suse.com/security/cve/CVE-2019-19058/" source="CVE"/>
		<reference ref_id="CVE-2019-19060" ref_url="https://www.suse.com/security/cve/CVE-2019-19060/" source="CVE"/>
		<reference ref_id="CVE-2019-19061" ref_url="https://www.suse.com/security/cve/CVE-2019-19061/" source="CVE"/>
		<reference ref_id="CVE-2019-19062" ref_url="https://www.suse.com/security/cve/CVE-2019-19062/" source="CVE"/>
		<reference ref_id="CVE-2019-19063" ref_url="https://www.suse.com/security/cve/CVE-2019-19063/" source="CVE"/>
		<reference ref_id="CVE-2019-19064" ref_url="https://www.suse.com/security/cve/CVE-2019-19064/" source="CVE"/>
		<reference ref_id="CVE-2019-19065" ref_url="https://www.suse.com/security/cve/CVE-2019-19065/" source="CVE"/>
		<reference ref_id="CVE-2019-19066" ref_url="https://www.suse.com/security/cve/CVE-2019-19066/" source="CVE"/>
		<reference ref_id="CVE-2019-19067" ref_url="https://www.suse.com/security/cve/CVE-2019-19067/" source="CVE"/>
		<reference ref_id="CVE-2019-19068" ref_url="https://www.suse.com/security/cve/CVE-2019-19068/" source="CVE"/>
		<reference ref_id="CVE-2019-19069" ref_url="https://www.suse.com/security/cve/CVE-2019-19069/" source="CVE"/>
		<reference ref_id="CVE-2019-19070" ref_url="https://www.suse.com/security/cve/CVE-2019-19070/" source="CVE"/>
		<reference ref_id="CVE-2019-19071" ref_url="https://www.suse.com/security/cve/CVE-2019-19071/" source="CVE"/>
		<reference ref_id="CVE-2019-19072" ref_url="https://www.suse.com/security/cve/CVE-2019-19072/" source="CVE"/>
		<reference ref_id="CVE-2019-19073" ref_url="https://www.suse.com/security/cve/CVE-2019-19073/" source="CVE"/>
		<reference ref_id="CVE-2019-19074" ref_url="https://www.suse.com/security/cve/CVE-2019-19074/" source="CVE"/>
		<reference ref_id="CVE-2019-19075" ref_url="https://www.suse.com/security/cve/CVE-2019-19075/" source="CVE"/>
		<reference ref_id="CVE-2019-19077" ref_url="https://www.suse.com/security/cve/CVE-2019-19077/" source="CVE"/>
		<reference ref_id="CVE-2019-19078" ref_url="https://www.suse.com/security/cve/CVE-2019-19078/" source="CVE"/>
		<reference ref_id="CVE-2019-19080" ref_url="https://www.suse.com/security/cve/CVE-2019-19080/" source="CVE"/>
		<reference ref_id="CVE-2019-19081" ref_url="https://www.suse.com/security/cve/CVE-2019-19081/" source="CVE"/>
		<reference ref_id="CVE-2019-19082" ref_url="https://www.suse.com/security/cve/CVE-2019-19082/" source="CVE"/>
		<reference ref_id="CVE-2019-19083" ref_url="https://www.suse.com/security/cve/CVE-2019-19083/" source="CVE"/>
		<reference ref_id="CVE-2019-19241" ref_url="https://www.suse.com/security/cve/CVE-2019-19241/" source="CVE"/>
		<reference ref_id="CVE-2019-19252" ref_url="https://www.suse.com/security/cve/CVE-2019-19252/" source="CVE"/>
		<reference ref_id="CVE-2019-19332" ref_url="https://www.suse.com/security/cve/CVE-2019-19332/" source="CVE"/>
		<reference ref_id="CVE-2019-19338" ref_url="https://www.suse.com/security/cve/CVE-2019-19338/" source="CVE"/>
		<reference ref_id="CVE-2019-19447" ref_url="https://www.suse.com/security/cve/CVE-2019-19447/" source="CVE"/>
		<reference ref_id="CVE-2019-19523" ref_url="https://www.suse.com/security/cve/CVE-2019-19523/" source="CVE"/>
		<reference ref_id="CVE-2019-19524" ref_url="https://www.suse.com/security/cve/CVE-2019-19524/" source="CVE"/>
		<reference ref_id="CVE-2019-19525" ref_url="https://www.suse.com/security/cve/CVE-2019-19525/" source="CVE"/>
		<reference ref_id="CVE-2019-19526" ref_url="https://www.suse.com/security/cve/CVE-2019-19526/" source="CVE"/>
		<reference ref_id="CVE-2019-19528" ref_url="https://www.suse.com/security/cve/CVE-2019-19528/" source="CVE"/>
		<reference ref_id="CVE-2019-19529" ref_url="https://www.suse.com/security/cve/CVE-2019-19529/" source="CVE"/>
		<reference ref_id="CVE-2019-19532" ref_url="https://www.suse.com/security/cve/CVE-2019-19532/" source="CVE"/>
		<reference ref_id="CVE-2019-19533" ref_url="https://www.suse.com/security/cve/CVE-2019-19533/" source="CVE"/>
		<reference ref_id="CVE-2019-19534" ref_url="https://www.suse.com/security/cve/CVE-2019-19534/" source="CVE"/>
		<reference ref_id="CVE-2019-19602" ref_url="https://www.suse.com/security/cve/CVE-2019-19602/" source="CVE"/>
		<reference ref_id="CVE-2019-19767" ref_url="https://www.suse.com/security/cve/CVE-2019-19767/" source="CVE"/>
		<reference ref_id="CVE-2019-19768" ref_url="https://www.suse.com/security/cve/CVE-2019-19768/" source="CVE"/>
		<reference ref_id="CVE-2019-19770" ref_url="https://www.suse.com/security/cve/CVE-2019-19770/" source="CVE"/>
		<reference ref_id="CVE-2019-19807" ref_url="https://www.suse.com/security/cve/CVE-2019-19807/" source="CVE"/>
		<reference ref_id="CVE-2019-19922" ref_url="https://www.suse.com/security/cve/CVE-2019-19922/" source="CVE"/>
		<reference ref_id="CVE-2019-19947" ref_url="https://www.suse.com/security/cve/CVE-2019-19947/" source="CVE"/>
		<reference ref_id="CVE-2019-19965" ref_url="https://www.suse.com/security/cve/CVE-2019-19965/" source="CVE"/>
		<reference ref_id="CVE-2019-20422" ref_url="https://www.suse.com/security/cve/CVE-2019-20422/" source="CVE"/>
		<reference ref_id="CVE-2019-3016" ref_url="https://www.suse.com/security/cve/CVE-2019-3016/" source="CVE"/>
		<reference ref_id="CVE-2019-8912" ref_url="https://www.suse.com/security/cve/CVE-2019-8912/" source="CVE"/>
		<reference ref_id="CVE-2020-0110" ref_url="https://www.suse.com/security/cve/CVE-2020-0110/" source="CVE"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-10690" ref_url="https://www.suse.com/security/cve/CVE-2020-10690/" source="CVE"/>
		<reference ref_id="CVE-2020-10757" ref_url="https://www.suse.com/security/cve/CVE-2020-10757/" source="CVE"/>
		<reference ref_id="CVE-2020-10942" ref_url="https://www.suse.com/security/cve/CVE-2020-10942/" source="CVE"/>
		<reference ref_id="CVE-2020-11494" ref_url="https://www.suse.com/security/cve/CVE-2020-11494/" source="CVE"/>
		<reference ref_id="CVE-2020-11608" ref_url="https://www.suse.com/security/cve/CVE-2020-11608/" source="CVE"/>
		<reference ref_id="CVE-2020-11884" ref_url="https://www.suse.com/security/cve/CVE-2020-11884/" source="CVE"/>
		<reference ref_id="CVE-2020-12464" ref_url="https://www.suse.com/security/cve/CVE-2020-12464/" source="CVE"/>
		<reference ref_id="CVE-2020-12465" ref_url="https://www.suse.com/security/cve/CVE-2020-12465/" source="CVE"/>
		<reference ref_id="CVE-2020-12652" ref_url="https://www.suse.com/security/cve/CVE-2020-12652/" source="CVE"/>
		<reference ref_id="CVE-2020-12653" ref_url="https://www.suse.com/security/cve/CVE-2020-12653/" source="CVE"/>
		<reference ref_id="CVE-2020-12654" ref_url="https://www.suse.com/security/cve/CVE-2020-12654/" source="CVE"/>
		<reference ref_id="CVE-2020-12655" ref_url="https://www.suse.com/security/cve/CVE-2020-12655/" source="CVE"/>
		<reference ref_id="CVE-2020-12657" ref_url="https://www.suse.com/security/cve/CVE-2020-12657/" source="CVE"/>
		<reference ref_id="CVE-2020-12659" ref_url="https://www.suse.com/security/cve/CVE-2020-12659/" source="CVE"/>
		<reference ref_id="CVE-2020-1749" ref_url="https://www.suse.com/security/cve/CVE-2020-1749/" source="CVE"/>
		<reference ref_id="CVE-2020-2732" ref_url="https://www.suse.com/security/cve/CVE-2020-2732/" source="CVE"/>
		<reference ref_id="CVE-2020-8428" ref_url="https://www.suse.com/security/cve/CVE-2020-8428/" source="CVE"/>
		<reference ref_id="CVE-2020-8647" ref_url="https://www.suse.com/security/cve/CVE-2020-8647/" source="CVE"/>
		<reference ref_id="CVE-2020-8648" ref_url="https://www.suse.com/security/cve/CVE-2020-8648/" source="CVE"/>
		<reference ref_id="CVE-2020-8649" ref_url="https://www.suse.com/security/cve/CVE-2020-8649/" source="CVE"/>
		<reference ref_id="CVE-2020-8835" ref_url="https://www.suse.com/security/cve/CVE-2020-8835/" source="CVE"/>
		<reference ref_id="CVE-2020-8992" ref_url="https://www.suse.com/security/cve/CVE-2020-8992/" source="CVE"/>
		<reference ref_id="CVE-2020-9383" ref_url="https://www.suse.com/security/cve/CVE-2020-9383/" source="CVE"/>
		<description>
These are all security issues fixed in the kernel-default-extra-5.3.18-22.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-1000251/">CVE-2017-1000251</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-12153/">CVE-2017-12153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-14051/">CVE-2017-14051</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16536/">CVE-2017-16536</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16537/">CVE-2017-16537</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16646/">CVE-2017-16646</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-16648/">CVE-2017-16648</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5715/">CVE-2017-5715</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5754/">CVE-2017-5754</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10323/">CVE-2018-10323</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-12232/">CVE-2018-12232</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13053/">CVE-2018-13053</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20669/">CVE-2018-20669</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-0154/">CVE-2019-0154</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-0155/">CVE-2019-0155</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-10220/">CVE-2019-10220</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-11477/">CVE-2019-11477</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11478/">CVE-2019-11478</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-11479/">CVE-2019-11479</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-14615/">CVE-2019-14615</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14814/">CVE-2019-14814</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14815/">CVE-2019-14815</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14816/">CVE-2019-14816</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14895/">CVE-2019-14895</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14896/">CVE-2019-14896</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14897/">CVE-2019-14897</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-14901/">CVE-2019-14901</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15030/">CVE-2019-15030</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15031/">CVE-2019-15031</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15098/">CVE-2019-15098</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15099/">CVE-2019-15099</cve>
	<cve impact="moderate" cvss3="5.2/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15290/">CVE-2019-15290</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15291/">CVE-2019-15291</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15504/">CVE-2019-15504</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16231/">CVE-2019-16231</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16232/">CVE-2019-16232</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16233/">CVE-2019-16233</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16234/">CVE-2019-16234</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17133/">CVE-2019-17133</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-17666/">CVE-2019-17666</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18198/">CVE-2019-18198</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18660/">CVE-2019-18660</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18683/">CVE-2019-18683</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-18786/">CVE-2019-18786</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18808/">CVE-2019-18808</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18809/">CVE-2019-18809</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18811/">CVE-2019-18811</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18812/">CVE-2019-18812</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-18813/">CVE-2019-18813</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19037/">CVE-2019-19037</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19043/">CVE-2019-19043</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19044/">CVE-2019-19044</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19045/">CVE-2019-19045</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19046/">CVE-2019-19046</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19047/">CVE-2019-19047</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-19048/">CVE-2019-19048</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19049/">CVE-2019-19049</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19050/">CVE-2019-19050</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19051/">CVE-2019-19051</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19052/">CVE-2019-19052</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19053/">CVE-2019-19053</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19054/">CVE-2019-19054</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19055/">CVE-2019-19055</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19056/">CVE-2019-19056</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19057/">CVE-2019-19057</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19058/">CVE-2019-19058</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19060/">CVE-2019-19060</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19061/">CVE-2019-19061</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19062/">CVE-2019-19062</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19063/">CVE-2019-19063</cve>
	<cve impact="moderate" cvss3="1.6/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19064/">CVE-2019-19064</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19065/">CVE-2019-19065</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19066/">CVE-2019-19066</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19067/">CVE-2019-19067</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19068/">CVE-2019-19068</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19069/">CVE-2019-19069</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19070/">CVE-2019-19070</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19071/">CVE-2019-19071</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19072/">CVE-2019-19072</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19073/">CVE-2019-19073</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19074/">CVE-2019-19074</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19075/">CVE-2019-19075</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19077/">CVE-2019-19077</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19078/">CVE-2019-19078</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19080/">CVE-2019-19080</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19081/">CVE-2019-19081</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19082/">CVE-2019-19082</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19083/">CVE-2019-19083</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19241/">CVE-2019-19241</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19252/">CVE-2019-19252</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19332/">CVE-2019-19332</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19338/">CVE-2019-19338</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19447/">CVE-2019-19447</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19523/">CVE-2019-19523</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19524/">CVE-2019-19524</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19525/">CVE-2019-19525</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19526/">CVE-2019-19526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19528/">CVE-2019-19528</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19529/">CVE-2019-19529</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-19532/">CVE-2019-19532</cve>
	<cve impact="moderate" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19533/">CVE-2019-19533</cve>
	<cve impact="low" cvss3="2.4/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19534/">CVE-2019-19534</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19602/">CVE-2019-19602</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19767/">CVE-2019-19767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19768/">CVE-2019-19768</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19770/">CVE-2019-19770</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19807/">CVE-2019-19807</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19922/">CVE-2019-19922</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19947/">CVE-2019-19947</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19965/">CVE-2019-19965</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20422/">CVE-2019-20422</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-3016/">CVE-2019-3016</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8912/">CVE-2019-8912</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0110/">CVE-2020-0110</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10690/">CVE-2020-10690</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10757/">CVE-2020-10757</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10942/">CVE-2020-10942</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11494/">CVE-2020-11494</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11608/">CVE-2020-11608</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11884/">CVE-2020-11884</cve>
	<cve impact="low" cvss3="1.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12464/">CVE-2020-12464</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12465/">CVE-2020-12465</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12652/">CVE-2020-12652</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12653/">CVE-2020-12653</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12654/">CVE-2020-12654</cve>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12655/">CVE-2020-12655</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12657/">CVE-2020-12657</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12659/">CVE-2020-12659</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-1749/">CVE-2020-1749</cve>
	<cve impact="moderate" cvss3="3.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-2732/">CVE-2020-2732</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8428/">CVE-2020-8428</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8647/">CVE-2020-8647</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8648/">CVE-2020-8648</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8649/">CVE-2020-8649</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8835/">CVE-2020-8835</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8992/">CVE-2020-8992</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9383/">CVE-2020-9383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489217" comment="kernel-default-extra-5.3.18-22.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109969" version="1" class="patch">
	<metadata>
		<title>libavcodec-devel-3.4.2-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-8216" ref_url="https://www.suse.com/security/cve/CVE-2015-8216/" source="CVE"/>
		<reference ref_id="CVE-2015-8217" ref_url="https://www.suse.com/security/cve/CVE-2015-8217/" source="CVE"/>
		<reference ref_id="CVE-2015-8218" ref_url="https://www.suse.com/security/cve/CVE-2015-8218/" source="CVE"/>
		<reference ref_id="CVE-2015-8219" ref_url="https://www.suse.com/security/cve/CVE-2015-8219/" source="CVE"/>
		<reference ref_id="CVE-2015-8363" ref_url="https://www.suse.com/security/cve/CVE-2015-8363/" source="CVE"/>
		<reference ref_id="CVE-2015-8364" ref_url="https://www.suse.com/security/cve/CVE-2015-8364/" source="CVE"/>
		<reference ref_id="CVE-2015-8365" ref_url="https://www.suse.com/security/cve/CVE-2015-8365/" source="CVE"/>
		<reference ref_id="CVE-2015-8661" ref_url="https://www.suse.com/security/cve/CVE-2015-8661/" source="CVE"/>
		<reference ref_id="CVE-2015-8662" ref_url="https://www.suse.com/security/cve/CVE-2015-8662/" source="CVE"/>
		<reference ref_id="CVE-2015-8663" ref_url="https://www.suse.com/security/cve/CVE-2015-8663/" source="CVE"/>
		<reference ref_id="CVE-2016-10190" ref_url="https://www.suse.com/security/cve/CVE-2016-10190/" source="CVE"/>
		<reference ref_id="CVE-2016-10191" ref_url="https://www.suse.com/security/cve/CVE-2016-10191/" source="CVE"/>
		<reference ref_id="CVE-2016-10192" ref_url="https://www.suse.com/security/cve/CVE-2016-10192/" source="CVE"/>
		<reference ref_id="CVE-2016-1897" ref_url="https://www.suse.com/security/cve/CVE-2016-1897/" source="CVE"/>
		<reference ref_id="CVE-2016-1898" ref_url="https://www.suse.com/security/cve/CVE-2016-1898/" source="CVE"/>
		<reference ref_id="CVE-2017-11399" ref_url="https://www.suse.com/security/cve/CVE-2017-11399/" source="CVE"/>
		<reference ref_id="CVE-2017-11665" ref_url="https://www.suse.com/security/cve/CVE-2017-11665/" source="CVE"/>
		<reference ref_id="CVE-2017-14054" ref_url="https://www.suse.com/security/cve/CVE-2017-14054/" source="CVE"/>
		<reference ref_id="CVE-2017-14055" ref_url="https://www.suse.com/security/cve/CVE-2017-14055/" source="CVE"/>
		<reference ref_id="CVE-2017-14056" ref_url="https://www.suse.com/security/cve/CVE-2017-14056/" source="CVE"/>
		<reference ref_id="CVE-2017-14057" ref_url="https://www.suse.com/security/cve/CVE-2017-14057/" source="CVE"/>
		<reference ref_id="CVE-2017-14058" ref_url="https://www.suse.com/security/cve/CVE-2017-14058/" source="CVE"/>
		<reference ref_id="CVE-2017-14059" ref_url="https://www.suse.com/security/cve/CVE-2017-14059/" source="CVE"/>
		<reference ref_id="CVE-2017-14169" ref_url="https://www.suse.com/security/cve/CVE-2017-14169/" source="CVE"/>
		<reference ref_id="CVE-2017-14170" ref_url="https://www.suse.com/security/cve/CVE-2017-14170/" source="CVE"/>
		<reference ref_id="CVE-2017-14171" ref_url="https://www.suse.com/security/cve/CVE-2017-14171/" source="CVE"/>
		<reference ref_id="CVE-2017-14222" ref_url="https://www.suse.com/security/cve/CVE-2017-14222/" source="CVE"/>
		<reference ref_id="CVE-2017-14223" ref_url="https://www.suse.com/security/cve/CVE-2017-14223/" source="CVE"/>
		<reference ref_id="CVE-2017-14225" ref_url="https://www.suse.com/security/cve/CVE-2017-14225/" source="CVE"/>
		<reference ref_id="CVE-2017-15186" ref_url="https://www.suse.com/security/cve/CVE-2017-15186/" source="CVE"/>
		<reference ref_id="CVE-2017-15672" ref_url="https://www.suse.com/security/cve/CVE-2017-15672/" source="CVE"/>
		<reference ref_id="CVE-2017-16840" ref_url="https://www.suse.com/security/cve/CVE-2017-16840/" source="CVE"/>
		<reference ref_id="CVE-2017-17081" ref_url="https://www.suse.com/security/cve/CVE-2017-17081/" source="CVE"/>
		<reference ref_id="CVE-2017-17555" ref_url="https://www.suse.com/security/cve/CVE-2017-17555/" source="CVE"/>
		<reference ref_id="CVE-2017-7859" ref_url="https://www.suse.com/security/cve/CVE-2017-7859/" source="CVE"/>
		<reference ref_id="CVE-2017-7862" ref_url="https://www.suse.com/security/cve/CVE-2017-7862/" source="CVE"/>
		<reference ref_id="CVE-2017-7863" ref_url="https://www.suse.com/security/cve/CVE-2017-7863/" source="CVE"/>
		<reference ref_id="CVE-2017-7865" ref_url="https://www.suse.com/security/cve/CVE-2017-7865/" source="CVE"/>
		<reference ref_id="CVE-2017-7866" ref_url="https://www.suse.com/security/cve/CVE-2017-7866/" source="CVE"/>
		<reference ref_id="CVE-2018-12458" ref_url="https://www.suse.com/security/cve/CVE-2018-12458/" source="CVE"/>
		<reference ref_id="CVE-2018-13300" ref_url="https://www.suse.com/security/cve/CVE-2018-13300/" source="CVE"/>
		<reference ref_id="CVE-2018-13301" ref_url="https://www.suse.com/security/cve/CVE-2018-13301/" source="CVE"/>
		<reference ref_id="CVE-2018-13302" ref_url="https://www.suse.com/security/cve/CVE-2018-13302/" source="CVE"/>
		<reference ref_id="CVE-2018-13305" ref_url="https://www.suse.com/security/cve/CVE-2018-13305/" source="CVE"/>
		<reference ref_id="CVE-2018-14394" ref_url="https://www.suse.com/security/cve/CVE-2018-14394/" source="CVE"/>
		<reference ref_id="CVE-2018-14395" ref_url="https://www.suse.com/security/cve/CVE-2018-14395/" source="CVE"/>
		<reference ref_id="CVE-2018-15822" ref_url="https://www.suse.com/security/cve/CVE-2018-15822/" source="CVE"/>
		<reference ref_id="CVE-2018-1999010" ref_url="https://www.suse.com/security/cve/CVE-2018-1999010/" source="CVE"/>
		<reference ref_id="CVE-2018-1999011" ref_url="https://www.suse.com/security/cve/CVE-2018-1999011/" source="CVE"/>
		<reference ref_id="CVE-2018-1999012" ref_url="https://www.suse.com/security/cve/CVE-2018-1999012/" source="CVE"/>
		<reference ref_id="CVE-2018-1999013" ref_url="https://www.suse.com/security/cve/CVE-2018-1999013/" source="CVE"/>
		<reference ref_id="CVE-2018-6392" ref_url="https://www.suse.com/security/cve/CVE-2018-6392/" source="CVE"/>
		<reference ref_id="CVE-2018-6621" ref_url="https://www.suse.com/security/cve/CVE-2018-6621/" source="CVE"/>
		<reference ref_id="CVE-2019-12730" ref_url="https://www.suse.com/security/cve/CVE-2019-12730/" source="CVE"/>
		<reference ref_id="CVE-2019-17542" ref_url="https://www.suse.com/security/cve/CVE-2019-17542/" source="CVE"/>
		<reference ref_id="CVE-2019-9718" ref_url="https://www.suse.com/security/cve/CVE-2019-9718/" source="CVE"/>
		<description>
These are all security issues fixed in the libavcodec-devel-3.4.2-9.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8216/">CVE-2015-8216</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8217/">CVE-2015-8217</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8218/">CVE-2015-8218</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8219/">CVE-2015-8219</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8363/">CVE-2015-8363</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8364/">CVE-2015-8364</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8365/">CVE-2015-8365</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8661/">CVE-2015-8661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8662/">CVE-2015-8662</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8663/">CVE-2015-8663</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10190/">CVE-2016-10190</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10191/">CVE-2016-10191</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2016-10192/">CVE-2016-10192</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1897/">CVE-2016-1897</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-1898/">CVE-2016-1898</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11399/">CVE-2017-11399</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-11665/">CVE-2017-11665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14054/">CVE-2017-14054</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14055/">CVE-2017-14055</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14056/">CVE-2017-14056</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14057/">CVE-2017-14057</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14058/">CVE-2017-14058</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14059/">CVE-2017-14059</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14169/">CVE-2017-14169</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14170/">CVE-2017-14170</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14171/">CVE-2017-14171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14222/">CVE-2017-14222</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-14223/">CVE-2017-14223</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-14225/">CVE-2017-14225</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15186/">CVE-2017-15186</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-15672/">CVE-2017-15672</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2017-16840/">CVE-2017-16840</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17081/">CVE-2017-17081</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-17555/">CVE-2017-17555</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7859/">CVE-2017-7859</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7862/">CVE-2017-7862</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7863/">CVE-2017-7863</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7865/">CVE-2017-7865</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-7866/">CVE-2017-7866</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-12458/">CVE-2018-12458</cve>
	<cve impact="low" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13300/">CVE-2018-13300</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-13301/">CVE-2018-13301</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13302/">CVE-2018-13302</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13305/">CVE-2018-13305</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14394/">CVE-2018-14394</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14395/">CVE-2018-14395</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15822/">CVE-2018-15822</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999010/">CVE-2018-1999010</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999011/">CVE-2018-1999011</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999012/">CVE-2018-1999012</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1999013/">CVE-2018-1999013</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6392/">CVE-2018-6392</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6621/">CVE-2018-6621</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-12730/">CVE-2019-12730</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17542/">CVE-2019-17542</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9718/">CVE-2019-9718</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489218" comment="libavcodec-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489219" comment="libavformat-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489220" comment="libavresample-devel-3.4.2-9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489221" comment="libavresample3-3.4.2-9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109970" version="1" class="patch">
	<metadata>
		<title>libgadu-devel-1.12.2-1.44 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-6487" ref_url="https://www.suse.com/security/cve/CVE-2013-6487/" source="CVE"/>
		<reference ref_id="CVE-2014-3775" ref_url="https://www.suse.com/security/cve/CVE-2014-3775/" source="CVE"/>
		<description>
These are all security issues fixed in the libgadu-devel-1.12.2-1.44 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-6487/">CVE-2013-6487</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3775/">CVE-2014-3775</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488922" comment="libgadu-devel-1.12.2-1.44 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488923" comment="libgadu3-1.12.2-1.44 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109971" version="1" class="patch">
	<metadata>
		<title>libical-glib-devel-3.0.6-2.70 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-5824" ref_url="https://www.suse.com/security/cve/CVE-2016-5824/" source="CVE"/>
		<reference ref_id="CVE-2016-5827" ref_url="https://www.suse.com/security/cve/CVE-2016-5827/" source="CVE"/>
		<reference ref_id="CVE-2016-9584" ref_url="https://www.suse.com/security/cve/CVE-2016-9584/" source="CVE"/>
		<description>
These are all security issues fixed in the libical-glib-devel-3.0.6-2.70 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5824/">CVE-2016-5824</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-5827/">CVE-2016-5827</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9584/">CVE-2016-9584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489222" comment="libical-glib-devel-3.0.6-2.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489223" comment="libical-glib3-3.0.6-2.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489224" comment="typelib-1_0-ICal-3_0-3.0.6-2.70 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489225" comment="typelib-1_0-ICalGLib-3_0-3.0.6-2.70 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109972" version="1" class="patch">
	<metadata>
		<title>libmwaw-0_3-3-0.3.15-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-9433" ref_url="https://www.suse.com/security/cve/CVE-2017-9433/" source="CVE"/>
		<description>
These are all security issues fixed in the libmwaw-0_3-3-0.3.15-4.6.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9433/">CVE-2017-9433</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489226" comment="libmwaw-0_3-3-0.3.15-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109973" version="1" class="patch">
	<metadata>
		<title>libntfs-3g-devel-2016.2.22-3.5.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<description>
These are all security issues fixed in the libntfs-3g-devel-2016.2.22-3.5.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489227" comment="libntfs-3g-devel-2016.2.22-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489228" comment="libntfs-3g87-2016.2.22-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489229" comment="ntfs-3g-2016.2.22-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489230" comment="ntfsprogs-2016.2.22-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109974" version="1" class="patch">
	<metadata>
		<title>libopencv3_3-3.3.1-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-18009" ref_url="https://www.suse.com/security/cve/CVE-2017-18009/" source="CVE"/>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-14492" ref_url="https://www.suse.com/security/cve/CVE-2019-14492/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<description>
These are all security issues fixed in the libopencv3_3-3.3.1-6.6.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-18009/">CVE-2017-18009</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14492/">CVE-2019-14492</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489231" comment="libopencv3_3-3.3.1-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489232" comment="opencv-3.3.1-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489233" comment="opencv-devel-3.3.1-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109975" version="1" class="patch">
	<metadata>
		<title>libotr-devel-4.1.1-2.3 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2016-2851" ref_url="https://www.suse.com/security/cve/CVE-2016-2851/" source="CVE"/>
		<description>
These are all security issues fixed in the libotr-devel-4.1.1-2.3 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2851/">CVE-2016-2851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488928" comment="libotr-devel-4.1.1-2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488929" comment="libotr5-4.1.1-2.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109976" version="1" class="patch">
	<metadata>
		<title>libpoppler73-0.62.0-2.33 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2009-0799" ref_url="https://www.suse.com/security/cve/CVE-2009-0799/" source="CVE"/>
		<reference ref_id="CVE-2009-0800" ref_url="https://www.suse.com/security/cve/CVE-2009-0800/" source="CVE"/>
		<reference ref_id="CVE-2009-1179" ref_url="https://www.suse.com/security/cve/CVE-2009-1179/" source="CVE"/>
		<reference ref_id="CVE-2009-1180" ref_url="https://www.suse.com/security/cve/CVE-2009-1180/" source="CVE"/>
		<reference ref_id="CVE-2009-1181" ref_url="https://www.suse.com/security/cve/CVE-2009-1181/" source="CVE"/>
		<reference ref_id="CVE-2009-1182" ref_url="https://www.suse.com/security/cve/CVE-2009-1182/" source="CVE"/>
		<reference ref_id="CVE-2009-1183" ref_url="https://www.suse.com/security/cve/CVE-2009-1183/" source="CVE"/>
		<reference ref_id="CVE-2009-1187" ref_url="https://www.suse.com/security/cve/CVE-2009-1187/" source="CVE"/>
		<reference ref_id="CVE-2009-1188" ref_url="https://www.suse.com/security/cve/CVE-2009-1188/" source="CVE"/>
		<reference ref_id="CVE-2009-3607" ref_url="https://www.suse.com/security/cve/CVE-2009-3607/" source="CVE"/>
		<reference ref_id="CVE-2009-3608" ref_url="https://www.suse.com/security/cve/CVE-2009-3608/" source="CVE"/>
		<reference ref_id="CVE-2013-1788" ref_url="https://www.suse.com/security/cve/CVE-2013-1788/" source="CVE"/>
		<reference ref_id="CVE-2013-1789" ref_url="https://www.suse.com/security/cve/CVE-2013-1789/" source="CVE"/>
		<reference ref_id="CVE-2013-1790" ref_url="https://www.suse.com/security/cve/CVE-2013-1790/" source="CVE"/>
		<reference ref_id="CVE-2013-4473" ref_url="https://www.suse.com/security/cve/CVE-2013-4473/" source="CVE"/>
		<reference ref_id="CVE-2013-4474" ref_url="https://www.suse.com/security/cve/CVE-2013-4474/" source="CVE"/>
		<reference ref_id="CVE-2017-14517" ref_url="https://www.suse.com/security/cve/CVE-2017-14517/" source="CVE"/>
		<reference ref_id="CVE-2017-14518" ref_url="https://www.suse.com/security/cve/CVE-2017-14518/" source="CVE"/>
		<reference ref_id="CVE-2017-7511" ref_url="https://www.suse.com/security/cve/CVE-2017-7511/" source="CVE"/>
		<reference ref_id="CVE-2017-7515" ref_url="https://www.suse.com/security/cve/CVE-2017-7515/" source="CVE"/>
		<description>
These are all security issues fixed in the libpoppler73-0.62.0-2.33 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-0799/">CVE-2009-0799</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-0800/">CVE-2009-0800</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1179/">CVE-2009-1179</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1180/">CVE-2009-1180</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1181/">CVE-2009-1181</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2009-1182/">CVE-2009-1182</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1183/">CVE-2009-1183</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1187/">CVE-2009-1187</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-1188/">CVE-2009-1188</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2009-3607/">CVE-2009-3607</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2009-3608/">CVE-2009-3608</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1788/">CVE-2013-1788</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1789/">CVE-2013-1789</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-1790/">CVE-2013-1790</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4473/">CVE-2013-4473</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-4474/">CVE-2013-4474</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14517/">CVE-2017-14517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14518/">CVE-2017-14518</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7511/">CVE-2017-7511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7515/">CVE-2017-7515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009480686" comment="libpoppler73-0.62.0-2.33 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109977" version="1" class="patch">
	<metadata>
		<title>libproxy1-config-gnome3-0.4.15-2.42 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-4504" ref_url="https://www.suse.com/security/cve/CVE-2012-4504/" source="CVE"/>
		<description>
These are all security issues fixed in the libproxy1-config-gnome3-0.4.15-2.42 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-4504/">CVE-2012-4504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488930" comment="libproxy1-config-gnome3-0.4.15-2.42 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488931" comment="libproxy1-networkmanager-0.4.15-2.42 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109978" version="1" class="patch">
	<metadata>
		<title>libpskc-devel-2.6.2-1.15 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-7322" ref_url="https://www.suse.com/security/cve/CVE-2013-7322/" source="CVE"/>
		<description>
These are all security issues fixed in the libpskc-devel-2.6.2-1.15 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-7322/">CVE-2013-7322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009488932" comment="libpskc-devel-2.6.2-1.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009488933" comment="libpskc0-2.6.2-1.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109979" version="1" class="patch">
	<metadata>
		<title>libpurple-2.13.0-10.105 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3694" ref_url="https://www.suse.com/security/cve/CVE-2014-3694/" source="CVE"/>
		<reference ref_id="CVE-2014-3695" ref_url="https://www.suse.com/security/cve/CVE-2014-3695/" source="CVE"/>
		<reference ref_id="CVE-2014-3696" ref_url="https://www.suse.com/security/cve/CVE-2014-3696/" source="CVE"/>
		<reference ref_id="CVE-2014-3697" ref_url="https://www.suse.com/security/cve/CVE-2014-3697/" source="CVE"/>
		<reference ref_id="CVE-2014-3698" ref_url="https://www.suse.com/security/cve/CVE-2014-3698/" source="CVE"/>
		<reference ref_id="CVE-2017-2640" ref_url="https://www.suse.com/security/cve/CVE-2017-2640/" source="CVE"/>
		<description>
These are all security issues fixed in the libpurple-2.13.0-10.105 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3694/">CVE-2014-3694</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3695/">CVE-2014-3695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3696/">CVE-2014-3696</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3697/">CVE-2014-3697</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3698/">CVE-2014-3698</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-2640/">CVE-2017-2640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489234" comment="libpurple-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489235" comment="libpurple-branding-upstream-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489236" comment="libpurple-devel-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489237" comment="libpurple-lang-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489238" comment="libpurple-plugin-sametime-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489239" comment="pidgin-2.13.0-10.105 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489240" comment="pidgin-devel-2.13.0-10.105 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109980" version="1" class="patch">
	<metadata>
		<title>libraw-devel-0.18.9-3.8.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2013-2126" ref_url="https://www.suse.com/security/cve/CVE-2013-2126/" source="CVE"/>
		<reference ref_id="CVE-2013-2127" ref_url="https://www.suse.com/security/cve/CVE-2013-2127/" source="CVE"/>
		<reference ref_id="CVE-2015-8367" ref_url="https://www.suse.com/security/cve/CVE-2015-8367/" source="CVE"/>
		<reference ref_id="CVE-2017-13735" ref_url="https://www.suse.com/security/cve/CVE-2017-13735/" source="CVE"/>
		<reference ref_id="CVE-2017-14265" ref_url="https://www.suse.com/security/cve/CVE-2017-14265/" source="CVE"/>
		<reference ref_id="CVE-2017-14348" ref_url="https://www.suse.com/security/cve/CVE-2017-14348/" source="CVE"/>
		<reference ref_id="CVE-2017-6886" ref_url="https://www.suse.com/security/cve/CVE-2017-6886/" source="CVE"/>
		<reference ref_id="CVE-2017-6887" ref_url="https://www.suse.com/security/cve/CVE-2017-6887/" source="CVE"/>
		<reference ref_id="CVE-2017-6890" ref_url="https://www.suse.com/security/cve/CVE-2017-6890/" source="CVE"/>
		<reference ref_id="CVE-2017-6899" ref_url="https://www.suse.com/security/cve/CVE-2017-6899/" source="CVE"/>
		<reference ref_id="CVE-2018-10528" ref_url="https://www.suse.com/security/cve/CVE-2018-10528/" source="CVE"/>
		<reference ref_id="CVE-2018-10529" ref_url="https://www.suse.com/security/cve/CVE-2018-10529/" source="CVE"/>
		<reference ref_id="CVE-2018-20337" ref_url="https://www.suse.com/security/cve/CVE-2018-20337/" source="CVE"/>
		<reference ref_id="CVE-2018-20363" ref_url="https://www.suse.com/security/cve/CVE-2018-20363/" source="CVE"/>
		<reference ref_id="CVE-2018-20364" ref_url="https://www.suse.com/security/cve/CVE-2018-20364/" source="CVE"/>
		<reference ref_id="CVE-2018-20365" ref_url="https://www.suse.com/security/cve/CVE-2018-20365/" source="CVE"/>
		<reference ref_id="CVE-2018-5813" ref_url="https://www.suse.com/security/cve/CVE-2018-5813/" source="CVE"/>
		<reference ref_id="CVE-2018-5815" ref_url="https://www.suse.com/security/cve/CVE-2018-5815/" source="CVE"/>
		<reference ref_id="CVE-2018-5816" ref_url="https://www.suse.com/security/cve/CVE-2018-5816/" source="CVE"/>
		<reference ref_id="CVE-2018-5817" ref_url="https://www.suse.com/security/cve/CVE-2018-5817/" source="CVE"/>
		<reference ref_id="CVE-2018-5818" ref_url="https://www.suse.com/security/cve/CVE-2018-5818/" source="CVE"/>
		<reference ref_id="CVE-2018-5819" ref_url="https://www.suse.com/security/cve/CVE-2018-5819/" source="CVE"/>
		<description>
These are all security issues fixed in the libraw-devel-0.18.9-3.8.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2126/">CVE-2013-2126</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2013-2127/">CVE-2013-2127</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-8367/">CVE-2015-8367</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-13735/">CVE-2017-13735</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14265/">CVE-2017-14265</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14348/">CVE-2017-14348</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6886/">CVE-2017-6886</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6887/">CVE-2017-6887</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-6890/">CVE-2017-6890</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-6899/">CVE-2017-6899</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10528/">CVE-2018-10528</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-10529/">CVE-2018-10529</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20337/">CVE-2018-20337</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20363/">CVE-2018-20363</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20364/">CVE-2018-20364</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-20365/">CVE-2018-20365</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5813/">CVE-2018-5813</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5815/">CVE-2018-5815</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-5816/">CVE-2018-5816</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5817/">CVE-2018-5817</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5818/">CVE-2018-5818</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5819/">CVE-2018-5819</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489076" comment="libraw-devel-0.18.9-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489077" comment="libraw16-0.18.9-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109981" version="1" class="patch">
	<metadata>
		<title>libreoffice-6.4.4.2-11.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-3693" ref_url="https://www.suse.com/security/cve/CVE-2014-3693/" source="CVE"/>
		<reference ref_id="CVE-2014-8146" ref_url="https://www.suse.com/security/cve/CVE-2014-8146/" source="CVE"/>
		<reference ref_id="CVE-2014-8147" ref_url="https://www.suse.com/security/cve/CVE-2014-8147/" source="CVE"/>
		<reference ref_id="CVE-2014-9093" ref_url="https://www.suse.com/security/cve/CVE-2014-9093/" source="CVE"/>
		<reference ref_id="CVE-2015-4551" ref_url="https://www.suse.com/security/cve/CVE-2015-4551/" source="CVE"/>
		<reference ref_id="CVE-2015-5212" ref_url="https://www.suse.com/security/cve/CVE-2015-5212/" source="CVE"/>
		<reference ref_id="CVE-2015-5213" ref_url="https://www.suse.com/security/cve/CVE-2015-5213/" source="CVE"/>
		<reference ref_id="CVE-2015-5214" ref_url="https://www.suse.com/security/cve/CVE-2015-5214/" source="CVE"/>
		<reference ref_id="CVE-2016-0794" ref_url="https://www.suse.com/security/cve/CVE-2016-0794/" source="CVE"/>
		<reference ref_id="CVE-2016-0795" ref_url="https://www.suse.com/security/cve/CVE-2016-0795/" source="CVE"/>
		<reference ref_id="CVE-2016-10327" ref_url="https://www.suse.com/security/cve/CVE-2016-10327/" source="CVE"/>
		<reference ref_id="CVE-2016-4324" ref_url="https://www.suse.com/security/cve/CVE-2016-4324/" source="CVE"/>
		<reference ref_id="CVE-2017-3157" ref_url="https://www.suse.com/security/cve/CVE-2017-3157/" source="CVE"/>
		<reference ref_id="CVE-2017-7870" ref_url="https://www.suse.com/security/cve/CVE-2017-7870/" source="CVE"/>
		<reference ref_id="CVE-2017-7882" ref_url="https://www.suse.com/security/cve/CVE-2017-7882/" source="CVE"/>
		<reference ref_id="CVE-2017-8358" ref_url="https://www.suse.com/security/cve/CVE-2017-8358/" source="CVE"/>
		<reference ref_id="CVE-2018-10119" ref_url="https://www.suse.com/security/cve/CVE-2018-10119/" source="CVE"/>
		<reference ref_id="CVE-2018-10120" ref_url="https://www.suse.com/security/cve/CVE-2018-10120/" source="CVE"/>
		<reference ref_id="CVE-2018-1055" ref_url="https://www.suse.com/security/cve/CVE-2018-1055/" source="CVE"/>
		<reference ref_id="CVE-2018-10583" ref_url="https://www.suse.com/security/cve/CVE-2018-10583/" source="CVE"/>
		<reference ref_id="CVE-2018-16858" ref_url="https://www.suse.com/security/cve/CVE-2018-16858/" source="CVE"/>
		<reference ref_id="CVE-2018-6871" ref_url="https://www.suse.com/security/cve/CVE-2018-6871/" source="CVE"/>
		<reference ref_id="CVE-2019-9848" ref_url="https://www.suse.com/security/cve/CVE-2019-9848/" source="CVE"/>
		<reference ref_id="CVE-2019-9849" ref_url="https://www.suse.com/security/cve/CVE-2019-9849/" source="CVE"/>
		<reference ref_id="CVE-2019-9850" ref_url="https://www.suse.com/security/cve/CVE-2019-9850/" source="CVE"/>
		<reference ref_id="CVE-2019-9851" ref_url="https://www.suse.com/security/cve/CVE-2019-9851/" source="CVE"/>
		<reference ref_id="CVE-2019-9852" ref_url="https://www.suse.com/security/cve/CVE-2019-9852/" source="CVE"/>
		<reference ref_id="CVE-2019-9853" ref_url="https://www.suse.com/security/cve/CVE-2019-9853/" source="CVE"/>
		<reference ref_id="CVE-2019-9854" ref_url="https://www.suse.com/security/cve/CVE-2019-9854/" source="CVE"/>
		<reference ref_id="CVE-2019-9855" ref_url="https://www.suse.com/security/cve/CVE-2019-9855/" source="CVE"/>
		<reference ref_id="CVE-2020-12801" ref_url="https://www.suse.com/security/cve/CVE-2020-12801/" source="CVE"/>
		<description>
These are all security issues fixed in the libreoffice-6.4.4.2-11.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-3693/">CVE-2014-3693</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8146/">CVE-2014-8146</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-8147/">CVE-2014-8147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9093/">CVE-2014-9093</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4551/">CVE-2015-4551</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5212/">CVE-2015-5212</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5213/">CVE-2015-5213</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-5214/">CVE-2015-5214</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0794/">CVE-2016-0794</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-0795/">CVE-2016-0795</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-10327/">CVE-2016-10327</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-4324/">CVE-2016-4324</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-3157/">CVE-2017-3157</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-7870/">CVE-2017-7870</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-7882/">CVE-2017-7882</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-8358/">CVE-2017-8358</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10119/">CVE-2018-10119</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10120/">CVE-2018-10120</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-1055/">CVE-2018-1055</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-10583/">CVE-2018-10583</cve>
	<cve href="https://www.suse.com/security/cve/CVE-2018-16858/">CVE-2018-16858</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-6871/">CVE-2018-6871</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9848/">CVE-2019-9848</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9849/">CVE-2019-9849</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9850/">CVE-2019-9850</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9851/">CVE-2019-9851</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9852/">CVE-2019-9852</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9853/">CVE-2019-9853</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9854/">CVE-2019-9854</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-9855/">CVE-2019-9855</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12801/">CVE-2020-12801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489241" comment="libreoffice-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489242" comment="libreoffice-base-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489243" comment="libreoffice-base-drivers-postgresql-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489244" comment="libreoffice-branding-upstream-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489245" comment="libreoffice-calc-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489246" comment="libreoffice-calc-extensions-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489247" comment="libreoffice-draw-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489248" comment="libreoffice-filters-optional-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489249" comment="libreoffice-gnome-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489250" comment="libreoffice-gtk3-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489251" comment="libreoffice-icon-themes-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489252" comment="libreoffice-impress-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489253" comment="libreoffice-l10n-af-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489254" comment="libreoffice-l10n-ar-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489255" comment="libreoffice-l10n-as-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489256" comment="libreoffice-l10n-bg-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489257" comment="libreoffice-l10n-bn-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489258" comment="libreoffice-l10n-br-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489259" comment="libreoffice-l10n-ca-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489260" comment="libreoffice-l10n-cs-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489261" comment="libreoffice-l10n-cy-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489262" comment="libreoffice-l10n-da-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489263" comment="libreoffice-l10n-de-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489264" comment="libreoffice-l10n-dz-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489265" comment="libreoffice-l10n-el-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489266" comment="libreoffice-l10n-en-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489267" comment="libreoffice-l10n-eo-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489268" comment="libreoffice-l10n-es-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489269" comment="libreoffice-l10n-et-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489270" comment="libreoffice-l10n-eu-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489271" comment="libreoffice-l10n-fa-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489272" comment="libreoffice-l10n-fi-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489273" comment="libreoffice-l10n-fr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489274" comment="libreoffice-l10n-ga-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489275" comment="libreoffice-l10n-gl-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489276" comment="libreoffice-l10n-gu-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489277" comment="libreoffice-l10n-he-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489278" comment="libreoffice-l10n-hi-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489279" comment="libreoffice-l10n-hr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489280" comment="libreoffice-l10n-hu-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489281" comment="libreoffice-l10n-it-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489282" comment="libreoffice-l10n-ja-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489283" comment="libreoffice-l10n-kk-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489284" comment="libreoffice-l10n-kn-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489285" comment="libreoffice-l10n-ko-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489286" comment="libreoffice-l10n-lt-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489287" comment="libreoffice-l10n-lv-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489288" comment="libreoffice-l10n-mai-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489289" comment="libreoffice-l10n-ml-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489290" comment="libreoffice-l10n-mr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489291" comment="libreoffice-l10n-nb-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489292" comment="libreoffice-l10n-nl-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489293" comment="libreoffice-l10n-nn-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489294" comment="libreoffice-l10n-nr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489295" comment="libreoffice-l10n-nso-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489296" comment="libreoffice-l10n-or-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489297" comment="libreoffice-l10n-pa-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489298" comment="libreoffice-l10n-pl-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489299" comment="libreoffice-l10n-pt_BR-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489300" comment="libreoffice-l10n-pt_PT-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489301" comment="libreoffice-l10n-ro-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489302" comment="libreoffice-l10n-ru-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489303" comment="libreoffice-l10n-si-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489304" comment="libreoffice-l10n-sk-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489305" comment="libreoffice-l10n-sl-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489306" comment="libreoffice-l10n-sr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489307" comment="libreoffice-l10n-ss-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489308" comment="libreoffice-l10n-st-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489309" comment="libreoffice-l10n-sv-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489310" comment="libreoffice-l10n-ta-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489311" comment="libreoffice-l10n-te-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489312" comment="libreoffice-l10n-th-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489313" comment="libreoffice-l10n-tn-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489314" comment="libreoffice-l10n-tr-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489315" comment="libreoffice-l10n-ts-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489316" comment="libreoffice-l10n-uk-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489317" comment="libreoffice-l10n-ve-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489318" comment="libreoffice-l10n-xh-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489319" comment="libreoffice-l10n-zh_CN-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489320" comment="libreoffice-l10n-zh_TW-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489321" comment="libreoffice-l10n-zu-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489322" comment="libreoffice-mailmerge-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489323" comment="libreoffice-math-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489324" comment="libreoffice-officebean-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489325" comment="libreoffice-pyuno-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489326" comment="libreoffice-writer-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489327" comment="libreoffice-writer-extensions-6.4.4.2-11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489328" comment="libreofficekit-6.4.4.2-11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109982" version="1" class="patch">
	<metadata>
		<title>libstaroffice-0_0-0-0.0.6-5.17 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-9432" ref_url="https://www.suse.com/security/cve/CVE-2017-9432/" source="CVE"/>
		<description>
These are all security issues fixed in the libstaroffice-0_0-0-0.0.6-5.17 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-9432/">CVE-2017-9432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489166" comment="libstaroffice-0_0-0-0.0.6-5.17 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109983" version="1" class="patch">
	<metadata>
		<title>libvncclient0-0.9.10-4.14.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-4607" ref_url="https://www.suse.com/security/cve/CVE-2014-4607/" source="CVE"/>
		<reference ref_id="CVE-2018-15126" ref_url="https://www.suse.com/security/cve/CVE-2018-15126/" source="CVE"/>
		<reference ref_id="CVE-2018-15127" ref_url="https://www.suse.com/security/cve/CVE-2018-15127/" source="CVE"/>
		<reference ref_id="CVE-2018-20019" ref_url="https://www.suse.com/security/cve/CVE-2018-20019/" source="CVE"/>
		<reference ref_id="CVE-2018-20020" ref_url="https://www.suse.com/security/cve/CVE-2018-20020/" source="CVE"/>
		<reference ref_id="CVE-2018-20021" ref_url="https://www.suse.com/security/cve/CVE-2018-20021/" source="CVE"/>
		<reference ref_id="CVE-2018-20022" ref_url="https://www.suse.com/security/cve/CVE-2018-20022/" source="CVE"/>
		<reference ref_id="CVE-2018-20023" ref_url="https://www.suse.com/security/cve/CVE-2018-20023/" source="CVE"/>
		<reference ref_id="CVE-2018-20024" ref_url="https://www.suse.com/security/cve/CVE-2018-20024/" source="CVE"/>
		<reference ref_id="CVE-2018-20748" ref_url="https://www.suse.com/security/cve/CVE-2018-20748/" source="CVE"/>
		<reference ref_id="CVE-2018-20749" ref_url="https://www.suse.com/security/cve/CVE-2018-20749/" source="CVE"/>
		<reference ref_id="CVE-2018-20750" ref_url="https://www.suse.com/security/cve/CVE-2018-20750/" source="CVE"/>
		<reference ref_id="CVE-2018-6307" ref_url="https://www.suse.com/security/cve/CVE-2018-6307/" source="CVE"/>
		<reference ref_id="CVE-2018-7225" ref_url="https://www.suse.com/security/cve/CVE-2018-7225/" source="CVE"/>
		<reference ref_id="CVE-2019-15681" ref_url="https://www.suse.com/security/cve/CVE-2019-15681/" source="CVE"/>
		<reference ref_id="CVE-2019-15690" ref_url="https://www.suse.com/security/cve/CVE-2019-15690/" source="CVE"/>
		<reference ref_id="CVE-2019-20788" ref_url="https://www.suse.com/security/cve/CVE-2019-20788/" source="CVE"/>
		<description>
These are all security issues fixed in the libvncclient0-0.9.10-4.14.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-4607/">CVE-2014-4607</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15126/">CVE-2018-15126</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15127/">CVE-2018-15127</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20019/">CVE-2018-20019</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20020/">CVE-2018-20020</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20021/">CVE-2018-20021</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20022/">CVE-2018-20022</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20023/">CVE-2018-20023</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20024/">CVE-2018-20024</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20748/">CVE-2018-20748</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20749/">CVE-2018-20749</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20750/">CVE-2018-20750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-6307/">CVE-2018-6307</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7225/">CVE-2018-7225</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15681/">CVE-2019-15681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-15690/">CVE-2019-15690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20788/">CVE-2019-20788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489329" comment="libvncclient0-0.9.10-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489330" comment="libvncserver0-0.9.10-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109984" version="1" class="patch">
	<metadata>
		<title>libwmf-0_2-7-0.2.8.4-2.30 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-0848" ref_url="https://www.suse.com/security/cve/CVE-2015-0848/" source="CVE"/>
		<reference ref_id="CVE-2015-4588" ref_url="https://www.suse.com/security/cve/CVE-2015-4588/" source="CVE"/>
		<reference ref_id="CVE-2015-4695" ref_url="https://www.suse.com/security/cve/CVE-2015-4695/" source="CVE"/>
		<reference ref_id="CVE-2015-4696" ref_url="https://www.suse.com/security/cve/CVE-2015-4696/" source="CVE"/>
		<description>
These are all security issues fixed in the libwmf-0_2-7-0.2.8.4-2.30 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-0848/">CVE-2015-0848</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4588/">CVE-2015-4588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4695/">CVE-2015-4695</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4696/">CVE-2015-4696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489034" comment="libwmf-0_2-7-0.2.8.4-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489035" comment="libwmf-devel-0.2.8.4-2.30 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489036" comment="libwmf-gnome-0.2.8.4-2.30 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109985" version="1" class="patch">
	<metadata>
		<title>libwpd-0_10-10-0.10.2-3.3.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-14226" ref_url="https://www.suse.com/security/cve/CVE-2017-14226/" source="CVE"/>
		<reference ref_id="CVE-2018-19208" ref_url="https://www.suse.com/security/cve/CVE-2018-19208/" source="CVE"/>
		<description>
These are all security issues fixed in the libwpd-0_10-10-0.10.2-3.3.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" cvss3="7.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-14226/">CVE-2017-14226</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19208/">CVE-2018-19208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489168" comment="libwpd-0_10-10-0.10.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489169" comment="libwpd-devel-0.10.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109986" version="1" class="patch">
	<metadata>
		<title>openconnect-7.08-6.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2019-16239" ref_url="https://www.suse.com/security/cve/CVE-2019-16239/" source="CVE"/>
		<reference ref_id="CVE-2020-12105" ref_url="https://www.suse.com/security/cve/CVE-2020-12105/" source="CVE"/>
		<description>
These are all security issues fixed in the openconnect-7.08-6.6.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-16239/">CVE-2019-16239</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12105/">CVE-2020-12105</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489331" comment="openconnect-7.08-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489332" comment="openconnect-devel-7.08-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489333" comment="openconnect-lang-7.08-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109987" version="1" class="patch">
	<metadata>
		<title>pidgin-plugin-otr-4.0.2-1.61 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2012-2369" ref_url="https://www.suse.com/security/cve/CVE-2012-2369/" source="CVE"/>
		<reference ref_id="CVE-2015-8833" ref_url="https://www.suse.com/security/cve/CVE-2015-8833/" source="CVE"/>
		<description>
These are all security issues fixed in the pidgin-plugin-otr-4.0.2-1.61 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2012-2369/">CVE-2012-2369</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8833/">CVE-2015-8833</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489042" comment="pidgin-plugin-otr-4.0.2-1.61 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489043" comment="pidgin-plugin-otr-lang-4.0.2-1.61 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109988" version="1" class="patch">
	<metadata>
		<title>strongswan-nm-5.8.2-9.2 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2014-9221" ref_url="https://www.suse.com/security/cve/CVE-2014-9221/" source="CVE"/>
		<reference ref_id="CVE-2015-3991" ref_url="https://www.suse.com/security/cve/CVE-2015-3991/" source="CVE"/>
		<reference ref_id="CVE-2015-4171" ref_url="https://www.suse.com/security/cve/CVE-2015-4171/" source="CVE"/>
		<reference ref_id="CVE-2015-8023" ref_url="https://www.suse.com/security/cve/CVE-2015-8023/" source="CVE"/>
		<reference ref_id="CVE-2017-11185" ref_url="https://www.suse.com/security/cve/CVE-2017-11185/" source="CVE"/>
		<reference ref_id="CVE-2017-9022" ref_url="https://www.suse.com/security/cve/CVE-2017-9022/" source="CVE"/>
		<reference ref_id="CVE-2017-9023" ref_url="https://www.suse.com/security/cve/CVE-2017-9023/" source="CVE"/>
		<reference ref_id="CVE-2018-10811" ref_url="https://www.suse.com/security/cve/CVE-2018-10811/" source="CVE"/>
		<reference ref_id="CVE-2018-16151" ref_url="https://www.suse.com/security/cve/CVE-2018-16151/" source="CVE"/>
		<reference ref_id="CVE-2018-16152" ref_url="https://www.suse.com/security/cve/CVE-2018-16152/" source="CVE"/>
		<reference ref_id="CVE-2018-17540" ref_url="https://www.suse.com/security/cve/CVE-2018-17540/" source="CVE"/>
		<reference ref_id="CVE-2018-5388" ref_url="https://www.suse.com/security/cve/CVE-2018-5388/" source="CVE"/>
		<reference ref_id="CVE-2018-6459" ref_url="https://www.suse.com/security/cve/CVE-2018-6459/" source="CVE"/>
		<description>
These are all security issues fixed in the strongswan-nm-5.8.2-9.2 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-9221/">CVE-2014-9221</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-3991/">CVE-2015-3991</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-4171/">CVE-2015-4171</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-8023/">CVE-2015-8023</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-11185/">CVE-2017-11185</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9022/">CVE-2017-9022</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-9023/">CVE-2017-9023</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10811/">CVE-2018-10811</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16151/">CVE-2018-16151</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-16152/">CVE-2018-16152</cve>
	<cve impact="important" cvss3="7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2018-17540/">CVE-2018-17540</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-5388/">CVE-2018-5388</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-6459/">CVE-2018-6459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489334" comment="strongswan-nm-5.8.2-9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109989" version="1" class="patch">
	<metadata>
		<title>transfig-3.2.6a-4.6.1 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2017-16899" ref_url="https://www.suse.com/security/cve/CVE-2017-16899/" source="CVE"/>
		<reference ref_id="CVE-2018-16140" ref_url="https://www.suse.com/security/cve/CVE-2018-16140/" source="CVE"/>
		<description>
These are all security issues fixed in the transfig-3.2.6a-4.6.1 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-16899/">CVE-2017-16899</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16140/">CVE-2018-16140</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489335" comment="transfig-3.2.6a-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109990" version="1" class="patch">
	<metadata>
		<title>xorg-x11-server-wayland-1.20.3-20.11 on GA media (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="CVE-2015-3164" ref_url="https://www.suse.com/security/cve/CVE-2015-3164/" source="CVE"/>
		<reference ref_id="CVE-2017-10971" ref_url="https://www.suse.com/security/cve/CVE-2017-10971/" source="CVE"/>
		<reference ref_id="CVE-2017-10972" ref_url="https://www.suse.com/security/cve/CVE-2017-10972/" source="CVE"/>
		<reference ref_id="CVE-2017-12176" ref_url="https://www.suse.com/security/cve/CVE-2017-12176/" source="CVE"/>
		<reference ref_id="CVE-2017-12187" ref_url="https://www.suse.com/security/cve/CVE-2017-12187/" source="CVE"/>
		<reference ref_id="CVE-2017-13721" ref_url="https://www.suse.com/security/cve/CVE-2017-13721/" source="CVE"/>
		<reference ref_id="CVE-2017-13723" ref_url="https://www.suse.com/security/cve/CVE-2017-13723/" source="CVE"/>
		<reference ref_id="CVE-2017-2624" ref_url="https://www.suse.com/security/cve/CVE-2017-2624/" source="CVE"/>
		<reference ref_id="CVE-2018-14665" ref_url="https://www.suse.com/security/cve/CVE-2018-14665/" source="CVE"/>
		<description>
These are all security issues fixed in the xorg-x11-server-wayland-1.20.3-20.11 package on the GA media of SUSE Linux Enterprise Workstation Extension 15 SP2.		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2015-3164/">CVE-2015-3164</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10971/">CVE-2017-10971</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-10972/">CVE-2017-10972</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12176/">CVE-2017-12176</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2017-12187/">CVE-2017-12187</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2017-13721/">CVE-2017-13721</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-13723/">CVE-2017-13723</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-2624/">CVE-2017-2624</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-14665/">CVE-2018-14665</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489336" comment="xorg-x11-server-wayland-1.20.3-20.11 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109991" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166066" ref_url="https://bugzilla.suse.com/1166066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1297-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007106.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2020-0034: Fixed an out-of-bounds read on truncated key frames (bsc#1166066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492022" comment="libvpx4-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109992" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1420-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007133.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492053" comment="libjasper4-2.0.14-3.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109993" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172021" ref_url="https://bugzilla.suse.com/1172021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1532-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007131.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-19956: Reverted the upstream fix for this memory leak because it introduced other, more severe vulnerabilities (bsc#1172021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172021">SUSE bug 1172021</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492063" comment="libxml2-2-2.9.7-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492064" comment="libxml2-2-32bit-2.9.7-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492065" comment="libxml2-devel-2.9.7-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492066" comment="libxml2-tools-2.9.7-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492067" comment="python3-libxml2-python-2.9.7-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109994" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006896.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492072" comment="vim-8.0.1568-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492073" comment="vim-data-8.0.1568-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492074" comment="vim-data-common-8.0.1568-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109995" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-bundler (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1143436" ref_url="https://bugzilla.suse.com/1143436" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3881" ref_url="https://www.suse.com/security/cve/CVE-2019-3881/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1582-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007128.html" source="SUSE-SU"/>
		<description>
This update for rubygem-bundler fixes the following issue:

- CVE-2019-3881: Fixed insecure permissions on a directory in /tmp/ that allowed malicious code execution (bsc#1143436).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143436">SUSE bug 1143436</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-3881/">CVE-2019-3881</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492075" comment="ruby2.5-rubygem-bundler-1.16.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109996" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53

- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492093" comment="libfreebl3-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492094" comment="libfreebl3-32bit-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492095" comment="libsoftokn3-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492096" comment="libsoftokn3-32bit-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492097" comment="mozilla-nspr-4.25-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492098" comment="mozilla-nspr-32bit-4.25-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492099" comment="mozilla-nspr-devel-4.25-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492100" comment="mozilla-nss-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492101" comment="mozilla-nss-32bit-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492102" comment="mozilla-nss-certs-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492103" comment="mozilla-nss-certs-32bit-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492104" comment="mozilla-nss-devel-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492105" comment="mozilla-nss-sysinit-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492106" comment="mozilla-nss-tools-3.53-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109997" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="1172348" ref_url="https://bugzilla.suse.com/1172348" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172348">SUSE bug 1172348</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492107" comment="perl-5.26.1-7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492108" comment="perl-base-5.26.1-7.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492109" comment="perl-base-32bit-5.26.1-7.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109998" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173026" ref_url="https://bugzilla.suse.com/1173026" source="BUGZILLA"/>
		<reference ref_id="1173027" ref_url="https://bugzilla.suse.com/1173027" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8169" ref_url="https://www.suse.com/security/cve/CVE-2020-8169/" source="CVE"/>
		<reference ref_id="CVE-2020-8177" ref_url="https://www.suse.com/security/cve/CVE-2020-8177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007021.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8177: Fixed an issue where curl could have been tricked by a malicious 
  server to overwrite a local file when using the -J option (bsc#1173027).	  
- CVE-2020-8169: Fixed an issue where could have led to partial password leak   
  over DNS on HTTP redirect (bsc#1173026).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-24"/>
	<updated date="2020-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173026">SUSE bug 1173026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173027">SUSE bug 1173027</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8169/">CVE-2020-8169</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8177/">CVE-2020-8177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493166" comment="curl-7.66.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493167" comment="libcurl-devel-7.66.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493168" comment="libcurl4-7.66.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493169" comment="libcurl4-32bit-7.66.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:109999" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172906" ref_url="https://bugzilla.suse.com/1172906" source="BUGZILLA"/>
		<reference ref_id="1172935" ref_url="https://bugzilla.suse.com/1172935" source="BUGZILLA"/>
		<reference ref_id="1173197" ref_url="https://bugzilla.suse.com/1173197" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14093" ref_url="https://www.suse.com/security/cve/CVE-2020-14093/" source="CVE"/>
		<reference ref_id="CVE-2020-14154" ref_url="https://www.suse.com/security/cve/CVE-2020-14154/" source="CVE"/>
		<reference ref_id="CVE-2020-14954" ref_url="https://www.suse.com/security/cve/CVE-2020-14954/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007042.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-14954: Fixed a response injection due to a STARTTLS buffering issue which was 
  affecting IMAP, SMTP, and POP3 (bsc#1173197).
- CVE-2020-14093: Fixed a potential IMAP Man-in-the-Middle attack via a PREAUTH response (bsc#1172906, bsc#1172935).
- CVE-2020-14154: Fixed an issue where Mutt was ignoring an expired certificate and was 
  proceeding with a connection (bsc#1172906, bsc#1172935). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172906">SUSE bug 1172906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172935">SUSE bug 1172935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173197">SUSE bug 1173197</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14093/">CVE-2020-14093</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14154/">CVE-2020-14154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14954/">CVE-2020-14954</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492127" comment="mutt-1.10.1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492128" comment="mutt-doc-1.10.1-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492129" comment="mutt-lang-1.10.1-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110000" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1157268" ref_url="https://bugzilla.suse.com/1157268" source="BUGZILLA"/>
		<reference ref_id="1171889" ref_url="https://bugzilla.suse.com/1171889" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18934" ref_url="https://www.suse.com/security/cve/CVE-2019-18934/" source="CVE"/>
		<reference ref_id="CVE-2020-12662" ref_url="https://www.suse.com/security/cve/CVE-2020-12662/" source="CVE"/>
		<reference ref_id="CVE-2020-12663" ref_url="https://www.suse.com/security/cve/CVE-2020-12663/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007040.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2020-12662: Fixed an issue where unbound could have been tricked into amplifying 
  an incoming query into a large number of queries directed to a target (bsc#1171889).
- CVE-2020-12663: Fixed an issue where malformed answers from upstream name servers 
  could have been used to make unbound unresponsive (bsc#1171889).	  
- CVE-2019-18934: Fixed a vulnerability in the IPSec module which could have allowed 
  code execution after receiving a special crafted answer (bsc#1157268).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157268">SUSE bug 1157268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171889">SUSE bug 1171889</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18934/">CVE-2019-18934</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12662/">CVE-2020-12662</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12663/">CVE-2020-12663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492130" comment="libunbound2-1.6.8-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492131" comment="unbound-anchor-1.6.8-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492132" comment="unbound-devel-1.6.8-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110001" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-02"/>
	<updated date="2020-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492137" comment="libpython3_6m1_0-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492138" comment="python3-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492139" comment="python3-base-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492140" comment="python3-curses-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492141" comment="python3-dbm-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492142" comment="python3-devel-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492143" comment="python3-idle-3.6.10-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492145" comment="python3-tk-3.6.10-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110002" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009490719" comment="libjpeg62-62.2.0-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490720" comment="libjpeg62-devel-62.2.0-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490721" comment="libjpeg8-8.1.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490722" comment="libjpeg8-devel-8.1.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490723" comment="libturbojpeg0-8.1.2-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110003" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1
 
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032)
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492146" comment="libfreebl3-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492147" comment="libfreebl3-32bit-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492148" comment="libsoftokn3-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492149" comment="libsoftokn3-32bit-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492150" comment="mozilla-nss-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492151" comment="mozilla-nss-32bit-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492152" comment="mozilla-nss-certs-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492153" comment="mozilla-nss-certs-32bit-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492154" comment="mozilla-nss-devel-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492155" comment="mozilla-nss-sysinit-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492156" comment="mozilla-nss-tools-3.53.1-3.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110004" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492157" comment="libldap-2_4-2-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492158" comment="libldap-2_4-2-32bit-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492159" comment="libldap-data-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493170" comment="openldap2-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492160" comment="openldap2-client-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492161" comment="openldap2-devel-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492162" comment="openldap2-devel-static-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492163" comment="openldap2-ppolicy-check-password-1.2-9.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110005" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="1148742" ref_url="https://bugzilla.suse.com/1148742" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594/" source="CVE"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007102.html" source="SUSE-SU"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2017-18594: Fixed a denial of service condition due to a double free when an SSH connection fails. (bsc#1148742)

Non-security issue fixed:

- Fixed a regression in the version scanner caused, by the fix for CVE-2018-15173. (bsc#1135350)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148742">SUSE bug 1148742</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490495" comment="nmap-7.70-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110006" version="1" class="patch">
	<metadata>
		<title>Security update for python-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<description>
This update for python-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009491754" comment="python3-ecdsa-0.13.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110007" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1132091" ref_url="https://bugzilla.suse.com/1132091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

Security issue fixed:

- CVE-2019-11023: Fixed a denial of service vulnerability, which was caused by a NULL pointer dereference in agroot() (bsc#1132091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009490077" comment="graphviz-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490078" comment="graphviz-devel-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490079" comment="graphviz-plugins-core-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009490080" comment="libgraphviz6-2.40.1-6.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110008" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173376" ref_url="https://bugzilla.suse.com/1173376" source="BUGZILLA"/>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).

Additional upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-14"/>
	<updated date="2020-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173376">SUSE bug 1173376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493171" comment="xen-libs-4.13.1_04-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493172" comment="xen-tools-domU-4.13.1_04-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110009" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1141320" ref_url="https://bugzilla.suse.com/1141320" source="BUGZILLA"/>
		<reference ref_id="1162680" ref_url="https://bugzilla.suse.com/1162680" source="BUGZILLA"/>
		<reference ref_id="1169095" ref_url="https://bugzilla.suse.com/1169095" source="BUGZILLA"/>
		<reference ref_id="1169521" ref_url="https://bugzilla.suse.com/1169521" source="BUGZILLA"/>
		<reference ref_id="1169850" ref_url="https://bugzilla.suse.com/1169850" source="BUGZILLA"/>
		<reference ref_id="1169851" ref_url="https://bugzilla.suse.com/1169851" source="BUGZILLA"/>
		<reference ref_id="1171437" ref_url="https://bugzilla.suse.com/1171437" source="BUGZILLA"/>
		<reference ref_id="1172307" ref_url="https://bugzilla.suse.com/1172307" source="BUGZILLA"/>
		<reference ref_id="1173159" ref_url="https://bugzilla.suse.com/1173159" source="BUGZILLA"/>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1173161" ref_url="https://bugzilla.suse.com/1173161" source="BUGZILLA"/>
		<reference ref_id="1173359" ref_url="https://bugzilla.suse.com/1173359" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<description>
This update for ldb, samba fixes the following issues:

Changes in samba:
- Update to samba 4.11.11
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ
    and VLV combined; (bso#14364); (bsc#1173159]
  + CVE-2020-10745: invalid DNS or NBT queries containing dots use
    several seconds of CPU each; (bso#14378); (bsc#1173160).
  + CVE-2020-10760: Use-after-free in AD DC Global Catalog LDAP
    server with paged_result or VLV; (bso#14402); (bsc#1173161)
  + CVE-2020-14303: Endless loop from empty UDP packet sent to
    AD DC nbt_server; (bso#14417); (bsc#1173359).
- Update to samba 4.11.10
  + Fix segfault when using SMBC_opendir_ctx() routine for share
    folder that contains incorrect symbols in any file name;
    (bso#14374).
  + vfs_shadow_copy2 doesn't fail case looking in
    snapdirseverywhere mode; (bso#14350)
  + ldb_ldap: Fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + Malicous SMB1 server can crash libsmbclient; (bso#14366)
  + winbindd: Fix a use-after-free when winbind clients exit;
    (bso#14382)
  + ldb: Bump version to 2.0.11, LMDB databases can grow without
    bounds. (bso#14330)
- Update to samba 4.11.9
  + nmblib: Avoid undefined behaviour in handle_name_ptrs();
    (bso#14242).
  + 'samba-tool group' commands do not handle group names with
    special chars correctly; (bso#14296).
  + smbd: avoid calling vfs_file_id_from_sbuf() if statinfo
    is not valid; (bso#14237).
  + Missing check for DMAPI offline status in async DOS
    attributes; (bso#14293).
  + smbd: Ignore set NTACL requests which contain
    S-1-5-88 NFS ACEs; (bso#14307).
  + vfs_recycle: Prevent flooding the log if we're called on
    non-existant paths; (bso#14316)
  + smbd mistakenly updates a file's write-time on close;
    (bso#14320).
  + RPC handles cannot be differentiated in source3 RPC server;
    (bso#14359).
  + librpc: Fix IDL for svcctl_ChangeServiceConfigW; (bso#14313).
  + nsswitch: Fix use-after-free causing segfault in
    _pam_delete_cred; (bso#14327).
  + Fix fruit:time machine max size on arm; (bso#13622)
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294).
  + ctdb: Fix a memleak; (bso#14348).
  + libsmb: Don't try to find posix stat info in SMBC_getatr().
  + ctdb-tcp: Move free of inbound queue to TCP restart;
    (bso#14295); (bsc#1162680).
  + s3/librpc/crypto: Fix double free with unresolved
    credential cache; (bso#14344); (bsc#1169095)
  + s3:libads: Fix ads_get_upn(); (bso#14336).
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294)
  + Starting ctdb node that was powered off hard before
    results in recovery loop; (bso#14295); (bsc#1162680).
  + ctdb-recoverd: Avoid dereferencing NULL rec-&gt;nodemap;
    (bso#14324)
- Update to samba 4.11.8
  + CVE-2020-10700: Use-after-free in Samba AD DC LDAP
    Server with ASQ; (bso#14331); (bsc#1169850);
  + CVE-2020-10704: LDAP Denial of Service (stack overflow)
    in Samba AD DC; (bso#14334); (bsc#1169851);
- Update to samba 4.11.7
  + s3: lib: nmblib. Clean up and harden nmb packet
    processing; (bso#14239).
  + s3: VFS: full_audit. Use system session_info if called
    from a temporary share definition; (bso#14283)
  + dsdb: Correctly handle memory in objectclass_attrs;
    (bso#14258).
  + ldb: version 2.0.9, Samba 4.11 and later give incorrect
    results for SCOPE_ONE searches; (bso#14270)
  + auth: Fix CIDs 1458418 and 1458420 Null pointer
    dereferences; (bso#14247).
  + smbd: Handle EINTR from open(2) properly; (bso#14285)
  + winbind member (source3) fails local SAM auth with empty
    domain name; (bso#14247)
  + winbindd: Handling missing idmap in getgrgid(); (bso#14265).
  + lib:util: Log mkdir error on correct debug levels;
    (bso#14253).
  + wafsamba: Do not use 'rU' as the 'U' is deprecated in
    Python 3.9; (bso#14266).
  + ctdb-tcp: Make error handling for outbound connection
    consistent; (bso#14274).
- Update to samba 4.11.6
  + pygpo: Use correct method flags; (bso#14209).
  + vfs_ceph_snapshots: Fix root relative path handling;
    (bso#14216); (bsc#1141320).
  + Avoiding bad call flags with python 3.8, using METH_NOARGS
    instead of zero; (bso#14209).
  + source4/utils/oLschema2ldif: Include stdint.h before
    cmocka.h; (bso#14218).
  + docs-xml/winbindnssinfo: Clarify interaction with
    idmap_ad etc; (bso#14122).
  + smbd: Fix the build with clang; (bso#14251).
  + upgradedns: Ensure lmdb lock files linked; (bso#14199).
  + s3: VFS: glusterfs: Reset nlinks for symlink entries during
    readdir; (bso#14182).
  + smbc_stat() doesn't return the correct st_mode and also
    the uid/gid is not filled (SMBv1) file; (bso#14101).
  + librpc: Fix string length checking in
    ndr_pull_charset_to_null(); (bso#14219).
  + ctdb-scripts: Strip square brackets when gathering
    connection info; (bso#14227).

- Add libnetapi-devel to baselibs conf, for wine usage; (bsc#1172307);

- Installing: samba - samba-ad-dc.service does not exist and unit
  not found; (bsc#1171437);

- Fix samba_winbind package is installing python3-base without
  python3 package; (bsc#1169521);

Changes in ldb:
- Update to version 2.0.12
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server
    when ASQ and VLV combined; (bso#14364); (bsc#1173159).
  + ldb_ldap: fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + lib/ldb: add unit test for ldb_ldap internal code.
- Update to version 2.0.11
  + lib ldb: lmdb init var before calling mdb_reader_check.
  + lib ldb: lmdb clear stale readers on write txn start;
    (bso#14330).
  + ldb tests: Confirm lmdb free list handling
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141320">SUSE bug 1141320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162680">SUSE bug 1162680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169095">SUSE bug 1169095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169521">SUSE bug 1169521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169850">SUSE bug 1169850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169851">SUSE bug 1169851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171437">SUSE bug 1171437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172307">SUSE bug 1172307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173161">SUSE bug 1173161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173359">SUSE bug 1173359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493173" comment="ldb-tools-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493174" comment="libdcerpc-binding0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493175" comment="libdcerpc-binding0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493176" comment="libdcerpc-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493177" comment="libdcerpc-samr-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493178" comment="libdcerpc-samr0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493179" comment="libdcerpc0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493180" comment="libdcerpc0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493181" comment="libldb-devel-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493182" comment="libldb2-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493183" comment="libldb2-32bit-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493184" comment="libndr-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493185" comment="libndr-krb5pac-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493186" comment="libndr-krb5pac0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493187" comment="libndr-krb5pac0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493188" comment="libndr-nbt-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493189" comment="libndr-nbt0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493190" comment="libndr-nbt0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493191" comment="libndr-standard-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493192" comment="libndr-standard0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493193" comment="libndr-standard0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493194" comment="libndr0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493195" comment="libndr0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493196" comment="libnetapi-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493197" comment="libnetapi0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493198" comment="libnetapi0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493199" comment="libsamba-credentials-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493200" comment="libsamba-credentials0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493201" comment="libsamba-credentials0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493202" comment="libsamba-errors-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493203" comment="libsamba-errors0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493204" comment="libsamba-errors0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493205" comment="libsamba-hostconfig-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493206" comment="libsamba-hostconfig0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493207" comment="libsamba-hostconfig0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493208" comment="libsamba-passdb-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493209" comment="libsamba-passdb0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493210" comment="libsamba-passdb0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493211" comment="libsamba-policy-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493212" comment="libsamba-policy-python3-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493213" comment="libsamba-policy0-python3-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493214" comment="libsamba-util-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493215" comment="libsamba-util0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493216" comment="libsamba-util0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493217" comment="libsamdb-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493218" comment="libsamdb0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493219" comment="libsamdb0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493220" comment="libsmbclient-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493221" comment="libsmbclient0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493222" comment="libsmbconf-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493223" comment="libsmbconf0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493224" comment="libsmbconf0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493225" comment="libsmbldap-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493226" comment="libsmbldap2-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493227" comment="libsmbldap2-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493228" comment="libtevent-util-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493229" comment="libtevent-util0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493230" comment="libtevent-util0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493231" comment="libwbclient-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493232" comment="libwbclient0-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493233" comment="libwbclient0-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493234" comment="python3-ldb-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493235" comment="python3-ldb-devel-2.0.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493236" comment="samba-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493237" comment="samba-ceph-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493238" comment="samba-client-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493239" comment="samba-core-devel-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493240" comment="samba-libs-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493241" comment="samba-libs-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493242" comment="samba-libs-python3-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493243" comment="samba-python3-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493244" comment="samba-winbind-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493245" comment="samba-winbind-32bit-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110010" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493246" comment="libjavascriptcoregtk-4_0-18-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493247" comment="libwebkit2gtk-4_0-37-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493248" comment="libwebkit2gtk3-lang-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493249" comment="webkit2gtk-4_0-injected-bundles-2.28.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110011" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172495" ref_url="https://bugzilla.suse.com/1172495" source="BUGZILLA"/>
		<reference ref_id="1172710" ref_url="https://bugzilla.suse.com/1172710" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 4.2.1 fixes the following issues:

- CVE-2020-10761: Fixed a denial of service in Network Block Device (nbd) support infrastructure (bsc#1172710).
- CVE-2020-13800: Fixed a denial of service possibility in ati-vga emulation (bsc#1172495).
- CVE-2020-13659: Fixed a null pointer dereference possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172386).
- CVE-2020-13362: Fixed an OOB access possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172383).
- CVE-2020-13361: Fixed an OOB access possibility in ES1370 audio device emulation (bsc#1172384).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493250" comment="qemu-tools-4.2.1-11.4.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110012" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
- Use grub_calloc for overflow check and return NULL when it would occur 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493251" comment="grub2-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493252" comment="grub2-arm64-efi-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493253" comment="grub2-i386-pc-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493254" comment="grub2-powerpc-ieee1275-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493255" comment="grub2-s390x-emu-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493256" comment="grub2-snapper-plugin-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493257" comment="grub2-systemd-sleep-plugin-2.04-9.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493258" comment="grub2-x86_64-efi-2.04-9.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110013" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174415" ref_url="https://bugzilla.suse.com/1174415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15900" ref_url="https://www.suse.com/security/cve/CVE-2020-15900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007203.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- fixed CVE-2020-15900 Memory Corruption (SAFER Sandbox Breakout)
  cf. https://bugs.ghostscript.com/show_bug.cgi?id=702582
  (bsc#1174415)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-30"/>
	<updated date="2020-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174415">SUSE bug 1174415</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15900/">CVE-2020-15900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492268" comment="ghostscript-9.52-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492269" comment="ghostscript-devel-9.52-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492270" comment="ghostscript-x11-9.52-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110014" version="1" class="patch">
	<metadata>
		<title>Security update for targetcli-fb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172743" ref_url="https://bugzilla.suse.com/1172743" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<description>
This update for targetcli-fb fixes the following issues:

- CVE-2020-13867: Fixed the permissions in /etc/target (bsc#1172743)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493259" comment="python3-targetcli-fb-2.1.52-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493260" comment="targetcli-fb-common-2.1.52-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110015" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493261" comment="kernel-default-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493262" comment="kernel-default-base-5.3.18-24.9.1.9.2.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493263" comment="kernel-default-devel-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493264" comment="kernel-devel-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493265" comment="kernel-macros-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493266" comment="kernel-preempt-5.3.18-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110016" version="1" class="patch">
	<metadata>
		<title>Security update for python-rtslib-fb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173257" ref_url="https://bugzilla.suse.com/1173257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html" source="SUSE-SU"/>
		<description>
This update for python-rtslib-fb fixes the following issues:

- Update to version v2.1.73 (bsc#1173257 CVE-2020-14019):
  * version 2.1.73
  * save_to_file: fix fd open mode
  * saveconfig: copy temp configfile with permissions
  * saveconfig: open the temp configfile with modes set
  * Fix 'is not' with a literal SyntaxWarning
  * Fix an incorrect config path in two comments
  * version 2.1.72
  * Do not change dbroot after drivers have been registered
  * Remove '_if_needed' from RTSRoot._set_dbroot()'s name
  Replacing old tarball with python-rtslib-fb-v2.1.73.tar.xz
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173257">SUSE bug 1173257</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493267" comment="python3-rtslib-fb-2.1.73-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110017" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492277" comment="libX11-6-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492278" comment="libX11-6-32bit-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492279" comment="libX11-data-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492280" comment="libX11-devel-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492281" comment="libX11-xcb1-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492282" comment="libX11-xcb1-32bit-1.6.5-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492283" comment="libxcb-composite0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492284" comment="libxcb-damage0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492285" comment="libxcb-devel-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492286" comment="libxcb-devel-doc-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492287" comment="libxcb-dpms0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492288" comment="libxcb-dri2-0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492289" comment="libxcb-dri2-0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492290" comment="libxcb-dri3-0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492291" comment="libxcb-dri3-0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492292" comment="libxcb-glx0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492293" comment="libxcb-glx0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492294" comment="libxcb-present0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492295" comment="libxcb-present0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492296" comment="libxcb-randr0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492297" comment="libxcb-record0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492298" comment="libxcb-render0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492299" comment="libxcb-res0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492300" comment="libxcb-screensaver0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492301" comment="libxcb-shape0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492302" comment="libxcb-shm0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492303" comment="libxcb-sync1-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492304" comment="libxcb-sync1-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492305" comment="libxcb-xf86dri0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492306" comment="libxcb-xfixes0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492307" comment="libxcb-xfixes0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492308" comment="libxcb-xinerama0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492309" comment="libxcb-xinput0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492310" comment="libxcb-xkb1-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492311" comment="libxcb-xtest0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492312" comment="libxcb-xv0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492313" comment="libxcb-xvmc0-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492314" comment="libxcb1-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492315" comment="libxcb1-32bit-1.13-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110018" version="1" class="patch">
	<metadata>
		<title>Security update for xrdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173580" ref_url="https://bugzilla.suse.com/1173580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-4044" ref_url="https://www.suse.com/security/cve/CVE-2020-4044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007230.html" source="SUSE-SU"/>
		<description>
This update for xrdp fixes the following issues:

- Update to version 0.9.13.1
  + This is a security fix release that includes fixes for the
    following local buffer overflow vulnerability (bsc#1173580): CVE-2020-4044
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173580">SUSE bug 1173580</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-4044/">CVE-2020-4044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493268" comment="libpainter0-0.9.13.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493269" comment="librfxencode0-0.9.13.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493270" comment="xrdp-0.9.13.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493271" comment="xrdp-devel-0.9.13.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110019" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)
  * Security fixes:
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233234: Better Zip Naming
    + JDK-8233239, CVE-2020-14562: Enhance TIFF support
    + JDK-8233255: Better Swing Buttons
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236867, CVE-2020-14573: Enhance Graal interface handling
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238013: Enhance String writing
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240482: Improved WAV file playback
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
  * Other changes:
    + JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:
      Buffers have not been created
    + JDK-7124307: JSpinner and changing value by mouse
    + JDK-8022574: remove HaltNode code after uncommon trap calls
    + JDK-8039082: [TEST_BUG] Test
      java/awt/dnd/BadSerializationTest/BadSerializationTest.java
      fails
    + JDK-8040630: Popup menus and tooltips flicker with previous
       popup contents when first shown
    + JDK-8044365: (dc) MulticastSendReceiveTests.java failing with
      ENOMEM when joining group (OS X 10.9)
    + JDK-8048215: [TESTBUG]
      java/lang/management/ManagementFactory/ThreadMXBeanProxy.java
       Expected non-null LockInfo
    + JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails
      in nightly
    + JDK-8080353: JShell: Better error message on attempting to
       add default method
    + JDK-8139876: Exclude hanging nsk/stress/stack from execution
      with deoptimization enabled
    + JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails
       with -XX:+DeoptimizeALot
    + JDK-8153430: jdk regression test MletParserLocaleTest,
       ParserInfiniteLoopTest reduce default timeout
    + JDK-8156207: Resource allocated BitMaps are often cleared
      unnecessarily
    + JDK-8159740: JShell: corralled declarations do not have
      correct source to wrapper mapping
    + JDK-8175984: ICC_Profile has un-needed, not-empty finalize
      method
    + JDK-8176359: Frame#setMaximizedbounds not working properly in
       multi screen environments
    + JDK-8183369: RFC unconformity of HttpURLConnection with proxy
    + JDK-8187078: -XX:+VerifyOops finds numerous problems when
       running JPRT
    + JDK-8189861: Refactor CacheFind
    + JDK-8191169: java/net/Authenticator/B4769350.java failed
      intermittently
    + JDK-8191930: [Graal] emits unparseable XML into compile log
    + JDK-8193879: Java debugger hangs on method invocation
    + JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on
      Windows
    + JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails
    + JDK-8198000:
      java/awt/List/EmptyListEventTest/EmptyListEventTest.java
      debug assert on Windows
    + JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/
      /WrongParentAfterRemoveMenu.java debug assert on Windows
    + JDK-8198339: Test javax/swing/border/Test6981576.java is
      unstable
    + JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,
      after JDK-8198801
    + JDK-8203264: JNI exception pending in
      PlainDatagramSocketImpl.c:740
    + JDK-8203672: JNI exception pending in PlainSocketImpl.c
    + JDK-8203673: JNI exception pending in
      DualStackPlainDatagramSocketImpl.c:398
    + JDK-8204834: Fix confusing 'allocate' naming in OopStorage
    + JDK-8205399: Set node color on pinned HashMap.TreeNode
      deletion
    + JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/
      /RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with
      handshake_failure
    + JDK-8206179: com/sun/management/OperatingSystemMXBean/
      /GetCommittedVirtualMemorySize.java fails with Committed
      virtual memory size illegal value
    + JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()
      with RunThese30M
    + JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)
      doesn't work with 1GB LargePages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492316" comment="java-11-openjdk-11.0.8.0-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492317" comment="java-11-openjdk-demo-11.0.8.0-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492318" comment="java-11-openjdk-devel-11.0.8.0-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492319" comment="java-11-openjdk-headless-11.0.8.0-3.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110020" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169063" ref_url="https://bugzilla.suse.com/1169063" source="BUGZILLA"/>
		<reference ref_id="1171899" ref_url="https://bugzilla.suse.com/1171899" source="BUGZILLA"/>
		<reference ref_id="1173606" ref_url="https://bugzilla.suse.com/1173606" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647/" source="CVE"/>
		<reference ref_id="CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164/" source="CVE"/>
		<reference ref_id="CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Wireshark to 3.2.5:
  * CVE-2020-15466: GVCP dissector infinite loop (bsc#1173606)
  * CVE-2020-13164: NFS dissector crash (bsc#1171899)
  * CVE-2020-11647: The BACapp dissector could crash (bsc#1169063)
- Further features, bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-3.2.5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169063">SUSE bug 1169063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171899">SUSE bug 1171899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173606">SUSE bug 1173606</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492320" comment="libwireshark13-3.2.5-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492321" comment="libwiretap10-3.2.5-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492322" comment="libwsutil11-3.2.5-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492323" comment="wireshark-3.2.5-3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110021" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172356" ref_url="https://bugzilla.suse.com/1172356" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007240.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next 
    reboot while it should be live attached
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172356">SUSE bug 1172356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493272" comment="xen-libs-4.13.1_06-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493273" comment="xen-tools-domU-4.13.1_06-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110022" version="1" class="patch">
	<metadata>
		<title>Security update for perl-XML-Twig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1008644" ref_url="https://bugzilla.suse.com/1008644" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9180" ref_url="https://www.suse.com/security/cve/CVE-2016-9180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2172-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007245.html" source="SUSE-SU"/>
		<description>
This update for perl-XML-Twig fixes the following issues:

- Security fix [bsc#1008644, CVE-2016-9180]
  * Setting expand_external_ents to 0 or -1 currently doesn't work
    as expected; To completely turn off expanding external entities
    use no_xxe.
  * Update documentation for XML::Twig to mention problems with
    expand_external_ents and add information about new no_xxe argument
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-07"/>
	<updated date="2020-08-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1008644">SUSE bug 1008644</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-9180/">CVE-2016-9180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492330" comment="perl-XML-Twig-3.52-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110023" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007252.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492331" comment="libX11-6-1.6.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492332" comment="libX11-6-32bit-1.6.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492333" comment="libX11-data-1.6.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492334" comment="libX11-devel-1.6.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492335" comment="libX11-xcb1-1.6.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492336" comment="libX11-xcb1-32bit-1.6.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110024" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493274" comment="libjavascriptcoregtk-4_0-18-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493275" comment="libwebkit2gtk-4_0-37-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493276" comment="libwebkit2gtk3-lang-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493277" comment="webkit2gtk-4_0-injected-bundles-2.28.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110025" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493278" comment="xorg-x11-server-1.20.3-22.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493279" comment="xorg-x11-server-extra-1.20.3-22.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110026" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- update to 12.4:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/12/release-12-4.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493280" comment="libpq5-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493281" comment="libpq5-32bit-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493282" comment="postgresql12-12.4-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110027" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1161883" ref_url="https://bugzilla.suse.com/1161883" source="BUGZILLA"/>
		<reference ref_id="1174458" ref_url="https://bugzilla.suse.com/1174458" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007278.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-14339: Don't leak /dev/mapper/control into QEMU. Use
  ioctl's to obtain the dependency tree of disks and drop use of
  libdevmapper.  bsc#1161883, bsc#1174458
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161883">SUSE bug 1161883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174458">SUSE bug 1174458</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493283" comment="libvirt-libs-6.0.0-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110028" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492413" comment="libpython2_7-1_0-2.7.17-7.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492414" comment="python-2.7.17-7.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492415" comment="python-base-2.7.17-7.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110029" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- bsc#1174091, CVE-2019-20907: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492416" comment="libpython3_6m1_0-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492417" comment="python3-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492418" comment="python3-base-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492419" comment="python3-curses-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492420" comment="python3-dbm-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492421" comment="python3-devel-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492422" comment="python3-idle-3.6.10-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492424" comment="python3-tk-3.6.10-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110030" version="1" class="patch">
	<metadata>
		<title>Security update for gettext-runtime (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1106843" ref_url="https://bugzilla.suse.com/1106843" source="BUGZILLA"/>
		<reference ref_id="1113719" ref_url="https://bugzilla.suse.com/1113719" source="BUGZILLA"/>
		<reference ref_id="941629" ref_url="https://bugzilla.suse.com/941629" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18751" ref_url="https://www.suse.com/security/cve/CVE-2018-18751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007288.html" source="SUSE-SU"/>
		<description>
This update for gettext-runtime fixes the following issues:

- Fix boo941629-unnessary-rpath-on-standard-path.patch (bsc#941629) 
- Added msgfmt-double-free.patch to fix a double free error
  (CVE-2018-18751 bsc#1113719)
- Add patch msgfmt-reset-msg-length-after-remove.patch
  which does reset the length of message string after a line
  has been removed (bsc#1106843)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-24"/>
	<updated date="2020-08-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106843">SUSE bug 1106843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113719">SUSE bug 1113719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/941629">SUSE bug 941629</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18751/">CVE-2018-18751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492425" comment="gettext-runtime-0.19.8.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492426" comment="gettext-runtime-32bit-0.19.8.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492427" comment="gettext-tools-0.19.8.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110031" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issue:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493284" comment="grub2-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493285" comment="grub2-arm64-efi-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493286" comment="grub2-i386-pc-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493287" comment="grub2-powerpc-ieee1275-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493288" comment="grub2-s390x-emu-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493289" comment="grub2-snapper-plugin-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493290" comment="grub2-systemd-sleep-plugin-2.04-9.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493291" comment="grub2-x86_64-efi-2.04-9.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110032" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174052" ref_url="https://bugzilla.suse.com/1174052" source="BUGZILLA"/>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175074" ref_url="https://bugzilla.suse.com/1175074" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11984: Fixed an information disclosure bug in mod_proxy_uwsgi (bsc#1175074).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).

- Solve a crash in mod_proxy_uwsgi for empty values of environment variables. (bsc#1174052)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174052">SUSE bug 1174052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175074">SUSE bug 1175074</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493292" comment="apache2-2.4.43-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493293" comment="apache2-prefork-2.4.43-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493294" comment="apache2-utils-2.4.43-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110033" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492440" comment="postgresql10-10.14-8.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110034" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172726" ref_url="https://bugzilla.suse.com/1172726" source="BUGZILLA"/>
		<reference ref_id="1173758" ref_url="https://bugzilla.suse.com/1173758" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007309.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- Fixed a possible crash in certificate parsing.
- Fixed a DoS in QSslSocket (bsc#1172726, CVE-2020-13962).
- Added support for PostgreSQL 12 (bsc#1173758).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172726">SUSE bug 1172726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173758">SUSE bug 1173758</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493295" comment="libQt5Concurrent-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493296" comment="libQt5Concurrent5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493297" comment="libQt5Core-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493298" comment="libQt5Core-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493299" comment="libQt5Core5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493300" comment="libQt5DBus-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493301" comment="libQt5DBus-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493302" comment="libQt5DBus5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493303" comment="libQt5Gui-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493304" comment="libQt5Gui-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493305" comment="libQt5Gui5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493306" comment="libQt5KmsSupport-devel-static-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493307" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493308" comment="libQt5Network-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493309" comment="libQt5Network-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493310" comment="libQt5Network5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493311" comment="libQt5OpenGL-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493312" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493313" comment="libQt5OpenGL5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493314" comment="libQt5PlatformHeaders-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493315" comment="libQt5PlatformSupport-devel-static-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493316" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493317" comment="libQt5PrintSupport-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493318" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493319" comment="libQt5PrintSupport5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493320" comment="libQt5Sql-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493321" comment="libQt5Sql-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493322" comment="libQt5Sql5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493323" comment="libQt5Sql5-sqlite-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493324" comment="libQt5Test-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493325" comment="libQt5Test-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493326" comment="libQt5Test5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493327" comment="libQt5Widgets-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493328" comment="libQt5Widgets-private-headers-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493329" comment="libQt5Widgets5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493330" comment="libQt5Xml-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493331" comment="libQt5Xml5-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493332" comment="libqt5-qtbase-common-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493333" comment="libqt5-qtbase-devel-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493334" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110035" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175109" ref_url="https://bugzilla.suse.com/1175109" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8231" ref_url="https://www.suse.com/security/cve/CVE-2020-8231/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007329.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- An application that performs multiple requests with libcurl's
  multi API and sets the 'CURLOPT_CONNECT_ONLY' option, might in
  rare circumstances experience that when subsequently using the
  setup connect-only transfer, libcurl will pick and use the wrong
  connection and instead pick another one the application has
  created since then. [bsc#1175109, CVE-2020-8231]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175109">SUSE bug 1175109</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8231/">CVE-2020-8231</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493335" comment="curl-7.66.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493336" comment="libcurl-devel-7.66.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493337" comment="libcurl4-7.66.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493338" comment="libcurl4-32bit-7.66.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110036" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493339" comment="xorg-x11-server-1.20.3-22.5.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493340" comment="xorg-x11-server-extra-1.20.3-22.5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110037" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175239" ref_url="https://bugzilla.suse.com/1175239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14363" ref_url="https://www.suse.com/security/cve/CVE-2020-14363/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007343.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2020-14363: Fix an integer overflow in init_om() (bsc#1175239).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175239">SUSE bug 1175239</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14363/">CVE-2020-14363</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492445" comment="libX11-6-1.6.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492446" comment="libX11-6-32bit-1.6.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492447" comment="libX11-data-1.6.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492448" comment="libX11-devel-1.6.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492449" comment="libX11-xcb1-1.6.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492450" comment="libX11-xcb1-32bit-1.6.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110038" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493341" comment="kernel-default-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493342" comment="kernel-default-base-5.3.18-24.12.1.9.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493343" comment="kernel-default-devel-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493344" comment="kernel-devel-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493345" comment="kernel-macros-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493346" comment="kernel-preempt-5.3.18-24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110039" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492453" comment="libjpeg62-62.2.0-5.15.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492454" comment="libjpeg62-devel-62.2.0-5.15.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492455" comment="libjpeg8-8.1.2-5.15.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492456" comment="libjpeg8-devel-8.1.2-5.15.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492457" comment="libturbojpeg0-8.1.2-5.15.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110040" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493347" comment="kernel-default-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493348" comment="kernel-default-devel-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493349" comment="kernel-devel-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493350" comment="kernel-macros-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493351" comment="kernel-preempt-5.3.18-24.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110041" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174154" ref_url="https://bugzilla.suse.com/1174154" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1174154 - CVE-2020-15719 - This resolves an issue with x509
  SAN's falling back to CN validation in violation of rfc6125.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492464" comment="libldap-2_4-2-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492465" comment="libldap-2_4-2-32bit-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492466" comment="libldap-data-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492467" comment="openldap2-client-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492468" comment="openldap2-devel-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492469" comment="openldap2-devel-static-2.4.46-9.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110042" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007411.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492470" comment="libxml2-2-2.9.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492471" comment="libxml2-2-32bit-2.9.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492472" comment="libxml2-devel-2.9.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492473" comment="libxml2-tools-2.9.7-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492474" comment="python3-libxml2-python-2.9.7-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110043" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1113225" ref_url="https://bugzilla.suse.com/1113225" source="BUGZILLA"/>
		<reference ref_id="1121268" ref_url="https://bugzilla.suse.com/1121268" source="BUGZILLA"/>
		<reference ref_id="1153953" ref_url="https://bugzilla.suse.com/1153953" source="BUGZILLA"/>
		<reference ref_id="1168104" ref_url="https://bugzilla.suse.com/1168104" source="BUGZILLA"/>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173411" ref_url="https://bugzilla.suse.com/1173411" source="BUGZILLA"/>
		<reference ref_id="1174320" ref_url="https://bugzilla.suse.com/1174320" source="BUGZILLA"/>
		<reference ref_id="1175626" ref_url="https://bugzilla.suse.com/1175626" source="BUGZILLA"/>
		<reference ref_id="1175656" ref_url="https://bugzilla.suse.com/1175656" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007421.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

This update addresses the 'BootHole' security issue (master CVE CVE-2020-10713), by
disallowing binaries signed by the previous SUSE UEFI signing key from booting.

This update should only be installed after updates of grub2, the Linux kernel and (if used)
Xen from July / August 2020 are applied.


Changes:

Use vendor-dbx to block old SUSE/openSUSE signkeys (bsc#1168994)

+ Add dbx-cert.tar.xz which contains the certificates to block
  and a script, generate-vendor-dbx.sh, to generate
  vendor-dbx.bin
+ Add vendor-dbx.bin as the vendor dbx to block unwanted keys


- Update the path to grub-tpm.efi in shim-install (bsc#1174320)
- Only check EFI variable copying when Secure Boot is enabled (bsc#1173411)
- Use the full path of efibootmgr to avoid errors when invoking
  shim-install from packagekitd (bsc#1168104)
- shim-install: add check for btrfs is used as root file system to enable
  relative path lookup for file. (bsc#1153953) 
- shim-install: install MokManager to \EFI\boot to process the
  pending MOK request (bsc#1175626, bsc#1175656)

		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-14"/>
	<updated date="2020-09-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1113225">SUSE bug 1113225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121268">SUSE bug 1121268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153953">SUSE bug 1153953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168104">SUSE bug 1168104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173411">SUSE bug 1173411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174320">SUSE bug 1174320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175626">SUSE bug 1175626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175656">SUSE bug 1175656</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492475" comment="shim-15+git47-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110044" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176409" ref_url="https://bugzilla.suse.com/1176409" source="BUGZILLA"/>
		<reference ref_id="1176412" ref_url="https://bugzilla.suse.com/1176412" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14392" ref_url="https://www.suse.com/security/cve/CVE-2020-14392/" source="CVE"/>
		<reference ref_id="CVE-2020-14393" ref_url="https://www.suse.com/security/cve/CVE-2020-14393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007432.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

Security issues fixed:

- CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412).
- CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-16"/>
	<updated date="2020-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176409">SUSE bug 1176409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176412">SUSE bug 1176412</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14392/">CVE-2020-14392</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14393/">CVE-2020-14393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493352" comment="perl-DBI-1.642-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110045" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492479" comment="libjasper4-2.0.14-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110046" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175568" ref_url="https://bugzilla.suse.com/1175568" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8027: openldap_update_modules_path.sh starts daemons unconditionally and uses fixed paths in /tmp (bsc#1175568).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-22"/>
	<updated date="2020-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492480" comment="libldap-2_4-2-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492481" comment="libldap-2_4-2-32bit-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492482" comment="libldap-data-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492483" comment="openldap2-client-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492484" comment="openldap2-devel-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492485" comment="openldap2-devel-static-2.4.46-9.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110047" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152930" ref_url="https://bugzilla.suse.com/1152930" source="BUGZILLA"/>
		<reference ref_id="1174477" ref_url="https://bugzilla.suse.com/1174477" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14342" ref_url="https://www.suse.com/security/cve/CVE-2020-14342/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2729-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007471.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2020-14342: Fixed a shell command injection vulnerability in mount.cifs (bsc#1174477). 
- Fixed an invalid free in mount.cifs; (bsc#1152930).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1152930">SUSE bug 1152930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174477">SUSE bug 1174477</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14342/">CVE-2020-14342</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492552" comment="cifs-utils-6.9-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492553" comment="cifs-utils-devel-6.9-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110048" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some non default configurations when an attacker established
 a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
 (CVE-2020-1472, bsc#1176579).

- Update to samba 4.11.13
  + s3: libsmb: Fix SMB2 client rename bug to a Windows server; (bso#14403);
  + dsdb: Allow 'password hash userPassword schemes = CryptSHA256' to work
    on RHEL7; (bso#14424);
  + dbcheck: Allow a dangling forward link outside our known NCs; (bso#14450);
  + lib/debug: Set the correct default backend loglevel to MAX_DEBUG_LEVEL;
    (bso#14426);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + lib/util: do not install 'test_util_paths'; (bso#14370);
  + lib:util: Fix smbclient -l basename dir; (bso#14345);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + util: Allow symlinks in directory_create_or_exist; (bso#14166);
  + docs: Fix documentation for require_membership_of of pam_winbind;
    (bso#14358);
  + s3:winbind:idmap_ad: Make failure to get attrnames for schema mode fatal;
    (bso#14425);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493353" comment="libdcerpc-binding0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493354" comment="libdcerpc-binding0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493355" comment="libdcerpc-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493356" comment="libdcerpc-samr-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493357" comment="libdcerpc-samr0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493358" comment="libdcerpc0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493359" comment="libdcerpc0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493360" comment="libndr-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493361" comment="libndr-krb5pac-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493362" comment="libndr-krb5pac0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493363" comment="libndr-krb5pac0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493364" comment="libndr-nbt-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493365" comment="libndr-nbt0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493366" comment="libndr-nbt0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493367" comment="libndr-standard-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493368" comment="libndr-standard0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493369" comment="libndr-standard0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493370" comment="libndr0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493371" comment="libndr0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493372" comment="libnetapi-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493373" comment="libnetapi0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493374" comment="libnetapi0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493375" comment="libsamba-credentials-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493376" comment="libsamba-credentials0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493377" comment="libsamba-credentials0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493378" comment="libsamba-errors-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493379" comment="libsamba-errors0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493380" comment="libsamba-errors0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493381" comment="libsamba-hostconfig-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493382" comment="libsamba-hostconfig0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493383" comment="libsamba-hostconfig0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493384" comment="libsamba-passdb-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493385" comment="libsamba-passdb0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493386" comment="libsamba-passdb0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493387" comment="libsamba-policy-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493388" comment="libsamba-policy-python3-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493389" comment="libsamba-policy0-python3-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493390" comment="libsamba-util-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493391" comment="libsamba-util0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493392" comment="libsamba-util0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493393" comment="libsamdb-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493394" comment="libsamdb0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493395" comment="libsamdb0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493396" comment="libsmbclient-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493397" comment="libsmbclient0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493398" comment="libsmbconf-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493399" comment="libsmbconf0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493400" comment="libsmbconf0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493401" comment="libsmbldap-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493402" comment="libsmbldap2-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493403" comment="libsmbldap2-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493404" comment="libtevent-util-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493405" comment="libtevent-util0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493406" comment="libtevent-util0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493407" comment="libwbclient-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493408" comment="libwbclient0-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493409" comment="libwbclient0-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493410" comment="samba-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493411" comment="samba-ceph-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493412" comment="samba-client-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493413" comment="samba-core-devel-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493414" comment="samba-libs-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493415" comment="samba-libs-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493416" comment="samba-libs-python3-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493417" comment="samba-python3-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493418" comment="samba-winbind-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493419" comment="samba-winbind-32bit-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110049" version="1" class="patch">
	<metadata>
		<title>Security update for conmon, fuse-overlayfs, libcontainers-common, podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162432" ref_url="https://bugzilla.suse.com/1162432" source="BUGZILLA"/>
		<reference ref_id="1164090" ref_url="https://bugzilla.suse.com/1164090" source="BUGZILLA"/>
		<reference ref_id="1165738" ref_url="https://bugzilla.suse.com/1165738" source="BUGZILLA"/>
		<reference ref_id="1171578" ref_url="https://bugzilla.suse.com/1171578" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1175821" ref_url="https://bugzilla.suse.com/1175821" source="BUGZILLA"/>
		<reference ref_id="1175957" ref_url="https://bugzilla.suse.com/1175957" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" source="SUSE-SU"/>
		<description>
This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:

podman was updated to v2.0.6 (bsc#1175821)

- install missing systemd units for the new Rest API (bsc#1175957)
  and a few man-pages that where missing before
- Drop varlink API related bits (in favor of the new API)
- fix install location for zsh completions

 * Fixed a bug where running systemd in a container on a cgroups v1 system would fail.
 * Fixed a bug where /etc/passwd could be re-created every time a container
   is restarted if the container's /etc/passwd did not contain an entry
   for the user the container was started as.
 * Fixed a bug where containers without an /etc/passwd file specifying
   a non-root user would not start.
 * Fixed a bug where the --remote flag would sometimes not make
   remote connections and would instead attempt to run Podman locally.

Update to v2.0.6:

* Features

  - Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.
  - The podman system connection command has been reworked to support multiple connections, and reenabled for use!
  - Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.

* Changes

  - Podman's automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).
  - Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.

* Bugfixes

  - Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).
  - Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).
  - Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.
  - Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).
  - Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).
  - Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).
  - Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).
  - Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).
  - Fixed a bug where the podman start --attach command would not print the container's exit code when the command exited due to the container exiting.
  - Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).
  - Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.
  - Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.
  - Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.
  - Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.
  - Fixed a bug where pod infra containers were not properly unmounted after exiting.
  - Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.
  - Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).
  - Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.
  - Fixed a bug where podman build would not generate an event on completion (#7022).
  - Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).
  - Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.
  - Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).
  - Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).
  - Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).
  - Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.
  - Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).
  - Fixed a bug where the podman version command did not properly include build time and Git commit.
  - Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).
  - Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.
  - Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).

* API

  - Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).
  - Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).
  - Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.
  - Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).
  - Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).
  - Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.
  - The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.

- Change hard requires for AppArmor to Recommends. They are not
  needed for runtime or with SELinux but already installed if
  AppArmor is used [jsc#SMO-15]
- Add BuildRequires for pkg-config(libselinux) to build with
  SELinux support [jsc#SMO-15] 

Update to v2.0.4

* Fixed a bug where the output of podman image search did not
  populate the Description field as it was mistakenly assigned to
  the ID field.
* Fixed a bug where podman build - and podman build on an HTTP
  target would fail.
* Fixed a bug where rootless Podman would improperly chown the
  copied-up contents of anonymous volumes (#7130).
* Fixed a bug where Podman would sometimes HTML-escape special
  characters in its CLI output.
* Fixed a bug where the podman start --attach --interactive
  command would print the container ID of the container attached
  to when exiting (#7068).
* Fixed a bug where podman run --ipc=host --pid=host would only
  set --pid=host and not --ipc=host (#7100).
* Fixed a bug where the --publish argument to podman run, podman
  create and podman pod create would not allow binding the same
  container port to more than one host port (#7062).
* Fixed a bug where incorrect arguments to podman images --format
  could cause Podman to segfault.
* Fixed a bug where podman rmi --force on an image ID with more
  than one name and at least one container using the image would
  not completely remove containers using the image (#7153).
* Fixed a bug where memory usage in bytes and memory use
  percentage were swapped in the output of podman stats
  --format=json.
* Fixed a bug where the libpod and compat events endpoints would
  fail if no filters were specified (#7078).
* Fixed a bug where the CgroupVersion field in responses from the
  compat Info endpoint was prefixed by 'v' (instead of just being
  '1' or '2', as is documented).

- Suggest katacontainers instead of recommending it. It's not
  enabled by default, so it's just bloat

Update to v2.0.3

* Fix handling of entrypoint
* log API: add context to allow for cancelling
* fix API: Create container with an invalid configuration
* Remove all instances of named return 'err' from Libpod
* Fix: Correct connection counters for hijacked connections
* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics
* Remove hijacked connections from active connections list
* version/info: format: allow more json variants
* Correctly print STDOUT on non-terminal remote exec
* Fix container and pod create commands for remote create
* Mask out /sys/dev to prevent information leak from the host
* Ensure sig-proxy default is propagated in start
* Add SystemdMode to inspect for containers
* When determining systemd mode, use full command
* Fix lint
* Populate remaining unused fields in `pod inspect`
* Include infra container information in `pod inspect`
* play-kube: add suport for 'IfNotPresent' pull type
* docs: user namespace can't be shared in pods
* Fix 'Error: unrecognized protocol \'TCP\' in port mapping'
* Error on rootless mac and ip addresses
* Fix &amp; add notes regarding problematic language in codebase
* abi: set default umask and rlimits
* Used reference package with errors for parsing tag
* fix: system df error when an image has no name
* Fix Generate API title/description
* Add noop function disable-content-trust
* fix play kube doesn't override dockerfile ENTRYPOINT
* Support default profile for apparmor
* Bump github.com/containers/common to v0.14.6
* events endpoint: backwards compat to old type
* events endpoint: fix panic and race condition
* Switch references from libpod.conf to containers.conf
* podman.service: set type to simple
* podman.service: set doc to podman-system-service
* podman.service: use default registries.conf
* podman.service: use default killmode
* podman.service: remove stop timeout
* systemd: symlink user-&gt;system
* vendor golang.org/x/text@v0.3.3
* Fix a bug where --pids-limit was parsed incorrectly
* search: allow wildcards
* [CI:DOCS]Do not copy policy.json into gating image
* Fix systemd pid 1 test
* Cirrus: Rotate keys post repo. rename
* The libpod.conf(5) man page got removed and all references are
  now pointing towards containers.conf(5), which will be part
  of the libcontainers-common package.

Update to podman v2.0.2

* fix race condition in `libpod.GetEvents(...)`
* Fix bug where `podman mount` didn't error as rootless
* remove podman system connection
* Fix imports to ensure v2 is used with libpod
* Update release notes for v2.0.2
* specgen: fix order for setting rlimits
* Ensure umask is set appropriately for 'system service'
* generate systemd: improve pod-flags filter
* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil
* Fixes --remote flag issues
* Pids-limit should only be set if the user set it
* Set console mode for windows
* Allow empty host port in --publish flag
* Add a note on the APIs supported by `system service`
* fix: Don't override entrypoint if it's `nil`
* Set TMPDIR to /var/tmp by default if not set
* test: add tests for --user and volumes
* container: move volume chown after spec generation
* libpod: volume copyup honors namespace mappings
* Fix `system service` panic from early hangup in events
* stop podman service in e2e tests
* Print errors from individual containers in pods
* auto-update: clarify systemd-unit requirements
* podman ps truncate the command
* move go module to v2
* Vendor containers/common v0.14.4
* Bump to imagebuilder v1.1.6 on v2 branch
* Account for non-default port number in image name
- Changes since v2.0.1
* Update release notes with further v2.0.1 changes
* Fix inspect to display multiple label: changes
* Set syslog for exit commands on log-level=debug
* Friendly amendment for pr 6751
* podman run/create: support all transports
* systemd generate: allow manual restart of container units in pods
* Revert sending --remote flag to containers
* Print port mappings in `ps` for ctrs sharing network
* vendor github.com/containers/common@v0.14.3
* Update release notes for v2.0.1
* utils: drop default mapping when running uid!=0
* Set stop signal to 15 when not explicitly set
* podman untag: error if tag doesn't exist
* Reformat inspect network settings
* APIv2: Return `StatusCreated` from volume creation
* APIv2:fix: Remove `/json` from compat network EPs
* Fix ssh-agent support
* libpod: specify mappings to the storage
* APIv2:doc: Fix swagger doc to refer to volumes
* Add podman network to bash command completions
* Fix typo in manpage for `podman auto update`.
* Add JSON output field for ps
* V2 podman system connection
* image load: no args required
* Re-add PODMAN_USERNS environment variable
* Fix conflicts between privileged and other flags
* Bump required go version to 1.13
* Add explicit command to alpine container in test case.
* Use POLL_DURATION for timer
* Stop following logs using timers
* 'pod' was being truncated to 'po' in the names of the generated systemd unit files.
* rootless_linux: improve error message
* Fix podman build handling of --http-proxy flag
* correct the absolute path of `rm` executable
* Makefile: allow customizable GO_BUILD
* Cirrus: Change DEST_BRANCH to v2.0

Update to podman v2.0.0

* The `podman generate systemd` command now supports the `--new`
  flag when used with pods, allowing portable services for pods
  to be created.
* The `podman play kube` command now supports running Kubernetes
  Deployment YAML.
* The `podman exec` command now supports the `--detach` flag to
  run commands in the container in the background.
* The `-p` flag to `podman run` and `podman create` now supports
  forwarding ports to IPv6 addresses.
* The `podman run`, `podman create` and `podman pod create`
  command now support a `--replace` flag to remove and replace any
  existing container (or, for `pod create`, pod) with the same name
* The `--restart-policy` flag to `podman run` and `podman create`
  now supports the `unless-stopped` restart policy.
* The `--log-driver` flag to `podman run` and `podman create`
  now supports the `none` driver, which does not log the
  container's output.
* The `--mount` flag to `podman run` and `podman create` now
  accepts `readonly` option as an alias to `ro`.
* The `podman generate systemd` command now supports the `--container-prefix`,
  `--pod-prefix`, and `--separator` arguments to control the
  name of generated unit files.
* The `podman network ls` command now supports the `--filter`
  flag to filter results.
* The `podman auto-update` command now supports specifying an
  authfile to use when pulling new images on a per-container
  basis using the `io.containers.autoupdate.authfile` label.
* Fixed a bug where the `podman exec` command would log to journald
  when run in containers loggined to journald
  ([#6555](https://github.com/containers/libpod/issues/6555)).
* Fixed a bug where the `podman auto-update` command would not
  preserve the OS and architecture of the original image when
  pulling a replacement
  ([#6613](https://github.com/containers/libpod/issues/6613)).
* Fixed a bug where the `podman cp` command could create an extra
  `merged` directory when copying into an existing directory
  ([#6596](https://github.com/containers/libpod/issues/6596)).
* Fixed a bug where the `podman pod stats` command would crash
  on pods run with `--network=host`
  ([#5652](https://github.com/containers/libpod/issues/5652)).
* Fixed a bug where containers logs written to journald did not
  include the name of the container.
* Fixed a bug where the `podman network inspect` and
  `podman network rm` commands did not properly handle non-default
  CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).
* Fixed a bug where Podman did not properly remove containers
  when using the Kata containers OCI runtime.
* Fixed a bug where `podman inspect` would sometimes incorrectly
  report the network mode of containers started with `--net=none`.
* Podman is now better able to deal with cases where `conmon`
  is killed before the container it is monitoring.

Update to podman v1.9.3:

* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets
  were not properly mounted into containers
* Fixed a bug where builds run over Varlink would hang
* Fixed a bug where podman save would fail when the target
  image was specified by digest
* Fixed a bug where rootless containers with ports forwarded to them
  could panic and dump core due to a concurrency issue (#6018)
* Fixed a bug where rootless Podman could race when opening the
  rootless user namespace, resulting in commands failing to run
* Fixed a bug where HTTP proxy environment variables forwarded into
  the container by the --http-proxy flag could not be overridden by --env or --env-file
* Fixed a bug where rootless Podman was setting resource limits on cgroups
  v2 systems that were not using systemd-managed cgroups
  (and thus did not support resource limits), resulting in containers failing to start

Update podman to v1.9.1:

* Bugfixes

  - Fixed a bug where healthchecks could become nonfunctional if
    container log paths were manually set with --log-path and
    multiple container logs were placed in the same directory
  - Fixed a bug where rootless Podman could, when using an older
    libpod.conf, print numerous warning messages about an invalid
    CGroup manager config
  - Fixed a bug where rootless Podman would sometimes fail to
    close the rootless user namespace when joining it

Update podman to v1.9.0:

* Features

  - Experimental support has been added for podman run
    --userns=auto, which automatically allocates a unique UID and
    GID range for the new container's user namespace
  - The podman play kube command now has a --network flag to
    place the created pod in one or more CNI networks
  - The podman commit command now supports an --iidfile flag to
    write the ID of the committed image to a file
  - Initial support for the new containers.conf configuration
    file has been added. containers.conf allows for much more
    detailed configuration of some Podman functionality

* Changes

  - There has been a major cleanup of the podman info command
    resulting in breaking changes. Many fields have been renamed
    to better suit usage with APIv2
  - All uses of the --timeout flag have been switched to prefer
    the alternative --time. The --timeout flag will continue to
    work, but man pages and --help will use the --time flag
    instead

* Bugfixes

  - Fixed a bug where some volume mounts from the host would
    sometimes not properly determine the flags they should use
    when mounting
  - Fixed a bug where Podman was not propagating $PATH to Conmon
    and the OCI runtime, causing issues for some OCI runtimes
    that required it
  - Fixed a bug where rootless Podman would print error messages
    about missing support for systemd cgroups when run in a
    container with no cgroup support
  - Fixed a bug where podman play kube would not properly handle
    container-only port mappings (#5610)
  - Fixed a bug where the podman container prune command was not
    pruning containers in the created and configured states
  - Fixed a bug where Podman was not properly removing CNI IP
    address allocations after a reboot (#5433)
  - Fixed a bug where Podman was not properly applying the
    default Seccomp profile when --security-opt was not given at
    the command line

* HTTP API

  - Many Libpod API endpoints have been added, including Changes,
    Checkpoint, Init, and Restore
  - Resolved issues where the podman system service command would
    time out and exit while there were still active connections
  - Stability overall has greatly improved as we prepare the API
    for a beta release soon with Podman 2.0

* Misc

  - The default infra image for pods has been upgraded to
    k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the
    architecture metadata for non-AMD64 images
  - The slirp4netns networking utility in rootless Podman now
    uses Seccomp filtering where available for improved security
  - Updated Buildah to v1.14.8
  - Updated containers/storage to v1.18.2
  - Updated containers/image to v5.4.3
  - Updated containers/common to v0.8.1

- Add 'systemd' BUILDFLAGS to build with support for journald
  logging (bsc#1162432)

Update podman to v1.8.2:

* Features

  - Initial support for automatically updating containers managed
    via Systemd unit files has been merged. This allows
    containers to automatically upgrade if a newer version of
    their image becomes available

* Bugfixes

  - Fixed a bug where unit files generated by podman generate
    systemd --new would not force containers to detach, causing
    the unit to time out when trying to start
  - Fixed a bug where podman system reset could delete important
    system directories if run as rootless on installations
    created by older Podman (#4831)
  - Fixed a bug where image built by podman build would not
    properly set the OS and Architecture they were built with
    (#5503)
  - Fixed a bug where attached podman run with --sig-proxy
    enabled (the default), when built with Go 1.14, would
    repeatedly send signal 23 to the process in the container and
    could generate errors when the container stopped (#5483)
  - Fixed a bug where rootless podman run commands could hang
    when forwarding ports
  - Fixed a bug where rootless Podman would not work when /proc
    was mounted with the hidepid option set
  - Fixed a bug where the podman system service command would use
    large amounts of CPU when --timeout was set to 0 (#5531)

* HTTP API

  - Initial support for Libpod endpoints related to creating and
    operating on image manifest lists has been added
  - The Libpod Healthcheck and Events API endpoints are now
    supported
  - The Swagger endpoint can now handle cases where no Swagger
    documentation has been generated

Update podman to v1.8.1:

* Features

  - Many networking-related flags have been added to podman pod
    create to enable customization of pod networks, including
    --add-host, --dns, --dns-opt, --dns-search, --ip,
    --mac-address, --network, and --no-hosts
  - The podman ps --format=json command now includes the ID of
    the image containers were created with
  - The podman run and podman create commands now feature an
    --rmi flag to remove the image the container was using after
    it exits (if no other containers are using said image)
    ([#4628](https://github.com/containers/libpod/issues/4628))
  - The podman create and podman run commands now support the
    --device-cgroup-rule flag (#4876)
  - While the HTTP API remains in alpha, many fixes and additions
    have landed. These are documented in a separate subsection
    below
  - The podman create and podman run commands now feature a
    --no-healthcheck flag to disable healthchecks for a container
    (#5299)
  - Containers now recognize the io.containers.capabilities
    label, which specifies a list of capabilities required by the
    image to run. These capabilities will be used as long as they
    are more restrictive than the default capabilities used
  - YAML produced by the podman generate kube command now
    includes SELinux configuration passed into the container via
    --security-opt label=... (#4950)

* Bugfixes

  - Fixed CVE-2020-1726, a security issue where volumes manually
    populated before first being mounted into a container could
    have those contents overwritten on first being mounted into a
    container
  - Fixed a bug where Podman containers with user namespaces in
    CNI networks with the DNS plugin enabled would not have the
    DNS plugin's nameserver added to their resolv.conf
    ([#5256](https://github.com/containers/libpod/issues/5256))
  - Fixed a bug where trailing / characters in image volume
    definitions could cause them to not be overridden by a
    user-specified mount at the same location
    ([#5219](https://github.com/containers/libpod/issues/5219))
  - Fixed a bug where the label option in libpod.conf, used to
    disable SELinux by default, was not being respected (#5087)
  - Fixed a bug where the podman login and podman logout commands
    required the registry to log into be specified (#5146)
  - Fixed a bug where detached rootless Podman containers could
    not forward ports (#5167)
  - Fixed a bug where rootless Podman could fail to run if the
    pause process had died
  - Fixed a bug where Podman ignored labels that were specified
    with only a key and no value (#3854)
  - Fixed a bug where Podman would fail to create named volumes
    when the backing filesystem did not support SELinux labelling
    (#5200)
  - Fixed a bug where --detach-keys='' would not disable
    detaching from a container (#5166)
  - Fixed a bug where the podman ps command was too aggressive
    when filtering containers and would force --all on in too
    many situations
  - Fixed a bug where the podman play kube command was ignoring
    image configuration, including volumes, working directory,
    labels, and stop signal (#5174)
  - Fixed a bug where the Created and CreatedTime fields in
    podman images --format=json were misnamed, which also broke
    Go template output for those fields
    ([#5110](https://github.com/containers/libpod/issues/5110))
  - Fixed a bug where rootless Podman containers with ports
    forwarded could hang when started (#5182)
  - Fixed a bug where podman pull could fail to parse registry
    names including port numbers
  - Fixed a bug where Podman would incorrectly attempt to
    validate image OS and architecture when starting containers
  - Fixed a bug where Bash completion for podman build -f would
    not list available files that could be built (#3878)
  - Fixed a bug where podman commit --change would perform
    incorrect validation, resulting in valid changes being
    rejected (#5148)
  - Fixed a bug where podman logs --tail could take large amounts
    of memory when the log file for a container was large (#5131)
  - Fixed a bug where Podman would sometimes incorrectly generate
    firewall rules on systems using firewalld
  - Fixed a bug where the podman inspect command would not
    display network information for containers properly if a
    container joined multiple CNI networks
    ([#4907](https://github.com/containers/libpod/issues/4907))
  - Fixed a bug where the --uts flag to podman create and podman
    run would only allow specifying containers by full ID (#5289)
  - Fixed a bug where rootless Podman could segfault when passed
    a large number of file descriptors
  - Fixed a bug where the podman port command was incorrectly
    interpreting additional arguments as container names, instead
    of port numbers
  - Fixed a bug where units created by podman generate systemd
    did not depend on network targets, and so could start before
    the system network was ready (#4130)
  - Fixed a bug where exec sessions in containers which did not
    specify a user would not inherit supplemental groups added to
    the container via --group-add
  - Fixed a bug where Podman would not respect the $TMPDIR
    environment variable for placing large temporary files during
    some operations (e.g. podman pull)
    ([#5411](https://github.com/containers/libpod/issues/5411))

* HTTP API

  - Initial support for secure connections to servers via SSH
    tunneling has been added
  - Initial support for the libpod create and logs endpoints for
    containers has been added
  - Added a /swagger/ endpoint to serve API documentation
  - The json endpoint for containers has received many fixes
  - Filtering images and containers has been greatly improved,
    with many bugs fixed and documentation improved
  - Image creation endpoints (commit, pull, etc) have seen many
    fixes
  - Server timeout has been fixed so that long operations will no
    longer trigger the timeout and shut the server down
  - The stats endpoint for containers has seen major fixes and
    now provides accurate output
  - Handling the HTTP 304 status code has been fixed for all
    endpoints
  - Many fixes have been made to API documentation to ensure it
    matches the code

* Misc

  - The Created field to podman images --format=json has been
    renamed to CreatedSince as part of the fix for (#5110). Go
    templates using the old name shou ld still work
  - The CreatedTime field to podman images --format=json has been
    renamed to CreatedAt as part of the fix for (#5110). Go
    templates using the old name should still work
  - The before filter to podman images has been renamed to since
    for Docker compatibility. Using before will still work, but
      documentation has been changed to use the new since filter
  - Using the --password flag to podman login now warns that
    passwords are being passed in plaintext
  - Some common cases where Podman would deadlock have been fixed
    to warn the user that podman system renumber must be run to
    resolve the deadlock

- Configure br_netfilter for podman automatically (bsc#1165738)
  The trigger is only excuted when updating podman-cni-config while the
  command was running

conmon was update to v2.0.20 (bsc#1175821)

- journald: fix logging container name
- container logging: Implement none driver - 'off', 'null' or
  'none' all work.
- ctrl: warn if we fail to unlink
- Drop fsync calls
- Reap PIDs before running exit command
- Fix log path parsing
- Add --sync option to prevent conmon from double forking
- Add --no-sync-log option to instruct conmon to not sync the
  logs of the containers upon shutting down. This feature fixes a
  regression where we unconditionally dropped the log sync. It is
  possible the container logs could be corrupted on a sudden
  power-off. If you need container logs to remain in consistent
  state after a sudden shutdown, please update from v2.0.19 to
  v2.0.20

- Update to v2.0.17:

  - Add option to delay execution of exit command

- Update to v2.0.16:

  - tty: flush pending data when fd is ready

- Enable support for journald logging (bsc#1162432)
- Update to v2.0.15:

  - store status while waiting for pid

- Update to v2.0.14:

  - drop usage of splice(2)
  - avoid hanging on stdin
  - stdio: sometimes quit main loop after io is done
  - ignore sigpipe

- Update to v2.0.12

  - oom: fix potential race between verification steps

- Update to v2.0.11

  - log: reject --log-tag with k8s-file
  - chmod std files pipes
  - adjust score to -1000 to prevent conmon from ever being OOM
    killed
  - container OOM: verify cgroup hasn't been cleaned up before
    reporting OOM
  - journal logging: write to /dev/null instead of -1

fuse-overlayfs was updated to 1.1.2 (bsc#1175821):

- fix memory leak when creating whiteout files.
- fix lookup for overflow uid when it is different than the overflow gid.
- use openat2(2) when available.
- accept 'ro' as mount option.
- fix set mtime for a symlink.
- fix some issues reported by static analysis.
- fix potential infinite loop on a short read.
- fix creating a directory if the destination already exists
  in the upper layer.
- report correctly the number of links for a directory also for
  subsequent stat calls
- stop looking up the ino in the lower layers if the file could
  not be opened
- make sure the destination is deleted before doing a rename(2).
  It prevents a left over directory to cause delete to fail with
  EEXIST.
- honor --debug.

libcontainers-common was updated to fix:

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Added containers/common tarball for containers.conf(5) man page
- Install containers.conf default configuration in
  /usr/share/containers
- libpod repository on github got renamed to podman
- Update to image 5.5.1
  - Add documentation for credHelpera
  - Add defaults for using the rootless policy path
- Update libpod/podman to 2.0.3
  - docs: user namespace can't be shared in pods
  - Switch references from libpod.conf to containers.conf
  - Allow empty host port in --publish flag
  - update document login see config.json as valid
- Update storage to 1.20.2
  - Add back skip_mount_home

- Remove remaining difference between SLE and openSUSE package and
  ship the some mounts.conf default configuration on both platforms.
  As the sources for the mount point do not exist on openSUSE by
  default this config will basically have no effect on openSUSE.
  (jsc#SLE-12122, bsc#1175821) 

- Update to image 5.4.4
  - Remove registries.conf VERSION 2 references from man page
  - Intial authfile man page
  - Add $HOME/.config/containers/certs.d to perHostCertDirPath
  - Add $HOME/.config/containers/registries.conf to config path
  - registries.conf.d: add stances for the registries.conf
- update to libpod 1.9.3
  - userns: support --userns=auto
  - Switch to using --time as opposed to --timeout to better match Docker
  - Add support for specifying CNI networks in podman play kube
  - man pages: fix inconsistencies
- Update to storage 1.19.1
  - userns: add support for auto
  - store: change the default user to containers
  - config: honor XDG_CONFIG_HOME
- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.
  It never ended up in SLES and a different way to fix the underlying
  problem is being worked on.

- Add registry.opensuse.org as default registry [bsc#1171578] 

- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.
  This for making container-suseconnect working in the public
  cloud on-demand images. It needs that file for being able to
  verify the server certificates of the RMT servers hosted
  in the public cloud.
  (https://github.com/SUSE/container-suseconnect/issues/41)
  

      		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162432">SUSE bug 1162432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164090">SUSE bug 1164090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165738">SUSE bug 1165738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171578">SUSE bug 1171578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175821">SUSE bug 1175821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175957">SUSE bug 1175957</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492554" comment="libcontainers-common-20200727-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110050" version="1" class="patch">
	<metadata>
		<title>Security update for bcm43xx-firmware (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1176631" ref_url="https://bugzilla.suse.com/1176631" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2733-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007477.html" source="SUSE-SU"/>
		<description>
This update for bcm43xx-firmware fixes the following issues:

- Update bluetooth firmware to address Sweyntooth and Spectra issues (bsc#1176631):
- brcmfmac driver loads file depending on compatible. Rename files correspondingly. (bsc#1169094)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176631">SUSE bug 1176631</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493420" comment="bcm43xx-firmware-20180314-15.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110051" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Fixed various issues discovered by fuzzing:
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515):
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493421" comment="libQt5Concurrent-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493422" comment="libQt5Concurrent5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493423" comment="libQt5Core-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493424" comment="libQt5Core-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493425" comment="libQt5Core5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493426" comment="libQt5DBus-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493427" comment="libQt5DBus-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493428" comment="libQt5DBus5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493429" comment="libQt5Gui-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493430" comment="libQt5Gui-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493431" comment="libQt5Gui5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493432" comment="libQt5KmsSupport-devel-static-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493433" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493434" comment="libQt5Network-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493435" comment="libQt5Network-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493436" comment="libQt5Network5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493437" comment="libQt5OpenGL-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493438" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493439" comment="libQt5OpenGL5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493440" comment="libQt5PlatformHeaders-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493441" comment="libQt5PlatformSupport-devel-static-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493442" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493443" comment="libQt5PrintSupport-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493444" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493445" comment="libQt5PrintSupport5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493446" comment="libQt5Sql-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493447" comment="libQt5Sql-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493448" comment="libQt5Sql5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493449" comment="libQt5Sql5-sqlite-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493450" comment="libQt5Test-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493451" comment="libQt5Test-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493452" comment="libQt5Test5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493453" comment="libQt5Widgets-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493454" comment="libQt5Widgets-private-headers-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493455" comment="libQt5Widgets5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493456" comment="libQt5Xml-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493457" comment="libQt5Xml5-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493458" comment="libqt5-qtbase-common-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493459" comment="libqt5-qtbase-devel-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493460" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110052" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1146608" ref_url="https://bugzilla.suse.com/1146608" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2019-14973: Fixed an improper check which was depended on the compiler
  which could have led to integer overflow (bsc#1146608).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492595" comment="libtiff-devel-4.0.9-5.30.28 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492596" comment="libtiff5-4.0.9-5.30.28 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110053" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2019-20916: Fixed a directory traversal in _download_http_url (bsc#1176262)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492597" comment="python3-pip-10.0.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110054" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176339" ref_url="https://bugzilla.suse.com/1176339" source="BUGZILLA"/>
		<reference ref_id="1176341" ref_url="https://bugzilla.suse.com/1176341" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25602: Fixed an issue where there was a crash when
  handling guest access to MSR_MISC_ENABLE was thrown (bsc#1176339,XSA-333)
- CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path
  (bsc#1176341,XSA-334)
- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)
- Various other fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176339">SUSE bug 1176339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176341">SUSE bug 1176341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493461" comment="xen-libs-4.13.1_08-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493462" comment="xen-tools-domU-4.13.1_08-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110055" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176764" ref_url="https://bugzilla.suse.com/1176764" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20919" ref_url="https://www.suse.com/security/cve/CVE-2019-20919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007515.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- CVE-2019-20919: Fixed a NULL profile dereference in dbi_profile (bsc#1176764).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-02"/>
	<updated date="2020-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176764">SUSE bug 1176764</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20919/">CVE-2019-20919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493463" comment="perl-DBI-1.642-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110056" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176086" ref_url="https://bugzilla.suse.com/1176086" source="BUGZILLA"/>
		<reference ref_id="1176181" ref_url="https://bugzilla.suse.com/1176181" source="BUGZILLA"/>
		<reference ref_id="1176671" ref_url="https://bugzilla.suse.com/1176671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24659" ref_url="https://www.suse.com/security/cve/CVE-2020-24659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007527.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- Fix heap buffer overflow in handshake with no_renegotiation alert sent (CVE-2020-24659 bsc#1176181)
- FIPS: Implement (EC)DH requirements from SP800-56Arev3 (bsc#1176086)
- FIPS: Use 2048 bit prime in DH selftest (bsc#1176086)
- FIPS: Add TLS KDF selftest (bsc#1176671)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-06"/>
	<updated date="2020-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176086">SUSE bug 1176086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176181">SUSE bug 1176181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176671">SUSE bug 1176671</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24659/">CVE-2020-24659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493464" comment="gnutls-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493465" comment="libgnutls-devel-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493466" comment="libgnutls30-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493467" comment="libgnutls30-32bit-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493468" comment="libgnutls30-hmac-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493469" comment="libgnutls30-hmac-32bit-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493470" comment="libgnutlsxx-devel-3.6.7-14.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493471" comment="libgnutlsxx28-3.6.7-14.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110057" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1174863" ref_url="https://bugzilla.suse.com/1174863" source="BUGZILLA"/>
		<reference ref_id="1175370" ref_url="https://bugzilla.suse.com/1175370" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176494" ref_url="https://bugzilla.suse.com/1176494" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-14364: Fixed an OOB access while processing USB packets (bsc#1175441,bsc#1176494).
- CVE-2020-16092: Fixed a denial of service in packet processing of various emulated NICs (bsc#1174641).
- CVE-2020-15863: Fixed a buffer overflow in the XGMAC device (bsc#1174386).
- CVE-2020-24352: Fixed an out-of-bounds read/write in ati-vga device emulation in ati_2d_blt (bsc#1175370).
- Allow to IPL secure guests with -no-reboot (bsc#1174863)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-07"/>
	<updated date="2020-10-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174863">SUSE bug 1174863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493472" comment="qemu-tools-4.2.1-11.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110058" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493473" comment="kernel-default-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493474" comment="kernel-default-base-5.3.18-24.24.1.9.7.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493475" comment="kernel-default-devel-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493476" comment="kernel-devel-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493477" comment="kernel-macros-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493478" comment="kernel-preempt-5.3.18-24.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110059" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007537.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492604" comment="libXvnc1-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492605" comment="tigervnc-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492606" comment="xorg-x11-Xvnc-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492607" comment="xorg-x11-Xvnc-module-1.9.0-19.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492608" comment="xorg-x11-Xvnc-novnc-1.9.0-19.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110060" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492609" comment="libproxy-devel-0.4.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492610" comment="libproxy1-0.4.15-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110061" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1100369" ref_url="https://bugzilla.suse.com/1100369" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1128220" ref_url="https://bugzilla.suse.com/1128220" source="BUGZILLA"/>
		<reference ref_id="1156205" ref_url="https://bugzilla.suse.com/1156205" source="BUGZILLA"/>
		<reference ref_id="1157051" ref_url="https://bugzilla.suse.com/1157051" source="BUGZILLA"/>
		<reference ref_id="1161168" ref_url="https://bugzilla.suse.com/1161168" source="BUGZILLA"/>
		<reference ref_id="1170667" ref_url="https://bugzilla.suse.com/1170667" source="BUGZILLA"/>
		<reference ref_id="1170713" ref_url="https://bugzilla.suse.com/1170713" source="BUGZILLA"/>
		<reference ref_id="1171313" ref_url="https://bugzilla.suse.com/1171313" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172958" ref_url="https://bugzilla.suse.com/1172958" source="BUGZILLA"/>
		<reference ref_id="1173307" ref_url="https://bugzilla.suse.com/1173307" source="BUGZILLA"/>
		<reference ref_id="1173311" ref_url="https://bugzilla.suse.com/1173311" source="BUGZILLA"/>
		<reference ref_id="1173983" ref_url="https://bugzilla.suse.com/1173983" source="BUGZILLA"/>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1176092" ref_url="https://bugzilla.suse.com/1176092" source="BUGZILLA"/>
		<reference ref_id="1176674" ref_url="https://bugzilla.suse.com/1176674" source="BUGZILLA"/>
		<reference ref_id="906079" ref_url="https://bugzilla.suse.com/906079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

BIND was upgraded to version 9.16.6:

Note:

- bind is now more strict in regards to DNSSEC. If queries are not working,
  check for DNSSEC issues. For instance, if bind is used in a namserver
  forwarder chain, the forwarding DNS servers must support DNSSEC.

Fixing security issues:

- CVE-2020-8616: Further limit the number of queries that can be triggered from
  a request.  Root and TLD servers are no longer exempt
  from max-recursion-queries.  Fetches for missing name server. (bsc#1171740)
  Address records are limited to 4 for any domain.
- CVE-2020-8617: Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. (bsc#1171740)
- CVE-2019-6477: Fixed an issue where TCP-pipelined queries could bypass 
  the tcp-clients limit (bsc#1157051).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- CVE-2020-8618: It was possible to trigger an INSIST when determining
  whether a record would fit into a TCP message buffer (bsc#1172958).
- CVE-2020-8619: It was possible to trigger an INSIST in
  lib/dns/rbtdb.c:new_reference() with a particular zone content
  and query patterns (bsc#1172958).
- CVE-2020-8624: 'update-policy' rules of type 'subdomain' were
  incorrectly treated as 'zonesub' rules, which allowed
  keys used in 'subdomain' rules to update names outside
  of the specified subdomains. The problem was fixed by
  making sure 'subdomain' rules are again processed as
  described in the ARM (bsc#1175443).
- CVE-2020-8623: When BIND 9 was compiled with native PKCS#11 support, it
  was possible to trigger an assertion failure in code
  determining the number of bits in the PKCS#11 RSA public
  key with a specially crafted packet (bsc#1175443).
- CVE-2020-8621: named could crash in certain query resolution scenarios
  where QNAME minimization and forwarding were both
  enabled (bsc#1175443).
- CVE-2020-8620: It was possible to trigger an assertion failure by
  sending a specially crafted large TCP DNS message (bsc#1175443).
- CVE-2020-8622: It was possible to trigger an assertion failure when
  verifying the response to a TSIG-signed request (bsc#1175443).

Other issues fixed:

- Add engine support to OpenSSL EdDSA implementation.
- Add engine support to OpenSSL ECDSA implementation.
- Update PKCS#11 EdDSA implementation to PKCS#11 v3.0.
- Warn about AXFR streams with inconsistent message IDs.
- Make ISC rwlock implementation the default again.
- Fixed issues when using cookie-secrets for AES and SHA2 (bsc#1161168)
- Installed the default files in /var/lib/named and created 
  chroot environment on systems using transactional-updates (bsc#1100369, fate#325524)
- Fixed an issue where bind was not working in FIPS mode (bsc#906079).
- Fixed dependency issues (bsc#1118367 and bsc#1118368).
- GeoIP support is now discontinued, now GeoIP2 is used(bsc#1156205).
- Fixed an issue with FIPS (bsc#1128220).
- The liblwres library is discontinued upstream and is no longer included.
- Added service dependency on NTP to make sure the clock is accurate when bind is starts (bsc#1170667, bsc#1170713).
- Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE.
- The default value of 'max-stale-ttl' has been changed from 1 week to 12 hours.
- Zone timers are now exported via statistics channel.
- The 'primary' and 'secondary' keywords, when used as parameters for 'check-names', were not processed correctly and were being ignored.
- 'rndc dnstap -roll &lt;value&gt;' did not limit the number of saved files to &lt;value&gt;.
- Add 'rndc dnssec -status' command.
- Addressed a couple of situations where named could crash.
- Changed /var/lib/named to owner root:named and perms rwxrwxr-t
  so that named, being a/the only member of the 'named' group
  has full r/w access yet cannot change directories owned by root
  in the case of a compromized named.
  [bsc#1173307, bind-chrootenv.conf]
- Added '/etc/bind.keys' to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file (bsc#1173983).
- Removed '-r /dev/urandom' from all invocations of rndc-confgen
  (init/named system/lwresd.init system/named.init in vendor-files)
  as this option is deprecated and causes rndc-confgen to fail.
  (bsc#1173311, bsc#1176674, bsc#1170713)
- /usr/bin/genDDNSkey: Removing the use of the -r option in the call
  of /usr/sbin/dnssec-keygen as BIND now uses the random number
  functions provided by the crypto library (i.e., OpenSSL or a
  PKCS#11 provider) as a source of randomness rather than /dev/random.
  Therefore the -r command line option no longer has any effect on
  dnssec-keygen. Leaving the option in genDDNSkey as to not break
  compatibility. Patch provided by Stefan Eisenwiener.
  [bsc#1171313]
- Put libns into a separate subpackage to avoid file conflicts
  in the libisc subpackage due to different sonums (bsc#1176092).
- Require /sbin/start_daemon: both init scripts, the one used in
  systemd context as well as legacy sysv, make use of start_daemon.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100369">SUSE bug 1100369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128220">SUSE bug 1128220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156205">SUSE bug 1156205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161168">SUSE bug 1161168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170667">SUSE bug 1170667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170713">SUSE bug 1170713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171313">SUSE bug 1171313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173307">SUSE bug 1173307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173311">SUSE bug 1173311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173983">SUSE bug 1173983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176092">SUSE bug 1176092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176674">SUSE bug 1176674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906079">SUSE bug 906079</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492617" comment="bind-devel-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492618" comment="bind-utils-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492619" comment="libbind9-1600-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492620" comment="libdns1605-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492621" comment="libirs-devel-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492622" comment="libirs1601-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492623" comment="libisc1606-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492624" comment="libisccc1600-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492625" comment="libisccfg1600-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492626" comment="libns1604-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492627" comment="python3-bind-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492628" comment="sysuser-shadow-2.0-4.2.8 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110062" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10, nvptx-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<description>
This update for gcc10, nvptx-tools fixes the following issues:

This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

	CC=gcc-10
	CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html

Changes in nvptx-tools:

- Enable build on aarch64
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492630" comment="libada10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493479" comment="libada10-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492632" comment="libasan6-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492633" comment="libasan6-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492634" comment="libatomic1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492635" comment="libatomic1-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492636" comment="libgcc_s1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492637" comment="libgcc_s1-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492638" comment="libgfortran5-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492639" comment="libgfortran5-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492640" comment="libgo16-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492641" comment="libgo16-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492642" comment="libgomp1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492643" comment="libgomp1-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492644" comment="libitm1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492645" comment="libitm1-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492646" comment="liblsan0-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492647" comment="libobjc4-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492648" comment="libquadmath0-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492649" comment="libquadmath0-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492650" comment="libstdc++6-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492651" comment="libstdc++6-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492652" comment="libstdc++6-devel-gcc10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492653" comment="libstdc++6-locale-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492654" comment="libstdc++6-pp-gcc10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492655" comment="libstdc++6-pp-gcc10-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492656" comment="libtsan0-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492657" comment="libubsan1-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492658" comment="libubsan1-32bit-10.2.1+git583-1.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110063" version="1" class="patch">
	<metadata>
		<title>Security update for hunspell (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1151867" ref_url="https://bugzilla.suse.com/1151867" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16707" ref_url="https://www.suse.com/security/cve/CVE-2019-16707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007597.html" source="SUSE-SU"/>
		<description>
This update for hunspell fixes the following issues:

- CVE-2019-16707: Fixed an invalid read in SuggestMgr:leftcommonsubstring (bsc#1151867).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-20"/>
	<updated date="2020-10-20"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1151867">SUSE bug 1151867</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16707/">CVE-2019-16707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492675" comment="hunspell-1.6.2-3.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492676" comment="hunspell-devel-1.6.2-3.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492677" comment="hunspell-tools-1.6.2-3.3.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492678" comment="libhunspell-1_6-0-1.6.2-3.3.7 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110064" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173157" ref_url="https://bugzilla.suse.com/1173157" source="BUGZILLA"/>
		<reference ref_id="1174139" ref_url="https://bugzilla.suse.com/1174139" source="BUGZILLA"/>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1175465" ref_url="https://bugzilla.suse.com/1175465" source="BUGZILLA"/>
		<reference ref_id="1176430" ref_url="https://bugzilla.suse.com/1176430" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
- qemu: Avoid stale capabilities cache host CPU or kernel command line changes (bsc#1173157).
- virdevmapper: Handle kernel without device-mapper support (bsc#1175465).
- Xen: Added support for passing arbitrary commands to the qemu device model, similar to the xl.cfg(5) device_model_args setting (bsc#1174139).
- Xen: Don't add dom0 twice on driver reload (bsc#1176430).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-20"/>
	<updated date="2020-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173157">SUSE bug 1173157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174139">SUSE bug 1174139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175465">SUSE bug 1175465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176430">SUSE bug 1176430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493480" comment="libvirt-libs-6.0.0-13.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110065" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493481" comment="kernel-default-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493482" comment="kernel-default-base-5.3.18-24.29.2.9.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493483" comment="kernel-default-devel-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493484" comment="kernel-devel-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493485" comment="kernel-macros-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493486" comment="kernel-preempt-5.3.18-24.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110066" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492693" comment="freetype2-devel-2.10.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492694" comment="libfreetype6-2.10.1-4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492695" comment="libfreetype6-32bit-2.10.1-4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110067" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="1177895" ref_url="https://bugzilla.suse.com/1177895" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-27153: Fixed crash on disconnect (bsc#1177895).
- CVE-2020-0556: Fixed potential escalation of privilege and denial of service via adjacent access, caused by improper access control (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493487" comment="bluez-5.48-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493488" comment="libbluetooth3-5.48-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110068" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1177409 - VUL-0: CVE-2020-27673: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493489" comment="xen-libs-4.13.1_10-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493490" comment="xen-tools-domU-4.13.1_10-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110069" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to version 2.35. (jsc#ECO-2373)

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

- fix DT_NEEDED order with -flto [bsc#1163744]


Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
  bsc#1153768 aka CVE-2019-17451 aka PR25070
  bsc#1153770 aka CVE-2019-17450 aka PR25078

- fix various build fails on aarch64 (PR25210, bsc#1157755).

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.
- Includes fixes for these CVEs:
  bsc#1126826 aka CVE-2019-9077 aka PR1126826
  bsc#1126829 aka CVE-2019-9075 aka PR1126829
  bsc#1126831 aka CVE-2019-9074 aka PR24235
  bsc#1140126 aka CVE-2019-12972 aka PR23405
  bsc#1143609 aka CVE-2019-14444 aka PR24829
  bsc#1142649 aka CVE-2019-14250 aka PR90924

* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492699" comment="binutils-2.35-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492700" comment="binutils-devel-2.35-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492701" comment="libctf-nobfd0-2.35-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492702" comment="libctf0-2.35-7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110070" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:
	  
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493491" comment="libspice-client-glib-2_0-8-0.37-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493492" comment="libspice-client-glib-helper-0.37-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493493" comment="libspice-client-gtk-3_0-5-0.37-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110071" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Update to samba 4.11.14

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
- lib/util: Do not install /usr/bin/test_util
- smbd: don't log success as error
- idmap_ad does not deal properly with a RFC4511 section 4.4.1 response;
- winbind: Fix a memleak
- idmap_ad: Pass tldap debug messages on to DEBUG()
- lib/replace: Move lib/replace/closefrom.c from ROKEN_HOSTCC_SOURCE to REPLACE_HOSTCC_SOURCE
- ctdb disable/enable can fail due to race condition
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493494" comment="libdcerpc-binding0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493495" comment="libdcerpc-binding0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493496" comment="libdcerpc-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493497" comment="libdcerpc-samr-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493498" comment="libdcerpc-samr0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493499" comment="libdcerpc0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493500" comment="libdcerpc0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493501" comment="libndr-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493502" comment="libndr-krb5pac-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493503" comment="libndr-krb5pac0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493504" comment="libndr-krb5pac0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493505" comment="libndr-nbt-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493506" comment="libndr-nbt0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493507" comment="libndr-nbt0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493508" comment="libndr-standard-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493509" comment="libndr-standard0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493510" comment="libndr-standard0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493511" comment="libndr0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493512" comment="libndr0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493513" comment="libnetapi-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493514" comment="libnetapi0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493515" comment="libnetapi0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493516" comment="libsamba-credentials-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493517" comment="libsamba-credentials0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493518" comment="libsamba-credentials0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493519" comment="libsamba-errors-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493520" comment="libsamba-errors0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493521" comment="libsamba-errors0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493522" comment="libsamba-hostconfig-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493523" comment="libsamba-hostconfig0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493524" comment="libsamba-hostconfig0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493525" comment="libsamba-passdb-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493526" comment="libsamba-passdb0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493527" comment="libsamba-passdb0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493528" comment="libsamba-policy-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493529" comment="libsamba-policy-python3-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493530" comment="libsamba-policy0-python3-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493531" comment="libsamba-util-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493532" comment="libsamba-util0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493533" comment="libsamba-util0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493534" comment="libsamdb-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493535" comment="libsamdb0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493536" comment="libsamdb0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493537" comment="libsmbclient-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493538" comment="libsmbclient0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493539" comment="libsmbconf-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493540" comment="libsmbconf0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493541" comment="libsmbconf0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493542" comment="libsmbldap-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493543" comment="libsmbldap2-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493544" comment="libsmbldap2-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493545" comment="libtevent-util-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493546" comment="libtevent-util0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493547" comment="libtevent-util0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493548" comment="libwbclient-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493549" comment="libwbclient0-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493550" comment="libwbclient0-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493551" comment="samba-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493552" comment="samba-ceph-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493553" comment="samba-client-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493554" comment="samba-core-devel-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493555" comment="samba-libs-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493556" comment="samba-libs-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493557" comment="samba-libs-python3-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493558" comment="samba-python3-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493559" comment="samba-winbind-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493560" comment="samba-winbind-32bit-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110072" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird and mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174230" ref_url="https://bugzilla.suse.com/1174230" source="BUGZILLA"/>
		<reference ref_id="1176384" ref_url="https://bugzilla.suse.com/1176384" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1176899" ref_url="https://bugzilla.suse.com/1176899" source="BUGZILLA"/>
		<reference ref_id="1177977" ref_url="https://bugzilla.suse.com/1177977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird and mozilla-nspr fixes the following issues:

- Mozilla Thunderbird 78.4
  * new: MailExtensions: browser.tabs.sendMessage API added
  * new: MailExtensions: messageDisplayScripts API added
  * changed: Yahoo and AOL mail users using password authentication will be migrated to OAuth2
  * changed: MailExtensions: messageDisplay APIs extended to support multiple selected messages
  * changed: MailExtensions: compose.begin functions now support creating a message with attachments
  * fixed: Thunderbird could freeze when updating global search index
  * fixed: Multiple issues with handling of self-signed SSL certificates addressed
  * fixed: Recipient address fields in compose window could expand to fill all available space
  * fixed: Inserting emoji characters in message compose window caused unexpected behavior
  * fixed: Button to restore default folder icon color was not keyboard accessible
  * fixed: Various keyboard navigation fixes
  * fixed: Various color-related theme fixes
  * fixed: MailExtensions: Updating attachments with onBeforeSend.addListener() did not work
  MFSA 2020-47 (bsc#1177977)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Thunderbird 78.4
- Mozilla Thunderbird 78.3.3
  * OpenPGP: Improved support for encrypting with subkeys
  * OpenPGP message status icons were not visible in message header pane
  * Creating a new calendar event did not require an event title
- Mozilla Thunderbird 78.3.2 (bsc#1176899)
  * OpenPGP: Improved support for encrypting with subkeys
  * OpenPGP: Encrypted messages with international characters were sometimes displayed incorrectly
  * Single-click deletion of recipient pills with middle mouse button restored
  * Searching an address book list did not display results
  * Dark mode, high contrast, and Windows theming fixes
- Mozilla Thunderbird 78.3.1
  * fix crash in nsImapProtocol::CreateNewLineFromSocket
- Mozilla Thunderbird 78.3.0
  MFSA 2020-44 (bsc#1176756)
  * CVE-2020-15677 Download origin spoofing via redirect
  * CVE-2020-15676 XSS when pasting attacker-controlled data into a contenteditable element
  * CVE-2020-15678 When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after- free scenario
  * CVE-2020-15673 Memory safety bugs fixed in Thunderbird 78.3

- update mozilla-nspr to version 4.25.1
  * The macOS platform code for shared library loading was
    changed to support macOS 11.
  * Dependency needed for the MozillaThunderbird udpate
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176384">SUSE bug 1176384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492703" comment="mozilla-nspr-4.25.1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492704" comment="mozilla-nspr-32bit-4.25.1-3.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492705" comment="mozilla-nspr-devel-4.25.1-3.15.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110073" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-02"/>
	<updated date="2020-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492772" comment="libpython2_7-1_0-2.7.17-7.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492773" comment="python-2.7.17-7.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492774" comment="python-base-2.7.17-7.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110074" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493561" comment="kernel-default-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493562" comment="kernel-default-base-5.3.18-24.34.1.9.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493563" comment="kernel-default-devel-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493564" comment="kernel-devel-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493565" comment="kernel-macros-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493566" comment="kernel-preempt-5.3.18-24.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110075" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-httpclient (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178171" ref_url="https://bugzilla.suse.com/1178171" source="BUGZILLA"/>
		<reference ref_id="945190" ref_url="https://bugzilla.suse.com/945190" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-3577" ref_url="https://www.suse.com/security/cve/CVE-2014-3577/" source="CVE"/>
		<reference ref_id="CVE-2015-5262" ref_url="https://www.suse.com/security/cve/CVE-2015-5262/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007692.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-httpclient fixes the following issues:

- http/conn/ssl/SSLConnectionSocketFactory.java ignores the
    http.socket.timeout configuration setting during an SSL handshake,
    which allows remote attackers to cause a denial of service (HTTPS
    call hang) via unspecified vectors. [bsc#945190, CVE-2015-5262]
- org.apache.http.conn.ssl.AbstractVerifier does not properly
    verify that the server hostname matches a domain name in the
    subject's Common Name (CN) or subjectAltName field of the X.509
    certificate, which allows MITM attackers to spoof SSL servers
    via a 'CN=' string in a field in the distinguished name (DN)
    of a certificate. [bsc#1178171, CVE-2014-3577]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178171">SUSE bug 1178171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/945190">SUSE bug 945190</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2014-3577/">CVE-2014-3577</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-5262/">CVE-2015-5262</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493567" comment="apache-commons-httpclient-3.1-11.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110076" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159670" ref_url="https://bugzilla.suse.com/1159670" source="BUGZILLA"/>
		<reference ref_id="1175987" ref_url="https://bugzilla.suse.com/1175987" source="BUGZILLA"/>
		<reference ref_id="1176024" ref_url="https://bugzilla.suse.com/1176024" source="BUGZILLA"/>
		<reference ref_id="1176294" ref_url="https://bugzilla.suse.com/1176294" source="BUGZILLA"/>
		<reference ref_id="1176397" ref_url="https://bugzilla.suse.com/1176397" source="BUGZILLA"/>
		<reference ref_id="1177867" ref_url="https://bugzilla.suse.com/1177867" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)
- Fix disk.blkid to avoid unexpected keyword argument '__pub_user'. (bsc#1177867)
- Ensure virt.update stop_on_reboot is updated with its default value.
- Do not break package building for systemd OSes.
- Drop wrong mock from chroot unit test.
- Support systemd versions with dot. (bsc#1176294)
- Fix for grains.test_core unit test.
- Fix file/directory user and group ownership containing UTF-8 characters. (bsc#1176024)
- Several changes to virtualization:
  * Fix virt update when cpu and memory are changed.
  * Memory Tuning GSoC.
  * Properly fix memory setting regression in virt.update.
  * Expose libvirt on_reboot in virt states.
- Support transactional systems (MicroOS).
- zypperpkg module ignores retcode 104 for search(). (bsc#1159670)
- Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding
  file or block disk. (bsc#1175987)
- Invalidate file list cache when cache file modified time is in the future. (bsc#1176397)
- Prevent import errors when running test_btrfs unit tests.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1159670">SUSE bug 1159670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175987">SUSE bug 1175987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176024">SUSE bug 1176024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176294">SUSE bug 1176294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176397">SUSE bug 1176397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177867">SUSE bug 1177867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493568" comment="python3-salt-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493569" comment="salt-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493570" comment="salt-bash-completion-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493571" comment="salt-doc-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493572" comment="salt-minion-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493573" comment="salt-zsh-completion-3000-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110077" version="1" class="patch">
	<metadata>
		<title>Security update for u-boot (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162198" ref_url="https://bugzilla.suse.com/1162198" source="BUGZILLA"/>
		<reference ref_id="1167209" ref_url="https://bugzilla.suse.com/1167209" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10648" ref_url="https://www.suse.com/security/cve/CVE-2020-10648/" source="CVE"/>
		<reference ref_id="CVE-2020-8432" ref_url="https://www.suse.com/security/cve/CVE-2020-8432/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007704.html" source="SUSE-SU"/>
		<description>
This update for u-boot fixes the following issues:

- CVE-2020-8432: Fixed a double free in the cmd/gpt.c do_rename_gpt_parts() function, which allowed an attacker to execute arbitrary code (bsc#1162198) 
- CVE-2020-10648: Fixed improper signature verification during verified boot (bsc#1167209).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1162198">SUSE bug 1162198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167209">SUSE bug 1167209</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10648/">CVE-2020-10648</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8432/">CVE-2020-8432</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493574" comment="u-boot-rpiarm64-2020.01-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493575" comment="u-boot-rpiarm64-doc-2020.01-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493576" comment="u-boot-tools-2020.01-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110078" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175204" ref_url="https://bugzilla.suse.com/1175204" source="BUGZILLA"/>
		<reference ref_id="1176908" ref_url="https://bugzilla.suse.com/1176908" source="BUGZILLA"/>
		<reference ref_id="1176909" ref_url="https://bugzilla.suse.com/1176909" source="BUGZILLA"/>
		<reference ref_id="1176910" ref_url="https://bugzilla.suse.com/1176910" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498/" source="CVE"/>
		<reference ref_id="CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862/" source="CVE"/>
		<reference ref_id="CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863/" source="CVE"/>
		<reference ref_id="CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 3.2.7:
  * CVE-2020-25863: MIME Multipart dissector crash (bsc#1176908)
  * CVE-2020-25862: TCP dissector crash (bsc#1176909)
  * CVE-2020-25866: BLIP dissector crash (bsc#1176910)
  * CVE-2020-17498: Kafka dissector crash (bsc#1175204)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175204">SUSE bug 1175204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176908">SUSE bug 1176908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176909">SUSE bug 1176909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176910">SUSE bug 1176910</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492777" comment="libwireshark13-3.2.7-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492778" comment="libwiretap10-3.2.7-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492779" comment="libwsutil11-3.2.7-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492780" comment="wireshark-3.2.7-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110079" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176116" ref_url="https://bugzilla.suse.com/1176116" source="BUGZILLA"/>
		<reference ref_id="1176256" ref_url="https://bugzilla.suse.com/1176256" source="BUGZILLA"/>
		<reference ref_id="1176257" ref_url="https://bugzilla.suse.com/1176257" source="BUGZILLA"/>
		<reference ref_id="1176258" ref_url="https://bugzilla.suse.com/1176258" source="BUGZILLA"/>
		<reference ref_id="1176259" ref_url="https://bugzilla.suse.com/1176259" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007741.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2020-15166: Fixed the possibility of unauthenticated clients causing a denial-of-service (bsc#1176116).
- Fixed a heap overflow when receiving malformed ZMTP v1 packets (bsc#1176256)
- Fixed a memory leak in client induced by malicious server(s) without CURVE/ZAP (bsc#1176257)
- Fixed memory leak when processing PUB messages with metadata (bsc#1176259)
- Fixed a stack overflow in PUB/XPUB subscription store (bsc#1176258)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176116">SUSE bug 1176116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176256">SUSE bug 1176256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176257">SUSE bug 1176257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176258">SUSE bug 1176258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176259">SUSE bug 1176259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492787" comment="libunwind-1.2.1-4.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492788" comment="libunwind-32bit-1.2.1-4.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492789" comment="libunwind-devel-1.2.1-4.2.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492790" comment="libzmq5-4.2.3-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492791" comment="libzmq5-32bit-4.2.3-3.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492792" comment="zeromq-devel-4.2.3-3.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110080" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1160790" ref_url="https://bugzilla.suse.com/1160790" source="BUGZILLA"/>
		<reference ref_id="1161088" ref_url="https://bugzilla.suse.com/1161088" source="BUGZILLA"/>
		<reference ref_id="1161089" ref_url="https://bugzilla.suse.com/1161089" source="BUGZILLA"/>
		<reference ref_id="1161670" ref_url="https://bugzilla.suse.com/1161670" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785/" source="CVE"/>
		<reference ref_id="CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786/" source="CVE"/>
		<reference ref_id="CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789/" source="CVE"/>
		<reference ref_id="CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<description>
This update for python-waitress to 1.4.3 fixes the following security issues:

- CVE-2019-16785: HTTP request smuggling through LF vs CRLF handling (bsc#1161088).
- CVE-2019-16786: HTTP request smuggling through invalid Transfer-Encoding (bsc#1161089).
- CVE-2019-16789: HTTP request smuggling through invalid whitespace characters (bsc#1160790).
- CVE-2019-16792: HTTP request smuggling by sending the Content-Length header twice (bsc#1161670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492793" comment="python3-waitress-1.4.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110081" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2020-November/016830.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Intel CPU Microcode updated to 20201027 pre-release 
- CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
- CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)

  # New Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  # Updated Platforms:
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493577" comment="ucode-intel-20201027-2.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110082" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493578" comment="kernel-default-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493579" comment="kernel-default-base-5.3.18-24.37.1.9.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493580" comment="kernel-default-devel-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493581" comment="kernel-devel-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493582" comment="kernel-macros-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493583" comment="kernel-preempt-5.3.18-24.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110083" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492803" comment="libldap-2_4-2-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492804" comment="libldap-2_4-2-32bit-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492805" comment="libldap-data-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492806" comment="openldap2-client-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492807" comment="openldap2-devel-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492808" comment="openldap2-devel-static-2.4.46-9.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110084" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178671" ref_url="https://bugzilla.suse.com/1178671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12321" ref_url="https://www.suse.com/security/cve/CVE-2020-12321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007778.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issue:

- CVE-2020-12321: Updated the Intel Bluetooth firmware for buffer overflow security bugs (bsc#1178671).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178671">SUSE bug 1178671</bugzilla>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12321/">CVE-2020-12321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492809" comment="kernel-firmware-20200107-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492810" comment="ucode-amd-20200107-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110085" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178466" ref_url="https://bugzilla.suse.com/1178466" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8037" ref_url="https://www.suse.com/security/cve/CVE-2020-8037/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007789.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2020-8037: Fixed an issue where PPP decapsulator did not allocate the right buffer size (bsc#1178466).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178466">SUSE bug 1178466</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-8037/">CVE-2020-8037</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492811" comment="tcpdump-4.9.2-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110086" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,
  bsc#1177943)
  * New features
    + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Other changes
    + JDK-6532025: GIF reader throws misleading exception with
      truncated images
    + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/
      /PDialogTest.java needs update by removing an infinite loop
    + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/
      /Test8017492.java fails
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed
    + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/
      /CloseServerSocket.java fails intermittently with Address
      already in use
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8172404: Tools should warn if weak algorithms are used
      before restricting them
    + JDK-8193367: Annotated type variable bounds crash javac
    + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java
      fails intermittently: Connection reset
    + JDK-8203026: java.rmi.NoSuchObjectException: no such object
      in table
    + JDK-8203281: [Windows] JComboBox change in ui when
      editor.setBorder() is called
    + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to
      resolve_wk_klass
    + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and
      JdbExprTest.sh fail due to timeout
    + JDK-8203928: [Test] Convert non-JDB scaffolding
      serviceability shell script tests to java
    + JDK-8204963: javax.swing.border.TitledBorder has a memory leak
    + JDK-8204994: SA might fail to attach to process with 'Windbg
      Error: WaitForEvent failed'
    + JDK-8205534: Remove SymbolTable dependency from
      serviceability agent
    + JDK-8206309: Tier1 SA tests fail
    + JDK-8208281: java/nio/channels/
      /AsynchronousSocketChannel/Basic.java timed out
    + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java
      version - step1
    + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh
      is incorrect
    + JDK-8209342: Problemlist SA tests on Solaris due to Error
      attaching to process: Can't create thread_db agent!
    + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java
      should be marked as headful
    + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with
      timeout
    + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java
      version - step2
    + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with
      ZGC
    + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java
    + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/
      /ap10t001/TestDescription.java failed with ObjectFree:
      GetCurrentThreadCpuTimerInfo returned unexpected error code
    + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java
      version - step3
    + JDK-8210527: JShell: NullPointerException in
      jdk.jshell.Eval.translateExceptionStack
    + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related
      tests
    + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails
      with waitForPrompt timed out after 60 seconds
    + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should
      clarify which output is the pending reply after a timeout
    + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java
      version - step4
    + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java
      fails to find ThreadLocalObject
    + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh
      test
    + JDK-8211694: JShell: Redeclared variable should be reset
    + JDK-8212200: assert when shared java.lang.Object is redefined
      by JVMTI agent
    + JDK-8212629: [TEST] wrong breakpoint in
      test/jdk/com/sun/jdi/DeferredStepTest
    + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)
      - unexpected. lastLine=52, minLine=52, maxLine=55
    + JDK-8212807: tools/jar/multiRelease/Basic.java times out
    + JDK-8213182: Minimal VM build failure after JDK-8212200
      (assert when shared java.lang.Object is redefined by JVMTI
      agent)
    + JDK-8213214: Set -Djava.io.tmpdir= when running tests
    + JDK-8213275: ReplaceCriticalClasses.java fails with
      jdk.internal.vm.PostVMInitHook not found
    + JDK-8213574: Deadlock in string table expansion when dumping
      lots of CDS classes
    + JDK-8213703: LambdaConversionException: Invalid receiver type
      not a subtype of implementation type interface
    + JDK-8214074: Ghash optimization using AVX instructions
    + JDK-8214491: Upgrade to JLine 3.9.0
    + JDK-8214797: TestJmapCoreMetaspace.java timed out
    + JDK-8215243: JShell tests failing intermitently with
      'Problem cleaning up the following threads:'
    + JDK-8215244: jdk/jshell/ToolBasicTest.java
      testHistoryReference failed
    + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash
      optimization using AVX instructions)
    + JDK-8215438: jshell tool: Ctrl-D causes EOF
    + JDK-8216021: RunTest.gmk might set concurrency level to 1 on
      Windows
    + JDK-8216974: HttpConnection not returned to the pool after
      204 response
    + JDK-8218948: SimpleDateFormat :: format - Zone Names are not
      reflected correctly during run time
    + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is
      too small on new Skylake CPUs
    + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs
      instead of aliased B&amp;W glyphs
    + JDK-8221658: aarch64: add necessary predicate for ubfx
      patterns
    + JDK-8221759: Crash when completing 'java.io.File.path'
    + JDK-8221918: runtime/SharedArchiveFile/serviceability/
      /ReplaceCriticalClasses.java fails: Shared archive not found
    + JDK-8222074: Enhance auto vectorization for x86
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely
      on hostname command
    + JDK-8223688: JShell: crash on the instantiation of raw
      anonymous class
    + JDK-8223777: In posix_spawn mode, failing to exec()
      jspawnhelper does not result in an error
    + JDK-8223940: Private key not supported by chosen signature
      algorithm
    + JDK-8224184: jshell got IOException at exiting with AIX
    + JDK-8224234: compiler/codegen/TestCharVect2.java fails in
      test_mulc
    + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws
      NullPointerException
    + JDK-8225625: AES Electronic Codebook (ECB) encryption and
      decryption optimization using AVX512 + VAES instructions
    + JDK-8226536: Catch OOM from deopt that fails rematerializing
      objects
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8227059: sun/security/tools/keytool/
      /DefaultSignatureAlgorithm.java timed out
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java
      fails due to 'exitValue = 6'
    + JDK-8228448: Jconsole can't connect to itself
    + JDK-8228967: Trust/Key store and SSL context utilities for
      tests
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8229815: Upgrade Jline to 3.12.1
    + JDK-8230000: some httpclients testng tests run zero test
    + JDK-8230002: javax/xml/jaxp/unittest/transform/
      /SecureProcessingTest.java runs zero test
    + JDK-8230010: Remove jdk8037819/BasicTest1.java
    + JDK-8230094: CCE in createXMLEventWriter(Result) over an
      arbitrary XMLStreamWriter
    + JDK-8230402: Allocation of compile task fails with assert:
      'Leaking compilation tasks?'
    + JDK-8230767: FlightRecorderListener returns null recording
    + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to
      test/jdk/java/util/zip/EntryCount64k.java
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231586: enlarge encoding space for OopMapValue offsets
    + JDK-8231953: Wrong assumption in assertion in
      oop::register_oop
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232083: Minimal VM is broken after JDK-8231586
    + JDK-8232161: Align some one-way conversion in MS950 charset
      with Windows
    + JDK-8232855: jshell missing word in /help help
    + JDK-8233027: OopMapSet::all_do does oms.next() twice during
      iteration
    + JDK-8233228: Disable weak named curves by default in TLS,
      CertPath, and Signed JAR
    + JDK-8233386: Initialize NULL fields for unused decorations
    + JDK-8233452: java.math.BigDecimal.sqrt() with
      RoundingMode.FLOOR results in incorrect result
    + JDK-8233686: XML transformer uses excessive amount of memory
    + JDK-8233741: AES Countermode (AES-CTR) optimization using
      AVX512 + VAES instructions
    + JDK-8233829: javac cannot find non-ASCII module name under
      non-UTF8 environment
    + JDK-8233958: Memory retention due to HttpsURLConnection
      finalizer that serves no purpose
    + JDK-8234011: (zipfs) Memory leak in
      ZipFileSystem.releaseDeflater()
    + JDK-8234058: runtime/CompressedOops/
      /CompressedClassPointers.java fails with 'Narrow klass base:
      0x0000000000000000' missing from stdout/stderr
    + JDK-8234149: Several regression tests do not dispose Frame at
      end
    + JDK-8234347: 'Turkey' meta time zone does not generate
      composed localized names
    + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/
      /bug6980209.java fails in linux nightly
    + JDK-8234535: Cross compilation fails due to missing CFLAGS
      for the BUILD_CC
    + JDK-8234541: C1 emits an empty message when it inlines
      successfully
    + JDK-8234687: change javap reporting on unknown attributes
    + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK
      11
    + JDK-8236548: Localized time zone name inconsistency between
      English and other locales
    + JDK-8236617: jtreg test containers/docker/
      /TestMemoryAwareness.java fails after 8226575
    + JDK-8237182: Update copyright header for shenandoah and
      epsilon files
    + JDK-8237888: security/infra/java/security/cert/
      /CertPathValidator/certification/LuxTrustCA.java fails when
      checking validity interval
    + JDK-8237977: Further update
      javax/net/ssl/compatibility/Compatibility.java
    + JDK-8238270: java.net HTTP/2 client does not decrease stream
      count when receives 204 response
    + JDK-8238284: [macos] Zero VM build fails due to an obvious
      typo
    + JDK-8238380: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c
      'multiple definition' link errors with GCC10
    + JDK-8238388: libj2gss/NativeFunc.o 'multiple definition' link
      errors with GCC10
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8238710: LingeredApp doesn't log stdout/stderr if exits
      with non-zero code
    + JDK-8239083: C1 assert(known_holder == NULL ||
      (known_holder-&gt;is_instance_klass() &amp;&amp;
      (!known_holder-&gt;is_interface() ||
      ((ciInstanceKlass*)known_holder)-&gt;has_nonstatic_concrete_methods())),
      'should be non-static concrete method');
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8240169: javadoc fails to link to non-modular api docs
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8240360: NativeLibraryEvent has wrong library name on
      Linux
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + JDK-8241065: Shenandoah: remove leftover code after
      JDK-8231086
    + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is
      failing on 32bit Windows
    + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:
      java.lang.NullPointerException
    + JDK-8241138: http.nonProxyHosts=* causes
      StringIndexOutOfBoundsException in DefaultProxySelector
    + JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark
    + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java
      fails with OOME
    + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8242184: CRL generation error with RSASSA-PSS
    + JDK-8242283: Can't start JVM when java home path includes
      non-ASCII character
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8243029: Rewrite javax/net/ssl/compatibility/
      /Compatibility.java with a flexible interop test framework
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8243389: enhance os::pd_print_cpu_info on linux
    + JDK-8243453: java --describe-module failed with non-ASCII
      module name under non-UTF8 environment
    + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on
      HiDPI screens (Windows)
    + JDK-8244087: 2020-04-24 public suffix list update
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8244164: AArch64: jaotc generates incorrect code for
      compressed OOPs with non-zero heap base
    + JDK-8244196: adjust output in os_linux
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8244287: JFR: Methods samples have line number 0
    + JDK-8244703: 'platform encoding not initialized' exceptions
      with debugger, JNI
    + JDK-8244719: CTW: C2 compilation fails with
      'assert(!VerifyHashTableKeys || _hash_lock == 0) failed:
      remove node from hash table before modifying it'
    + JDK-8244729: Shenandoah: remove resolve paths from
      SBSA::generate_shenandoah_lrb
    + JDK-8244763: Update --release 8 symbol information after JSR
      337 MR3
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8245151: jarsigner should not raise duplicate warnings on
      verification
    + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9
    + JDK-8245714: 'Bad graph detected in build_loop_late' when
      loads are pinned on loop limit check uncommon branch
    + JDK-8245801: StressRecompilation triggers assert 'redundunt
      OSR recompilation detected. memory leak in CodeCache!'
    + JDK-8245832: JDK build make-static-libs should build all JDK
      libraries
    + JDK-8245880: Shenandoah: check class unloading flag early in
      concurrent code root scan
    + JDK-8245981: Upgrade to jQuery 3.5.1
    + JDK-8246027: Minimal fastdebug build broken after JDK-8245801
    + JDK-8246094: [macos] Sound Recording and playback is not
      working
    + JDK-8246153: TestEliminateArrayCopy fails with
      -XX:+StressReflectiveCode
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
    + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest
      fails with AssertionError
    + JDK-8246203: Segmentation fault in verification due to stack
      overflow with -XX:+VerifyIterativeGVN
    + JDK-8246330: Add TLS Tests for Legacy ECDSA curves
    + JDK-8246453: TestClone crashes with 'all collected exceptions
      must come from the same place'
    + JDK-8247246: Add explicit ResolvedJavaType.link and expose
      presence of default methods
    + JDK-8247350: [aarch64] assert(false) failed: wrong size of
      mach node
    + JDK-8247502: PhaseStringOpts crashes while optimising
      effectively dead code
    + JDK-8247615: Initialize the bytes left for the heap sampler
    + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV
      in SBC2Support::pin_and_expand
    + JDK-8247874: Replacement in VersionProps.java.template not
      working when --with-vendor-bug-url contains '&amp;'
    + JDK-8247979: aarch64: missing side effect of killing flags
      for clearArray_reg_reg
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8248219: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield
    + JDK-8248348: Regression caused by the update to BCEL 6.0
    + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to
      jtreg 5.1
    + JDK-8248495: [macos] zerovm is broken due to libffi headers
      location
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8248987: AOT's Linker.java seems to eagerly fail-fast on
      Windows
    + JDK-8249159: Downport test rework for SSLSocketTemplate from
      8224650
    + JDK-8249215: JFrame::setVisible crashed with
      -Dfile.encoding=UTF-8 on Japanese Windows.
    + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is
      not highlighted in GTKLookAndFeel
    + JDK-8249255: Build fails if source code in cygwin home dir
    + JDK-8249277: TestVerifyIterativeGVN.java is failing with
      timeout in OpenJDK 11
    + JDK-8249278: Revert JDK-8226253 which breaks the spec of
      AccessibleState.SHOWING for JList
    + JDK-8249560: Shenandoah: Fix racy GC request handling
    + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle
    + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should
      account for corner cases
    + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when
      requesting TGS Kerberos tickets
    + JDK-8250609: C2 crash in IfNode::fold_compares
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8250755: Better cleanup for
      jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java
    + JDK-8250787: Provider.put no longer registering aliases in
      FIPS env
    + JDK-8250826: jhsdb does not work with coredump which comes
      from Substrate VM
    + JDK-8250827: Shenandoah: needs to reset/finish StringTable's
      dead count before/after parallel walk
    + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check
      the bounds
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java
      test failure
    + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with
      I-U
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251487: Shenandoah: missing detail timing tracking for
      final mark cleaning phase
    + JDK-8252120: compiler/oracle/TestCompileCommand.java
      misspells 'occured'
    + JDK-8252157: JDK-8231209 11u backport breaks jmm binary
      compatibility
    + JDK-8252258: [11u] JDK-8242154 changes the default vendor
    + JDK-8252804: [test] Fix 'ReleaseDeflater.java' test after
      downport of 8234011
    + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)
      in JDK 11
    + JDK-8253283: [11u] Test build/translations/
      /VerifyTranslations.java failing after JDK-8252258
    + JDK-8253813: Backout JDK-8244287 from 11u: it causes several
      crashes
    + Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*,
      bool)' introduced in jdk 11.0.9
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492812" comment="java-11-openjdk-11.0.9.0-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492813" comment="java-11-openjdk-demo-11.0.9.0-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492814" comment="java-11-openjdk-devel-11.0.9.0-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492815" comment="java-11-openjdk-headless-11.0.9.0-3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110087" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1173592" ref_url="https://bugzilla.suse.com/1173592" source="BUGZILLA"/>
		<reference ref_id="1173594" ref_url="https://bugzilla.suse.com/1173594" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="CVE-2020-8696" ref_url="https://www.suse.com/security/cve/CVE-2020-8696/" source="CVE"/>
		<reference ref_id="CVE-2020-8698" ref_url="https://www.suse.com/security/cve/CVE-2020-8698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007799.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

- Updated Intel CPU Microcode to 20201110 official release.
 - CVE-2020-8695: Fixed Intel RAPL sidechannel attack (SGX) (bsc#1170446)
 - CVE-2020-8698: Fixed Fast Store Forward Predictor INTEL-SA-00381 (bsc#1173594)
 - CVE-2020-8696: Vector Register Sampling Active INTEL-SA-00381 (bsc#1173592)

- Release notes:
  - Security updates for [INTEL-SA-00381](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381.html).
  - Security updates for [INTEL-SA-00389](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html).
  - Update for functional issues. Refer to [Second Generation Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
  - Update for functional issues. Refer to [Intel? Xeon? Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
  - Update for functional issues. Refer to [10th Gen Intel? Core™ Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
  - Update for functional issues. Refer to [8th and 9th Gen Intel? Core™ Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
  - Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel? Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
  - Update for functional issues. Refer to [6th Gen Intel? Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
  - Update for functional issues. Refer to [Intel? Xeon? E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

  ### New Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | CPX-SP         | A1       | 06-55-0b/bf |          | 0700001e | Xeon Scalable Gen3
  | LKF            | B2/B3    | 06-8a-01/10 |          | 00000028 | Core w/Hybrid Technology
  | TGL            | B1       | 06-8c-01/80 |          | 00000068 | Core Gen11 Mobile
  | CML-H          | R1       | 06-a5-02/20 |          | 000000e0 | Core Gen10 Mobile
  | CML-S62        | G1       | 06-a5-03/22 |          | 000000e0 | Core Gen10
  | CML-S102       | Q0       | 06-a5-05/22 |          | 000000e0 | Core Gen10 
  | CML-U62 V2     | K0       | 06-a6-01/80 |          | 000000e0 | Core Gen10 Mobile
  ### Updated Platforms
  | Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
  |:---------------|:---------|:------------|:---------|:---------|:---------
  | HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000043 | 00000044 | Core Gen4 X series; Xeon E5 v3
  | SKL-U/Y        | D0       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKL-U23e       | K1       | 06-4e-03/c0 | 000000d6 | 000000e2 | Core Gen6 Mobile
  | SKX-SP         | B1       | 06-55-03/97 | 01000157 | 01000159 | Xeon Scalable
  | SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006906 | 02006a08 | Xeon Scalable
  | SKX-D          | M1       | 06-55-04/b7 | 02006906 | 02006a08 | Xeon D-21xx
  | CLX-SP         | B0       | 06-55-06/bf | 04002f01 | 04003003 | Xeon Scalable Gen2
  | CLX-SP         | B1       | 06-55-07/bf | 05002f01 | 05003003 | Xeon Scalable Gen2
  | APL            | D0       | 06-5c-09/03 | 00000038 | 00000040 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
  | APL            | E0       | 06-5c-0a/03 | 00000016 | 0000001e | Atom x5-E39xx
  | SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000d6 | 000000e2 | Core Gen6; Xeon E3 v5
  | GKL-R          | R0       | 06-7a-08/01 | 00000016 | 00000018 | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
  | ICL-U/Y        | D1       | 06-7e-05/80 | 00000078 | 000000a0 | Core Gen10 Mobile
  | AML-Y22        | H0       | 06-8e-09/10 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-U/Y        | H0       | 06-8e-09/c0 | 000000d6 | 000000de | Core Gen7 Mobile
  | CFL-U43e       | D0       | 06-8e-0a/c0 | 000000d6 | 000000e0 | Core Gen8 Mobile
  | WHL-U          | W0       | 06-8e-0b/d0 | 000000d6 | 000000de | Core Gen8 Mobile
  | AML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | CML-Y42        | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen10 Mobile
  | WHL-U          | V0       | 06-8e-0c/94 | 000000d6 | 000000de | Core Gen8 Mobile
  | KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000d6 | 000000de | Core Gen7; Xeon E3 v6
  | CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000d6 | 000000de | Core Gen8 Desktop, Mobile, Xeon E
  | CFL-S          | B0       | 06-9e-0b/02 | 000000d6 | 000000de | Core Gen8
  | CFL-H/S        | P0       | 06-9e-0c/22 | 000000d6 | 000000de | Core Gen9
  | CFL-H          | R0       | 06-9e-0d/22 | 000000d6 | 000000de | Core Gen9 Mobile
  | CML-U62        | A0       | 06-a6-00/80 | 000000ca | 000000e0 | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173592">SUSE bug 1173592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173594">SUSE bug 1173594</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8696/">CVE-2020-8696</cve>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8698/">CVE-2020-8698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493584" comment="ucode-intel-20201110-2.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110088" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177406" ref_url="https://bugzilla.suse.com/1177406" source="BUGZILLA"/>
		<reference ref_id="1178291" ref_url="https://bugzilla.suse.com/1178291" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575/" source="CVE"/>
		<reference ref_id="CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- wireshark was updated to 3.2.8:
  - CVE-2020-26575: Fixed an issue where FBZERO dissector was entering in infinite loop (bsc#1177406)
  - CVE-2020-28030: Fixed an issue where GQUIC dissector was crashing (bsc#1178291)
  * Infinite memory allocation while parsing this tcp packet
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177406">SUSE bug 1177406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178291">SUSE bug 1178291</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492817" comment="libwireshark13-3.2.8-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492818" comment="libwiretap10-3.2.8-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492819" comment="libwsutil11-3.2.8-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492820" comment="wireshark-3.2.8-3.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110089" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492821" comment="krb5-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492822" comment="krb5-32bit-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492823" comment="krb5-client-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492824" comment="krb5-devel-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492825" comment="krb5-plugin-preauth-otp-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492826" comment="krb5-plugin-preauth-pkinit-1.16.3-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110090" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1131644" ref_url="https://bugzilla.suse.com/1131644" source="BUGZILLA"/>
		<reference ref_id="1131868" ref_url="https://bugzilla.suse.com/1131868" source="BUGZILLA"/>
		<reference ref_id="1131870" ref_url="https://bugzilla.suse.com/1131870" source="BUGZILLA"/>
		<reference ref_id="1131871" ref_url="https://bugzilla.suse.com/1131871" source="BUGZILLA"/>
		<reference ref_id="1131872" ref_url="https://bugzilla.suse.com/1131872" source="BUGZILLA"/>
		<reference ref_id="1131874" ref_url="https://bugzilla.suse.com/1131874" source="BUGZILLA"/>
		<reference ref_id="1133640" ref_url="https://bugzilla.suse.com/1133640" source="BUGZILLA"/>
		<reference ref_id="1144443" ref_url="https://bugzilla.suse.com/1144443" source="BUGZILLA"/>
		<reference ref_id="1150934" ref_url="https://bugzilla.suse.com/1150934" source="BUGZILLA"/>
		<reference ref_id="1156920" ref_url="https://bugzilla.suse.com/1156920" source="BUGZILLA"/>
		<reference ref_id="1166933" ref_url="https://bugzilla.suse.com/1166933" source="BUGZILLA"/>
		<reference ref_id="1167331" ref_url="https://bugzilla.suse.com/1167331" source="BUGZILLA"/>
		<reference ref_id="930077" ref_url="https://bugzilla.suse.com/930077" source="BUGZILLA"/>
		<reference ref_id="930078" ref_url="https://bugzilla.suse.com/930078" source="BUGZILLA"/>
		<reference ref_id="930079" ref_url="https://bugzilla.suse.com/930079" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-4141" ref_url="https://www.suse.com/security/cve/CVE-2015-4141/" source="CVE"/>
		<reference ref_id="CVE-2015-4142" ref_url="https://www.suse.com/security/cve/CVE-2015-4142/" source="CVE"/>
		<reference ref_id="CVE-2015-4143" ref_url="https://www.suse.com/security/cve/CVE-2015-4143/" source="CVE"/>
		<reference ref_id="CVE-2015-8041" ref_url="https://www.suse.com/security/cve/CVE-2015-8041/" source="CVE"/>
		<reference ref_id="CVE-2017-13077" ref_url="https://www.suse.com/security/cve/CVE-2017-13077/" source="CVE"/>
		<reference ref_id="CVE-2017-13078" ref_url="https://www.suse.com/security/cve/CVE-2017-13078/" source="CVE"/>
		<reference ref_id="CVE-2017-13079" ref_url="https://www.suse.com/security/cve/CVE-2017-13079/" source="CVE"/>
		<reference ref_id="CVE-2017-13080" ref_url="https://www.suse.com/security/cve/CVE-2017-13080/" source="CVE"/>
		<reference ref_id="CVE-2017-13081" ref_url="https://www.suse.com/security/cve/CVE-2017-13081/" source="CVE"/>
		<reference ref_id="CVE-2017-13082" ref_url="https://www.suse.com/security/cve/CVE-2017-13082/" source="CVE"/>
		<reference ref_id="CVE-2017-13086" ref_url="https://www.suse.com/security/cve/CVE-2017-13086/" source="CVE"/>
		<reference ref_id="CVE-2017-13087" ref_url="https://www.suse.com/security/cve/CVE-2017-13087/" source="CVE"/>
		<reference ref_id="CVE-2017-13088" ref_url="https://www.suse.com/security/cve/CVE-2017-13088/" source="CVE"/>
		<reference ref_id="CVE-2018-14526" ref_url="https://www.suse.com/security/cve/CVE-2018-14526/" source="CVE"/>
		<reference ref_id="CVE-2019-11555" ref_url="https://www.suse.com/security/cve/CVE-2019-11555/" source="CVE"/>
		<reference ref_id="CVE-2019-13377" ref_url="https://www.suse.com/security/cve/CVE-2019-13377/" source="CVE"/>
		<reference ref_id="CVE-2019-16275" ref_url="https://www.suse.com/security/cve/CVE-2019-16275/" source="CVE"/>
		<reference ref_id="CVE-2019-9494" ref_url="https://www.suse.com/security/cve/CVE-2019-9494/" source="CVE"/>
		<reference ref_id="CVE-2019-9495" ref_url="https://www.suse.com/security/cve/CVE-2019-9495/" source="CVE"/>
		<reference ref_id="CVE-2019-9497" ref_url="https://www.suse.com/security/cve/CVE-2019-9497/" source="CVE"/>
		<reference ref_id="CVE-2019-9498" ref_url="https://www.suse.com/security/cve/CVE-2019-9498/" source="CVE"/>
		<reference ref_id="CVE-2019-9499" ref_url="https://www.suse.com/security/cve/CVE-2019-9499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007800.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

Security issue fixed:

- CVE-2019-16275: Fixed an AP mode PMF disconnection protection bypass (bsc#1150934).

Non-security issues fixed:

- Enable SAE support (jsc#SLE-14992).
- Limit P2P_DEVICE name to appropriate ifname size.
- Fix wicked wlan (bsc#1156920)
- Restore fi.epitest.hostap.WPASupplicant.service (bsc#1167331)
- With v2.9 fi.epitest.hostap.WPASupplicant.service is obsolete (bsc#1167331)
- Fix WLAN config on boot with wicked. (bsc#1166933)
- Update to 2.9 release:
   * SAE changes
     - disable use of groups using Brainpool curves
     - improved protection against side channel attacks
     [https://w1.fi/security/2019-6/]
   * EAP-pwd changes
     - disable use of groups using Brainpool curves
     - allow the set of groups to be configured (eap_pwd_groups)
     - improved protection against side channel attacks
     [https://w1.fi/security/2019-6/]
   * fixed FT-EAP initial mobility domain association using PMKSA caching
     (disabled by default for backwards compatibility; can be enabled
     with ft_eap_pmksa_caching=1)
   * fixed a regression in OpenSSL 1.1+ engine loading
   * added validation of RSNE in (Re)Association Response frames
   * fixed DPP bootstrapping URI parser of channel list
   * extended EAP-SIM/AKA fast re-authentication to allow use with FILS
   * extended ca_cert_blob to support PEM format
   * improved robustness of P2P Action frame scheduling
   * added support for EAP-SIM/AKA using anonymous@realm identity
   * fixed Hotspot 2.0 credential selection based on roaming consortium
     to ignore credentials without a specific EAP method
   * added experimental support for EAP-TEAP peer (RFC 7170)
   * added experimental support for EAP-TLS peer with TLS v1.3
   * fixed a regression in WMM parameter configuration for a TDLS peer
   * fixed a regression in operation with drivers that offload 802.1X
     4-way handshake
   * fixed an ECDH operation corner case with OpenSSL
   * SAE changes
     - added support for SAE Password Identifier
     - changed default configuration to enable only groups 19, 20, 21
       (i.e., disable groups 25 and 26) and disable all unsuitable groups
       completely based on REVmd changes
     - do not regenerate PWE unnecessarily when the AP uses the
       anti-clogging token mechanisms
     - fixed some association cases where both SAE and FT-SAE were enabled
       on both the station and the selected AP
     - started to prefer FT-SAE over SAE AKM if both are enabled
     - started to prefer FT-SAE over FT-PSK if both are enabled
     - fixed FT-SAE when SAE PMKSA caching is used
     - reject use of unsuitable groups based on new implementation guidance
       in REVmd (allow only FFC groups with prime &gt;= 3072 bits and ECC
       groups with prime &gt;= 256)
     - minimize timing and memory use differences in PWE derivation
       [https://w1.fi/security/2019-1/] (CVE-2019-9494, bsc#1131868)
   * EAP-pwd changes
     - minimize timing and memory use differences in PWE derivation
       [https://w1.fi/security/2019-2/] (CVE-2019-9495, bsc#1131870)
     - verify server scalar/element
       [https://w1.fi/security/2019-4/] (CVE-2019-9497, CVE-2019-9498,
       CVE-2019-9499, bsc#1131874, bsc#1131872, bsc#1131871, bsc#1131644)
     - fix message reassembly issue with unexpected fragment
       [https://w1.fi/security/2019-5/] (CVE-2019-11555, bsc#1133640)
     - enforce rand,mask generation rules more strictly
     - fix a memory leak in PWE derivation
     - disallow ECC groups with a prime under 256 bits (groups 25, 26, and
       27)
     - SAE/EAP-pwd side-channel attack update
       [https://w1.fi/security/2019-6/] (CVE-2019-13377, bsc#1144443)
   * fixed CONFIG_IEEE80211R=y (FT) build without CONFIG_FILS=y
   * Hotspot 2.0 changes
     - do not indicate release number that is higher than the one
       AP supports
     - added support for release number 3
     - enable PMF automatically for network profiles created from
       credentials
   * fixed OWE network profile saving
   * fixed DPP network profile saving
   * added support for RSN operating channel validation
     (CONFIG_OCV=y and network profile parameter ocv=1)
   * added Multi-AP backhaul STA support
   * fixed build with LibreSSL
   * number of MKA/MACsec fixes and extensions
   * extended domain_match and domain_suffix_match to allow list of values
   * fixed dNSName matching in domain_match and domain_suffix_match when
     using wolfSSL
   * started to prefer FT-EAP-SHA384 over WPA-EAP-SUITE-B-192 AKM if both
     are enabled
   * extended nl80211 Connect and external authentication to support
     SAE, FT-SAE, FT-EAP-SHA384
   * fixed KEK2 derivation for FILS+FT
   * extended client_cert file to allow loading of a chain of PEM
     encoded certificates
   * extended beacon reporting functionality
   * extended D-Bus interface with number of new properties
   * fixed a regression in FT-over-DS with mac80211-based drivers
   * OpenSSL: allow systemwide policies to be overridden
   * extended driver flags indication for separate 802.1X and PSK
     4-way handshake offload capability
   * added support for random P2P Device/Interface Address use
   * extended PEAP to derive EMSK to enable use with ERP/FILS
   * extended WPS to allow SAE configuration to be added automatically
     for PSK (wps_cred_add_sae=1)
   * removed support for the old D-Bus interface (CONFIG_CTRL_IFACE_DBUS)
   * extended domain_match and domain_suffix_match to allow list of values
   * added a RSN workaround for misbehaving PMF APs that advertise
     IGTK/BIP KeyID using incorrect byte order
   * fixed PTK rekeying with FILS and FT
   * fixed WPA packet number reuse with replayed messages and key
     reinstallation
     [https://w1.fi/security/2017-1/] (CVE-2017-13077, CVE-2017-13078,
     CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082,
     CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)
   * fixed unauthenticated EAPOL-Key decryption in wpa_supplicant
     [https://w1.fi/security/2018-1/] (CVE-2018-14526)
   * added support for FILS (IEEE 802.11ai) shared key authentication
   * added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
     and transition mode defined by WFA)
   * added support for DPP (Wi-Fi Device Provisioning Protocol)
   * added support for RSA 3k key case with Suite B 192-bit level
   * fixed Suite B PMKSA caching not to update PMKID during each 4-way
     handshake
   * fixed EAP-pwd pre-processing with PasswordHashHash
   * added EAP-pwd client support for salted passwords
   * fixed a regression in TDLS prohibited bit validation
   * started to use estimated throughput to avoid undesired signal
     strength based roaming decision
   * MACsec/MKA:
     - new macsec_linux driver interface support for the Linux
       kernel macsec module
     - number of fixes and extensions
   * added support for external persistent storage of PMKSA cache
     (PMKSA_GET/PMKSA_ADD control interface commands; and
      MESH_PMKSA_GET/MESH_PMKSA_SET for the mesh case)
   * fixed mesh channel configuration pri/sec switch case
   * added support for beacon report
   * large number of other fixes, cleanup, and extensions
   * added support for randomizing local address for GAS queries
     (gas_rand_mac_addr parameter)
   * fixed EAP-SIM/AKA/AKA' ext auth cases within TLS tunnel
   * added option for using random WPS UUID (auto_uuid=1)
   * added SHA256-hash support for OCSP certificate matching
   * fixed EAP-AKA' to add AT_KDF into Synchronization-Failure
   * fixed a regression in RSN pre-authentication candidate selection
   * added option to configure allowed group management cipher suites
     (group_mgmt network profile parameter)
   * removed all PeerKey functionality
   * fixed nl80211 AP and mesh mode configuration regression with
     Linux 4.15 and newer
   * added ap_isolate configuration option for AP mode
   * added support for nl80211 to offload 4-way handshake into the driver
   * added support for using wolfSSL cryptographic library
   * SAE
     - added support for configuring SAE password separately of the
       WPA2 PSK/passphrase
     - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection
       for SAE;
       note: this is not backwards compatible, i.e., both the AP and
       station side implementations will need to be update at the same
       time to maintain interoperability
     - added support for Password Identifier
     - fixed FT-SAE PMKID matching
   * Hotspot 2.0
     - added support for fetching of Operator Icon Metadata ANQP-element
     - added support for Roaming Consortium Selection element
     - added support for Terms and Conditions
     - added support for OSEN connection in a shared RSN BSS
     - added support for fetching Venue URL information
   * added support for using OpenSSL 1.1.1
   * FT
     - disabled PMKSA caching with FT since it is not fully functional
     - added support for SHA384 based AKM
     - added support for BIP ciphers BIP-CMAC-256, BIP-GMAC-128,
       BIP-GMAC-256 in addition to previously supported BIP-CMAC-128
     - fixed additional IE inclusion in Reassociation Request frame when
       using FT protocol

- Changed service-files for start after network (systemd-networkd).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1131644">SUSE bug 1131644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131868">SUSE bug 1131868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131870">SUSE bug 1131870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131871">SUSE bug 1131871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131872">SUSE bug 1131872</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131874">SUSE bug 1131874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133640">SUSE bug 1133640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144443">SUSE bug 1144443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1150934">SUSE bug 1150934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156920">SUSE bug 1156920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166933">SUSE bug 1166933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167331">SUSE bug 1167331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930077">SUSE bug 930077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930078">SUSE bug 930078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/930079">SUSE bug 930079</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4141/">CVE-2015-4141</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4142/">CVE-2015-4142</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2015-4143/">CVE-2015-4143</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2015-8041/">CVE-2015-8041</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13077/">CVE-2017-13077</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13078/">CVE-2017-13078</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13079/">CVE-2017-13079</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13080/">CVE-2017-13080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13081/">CVE-2017-13081</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13082/">CVE-2017-13082</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13086/">CVE-2017-13086</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13087/">CVE-2017-13087</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2017-13088/">CVE-2017-13088</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-14526/">CVE-2018-14526</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11555/">CVE-2019-11555</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13377/">CVE-2019-13377</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-16275/">CVE-2019-16275</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-9494/">CVE-2019-9494</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9495/">CVE-2019-9495</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9497/">CVE-2019-9497</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9498/">CVE-2019-9498</cve>
	<cve impact="important" cvss3="6.8/CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-9499/">CVE-2019-9499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492827" comment="wpa_supplicant-2.9-4.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110091" version="1" class="patch">
	<metadata>
		<title>Security update for perl-DBI (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176492" ref_url="https://bugzilla.suse.com/1176492" source="BUGZILLA"/>
		<reference ref_id="CVE-2014-10401" ref_url="https://www.suse.com/security/cve/CVE-2014-10401/" source="CVE"/>
		<reference ref_id="CVE-2014-10402" ref_url="https://www.suse.com/security/cve/CVE-2014-10402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007795.html" source="SUSE-SU"/>
		<description>
This update for perl-DBI fixes the following issues:

- DBD::File drivers can open files from folders other than those
  specifically passed via the f_dir attribute in the data source
  name (DSN). [bsc#1176492, CVE-2014-10401, CVE-2014-10402]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176492">SUSE bug 1176492</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2014-10401/">CVE-2014-10401</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2014-10402/">CVE-2014-10402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493585" comment="perl-DBI-1.642-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110092" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1177950" ref_url="https://bugzilla.suse.com/1177950" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issue fixed:

- CVE-2020-28368: Fixed the Intel RAPL sidechannel attack, aka PLATYPUS attack, aka XSA-351 (bsc#1178591).

Non-security issues fixed:

- Updated to Xen 4.13.2 bug fix release (bsc#1027519).
- Fixed a panic during MSI cleanup on AMD hardware (bsc#1027519).
- Adjusted help for --max_iters, default is 5 (bsc#1177950).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177950">SUSE bug 1177950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493586" comment="xen-libs-4.13.2_02-3.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493587" comment="xen-tools-domU-4.13.2_02-3.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110093" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- Upgrade to version 12.5:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * Fix recently-added timetz test case so it works when the USA
    is not observing daylight savings time.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/12/release-12-5.html

- Stop building the mini and lib packages as they are now coming
  from postgresql13.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493588" comment="libpq5-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493589" comment="libpq5-32bit-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493590" comment="postgresql12-12.5-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110094" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1163764" ref_url="https://bugzilla.suse.com/1163764" source="BUGZILLA"/>
		<reference ref_id="1170200" ref_url="https://bugzilla.suse.com/1170200" source="BUGZILLA"/>
		<reference ref_id="1170498" ref_url="https://bugzilla.suse.com/1170498" source="BUGZILLA"/>
		<reference ref_id="1173079" ref_url="https://bugzilla.suse.com/1173079" source="BUGZILLA"/>
		<reference ref_id="1174466" ref_url="https://bugzilla.suse.com/1174466" source="BUGZILLA"/>
		<reference ref_id="1174529" ref_url="https://bugzilla.suse.com/1174529" source="BUGZILLA"/>
		<reference ref_id="1174644" ref_url="https://bugzilla.suse.com/1174644" source="BUGZILLA"/>
		<reference ref_id="1175120" ref_url="https://bugzilla.suse.com/1175120" source="BUGZILLA"/>
		<reference ref_id="1175161" ref_url="https://bugzilla.suse.com/1175161" source="BUGZILLA"/>
		<reference ref_id="1175169" ref_url="https://bugzilla.suse.com/1175169" source="BUGZILLA"/>
		<reference ref_id="1176451" ref_url="https://bugzilla.suse.com/1176451" source="BUGZILLA"/>
		<reference ref_id="1176499" ref_url="https://bugzilla.suse.com/1176499" source="BUGZILLA"/>
		<reference ref_id="1176638" ref_url="https://bugzilla.suse.com/1176638" source="BUGZILLA"/>
		<reference ref_id="1177078" ref_url="https://bugzilla.suse.com/1177078" source="BUGZILLA"/>
		<reference ref_id="1177151" ref_url="https://bugzilla.suse.com/1177151" source="BUGZILLA"/>
		<reference ref_id="1177319" ref_url="https://bugzilla.suse.com/1177319" source="BUGZILLA"/>
		<reference ref_id="1177344" ref_url="https://bugzilla.suse.com/1177344" source="BUGZILLA"/>
		<reference ref_id="1177450" ref_url="https://bugzilla.suse.com/1177450" source="BUGZILLA"/>
		<reference ref_id="1177643" ref_url="https://bugzilla.suse.com/1177643" source="BUGZILLA"/>
		<reference ref_id="1177676" ref_url="https://bugzilla.suse.com/1177676" source="BUGZILLA"/>
		<reference ref_id="1177843" ref_url="https://bugzilla.suse.com/1177843" source="BUGZILLA"/>
		<reference ref_id="1177933" ref_url="https://bugzilla.suse.com/1177933" source="BUGZILLA"/>
		<reference ref_id="1178073" ref_url="https://bugzilla.suse.com/1178073" source="BUGZILLA"/>
		<reference ref_id="1178531" ref_url="https://bugzilla.suse.com/1178531" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25660" ref_url="https://www.suse.com/security/cve/CVE-2020-25660/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007834.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- CVE-2020-25660: Bring back CEPHX_V2 authorizer challenges (bsc#1177843).
- Added --container-init feature (bsc#1177319, bsc#1163764)
- Made journald as the logdriver again (bsc#1177933)
- Fixes a condition check for copy_tree, copy_files, and move_files in cephadm (bsc#1177676)
- Fixed a bug where device_health_metrics pool gets created even without any OSDs in the cluster (bsc#1173079)
- Log cephadm output /var/log/ceph/cephadm.log (bsc#1174644)
- Fixed a bug where the orchestrator didn't come up anymore after the deletion of OSDs (bsc#1176499)
- Fixed a bug where cephadm fails to deploy all OSDs and gets stuck (bsc#1177450)
- python-common will no longer skip unavailable disks (bsc#1177151)
- Added snap-schedule module (jsc#SES-704)
- Updated the SES7 downstream branding (bsc#1175120, bsc#1175161, bsc#1175169, bsc#1170498)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163764">SUSE bug 1163764</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170200">SUSE bug 1170200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170498">SUSE bug 1170498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173079">SUSE bug 1173079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174466">SUSE bug 1174466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174529">SUSE bug 1174529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174644">SUSE bug 1174644</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175120">SUSE bug 1175120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175161">SUSE bug 1175161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175169">SUSE bug 1175169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176451">SUSE bug 1176451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176499">SUSE bug 1176499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176638">SUSE bug 1176638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177078">SUSE bug 1177078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177151">SUSE bug 1177151</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177319">SUSE bug 1177319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177344">SUSE bug 1177344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177450">SUSE bug 1177450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177643">SUSE bug 1177643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177676">SUSE bug 1177676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177843">SUSE bug 1177843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177933">SUSE bug 1177933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178073">SUSE bug 1178073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178531">SUSE bug 1178531</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25660/">CVE-2020-25660</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493591" comment="ceph-common-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493592" comment="libcephfs-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493593" comment="libcephfs2-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493594" comment="librados-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493595" comment="librados2-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493596" comment="libradospp-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493597" comment="librbd-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493598" comment="librbd1-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493599" comment="librgw-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493600" comment="librgw2-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493601" comment="python3-ceph-argparse-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493602" comment="python3-ceph-common-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493603" comment="python3-cephfs-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493604" comment="python3-rados-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493605" comment="python3-rbd-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493606" comment="python3-rgw-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493607" comment="rados-objclass-devel-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493608" comment="rbd-nbd-15.2.5.667+g1a579d5bf2-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110095" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * Fix recently-added timetz test case so it works when the USA
    is not observing daylight savings time.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492892" comment="postgresql10-10.15-8.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110096" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178882" ref_url="https://bugzilla.suse.com/1178882" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007840.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

- Version update to 1.17.0
  * CVE-2020-8277: Fixed a Denial of Service through DNS request (bsc#1178882)
  * For further details see https://c-ares.haxx.se/changelog.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-23"/>
	<updated date="2020-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492893" comment="c-ares-devel-1.17.0-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492894" comment="libcares2-1.17.0-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110097" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175596" ref_url="https://bugzilla.suse.com/1175596" source="BUGZILLA"/>
		<reference ref_id="1177472" ref_url="https://bugzilla.suse.com/1177472" source="BUGZILLA"/>
		<reference ref_id="1178428" ref_url="https://bugzilla.suse.com/1178428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<description>
This update for mariadb and mariadb-connector-c fixes the following issues:

- Update mariadb to 10.2.36 GA [bsc#1177472, bsc#1178428] fixing for the 
  following security vulnerabilities:
    CVE-2020-14812, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789 CVE-2020-15180

- Update mariadb-connector-c to 3.1.11 [bsc#1177472 and bsc#1178428]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175596">SUSE bug 1175596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492895" comment="libmariadb3-3.1.11-3.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492896" comment="libmariadbprivate-3.1.11-3.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110098" version="1" class="patch">
	<metadata>
		<title>Security update for libssh2_org (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1130103" ref_url="https://bugzilla.suse.com/1130103" source="BUGZILLA"/>
		<reference ref_id="1178083" ref_url="https://bugzilla.suse.com/1178083" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17498" ref_url="https://www.suse.com/security/cve/CVE-2019-17498/" source="CVE"/>
		<reference ref_id="CVE-2019-3855" ref_url="https://www.suse.com/security/cve/CVE-2019-3855/" source="CVE"/>
		<reference ref_id="CVE-2019-3856" ref_url="https://www.suse.com/security/cve/CVE-2019-3856/" source="CVE"/>
		<reference ref_id="CVE-2019-3857" ref_url="https://www.suse.com/security/cve/CVE-2019-3857/" source="CVE"/>
		<reference ref_id="CVE-2019-3858" ref_url="https://www.suse.com/security/cve/CVE-2019-3858/" source="CVE"/>
		<reference ref_id="CVE-2019-3859" ref_url="https://www.suse.com/security/cve/CVE-2019-3859/" source="CVE"/>
		<reference ref_id="CVE-2019-3860" ref_url="https://www.suse.com/security/cve/CVE-2019-3860/" source="CVE"/>
		<reference ref_id="CVE-2019-3861" ref_url="https://www.suse.com/security/cve/CVE-2019-3861/" source="CVE"/>
		<reference ref_id="CVE-2019-3862" ref_url="https://www.suse.com/security/cve/CVE-2019-3862/" source="CVE"/>
		<reference ref_id="CVE-2019-3863" ref_url="https://www.suse.com/security/cve/CVE-2019-3863/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007887.html" source="SUSE-SU"/>
		<description>
This update for libssh2_org fixes the following issues:

- Version update to 1.9.0: [bsc#1178083, jsc#SLE-16922]
   Enhancements and bugfixes:
    * adds ECDSA keys and host key support when using OpenSSL
    * adds ED25519 key and host key support when using OpenSSL 1.1.1
    * adds OpenSSH style key file reading
    * adds AES CTR mode support when using WinCNG
    * adds PEM passphrase protected file support for Libgcrypt and WinCNG
    * adds SHA256 hostkey fingerprint
    * adds libssh2_agent_get_identity_path() and libssh2_agent_set_identity_path()
    * adds explicit zeroing of sensitive data in memory
    * adds additional bounds checks to network buffer reads
    * adds the ability to use the server default permissions when creating sftp directories
    * adds support for building with OpenSSL no engine flag
    * adds support for building with LibreSSL
    * increased sftp packet size to 256k
    * fixed oversized packet handling in sftp
    * fixed building with OpenSSL 1.1
    * fixed a possible crash if sftp stat gets an unexpected response
    * fixed incorrect parsing of the KEX preference string value
    * fixed conditional RSA and AES-CTR support
    * fixed a small memory leak during the key exchange process
    * fixed a possible memory leak of the ssh banner string
    * fixed various small memory leaks in the backends
    * fixed possible out of bounds read when parsing public keys from the server
    * fixed possible out of bounds read when parsing invalid PEM files
    * no longer null terminates the scp remote exec command
    * now handle errors when diffie hellman key pair generation fails
    * improved building instructions
    * improved unit tests

- Version update to 1.8.2: [bsc#1130103]
   Bug fixes:
    * Fixed the misapplied userauth patch that broke 1.8.1
    * moved the MAX size declarations from the public header		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-27"/>
	<updated date="2020-11-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1130103">SUSE bug 1130103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178083">SUSE bug 1178083</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17498/">CVE-2019-17498</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3855/">CVE-2019-3855</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3856/">CVE-2019-3856</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3857/">CVE-2019-3857</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3858/">CVE-2019-3858</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3859/">CVE-2019-3859</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3860/">CVE-2019-3860</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-3861/">CVE-2019-3861</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3862/">CVE-2019-3862</cve>
	<cve impact="moderate" cvss3="3.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-3863/">CVE-2019-3863</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492903" comment="libssh2-1-1.9.0-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492904" comment="libssh2-1-32bit-1.9.0-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492905" comment="libssh2-devel-1.9.0-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110099" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:
  
- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492906" comment="python3-pip-10.0.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110100" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492907" comment="python3-setuptools-40.5.0-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110101" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179035" ref_url="https://bugzilla.suse.com/1179035" source="BUGZILLA"/>
		<reference ref_id="1179113" ref_url="https://bugzilla.suse.com/1179113" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28896" ref_url="https://www.suse.com/security/cve/CVE-2020-28896/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007891.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2020-28896: incomplete connection termination could lead to sending credentials over unencrypted connections (bsc#1179035)
- Avoid that message with a million tiny parts can freeze MUA for several minutes (bsc#1179113)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179035">SUSE bug 1179035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179113">SUSE bug 1179113</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28896/">CVE-2020-28896</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492908" comment="mutt-1.10.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492909" comment="mutt-doc-1.10.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492910" comment="mutt-lang-1.10.1-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110102" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493609" comment="xorg-x11-server-1.20.3-22.5.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493610" comment="xorg-x11-server-extra-1.20.3-22.5.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110103" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
 		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493611" comment="python3-cryptography-2.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110104" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1179193" ref_url="https://bugzilla.suse.com/1179193" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.6.12 (bsc#1179193), including:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179193">SUSE bug 1179193</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492913" comment="libpython3_6m1_0-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492914" comment="python3-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492915" comment="python3-base-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492916" comment="python3-curses-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492917" comment="python3-dbm-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492918" comment="python3-devel-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492919" comment="python3-idle-3.6.12-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492921" comment="python3-tk-3.6.12-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110105" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492922" comment="libpython2_7-1_0-2.7.17-7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492923" comment="python-2.7.17-7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492924" comment="python-base-2.7.17-7.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110106" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493612" comment="xen-libs-4.13.2_04-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493613" comment="xen-tools-domU-4.13.2_04-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110107" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007947.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:
	  
- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493614" comment="libopenssl-1_1-devel-1.1.1d-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493615" comment="libopenssl1_1-1.1.1d-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493616" comment="libopenssl1_1-32bit-1.1.1d-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493617" comment="libopenssl1_1-hmac-1.1.1d-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493618" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493619" comment="openssl-1_1-1.1.1d-11.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110108" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2020-26137: Fixed a CRLF injection via HTTP request method (bsc#1177120).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492940" comment="python3-urllib3-1.24-9.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110109" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179398" ref_url="https://bugzilla.suse.com/1179398" source="BUGZILLA"/>
		<reference ref_id="1179399" ref_url="https://bugzilla.suse.com/1179399" source="BUGZILLA"/>
		<reference ref_id="1179593" ref_url="https://bugzilla.suse.com/1179593" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8284" ref_url="https://www.suse.com/security/cve/CVE-2020-8284/" source="CVE"/>
		<reference ref_id="CVE-2020-8285" ref_url="https://www.suse.com/security/cve/CVE-2020-8285/" source="CVE"/>
		<reference ref_id="CVE-2020-8286" ref_url="https://www.suse.com/security/cve/CVE-2020-8286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007954.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2020-8286: Fixed improper OSCP verification in the client side (bsc#1179593). 
- CVE-2020-8285: Fixed a stack overflow due to FTP wildcard (bsc#1179399).
- CVE-2020-8284: Fixed an issue where a malicius FTP server could make curl connect to a different IP (bsc#1179398).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179398">SUSE bug 1179398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179399">SUSE bug 1179399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179593">SUSE bug 1179593</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8284/">CVE-2020-8284</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8285/">CVE-2020-8285</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8286/">CVE-2020-8286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493620" comment="curl-7.66.0-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493621" comment="libcurl-devel-7.66.0-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493622" comment="libcurl4-7.66.0-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493623" comment="libcurl4-32bit-7.66.0-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110110" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493624" comment="openssh-8.1p1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493625" comment="openssh-helpers-8.1p1-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110111" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip, python-scripttest (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175297" ref_url="https://bugzilla.suse.com/1175297" source="BUGZILLA"/>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<description>
This update for python-pip, python-scripttest fixes the following issues:

- Update in SLE-15 (bsc#1175297, jsc#ECO-3035, jsc#PM-2318)

python-pip was updated to 20.0.2:

* Fix a regression in generation of compatibility tags
* Rename an internal module, to avoid ImportErrors due to improper uninstallation
* Switch to a dedicated CLI tool for vendoring dependencies.
* Remove wheel tag calculation from pip and use packaging.tags. This should provide more tags ordered better than in prior releases.
*  Deprecate setup.py-based builds that do not generate an .egg-info directory.
*  The pip&gt;=20 wheel cache is not retro-compatible with previous versions. Until pip 21.0, pip will continue to take advantage of existing legacy cache entries.
*  Deprecate undocumented --skip-requirements-regex option.
*  Deprecate passing install-location-related options via --install-option.
*  Use literal 'abi3' for wheel tag on CPython 3.x, to align with PEP 384 which only defines it for this platform.
*  Remove interpreter-specific major version tag e.g. cp3-none-any from consideration. This behavior was not documented strictly, and this tag in particular is not useful. Anyone with a use case can create an issue with pypa/packaging.
*  Wheel processing no longer permits wheels containing more than one top-level .dist-info directory.
*  Support for the git+git@ form of VCS requirement is being deprecated and will be removed in pip 21.0. Switch to git+https:// or git+ssh://. git+git:// also works but its use is discouraged as it is insecure.
*  Default to doing a user install (as if --user was passed) when the main site-packages directory is not writeable and user site-packages are enabled.
*  Warn if a path in PATH starts with tilde during pip install.
*  Cache wheels built from Git requirements that are considered immutable, because they point to a commit hash.
*  Add option --no-python-version-warning to silence warnings related to deprecation of Python versions.
*  Cache wheels that pip wheel built locally, matching what pip install does. This particularly helps performance in workflows where pip wheel is used for building before installing. Users desiring the original behavior can use pip wheel --no-cache-dir
*  Display CA information in pip debug.
*  Show only the filename (instead of full URL), when downloading from PyPI.
*  Suggest a more robust command to upgrade pip itself to avoid confusion when the current pip command is not available as pip.
*  Define all old pip console script entrypoints to prevent import issues in stale wrapper scripts.
*  The build step of pip wheel now builds all wheels to a cache first, then copies them to the wheel directory all at once. Before, it built them to a temporary directory and moved them to the wheel directory one by one.
*  Expand ~ prefix to user directory in path options, configs, and environment variables. Values that may be either URL or path are not currently supported, to avoid ambiguity:

   --find-links
   --constraint, -c
   --requirement, -r
   --editable, -e

*  Correctly handle system site-packages, in virtual environments created with venv (PEP 405).
*  Fix case sensitive comparison of pip freeze when used with -r option.
*  Enforce PEP 508 requirement format in pyproject.toml build-system.requires.
*  Make ensure_dir() also ignore ENOTEMPTY as seen on Windows.
*  Fix building packages which specify backend-path in pyproject.toml.
*  Do not attempt to run setup.py clean after a pep517 build error, since a setup.py may not exist in that case.
*  Fix passwords being visible in the index-url in 'Downloading &lt;url&gt;' message.
*  Change method from shutil.remove to shutil.rmtree in noxfile.py.
*  Skip running tests which require subversion, when svn isn't installed
*  Fix not sending client certificates when using --trusted-host.
*  Make sure pip wheel never outputs pure python wheels with a python implementation tag. Better fix/workaround for #3025 by using a per-implementation wheel cache instead of caching pure python wheels with an implementation tag in their name.
*  Include subdirectory URL fragments in cache keys.
*  Fix typo in warning message when any of --build-option, --global-option and --install-option is used in requirements.txt
*  Fix the logging of cached HTTP response shown as downloading.
*  Effectively disable the wheel cache when it is not writable, as is the case with the http cache.
*  Correctly handle relative cache directory provided via --cache-dir.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175297">SUSE bug 1175297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492945" comment="python3-pip-20.0.2-6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110112" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493626" comment="kernel-default-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493627" comment="kernel-default-base-5.3.18-24.43.2.9.17.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493628" comment="kernel-default-devel-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493629" comment="kernel-devel-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493630" comment="kernel-macros-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493631" comment="kernel-preempt-5.3.18-24.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110113" version="1" class="patch">
	<metadata>
		<title>Security update for gcc7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1150164" ref_url="https://bugzilla.suse.com/1150164" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1167939" ref_url="https://bugzilla.suse.com/1167939" source="BUGZILLA"/>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1178577" ref_url="https://bugzilla.suse.com/1178577" source="BUGZILLA"/>
		<reference ref_id="1178614" ref_url="https://bugzilla.suse.com/1178614" source="BUGZILLA"/>
		<reference ref_id="1178624" ref_url="https://bugzilla.suse.com/1178624" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<description>
This update for gcc7 fixes the following issues:

- CVE-2020-13844: Added mitigation for aarch64 Straight Line Speculation issue (bsc#1172798)
- Enable fortran for the nvptx offload compiler. 
- Update README.First-for.SuSE.packagers
- avoid assembler errors with AVX512 gather and scatter instructions when using -masm=intel.
- Backport the aarch64 -moutline-atomics feature and accumulated fixes but not its
  default enabling.  [jsc#SLE-12209, bsc#1167939]
- Fixed 32bit libgnat.so link.  [bsc#1178675]
- Fixed memcpy miscompilation on aarch64. [bsc#1178624, bsc#1178577]
- Fixed debug line info for try/catch.  [bsc#1178614]
- Remove -mbranch-protection=standard (aarch64 flag) when gcc7 is used to build gcc7 (ie when ada is enabled)
- Fixed corruption of pass private -&gt;aux via DF. [gcc#94148]
- Fixed debug information issue with inlined functions and passed by reference arguments.  [gcc#93888]
- Fixed binutils release date detection issue.
- Fixed register allocation issue with exception handling code on s390x.  [bsc#1161913] 
- Fixed miscompilation of some atomic code on aarch64. [bsc#1150164]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150164">SUSE bug 1150164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167939">SUSE bug 1167939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178577">SUSE bug 1178577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178614">SUSE bug 1178614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178624">SUSE bug 1178624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492946" comment="cpp7-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492947" comment="gcc7-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492948" comment="gcc7-c++-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492949" comment="gcc7-fortran-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492950" comment="libasan4-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492951" comment="libcilkrts5-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492952" comment="libgfortran4-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492953" comment="libgfortran4-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492954" comment="libstdc++6-devel-gcc7-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492955" comment="libubsan0-7.5.0+r278197-4.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110114" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1104457" ref_url="https://bugzilla.suse.com/1104457" source="BUGZILLA"/>
		<reference ref_id="1118459" ref_url="https://bugzilla.suse.com/1118459" source="BUGZILLA"/>
		<reference ref_id="1130721" ref_url="https://bugzilla.suse.com/1130721" source="BUGZILLA"/>
		<reference ref_id="1144504" ref_url="https://bugzilla.suse.com/1144504" source="BUGZILLA"/>
		<reference ref_id="1149458" ref_url="https://bugzilla.suse.com/1149458" source="BUGZILLA"/>
		<reference ref_id="1157763" ref_url="https://bugzilla.suse.com/1157763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12625" ref_url="https://www.suse.com/security/cve/CVE-2019-12625/" source="CVE"/>
		<reference ref_id="CVE-2019-12900" ref_url="https://www.suse.com/security/cve/CVE-2019-12900/" source="CVE"/>
		<reference ref_id="CVE-2019-15961" ref_url="https://www.suse.com/security/cve/CVE-2019-15961/" source="CVE"/>
		<reference ref_id="CVE-2019-1785" ref_url="https://www.suse.com/security/cve/CVE-2019-1785/" source="CVE"/>
		<reference ref_id="CVE-2019-1786" ref_url="https://www.suse.com/security/cve/CVE-2019-1786/" source="CVE"/>
		<reference ref_id="CVE-2019-1787" ref_url="https://www.suse.com/security/cve/CVE-2019-1787/" source="CVE"/>
		<reference ref_id="CVE-2019-1788" ref_url="https://www.suse.com/security/cve/CVE-2019-1788/" source="CVE"/>
		<reference ref_id="CVE-2019-1789" ref_url="https://www.suse.com/security/cve/CVE-2019-1789/" source="CVE"/>
		<reference ref_id="CVE-2019-1798" ref_url="https://www.suse.com/security/cve/CVE-2019-1798/" source="CVE"/>
		<reference ref_id="CVE-2020-3123" ref_url="https://www.suse.com/security/cve/CVE-2020-3123/" source="CVE"/>
		<reference ref_id="CVE-2020-3327" ref_url="https://www.suse.com/security/cve/CVE-2020-3327/" source="CVE"/>
		<reference ref_id="CVE-2020-3341" ref_url="https://www.suse.com/security/cve/CVE-2020-3341/" source="CVE"/>
		<reference ref_id="CVE-2020-3350" ref_url="https://www.suse.com/security/cve/CVE-2020-3350/" source="CVE"/>
		<reference ref_id="CVE-2020-3481" ref_url="https://www.suse.com/security/cve/CVE-2020-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008064.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

clamav was updated to the new major release 0.103.0. (jsc#ECO-3010,bsc#1118459)

Note that libclamav was changed incompatible, if you have a 3rd party
application that uses libclamav, it needs to be rebuilt.

Update to 0.103.0

* clamd can now reload the signature database without blocking
  scanning. This multi-threaded database reload improvement was made
  possible thanks to a community effort.

  - Non-blocking database reloads are now the default behavior. Some
    systems that are more constrained on RAM may need to disable
    non-blocking reloads as it will temporarily consume two times as
     much memory. We added a new clamd config option
    ConcurrentDatabaseReload, which may be set to no.

  * Fix clamav-milter.service (requires clamd.service to run)

Update to 0.102.4

  * CVE-2020-3350: Fix a vulnerability wherein a malicious user could
    replace a scan target's directory with a symlink to another path
    to trick clamscan, clamdscan, or clamonacc into removing or moving
    a different file (eg. a critical system file). The issue would
    affect users that use the --move or --remove options for clamscan,
    clamdscan, and clamonacc.
  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.3 that could cause a Denial-of-Service
    (DoS) condition. Improper bounds checking results in an
    out-of-bounds read which could cause a crash. The previous fix for
    this CVE in 0.102.3 was incomplete. This fix correctly resolves
    the issue.
  * CVE-2020-3481: Fix a vulnerability in the EGG archive module in
    ClamAV 0.102.0 - 0.102.3 could cause a Denial-of-Service (DoS)
    condition. Improper error handling may result in a crash due to a
    NULL pointer dereference. This vulnerability is mitigated for
    those using the official ClamAV signature databases because the
    file type signatures in daily.cvd will not enable the EGG archive
    parser in versions affected by the vulnerability.

Update to 0.102.3

  * CVE-2020-3327: Fix a vulnerability in the ARJ archive parsing
    module in ClamAV 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper bounds checking of an unsigned variable results
    in an out-of-bounds read which causes a crash.
  * CVE-2020-3341: Fix a vulnerability in the PDF parsing module in
    ClamAV 0.101 - 0.102.2 that could cause a Denial-of-Service (DoS)
    condition. Improper size checking of a buffer used to initialize AES
    decryption routines results in an out-of-bounds read which may cause
    a crash.
  * Fix 'Attempt to allocate 0 bytes' error when parsing some PDF
    documents.
  * Fix a couple of minor memory leaks.
  * Updated libclamunrar to UnRAR 5.9.2.

Update to 0.102.2:

  * CVE-2020-3123: A denial-of-service (DoS) condition may occur when
    using the optional credit card data-loss-prevention (DLP) feature.
    Improper bounds checking of an unsigned variable resulted in an
    out-of-bounds read, which causes a crash.
  * Significantly improved the scan speed of PDF files on Windows.
  * Re-applied a fix to alleviate file access issues when scanning RAR
    files in downstream projects that use libclamav where the scanning
    engine is operating in a low-privilege process. This bug was originally
    fixed in 0.101.2 and the fix was mistakenly omitted from 0.102.0.
  * Fixed an issue where freshclam failed to update if the database version
    downloaded is one version older than advertised. This situation may
    occur after a new database version is published. The issue affected
    users downloading the whole CVD database file.
  * Changed the default freshclam ReceiveTimeout setting to 0 (infinite).
    The ReceiveTimeout had caused needless database update failures for
    users with slower internet connections.
  * Correctly display the number of kilobytes (KiB) in progress bar and
    reduced the size of the progress bar to accommodate 80-character width
    terminals.
  * Fixed an issue where running freshclam manually causes a daemonized
    freshclam process to fail when it updates because the manual instance
    deletes the temporary download directory. The freshclam temporary files
    will now download to a unique directory created at the time of an update
    instead of using a hardcoded directory created/destroyed at the program
    start/exit.
  * Fix for freshclam's OnOutdatedExecute config option.
  * Fixes a memory leak in the error condition handling for the email
    parser.
  * Improved bound checking and error handling in ARJ archive parser.
  * Improved error handling in PDF parser.
  * Fix for memory leak in byte-compare signature handler.

- The freshclam.service should not be started before the network is
  online (it checks for updates immediately upon service start)

Update to 0.102.1:

  * CVE-2019-15961, bsc#1157763: A Denial-of-Service (DoS)
    vulnerability may occur when scanning a specially crafted email
    file as a result of excessively long scan times. The issue is
    resolved by implementing several maximums in parsing MIME
    messages and by optimizing use of memory allocation.
  * Build system fixes to build clamav-milter, to correctly link
    with libxml2 when detected, and to correctly detect fanotify
    for on-access scanning feature support.
  * Signature load time is significantly reduced by changing to a
    more efficient algorithm for loading signature patterns and
    allocating the AC trie. Patch courtesy of Alberto Wu.
  * Introduced a new configure option to statically link libjson-c
    with libclamav. Static linking with libjson is highly
    recommended to prevent crashes in applications that use
    libclamav alongside another JSON parsing library.
  * Null-dereference fix in email parser when using the
    --gen-json metadata option.
  * Fixes for Authenticode parsing and certificate signature
    (.crb database) bugs.

Update to 0.102.0:

  * The On-Access Scanning feature has been migrated out of clamd
    and into a brand new utility named clamonacc. This utility is
    similar to clamdscan and clamav-milter in that it acts as a
    client to clamd. This separation from clamd means that clamd no
    longer needs to run with root privileges while scanning potentially
    malicious files. Instead, clamd may drop privileges to run under an
    account that does not have super-user. In addition to improving the
    security posture of running clamd with On-Access enabled, this
    update fixed a few outstanding defects:
    - On-Access scanning for created and moved files (Extra-Scanning)
      is fixed.
    - VirusEvent for On-Access scans is fixed.
    - With clamonacc, it is now possible to copy, move, or remove a
      file if the scan triggered an alert, just like with clamdscan.
  * The freshclam database update utility has undergone a significant
    update. This includes:
    - Added support for HTTPS.
    - Support for database mirrors hosted on ports other than 80.
    - Removal of the mirror management feature (mirrors.dat).
    - An all new libfreshclam library API.
- created new subpackage libfreshclam2

Update to 0.101.4:

  * CVE-2019-12900: An out of bounds write in the NSIS bzip2
    (bsc#1149458)
  * CVE-2019-12625: Introduce a configurable time limit to mitigate
    zip bomb vulnerability completely. Default is 2 minutes,
    configurable useing the clamscan --max-scantime and for clamd
    using the MaxScanTime config option (bsc#1144504)

Update to version 0.101.3:

  * bsc#1144504: ZIP bomb causes extreme CPU spikes

Update to version 0.101.2 (bsc#1130721)

  * CVE-2019-1787:
    An out-of-bounds heap read condition may occur when scanning PDF
    documents. The defect is a failure to correctly keep track of the number
    of bytes remaining in a buffer when indexing file data.
  * CVE-2019-1789:
    An out-of-bounds heap read condition may occur when scanning PE files
    (i.e. Windows EXE and DLL files) that have been packed using Aspack as a
    result of inadequate bound-checking.
  * CVE-2019-1788:
    An out-of-bounds heap write condition may occur when scanning OLE2 files
    such as Microsoft Office 97-2003 documents. The invalid write happens when
    an invalid pointer is mistakenly used to initialize a 32bit integer to
    zero. This is likely to crash the application.
  * CVE-2019-1786:
    An out-of-bounds heap read condition may occur when scanning malformed
    PDF documents as a result of improper bounds-checking.
  * CVE-2019-1785:
    A path-traversal write condition may occur as a result of improper
    input validation when scanning RAR archives.
  * CVE-2019-1798:
    A use-after-free condition may occur as a result of improper error
    handling when scanning nested RAR archives.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-14"/>
	<updated date="2020-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1104457">SUSE bug 1104457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118459">SUSE bug 1118459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130721">SUSE bug 1130721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144504">SUSE bug 1144504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149458">SUSE bug 1149458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157763">SUSE bug 1157763</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12625/">CVE-2019-12625</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-12900/">CVE-2019-12900</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15961/">CVE-2019-15961</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-1785/">CVE-2019-1785</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1786/">CVE-2019-1786</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1787/">CVE-2019-1787</cve>
	<cve impact="moderate" cvss3="8.2/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-1788/">CVE-2019-1788</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-1789/">CVE-2019-1789</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1798/">CVE-2019-1798</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-3123/">CVE-2020-3123</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3327/">CVE-2020-3327</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3341/">CVE-2020-3341</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-3350/">CVE-2020-3350</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-3481/">CVE-2020-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492956" comment="clamav-0.103.0-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492957" comment="clamav-devel-0.103.0-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492958" comment="libclamav9-0.103.0-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492959" comment="libfreshclam2-0.103.0-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110115" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171531" ref_url="https://bugzilla.suse.com/1171531" source="BUGZILLA"/>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

-webkit2gtk3 was updated to version 2.30.3 (bsc#1179122 bsc#1179451):
   - CVE-2021-13543: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-13584: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-9948: Fixed a type confusion which could have led to arbitrary code execution.
   - CVE-2021-9951: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-9983: Fixed an out of bounds write which could have led to arbitrary code execution.
   - Have the libwebkit2gtk package require libjavascriptcoregtk of
     the same version (bsc#1171531).
   - Enable c_loop on aarch64: currently needed for compilation to
     succeed with JIT disabled. Also disable sampling profiler, since
     it conflicts with c_loop (bsc#1177087).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171531">SUSE bug 1171531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493632" comment="libjavascriptcoregtk-4_0-18-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493633" comment="libwebkit2gtk-4_0-37-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493634" comment="libwebkit2gtk3-lang-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493635" comment="webkit2gtk-4_0-injected-bundles-2.30.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110116" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178860" ref_url="https://bugzilla.suse.com/1178860" source="BUGZILLA"/>
		<reference ref_id="1179016" ref_url="https://bugzilla.suse.com/1179016" source="BUGZILLA"/>
		<reference ref_id="1179802" ref_url="https://bugzilla.suse.com/1179802" source="BUGZILLA"/>
		<reference ref_id="1180107" ref_url="https://bugzilla.suse.com/1180107" source="BUGZILLA"/>
		<reference ref_id="1180155" ref_url="https://bugzilla.suse.com/1180155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27781" ref_url="https://www.suse.com/security/cve/CVE-2020-27781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008100.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

Security issue fixed:

- CVE-2020-27781: Fixed a privilege escalation via the ceph_volume_client Python interface (bsc#1180155, bsc#1179802).

Non-security issues fixed:

- Update to 15.2.8-80-g1f4b6229ca:
  + Rebase on tip of upstream 'octopus' branch, SHA1 bdf3eebcd22d7d0b3dd4d5501bee5bac354d5b55
    * upstream Octopus v15.2.8 release, see https://ceph.io/releases/v15-2-8-octopus-released/

- Update to 15.2.7-776-g343cd10fe5:
  + Rebase on tip of upstream 'octopus' branch, SHA1 1b8a634fdcd94dfb3ba650793fb1b6d09af65e05
    * (bsc#1178860) mgr/dashboard: Disable TLS 1.0 and 1.1
  + (bsc#1179016) rpm: require smartmontools on SUSE
  + (bsc#1180107) ceph-volume: pass --filter-for-batch from drive-group subcommand
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178860">SUSE bug 1178860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179016">SUSE bug 1179016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179802">SUSE bug 1179802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180107">SUSE bug 1180107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180155">SUSE bug 1180155</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-27781/">CVE-2020-27781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493636" comment="ceph-common-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493637" comment="libcephfs-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493638" comment="libcephfs2-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493639" comment="librados-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493640" comment="librados2-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493641" comment="libradospp-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493642" comment="librbd-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493643" comment="librbd1-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493644" comment="librgw-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493645" comment="librgw2-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493646" comment="python3-ceph-argparse-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493647" comment="python3-ceph-common-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493648" comment="python3-cephfs-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493649" comment="python3-rados-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493650" comment="python3-rbd-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493651" comment="python3-rgw-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493652" comment="rados-objclass-devel-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493653" comment="rbd-nbd-15.2.8.80+g1f4b6229ca-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110117" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493654" comment="xen-libs-4.13.2_06-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493655" comment="xen-tools-domU-4.13.2_06-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110118" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174571" ref_url="https://bugzilla.suse.com/1174571" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1178009" ref_url="https://bugzilla.suse.com/1178009" source="BUGZILLA"/>
		<reference ref_id="1179193" ref_url="https://bugzilla.suse.com/1179193" source="BUGZILLA"/>
		<reference ref_id="1179630" ref_url="https://bugzilla.suse.com/1179630" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed CVE-2020-27619 (bsc#1178009), where Lib/test/multibytecodec_support
  calls eval() on content retrieved via HTTP.
- Change setuptools and pip version numbers according to new wheels
- Handful of changes to make python36 compatible with SLE15 and SLE12
  (jsc#ECO-2799, jsc#SLE-13738)
- add triplets for mips-r6 and riscv
- RISC-V needs CTYPES_PASS_BY_REF_HACK

Update to 3.6.12 (bsc#1179193)

* Ensure python3.dll is loaded from correct locations when Python is embedded
* The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface 
  incorrectly generated constant hash values of 32 and 128 respectively. This 
  resulted in always causing hash collisions. The fix uses hash() to generate 
  hash values for the tuple of (address, mask length, network address).
* Prevent http header injection by rejecting control characters in 
  http.client.putrequest(…).
* Unpickling invalid NEWOBJ_EX opcode with the C implementation raises now 
  UnpicklingError instead of crashing.
* Avoid infinite loop when reading specially crafted TAR files using the tarfile 
  module

- This release also fixes CVE-2020-26116 (bsc#1177211) and CVE-2019-20907 (bsc#1174091).

Update to 3.6.11:

- Disallow CR or LF in email.headerregistry. Address
  arguments to guard against header injection attacks.
- Disallow control characters in hostnames in http.client, addressing
  CVE-2019-18348. Such potentially malicious header injection URLs now
  cause a InvalidURL to be raised. (bsc#1155094)
- CVE-2020-8492: The AbstractBasicAuthHandler class
  of the urllib.request module uses an inefficient regular
  expression which can be exploited by an attacker to cause
  a denial of service. Fix the regex to prevent the
  catastrophic backtracking. Vulnerability reported by Ben
  Caller and Matt Schwager.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-23"/>
	<updated date="2020-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174571">SUSE bug 1174571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179193">SUSE bug 1179193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179630">SUSE bug 1179630</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492968" comment="libpython3_6m1_0-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492969" comment="python3-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492970" comment="python3-base-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492971" comment="python3-curses-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492972" comment="python3-dbm-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492973" comment="python3-devel-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492974" comment="python3-idle-3.6.12-3.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492976" comment="python3-tk-3.6.12-3.67.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110119" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="1180112" ref_url="https://bugzilla.suse.com/1180112" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487/" source="CVE"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0487: Fixed a memory leak (bsc#1180112).
- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-24"/>
	<updated date="2020-12-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180112">SUSE bug 1180112</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009492977" comment="flac-devel-1.3.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492978" comment="libFLAC++6-1.3.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492979" comment="libFLAC8-1.3.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110120" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183933" ref_url="https://bugzilla.suse.com/1183933" source="BUGZILLA"/>
		<reference ref_id="1183934" ref_url="https://bugzilla.suse.com/1183934" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22876" ref_url="https://www.suse.com/security/cve/CVE-2021-22876/" source="CVE"/>
		<reference ref_id="CVE-2021-22890" ref_url="https://www.suse.com/security/cve/CVE-2021-22890/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008577.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22890: TLS 1.3 session ticket proxy host mixup (bsc#1183934)
- CVE-2021-22876: Automatic referer leaks credentials (bsc#1183933)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183933">SUSE bug 1183933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183934">SUSE bug 1183934</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22876/">CVE-2021-22876</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22890/">CVE-2021-22890</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493656" comment="curl-7.66.0-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493657" comment="libcurl-devel-7.66.0-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493658" comment="libcurl4-7.66.0-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493659" comment="libcurl4-32bit-7.66.0-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110121" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008579.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs 	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493660" comment="mozilla-nspr-4.25.1-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493661" comment="mozilla-nspr-32bit-4.25.1-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493662" comment="mozilla-nspr-devel-4.25.1-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110122" version="1" class="patch">
	<metadata>
		<title>Security update for OpenIPMI (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183178" ref_url="https://bugzilla.suse.com/1183178" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008580.html" source="SUSE-SU"/>
		<description>
This update for OpenIPMI fixes the following issues:

- Fixed an issue where OpenIPMI was creating non-position independent binaries (bsc#1183178).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183178">SUSE bug 1183178</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493663" comment="OpenIPMI-2.0.25-7.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493664" comment="OpenIPMI-devel-2.0.25-7.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110123" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1177204" ref_url="https://bugzilla.suse.com/1177204" source="BUGZILLA"/>
		<reference ref_id="1179148" ref_url="https://bugzilla.suse.com/1179148" source="BUGZILLA"/>
		<reference ref_id="1180690" ref_url="https://bugzilla.suse.com/1180690" source="BUGZILLA"/>
		<reference ref_id="1181254" ref_url="https://bugzilla.suse.com/1181254" source="BUGZILLA"/>
		<reference ref_id="1181989" ref_url="https://bugzilla.suse.com/1181989" source="BUGZILLA"/>
		<reference ref_id="1182576" ref_url="https://bugzilla.suse.com/1182576" source="BUGZILLA"/>
		<reference ref_id="1183072" ref_url="https://bugzilla.suse.com/1183072" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687/" source="CVE"/>
		<reference ref_id="CVE-2021-3308" ref_url="https://www.suse.com/security/cve/CVE-2021-3308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3308: VUL-0: xen: IRQ vector leak on x86 (bsc#1181254, XSA-360)
- CVE-2021-28687: HVM soft-reset crashes toolstack (bsc#1183072, XSA-368)
- L3: conring size for XEN HV's with huge memory to small. Inital Xen logs cut (bsc#1177204)
- L3: XEN domU crashed on resume when using the xl unpause command (bsc#1182576)
- L3: xen: no needsreboot flag set (bsc#1180690)
- kdump of HVM fails, soft-reset not handled by libxl (bsc#1179148)
- openQA job causes libvirtd to dump core when running kdump inside domain (bsc#1181989)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177204">SUSE bug 1177204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179148">SUSE bug 1179148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180690">SUSE bug 1180690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181254">SUSE bug 1181254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181989">SUSE bug 1181989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182576">SUSE bug 1182576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183072">SUSE bug 1183072</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3308/">CVE-2021-3308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493665" comment="xen-libs-4.13.2_08-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493666" comment="xen-tools-domU-4.13.2_08-3.25.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110124" version="1" class="patch">
	<metadata>
		<title>Security update for gssproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180515" ref_url="https://bugzilla.suse.com/1180515" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12658" ref_url="https://www.suse.com/security/cve/CVE-2020-12658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008588.html" source="SUSE-SU"/>
		<description>
This update for gssproxy fixes the following issues:

- CVE-2020-12658: Fixed an issue where gssproxy was not unlocking cond_mutex before pthread exit in gp_worker_main() (bsc#1180515).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180515">SUSE bug 1180515</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12658/">CVE-2020-12658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493667" comment="gssproxy-0.8.2-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110125" version="1" class="patch">
	<metadata>
		<title>Security update for libzypp, zypper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1050625" ref_url="https://bugzilla.suse.com/1050625" source="BUGZILLA"/>
		<reference ref_id="1174016" ref_url="https://bugzilla.suse.com/1174016" source="BUGZILLA"/>
		<reference ref_id="1177238" ref_url="https://bugzilla.suse.com/1177238" source="BUGZILLA"/>
		<reference ref_id="1177275" ref_url="https://bugzilla.suse.com/1177275" source="BUGZILLA"/>
		<reference ref_id="1177427" ref_url="https://bugzilla.suse.com/1177427" source="BUGZILLA"/>
		<reference ref_id="1177583" ref_url="https://bugzilla.suse.com/1177583" source="BUGZILLA"/>
		<reference ref_id="1178910" ref_url="https://bugzilla.suse.com/1178910" source="BUGZILLA"/>
		<reference ref_id="1178966" ref_url="https://bugzilla.suse.com/1178966" source="BUGZILLA"/>
		<reference ref_id="1179083" ref_url="https://bugzilla.suse.com/1179083" source="BUGZILLA"/>
		<reference ref_id="1179222" ref_url="https://bugzilla.suse.com/1179222" source="BUGZILLA"/>
		<reference ref_id="1179415" ref_url="https://bugzilla.suse.com/1179415" source="BUGZILLA"/>
		<reference ref_id="1179909" ref_url="https://bugzilla.suse.com/1179909" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-9271" ref_url="https://www.suse.com/security/cve/CVE-2017-9271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008193.html" source="SUSE-SU"/>
		<description>
This update for libzypp, zypper fixes the following issues:

Update zypper to version 1.14.41

Update libzypp to 17.25.4

- CVE-2017-9271: Fixed information leak in the log file (bsc#1050625 bsc#1177583)
- RepoManager: Force refresh if repo url has changed (bsc#1174016)
- RepoManager: Carefully tidy up the caches. Remove non-directory entries. (bsc#1178966)
- RepoInfo: ignore legacy type= in a .repo file and let RepoManager probe (bsc#1177427).
- RpmDb: If no database exists use the _dbpath configured in rpm.  Still makes sure a compat
  symlink at /var/lib/rpm exists in case the configures _dbpath is elsewhere. (bsc#1178910)
- Fixed update of gpg keys with elongated expire date (bsc#179222)
- needreboot: remove udev from the list (bsc#1179083)
- Fix lsof monitoring (bsc#1179909)

yast-installation was updated to 4.2.48:

- Do not cleanup the libzypp cache when the system has low memory,
  incomplete cache confuses libzypp later (bsc#1179415)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-13"/>
	<updated date="2021-01-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1050625">SUSE bug 1050625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174016">SUSE bug 1174016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177238">SUSE bug 1177238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177275">SUSE bug 1177275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177427">SUSE bug 1177427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177583">SUSE bug 1177583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178910">SUSE bug 1178910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178966">SUSE bug 1178966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179083">SUSE bug 1179083</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179222">SUSE bug 1179222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179415">SUSE bug 1179415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179909">SUSE bug 1179909</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-9271/">CVE-2017-9271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009489348" comment="libzypp-17.25.5-3.25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493668" comment="libzypp-devel-17.25.5-3.25.6 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489349" comment="yast2-installation-4.2.48-3.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493669" comment="zypper-1.14.41-3.14.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493670" comment="zypper-log-1.14.41-3.14.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493671" comment="zypper-needs-restarting-1.14.41-3.14.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110126" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1133120" ref_url="https://bugzilla.suse.com/1133120" source="BUGZILLA"/>
		<reference ref_id="1133124" ref_url="https://bugzilla.suse.com/1133124" source="BUGZILLA"/>
		<reference ref_id="1175899" ref_url="https://bugzilla.suse.com/1175899" source="BUGZILLA"/>
		<reference ref_id="1180996" ref_url="https://bugzilla.suse.com/1180996" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008592.html" source="SUSE-SU"/>
		<description>
This update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk fixes the following issues:

libostree:

Update to version 2020.8

- Enable LTO. (bsc#1133120)

- This update contains scalability improvements and bugfixes.
- Caching-related HTTP headers are now supported on summaries and signatures, so that they do not have to be 
  re-downloaded if not changed in the meanwhile.
- Summaries and delta have been reworked to allow more fine-grained fetching.
- Fixes several bugs related to atomic variables, HTTP timeouts, and 32-bit architectures.
- Static deltas can now be signed to more easily support offline verification.
- There's now support for multiple initramfs images; Is it possible to have a 'main' initramfs image and a 
  secondary one which represents local configuration.
- The documentation is now moved to https://ostreedev.github.io/ostree/
- Fix for an assertion failure when upgrading from systems before ostree supported devicetree.
- ostree no longer hardlinks zero sized files to avoid hitting filesystem maximum link counts.
- ostree now supports `/` and `/boot` being on the same filesystem.
- Improvements to the GObject Introspection metadata, some (cosmetic) static analyzer fixes, a fix for 
  the immutable bit on s390x, dropping a deprecated bit in the systemd unit file.
- Fix a regression 2020.4 where the 'readonly sysroot' changes incorrectly left the sysroot read-only 
  on systems that started out with a read-only `/` (most of them, e.g. Fedora Silverblue/IoT at least).
- The default dracut config now enables reproducibility.
- There is a new ostree admin unlock `--transient`. This should to be a foundation for further support 
  for 'live' updates.
- New `ed25519` signing support, powered by `libsodium`.
- stree commit gained a new `--base` argument, which significantly simplifies constructing 'derived' 
  commits, particularly for systems using SELinux.
- Handling of the read-only sysroot was reimplemented to run in the initramfs and be more reliable. 
  Enabling the `readonly=true` flag in the repo config is recommended.
- Several fixes in locking for the temporary 'staging' directories OSTree creates, particularly on NFS.
- A new `timestamp-check-from-rev` option was added for pulls, which makes downgrade protection more 
  reliable and will be used by Fedora CoreOS.
- Several fixes and enhancements made for 'collection' pulls including a new `--mirror` option.
- The ostree commit command learned a new `--mode-ro-executables` which enforces `W^R` semantics 
  on all executables.
- Added a new  commit metadata key `OSTREE_COMMIT_META_KEY_ARCHITECTURE` to help standardize 
  the architecture of the OSTree commit. This could be used on the client side for example to 
  sanity-check that the commit matches the architecture of the machine before deploying.
- Stop invalid usage of `%_libexecdir`:
  + Use `%{_prefix}/lib` where appropriate.
  + Use `_systemdgeneratordir` for the systemd-generators.
  + Define `_dracutmodulesdir` based on `dracut.pc`. Add BuildRequires(dracut) for this to work.

xdg-desktop-portal:

Update to version 1.8.0:

- Ensure systemd rpm macros are called at install/uninstall times for systemd user services.
- Add BuildRequires on systemd-rpm-macros.
- openuri:
  - Allow skipping the chooser for more URL tyles
  - Robustness fixes
- filechooser: 
  - Return the current filter
  - Add a 'directory' option
  - Document the 'writable' option
- camera:
  - Make the client node visible
  - Don't leak pipewire proxy
- Fix file descriptor leaks
- Testsuite improvements
- Updated translations.
- document:
  - Reduce the use of open fds
  - Add more tests and fix issues they found
  - Expose directories with their proper name
  - Support exporting directories
  - New fuse implementation
- background: Avoid a segfault
- screencast: Require pipewire 0.3
- Better support for snap and toolbox
- Require `/usr/bin/fusermount`: `xdg-document-portal` calls out to the binary. (bsc#1175899)
  Without it, files or dirs can be selected, but whatever is done with or in them, will not have any effect
- Fixes for `%_libexecdir` changing to `/usr/libexec`

xdg-desktop-portal-gtk:

Update to version 1.8.0:

- filechooser: 
  - Return the current filter
    - Handle the 'directory' option to select directories
    - Only show preview when we have an image
- screenshot: Fix cancellation
- appchooser: Avoid a crash
- wallpaper:
  - Properly preview placement settings
  - Drop the lockscreen option
- printing: Improve the notification
- Updated translations.
- settings: Fall back to gsettings for enable-animations
- screencast: Support Mutter version to 3 (New pipewire api ver 3).

flatpak:

-  Update to version 1.10.2 (jsc#SLE-17238, ECO-3148)

-  This is a security update which fixes a potential attack where a flatpak application could use custom formated 
   `.desktop` file to gain access to files on the host system.
- Fix memory leaks
- Documentation and translations updates
- Spawn portal better handles non-utf8 filenames
- Fix flatpak build on systems with setuid bwrap 
- Fix crash on updating apps with no deploy data
- Remove deprecated texinfo packaging macros.
- Support for the new repo format which should make updates faster and download less data.
- The systemd generator snippets now call flatpak `--print-updated-env` in place of a bunch of shell for better
  login performance.
- The `.profile` snippets now disable GVfs when calling flatpak to avoid spawning a gvfs daemon when logging in via ssh.
- Flatpak now finds the pulseaudio sockets better in uncommon configurations.
- Sandboxes with network access it now also has access to the `systemd-resolved` socket to do dns lookups.
- Flatpak supports unsetting environment variables in the sandbox using `--unset-env`, 
  and `--env=FOO=` now sets FOO to the empty string instead of unsetting it.
- The spawn portal now has an option to share the pid namespace with the sub-sandbox.
- This security update fixes a sandbox escape where a malicious application can execute code outside the sandbox by 
  controlling the environment of the 'flatpak run' command when spawning a sub-sandbox (bsc#1180996, CVE-2021-21261)
- Fix support for ppc64.
- Move flatpak-bisect and flatpak-coredumpctl to devel subpackage, allow to remove python3 dependency on main package.
- Enable LTO as gobject-introspection works fine with LTO. (bsc#1133124)
- Fixed progress reporting for OCI and extra-data.
- The in-memory summary cache is more efficient.
- Fixed authentication getting stuck in a loop in some cases.
- Fixed authentication error reporting.
- Extract OCI info for runtimes as well as apps. 
- Fixed crash if anonymous authentication fails and `-y` is specified.
- flatpak info now only looks at the specified installation if one is specified.
- Better error reporting for server HTTP errors during download. 
- Uninstall now removes applications before the runtime it depends on.
- Avoid updating metadata from the remote when uninstalling.
- FlatpakTransaction now verifies all passed in refs to avoid.
- Added validation of collection id settings for remotes.
- Fix seccomp filters on s390.
- Robustness fixes to the spawn portal.
- Fix support for masking update in the system installation.
- Better support for distros with uncommon models of merged `/usr`.
- Cache responses from localed/AccountService.
- Fix hangs in cases where `xdg-dbus-proxy` fails to start.
- Fix double-free in cups socket detection.
- OCI authenticator now doesn't ask for auth in case of http errors.
- Fix invalid usage of `%{_libexecdir}` to reference systemd directories.
- Fixes for `%_libexecdir` changing to `/usr/libexec`
- Avoid calling authenticator in update if ref didn't change
- Don't fail transaction if ref is already installed (after transaction start)
- Fix flatpak run handling of userns in the `--device=all` case
- Fix handling of extensions from different remotes
- Fix flatpak run `--no-session-bus`
- `FlatpakTransaction` has a new signal `install-authenticator` which clients can handle to install authenticators 
   needed for the transaction. This is done in the CLI commands.
- Now the host timezone data is always exposed, fixing several apps that had timezone issues.
- There's a new  systemd unit (not installed by default) to automatically detect plugged in usb sticks with 
  sideload repos.
- By default the `gdm env.d` file is no longer installed because the  systemd generators work better.
- `create-usb` now exports partial commits by default 
- Fix handling of docker media types in oci remotes
- Fix subjects in `remote-info --log` output
- This release is also able to host flatpak images on e.g. docker hub.
 		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133120">SUSE bug 1133120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133124">SUSE bug 1133124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175899">SUSE bug 1175899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180996">SUSE bug 1180996</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493672" comment="libostree-1-1-2020.8-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110127" version="1" class="patch">
	<metadata>
		<title>Security update for fwupdate (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008599.html" source="SUSE-SU"/>
		<description>
This update for fwupdate fixes the following issues:

- Add SBAT section to EFI images (bsc#1182057)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493673" comment="fwupdate-12-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493674" comment="fwupdate-devel-12-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493675" comment="fwupdate-efi-12-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493676" comment="libfwup1-12-11.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110128" version="1" class="patch">
	<metadata>
		<title>Security update for zstd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1082318" ref_url="https://bugzilla.suse.com/1082318" source="BUGZILLA"/>
		<reference ref_id="1133297" ref_url="https://bugzilla.suse.com/1133297" source="BUGZILLA"/>
		<description>
This update for zstd fixes the following issues:

- Fix for build error caused by wrong static libraries. (bsc#1133297)
- Correction in spec file marking the license as documentation. (bsc#1082318)
- Add new package for SLE-15. (jsc#ECO-1886)
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1082318">SUSE bug 1082318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133297">SUSE bug 1133297</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493137" comment="libzstd-devel-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009489337" comment="libzstd1-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493138" comment="libzstd1-32bit-1.4.4-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493139" comment="zstd-1.4.4-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110129" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172926" ref_url="https://bugzilla.suse.com/1172926" source="BUGZILLA"/>
		<reference ref_id="1176390" ref_url="https://bugzilla.suse.com/1176390" source="BUGZILLA"/>
		<reference ref_id="1176489" ref_url="https://bugzilla.suse.com/1176489" source="BUGZILLA"/>
		<reference ref_id="1176679" ref_url="https://bugzilla.suse.com/1176679" source="BUGZILLA"/>
		<reference ref_id="1176828" ref_url="https://bugzilla.suse.com/1176828" source="BUGZILLA"/>
		<reference ref_id="1177360" ref_url="https://bugzilla.suse.com/1177360" source="BUGZILLA"/>
		<reference ref_id="1177857" ref_url="https://bugzilla.suse.com/1177857" source="BUGZILLA"/>
		<reference ref_id="1178837" ref_url="https://bugzilla.suse.com/1178837" source="BUGZILLA"/>
		<reference ref_id="1178860" ref_url="https://bugzilla.suse.com/1178860" source="BUGZILLA"/>
		<reference ref_id="1178905" ref_url="https://bugzilla.suse.com/1178905" source="BUGZILLA"/>
		<reference ref_id="1178932" ref_url="https://bugzilla.suse.com/1178932" source="BUGZILLA"/>
		<reference ref_id="1179569" ref_url="https://bugzilla.suse.com/1179569" source="BUGZILLA"/>
		<reference ref_id="1179997" ref_url="https://bugzilla.suse.com/1179997" source="BUGZILLA"/>
		<reference ref_id="1182766" ref_url="https://bugzilla.suse.com/1182766" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25678" ref_url="https://www.suse.com/security/cve/CVE-2020-25678/" source="CVE"/>
		<reference ref_id="CVE-2020-27839" ref_url="https://www.suse.com/security/cve/CVE-2020-27839/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008598.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- ceph was updated to to 15.2.9
- cephadm: fix 'inspect' and 'pull' (bsc#1182766)
- CVE-2020-27839: mgr/dashboard: Use secure cookies to store JWT Token (bsc#1179997)
- CVE-2020-25678: Do not add sensitive information in Ceph log files (bsc#1178905)
- mgr/orchestrator: Sort 'ceph orch device ls' by host (bsc#1172926)
- mgr/dashboard: enable different URL for users of browser to Grafana (bsc#1176390, bsc#1176679)
- mgr/cephadm: lock multithreaded access to OSDRemovalQueue (bsc#1176489)
- cephadm: command_unit: call systemctl with verbose=True (bsc#1176828)
- cephadm: silence 'Failed to evict container' log msg (bsc#1177360)
- mgr/cephadm: upgrade: fail gracefully, if daemon redeploy fails (bsc#1177857)
- rgw: cls/user: set from_index for reset stats calls (bsc#1178837)
- mgr/dashboard: Disable TLS 1.0 and 1.1 (bsc#1178860)
- cephadm: reference the last local image by digest (bsc#1178932, bsc#1179569)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172926">SUSE bug 1172926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176390">SUSE bug 1176390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176489">SUSE bug 1176489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176679">SUSE bug 1176679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176828">SUSE bug 1176828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177360">SUSE bug 1177360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177857">SUSE bug 1177857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178837">SUSE bug 1178837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178860">SUSE bug 1178860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178905">SUSE bug 1178905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178932">SUSE bug 1178932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179569">SUSE bug 1179569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179997">SUSE bug 1179997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182766">SUSE bug 1182766</bugzilla>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-25678/">CVE-2020-25678</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27839/">CVE-2020-27839</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493677" comment="ceph-common-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493678" comment="libcephfs-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493679" comment="libcephfs2-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493680" comment="librados-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493681" comment="librados2-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493682" comment="libradospp-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493683" comment="librbd-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493684" comment="librbd1-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493685" comment="librgw-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493686" comment="librgw2-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493687" comment="python3-ceph-argparse-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493688" comment="python3-ceph-common-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493689" comment="python3-cephfs-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493690" comment="python3-rados-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493691" comment="python3-rbd-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493692" comment="python3-rgw-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493693" comment="rados-objclass-devel-15.2.9.83+g4275378de0-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493694" comment="rbd-nbd-15.2.9.83+g4275378de0-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110130" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2-tss-engine (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183895" ref_url="https://bugzilla.suse.com/1183895" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008601.html" source="SUSE-SU"/>
		<description>
This update for tpm2-tss-engine fixes the following issues:

- Added support to disable fixed compilation flags
- Added --disable-defaultflags during compilation to avoid breakage of our gcc-PIE
  profile (resulted in non-position-independent executable tpm2-tss-genkey, bsc#1183895)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183895">SUSE bug 1183895</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493695" comment="tpm2-tss-engine-1.0.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493696" comment="tpm2-tss-engine-bash-completion-1.0.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493697" comment="tpm2-tss-engine-devel-1.0.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110131" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183239" ref_url="https://bugzilla.suse.com/1183239" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20208" ref_url="https://www.suse.com/security/cve/CVE-2021-20208/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008615.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2021-20208: Fixed a potential kerberos auth leak escaping from container (bsc#1183239)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183239">SUSE bug 1183239</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20208/">CVE-2021-20208</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493698" comment="cifs-utils-6.9-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493699" comment="cifs-utils-devel-6.9-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110132" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493700" comment="perl-Mail-SpamAssassin-3.4.5-12.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493701" comment="spamassassin-3.4.5-12.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110133" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184348" ref_url="https://bugzilla.suse.com/1184348" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30004" ref_url="https://www.suse.com/security/cve/CVE-2021-30004/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008618.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-30004: Fixed an issue where forging attacks might have occured because AlgorithmIdentifier 
  parameters are mishandled in tls/pkcs1.c and tls/x509v3.c (bsc#1184348).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184348">SUSE bug 1184348</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30004/">CVE-2021-30004</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493702" comment="wpa_supplicant-2.9-4.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110134" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149746" ref_url="https://bugzilla.suse.com/1149746" source="BUGZILLA"/>
		<reference ref_id="1149747" ref_url="https://bugzilla.suse.com/1149747" source="BUGZILLA"/>
		<reference ref_id="1158256" ref_url="https://bugzilla.suse.com/1158256" source="BUGZILLA"/>
		<reference ref_id="1158307" ref_url="https://bugzilla.suse.com/1158307" source="BUGZILLA"/>
		<reference ref_id="1170809" ref_url="https://bugzilla.suse.com/1170809" source="BUGZILLA"/>
		<reference ref_id="1177364" ref_url="https://bugzilla.suse.com/1177364" source="BUGZILLA"/>
		<reference ref_id="1177378" ref_url="https://bugzilla.suse.com/1177378" source="BUGZILLA"/>
		<reference ref_id="1177380" ref_url="https://bugzilla.suse.com/1177380" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15945" ref_url="https://www.suse.com/security/cve/CVE-2019-15945/" source="CVE"/>
		<reference ref_id="CVE-2019-15946" ref_url="https://www.suse.com/security/cve/CVE-2019-15946/" source="CVE"/>
		<reference ref_id="CVE-2019-19479" ref_url="https://www.suse.com/security/cve/CVE-2019-19479/" source="CVE"/>
		<reference ref_id="CVE-2019-19480" ref_url="https://www.suse.com/security/cve/CVE-2019-19480/" source="CVE"/>
		<reference ref_id="CVE-2019-20792" ref_url="https://www.suse.com/security/cve/CVE-2019-20792/" source="CVE"/>
		<reference ref_id="CVE-2020-26570" ref_url="https://www.suse.com/security/cve/CVE-2020-26570/" source="CVE"/>
		<reference ref_id="CVE-2020-26571" ref_url="https://www.suse.com/security/cve/CVE-2020-26571/" source="CVE"/>
		<reference ref_id="CVE-2020-26572" ref_url="https://www.suse.com/security/cve/CVE-2020-26572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008621.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:
	  
- CVE-2019-15945: Fixed an out-of-bounds access of an ASN.1 Bitstring in decode_bit_string (bsc#1149746).
- CVE-2019-15946: Fixed an out-of-bounds access of an ASN.1 Octet string in asn1_decode_entry (bsc#1149747)
- CVE-2019-19479: Fixed an incorrect read operation during parsing of a SETCOS file attribute (bsc#1158256)
- CVE-2019-19480: Fixed an improper free operation in sc_pkcs15_decode_prkdf_entry (bsc#1158307).
- CVE-2019-20792: Fixed a double free in coolkey_free_private_data (bsc#1170809). 
- CVE-2020-26570: Fixed a buffer overflow in sc_oberthur_read_file (bsc#1177364).
- CVE-2020-26571: Fixed a stack-based buffer overflow in gemsafe GPK smart card software driver (bsc#1177380)
- CVE-2020-26572: Fixed a stack-based buffer overflow in tcos_decipher (bsc#1177378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1149746">SUSE bug 1149746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149747">SUSE bug 1149747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158256">SUSE bug 1158256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158307">SUSE bug 1158307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170809">SUSE bug 1170809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177364">SUSE bug 1177364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177378">SUSE bug 1177378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177380">SUSE bug 1177380</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15945/">CVE-2019-15945</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15946/">CVE-2019-15946</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-19479/">CVE-2019-19479</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-19480/">CVE-2019-19480</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20792/">CVE-2019-20792</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26570/">CVE-2020-26570</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26571/">CVE-2020-26571</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26572/">CVE-2020-26572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493703" comment="opensc-0.19.0-3.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110135" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493704" comment="kernel-default-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493705" comment="kernel-default-base-5.3.18-24.46.1.9.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493706" comment="kernel-default-devel-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493707" comment="kernel-devel-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493708" comment="kernel-macros-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493709" comment="kernel-preempt-5.3.18-24.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110136" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493710" comment="xorg-x11-server-1.20.3-22.5.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493711" comment="xorg-x11-server-extra-1.20.3-22.5.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110137" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181256" ref_url="https://bugzilla.suse.com/1181256" source="BUGZILLA"/>
		<reference ref_id="1184532" ref_url="https://bugzilla.suse.com/1184532" source="BUGZILLA"/>
		<reference ref_id="1184533" ref_url="https://bugzilla.suse.com/1184533" source="BUGZILLA"/>
		<reference ref_id="1184534" ref_url="https://bugzilla.suse.com/1184534" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-1252" ref_url="https://www.suse.com/security/cve/CVE-2021-1252/" source="CVE"/>
		<reference ref_id="CVE-2021-1404" ref_url="https://www.suse.com/security/cve/CVE-2021-1404/" source="CVE"/>
		<reference ref_id="CVE-2021-1405" ref_url="https://www.suse.com/security/cve/CVE-2021-1405/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008636.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2021-1252: Fix for Excel XLM parser infinite loop. (bsc#1184532)
- CVE-2021-1404: Fix for PDF parser buffer over-read; possible crash. (bsc#1184533)
- CVE-2021-1405: Fix for mail parser NULL-dereference crash. (bsc#1184534)
- Fix errors when scanning files &gt; 4G (bsc#1181256)
- Update clamav.keyring
- Update to 0.103.2
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-14"/>
	<updated date="2021-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181256">SUSE bug 1181256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184532">SUSE bug 1184532</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184533">SUSE bug 1184533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184534">SUSE bug 1184534</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1252/">CVE-2021-1252</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1404/">CVE-2021-1404</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-1405/">CVE-2021-1405</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493712" comment="clamav-0.103.2-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493713" comment="clamav-devel-0.103.2-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493714" comment="libclamav9-0.103.2-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493715" comment="libfreshclam2-0.103.2-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110138" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493716" comment="kernel-default-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493717" comment="kernel-default-base-5.3.18-24.61.1.9.26.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493718" comment="kernel-default-devel-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493719" comment="kernel-devel-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493720" comment="kernel-macros-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493721" comment="kernel-preempt-5.3.18-24.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110139" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178400" ref_url="https://bugzilla.suse.com/1178400" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179466" ref_url="https://bugzilla.suse.com/1179466" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1179686" ref_url="https://bugzilla.suse.com/1179686" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="1184064" ref_url="https://bugzilla.suse.com/1184064" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27616" ref_url="https://www.suse.com/security/cve/CVE-2020-27616/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-12829: Fix OOB access in sm501 device emulation (bsc#1172385)
- CVE-2020-25723: Fix use-after-free in usb xhci packet handling (bsc#1178934)
- CVE-2020-25084: Fix use-after-free in usb ehci packet handling (bsc#1176673)
- CVE-2020-25625: Fix infinite loop (DoS) in usb hcd-ohci emulation (bsc#1176684)
- CVE-2020-25624: Fix OOB access in usb hcd-ohci emulation (bsc#1176682)
- CVE-2020-27617: Fix guest triggerable assert in shared network handling code (bsc#1178174)
- CVE-2020-28916: Fix infinite loop (DoS) in e1000e device emulation (bsc#1179468)
- CVE-2020-29443: Fix OOB access in atapi emulation (bsc#1181108)
- CVE-2020-27821: Fix heap overflow in MSIx emulation (bsc#1179686)
- CVE-2020-15469: Fix null pointer deref. (DoS) in mmio ops (bsc#1173612)
- CVE-2021-20257: Fix infinite loop (DoS) in e1000 device emulation (bsc#1182577)
- CVE-2021-3416:  Fix OOB access (stack overflow) in rtl8139 NIC emulation (bsc#1182968)
- CVE-2021-3416:  Fix OOB access (stack overflow) in other NIC emulations (bsc#1182968)
- CVE-2020-27616: Fix OOB access in ati-vga emulation (bsc#1178400)
- CVE-2020-29129: Fix OOB access in SLIRP ARP/NCSI packet processing (bsc#1179466, CVE-2020-29130, bsc#1179467)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Add split-provides through forsplits/13 to cover updates of SLE15-SP2 to SLE15-SP3, and openSUSE equivalents (bsc#1184064)
- Added a few more usability improvements for our git packaging workflow
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178400">SUSE bug 1178400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179686">SUSE bug 1179686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184064">SUSE bug 1184064</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27616/">CVE-2020-27616</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493722" comment="qemu-tools-4.2.1-11.16.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110140" version="1" class="patch">
	<metadata>
		<title>Security update for open-iscsi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179440" ref_url="https://bugzilla.suse.com/1179440" source="BUGZILLA"/>
		<reference ref_id="1179908" ref_url="https://bugzilla.suse.com/1179908" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008200.html" source="SUSE-SU"/>
		<description>
This update for open-iscsi fixes the following issues:

- Updated to upstream version 2.1.3 as 2.1.3-suse, for bsc#1179908,
  including:
  * uip: check for TCP urgent pointer past end of frame
  * uip: check for u8 overflow when processing TCP options
  * uip: check for header length underflow during checksum calculation
  * fwparam_ppc: Fix memory leak in fwparam_ppc.c
  * iscsiuio: Remove unused macro IFNAMSIZ defined in iscsid_ipc.c
  * fwparam_ppc: Fix illegal memory access in fwparam_ppc.c
  * sysfs: Verify parameter of sysfs_device_get()
  * fwparam_ppc: Fix NULL pointer dereference in find_devtree()
  * open-iscsi: Clean user_param list when process exit
  * iscsi_net_util: Fix NULL pointer dereference in find_vlan_dev()
  * open-iscsi: Fix NULL pointer dereference in mgmt_ipc_read_req()
  * open-iscsi: Fix invalid pointer deference in find_initiator()
  * iscsiuio: Fix invalid parameter when call fstat()
  * iscsi-iname: Verify open() return value before calling read()
  * iscsi_sysfs: Fix NULL pointer deference in iscsi_sysfs_read_iface

- Updatged to latest upstream, including:
  * iscsiadm: Optimize the the verification of mode paramters
  * iscsid: Poll timeout value to 1 minute for iscsid
  * iscsiadm: fix host stats mode coredump
  * iscsid: fix logging level when starting and shutting down daemon
  * Updated iscsiadm man page.
  * Fix memory leak in sysfs_get_str
  * libopeniscsiusr: Compare with max int instead of max long

- Systemd unit files should not depend on network.target (bsc#1179440).

- Updated to latest upstream, including async login ability:
 * Implement login 'no_wait' for iscsiadm NODE mode
 * iscsiadm buffer overflow regression when discovering many targets at once
 * iscsid: Check Invalid Session id for stop connection
 * Add ability to attempt target logins asynchronously

- %service_del_postun_without_restart is now available on SLE
  More accurately it's been introduced in SLE12-SP2+ and SLE15+
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179440">SUSE bug 1179440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179908">SUSE bug 1179908</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493723" comment="iscsiuio-0.7.8.6-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493724" comment="libopeniscsiusr0_2_0-2.1.3-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493725" comment="open-iscsi-2.1.3-22.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493726" comment="open-iscsi-devel-2.1.3-22.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110141" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183936" ref_url="https://bugzilla.suse.com/1183936" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008661.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156 (bsc#1183936)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183936">SUSE bug 1183936</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493727" comment="sudo-1.8.22-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493728" comment="sudo-devel-1.8.22-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110142" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184644" ref_url="https://bugzilla.suse.com/1184644" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28965" ref_url="https://www.suse.com/security/cve/CVE-2021-28965/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008665.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- Update to 2.5.9
- CVE-2021-28965: XML round-trip vulnerability in REXML (bsc#1184644)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184644">SUSE bug 1184644</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28965/">CVE-2021-28965</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493729" comment="libruby2_5-2_5-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493730" comment="ruby2.5-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493731" comment="ruby2.5-devel-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493732" comment="ruby2.5-devel-extra-2.5.9-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493733" comment="ruby2.5-stdlib-2.5.9-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110143" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-io (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184755" ref_url="https://bugzilla.suse.com/1184755" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29425" ref_url="https://www.suse.com/security/cve/CVE-2021-29425/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008666.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-io fixes the following issues:

- CVE-2021-29425: Limited path traversal when invoking the method FileNameUtils.normalize with an improper input string (bsc#1184755)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184755">SUSE bug 1184755</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29425/">CVE-2021-29425</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493734" comment="apache-commons-io-2.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110144" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="1179503" ref_url="https://bugzilla.suse.com/1179503" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

Non-security issue fixed:

- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179503">SUSE bug 1179503</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493735" comment="libldap-2_4-2-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493736" comment="libldap-2_4-2-32bit-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493737" comment="libldap-data-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493738" comment="openldap2-client-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493739" comment="openldap2-devel-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493740" comment="openldap2-devel-static-2.4.46-9.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110145" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183403" ref_url="https://bugzilla.suse.com/1183403" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008690.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

- librsvg was updated to 2.46.5:
  * Update dependent crates that had security vulnerabilities:
    smallvec to 0.6.14 - RUSTSEC-2018-0003 - CVE-2021-25900 (bsc#1183403)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183403">SUSE bug 1183403</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493741" comment="gdk-pixbuf-loader-rsvg-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493742" comment="librsvg-2-2-2.46.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110146" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1409-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008692.html" source="SUSE-SU"/>
		<description>
This update for giflib fixes the following issues:

- Enable Position Independent Code and inherit CFLAGS from the build system (bsc#1184123).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493743" comment="giflib-devel-5.1.4-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493744" comment="libgif7-5.1.4-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110147" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184401" ref_url="https://bugzilla.suse.com/1184401" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20305" ref_url="https://www.suse.com/security/cve/CVE-2021-20305/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008693.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-20305: Fixed the multiply function which was being called with out-of-range scalars (bsc#1184401).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184401">SUSE bug 1184401</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20305/">CVE-2021-20305</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493745" comment="libhogweed4-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493746" comment="libhogweed4-32bit-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493747" comment="libnettle-devel-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493748" comment="libnettle6-3.4.1-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493749" comment="libnettle6-32bit-3.4.1-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110148" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182719" ref_url="https://bugzilla.suse.com/1182719" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.0 (bsc#1184155):
  * Fix the authentication request port when URL omits the port.
  * Fix iframe scrolling when main frame is scrolled in async
  * scrolling mode.
  * Stop using g_memdup.
  * Show a warning message when overriding signal handler for
  * threading suspension.
  * Fix the build on RISC-V with GCC 11.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871
- Update in version 2.30.6 (bsc#1184262):
  * Update user agent quirks again for Google Docs and Google Drive.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2020-27918, CVE-2020-29623, CVE-2021-1765
    CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870.
- Update _constraints for armv6/armv7 (bsc#1182719)
- restore NPAPI plugin support which was removed in 2.32.0
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182719">SUSE bug 1182719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493750" comment="libjavascriptcoregtk-4_0-18-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493751" comment="libwebkit2gtk-4_0-37-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493752" comment="libwebkit2gtk3-lang-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493753" comment="webkit2gtk-4_0-injected-bundles-2.32.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110149" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="1184310" ref_url="https://bugzilla.suse.com/1184310" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- s3-libads: use dns name to open a ldap session (bsc#1184310).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184310">SUSE bug 1184310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493754" comment="libdcerpc-binding0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493755" comment="libdcerpc-binding0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493756" comment="libdcerpc-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493757" comment="libdcerpc-samr-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493758" comment="libdcerpc-samr0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493759" comment="libdcerpc0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493760" comment="libdcerpc0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493761" comment="libndr-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493762" comment="libndr-krb5pac-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493763" comment="libndr-krb5pac0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493764" comment="libndr-krb5pac0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493765" comment="libndr-nbt-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493766" comment="libndr-nbt0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493767" comment="libndr-nbt0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493768" comment="libndr-standard-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493769" comment="libndr-standard0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493770" comment="libndr-standard0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493771" comment="libndr0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493772" comment="libndr0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493773" comment="libnetapi-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493774" comment="libnetapi0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493775" comment="libnetapi0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493776" comment="libsamba-credentials-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493777" comment="libsamba-credentials0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493778" comment="libsamba-credentials0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493779" comment="libsamba-errors-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493780" comment="libsamba-errors0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493781" comment="libsamba-errors0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493782" comment="libsamba-hostconfig-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493783" comment="libsamba-hostconfig0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493784" comment="libsamba-hostconfig0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493785" comment="libsamba-passdb-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493786" comment="libsamba-passdb0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493787" comment="libsamba-passdb0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493788" comment="libsamba-policy-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493789" comment="libsamba-policy-python3-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493790" comment="libsamba-policy0-python3-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493791" comment="libsamba-util-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493792" comment="libsamba-util0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493793" comment="libsamba-util0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493794" comment="libsamdb-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493795" comment="libsamdb0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493796" comment="libsamdb0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493797" comment="libsmbclient-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493798" comment="libsmbclient0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493799" comment="libsmbconf-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493800" comment="libsmbconf0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493801" comment="libsmbconf0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493802" comment="libsmbldap-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493803" comment="libsmbldap2-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493804" comment="libsmbldap2-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493805" comment="libtevent-util-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493806" comment="libtevent-util0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493807" comment="libtevent-util0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493808" comment="libwbclient-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493809" comment="libwbclient0-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493810" comment="libwbclient0-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493811" comment="samba-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493812" comment="samba-ceph-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493813" comment="samba-client-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493814" comment="samba-core-devel-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493815" comment="samba-dsdb-modules-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493816" comment="samba-libs-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493817" comment="samba-libs-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493818" comment="samba-libs-python3-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493819" comment="samba-python3-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493820" comment="samba-winbind-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493821" comment="samba-winbind-32bit-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110150" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008715.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493822" comment="cups-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493823" comment="cups-client-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493824" comment="cups-config-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493825" comment="cups-devel-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493826" comment="libcups2-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493827" comment="libcups2-32bit-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493828" comment="libcupscgi1-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493829" comment="libcupsimage2-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493830" comment="libcupsmime1-2.2.7-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493831" comment="libcupsppdc1-2.2.7-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110151" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182899" ref_url="https://bugzilla.suse.com/1182899" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008720.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- etc/permissions: remove unnecessary entries (bsc#1182899)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182899">SUSE bug 1182899</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493832" comment="permissions-20181225-23.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493833" comment="permissions-zypp-plugin-20181225-23.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110152" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183453" ref_url="https://bugzilla.suse.com/1183453" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- make /usr/bin/delv in bind-tools position independent (bsc#1183453).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183453">SUSE bug 1183453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493834" comment="bind-devel-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493835" comment="bind-utils-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493836" comment="libbind9-1600-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493837" comment="libdns1605-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493838" comment="libirs-devel-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493839" comment="libirs1601-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493840" comment="libisc1606-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493841" comment="libisccc1600-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493842" comment="libisccfg1600-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493843" comment="libns1604-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493844" comment="python3-bind-9.16.6-12.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110153" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183074" ref_url="https://bugzilla.suse.com/1183074" source="BUGZILLA"/>
		<reference ref_id="1183899" ref_url="https://bugzilla.suse.com/1183899" source="BUGZILLA"/>
		<reference ref_id="1184231" ref_url="https://bugzilla.suse.com/1184231" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20288" ref_url="https://www.suse.com/security/cve/CVE-2021-20288/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008722.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- ceph was updated to 15.2.11-83-g8a15f484c2:
  * CVE-2021-20288: Fixed unauthorized global_id reuse (bsc#1183074).
  * disk gets replaced with no rocksdb/wal (bsc#1184231).
  * BlueStore handles huge(&gt;4GB) writes from RocksDB 
    to BlueFS poorly, potentially causing data corruption (bsc#1183899).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183074">SUSE bug 1183074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183899">SUSE bug 1183899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184231">SUSE bug 1184231</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20288/">CVE-2021-20288</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493845" comment="ceph-common-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493846" comment="libcephfs-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493847" comment="libcephfs2-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493848" comment="librados-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493849" comment="librados2-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493850" comment="libradospp-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493851" comment="librbd-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493852" comment="librbd1-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493853" comment="librgw-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493854" comment="librgw2-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493855" comment="python3-ceph-argparse-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493856" comment="python3-ceph-common-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493857" comment="python3-cephfs-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493858" comment="python3-rados-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493859" comment="python3-rbd-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493860" comment="python3-rgw-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493861" comment="rados-objclass-devel-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493862" comment="rbd-nbd-15.2.11.83+g8a15f484c2-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110154" version="1" class="patch">
	<metadata>
		<title>Security update for p7zip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184699" ref_url="https://bugzilla.suse.com/1184699" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3465" ref_url="https://www.suse.com/security/cve/CVE-2021-3465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008733.html" source="SUSE-SU"/>
		<description>
This update for p7zip fixes the following issues:

- CVE-2021-3465: Fixed a NULL pointer dereference in NCompress:CCopyCoder:Code (bsc#1184699)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184699">SUSE bug 1184699</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3465/">CVE-2021-3465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493863" comment="p7zip-16.02-14.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493864" comment="p7zip-full-16.02-14.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110155" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493865" comment="avahi-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493866" comment="avahi-compat-howl-devel-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493867" comment="avahi-compat-mDNSResponder-devel-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493868" comment="avahi-lang-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493869" comment="avahi-utils-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493870" comment="libavahi-client3-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493871" comment="libavahi-client3-32bit-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493872" comment="libavahi-common3-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493873" comment="libavahi-common3-32bit-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493874" comment="libavahi-core7-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493875" comment="libavahi-devel-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493876" comment="libavahi-glib-devel-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493877" comment="libavahi-glib1-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493878" comment="libavahi-gobject0-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493879" comment="libavahi-ui-gtk3-0-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493880" comment="libavahi-ui0-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493881" comment="libdns_sd-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493882" comment="libhowl0-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493883" comment="typelib-1_0-Avahi-0_6-0.7-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110156" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-05"/>
	<updated date="2021-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493884" comment="libxml2-2-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493885" comment="libxml2-2-32bit-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493886" comment="libxml2-devel-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493887" comment="libxml2-tools-2.9.7-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493888" comment="python3-libxml2-python-2.9.7-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110157" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184606" ref_url="https://bugzilla.suse.com/1184606" source="BUGZILLA"/>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)
  * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)
  * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)
- moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto 
  with just java-11-openjdk-headless installed (bsc#1184606).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184606">SUSE bug 1184606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493889" comment="java-11-openjdk-11.0.11.0-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493890" comment="java-11-openjdk-demo-11.0.11.0-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493891" comment="java-11-openjdk-devel-11.0.11.0-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493892" comment="java-11-openjdk-headless-11.0.11.0-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110158" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008753.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3426: Fixed an information disclosure via pydoc (bsc#1183374)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493893" comment="libpython3_6m1_0-3.6.13-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493894" comment="python3-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493895" comment="python3-base-3.6.13-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493896" comment="python3-curses-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493897" comment="python3-dbm-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493898" comment="python3-devel-3.6.13-3.81.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493899" comment="python3-idle-3.6.13-3.81.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493900" comment="python3-tk-3.6.13-3.81.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110159" version="1" class="patch">
	<metadata>
		<title>Security update for shim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177315" ref_url="https://bugzilla.suse.com/1177315" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1185464" ref_url="https://bugzilla.suse.com/1185464" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008758.html" source="SUSE-SU"/>
		<description>
This update for shim fixes the following issues:

- Update to the unified shim binary for SBAT support (bsc#1182057)
  + Merged EKU codesign check (bsc#1177315)
- shim-install: Always assume 'removable' for Azure to avoid the endless reset loop (bsc#1185464).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177315">SUSE bug 1177315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185464">SUSE bug 1185464</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493901" comment="shim-15.4-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110160" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493902" comment="kernel-default-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493903" comment="kernel-default-base-5.3.18-24.64.1.9.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493904" comment="kernel-default-devel-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493905" comment="kernel-devel-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493906" comment="kernel-macros-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493907" comment="kernel-preempt-5.3.18-24.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110161" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1085803" ref_url="https://bugzilla.suse.com/1085803" source="BUGZILLA"/>
		<reference ref_id="1169925" ref_url="https://bugzilla.suse.com/1169925" source="BUGZILLA"/>
		<reference ref_id="1185279" ref_url="https://bugzilla.suse.com/1185279" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-7544" ref_url="https://www.suse.com/security/cve/CVE-2018-7544/" source="CVE"/>
		<reference ref_id="CVE-2020-11810" ref_url="https://www.suse.com/security/cve/CVE-2020-11810/" source="CVE"/>
		<reference ref_id="CVE-2020-15078" ref_url="https://www.suse.com/security/cve/CVE-2020-15078/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008762.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2020-11810: Fixed race condition between allocating peer-id and initializing data channel key (bsc#1169925).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1085803">SUSE bug 1085803</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169925">SUSE bug 1169925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185279">SUSE bug 1185279</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-7544/">CVE-2018-7544</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11810/">CVE-2020-11810</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15078/">CVE-2020-15078</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493908" comment="openvpn-2.4.3-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493909" comment="openvpn-auth-pam-plugin-2.4.3-5.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493910" comment="openvpn-devel-2.4.3-5.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110162" version="1" class="patch">
	<metadata>
		<title>Security update for dtc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184122" ref_url="https://bugzilla.suse.com/1184122" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008772.html" source="SUSE-SU"/>
		<description>
This update for dtc fixes the following issues:

-  make all packaged binaries PIE-executables (bsc#1184122).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-13"/>
	<updated date="2021-05-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184122">SUSE bug 1184122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493911" comment="libfdt-devel-1.5.1-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493912" comment="libfdt1-1.5.1-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110163" version="1" class="patch">
	<metadata>
		<title>Security update for ipvsadm (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184988" ref_url="https://bugzilla.suse.com/1184988" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008771.html" source="SUSE-SU"/>
		<description>
This update for ipvsadm fixes the following issues:

- Hardening: link as position independent executable (bsc#1184988).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-13"/>
	<updated date="2021-05-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184988">SUSE bug 1184988</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493913" comment="ipvsadm-1.29-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110164" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176076" ref_url="https://bugzilla.suse.com/1176076" source="BUGZILLA"/>
		<reference ref_id="1177077" ref_url="https://bugzilla.suse.com/1177077" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25681" ref_url="https://www.suse.com/security/cve/CVE-2020-25681/" source="CVE"/>
		<reference ref_id="CVE-2020-25682" ref_url="https://www.suse.com/security/cve/CVE-2020-25682/" source="CVE"/>
		<reference ref_id="CVE-2020-25683" ref_url="https://www.suse.com/security/cve/CVE-2020-25683/" source="CVE"/>
		<reference ref_id="CVE-2020-25684" ref_url="https://www.suse.com/security/cve/CVE-2020-25684/" source="CVE"/>
		<reference ref_id="CVE-2020-25685" ref_url="https://www.suse.com/security/cve/CVE-2020-25685/" source="CVE"/>
		<reference ref_id="CVE-2020-25686" ref_url="https://www.suse.com/security/cve/CVE-2020-25686/" source="CVE"/>
		<reference ref_id="CVE-2020-25687" ref_url="https://www.suse.com/security/cve/CVE-2020-25687/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008222.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- bsc#1177077: Fixed DNSpooq vulnerabilities
- CVE-2020-25684, CVE-2020-25685, CVE-2020-25686:
  Fixed multiple Cache Poisoning attacks.
- CVE-2020-25681, CVE-2020-25682, CVE-2020-25683, CVE-2020-25687:
  Fixed multiple potential Heap-based overflows when DNSSEC is
  enabled.

- Retry query to other servers on receipt of SERVFAIL rcode
  (bsc#1176076)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-19"/>
	<updated date="2021-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176076">SUSE bug 1176076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177077">SUSE bug 1177077</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25681/">CVE-2020-25681</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25682/">CVE-2020-25682</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25683/">CVE-2020-25683</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25684/">CVE-2020-25684</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25685/">CVE-2020-25685</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25686/">CVE-2020-25686</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25687/">CVE-2020-25687</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493146" comment="dnsmasq-2.78-7.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110165" version="1" class="patch">
	<metadata>
		<title>Recommended update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185580" ref_url="https://bugzilla.suse.com/1185580" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008786.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fixed error with the shim_lock protocol that is not found on aarch64 (bsc#1185580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185580">SUSE bug 1185580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493914" comment="grub2-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493915" comment="grub2-arm64-efi-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493916" comment="grub2-i386-pc-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493917" comment="grub2-powerpc-ieee1275-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493918" comment="grub2-s390x-emu-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493919" comment="grub2-snapper-plugin-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493920" comment="grub2-systemd-sleep-plugin-2.04-9.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493921" comment="grub2-x86_64-efi-2.04-9.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110166" version="1" class="patch">
	<metadata>
		<title>Security update for lz4 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185438" ref_url="https://bugzilla.suse.com/1185438" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3520" ref_url="https://www.suse.com/security/cve/CVE-2021-3520/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1647-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018981.html" source="SUSE-SU"/>
		<description>
This update for lz4 fixes the following issues:

- CVE-2021-3520: Fixed memory corruption due to an integer overflow bug caused by memmove argument (bsc#1185438).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185438">SUSE bug 1185438</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3520/">CVE-2021-3520</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493922" comment="liblz4-1-1.8.0-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493923" comment="liblz4-1-32bit-1.8.0-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493924" comment="liblz4-devel-1.8.0-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493925" comment="lz4-1.8.0-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110167" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493926" comment="graphviz-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493927" comment="graphviz-devel-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493928" comment="graphviz-plugins-core-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493929" comment="libgraphviz6-2.40.1-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110168" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493930" comment="libxml2-2-2.9.7-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493931" comment="libxml2-2-32bit-2.9.7-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493932" comment="libxml2-devel-2.9.7-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493933" comment="libxml2-tools-2.9.7-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493934" comment="python3-libxml2-python-2.9.7-3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110169" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1156260" ref_url="https://bugzilla.suse.com/1156260" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<description>
This update for fribidi fixes the following issues:

Security issues fixed:

- CVE-2019-18397: Avoid buffer overflow. (bsc#1156260)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493935" comment="fribidi-1.0.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493936" comment="fribidi-devel-1.0.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493937" comment="libfribidi0-1.0.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110170" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 fixes the following issues:

This update ships postgresql13.

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

- bsc#1178961: %ghost the symlinks to pg_config and ecpg.

Changes in postgresql wrapper package:

- Bump major version to 13.
- We also transfer PostgreSQL 9.4.26 to the new package layout in
  SLE12-SP2 and newer. Reflect this in the conflict with
  postgresql94.
- Also conflict with PostgreSQL versions before 9.
- Conflicting with older versions is not limited to SLE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-20"/>
	<updated date="2021-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493938" comment="libpq5-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493939" comment="libpq5-32bit-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493940" comment="postgresql-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493941" comment="postgresql13-13.1-5.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110171" version="1" class="patch">
	<metadata>
		<title>Security update for libu2f-host (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1124781" ref_url="https://bugzilla.suse.com/1124781" source="BUGZILLA"/>
		<reference ref_id="1128140" ref_url="https://bugzilla.suse.com/1128140" source="BUGZILLA"/>
		<reference ref_id="1184648" ref_url="https://bugzilla.suse.com/1184648" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20340" ref_url="https://www.suse.com/security/cve/CVE-2018-20340/" source="CVE"/>
		<reference ref_id="CVE-2019-9578" ref_url="https://www.suse.com/security/cve/CVE-2019-9578/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008817.html" source="SUSE-SU"/>
		<description>
This update for libu2f-host fixes the following issues:

This update ships the u2f-host package (jsc#ECO-3687 bsc#1184648)

Version 1.1.10 (released 2019-05-15)

- Add new devices to udev rules.
- Fix a potentially uninitialized buffer (CVE-2019-9578, bsc#1128140)

Version 1.1.9 (released 2019-03-06)

- Fix CID copying from the init response, which broke compatibility with
some devices.

Version 1.1.8 (released 2019-03-05)

- Add udev rules
- Drop 70-old-u2f.rules and use 70-u2f.rules for everything
- Use a random nonce for setting up CID to prevent fingerprinting
- CVE-2019-9578: Parse the response to init in a more stable way to prevent
  leakage of uninitialized stack memory back to the device (bsc#1128140).

Version 1.1.7 (released 2019-01-08)

- Fix for trusting length from device in device init.
- Fix for buffer overflow when receiving data from device. (YSA-2019-01,
  CVE-2018-20340, bsc#1124781)
- Add udev rules for some new devices.

- Add udev rule for Feitian ePass FIDO 
  - Add a timeout to the register and authenticate actions.		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1124781">SUSE bug 1124781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128140">SUSE bug 1128140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184648">SUSE bug 1184648</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-20340/">CVE-2018-20340</cve>
	<cve impact="low" cvss3="2.1/CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9578/">CVE-2019-9578</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493942" comment="libu2f-host-devel-1.1.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493943" comment="libu2f-host0-1.1.10-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493944" comment="u2f-host-1.1.10-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110172" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185013" ref_url="https://bugzilla.suse.com/1185013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008840.html" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3504: hivex: missing bounds check within hivex_open() (bsc#1185013)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493945" comment="hivex-devel-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493946" comment="libhivex0-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493947" comment="perl-Win-Hivex-1.3.14-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110173" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186114" ref_url="https://bugzilla.suse.com/1186114" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22898" ref_url="https://www.suse.com/security/cve/CVE-2021-22898/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008846.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22898: Fixed curl TELNET stack contents disclosure (bsc#1186114).
- Allow partial chain verification [jsc#SLE-17956]
  * Have intermediate certificates in the trust store be treated
    as trust-anchors, in the same way as self-signed root CA
    certificates are. This allows users to verify servers using
    the intermediate cert only, instead of needing the whole chain.
  * Set FLAG_TRUSTED_FIRST unconditionally.
  * Do not check partial chains with CRL check.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186114">SUSE bug 1186114</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22898/">CVE-2021-22898</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493948" comment="curl-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493949" comment="libcurl-devel-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493950" comment="libcurl4-7.66.0-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493951" comment="libcurl4-32bit-7.66.0-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110174" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182506" ref_url="https://bugzilla.suse.com/1182506" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008845.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- CVE-2021-31535: Fixed missing request length checks in libX11 (bsc#1182506).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182506">SUSE bug 1182506</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493952" comment="libX11-6-1.6.5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493953" comment="libX11-6-32bit-1.6.5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493954" comment="libX11-data-1.6.5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493955" comment="libX11-devel-1.6.5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493956" comment="libX11-xcb1-1.6.5-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493957" comment="libX11-xcb1-32bit-1.6.5-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110175" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493958" comment="libpq5-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493959" comment="libpq5-32bit-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493960" comment="postgresql13-13.3-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110176" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<description>
This update for python-httplib2 fixes the following issues:

- Update to version 0.19.0 (bsc#1182053).
- CVE-2021-21240: Fixed regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed unescaped part of uri where an attacker could change request headers and body (bsc#1182053).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493961" comment="python3-httplib2-0.19.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110177" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<description>
This update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly fixes the following issues:

gstreamer was updated to version 1.16.3 (bsc#1181255):

- delay creation of threadpools
- bin: Fix `deep-element-removed` log message
- buffer: fix meta sequence number fallback on rpi
- bufferlist: foreach: always remove as parent if buffer is changed
- bus: Make setting/replacing/clearing the sync handler thread-safe
- elementfactory: Fix missing features in case a feature moves to another filename
- element: When removing a ghost pad also unset its target
- meta: intern registered impl string
- registry: Use a toolchain-specific registry file on Windows
- systemclock: Invalid internal time calculation causes non-increasing clock time on Windows
- value: don't write to `const char *`
- value: Fix segfault comparing empty GValueArrays
- Revert floating enforcing
- aggregator: fix iteration direction in skip_buffers
- sparsefile: fix possible crash when seeking
- baseparse: cache fix
- baseparse: fix memory leak when subclass skips whole input buffer
- baseparse: Set the private duration before posting a duration-changed message
- basetransform: allow not passthrough if generate_output is implemented
- identity: Fix a minor leak using meta_str
- queue: protect against lost wakeups for iterm_del condition
- queue2: Avoid races when posting buffering messages
- queue2: Fix missing/dropped buffering messages at startup
- identity: Unblock condition variable on FLUSH_START
- check: Use `g_thread_yield()` instead of `g_usleep(1)`
- tests: use cpu_family for arch checks
- gst-launch: Follow up to missing `s/g_print/gst_print/g`
- gst-inspect: Add define guard for `g_log_writer_supports_color()`
- gst-launch: go back down to `GST_STATE_NULL` in one step.
- device-monitor: list hidden providers before listing devices
- autotools build fixes for GNU make 4.3

gstreamer-plugins-good was updated to version 1.16.3 (bsc#1181255):

- deinterlace: on-the-fly renegotiation
- flacenc: Pass audio info from set_format() to query_total_samples() explicitly
- flacparse: fix broken reordering of flac metadata
- jack: Use jack_free(3) to release ports
- jpegdec: check buffer size before dereferencing
- pulse: fix discovery of newly added devices
- qtdemux fuzzing fixes
- qtdemux: Add 'mp3 ' fourcc that VLC seems to produce now
- qtdemux: Specify REDIRECT information in error message
- rtpbin: fix shutdown crash in rtpbin
- rtpsession: rename RTCP thread
- rtpvp8pay, rtpvp9pay: fix caps leak in set_caps()
- rtpjpegdepay: outputs framed jpeg
- rtpjitterbuffer: Properly free internal packets queue in finalize()
- rtspsrc: Don't return TRUE for unhandled query
- rtspsrc: Avoid stack overflow recursing waiting for response
- rtspsrc: Use the correct type for storing the max-rtcp-rtp-time-diff property
- rtspsrc: Error out when failling to receive message response
- rtspsrc: Fix for segmentation fault when handling set/get_parameter requests
- speex: Fix crash on Windows caused by cross-CRT issue
- speexdec: Crash when stopping the pipeline
- splitmuxsrc: Properly stop the loop if no part reader is present
- use gst_element_class_set_metadata when passing dynamic strings
- v4l2videodec: Increase internal bitstream pool size
- v4l2: fix crash when handling unsupported video format
- videocrop: allow properties to be animated by GstController
- videomixer: Don't leak peer caps
- vp8enc/vp8enc: set 1 for the default value of VP8E_SET_STATIC_THRESHOLD
- wavenc: Fix writing of the channel mask with &gt;2 channels

gstreamer-plugins-bad was updated to version 1.16.3 (bsc#1181255):

- amcvideodec: fix sync meta copying not taking a reference
- audiobuffersplit: Perform discont tracking on running time
- audiobuffersplit: Specify in the template caps that only interleaved audio is supported
- audiobuffersplit: Unset DISCONT flag if not discontinuous
- autoconvert: Fix lock-less exchange or free condition
- autoconvert: fix compiler warnings with g_atomic on recent GLib versions
- avfvideosrc: element requests camera permissions even with capture-screen property is true
- codecparsers: h264parser: guard against ref_pic_markings overflow
- dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
- dtls/connection: fix EOF handling with openssl 1.1.1e
- fdkaacdec: add support for mpegversion=2
- hls: Check nettle version to ensure AES128 support
- ipcpipeline: Rework compiler checks
- interlace: Increment phase_index before checking if we're at the end of the phase
- lv2: Make it build with -fno-common
- h264parser: Do not allocate too large size of memory for registered user data SEI
- ladspa: fix unbounded integer properties
- modplug: avoid division by zero
- msdkdec: Fix GstMsdkContext leak
- msdkenc: fix leaks on windows
- musepackdec: Don't fail all queries if no sample rate is known yet
- openslessink: Allow openslessink to handle 48kHz streams.
- opencv: allow compilation against 4.2.x
- proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
- vulkan: Drop use of VK_RESULT_BEGIN_RANGE
- wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
- wasapi: Fix possible deadlock while downwards state change
- waylandsink: Clear window when pipeline is stopped
- webrtc: Support non-trickle ICE candidates in the SDP
- webrtc: Unmap all non-binary buffers received via the datachannel
- meson: build with neon 0.31
- Drop upstream fixed patch: gstreamer-h264parser-fix-overflow.patch

- h264parser: guard against ref_pic_markings overflow
  (bsc#1181255 CVE-2021-3185)

- Disable the kate/libtiger plugin.  Kate streams for karaoke are not
  used anymore, and the source tarball for libtiger is no longer
  available upstream. (jsc#SLE-13843)

gstreamer-plugins-ugly was updated to version 1.16.3 (bsc#1181255):

+ x264enc: corrected em_data value in CEA-708 CC SEI message

gstreamer-plugins-base was updated to version 1.16.3 (bsc#1181255):

- audioaggregator: Check all downstream allowed caps structures if they support the upstream rate
- audioaggregator: Fix negotiation with downstream if there is no peer yet
- audioencoder: fix segment event leak
- discoverer: Fix caps handling in `pad-added` signal handler
- discoverer: Start discovering next URI from right thread
- fft: Update our kiss fft version, fixes thread-safety and concurrency issues and misc other things
- gl: numerous memory fixes (use-after-free, leaks, missing NULL-ify)
- gl/display/egl: ensure debug category is initialized
- gstglwindow_x11: fix resize
- pbutils: Add latest H.264 level values
- rtpbuffer: fix header extension length validation
- video: Fix NV12_64Z32 number of component
- video-format: RGB16/15 are not 16 bit per component but only 5.333 and 5
- video: fix top/bottom field flags
- videodecoder: don't copy interlace-mode from reference state
- appsrc/appsink: Make setting/replacing callbacks thread-safe
- compositor: Fix checkerboard filling for BGRx/RGBx and UYVY/YUY2/YVYU
- decodebin3: only force streams-selected seqnum after a select-streams
- glupload: Fix fallback from direct dmabuf to dmabuf upload method
- glvideomixer: perform `_get_highest_precision()` on the GL thread
- libvisual: use `gst_element_class_set_metadata()` when passing dynamic strings
- oggstream: Workaround for broken PAR in VP8 BOS
- subparse: accept WebVTT timestamps without an hour component
- playbin: Handle error message with redirection indication
- textrender: Fix AYUV output.
- typefind: Consider MPEG-PS PSM to be a PES type
- uridecodebin3: default to non-0 buffer-size and buffer-duration, otherwise it could potentially cause big memory allocations over time
- videoaggregator: Don't configure NULL chroma-site/colorimetry
- videorate/videoscale/audioresample: Ensure that the caps returned from...
- build: Replace bashisms in configure for Wayland and GLES3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493962" comment="gstreamer-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493963" comment="gstreamer-lang-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493964" comment="gstreamer-plugins-base-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493965" comment="gstreamer-plugins-base-lang-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493966" comment="gstreamer-plugins-good-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493967" comment="gstreamer-plugins-good-lang-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493968" comment="libgstallocators-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493969" comment="libgstapp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493970" comment="libgstaudio-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493971" comment="libgstfft-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493972" comment="libgstgl-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493973" comment="libgstpbutils-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493974" comment="libgstphotography-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493975" comment="libgstreamer-1_0-0-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493976" comment="libgstriff-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493977" comment="libgstrtp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493978" comment="libgstrtsp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493979" comment="libgstsdp-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493980" comment="libgsttag-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493981" comment="libgstvideo-1_0-0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493982" comment="typelib-1_0-Gst-1_0-1.16.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110178" version="1" class="patch">
	<metadata>
		<title>Security update for perl-Convert-ASN1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168934" ref_url="https://bugzilla.suse.com/1168934" source="BUGZILLA"/>
		<reference ref_id="CVE-2013-7488" ref_url="https://www.suse.com/security/cve/CVE-2013-7488/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008232.html" source="SUSE-SU"/>
		<description>
This update for perl-Convert-ASN1 fixes the following issue:

- CVE-2013-7488: Fixed an infinite loop via unexpected input (bsc#1168934).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-21"/>
	<updated date="2021-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168934">SUSE bug 1168934</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2013-7488/">CVE-2013-7488</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493147" comment="perl-Convert-ASN1-0.27-1.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110179" version="1" class="patch">
	<metadata>
		<title>Security update for ceph (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185619" ref_url="https://bugzilla.suse.com/1185619" source="BUGZILLA"/>
		<reference ref_id="1186020" ref_url="https://bugzilla.suse.com/1186020" source="BUGZILLA"/>
		<reference ref_id="1186021" ref_url="https://bugzilla.suse.com/1186021" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3509" ref_url="https://www.suse.com/security/cve/CVE-2021-3509/" source="CVE"/>
		<reference ref_id="CVE-2021-3524" ref_url="https://www.suse.com/security/cve/CVE-2021-3524/" source="CVE"/>
		<reference ref_id="CVE-2021-3531" ref_url="https://www.suse.com/security/cve/CVE-2021-3531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008915.html" source="SUSE-SU"/>
		<description>
This update for ceph fixes the following issues:

- Update to 15.2.12-83-g528da226523:
- (CVE-2021-3509) fix cookie injection issue (bsc#1186021)
- (CVE-2021-3531) RGWSwiftWebsiteHandler::is_web_dir checks empty subdir_name (bsc#1186020)
- (CVE-2021-3524) sanitize \r in s3 CORSConfiguration’s ExposeHeader (bsc#1185619)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185619">SUSE bug 1185619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186020">SUSE bug 1186020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186021">SUSE bug 1186021</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3509/">CVE-2021-3509</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3524/">CVE-2021-3524</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3531/">CVE-2021-3531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493983" comment="ceph-common-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493984" comment="libcephfs-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493985" comment="libcephfs2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493986" comment="librados-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493987" comment="librados2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493988" comment="libradospp-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493989" comment="librbd-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493990" comment="librbd1-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493991" comment="librgw-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493992" comment="librgw2-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493993" comment="python3-ceph-argparse-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493994" comment="python3-ceph-common-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493995" comment="python3-cephfs-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493996" comment="python3-rados-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493997" comment="python3-rbd-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493998" comment="python3-rgw-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493999" comment="rados-objclass-devel-15.2.12.83+g528da226523-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494000" comment="rbd-nbd-15.2.12.83+g528da226523-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110180" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174307" ref_url="https://bugzilla.suse.com/1174307" source="BUGZILLA"/>
		<reference ref_id="1180393" ref_url="https://bugzilla.suse.com/1180393" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008233.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2020-29385: Fixed an infinite loop in lzw.c in the function write_indexes (bsc#1180393).
- Fixed an integer underflow in the GIF loader (bsc#1174307).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-21"/>
	<updated date="2021-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174307">SUSE bug 1174307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180393">SUSE bug 1180393</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494001" comment="gdk-pixbuf-devel-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494002" comment="gdk-pixbuf-lang-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494003" comment="gdk-pixbuf-query-loaders-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494004" comment="gdk-pixbuf-thumbnailer-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494005" comment="libgdk_pixbuf-2_0-0-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494006" comment="typelib-1_0-GdkPixbuf-2_0-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494007" comment="typelib-1_0-GdkPixdata-2_0-2.40.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110181" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008914.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494008" comment="dhcp-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494009" comment="dhcp-client-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494010" comment="dhcp-devel-4.3.6.P1-6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110182" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186497" ref_url="https://bugzilla.suse.com/1186497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3560" ref_url="https://www.suse.com/security/cve/CVE-2021-3560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008928.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-3560: Fixed a local privilege escalation using polkit_system_bus_name_get_creds_sync() (bsc#1186497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-03"/>
	<updated date="2021-06-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186497">SUSE bug 1186497</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3560/">CVE-2021-3560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494011" comment="libpolkit0-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494012" comment="polkit-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494013" comment="polkit-devel-0.116-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494014" comment="typelib-1_0-Polkit-1_0-0.116-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110183" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1184505" ref_url="https://bugzilla.suse.com/1184505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008931.html" source="SUSE-SU"/>
		<description>
This update for python-py fixes the following issues:

- CVE-2020-29651: Fixed regular expression denial of service in svnwc.py (bsc#1179805, bsc#1184505).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184505">SUSE bug 1184505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494015" comment="python3-py-1.8.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110184" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1091340" ref_url="https://bugzilla.suse.com/1091340" source="BUGZILLA"/>
		<reference ref_id="1091341" ref_url="https://bugzilla.suse.com/1091341" source="BUGZILLA"/>
		<reference ref_id="1091342" ref_url="https://bugzilla.suse.com/1091342" source="BUGZILLA"/>
		<reference ref_id="1091343" ref_url="https://bugzilla.suse.com/1091343" source="BUGZILLA"/>
		<reference ref_id="1091344" ref_url="https://bugzilla.suse.com/1091344" source="BUGZILLA"/>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536/" source="CVE"/>
		<reference ref_id="CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537/" source="CVE"/>
		<reference ref_id="CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538/" source="CVE"/>
		<reference ref_id="CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539/" source="CVE"/>
		<reference ref_id="CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540/" source="CVE"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- Update to version 5.4.0
  * CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414) 
  * fixed: disable A32 asm code when building for Apple silicon
  * fixed: issues with Adobe-style floating-point WAV files
  * added: --normalize-floats option to wvunpack for correctly
             exporting un-normalized floating-point files
- Update to version 5.3.0 
  * fixed: OSS-Fuzz issues 19925, 19928, 20060, 20448
  * fixed: trailing garbage characters on imported ID3v2 TXXX tags
  * fixed: various minor undefined behavior and memory access issues
  * fixed: sanitize tag extraction names for length and path inclusion
  * improved: reformat wvunpack 'help' and split into long + short versions
  * added: regression testing to Travis CI for OSS-Fuzz crashers
- Updated to version 5.2.0 
  *fixed: potential security issues including the following CVEs:
         CVE-2018-19840, CVE-2018-19841, CVE-2018-10536 (bsc#1091344),
         CVE-2018-10537 (bsc#1091343) CVE-2018-10538 (bsc#1091342),  
         CVE-2018-10539 (bsc#1091341), CVE-2018-10540 (bsc#1091340), 
         CVE-2018-7254,  CVE-2018-7253, CVE-2018-6767, CVE-2019-11498 
         and CVE-2019-1010319
  * added: support for CMake, Travis CI, and Google's OSS-fuzz
  * fixed: use correction file for encode verify (pipe input, Windows)
  * fixed: correct WAV header with actual length (pipe input, -i option)
  * fixed: thumb interworking and not needing v6 architecture (ARM asm)
  * added: handle more ID3v2.3 tag items and from all file types
  * fixed: coredump on Sparc64 (changed MD5 implementation)
  * fixed: handle invalid ID3v2.3 tags from sacd-ripper
  * fixed: several corner-case memory leaks
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-21"/>
	<updated date="2021-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494016" comment="libwavpack1-5.4.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110185" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494017" comment="kernel-default-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494018" comment="kernel-default-base-5.3.18-24.67.3.9.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494019" comment="kernel-default-devel-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494020" comment="kernel-devel-5.3.18-24.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494021" comment="kernel-macros-5.3.18-24.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494022" comment="kernel-preempt-5.3.18-24.67.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110186" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176681" ref_url="https://bugzilla.suse.com/1176681" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179484" ref_url="https://bugzilla.suse.com/1179484" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="1183979" ref_url="https://bugzilla.suse.com/1183979" source="BUGZILLA"/>
		<reference ref_id="1186290" ref_url="https://bugzilla.suse.com/1186290" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-25085: Fix out-of-bounds access issue while doing multi block SDMA (bsc#1176681)
- CVE-2020-10756: Fix out-of-bounds read information disclosure in icmp6_send_echoreply(bsc#1172380)
- Fix issue where s390 guest fails to find zipl boot menu index (bsc#1183979)
- QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
- Host CPU microcode revision will be visible inside VMs when the proper CPU-model is used (jsc#SLE-17785):
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846,
  CVE-2021-3419, bsc#1182975)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183979">SUSE bug 1183979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186290">SUSE bug 1186290</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494023" comment="qemu-tools-4.2.1-11.19.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110187" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186643" ref_url="https://bugzilla.suse.com/1186643" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31535" ref_url="https://www.suse.com/security/cve/CVE-2021-31535/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008960.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Regression in the fix for CVE-2021-31535, causing segfaults for xforms applications like fdesign (bsc#1186643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186643">SUSE bug 1186643</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31535/">CVE-2021-31535</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494024" comment="libX11-6-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494025" comment="libX11-6-32bit-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494026" comment="libX11-data-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494027" comment="libX11-devel-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494028" comment="libX11-xcb1-1.6.5-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494029" comment="libX11-xcb1-32bit-1.6.5-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110188" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008970.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494030" comment="libxml2-2-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494031" comment="libxml2-2-32bit-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494032" comment="libxml2-devel-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494033" comment="libxml2-tools-2.9.7-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494034" comment="python3-libxml2-python-2.9.7-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110189" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179833" ref_url="https://bugzilla.suse.com/1179833" source="BUGZILLA"/>
		<reference ref_id="1179836" ref_url="https://bugzilla.suse.com/1179836" source="BUGZILLA"/>
		<reference ref_id="1179837" ref_url="https://bugzilla.suse.com/1179837" source="BUGZILLA"/>
		<reference ref_id="1179839" ref_url="https://bugzilla.suse.com/1179839" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24489" ref_url="https://www.suse.com/security/cve/CVE-2020-24489/" source="CVE"/>
		<reference ref_id="CVE-2020-24511" ref_url="https://www.suse.com/security/cve/CVE-2020-24511/" source="CVE"/>
		<reference ref_id="CVE-2020-24512" ref_url="https://www.suse.com/security/cve/CVE-2020-24512/" source="CVE"/>
		<reference ref_id="CVE-2020-24513" ref_url="https://www.suse.com/security/cve/CVE-2020-24513/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008987.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20210608 release.

- CVE-2020-24513: A domain bypass transient execution vulnerability was discovered on some Intel Atom processors that use a micro-architectural incident channel. (INTEL-SA-00465 bsc#1179833)
    See also: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00465.html

- CVE-2020-24511: The IBRS feature to mitigate Spectre variant 2 transient execution side channel vulnerabilities may not fully prevent non-root (guest) branches from controlling the branch predictions of the root (host) (INTEL-SA-00464 bsc#1179836)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

- CVE-2020-24512: Fixed trivial data value cache-lines such as all-zero value cache-lines may lead to changes in cache-allocation or write-back behavior for such cache-lines (bsc#1179837 INTEL-SA-00464)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html)

  - CVE-2020-24489: Fixed Intel VT-d device pass through potential local privilege escalation (INTEL-SA-00442 bsc#1179839)

    See also https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html

Other fixes:

- Update for functional issues. Refer to [Third Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/637780)for details.
- Update for functional issues. Refer to [Second Generation Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/338848) for details.
- Update for functional issues. Refer to [Intel Xeon Processor Scalable Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/613537) for details.
- Update for functional issues. Refer to [Intel Xeon Processor D-1500, D-1500 NS and D-1600 NS Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-d-1500-specification-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E7-8800 and E7-4800 v3 Processor Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e7-v3-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon Processor E5 v3 Product Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e5-v3-spec-update.html?wapkw=processor+spec+update+e5) for details.
- Update for functional issues. Refer to [10th Gen Intel Core Processor Families Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/10th-gen-core-families-specification-update.html) for details.
- Update for functional issues. Refer to [8th and 9th Gen Intel Core Processor Family Spec Update](https://www.intel.com/content/www/us/en/products/docs/processors/core/8th-gen-core-spec-update.html) for details.
- Update for functional issues. Refer to [7th Gen and 8th Gen (U Quad-Core) Intel Processor Families Specification Update](https://www.intel.com/content/www/us/en/processors/core/7th-gen-core-family-spec-update.html) for details.
- Update for functional issues. Refer to [6th Gen Intel Processor Family Specification Update](https://cdrdv2.intel.com/v1/dl/getContent/332689) for details.
- Update for functional issues. Refer to [Intel Xeon E3-1200 v6 Processor Family Specification Update](https://www.intel.com/content/www/us/en/processors/xeon/xeon-e3-1200v6-spec-update.html) for details.
- Update for functional issues. Refer to [Intel Xeon E-2100 and E-2200 Processor Family Specification Update](https://www.intel.com/content/www/us/en/products/docs/processors/xeon/xeon-e-2100-specification-update.html) for details.

- New platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| CLX-SP         | A0       | 06-55-05/b7 |          | 03000010 | Xeon Scalable Gen2
| ICX-SP         | C0       | 06-6a-05/87 |          | 0c0002f0 | Xeon Scalable Gen3
| ICX-SP         | D0       | 06-6a-06/87 |          | 0d0002a0 | Xeon Scalable Gen3
| SNR            | B0       | 06-86-04/01 |          | 0b00000f | Atom P59xxB
| SNR            | B1       | 06-86-05/01 |          | 0b00000f | Atom P59xxB
| TGL            | B1       | 06-8c-01/80 |          | 00000088 | Core Gen11 Mobile
| TGL-R          | C0       | 06-8c-02/c2 |          | 00000016 | Core Gen11 Mobile
| TGL-H          | R0       | 06-8d-01/c2 |          | 0000002c | Core Gen11 Mobile
| EHL            | B1       | 06-96-01/01 |          | 00000011 | Pentium J6426/N6415, Celeron J6412/J6413/N6210/N6211, Atom x6000E
| JSL            | A0/A1    | 06-9c-00/01 |          | 0000001d | Pentium N6000/N6005, Celeron N4500/N4505/N5100/N5105
| RKL-S          | B0       | 06-a7-01/02 |          | 00000040 | Core Gen11

- Updated platforms:

| Processor      | Stepping | F-M-S/PI    | Old Ver  | New Ver  | Products
|:---------------|:---------|:------------|:---------|:---------|:---------
| HSX-E/EP       | Cx/M1    | 06-3f-02/6f | 00000044 | 00000046 | Core Gen4 X series; Xeon E5 v3
| HSX-EX         | E0       | 06-3f-04/80 | 00000016 | 00000019 | Xeon E7 v3
| SKL-U/Y        | D0       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| SKL-U23e       | K1       | 06-4e-03/c0 | 000000e2 | 000000ea | Core Gen6 Mobile
| BDX-ML         | B0/M0/R0 | 06-4f-01/ef | 0b000038 | 0b00003e | Xeon E5/E7 v4; Core i7-69xx/68xx
| SKX-SP         | B1       | 06-55-03/97 | 01000159 | 0100015b | Xeon Scalable
| SKX-SP         | H0/M0/U0 | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon Scalable
| SKX-D          | M1       | 06-55-04/b7 | 02006a0a | 02006b06 | Xeon D-21xx
| CLX-SP         | B0       | 06-55-06/bf | 04003006 | 04003102 | Xeon Scalable Gen2
| CLX-SP         | B1       | 06-55-07/bf | 05003006 | 05003102 | Xeon Scalable Gen2
| CPX-SP         | A1       | 06-55-0b/bf | 0700001e | 07002302 | Xeon Scalable Gen3
| BDX-DE         | V2/V3    | 06-56-03/10 | 07000019 | 0700001b | Xeon D-1518/19/21/27/28/31/33/37/41/48, Pentium D1507/08/09/17/19
| BDX-DE         | Y0       | 06-56-04/10 | 0f000017 | 0f000019 | Xeon D-1557/59/67/71/77/81/87
| BDX-NS         | A0       | 06-56-05/10 | 0e00000f | 0e000012 | Xeon D-1513N/23/33/43/53
| APL            | D0       | 06-5c-09/03 | 00000040 | 00000044 | Pentium N/J4xxx, Celeron N/J3xxx, Atom x5/7-E39xx
| APL            | E0       | 06-5c-0a/03 | 0000001e | 00000020 | Atom x5-E39xx
| SKL-H/S        | R0/N0    | 06-5e-03/36 | 000000e2 | 000000ea | Core Gen6; Xeon E3 v5
| DNV            | B0       | 06-5f-01/01 | 0000002e | 00000034 | Atom C Series
| GLK            | B0       | 06-7a-01/01 | 00000034 | 00000036 | Pentium Silver N/J5xxx, Celeron N/J4xxx
| GKL-R          | R0       | 06-7a-08/01 | 00000018 | 0000001a | Pentium J5040/N5030, Celeron J4125/J4025/N4020/N4120
| ICL-U/Y        | D1       | 06-7e-05/80 | 000000a0 | 000000a6 | Core Gen10 Mobile
| LKF            | B2/B3    | 06-8a-01/10 | 00000028 | 0000002a | Core w/Hybrid Technology
| AML-Y22        | H0       | 06-8e-09/10 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-U/Y        | H0       | 06-8e-09/c0 | 000000de | 000000ea | Core Gen7 Mobile
| CFL-U43e       | D0       | 06-8e-0a/c0 | 000000e0 | 000000ea | Core Gen8 Mobile
| WHL-U          | W0       | 06-8e-0b/d0 | 000000de | 000000ea | Core Gen8 Mobile
| AML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| CML-Y42        | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen10 Mobile
| WHL-U          | V0       | 06-8e-0c/94 | 000000de | 000000ea | Core Gen8 Mobile
| KBL-G/H/S/E3   | B0       | 06-9e-09/2a | 000000de | 000000ea | Core Gen7; Xeon E3 v6
| CFL-H/S/E3     | U0       | 06-9e-0a/22 | 000000de | 000000ea | Core Gen8 Desktop, Mobile, Xeon E
| CFL-S          | B0       | 06-9e-0b/02 | 000000de | 000000ea | Core Gen8
| CFL-H/S        | P0       | 06-9e-0c/22 | 000000de | 000000ea | Core Gen9
| CFL-H          | R0       | 06-9e-0d/22 | 000000de | 000000ea | Core Gen9 Mobile
| CML-H          | R1       | 06-a5-02/20 | 000000e0 | 000000ea | Core Gen10 Mobile
| CML-S62        | G1       | 06-a5-03/22 | 000000e0 | 000000ea | Core Gen10
| CML-S102       | Q0       | 06-a5-05/22 | 000000e0 | 000000ec | Core Gen10
| CML-U62        | A0       | 06-a6-00/80 | 000000e0 | 000000e8 | Core Gen10 Mobile
| CML-U62 V2     | K0       | 06-a6-01/80 | 000000e0 | 000000ea | Core Gen10 Mobile
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179833">SUSE bug 1179833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179836">SUSE bug 1179836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179837">SUSE bug 1179837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179839">SUSE bug 1179839</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24489/">CVE-2020-24489</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24511/">CVE-2020-24511</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24512/">CVE-2020-24512</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24513/">CVE-2020-24513</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494035" comment="ucode-intel-20210525-7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110190" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181221" ref_url="https://bugzilla.suse.com/1181221" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3181" ref_url="https://www.suse.com/security/cve/CVE-2021-3181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008238.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issue:

- CVE-2021-3181: Fixed a memory leak in recipient parsing (bsc#1181221).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181221">SUSE bug 1181221</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3181/">CVE-2021-3181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494036" comment="mutt-1.10.1-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494037" comment="mutt-doc-1.10.1-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494038" comment="mutt-lang-1.10.1-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110191" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186764" ref_url="https://bugzilla.suse.com/1186764" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009002.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-17541: Fixed a stack-based buffer overflow in the 'transform' component (bsc#1186764).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494039" comment="libjpeg62-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494040" comment="libjpeg62-devel-62.2.0-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494041" comment="libjpeg8-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494042" comment="libjpeg8-devel-8.1.2-5.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494043" comment="libturbojpeg0-8.1.2-5.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110192" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171883" ref_url="https://bugzilla.suse.com/1171883" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8025" ref_url="https://www.suse.com/security/cve/CVE-2020-8025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008241.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- Update to version 20181224:
  * pcp: remove no longer needed / conflicting entries
         (bsc#1171883, CVE-2020-8025)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171883">SUSE bug 1171883</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8025/">CVE-2020-8025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494044" comment="permissions-20181224-23.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494045" comment="permissions-zypp-plugin-20181224-23.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110193" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494046" comment="postgresql10-10.17-8.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110194" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.7:

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494047" comment="postgresql12-12.7-8.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110195" version="1" class="patch">
	<metadata>
		<title>Security update for tpm2.0-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186490" ref_url="https://bugzilla.suse.com/1186490" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3565" ref_url="https://www.suse.com/security/cve/CVE-2021-3565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1999-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009031.html" source="SUSE-SU"/>
		<description>
This update for tpm2.0-tools fixes the following issues:

- CVE-2021-3565: Fixed issue when no encrypted session with the TPM is used (bsc#1186490).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186490">SUSE bug 1186490</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3565/">CVE-2021-3565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494052" comment="tpm2.0-tools-4.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110196" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009029.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Proper handling of leading '\0' bytes during decryption of ciphertext (bsc#1172389)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494053" comment="python3-rsa-3.4.2-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110197" version="1" class="patch">
	<metadata>
		<title>Security update for xterm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182091" ref_url="https://bugzilla.suse.com/1182091" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27135" ref_url="https://www.suse.com/security/cve/CVE-2021-27135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009036.html" source="SUSE-SU"/>
		<description>
This update for xterm fixes the following issues:

- CVE-2021-27135: Fixed buffer-overflow when clicking on selected utf8 text. (bsc#1182091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182091">SUSE bug 1182091</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27135/">CVE-2021-27135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494054" comment="xterm-330-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494055" comment="xterm-bin-330-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110198" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171257" ref_url="https://bugzilla.suse.com/1171257" source="BUGZILLA"/>
		<reference ref_id="1176293" ref_url="https://bugzilla.suse.com/1176293" source="BUGZILLA"/>
		<reference ref_id="1179831" ref_url="https://bugzilla.suse.com/1179831" source="BUGZILLA"/>
		<reference ref_id="1181368" ref_url="https://bugzilla.suse.com/1181368" source="BUGZILLA"/>
		<reference ref_id="1182281" ref_url="https://bugzilla.suse.com/1182281" source="BUGZILLA"/>
		<reference ref_id="1182293" ref_url="https://bugzilla.suse.com/1182293" source="BUGZILLA"/>
		<reference ref_id="1182382" ref_url="https://bugzilla.suse.com/1182382" source="BUGZILLA"/>
		<reference ref_id="1185092" ref_url="https://bugzilla.suse.com/1185092" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028) 

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- virt module updates
  * network: handle missing ipv4 netmask attribute
  * more network support
  * PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in requirements/base.txt
- Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382)
- Always require `python3-distro` (bsc#1182293)
- Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing
- Fix pkg states when DEB package has 'all' arch
- Do not force beacons configuration to be a list.
- Remove msgpack &lt; 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version &gt;= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Improvements on 'ansiblegate' module (bsc#1185092):
  * New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171257">SUSE bug 1171257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176293">SUSE bug 1176293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179831">SUSE bug 1179831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181368">SUSE bug 1181368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182281">SUSE bug 1182281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182293">SUSE bug 1182293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185092">SUSE bug 1185092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494057" comment="python3-distro-1.5.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494058" comment="python3-salt-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494059" comment="salt-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494060" comment="salt-bash-completion-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494061" comment="salt-doc-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494062" comment="salt-minion-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494063" comment="salt-zsh-completion-3002.2-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110199" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179930" ref_url="https://bugzilla.suse.com/1179930" source="BUGZILLA"/>
		<reference ref_id="1179931" ref_url="https://bugzilla.suse.com/1179931" source="BUGZILLA"/>
		<reference ref_id="1179932" ref_url="https://bugzilla.suse.com/1179932" source="BUGZILLA"/>
		<reference ref_id="1179933" ref_url="https://bugzilla.suse.com/1179933" source="BUGZILLA"/>
		<reference ref_id="1180102" ref_url="https://bugzilla.suse.com/1180102" source="BUGZILLA"/>
		<reference ref_id="1180232" ref_url="https://bugzilla.suse.com/1180232" source="BUGZILLA"/>
		<reference ref_id="1181598" ref_url="https://bugzilla.suse.com/1181598" source="BUGZILLA"/>
		<reference ref_id="1181599" ref_url="https://bugzilla.suse.com/1181599" source="BUGZILLA"/>
		<reference ref_id="1183353" ref_url="https://bugzilla.suse.com/1183353" source="BUGZILLA"/>
		<reference ref_id="1184110" ref_url="https://bugzilla.suse.com/1184110" source="BUGZILLA"/>
		<reference ref_id="1185128" ref_url="https://bugzilla.suse.com/1185128" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418/" source="CVE"/>
		<reference ref_id="CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419/" source="CVE"/>
		<reference ref_id="CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420/" source="CVE"/>
		<reference ref_id="CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421/" source="CVE"/>
		<reference ref_id="CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422/" source="CVE"/>
		<reference ref_id="CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173/" source="CVE"/>
		<reference ref_id="CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174/" source="CVE"/>
		<reference ref_id="CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191/" source="CVE"/>
		<reference ref_id="CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<description>
This update for wireshark, libvirt, sbc and libqt5-qtmultimedia fixes the following issues:

Update wireshark to version 3.4.5

- New and updated support and bug fixes for multiple protocols
- Asynchronous DNS resolution is always enabled
- Protobuf fields can be dissected as Wireshark (header) fields
- UI improvements

Including security fixes for:

- CVE-2021-22191: Wireshark could open unsafe URLs (bsc#1183353).
- CVE-2021-22207: MS-WSP dissector excessive memory consumption (bsc#1185128)
- CVE-2020-26422: QUIC dissector crash (bsc#1180232)
- CVE-2020-26418: Kafka dissector memory leak (bsc#1179930)
- CVE-2020-26419: Multiple dissector memory leaks (bsc#1179931)
- CVE-2020-26420: RTPS dissector memory leak (bsc#1179932) 
- CVE-2020-26421: USB HID dissector crash (bsc#1179933)
- CVE-2021-22173: Fix USB HID dissector memory leak (bsc#1181598)
- CVE-2021-22174: Fix USB HID dissector crash (bsc#1181599)

libqt5-qtmultimedia and sbc are necessary dependencies. libvirt is needed to rebuild wireshark-plugin-libvirt.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179930">SUSE bug 1179930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179931">SUSE bug 1179931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179932">SUSE bug 1179932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179933">SUSE bug 1179933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180232">SUSE bug 1180232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181598">SUSE bug 1181598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181599">SUSE bug 1181599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183353">SUSE bug 1183353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184110">SUSE bug 1184110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185128">SUSE bug 1185128</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494064" comment="libsbc1-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494065" comment="libwireshark14-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494066" comment="libwiretap11-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494067" comment="libwsutil12-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494068" comment="wireshark-3.4.5-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110200" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187040" ref_url="https://bugzilla.suse.com/1187040" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13950" ref_url="https://www.suse.com/security/cve/CVE-2020-13950/" source="CVE"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-13950 [bsc#1187040]: mod_proxy NULL pointer dereference
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187040">SUSE bug 1187040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13950/">CVE-2020-13950</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494069" comment="apache2-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494070" comment="apache2-prefork-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494071" comment="apache2-utils-2.4.43-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110201" version="1" class="patch">
	<metadata>
		<title>Security update for cryptctl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186226" ref_url="https://bugzilla.suse.com/1186226" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18906" ref_url="https://www.suse.com/security/cve/CVE-2019-18906/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009076.html" source="SUSE-SU"/>
		<description>
This update for cryptctl fixes the following issues:

Update to version 2.4:

- CVE-2019-18906: Client side password hashing was equivalent to clear text password storage (bsc#1186226)
- First step to use plain text password instead of hashed password.
- Move repository into the SUSE github organization
- in RPC server, if client comes from localhost, remember its ipv4 localhost address instead of ipv6 address
- tell a record to clear expired pending commands upon saving a command result; introduce pending commands RPC test case
- avoid hard coding 127.0.0.1 in host ID of alive message test; let system administrator mount and unmount disks by issuing these two commands on key server.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186226">SUSE bug 1186226</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-18906/">CVE-2019-18906</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494072" comment="cryptctl-2.4-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110202" version="1" class="patch">
	<metadata>
		<title>Security update for libnettle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187060" ref_url="https://bugzilla.suse.com/1187060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3580" ref_url="https://www.suse.com/security/cve/CVE-2021-3580/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009079.html" source="SUSE-SU"/>
		<description>
This update for libnettle fixes the following issues:

- CVE-2021-3580: Fixed a remote denial of service in the RSA decryption via manipulated ciphertext (bsc#1187060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187060">SUSE bug 1187060</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3580/">CVE-2021-3580</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494073" comment="libhogweed4-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494074" comment="libhogweed4-32bit-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494075" comment="libnettle-devel-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494076" comment="libnettle6-3.4.1-4.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494077" comment="libnettle6-32bit-3.4.1-4.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110203" version="1" class="patch">
	<metadata>
		<title>Security update for libgcrypt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187212" ref_url="https://bugzilla.suse.com/1187212" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33560" ref_url="https://www.suse.com/security/cve/CVE-2021-33560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009085.html" source="SUSE-SU"/>
		<description>
This update for libgcrypt fixes the following issues:

- CVE-2021-33560: Fixed a side-channel against ElGamal encryption, caused by missing exponent blinding (bsc#1187212).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187212">SUSE bug 1187212</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33560/">CVE-2021-33560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494078" comment="libgcrypt-devel-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494079" comment="libgcrypt20-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494080" comment="libgcrypt20-32bit-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494081" comment="libgcrypt20-hmac-1.8.2-8.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494082" comment="libgcrypt20-hmac-32bit-1.8.2-8.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110204" version="1" class="patch">
	<metadata>
		<title>Security update for arpwatch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186240" ref_url="https://bugzilla.suse.com/1186240" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25321" ref_url="https://www.suse.com/security/cve/CVE-2021-25321/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009098.html" source="SUSE-SU"/>
		<description>
This update for arpwatch fixes the following issues:

- CVE-2021-25321: Fixed local privilege escalation from runtime user to root (bsc#1186240).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186240">SUSE bug 1186240</bugzilla>
	<cve impact="moderate" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25321/">CVE-2021-25321</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615873" comment="arpwatch-2.1a15-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110205" version="1" class="patch">
	<metadata>
		<title>Security update for lua53 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175448" ref_url="https://bugzilla.suse.com/1175448" source="BUGZILLA"/>
		<reference ref_id="1175449" ref_url="https://bugzilla.suse.com/1175449" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24370" ref_url="https://www.suse.com/security/cve/CVE-2020-24370/" source="CVE"/>
		<reference ref_id="CVE-2020-24371" ref_url="https://www.suse.com/security/cve/CVE-2020-24371/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009100.html" source="SUSE-SU"/>
		<description>
This update for lua53 fixes the following issues:

Update to version 5.3.6:

- CVE-2020-24371: lgc.c mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage (bsc#1175449)
- CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault in getlocal and setlocal (bsc#1175448)
- Long brackets with a huge number of '=' overflow some internal buffer arithmetic.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-29"/>
	<updated date="2021-06-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175448">SUSE bug 1175448</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175449">SUSE bug 1175449</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24370/">CVE-2020-24370</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24371/">CVE-2020-24371</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494048" comment="liblua5_3-5-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494049" comment="liblua5_3-5-32bit-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494050" comment="lua53-5.3.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494051" comment="lua53-devel-5.3.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110206" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184574" ref_url="https://bugzilla.suse.com/1184574" source="BUGZILLA"/>
		<reference ref_id="1185591" ref_url="https://bugzilla.suse.com/1185591" source="BUGZILLA"/>
		<reference ref_id="1185981" ref_url="https://bugzilla.suse.com/1185981" source="BUGZILLA"/>
		<reference ref_id="1185990" ref_url="https://bugzilla.suse.com/1185990" source="BUGZILLA"/>
		<reference ref_id="1186010" ref_url="https://bugzilla.suse.com/1186010" source="BUGZILLA"/>
		<reference ref_id="1187013" ref_url="https://bugzilla.suse.com/1187013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3546: Fix out-of-bounds write in virgl_cmd_get_capset (bsc#1185981)
- CVE-2021-3544: Fix memory leaks found in the virtio vhost-user GPU device (bsc#1186010)
- CVE-2021-3545: Fix information disclosure due to uninitialized memory read (bsc#1185990)

Non-security issues fixed:

- Fix testsuite error (bsc#1184574)
- Fix qemu crash with iothread when block commit after snapshot (bsc#1187013)
- Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)
- Use RCU to avoid race during scsi hotplug/hotunplug (bsc#1184574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184574">SUSE bug 1184574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185591">SUSE bug 1185591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185990">SUSE bug 1185990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186010">SUSE bug 1186010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187013">SUSE bug 1187013</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494056" comment="qemu-tools-4.2.1-11.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110207" version="1" class="patch">
	<metadata>
		<title>Security update for sudo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180684" ref_url="https://bugzilla.suse.com/1180684" source="BUGZILLA"/>
		<reference ref_id="1180685" ref_url="https://bugzilla.suse.com/1180685" source="BUGZILLA"/>
		<reference ref_id="1180687" ref_url="https://bugzilla.suse.com/1180687" source="BUGZILLA"/>
		<reference ref_id="1181090" ref_url="https://bugzilla.suse.com/1181090" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23239" ref_url="https://www.suse.com/security/cve/CVE-2021-23239/" source="CVE"/>
		<reference ref_id="CVE-2021-23240" ref_url="https://www.suse.com/security/cve/CVE-2021-23240/" source="CVE"/>
		<reference ref_id="CVE-2021-3156" ref_url="https://www.suse.com/security/cve/CVE-2021-3156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008250.html" source="SUSE-SU"/>
		<description>
This update for sudo fixes the following issues:

- A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges 
  [bsc#1181090,CVE-2021-3156]
- It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit`
  [bsc#1180684,CVE-2021-23239]
- A Possible Symlink Attack vector existed in `sudoedit` if SELinux was running in permissive mode [bsc#1180685,
  CVE-2021-23240]
- It was possible for a User to enable Debug Settings not Intended for them [bsc#1180687]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180684">SUSE bug 1180684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180685">SUSE bug 1180685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180687">SUSE bug 1180687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181090">SUSE bug 1181090</bugzilla>
	<cve impact="moderate" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23239/">CVE-2021-23239</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23240/">CVE-2021-23240</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3156/">CVE-2021-3156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493148" comment="sudo-1.8.22-4.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493149" comment="sudo-devel-1.8.22-4.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110208" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187105" ref_url="https://bugzilla.suse.com/1187105" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35512" ref_url="https://www.suse.com/security/cve/CVE-2020-35512/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009121.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-35512: Fixed a use-after-free or potential undefined behaviour caused by shared UID's (bsc#1187105)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187105">SUSE bug 1187105</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35512/">CVE-2020-35512</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615791" comment="dbus-1-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615792" comment="dbus-1-devel-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615793" comment="dbus-1-x11-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615794" comment="libdbus-1-3-1.12.2-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615795" comment="libdbus-1-3-32bit-1.12.2-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110209" version="1" class="patch">
	<metadata>
		<title>Security update for sqlite3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1157818" ref_url="https://bugzilla.suse.com/1157818" source="BUGZILLA"/>
		<reference ref_id="1158812" ref_url="https://bugzilla.suse.com/1158812" source="BUGZILLA"/>
		<reference ref_id="1158958" ref_url="https://bugzilla.suse.com/1158958" source="BUGZILLA"/>
		<reference ref_id="1158959" ref_url="https://bugzilla.suse.com/1158959" source="BUGZILLA"/>
		<reference ref_id="1158960" ref_url="https://bugzilla.suse.com/1158960" source="BUGZILLA"/>
		<reference ref_id="1159491" ref_url="https://bugzilla.suse.com/1159491" source="BUGZILLA"/>
		<reference ref_id="1159715" ref_url="https://bugzilla.suse.com/1159715" source="BUGZILLA"/>
		<reference ref_id="1159847" ref_url="https://bugzilla.suse.com/1159847" source="BUGZILLA"/>
		<reference ref_id="1159850" ref_url="https://bugzilla.suse.com/1159850" source="BUGZILLA"/>
		<reference ref_id="1160309" ref_url="https://bugzilla.suse.com/1160309" source="BUGZILLA"/>
		<reference ref_id="1160438" ref_url="https://bugzilla.suse.com/1160438" source="BUGZILLA"/>
		<reference ref_id="1160439" ref_url="https://bugzilla.suse.com/1160439" source="BUGZILLA"/>
		<reference ref_id="1164719" ref_url="https://bugzilla.suse.com/1164719" source="BUGZILLA"/>
		<reference ref_id="1172091" ref_url="https://bugzilla.suse.com/1172091" source="BUGZILLA"/>
		<reference ref_id="1172115" ref_url="https://bugzilla.suse.com/1172115" source="BUGZILLA"/>
		<reference ref_id="1172234" ref_url="https://bugzilla.suse.com/1172234" source="BUGZILLA"/>
		<reference ref_id="1172236" ref_url="https://bugzilla.suse.com/1172236" source="BUGZILLA"/>
		<reference ref_id="1172240" ref_url="https://bugzilla.suse.com/1172240" source="BUGZILLA"/>
		<reference ref_id="1173641" ref_url="https://bugzilla.suse.com/1173641" source="BUGZILLA"/>
		<reference ref_id="928700" ref_url="https://bugzilla.suse.com/928700" source="BUGZILLA"/>
		<reference ref_id="928701" ref_url="https://bugzilla.suse.com/928701" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-3414" ref_url="https://www.suse.com/security/cve/CVE-2015-3414/" source="CVE"/>
		<reference ref_id="CVE-2015-3415" ref_url="https://www.suse.com/security/cve/CVE-2015-3415/" source="CVE"/>
		<reference ref_id="CVE-2019-19244" ref_url="https://www.suse.com/security/cve/CVE-2019-19244/" source="CVE"/>
		<reference ref_id="CVE-2019-19317" ref_url="https://www.suse.com/security/cve/CVE-2019-19317/" source="CVE"/>
		<reference ref_id="CVE-2019-19603" ref_url="https://www.suse.com/security/cve/CVE-2019-19603/" source="CVE"/>
		<reference ref_id="CVE-2019-19645" ref_url="https://www.suse.com/security/cve/CVE-2019-19645/" source="CVE"/>
		<reference ref_id="CVE-2019-19646" ref_url="https://www.suse.com/security/cve/CVE-2019-19646/" source="CVE"/>
		<reference ref_id="CVE-2019-19880" ref_url="https://www.suse.com/security/cve/CVE-2019-19880/" source="CVE"/>
		<reference ref_id="CVE-2019-19923" ref_url="https://www.suse.com/security/cve/CVE-2019-19923/" source="CVE"/>
		<reference ref_id="CVE-2019-19924" ref_url="https://www.suse.com/security/cve/CVE-2019-19924/" source="CVE"/>
		<reference ref_id="CVE-2019-19925" ref_url="https://www.suse.com/security/cve/CVE-2019-19925/" source="CVE"/>
		<reference ref_id="CVE-2019-19926" ref_url="https://www.suse.com/security/cve/CVE-2019-19926/" source="CVE"/>
		<reference ref_id="CVE-2019-19959" ref_url="https://www.suse.com/security/cve/CVE-2019-19959/" source="CVE"/>
		<reference ref_id="CVE-2019-20218" ref_url="https://www.suse.com/security/cve/CVE-2019-20218/" source="CVE"/>
		<reference ref_id="CVE-2020-13434" ref_url="https://www.suse.com/security/cve/CVE-2020-13434/" source="CVE"/>
		<reference ref_id="CVE-2020-13435" ref_url="https://www.suse.com/security/cve/CVE-2020-13435/" source="CVE"/>
		<reference ref_id="CVE-2020-13630" ref_url="https://www.suse.com/security/cve/CVE-2020-13630/" source="CVE"/>
		<reference ref_id="CVE-2020-13631" ref_url="https://www.suse.com/security/cve/CVE-2020-13631/" source="CVE"/>
		<reference ref_id="CVE-2020-13632" ref_url="https://www.suse.com/security/cve/CVE-2020-13632/" source="CVE"/>
		<reference ref_id="CVE-2020-15358" ref_url="https://www.suse.com/security/cve/CVE-2020-15358/" source="CVE"/>
		<reference ref_id="CVE-2020-9327" ref_url="https://www.suse.com/security/cve/CVE-2020-9327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009137.html" source="SUSE-SU"/>
		<description>
This update for sqlite3 fixes the following issues:

- Update to version 3.36.0
- CVE-2020-15358: heap-based buffer overflow in multiSelectOrderBy due to mishandling of query-flattener
  optimization (bsc#1173641)
- CVE-2020-9327: NULL pointer dereference and segmentation fault because of generated column optimizations in
  isAuxiliaryVtabOperator (bsc#1164719)
- CVE-2019-20218: selectExpander in select.c proceeds with WITH stack unwinding even after a parsing error (bsc#1160439)
- CVE-2019-19959: memory-management error via ext/misc/zipfile.c involving embedded '\0' input (bsc#1160438)
- CVE-2019-19923: improper handling  of  certain uses of SELECT DISTINCT in flattenSubquery may lead to null pointer
  dereference (bsc#1160309)
- CVE-2019-19924: improper error handling in sqlite3WindowRewrite() (bsc#1159850)
- CVE-2019-19925: improper handling of NULL pathname during an update of a ZIP archive (bsc#1159847)
- CVE-2019-19926: improper handling  of certain errors during parsing  multiSelect in select.c (bsc#1159715)
- CVE-2019-19880: exprListAppendList in window.c allows attackers to trigger an invalid pointer dereference
  (bsc#1159491)
- CVE-2019-19603: during handling of CREATE TABLE and CREATE VIEW statements, does not consider confusion with
  a shadow table name (bsc#1158960)
- CVE-2019-19646: pragma.c mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated
  columns (bsc#1158959)
- CVE-2019-19645: alter.c allows attackers to trigger infinite recursion via certain types of self-referential views
  in conjunction with ALTER TABLE statements (bsc#1158958)
- CVE-2019-19317: lookupName in resolve.c omits bits from the colUsed bitmask in the case of a generated column,
  which allows attackers to cause a denial of service (bsc#1158812)
- CVE-2019-19244: sqlite3,sqlite2,sqlite: The function sqlite3Select in select.c allows a crash if a
  sub-select uses both DISTINCT and window functions, and also has certain ORDER BY usage (bsc#1157818)
- CVE-2015-3415: sqlite3VdbeExec comparison operator vulnerability (bsc#928701)
- CVE-2015-3414: sqlite3,sqlite2: dequoting of collation-sequence names (bsc#928700)
- CVE-2020-13434: integer overflow in sqlite3_str_vappendf (bsc#1172115)
- CVE-2020-13630: (bsc#1172234: use-after-free in fts3EvalNextRow
- CVE-2020-13631: virtual table allowed to be renamed to one of its shadow tables (bsc#1172236)
- CVE-2020-13632: NULL pointer dereference via crafted matchinfo() query (bsc#1172240)
- CVE-2020-13435: Malicious SQL statements could have crashed the process that is running SQLite (bsc#1172091)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1157818">SUSE bug 1157818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158812">SUSE bug 1158812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158958">SUSE bug 1158958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158959">SUSE bug 1158959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158960">SUSE bug 1158960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159491">SUSE bug 1159491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159715">SUSE bug 1159715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159847">SUSE bug 1159847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159850">SUSE bug 1159850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160309">SUSE bug 1160309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160438">SUSE bug 1160438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160439">SUSE bug 1160439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164719">SUSE bug 1164719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172091">SUSE bug 1172091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172115">SUSE bug 1172115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172234">SUSE bug 1172234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172236">SUSE bug 1172236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172240">SUSE bug 1172240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173641">SUSE bug 1173641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928700">SUSE bug 928700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/928701">SUSE bug 928701</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-3414/">CVE-2015-3414</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2015-3415/">CVE-2015-3415</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19244/">CVE-2019-19244</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19317/">CVE-2019-19317</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19603/">CVE-2019-19603</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19645/">CVE-2019-19645</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19646/">CVE-2019-19646</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-19880/">CVE-2019-19880</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19923/">CVE-2019-19923</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-19924/">CVE-2019-19924</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19925/">CVE-2019-19925</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-19926/">CVE-2019-19926</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19959/">CVE-2019-19959</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20218/">CVE-2019-20218</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13434/">CVE-2020-13434</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13435/">CVE-2020-13435</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13630/">CVE-2020-13630</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-13631/">CVE-2020-13631</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13632/">CVE-2020-13632</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15358/">CVE-2020-15358</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-9327/">CVE-2020-9327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624163" comment="libsqlite3-0-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624164" comment="libsqlite3-0-32bit-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624165" comment="sqlite3-3.36.0-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624166" comment="sqlite3-devel-3.36.0-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110210" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624267" comment="kernel-default-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624268" comment="kernel-default-base-5.3.18-24.70.1.9.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624269" comment="kernel-default-devel-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624270" comment="kernel-devel-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624271" comment="kernel-macros-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624272" comment="kernel-preempt-5.3.18-24.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110211" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184994" ref_url="https://bugzilla.suse.com/1184994" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009165.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape() (bsc#1188063)
- Skip udev rules if 'elevator=' is used (bsc#1184994)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184994">SUSE bug 1184994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625549" comment="libsystemd0-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625550" comment="libsystemd0-32bit-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625551" comment="libudev-devel-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625552" comment="libudev1-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625553" comment="libudev1-32bit-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625554" comment="systemd-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625555" comment="systemd-32bit-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625556" comment="systemd-bash-completion-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625557" comment="systemd-container-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625558" comment="systemd-coredump-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625559" comment="systemd-devel-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625560" comment="systemd-sysvinit-234-24.90.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625561" comment="udev-234-24.90.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110212" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625978" comment="kernel-default-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625979" comment="kernel-default-base-5.3.18-24.75.3.9.34.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625980" comment="kernel-default-devel-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625546" comment="kernel-devel-5.3.18-24.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625547" comment="kernel-macros-5.3.18-24.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625981" comment="kernel-preempt-5.3.18-24.75.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110213" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188217" ref_url="https://bugzilla.suse.com/1188217" source="BUGZILLA"/>
		<reference ref_id="1188218" ref_url="https://bugzilla.suse.com/1188218" source="BUGZILLA"/>
		<reference ref_id="1188219" ref_url="https://bugzilla.suse.com/1188219" source="BUGZILLA"/>
		<reference ref_id="1188220" ref_url="https://bugzilla.suse.com/1188220" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22922" ref_url="https://www.suse.com/security/cve/CVE-2021-22922/" source="CVE"/>
		<reference ref_id="CVE-2021-22923" ref_url="https://www.suse.com/security/cve/CVE-2021-22923/" source="CVE"/>
		<reference ref_id="CVE-2021-22924" ref_url="https://www.suse.com/security/cve/CVE-2021-22924/" source="CVE"/>
		<reference ref_id="CVE-2021-22925" ref_url="https://www.suse.com/security/cve/CVE-2021-22925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009197.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22925: TELNET stack contents disclosure again. (bsc#1188220)
- CVE-2021-22924: Bad connection reuse due to flawed path name checks. (bsc#1188219)
- CVE-2021-22923: Insufficiently Protected Credentials. (bsc#1188218)
- CVE-2021-22922: Wrong content via metalink not discarded. (bsc#1188217)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188217">SUSE bug 1188217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188218">SUSE bug 1188218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188219">SUSE bug 1188219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188220">SUSE bug 1188220</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22922/">CVE-2021-22922</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22923/">CVE-2021-22923</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22924/">CVE-2021-22924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22925/">CVE-2021-22925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625982" comment="curl-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625983" comment="libcurl-devel-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625984" comment="libcurl4-7.66.0-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625985" comment="libcurl4-32bit-7.66.0-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110214" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186790" ref_url="https://bugzilla.suse.com/1186790" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009205.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to 3.4.6.

Including a fix for:

- DVB-S2-BB dissector infinite loop (bsc#1186790).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186790">SUSE bug 1186790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624701" comment="libwireshark14-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624702" comment="libwiretap11-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624703" comment="libwsutil12-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624704" comment="wireshark-3.4.6-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110215" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184253" ref_url="https://bugzilla.suse.com/1184253" source="BUGZILLA"/>
		<reference ref_id="1187871" ref_url="https://bugzilla.suse.com/1187871" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009217.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-3631: fix SELinux label generation logic (bsc#1187871)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184253">SUSE bug 1184253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187871">SUSE bug 1187871</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624887" comment="libvirt-libs-6.0.0-13.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110216" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187499" ref_url="https://bugzilla.suse.com/1187499" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1187538" ref_url="https://bugzilla.suse.com/1187538" source="BUGZILLA"/>
		<reference ref_id="1187539" ref_url="https://bugzilla.suse.com/1187539" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626209" comment="qemu-tools-4.2.1-11.25.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110217" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.3:
- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626880" comment="libjavascriptcoregtk-4_0-18-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626881" comment="libwebkit2gtk-4_0-37-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626882" comment="libwebkit2gtk3-lang-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626883" comment="webkit2gtk-4_0-injected-bundles-2.32.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110218" version="1" class="patch">
	<metadata>
		<title>Security update for cpio (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189206" ref_url="https://bugzilla.suse.com/1189206" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38185" ref_url="https://www.suse.com/security/cve/CVE-2021-38185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009293.html" source="SUSE-SU"/>
		<description>
This update for cpio fixes the following issues:

It was possible to trigger Remote code execution due to a integer overflow (CVE-2021-38185, bsc#1189206)

UPDATE:
This update was buggy and could lead to hangs, so it has been retracted. There will be a follow up update.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-16"/>
	<updated date="2021-08-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189206">SUSE bug 1189206</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38185/">CVE-2021-38185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630557" comment="cpio-2.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630558" comment="cpio-lang-2.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630559" comment="cpio-mt-2.12-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110219" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627850" comment="kernel-default-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627851" comment="kernel-default-base-5.3.18-24.78.1.9.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627852" comment="kernel-default-devel-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627853" comment="kernel-devel-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627854" comment="kernel-macros-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627855" comment="kernel-preempt-5.3.18-24.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110220" version="1" class="patch">
	<metadata>
		<title>Security update for c-ares (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2760-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019883.html" source="SUSE-SU"/>
		<description>
This update for c-ares fixes the following issues:

Version update to git snapshot 1.17.1+20200724:

- CVE-2021-3672: fixed missing input validation on hostnames returned by DNS servers (bsc#1188881)
- If ares_getaddrinfo() was terminated by an ares_destroy(), it would cause crash
- Crash in sortaddrinfo() if the list size equals 0 due to an unexpected DNS response
- Expand number of escaped characters in DNS replies as per RFC1035 5.1 to prevent spoofing
- Use unbuffered /dev/urandom for random data to prevent early startup performance issues
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630341" comment="c-ares-devel-1.17.1+20200724-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630342" comment="libcares2-1.17.1+20200724-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110221" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626824" comment="libsndfile-devel-1.0.28-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626825" comment="libsndfile1-1.0.28-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110222" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630343" comment="qemu-tools-4.2.1-11.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110223" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009317.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628201" comment="fetchmail-6.3.26-20.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110224" version="1" class="patch">
	<metadata>
		<title>Security update for aspell (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177523" ref_url="https://bugzilla.suse.com/1177523" source="BUGZILLA"/>
		<reference ref_id="1188576" ref_url="https://bugzilla.suse.com/1188576" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25051" ref_url="https://www.suse.com/security/cve/CVE-2019-25051/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009323.html" source="SUSE-SU"/>
		<description>
This update for aspell fixes the following issues:

- CVE-2019-25051: Fixed heap-buffer-overflow in acommon:ObjStack:dup_top (bsc#1188576).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177523">SUSE bug 1177523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188576">SUSE bug 1188576</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-25051/">CVE-2019-25051</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627846" comment="aspell-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627847" comment="aspell-devel-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627848" comment="libaspell15-0.60.8-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627849" comment="libpspell15-0.60.8-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110225" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009316.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626699" comment="krb5-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626700" comment="krb5-32bit-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626701" comment="krb5-client-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626702" comment="krb5-devel-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626703" comment="krb5-plugin-preauth-otp-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626704" comment="krb5-plugin-preauth-pkinit-1.16.3-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110226" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1103032" ref_url="https://bugzilla.suse.com/1103032" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14679" ref_url="https://www.suse.com/security/cve/CVE-2018-14679/" source="CVE"/>
		<reference ref_id="CVE-2018-14681" ref_url="https://www.suse.com/security/cve/CVE-2018-14681/" source="CVE"/>
		<reference ref_id="CVE-2018-14682" ref_url="https://www.suse.com/security/cve/CVE-2018-14682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009322.html" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-14681: Bad KWAJ file header extensions could cause a one or two byte overwrite. (bsc#1103032)
- CVE-2018-14682: There is an off-by-one error in the TOLOWER() macro for CHM decompression. (bsc#1103032)
- CVE-2018-14679: There is an off-by-one error in the CHM PMGI/PMGL chunk number validity checks, which could lead to denial of service. (bsc#1103032)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1103032">SUSE bug 1103032</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14679/">CVE-2018-14679</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-14681/">CVE-2018-14681</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14682/">CVE-2018-14682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625976" comment="libmspack-devel-0.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625977" comment="libmspack0-0.6-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110227" version="1" class="patch">
	<metadata>
		<title>Security update for dbus-1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172505" ref_url="https://bugzilla.suse.com/1172505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12049" ref_url="https://www.suse.com/security/cve/CVE-2020-12049/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009330.html" source="SUSE-SU"/>
		<description>
This update for dbus-1 fixes the following issues:

- CVE-2020-12049: truncated messages lead to resource exhaustion. (bsc#1172505)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172505">SUSE bug 1172505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12049/">CVE-2020-12049</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626210" comment="dbus-1-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626211" comment="dbus-1-devel-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626212" comment="dbus-1-x11-1.12.2-8.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626213" comment="libdbus-1-3-1.12.2-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626214" comment="libdbus-1-3-32bit-1.12.2-8.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110228" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<description>
This patch updates the Python AWS SDK stack in SLE 15:

General:

# aws-cli

- Version updated to upstream release v1.19.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-boto3

- Version updated to upstream release 1.17.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-botocore

- Version updated to upstream release 1.20.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-urllib3

- Version updated to upstream release 1.25.10
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-service_identity

- Added this new package to resolve runtime dependencies for other packages.
  Version: 18.1.0

# python-trustme

- Added this new package to resolve runtime dependencies for other packages.
  Version: 0.6.0

Security fixes:

# python-urllib3:
  
- CVE-2020-26137: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated
  by inserting CR and LF control characters in the first argument of putrequest() (bsc#1177120)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626945" comment="python3-asn1crypto-0.24.0-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626946" comment="python3-boto3-1.17.9-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626947" comment="python3-botocore-1.20.9-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626948" comment="python3-cffi-1.13.2-3.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626949" comment="python3-cryptography-2.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626950" comment="python3-pyOpenSSL-17.5.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626951" comment="python3-pyasn1-0.4.2-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626952" comment="python3-pycparser-2.17-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626953" comment="python3-urllib3-1.25.10-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110229" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189520" ref_url="https://bugzilla.suse.com/1189520" source="BUGZILLA"/>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3711" ref_url="https://www.suse.com/security/cve/CVE-2021-3711/" source="CVE"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009341.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following security issues:

- CVE-2021-3711: A bug in the implementation of the SM2 decryption code
  could lead to buffer overflows. [bsc#1189520]

- CVE-2021-3712: a bug in the code for printing certificate details could
  lead to a buffer overrun that a malicious actor could exploit to crash
  the application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189520">SUSE bug 1189520</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3711/">CVE-2021-3711</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631622" comment="libopenssl-1_1-devel-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631623" comment="libopenssl1_1-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631624" comment="libopenssl1_1-32bit-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631625" comment="libopenssl1_1-hmac-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631626" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631627" comment="openssl-1_1-1.1.1d-11.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110230" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1170671" ref_url="https://bugzilla.suse.com/1170671" source="BUGZILLA"/>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008267.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
- CVE-2019-8842: Fixed an out-of-bounds read in an extension field (bsc#1170671).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494083" comment="cups-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494084" comment="cups-client-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494085" comment="cups-config-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494086" comment="cups-devel-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494087" comment="libcups2-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494088" comment="libcups2-32bit-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494089" comment="libcupscgi1-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494090" comment="libcupsimage2-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494091" comment="libcupsmime1-2.2.7-3.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494092" comment="libcupsppdc1-2.2.7-3.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110231" version="1" class="patch">
	<metadata>
		<title>Security update for spectre-meltdown-checker (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189477" ref_url="https://bugzilla.suse.com/1189477" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5753" ref_url="https://www.suse.com/security/cve/CVE-2017-5753/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" source="SUSE-SU"/>
		<description>
This update for spectre-meltdown-checker fixes the following issues:

spectre-meltdown-checker was updated to version 0.44 (bsc#1189477)

- feat: add support for SRBDS related vulnerabilities
- feat: add zstd kernel decompression (#370)
- enh: arm: add experimental support for binary arm images
- enh: rsb filling: no longer need the 'strings' tool to check for kernel support in live mode
- fix: fwdb: remove Intel extract tempdir on exit
- fix: has_vmm: ignore kernel threads when looking for a hypervisor (fixes #278)
- fix: fwdb: use the commit date as the intel fwdb version
- fix: fwdb: update Intel's repository URL
- fix: arm64: CVE-2017-5753: kernels 4.19+ use a different nospec macro
- fix: on CPU parse info under FreeBSD
- chore: github: add check run on pull requests
- chore: fwdb: update to v165.20201021+i20200616
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189477">SUSE bug 1189477</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2017-5753/">CVE-2017-5753</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631131" comment="spectre-meltdown-checker-0.44-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110232" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer-plugins-good (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184735" ref_url="https://bugzilla.suse.com/1184735" source="BUGZILLA"/>
		<reference ref_id="1184739" ref_url="https://bugzilla.suse.com/1184739" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3497" ref_url="https://www.suse.com/security/cve/CVE-2021-3497/" source="CVE"/>
		<reference ref_id="CVE-2021-3498" ref_url="https://www.suse.com/security/cve/CVE-2021-3498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009382.html" source="SUSE-SU"/>
		<description>
This update for gstreamer-plugins-good fixes the following issues:

- CVE-2021-3498: Matroskademux: initialize track context out parameter to NULL before parsing (bsc#1184735).
- CVE-2021-3497: Matroskademux: Fix extraction of multichannel WavPack (bsc#1184739).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184735">SUSE bug 1184735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184739">SUSE bug 1184739</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3497/">CVE-2021-3497</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3498/">CVE-2021-3498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628037" comment="gstreamer-plugins-good-1.16.3-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628038" comment="gstreamer-plugins-good-lang-1.16.3-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110233" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1137251" ref_url="https://bugzilla.suse.com/1137251" source="BUGZILLA"/>
		<reference ref_id="1176189" ref_url="https://bugzilla.suse.com/1176189" source="BUGZILLA"/>
		<reference ref_id="1179148" ref_url="https://bugzilla.suse.com/1179148" source="BUGZILLA"/>
		<reference ref_id="1179246" ref_url="https://bugzilla.suse.com/1179246" source="BUGZILLA"/>
		<reference ref_id="1180491" ref_url="https://bugzilla.suse.com/1180491" source="BUGZILLA"/>
		<reference ref_id="1181989" ref_url="https://bugzilla.suse.com/1181989" source="BUGZILLA"/>
		<reference ref_id="1183877" ref_url="https://bugzilla.suse.com/1183877" source="BUGZILLA"/>
		<reference ref_id="1185682" ref_url="https://bugzilla.suse.com/1185682" source="BUGZILLA"/>
		<reference ref_id="1186428" ref_url="https://bugzilla.suse.com/1186428" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1188050" ref_url="https://bugzilla.suse.com/1188050" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189381" ref_url="https://bugzilla.suse.com/1189381" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Update to Xen 4.13.3 general bug fix release (bsc#1027519).

Security issues fixed:

- CVE-2021-28693: xen/arm: Boot modules are not scrubbed (bsc#1186428)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-28700: No memory limit for dom0less domUs (XSA-383)(bsc#1189381).

Other issues fixed:

- Fixed 'Panic on CPU 0: IO-APIC + timer doesn't work!' (bsc#1180491)
- Fixed an issue with xencommons, where file format expecations by fillup did not allign (bsc#1185682)
- Fixed shell macro expansion in the spec file, so that ExecStart=
  in xendomains-wait-disks.service is created correctly (bsc#1183877)
- Upstream bug fixes (bsc#1027519)
- Fixed Xen SLES11SP4 guest hangs on cluster (bsc#1188050).
- xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown (bsc#1176189).
- Dom0 hangs when pinning CPUs for dom0 with HVM guest (bsc#1179246).
- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137251">SUSE bug 1137251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176189">SUSE bug 1176189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179148">SUSE bug 1179148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179246">SUSE bug 1179246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180491">SUSE bug 1180491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181989">SUSE bug 1181989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183877">SUSE bug 1183877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185682">SUSE bug 1185682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186428">SUSE bug 1186428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188050">SUSE bug 1188050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189381">SUSE bug 1189381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632243" comment="xen-libs-4.13.3_02-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632244" comment="xen-tools-domU-4.13.3_02-3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110234" version="1" class="patch">
	<metadata>
		<title>Security update for libesmtp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1160462" ref_url="https://bugzilla.suse.com/1160462" source="BUGZILLA"/>
		<reference ref_id="1189097" ref_url="https://bugzilla.suse.com/1189097" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19977" ref_url="https://www.suse.com/security/cve/CVE-2019-19977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009397.html" source="SUSE-SU"/>
		<description>
This update for libesmtp fixes the following issues:

- CVE-2019-19977: Fixed stack-based buffer over-read in ntlm/ntlmstruct.c (bsc#1160462).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160462">SUSE bug 1160462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189097">SUSE bug 1189097</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19977/">CVE-2019-19977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009629426" comment="libesmtp-1.0.6-150.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009629427" comment="libesmtp-devel-1.0.6-150.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110235" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185476" ref_url="https://bugzilla.suse.com/1185476" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to jdk-11.0.12+7
- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185476">SUSE bug 1185476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626380" comment="java-11-openjdk-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626381" comment="java-11-openjdk-demo-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626382" comment="java-11-openjdk-devel-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626383" comment="java-11-openjdk-headless-11.0.12.0-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110236" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189387" ref_url="https://bugzilla.suse.com/1189387" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009405.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-33193: Fixed request splitting via HTTP/2 method injection and mod_proxy (bsc#1189387).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189387">SUSE bug 1189387</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631128" comment="apache2-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631129" comment="apache2-prefork-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631130" comment="apache2-utils-2.4.43-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110237" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159552" ref_url="https://bugzilla.suse.com/1159552" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1311" ref_url="https://www.suse.com/security/cve/CVE-2018-1311/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009415.html" source="SUSE-SU"/>
		<description>
This update for xerces-c fixes the following issues:

- CVE-2018-1311: Fixed use-after-free inside XML parser during the scanning of external DTDs (bsc#1159552).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-06"/>
	<updated date="2021-09-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159552">SUSE bug 1159552</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-1311/">CVE-2018-1311</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631810" comment="libxerces-c-3_1-3.1.4-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631811" comment="libxerces-c-devel-3.1.4-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110238" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009420.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632506" comment="libopenssl-1_1-devel-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632507" comment="libopenssl1_1-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632508" comment="libopenssl1_1-32bit-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632509" comment="libopenssl1_1-hmac-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632510" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632511" comment="openssl-1_1-1.1.1d-11.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110239" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188375" ref_url="https://bugzilla.suse.com/1188375" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009432.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.7

- CVE-2021-22235: Fixed DNP dissector crash (bsc#1188375).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188375">SUSE bug 1188375</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632014" comment="libwireshark14-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632015" comment="libwiretap11-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632016" comment="libwsutil12-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632017" comment="wireshark-3.4.7-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110240" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009444.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)

Also a hardening fix was added:

- Link as position independent executable (bsc#1184123)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-15"/>
	<updated date="2021-09-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632741" comment="ghostscript-9.52-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632742" comment="ghostscript-devel-9.52-155.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632743" comment="ghostscript-x11-9.52-155.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110241" version="1" class="patch">
	<metadata>
		<title>Security update for libcroco (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171685" ref_url="https://bugzilla.suse.com/1171685" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12825" ref_url="https://www.suse.com/security/cve/CVE-2020-12825/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009452.html" source="SUSE-SU"/>
		<description>
This update for libcroco fixes the following issues:

- CVE-2020-12825: Fixed recursion issue in block and any productions (bsc#1171685).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171685">SUSE bug 1171685</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12825/">CVE-2020-12825</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631871" comment="libcroco-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631872" comment="libcroco-0_6-3-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631873" comment="libcroco-0_6-3-32bit-0.6.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631874" comment="libcroco-devel-0.6.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110242" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009463.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633428" comment="xen-libs-4.13.3_04-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633429" comment="xen-tools-domU-4.13.3_04-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110243" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189060" ref_url="https://bugzilla.suse.com/1189060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009494.html" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3622: Fixed stack overflow due to recursive call of _get_children() (bsc#1189060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632563" comment="hivex-devel-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632564" comment="libhivex0-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632565" comment="perl-Win-Hivex-1.3.14-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110244" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633201" comment="kernel-default-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633202" comment="kernel-default-base-5.3.18-24.83.2.9.38.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633203" comment="kernel-default-devel-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633204" comment="kernel-devel-5.3.18-24.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633205" comment="kernel-macros-5.3.18-24.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633206" comment="kernel-preempt-5.3.18-24.83.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110245" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190400" ref_url="https://bugzilla.suse.com/1190400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40812" ref_url="https://www.suse.com/security/cve/CVE-2021-40812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009510.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

- CVE-2021-40812: Fixed out-of-bounds read caused by the lack of certain gdGetBuf and gdPutBuf return value checks (bsc#1190400).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190400">SUSE bug 1190400</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40812/">CVE-2021-40812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633463" comment="libgd3-2.2.5-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110246" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009522.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632654" comment="libpq5-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632655" comment="libpq5-32bit-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632656" comment="postgresql13-13.4-5.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110247" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009520.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632657" comment="postgresql12-12.8-8.23.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110248" version="1" class="patch">
	<metadata>
		<title>Security update for curl (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190373" ref_url="https://bugzilla.suse.com/1190373" source="BUGZILLA"/>
		<reference ref_id="1190374" ref_url="https://bugzilla.suse.com/1190374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22946" ref_url="https://www.suse.com/security/cve/CVE-2021-22946/" source="CVE"/>
		<reference ref_id="CVE-2021-22947" ref_url="https://www.suse.com/security/cve/CVE-2021-22947/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009538.html" source="SUSE-SU"/>
		<description>
This update for curl fixes the following issues:

- CVE-2021-22947: Fixed STARTTLS protocol injection via MITM (bsc#1190374).
- CVE-2021-22946: Fixed protocol downgrade required TLS bypassed (bsc#1190373).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190373">SUSE bug 1190373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190374">SUSE bug 1190374</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22946/">CVE-2021-22946</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22947/">CVE-2021-22947</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633973" comment="curl-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633974" comment="libcurl-devel-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633975" comment="libcurl4-7.66.0-4.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633976" comment="libcurl4-32bit-7.66.0-4.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110249" version="1" class="patch">
	<metadata>
		<title>Security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189992" ref_url="https://bugzilla.suse.com/1189992" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40330" ref_url="https://www.suse.com/security/cve/CVE-2021-40330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009544.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2021-40330: Fixed unexpected cross-protocol requests via newline character in git_connect_git repository path (bsc#1189992).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189992">SUSE bug 1189992</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-40330/">CVE-2021-40330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633879" comment="git-core-2.26.2-33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110250" version="1" class="patch">
	<metadata>
		<title>Security update for libcryptopp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1015243" ref_url="https://bugzilla.suse.com/1015243" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9939" ref_url="https://www.suse.com/security/cve/CVE-2016-9939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009547.html" source="SUSE-SU"/>
		<description>
This update for libcryptopp fixes the following issues:

- CVE-2016-9939: Fixed potential DoS in Crypto++ (libcryptopp) ASN.1 parser (bsc#1015243).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1015243">SUSE bug 1015243</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9939/">CVE-2016-9939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633461" comment="libcryptopp-devel-5.6.5-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633462" comment="libcryptopp5_6_5-5.6.5-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110251" version="1" class="patch">
	<metadata>
		<title>Security update for systemd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1134353" ref_url="https://bugzilla.suse.com/1134353" source="BUGZILLA"/>
		<reference ref_id="1171962" ref_url="https://bugzilla.suse.com/1171962" source="BUGZILLA"/>
		<reference ref_id="1184994" ref_url="https://bugzilla.suse.com/1184994" source="BUGZILLA"/>
		<reference ref_id="1188018" ref_url="https://bugzilla.suse.com/1188018" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188291" ref_url="https://bugzilla.suse.com/1188291" source="BUGZILLA"/>
		<reference ref_id="1188713" ref_url="https://bugzilla.suse.com/1188713" source="BUGZILLA"/>
		<reference ref_id="1189480" ref_url="https://bugzilla.suse.com/1189480" source="BUGZILLA"/>
		<reference ref_id="1190234" ref_url="https://bugzilla.suse.com/1190234" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33910" ref_url="https://www.suse.com/security/cve/CVE-2021-33910/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009577.html" source="SUSE-SU"/>
		<description>
This update for systemd fixes the following issues:

- CVE-2021-33910: Fixed use of strdupa() on a path (bsc#1188063).

- logind: terminate cleanly on SIGTERM/SIGINT (bsc#1188018).
- Adopting BFQ to control I/O (jsc#SLE-21032, bsc#1134353).
- Rules weren't applied to dm devices (multipath) (bsc#1188713).
- Ignore obsolete 'elevator' kernel parameter (bsc#1184994, bsc#1190234).
- Make sure the versions of both udev and systemd packages are always the same (bsc#1189480).
- Avoid error message when udev is updated due to udev being already active when the sockets are started again (bsc#1188291).
- Allow the systemd sysusers config files to be overriden during system installation (bsc#1171962).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1134353">SUSE bug 1134353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171962">SUSE bug 1171962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184994">SUSE bug 1184994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188018">SUSE bug 1188018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188291">SUSE bug 1188291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188713">SUSE bug 1188713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189480">SUSE bug 1189480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190234">SUSE bug 1190234</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33910/">CVE-2021-33910</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634043" comment="libsystemd0-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634044" comment="libsystemd0-32bit-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634045" comment="libudev-devel-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634046" comment="libudev1-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634047" comment="libudev1-32bit-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634048" comment="systemd-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634049" comment="systemd-32bit-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634050" comment="systemd-bash-completion-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634051" comment="systemd-container-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634052" comment="systemd-coredump-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634053" comment="systemd-devel-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634054" comment="systemd-sysvinit-234-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634055" comment="udev-234-24.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110252" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634056" comment="libjavascriptcoregtk-4_0-18-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634057" comment="libwebkit2gtk-4_0-37-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634058" comment="libwebkit2gtk3-lang-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634059" comment="webkit2gtk-4_0-injected-bundles-2.32.4-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110253" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184783" ref_url="https://bugzilla.suse.com/1184783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009575.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-3481: Fixed an out of bounds read in function QRadialFetchSimd from crafted svg file. (bsc#1184783)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634554" comment="libQt5Svg5-5.12.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634555" comment="libqt5-qtsvg-devel-5.12.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110254" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634543" comment="glibc-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634544" comment="glibc-32bit-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634545" comment="glibc-devel-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634546" comment="glibc-extra-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634547" comment="glibc-i18ndata-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634548" comment="glibc-info-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634549" comment="glibc-locale-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634550" comment="glibc-locale-base-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634551" comment="glibc-locale-base-32bit-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634552" comment="glibc-profile-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634553" comment="nscd-2.26-13.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110255" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179416" ref_url="https://bugzilla.suse.com/1179416" source="BUGZILLA"/>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="1187670" ref_url="https://bugzilla.suse.com/1187670" source="BUGZILLA"/>
		<reference ref_id="1188548" ref_url="https://bugzilla.suse.com/1188548" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security issues fixed:

- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)
- PGP hardening changes (bsc#1185299)
- Fixed potential access of freed mem in ndb's glue code (bsc#1179416)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179416">SUSE bug 1179416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187670">SUSE bug 1187670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188548">SUSE bug 1188548</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652117" comment="python3-rpm-4.14.1-22.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652118" comment="rpm-4.14.1-22.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652119" comment="rpm-32bit-4.14.1-22.4.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652120" comment="rpm-devel-4.14.1-22.4.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110256" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652099" comment="kernel-default-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652100" comment="kernel-default-base-5.3.18-24.86.2.9.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652101" comment="kernel-default-devel-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652102" comment="kernel-devel-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652103" comment="kernel-macros-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652104" comment="kernel-preempt-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652105" comment="kmod-25-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652106" comment="kmod-bash-completion-25-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652107" comment="kmod-compat-25-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652108" comment="libkmod-devel-25-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652109" comment="libkmod2-25-6.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652110" comment="perl-Bootloader-0.931-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110257" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189929" ref_url="https://bugzilla.suse.com/1189929" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009605.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632226" comment="krb5-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632227" comment="krb5-32bit-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632228" comment="krb5-client-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632229" comment="krb5-devel-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632230" comment="krb5-plugin-preauth-otp-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632231" comment="krb5-plugin-preauth-pkinit-1.16.3-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110258" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191367" ref_url="https://bugzilla.suse.com/1191367" source="BUGZILLA"/>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

A feature was added:

- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)

Security issues fixed:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652739" comment="strongswan-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652740" comment="strongswan-doc-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652741" comment="strongswan-hmac-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652742" comment="strongswan-ipsec-5.8.2-11.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652743" comment="strongswan-libs0-5.8.2-11.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110259" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183169" ref_url="https://bugzilla.suse.com/1183169" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009616.html" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-20270: Fixed an infinite loop in the SML lexer (bsc#1183169).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183169">SUSE bug 1183169</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652625" comment="python3-Pygments-2.6.1-7.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110260" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651614" comment="libpython2_7-1_0-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651615" comment="python-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651616" comment="python-base-2.7.18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110261" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009630.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652191" comment="libncurses6-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652192" comment="libncurses6-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652193" comment="ncurses-devel-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652194" comment="ncurses-utils-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652195" comment="tack-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652196" comment="terminfo-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652197" comment="terminfo-base-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652198" comment="terminfo-iterm-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652199" comment="terminfo-screen-6.1-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110262" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020542.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651617" comment="fetchmail-6.3.26-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110263" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008289.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

java-11-openjdk was upgraded to include January 2021 CPU  (bsc#1181239)
- Enable Sheandoah GC for x86_64 (jsc#ECO-3171)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494093" comment="java-11-openjdk-11.0.10.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494094" comment="java-11-openjdk-demo-11.0.10.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494095" comment="java-11-openjdk-devel-11.0.10.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494096" comment="java-11-openjdk-headless-11.0.10.0-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110264" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190702" ref_url="https://bugzilla.suse.com/1190702" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-36160" ref_url="https://www.suse.com/security/cve/CVE-2021-36160/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190702">SUSE bug 1190702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36160/">CVE-2021-36160</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652736" comment="apache2-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652737" comment="apache2-prefork-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652738" comment="apache2-utils-2.4.43-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110265" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009648.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

Update to version 2.33.2 to provide seamless update from SLE12 SP5 to SLE15 SP2:

- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c (bsc#1188921).
- agetty: Fix 8-bit processing in get_logname() (bsc#1125886).
- mount: Fix 'mount' output for net file systems (bsc#1122417).
- ipcs: Avoid overflows (bsc#1178236)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651382" comment="libblkid-devel-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651383" comment="libblkid-devel-static-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651384" comment="libblkid1-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651385" comment="libblkid1-32bit-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651386" comment="libfdisk-devel-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651387" comment="libfdisk1-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651388" comment="libmount-devel-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651389" comment="libmount1-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651390" comment="libmount1-32bit-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651391" comment="libsmartcols-devel-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651392" comment="libsmartcols1-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651393" comment="libuuid-devel-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651394" comment="libuuid-devel-static-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651395" comment="libuuid1-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651396" comment="libuuid1-32bit-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651397" comment="util-linux-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651398" comment="util-linux-lang-2.33.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651399" comment="util-linux-systemd-2.33.2-4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110266" version="1" class="patch">
	<metadata>
		<title>Security update for wireguard-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191224" ref_url="https://bugzilla.suse.com/1191224" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009649.html" source="SUSE-SU"/>
		<description>
This update for wireguard-tools fixes the following issues:

- Removed world-readable permissions from /etc/wireguard (bsc#1191224)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1191224">SUSE bug 1191224</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652624" comment="wireguard-tools-1.0.20200827-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110267" version="1" class="patch">
	<metadata>
		<title>Security update for pcre (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172973" ref_url="https://bugzilla.suse.com/1172973" source="BUGZILLA"/>
		<reference ref_id="1172974" ref_url="https://bugzilla.suse.com/1172974" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20838" ref_url="https://www.suse.com/security/cve/CVE-2019-20838/" source="CVE"/>
		<reference ref_id="CVE-2020-14155" ref_url="https://www.suse.com/security/cve/CVE-2020-14155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020617.html" source="SUSE-SU"/>
		<description>
This update for pcre fixes the following issues:

Update pcre to version 8.45:

- CVE-2020-14155: Fixed integer overflow via a large number after a '(?C' substring (bsc#1172974).
- CVE-2019-20838: Fixed buffer over-read in JIT compiler (bsc#1172973)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172973">SUSE bug 1172973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172974">SUSE bug 1172974</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20838/">CVE-2019-20838</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14155/">CVE-2020-14155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652864" comment="libpcre1-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652865" comment="libpcre1-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652866" comment="libpcre16-0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652867" comment="libpcrecpp0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652868" comment="libpcrecpp0-32bit-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652869" comment="libpcreposix0-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652870" comment="pcre-devel-8.45-20.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652871" comment="pcre-tools-8.45-20.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110268" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173646" ref_url="https://bugzilla.suse.com/1173646" source="BUGZILLA"/>
		<reference ref_id="1180914" ref_url="https://bugzilla.suse.com/1180914" source="BUGZILLA"/>
		<reference ref_id="1183709" ref_url="https://bugzilla.suse.com/1183709" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14312" ref_url="https://www.suse.com/security/cve/CVE-2020-14312/" source="CVE"/>
		<reference ref_id="CVE-2021-3448" ref_url="https://www.suse.com/security/cve/CVE-2021-3448/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009660.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

Update to version 2.86

- CVE-2021-3448: fixed outgoing port used when --server is used with an interface name. (bsc#1183709)
- CVE-2020-14312: Set --local-service by default (bsc#1173646).
- Open inotify socket only when used (bsc#1180914).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173646">SUSE bug 1173646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180914">SUSE bug 1180914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183709">SUSE bug 1183709</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14312/">CVE-2020-14312</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3448/">CVE-2021-3448</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653308" comment="dnsmasq-2.86-7.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110269" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009658.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2018-1000517: Fixed buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2011-5325: Fixed a directory traversal related to 'tar' command (bsc#951562).
- CVE-2018-1000500: Fixed missing SSL certificate validation related to the 'wget' command (bsc#1099263).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652734" comment="busybox-1.26.2-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652735" comment="busybox-static-1.26.2-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110270" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494097" comment="kernel-default-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494098" comment="kernel-default-base-5.3.18-24.49.2.9.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494099" comment="kernel-default-devel-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494100" comment="kernel-devel-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494101" comment="kernel-macros-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494102" comment="kernel-preempt-5.3.18-24.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110271" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494103" comment="libpython2_7-1_0-2.7.17-7.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494104" comment="python-2.7.17-7.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494105" comment="python-base-2.7.17-7.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110272" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009673.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Support querying for JSON data in external sql pillar.
- Exclude the full path of a download URL to prevent injection of malicious code.
  (bsc#1190265, CVE-2021-21996)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652111" comment="python3-salt-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652112" comment="salt-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652113" comment="salt-bash-completion-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652114" comment="salt-doc-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652115" comment="salt-minion-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652116" comment="salt-zsh-completion-3002.2-49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110273" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177902" ref_url="https://bugzilla.suse.com/1177902" source="BUGZILLA"/>
		<reference ref_id="1186398" ref_url="https://bugzilla.suse.com/1186398" source="BUGZILLA"/>
		<reference ref_id="1188232" ref_url="https://bugzilla.suse.com/1188232" source="BUGZILLA"/>
		<reference ref_id="1188843" ref_url="https://bugzilla.suse.com/1188843" source="BUGZILLA"/>
		<reference ref_id="1190420" ref_url="https://bugzilla.suse.com/1190420" source="BUGZILLA"/>
		<reference ref_id="1190693" ref_url="https://bugzilla.suse.com/1190693" source="BUGZILLA"/>
		<reference ref_id="1190695" ref_url="https://bugzilla.suse.com/1190695" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009684.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-3667: Fixed a DoS vulnerability in the libvirt virStoragePoolLookupByTargetPath API. (bsc#1188843)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177902">SUSE bug 1177902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186398">SUSE bug 1186398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188232">SUSE bug 1188232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188843">SUSE bug 1188843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190420">SUSE bug 1190420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190693">SUSE bug 1190693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190695">SUSE bug 1190695</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652304" comment="libvirt-libs-6.0.0-13.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110274" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009691.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653649" comment="libjavascriptcoregtk-4_0-18-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653650" comment="libwebkit2gtk-4_0-37-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653651" comment="libwebkit2gtk3-lang-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653652" comment="webkit2gtk-4_0-injected-bundles-2.32.4-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110275" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189234" ref_url="https://bugzilla.suse.com/1189234" source="BUGZILLA"/>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="1190425" ref_url="https://bugzilla.suse.com/1190425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
- CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Non-security issues fixed:

- Add transfer length item in block limits page of scsi vpd (bsc#1190425)
- Fix qemu crash while deleting xen-block (bsc#1189234)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189234">SUSE bug 1189234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190425">SUSE bug 1190425</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652930" comment="qemu-tools-4.2.1-11.31.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110276" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.

* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

   * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
     Locker instructions. 
   * Support non-absolute segment values for lcall and ljmp.
   * Add {disp16} pseudo prefix to x86 assembler.
   * Configure with --enable-x86-used-note by default for Linux/x86.

-  ARM/AArch64:

   * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
     Cortex-R82, Neoverse V1, and Neoverse N2 cores.
   * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
     Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
     Stack Recorder Extension) and BRBE (Branch Record Buffer
     Extension) system registers.
   * Add support for Armv8-R and Armv8.7-A ISA extensions.
   * Add support for DSB memory nXS barrier, WFET and WFIT
     instruction for Armv8.7.
   * Add support for +csre feature for -march. Add CSR PDEC
     instruction for CSRE feature in AArch64.
   * Add support for +flagm feature for -march in Armv8.4 AArch64.
   * Add support for +ls64 feature for -march in Armv8.7
     AArch64. Add atomic 64-byte load/store instructions for this
     feature. 
   * Add support for +pauth (Pointer Authentication) feature for
     -march in AArch64.

New features in the Linker:

  * Add --error-handling-script=&lt;NAME&gt; command line option to allow
    a helper script to be invoked when an undefined symbol or a
    missing library is encountered.  This option can be suppressed
    via the configure time switch: --enable-error-handling-script=no.
  * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
    x86-64-{baseline|v[234]} ISA level as needed.
  * Add -z unique-symbol to avoid duplicated local symbol names.
  * The creation of PE format DLLs now defaults to using a more
    secure set of DLL characteristics.
  * The linker now deduplicates the types in .ctf sections.  The new 
     command-line option --ctf-share-types describes how to do this:
     its default value, share-unconflicted, produces the most compact
     output.
  * The linker now omits the 'variable section' from .ctf sections
    by default, saving space.  This is almost certainly what you
    want unless you are working on a project that has its own
    analogue of symbol tables that are not reflected in the ELF
    symtabs.

New features in other binary tools:

  * The ar tool's previously unused l modifier is now used for
    specifying dependencies of a static library. The arguments of
    this option (or --record-libdeps long form option) will be
    stored verbatim in the __.LIBDEP member of the archive, which
    the linker may read at link time.
  * Readelf can now display the contents of LTO symbol table
    sections when asked to do so via the --lto-syms command line
    option.
  * Readelf now accepts the -C command line option to enable the
    demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
    --no-demangle, --recurse-limit and --no-recurse-limit options
    are also now availale.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653451" comment="binutils-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653452" comment="binutils-devel-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653453" comment="libctf-nobfd0-2.37-7.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653454" comment="libctf0-2.37-7.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110277" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009711.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).
- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654299" comment="binutils-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654300" comment="binutils-devel-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654301" comment="libctf-nobfd0-2.37-7.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654302" comment="libctf0-2.37-7.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110278" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192214" ref_url="https://bugzilla.suse.com/1192214" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654670" comment="libdcerpc-binding0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654671" comment="libdcerpc-binding0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654672" comment="libdcerpc-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654673" comment="libdcerpc-samr-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654674" comment="libdcerpc-samr0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654675" comment="libdcerpc0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654676" comment="libdcerpc0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654677" comment="libndr-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654678" comment="libndr-krb5pac-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654679" comment="libndr-krb5pac0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654680" comment="libndr-krb5pac0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654681" comment="libndr-nbt-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654682" comment="libndr-nbt0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654683" comment="libndr-nbt0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654684" comment="libndr-standard-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654685" comment="libndr-standard0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654686" comment="libndr-standard0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654687" comment="libndr0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654688" comment="libndr0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654689" comment="libnetapi-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654690" comment="libnetapi0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654691" comment="libnetapi0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654692" comment="libsamba-credentials-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654693" comment="libsamba-credentials0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654694" comment="libsamba-credentials0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654695" comment="libsamba-errors-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654696" comment="libsamba-errors0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654697" comment="libsamba-errors0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654698" comment="libsamba-hostconfig-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654699" comment="libsamba-hostconfig0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654700" comment="libsamba-hostconfig0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654701" comment="libsamba-passdb-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654702" comment="libsamba-passdb0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654703" comment="libsamba-passdb0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654704" comment="libsamba-policy-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654705" comment="libsamba-policy-python3-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654706" comment="libsamba-policy0-python3-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654707" comment="libsamba-util-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654708" comment="libsamba-util0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654709" comment="libsamba-util0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654710" comment="libsamdb-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654711" comment="libsamdb0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654712" comment="libsamdb0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654713" comment="libsmbclient-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654714" comment="libsmbclient0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654715" comment="libsmbconf-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654716" comment="libsmbconf0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654717" comment="libsmbconf0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654718" comment="libsmbldap-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654719" comment="libsmbldap2-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654720" comment="libsmbldap2-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654721" comment="libtevent-util-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654722" comment="libtevent-util0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654723" comment="libtevent-util0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654724" comment="libwbclient-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654725" comment="libwbclient0-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654726" comment="libwbclient0-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654727" comment="samba-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654728" comment="samba-ceph-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654729" comment="samba-client-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654730" comment="samba-core-devel-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654731" comment="samba-dsdb-modules-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654732" comment="samba-libs-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654733" comment="samba-libs-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654734" comment="samba-libs-python3-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654735" comment="samba-python3-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654736" comment="samba-winbind-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654737" comment="samba-winbind-32bit-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110279" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Update to 11.0.13+8 (October 2021 CPU)

- CVE-2021-35550, bsc#1191901: Update the default enabled cipher suites preference
- CVE-2021-35565, bsc#1191909: com.sun.net.HttpsServer spins on TLS session close
- CVE-2021-35556, bsc#1191910: Richer Text Editors
- CVE-2021-35559, bsc#1191911: Enhanced style for RTF kit
- CVE-2021-35561, bsc#1191912: Better hashing support
- CVE-2021-35564, bsc#1191913: Improve Keystore integrity
- CVE-2021-35567, bsc#1191903: More Constrained Delegation
- CVE-2021-35578, bsc#1191904: Improve TLS client handshaking
- CVE-2021-35586, bsc#1191914: Better BMP support
- CVE-2021-35603, bsc#1191906: Better session identification
- Improve Stream handling for SSL
- Improve requests of certificates
- Correct certificate requests
- Enhance DTLS client handshake
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653309" comment="java-11-openjdk-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653310" comment="java-11-openjdk-demo-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653311" comment="java-11-openjdk-devel-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653312" comment="java-11-openjdk-headless-11.0.13.0-3.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110280" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655808" comment="kernel-default-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655809" comment="kernel-default-base-5.3.18-24.93.1.9.42.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655810" comment="kernel-default-devel-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655811" comment="kernel-devel-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655812" comment="kernel-macros-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655813" comment="kernel-preempt-5.3.18-24.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110281" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656735" comment="postgresql12-12.9-8.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110282" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191782" ref_url="https://bugzilla.suse.com/1191782" source="BUGZILLA"/>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

- Let rpmlint ignore shlib-policy-name-error (boo#1191782).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191782">SUSE bug 1191782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656417" comment="libpq5-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656418" comment="libpq5-32bit-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656419" comment="postgresql14-14.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110283" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655814" comment="postgresql13-13.5-5.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110284" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009771.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654079" comment="bind-devel-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654080" comment="bind-utils-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654081" comment="libbind9-1600-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654082" comment="libdns1605-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654083" comment="libirs-devel-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654084" comment="libirs1601-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654085" comment="libisc1606-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654086" comment="libisccc1600-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654087" comment="libisccfg1600-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654088" comment="libns1604-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654089" comment="python3-bind-9.16.6-12.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110285" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027496" ref_url="https://bugzilla.suse.com/1027496" source="BUGZILLA"/>
		<reference ref_id="1183085" ref_url="https://bugzilla.suse.com/1183085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009781.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:


- libio: do not attempt to free wide buffers of legacy streams (bsc#1183085) 
- CVE-2016-10228: Rewrite iconv option parsing to fix security issue (bsc#1027496)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183085">SUSE bug 1183085</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654288" comment="glibc-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654289" comment="glibc-32bit-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654290" comment="glibc-devel-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654291" comment="glibc-extra-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654292" comment="glibc-i18ndata-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654293" comment="glibc-info-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654294" comment="glibc-locale-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654295" comment="glibc-locale-base-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654296" comment="glibc-locale-base-32bit-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654297" comment="glibc-profile-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654298" comment="nscd-2.26-13.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110286" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009795.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
- CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657430" comment="libruby2_5-2_5-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657431" comment="ruby2.5-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657432" comment="ruby2.5-devel-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657433" comment="ruby2.5-devel-extra-2.5.9-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657434" comment="ruby2.5-stdlib-2.5.9-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110287" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184812" ref_url="https://bugzilla.suse.com/1184812" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009782.html" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-27291: Fixed ReDoS via crafted malicious input (bsc#1184812).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184812">SUSE bug 1184812</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657672" comment="python3-Pygments-2.6.1-7.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110288" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009798.html" source="SUSE-SU"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656414" comment="libspeex1-1.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656415" comment="speex-devel-1.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110289" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657441" comment="libjavascriptcoregtk-4_0-18-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657442" comment="libwebkit2gtk-4_0-37-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657443" comment="libwebkit2gtk3-lang-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657444" comment="webkit2gtk-4_0-injected-bundles-2.34.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110290" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1191363" ref_url="https://bugzilla.suse.com/1191363" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702/" source="CVE"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28702: Fixed PCI devices with RMRRs not deassigned correctly (XSA-386) (bsc#1191363).
- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).

- Update to Xen 4.13.4 bug fix release (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-03"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191363">SUSE bug 1191363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658528" comment="xen-libs-4.13.4_02-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658529" comment="xen-tools-domU-4.13.4_02-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110291" version="1" class="patch">
	<metadata>
		<title>Security update for aaa_base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162581" ref_url="https://bugzilla.suse.com/1162581" source="BUGZILLA"/>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="1191563" ref_url="https://bugzilla.suse.com/1191563" source="BUGZILLA"/>
		<reference ref_id="1192248" ref_url="https://bugzilla.suse.com/1192248" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009830.html" source="SUSE-SU"/>
		<description>
This update for aaa_base fixes the following issues:

- Allowed ping and ICMP commands without CAP_NET_RAW (bsc#1174504).
- Add $HOME/.local/bin to PATH, if it exists (bsc#1192248).
- Fixed get_kernel_version.c to work also for recent kernels on the s390/X platform (bsc#1191563).
- Support xz compressed kernel (bsc#1162581)   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-03"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162581">SUSE bug 1162581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191563">SUSE bug 1191563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192248">SUSE bug 1192248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658779" comment="aaa_base-84.87+git20180409.04c9dae-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658780" comment="aaa_base-extras-84.87+git20180409.04c9dae-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110292" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657435" comment="kernel-default-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657436" comment="kernel-default-base-5.3.18-24.96.1.9.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657437" comment="kernel-default-devel-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657438" comment="kernel-devel-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657439" comment="kernel-macros-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657440" comment="kernel-preempt-5.3.18-24.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110293" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659026" comment="libfreebl3-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659027" comment="libfreebl3-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659028" comment="libfreebl3-hmac-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659029" comment="libfreebl3-hmac-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659030" comment="libsoftokn3-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659031" comment="libsoftokn3-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659032" comment="libsoftokn3-hmac-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659033" comment="libsoftokn3-hmac-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659034" comment="mozilla-nss-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659035" comment="mozilla-nss-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659036" comment="mozilla-nss-certs-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659037" comment="mozilla-nss-certs-32bit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659038" comment="mozilla-nss-devel-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659039" comment="mozilla-nss-sysinit-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659040" comment="mozilla-nss-tools-3.68.1-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110294" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192830" ref_url="https://bugzilla.suse.com/1192830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920/" source="CVE"/>
		<reference ref_id="CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921/" source="CVE"/>
		<reference ref_id="CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922/" source="CVE"/>
		<reference ref_id="CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924/" source="CVE"/>
		<reference ref_id="CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925/" source="CVE"/>
		<reference ref_id="CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926/" source="CVE"/>
		<reference ref_id="CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928/" source="CVE"/>
		<reference ref_id="CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009860.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.10:
- CVE-2021-39920: IPPUSB dissector crash (bsc#1192830).
- CVE-2021-39921: Modbus dissector crash (bsc#1192830).
- CVE-2021-39922: C12.22 dissector crash (bsc#1192830).
- CVE-2021-39924: Bluetooth DHT dissector large loop (bsc#1192830).
- CVE-2021-39925: Bluetooth SDP dissector crash (bsc#1192830).
- CVE-2021-39926: Bluetooth HCI_ISO dissector crash (bsc#1192830).
- CVE-2021-39928: IEEE 802.11 dissector crash (bsc#1192830).
- CVE-2021-39929: Bluetooth DHT dissector crash (bsc#1192830).      
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658079" comment="libwireshark14-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658080" comment="libwiretap11-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658081" comment="libwsutil12-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658082" comment="wireshark-3.4.10-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110295" version="1" class="patch">
	<metadata>
		<title>Security update for brotli (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175825" ref_url="https://bugzilla.suse.com/1175825" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8927" ref_url="https://www.suse.com/security/cve/CVE-2020-8927/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009849.html" source="SUSE-SU"/>
		<description>
This update for brotli fixes the following issues:

- CVE-2020-8927: Fixed integer overflow when input chunk is larger than 2GiB (bsc#1175825).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175825">SUSE bug 1175825</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8927/">CVE-2020-8927</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658531" comment="libbrotli-devel-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658532" comment="libbrotlicommon1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658533" comment="libbrotlidec1-1.0.7-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658534" comment="libbrotlienc1-1.0.7-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110296" version="1" class="patch">
	<metadata>
		<title>Security update for glib-networking (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172460" ref_url="https://bugzilla.suse.com/1172460" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13645" ref_url="https://www.suse.com/security/cve/CVE-2020-13645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009851.html" source="SUSE-SU"/>
		<description>
This update for glib-networking fixes the following issues:

Update to version 2.62.4: 

- CVE-2020-13645: Fixed a connection failure when the server identity is unset (bsc#1172460).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172460">SUSE bug 1172460</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-13645/">CVE-2020-13645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658878" comment="glib-networking-2.62.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658879" comment="glib-networking-lang-2.62.4-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110297" version="1" class="patch">
	<metadata>
		<title>Security update for python-Babel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185768" ref_url="https://bugzilla.suse.com/1185768" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009858.html" source="SUSE-SU"/>
		<description>
This update for python-Babel fixes the following issues:

- CVE-2021-42771: Fixed relative path traversal that may lead to arbitrary locale files loading and arbitrary code execution (bsc#1185768).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658530" comment="python3-Babel-2.8.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110298" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009846.html" source="SUSE-SU"/>
		<description>
This update for gmp fixes the following issues:
    
- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656938" comment="gmp-devel-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656939" comment="libgmp10-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656940" comment="libgmp10-32bit-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656941" comment="libgmpxx4-6.1.2-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110299" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188284" ref_url="https://bugzilla.suse.com/1188284" source="BUGZILLA"/>
		<reference ref_id="1192346" ref_url="https://bugzilla.suse.com/1192346" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009859.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- Update to 0.103.4 (bsc#1192346).
- Update to 0.103.3 (bsc#1188284).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188284">SUSE bug 1188284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192346">SUSE bug 1192346</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656934" comment="clamav-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656935" comment="clamav-devel-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656936" comment="libclamav9-0.103.4-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656937" comment="libfreshclam2-0.103.4-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110300" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659025" comment="python3-pip-20.0.2-6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110301" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180125" ref_url="https://bugzilla.suse.com/1180125" source="BUGZILLA"/>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="1183858" ref_url="https://bugzilla.suse.com/1183858" source="BUGZILLA"/>
		<reference ref_id="1185588" ref_url="https://bugzilla.suse.com/1185588" source="BUGZILLA"/>
		<reference ref_id="1187338" ref_url="https://bugzilla.suse.com/1187338" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2021-3426: Fixed an information disclosure via pydoc. (bsc#1183374)

- Rebuild to get new headers, avoid building in support for stropts.h (bsc#1187338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180125">SUSE bug 1180125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183858">SUSE bug 1183858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185588">SUSE bug 1185588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187338">SUSE bug 1187338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659016" comment="libpython3_6m1_0-3.6.15-3.91.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659017" comment="python3-3.6.15-3.91.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659018" comment="python3-base-3.6.15-3.91.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659019" comment="python3-curses-3.6.15-3.91.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659020" comment="python3-dbm-3.6.15-3.91.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659021" comment="python3-devel-3.6.15-3.91.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659022" comment="python3-idle-3.6.15-3.91.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659023" comment="python3-tk-3.6.15-3.91.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110302" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152964" ref_url="https://bugzilla.suse.com/1152964" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="1190896" ref_url="https://bugzilla.suse.com/1190896" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009892.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).
- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).

- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)
- Remove all python2 dependencies (bsc#1190896).
- De-hardcode /usr/lib path for launch executable (bsc#1174075).
- Added hardening to systemd service(s) (bsc#1181400).
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1152964">SUSE bug 1152964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190896">SUSE bug 1190896</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657429" comment="fetchmail-6.4.22-20.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110303" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656416" comment="postgresql10-10.19-8.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110304" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
	  
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659799" comment="xorg-x11-server-1.20.3-22.5.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659800" comment="xorg-x11-server-extra-1.20.3-22.5.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110305" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009916.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660087" comment="log4j12-1.2.17-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110306" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659793" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659795" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659796" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659797" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659798" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110307" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:4192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009953.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- Update to version 20181225:
  * drop ping capabilities in favor of ICMP_PROTO sockets (bsc#1174504)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-28"/>
	<updated date="2021-12-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661025" comment="permissions-20181225-23.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661026" comment="permissions-zypp-plugin-20181225-23.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110308" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1167162" ref_url="https://bugzilla.suse.com/1167162" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15126" ref_url="https://www.suse.com/security/cve/CVE-2019-15126/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009957.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2019-15126: Updated Broadcom firmware to fix Kr00k bug (bsc#1167162).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-30"/>
	<updated date="2021-12-30"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1167162">SUSE bug 1167162</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-15126/">CVE-2019-15126</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658281" comment="kernel-firmware-20200107-3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658282" comment="ucode-amd-20200107-3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110309" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181687" ref_url="https://bugzilla.suse.com/1181687" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008302.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2020-17525: A null-pointer-dereference has been found in mod_authz_svn that results in
    a remote unauthenticated Denial-of-Service in some server configurations (bsc#1181687).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181687">SUSE bug 1181687</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494106" comment="subversion-1.10.6-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494107" comment="subversion-devel-1.10.6-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110310" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181777" ref_url="https://bugzilla.suse.com/1181777" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0326" ref_url="https://www.suse.com/security/cve/CVE-2021-0326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008316.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-0326: P2P group information processing vulnerability (bsc#1181777).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181777">SUSE bug 1181777</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0326/">CVE-2021-0326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494108" comment="wpa_supplicant-2.9-4.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110311" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494109" comment="libjasper4-2.0.14-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110312" version="1" class="patch">
	<metadata>
		<title>Security update for screen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182092" ref_url="https://bugzilla.suse.com/1182092" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26937" ref_url="https://www.suse.com/security/cve/CVE-2021-26937/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008337.html" source="SUSE-SU"/>
		<description>
This update for screen fixes the following issues:

- CVE-2021-26937: Fixed double width combining char handling that could lead to a denial of service or code execution (bsc#1182092).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182092">SUSE bug 1182092</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26937/">CVE-2021-26937</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494110" comment="screen-4.6.2-5.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110313" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008340.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494111" comment="bind-devel-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494112" comment="bind-utils-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494113" comment="libbind9-1600-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494114" comment="libdns1605-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494115" comment="libirs-devel-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494116" comment="libirs1601-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494117" comment="libisc1606-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494118" comment="libisccc1600-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494119" comment="libisccfg1600-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494120" comment="libns1604-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494121" comment="python3-bind-9.16.6-12.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110314" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178565" ref_url="https://bugzilla.suse.com/1178565" source="BUGZILLA"/>
		<reference ref_id="1179717" ref_url="https://bugzilla.suse.com/1179717" source="BUGZILLA"/>
		<reference ref_id="1179719" ref_url="https://bugzilla.suse.com/1179719" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fixed potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fixed out-of-bound access in iscsi (CVE-2020-11947 bsc#1180523)
- Fixed out-of-bound access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fixed out-of-bound access in ARM interrupt handling (CVE-2021-20221 bsc#1181933)
- Fixed vfio-pci device on s390 enters error state (bsc#1179717 bsc#1179719)
- Fixed 'Failed to try-restart qemu-ga@.service' error while updating the
  qemu-guest-agent. (bsc#1178565)
- Apply fixes to qemu scsi passthrough with respect to timeout and
  error conditions, including using more correct status codes. Add
  more qemu tracing which helped track down these issues
  (bsc#1178049)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178565">SUSE bug 1178565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179717">SUSE bug 1179717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179719">SUSE bug 1179719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494122" comment="qemu-tools-4.2.1-11.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110315" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1179756" ref_url="https://bugzilla.suse.com/1179756" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3177: Fixed buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution (bsc#1181126).
- Provide the newest setuptools wheel (bsc#1176262, CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179756">SUSE bug 1179756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494123" comment="libpython3_6m1_0-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494124" comment="python3-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494125" comment="python3-base-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494126" comment="python3-curses-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494127" comment="python3-dbm-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494128" comment="python3-devel-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494129" comment="python3-idle-3.6.12-3.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494130" comment="python3-tk-3.6.12-3.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110316" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008356.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.30.5 (bsc#1182286):

  + Bring back the WebKitPluginProcess installation that was removed by mistake.
  + Fix RunLoop objects leaked in worker threads.
  + Fix aarch64 llint build with JIT disabled.
  + Use Internet Explorer quirk for Google Docs.
  + Security fixes: CVE-2020-13558.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494131" comment="libjavascriptcoregtk-4_0-18-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494132" comment="libwebkit2gtk-4_0-37-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494133" comment="libwebkit2gtk3-lang-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494134" comment="webkit2gtk-4_0-injected-bundles-2.30.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110317" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1182039" ref_url="https://bugzilla.suse.com/1182039" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to version 13.2:

  * Updating stored views and reindexing might be needed after applying this update.
  * CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
  * CVE-2021-20229, bsc#1182039: Fix failure to check per-column SELECT privileges in some join queries.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182039">SUSE bug 1182039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494135" comment="libpq5-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494136" comment="libpq5-32bit-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494137" comment="postgresql13-13.2-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110318" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008359.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.6:

- Reindexing might be needed after applying this update.
- CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494138" comment="postgresql12-12.6-8.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110319" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008360.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494139" comment="avahi-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494140" comment="avahi-compat-howl-devel-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494141" comment="avahi-compat-mDNSResponder-devel-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494142" comment="avahi-lang-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494143" comment="avahi-utils-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494144" comment="libavahi-client3-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494145" comment="libavahi-client3-32bit-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494146" comment="libavahi-common3-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494147" comment="libavahi-common3-32bit-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494148" comment="libavahi-core7-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494149" comment="libavahi-devel-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494150" comment="libavahi-glib-devel-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494151" comment="libavahi-glib1-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494152" comment="libavahi-gobject0-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494153" comment="libavahi-ui-gtk3-0-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494154" comment="libavahi-ui0-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494155" comment="libdns_sd-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494156" comment="libhowl0-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494157" comment="typelib-1_0-Avahi-0_6-0.7-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110320" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008369.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494158" comment="python3-cryptography-2.8-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110321" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix errors with virt.update
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for `grub.xen` path
- Xen spicevmc, DNS SRV records backports:
  - Fix virtual network generated DNS XML for SRV records
  - Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when `efi=True` 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494159" comment="python3-salt-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494160" comment="salt-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494161" comment="salt-bash-completion-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494162" comment="salt-doc-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494163" comment="salt-minion-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494164" comment="salt-zsh-completion-3000-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110322" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1180038" ref_url="https://bugzilla.suse.com/1180038" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180038">SUSE bug 1180038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494165" comment="glibc-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494166" comment="glibc-32bit-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494167" comment="glibc-devel-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494168" comment="glibc-extra-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494169" comment="glibc-i18ndata-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494170" comment="glibc-info-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494171" comment="glibc-locale-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494172" comment="glibc-locale-base-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494173" comment="glibc-locale-base-32bit-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494174" comment="glibc-profile-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494175" comment="nscd-2.26-13.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110323" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="1182244" ref_url="https://bugzilla.suse.com/1182244" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008398.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Fixed a ReDOS vulnerability where urlize could have 
  been called with untrusted user data (bsc#1181944).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182244">SUSE bug 1182244</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494176" comment="python3-Jinja2-2.10.1-3.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110324" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494177" comment="grub2-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494178" comment="grub2-arm64-efi-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494179" comment="grub2-i386-pc-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494180" comment="grub2-powerpc-ieee1275-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494181" comment="grub2-s390x-emu-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494182" comment="grub2-snapper-plugin-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494183" comment="grub2-systemd-sleep-plugin-2.04-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494184" comment="grub2-x86_64-efi-2.04-9.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110325" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180933" ref_url="https://bugzilla.suse.com/1180933" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008421.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- dnssec-keygen can no longer generate HMAC keys. Use tsig-keygen instead. [bsc#1180933]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180933">SUSE bug 1180933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494185" comment="bind-devel-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494186" comment="bind-utils-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494187" comment="libbind9-1600-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494188" comment="libdns1605-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494189" comment="libirs-devel-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494190" comment="libirs1601-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494191" comment="libisc1606-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494192" comment="libisccc1600-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494193" comment="libisccfg1600-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494194" comment="libns1604-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494195" comment="python3-bind-9.16.6-12.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110326" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008432.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- CVE-2020-12373: Fixed an expired pointer dereference may lead to DOS (bsc#1181738).
- CVE-2020-12364: Fixed a null pointer reference may lead to DOS (bsc#1181736). 
- CVE-2020-12362: Fixed an integer overflow which could have led to privilege escalation (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have led to DOS (bsc#1181735).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-03"/>
	<updated date="2021-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494196" comment="kernel-firmware-20200107-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494197" comment="ucode-amd-20200107-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110327" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182805" ref_url="https://bugzilla.suse.com/1182805" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27803" ref_url="https://www.suse.com/security/cve/CVE-2021-27803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008439.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:

- CVE-2021-27803: Fixed a P2P provision discovery processing vulnerability (bsc#1182805).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-08"/>
	<updated date="2021-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182805">SUSE bug 1182805</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27803/">CVE-2021-27803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494198" comment="wpa_supplicant-2.9-4.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110328" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-08"/>
	<updated date="2021-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494199" comment="libldap-2_4-2-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494200" comment="libldap-2_4-2-32bit-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494201" comment="libldap-data-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494202" comment="openldap2-client-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494203" comment="openldap2-devel-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494204" comment="openldap2-devel-static-2.4.46-9.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110329" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494205" comment="kernel-default-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494206" comment="kernel-default-base-5.3.18-24.52.1.9.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494207" comment="kernel-default-devel-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494208" comment="kernel-devel-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494209" comment="kernel-macros-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494210" comment="kernel-preempt-5.3.18-24.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110330" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008453.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
- Fixed unresolved error codes in FIPS (bsc#1182959).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494211" comment="libopenssl-1_1-devel-1.1.1d-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494212" comment="libopenssl1_1-1.1.1d-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494213" comment="libopenssl1_1-32bit-1.1.1d-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494214" comment="libopenssl1_1-hmac-1.1.1d-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494215" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494216" comment="openssl-1_1-1.1.1d-11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110331" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008461.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494217" comment="git-core-2.26.2-3.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110332" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-11"/>
	<updated date="2021-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494218" comment="libpython2_7-1_0-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494219" comment="python-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494220" comment="python-base-2.7.18-7.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110333" version="1" class="patch">
	<metadata>
		<title>Security update for s390-tools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176574" ref_url="https://bugzilla.suse.com/1176574" source="BUGZILLA"/>
		<reference ref_id="1182777" ref_url="https://bugzilla.suse.com/1182777" source="BUGZILLA"/>
		<reference ref_id="1182876" ref_url="https://bugzilla.suse.com/1182876" source="BUGZILLA"/>
		<reference ref_id="1183040" ref_url="https://bugzilla.suse.com/1183040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25316" ref_url="https://www.suse.com/security/cve/CVE-2021-25316/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008490.html" source="SUSE-SU"/>
		<description>
This update for s390-tools fixes the following issues:

- Fixed an issue where IPL was not working when bootloader was installed 
  on a SCSI disk with 4k physical blocksize without using a devicemapper 
  target (bsc#1183041).
- CVE-2021-25316: Do not use predictable temporary file names (bsc#1182777).
- Made the name of the temporary configuration file in /tmp/ unpredictable (bsc#1182876).
- Changing the scheduler from 'deadline' to the newly created 'mq-deadline' scheduler (bsc#1176574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176574">SUSE bug 1176574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182777">SUSE bug 1182777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182876">SUSE bug 1182876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183040">SUSE bug 1183040</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-25316/">CVE-2021-25316</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494221" comment="osasnmpd-2.11.0-9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494222" comment="s390-tools-2.11.0-9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494223" comment="s390-tools-hmcdrvfs-2.11.0-9.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494224" comment="s390-tools-zdsfs-2.11.0-9.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110334" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182328" ref_url="https://bugzilla.suse.com/1182328" source="BUGZILLA"/>
		<reference ref_id="1182362" ref_url="https://bugzilla.suse.com/1182362" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27218" ref_url="https://www.suse.com/security/cve/CVE-2021-27218/" source="CVE"/>
		<reference ref_id="CVE-2021-27219" ref_url="https://www.suse.com/security/cve/CVE-2021-27219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008486.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-27218: g_byte_array_new_take takes a gsize as length but stores in a guint, this patch will refuse if
  the length is larger than guint. (bsc#1182328)
- CVE-2021-27219: g_memdup takes a guint as parameter and sometimes leads into an integer overflow, so add a g_memdup2 function which uses gsize to replace it. (bsc#1182362)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182328">SUSE bug 1182328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182362">SUSE bug 1182362</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-27218/">CVE-2021-27218</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-27219/">CVE-2021-27219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494225" comment="glib2-devel-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494226" comment="glib2-lang-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494227" comment="glib2-tools-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494228" comment="libgio-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494229" comment="libgio-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494230" comment="libglib-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494231" comment="libglib-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494232" comment="libgmodule-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494233" comment="libgmodule-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494234" comment="libgobject-2_0-0-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494235" comment="libgobject-2_0-0-32bit-2.62.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494236" comment="libgthread-2_0-0-2.62.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110335" version="1" class="patch">
	<metadata>
		<title>Security update for nghttp2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172442" ref_url="https://bugzilla.suse.com/1172442" source="BUGZILLA"/>
		<reference ref_id="1181358" ref_url="https://bugzilla.suse.com/1181358" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008538.html" source="SUSE-SU"/>
		<description>
This update for nghttp2 fixes the following issues:

- CVE-2020-11080: HTTP/2 Large Settings Frame DoS (bsc#1181358)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181358">SUSE bug 1181358</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494237" comment="libnghttp2-14-1.40.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494238" comment="libnghttp2-14-32bit-1.40.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494239" comment="libnghttp2-devel-1.40.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494240" comment="libnghttp2_asio-devel-1.40.0-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494241" comment="libnghttp2_asio1-1.40.0-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110336" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177125" ref_url="https://bugzilla.suse.com/1177125" source="BUGZILLA"/>
		<reference ref_id="1177222" ref_url="https://bugzilla.suse.com/1177222" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25613" ref_url="https://www.suse.com/security/cve/CVE-2020-25613/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008549.html" source="SUSE-SU"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2020-25613: Fixed a potential HTTP Request Smuggling  in WEBrick (bsc#1177125).
- Enable optimizations also on ARM64 (bsc#1177222)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177125">SUSE bug 1177125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177222">SUSE bug 1177222</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25613/">CVE-2020-25613</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494242" comment="libruby2_5-2_5-2.5.8-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494243" comment="ruby2.5-2.5.8-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494244" comment="ruby2.5-devel-2.5.8-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494245" comment="ruby2.5-devel-extra-2.5.8-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494246" comment="ruby2.5-stdlib-2.5.8-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110337" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183456" ref_url="https://bugzilla.suse.com/1183456" source="BUGZILLA"/>
		<reference ref_id="1183457" ref_url="https://bugzilla.suse.com/1183457" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20231" ref_url="https://www.suse.com/security/cve/CVE-2021-20231/" source="CVE"/>
		<reference ref_id="CVE-2021-20232" ref_url="https://www.suse.com/security/cve/CVE-2021-20232/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008548.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2021-20232: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183456).
- CVE-2021-20231: Fixed a use after free issue which could have led to memory corruption and other potential consequences (bsc#1183457).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183456">SUSE bug 1183456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183457">SUSE bug 1183457</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20231/">CVE-2021-20231</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20232/">CVE-2021-20232</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494247" comment="gnutls-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494248" comment="libgnutls-devel-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494249" comment="libgnutls30-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494250" comment="libgnutls30-32bit-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494251" comment="libgnutls30-hmac-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494252" comment="libgnutls30-hmac-32bit-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494253" comment="libgnutlsxx-devel-3.6.7-14.10.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494254" comment="libgnutlsxx28-3.6.7-14.10.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110338" version="1" class="patch">
	<metadata>
		<title>Security update for ldb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008555.html" source="SUSE-SU"/>
		<description>
This update for ldb fixes the following issues:

- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).
- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494255" comment="ldb-tools-2.0.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494256" comment="libldb-devel-2.0.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494257" comment="libldb2-2.0.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494258" comment="libldb2-32bit-2.0.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494259" comment="python3-ldb-2.0.12-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494260" comment="python3-ldb-devel-2.0.12-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110339" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008556.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- python36 was updated to 3.6.13
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494261" comment="libpython3_6m1_0-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494262" comment="python3-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494263" comment="python3-base-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494264" comment="python3-curses-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494265" comment="python3-dbm-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494266" comment="python3-devel-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494267" comment="python3-idle-3.6.13-3.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494268" comment="python3-tk-3.6.13-3.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110340" version="1" class="patch">
	<metadata>
		<title>Security update for zstd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183370" ref_url="https://bugzilla.suse.com/1183370" source="BUGZILLA"/>
		<reference ref_id="1183371" ref_url="https://bugzilla.suse.com/1183371" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-24031" ref_url="https://www.suse.com/security/cve/CVE-2021-24031/" source="CVE"/>
		<reference ref_id="CVE-2021-24032" ref_url="https://www.suse.com/security/cve/CVE-2021-24032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008553.html" source="SUSE-SU"/>
		<description>
This update for zstd fixes the following issues:

- CVE-2021-24031: Added read permissions to files while being compressed or uncompressed (bsc#1183371).
- CVE-2021-24032: Fixed a race condition which could have allowed an attacker to access world-readable destination file (bsc#1183370).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183370">SUSE bug 1183370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183371">SUSE bug 1183371</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24031/">CVE-2021-24031</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24032/">CVE-2021-24032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494269" comment="libzstd-devel-1.4.4-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494270" comment="libzstd1-1.4.4-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494271" comment="libzstd1-32bit-1.4.4-1.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494272" comment="zstd-1.4.4-1.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110341" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183852" ref_url="https://bugzilla.suse.com/1183852" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008559.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_1 fixes the security issue:

* CVE-2021-3449: An OpenSSL TLS server may crash if sent a maliciously crafted
  renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation
  ClientHello omits the signature_algorithms extension but includes a
  signature_algorithms_cert extension, then a NULL pointer dereference will
  result, leading to a crash and a denial of service attack. OpenSSL TLS
  clients are not impacted by this issue. [bsc#1183852]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-25"/>
	<updated date="2021-03-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494273" comment="libopenssl-1_1-devel-1.1.1d-11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494274" comment="libopenssl1_1-1.1.1d-11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494275" comment="libopenssl1_1-32bit-1.1.1d-11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494276" comment="libopenssl1_1-hmac-1.1.1d-11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494277" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494278" comment="openssl-1_1-1.1.1d-11.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110342" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008563.html" source="SUSE-SU"/>
		<description>
This update for tar fixes the following issues:

CVE-2021-20193: Memory leak in read_header() in list.c (bsc#1181131)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494279" comment="tar-1.30-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494280" comment="tar-lang-1.30-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494281" comment="tar-rmt-1.30-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110343" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Basesystem 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010009.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Apache2 was updated to the current stable version 2.4.51 (jsc#SLE-22733 jsc#SLE-22849)

It fixes all CVEs and selected bugs represented by patches found between 2.4.23 and 2.4.51.

See https://downloads.apache.org/httpd/CHANGES_2.4 for a complete change log.

Also fixed:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua (bsc#1193942)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-basesystem:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281315" comment="SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662900" comment="apache2-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662901" comment="apache2-prefork-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662902" comment="apache2-utils-2.4.51-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110344" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172377" ref_url="https://bugzilla.suse.com/1172377" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13401" ref_url="https://www.suse.com/security/cve/CVE-2020-13401/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1657-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007143.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Docker was updated to 19.03.11-ce
runc was updated to version 1.0.0-rc10
containerd was updated to version 1.2.13

- CVE-2020-13401: Fixed an issue where an attacker with CAP_NET_RAW capability, could have crafted IPv6 router 
  advertisements, and spoof external IPv6 hosts, resulting in obtaining  sensitive information or causing  denial 
  of service (bsc#1172377).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172377">SUSE bug 1172377</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13401/">CVE-2020-13401</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494392" comment="containerd-1.2.13-5.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494393" comment="docker-19.03.11_ce-6.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494394" comment="docker-bash-completion-19.03.11_ce-6.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494395" comment="docker-libnetwork-0.7.0.1+gitr2902_153d0769a118-4.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494396" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.38.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110345" version="1" class="patch">
	<metadata>
		<title>Security update for slirp4netns (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007130.html" source="SUSE-SU"/>
		<description>
This update for slirp4netns fixes the following issues:

- Update to 0.4.7 (bsc#1172380)
  * libslirp: update to v4.3.1 (Fix CVE-2020-10756)
  * Fix config_from_options() to correctly enable ipv6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494397" comment="slirp4netns-0.4.7-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110346" version="1" class="patch">
	<metadata>
		<title>Security update for cni-plugins (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172410" ref_url="https://bugzilla.suse.com/1172410" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10749" ref_url="https://www.suse.com/security/cve/CVE-2020-10749/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007152.html" source="SUSE-SU"/>
		<description>
This update for cni-plugins fixes the following issues:

cni-plugins updated to version 0.8.6	  

- CVE-2020-10749: Fixed a potential Man-in-the-Middle attacks in IPv4 clusters by spoofing IPv6 router advertisements (bsc#1172410).

Release notes: 
https://github.com/containernetworking/plugins/releases/tag/v0.8.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-20"/>
	<updated date="2020-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172410">SUSE bug 1172410</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10749/">CVE-2020-10749</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494398" comment="cni-plugins-0.8.6-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110347" version="1" class="patch">
	<metadata>
		<title>Security update for conmon, fuse-overlayfs, libcontainers-common, podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162432" ref_url="https://bugzilla.suse.com/1162432" source="BUGZILLA"/>
		<reference ref_id="1164090" ref_url="https://bugzilla.suse.com/1164090" source="BUGZILLA"/>
		<reference ref_id="1165738" ref_url="https://bugzilla.suse.com/1165738" source="BUGZILLA"/>
		<reference ref_id="1171578" ref_url="https://bugzilla.suse.com/1171578" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1175821" ref_url="https://bugzilla.suse.com/1175821" source="BUGZILLA"/>
		<reference ref_id="1175957" ref_url="https://bugzilla.suse.com/1175957" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1726" ref_url="https://www.suse.com/security/cve/CVE-2020-1726/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007476.html" source="SUSE-SU"/>
		<description>
This update for conmon, fuse-overlayfs, libcontainers-common, podman fixes the following issues:

podman was updated to v2.0.6 (bsc#1175821)

- install missing systemd units for the new Rest API (bsc#1175957)
  and a few man-pages that where missing before
- Drop varlink API related bits (in favor of the new API)
- fix install location for zsh completions

 * Fixed a bug where running systemd in a container on a cgroups v1 system would fail.
 * Fixed a bug where /etc/passwd could be re-created every time a container
   is restarted if the container's /etc/passwd did not contain an entry
   for the user the container was started as.
 * Fixed a bug where containers without an /etc/passwd file specifying
   a non-root user would not start.
 * Fixed a bug where the --remote flag would sometimes not make
   remote connections and would instead attempt to run Podman locally.

Update to v2.0.6:

* Features

  - Rootless Podman will now add an entry to /etc/passwd for the user who ran Podman if run with --userns=keep-id.
  - The podman system connection command has been reworked to support multiple connections, and reenabled for use!
  - Podman now has a new global flag, --connection, to specify a connection to a remote Podman API instance.

* Changes

  - Podman's automatic systemd integration (activated by the --systemd=true flag, set by default) will now activate for containers using /usr/local/sbin/init as their command, instead of just /usr/sbin/init and /sbin/init (and any path ending in systemd).
  - Seccomp profiles specified by the --security-opt seccomp=... flag to podman create and podman run will now be honored even if the container was created using --privileged.

* Bugfixes

  - Fixed a bug where the podman play kube would not honor the hostIP field for port forwarding (#5964).
  - Fixed a bug where the podman generate systemd command would panic on an invalid restart policy being specified (#7271).
  - Fixed a bug where the podman images command could take a very long time (several minutes) to complete when a large number of images were present.
  - Fixed a bug where the podman logs command with the --tail flag would not work properly when a large amount of output would be printed ((#7230)[https://github.com//issues/7230]).
  - Fixed a bug where the podman exec command with remote Podman would not return a non-zero exit code when the exec session failed to start (e.g. invoking a non-existent command) (#6893).
  - Fixed a bug where the podman load command with remote Podman would did not honor user-specified tags (#7124).
  - Fixed a bug where the podman system service command, when run as a non-root user by Systemd, did not properly handle the Podman pause process and would not restart properly as a result (#7180).
  - Fixed a bug where the --publish flag to podman create, podman run, and podman pod create did not properly handle a host IP of 0.0.0.0 (attempting to bind to literal 0.0.0.0, instead of all IPs on the system) (#7104).
  - Fixed a bug where the podman start --attach command would not print the container's exit code when the command exited due to the container exiting.
  - Fixed a bug where the podman rm command with remote Podman would not remove volumes, even if the --volumes flag was specified (#7128).
  - Fixed a bug where the podman run command with remote Podman and the --rm flag could exit before the container was fully removed.
  - Fixed a bug where the --pod new:... flag to podman run and podman create would create a pod that did not share any namespaces.
  - Fixed a bug where the --preserve-fds flag to podman run and podman exec could close the wrong file descriptors while trying to close user-provided descriptors after passing them into the container.
  - Fixed a bug where default environment variables ($PATH and $TERM) were not set in containers when not provided by the image.
  - Fixed a bug where pod infra containers were not properly unmounted after exiting.
  - Fixed a bug where networks created with podman network create with an IPv6 subnet did not properly set an IPv6 default route.
  - Fixed a bug where the podman save command would not work properly when its output was piped to another command (#7017).
  - Fixed a bug where containers using a systemd init on a cgroups v1 system could leak mounts under /sys/fs/cgroup/systemd to the host.
  - Fixed a bug where podman build would not generate an event on completion (#7022).
  - Fixed a bug where the podman history command with remote Podman printed incorrect creation times for layers (#7122).
  - Fixed a bug where Podman would not create working directories specified by the container image if they did not exist.
  - Fixed a bug where Podman did not clear CMD from the container image if the user overrode ENTRYPOINT (#7115).
  - Fixed a bug where error parsing image names were not fully reported (part of the error message containing the exact issue was dropped).
  - Fixed a bug where the podman images command with remote Podman did not support printing image tags in Go templates supplied to the --format flag (#7123).
  - Fixed a bug where the podman rmi --force command would not attempt to unmount containers it was removing, which could cause a failure to remove the image.
  - Fixed a bug where the podman generate systemd --new command could incorrectly quote arguments to Podman that contained whitespace, leading to nonfunctional unit files (#7285).
  - Fixed a bug where the podman version command did not properly include build time and Git commit.
  - Fixed a bug where running systemd in a Podman container on a system that did not use the systemd cgroup manager would fail (#6734).
  - Fixed a bug where capabilities from --cap-add were not properly added when a container was started as a non-root user via --user.
  - Fixed a bug where Pod infra containers were not properly cleaned up when they stopped, causing networking issues (#7103).

* API

  - Fixed a bug where the libpod and compat Build endpoints did not accept the application/tar content type (instead only accepting application/x-tar) (#7185).
  - Fixed a bug where the libpod Exists endpoint would attempt to write a second header in some error conditions (#7197).
  - Fixed a bug where compat and libpod Network Inspect and Network Remove endpoints would return a 500 instead of 404 when the requested network was not found.
  - Added a versioned _ping endpoint (e.g. http://localhost/v1.40/_ping).
  - Fixed a bug where containers started through a systemd-managed instance of the REST API would be shut down when podman system service shut down due to its idle timeout (#7294).
  - Added stronger parameter verification for the libpod Network Create endpoint to ensure subnet mask is a valid value.
  - The Pod URL parameter to the Libpod Container List endpoint has been deprecated; the information previously gated by the Pod boolean will now be included in the response unconditionally.

- Change hard requires for AppArmor to Recommends. They are not
  needed for runtime or with SELinux but already installed if
  AppArmor is used [jsc#SMO-15]
- Add BuildRequires for pkg-config(libselinux) to build with
  SELinux support [jsc#SMO-15] 

Update to v2.0.4

* Fixed a bug where the output of podman image search did not
  populate the Description field as it was mistakenly assigned to
  the ID field.
* Fixed a bug where podman build - and podman build on an HTTP
  target would fail.
* Fixed a bug where rootless Podman would improperly chown the
  copied-up contents of anonymous volumes (#7130).
* Fixed a bug where Podman would sometimes HTML-escape special
  characters in its CLI output.
* Fixed a bug where the podman start --attach --interactive
  command would print the container ID of the container attached
  to when exiting (#7068).
* Fixed a bug where podman run --ipc=host --pid=host would only
  set --pid=host and not --ipc=host (#7100).
* Fixed a bug where the --publish argument to podman run, podman
  create and podman pod create would not allow binding the same
  container port to more than one host port (#7062).
* Fixed a bug where incorrect arguments to podman images --format
  could cause Podman to segfault.
* Fixed a bug where podman rmi --force on an image ID with more
  than one name and at least one container using the image would
  not completely remove containers using the image (#7153).
* Fixed a bug where memory usage in bytes and memory use
  percentage were swapped in the output of podman stats
  --format=json.
* Fixed a bug where the libpod and compat events endpoints would
  fail if no filters were specified (#7078).
* Fixed a bug where the CgroupVersion field in responses from the
  compat Info endpoint was prefixed by 'v' (instead of just being
  '1' or '2', as is documented).

- Suggest katacontainers instead of recommending it. It's not
  enabled by default, so it's just bloat

Update to v2.0.3

* Fix handling of entrypoint
* log API: add context to allow for cancelling
* fix API: Create container with an invalid configuration
* Remove all instances of named return 'err' from Libpod
* Fix: Correct connection counters for hijacked connections
* Fix: Hijacking v2 endpoints to follow rfc 7230 semantics
* Remove hijacked connections from active connections list
* version/info: format: allow more json variants
* Correctly print STDOUT on non-terminal remote exec
* Fix container and pod create commands for remote create
* Mask out /sys/dev to prevent information leak from the host
* Ensure sig-proxy default is propagated in start
* Add SystemdMode to inspect for containers
* When determining systemd mode, use full command
* Fix lint
* Populate remaining unused fields in `pod inspect`
* Include infra container information in `pod inspect`
* play-kube: add suport for 'IfNotPresent' pull type
* docs: user namespace can't be shared in pods
* Fix 'Error: unrecognized protocol \'TCP\' in port mapping'
* Error on rootless mac and ip addresses
* Fix &amp; add notes regarding problematic language in codebase
* abi: set default umask and rlimits
* Used reference package with errors for parsing tag
* fix: system df error when an image has no name
* Fix Generate API title/description
* Add noop function disable-content-trust
* fix play kube doesn't override dockerfile ENTRYPOINT
* Support default profile for apparmor
* Bump github.com/containers/common to v0.14.6
* events endpoint: backwards compat to old type
* events endpoint: fix panic and race condition
* Switch references from libpod.conf to containers.conf
* podman.service: set type to simple
* podman.service: set doc to podman-system-service
* podman.service: use default registries.conf
* podman.service: use default killmode
* podman.service: remove stop timeout
* systemd: symlink user-&gt;system
* vendor golang.org/x/text@v0.3.3
* Fix a bug where --pids-limit was parsed incorrectly
* search: allow wildcards
* [CI:DOCS]Do not copy policy.json into gating image
* Fix systemd pid 1 test
* Cirrus: Rotate keys post repo. rename
* The libpod.conf(5) man page got removed and all references are
  now pointing towards containers.conf(5), which will be part
  of the libcontainers-common package.

Update to podman v2.0.2

* fix race condition in `libpod.GetEvents(...)`
* Fix bug where `podman mount` didn't error as rootless
* remove podman system connection
* Fix imports to ensure v2 is used with libpod
* Update release notes for v2.0.2
* specgen: fix order for setting rlimits
* Ensure umask is set appropriately for 'system service'
* generate systemd: improve pod-flags filter
* Fix a bug with APIv2 compat network remove to log an ErrNetworkNotFound instead of nil
* Fixes --remote flag issues
* Pids-limit should only be set if the user set it
* Set console mode for windows
* Allow empty host port in --publish flag
* Add a note on the APIs supported by `system service`
* fix: Don't override entrypoint if it's `nil`
* Set TMPDIR to /var/tmp by default if not set
* test: add tests for --user and volumes
* container: move volume chown after spec generation
* libpod: volume copyup honors namespace mappings
* Fix `system service` panic from early hangup in events
* stop podman service in e2e tests
* Print errors from individual containers in pods
* auto-update: clarify systemd-unit requirements
* podman ps truncate the command
* move go module to v2
* Vendor containers/common v0.14.4
* Bump to imagebuilder v1.1.6 on v2 branch
* Account for non-default port number in image name
- Changes since v2.0.1
* Update release notes with further v2.0.1 changes
* Fix inspect to display multiple label: changes
* Set syslog for exit commands on log-level=debug
* Friendly amendment for pr 6751
* podman run/create: support all transports
* systemd generate: allow manual restart of container units in pods
* Revert sending --remote flag to containers
* Print port mappings in `ps` for ctrs sharing network
* vendor github.com/containers/common@v0.14.3
* Update release notes for v2.0.1
* utils: drop default mapping when running uid!=0
* Set stop signal to 15 when not explicitly set
* podman untag: error if tag doesn't exist
* Reformat inspect network settings
* APIv2: Return `StatusCreated` from volume creation
* APIv2:fix: Remove `/json` from compat network EPs
* Fix ssh-agent support
* libpod: specify mappings to the storage
* APIv2:doc: Fix swagger doc to refer to volumes
* Add podman network to bash command completions
* Fix typo in manpage for `podman auto update`.
* Add JSON output field for ps
* V2 podman system connection
* image load: no args required
* Re-add PODMAN_USERNS environment variable
* Fix conflicts between privileged and other flags
* Bump required go version to 1.13
* Add explicit command to alpine container in test case.
* Use POLL_DURATION for timer
* Stop following logs using timers
* 'pod' was being truncated to 'po' in the names of the generated systemd unit files.
* rootless_linux: improve error message
* Fix podman build handling of --http-proxy flag
* correct the absolute path of `rm` executable
* Makefile: allow customizable GO_BUILD
* Cirrus: Change DEST_BRANCH to v2.0

Update to podman v2.0.0

* The `podman generate systemd` command now supports the `--new`
  flag when used with pods, allowing portable services for pods
  to be created.
* The `podman play kube` command now supports running Kubernetes
  Deployment YAML.
* The `podman exec` command now supports the `--detach` flag to
  run commands in the container in the background.
* The `-p` flag to `podman run` and `podman create` now supports
  forwarding ports to IPv6 addresses.
* The `podman run`, `podman create` and `podman pod create`
  command now support a `--replace` flag to remove and replace any
  existing container (or, for `pod create`, pod) with the same name
* The `--restart-policy` flag to `podman run` and `podman create`
  now supports the `unless-stopped` restart policy.
* The `--log-driver` flag to `podman run` and `podman create`
  now supports the `none` driver, which does not log the
  container's output.
* The `--mount` flag to `podman run` and `podman create` now
  accepts `readonly` option as an alias to `ro`.
* The `podman generate systemd` command now supports the `--container-prefix`,
  `--pod-prefix`, and `--separator` arguments to control the
  name of generated unit files.
* The `podman network ls` command now supports the `--filter`
  flag to filter results.
* The `podman auto-update` command now supports specifying an
  authfile to use when pulling new images on a per-container
  basis using the `io.containers.autoupdate.authfile` label.
* Fixed a bug where the `podman exec` command would log to journald
  when run in containers loggined to journald
  ([#6555](https://github.com/containers/libpod/issues/6555)).
* Fixed a bug where the `podman auto-update` command would not
  preserve the OS and architecture of the original image when
  pulling a replacement
  ([#6613](https://github.com/containers/libpod/issues/6613)).
* Fixed a bug where the `podman cp` command could create an extra
  `merged` directory when copying into an existing directory
  ([#6596](https://github.com/containers/libpod/issues/6596)).
* Fixed a bug where the `podman pod stats` command would crash
  on pods run with `--network=host`
  ([#5652](https://github.com/containers/libpod/issues/5652)).
* Fixed a bug where containers logs written to journald did not
  include the name of the container.
* Fixed a bug where the `podman network inspect` and
  `podman network rm` commands did not properly handle non-default
  CNI configuration paths ([#6212](https://github.com/containers/libpod/issues/6212)).
* Fixed a bug where Podman did not properly remove containers
  when using the Kata containers OCI runtime.
* Fixed a bug where `podman inspect` would sometimes incorrectly
  report the network mode of containers started with `--net=none`.
* Podman is now better able to deal with cases where `conmon`
  is killed before the container it is monitoring.

Update to podman v1.9.3:

* Fixed a bug where, on FIPS enabled hosts, FIPS mode secrets
  were not properly mounted into containers
* Fixed a bug where builds run over Varlink would hang
* Fixed a bug where podman save would fail when the target
  image was specified by digest
* Fixed a bug where rootless containers with ports forwarded to them
  could panic and dump core due to a concurrency issue (#6018)
* Fixed a bug where rootless Podman could race when opening the
  rootless user namespace, resulting in commands failing to run
* Fixed a bug where HTTP proxy environment variables forwarded into
  the container by the --http-proxy flag could not be overridden by --env or --env-file
* Fixed a bug where rootless Podman was setting resource limits on cgroups
  v2 systems that were not using systemd-managed cgroups
  (and thus did not support resource limits), resulting in containers failing to start

Update podman to v1.9.1:

* Bugfixes

  - Fixed a bug where healthchecks could become nonfunctional if
    container log paths were manually set with --log-path and
    multiple container logs were placed in the same directory
  - Fixed a bug where rootless Podman could, when using an older
    libpod.conf, print numerous warning messages about an invalid
    CGroup manager config
  - Fixed a bug where rootless Podman would sometimes fail to
    close the rootless user namespace when joining it

Update podman to v1.9.0:

* Features

  - Experimental support has been added for podman run
    --userns=auto, which automatically allocates a unique UID and
    GID range for the new container's user namespace
  - The podman play kube command now has a --network flag to
    place the created pod in one or more CNI networks
  - The podman commit command now supports an --iidfile flag to
    write the ID of the committed image to a file
  - Initial support for the new containers.conf configuration
    file has been added. containers.conf allows for much more
    detailed configuration of some Podman functionality

* Changes

  - There has been a major cleanup of the podman info command
    resulting in breaking changes. Many fields have been renamed
    to better suit usage with APIv2
  - All uses of the --timeout flag have been switched to prefer
    the alternative --time. The --timeout flag will continue to
    work, but man pages and --help will use the --time flag
    instead

* Bugfixes

  - Fixed a bug where some volume mounts from the host would
    sometimes not properly determine the flags they should use
    when mounting
  - Fixed a bug where Podman was not propagating $PATH to Conmon
    and the OCI runtime, causing issues for some OCI runtimes
    that required it
  - Fixed a bug where rootless Podman would print error messages
    about missing support for systemd cgroups when run in a
    container with no cgroup support
  - Fixed a bug where podman play kube would not properly handle
    container-only port mappings (#5610)
  - Fixed a bug where the podman container prune command was not
    pruning containers in the created and configured states
  - Fixed a bug where Podman was not properly removing CNI IP
    address allocations after a reboot (#5433)
  - Fixed a bug where Podman was not properly applying the
    default Seccomp profile when --security-opt was not given at
    the command line

* HTTP API

  - Many Libpod API endpoints have been added, including Changes,
    Checkpoint, Init, and Restore
  - Resolved issues where the podman system service command would
    time out and exit while there were still active connections
  - Stability overall has greatly improved as we prepare the API
    for a beta release soon with Podman 2.0

* Misc

  - The default infra image for pods has been upgraded to
    k8s.gcr.io/pause:3.2 (from 3.1) to address a bug in the
    architecture metadata for non-AMD64 images
  - The slirp4netns networking utility in rootless Podman now
    uses Seccomp filtering where available for improved security
  - Updated Buildah to v1.14.8
  - Updated containers/storage to v1.18.2
  - Updated containers/image to v5.4.3
  - Updated containers/common to v0.8.1

- Add 'systemd' BUILDFLAGS to build with support for journald
  logging (bsc#1162432)

Update podman to v1.8.2:

* Features

  - Initial support for automatically updating containers managed
    via Systemd unit files has been merged. This allows
    containers to automatically upgrade if a newer version of
    their image becomes available

* Bugfixes

  - Fixed a bug where unit files generated by podman generate
    systemd --new would not force containers to detach, causing
    the unit to time out when trying to start
  - Fixed a bug where podman system reset could delete important
    system directories if run as rootless on installations
    created by older Podman (#4831)
  - Fixed a bug where image built by podman build would not
    properly set the OS and Architecture they were built with
    (#5503)
  - Fixed a bug where attached podman run with --sig-proxy
    enabled (the default), when built with Go 1.14, would
    repeatedly send signal 23 to the process in the container and
    could generate errors when the container stopped (#5483)
  - Fixed a bug where rootless podman run commands could hang
    when forwarding ports
  - Fixed a bug where rootless Podman would not work when /proc
    was mounted with the hidepid option set
  - Fixed a bug where the podman system service command would use
    large amounts of CPU when --timeout was set to 0 (#5531)

* HTTP API

  - Initial support for Libpod endpoints related to creating and
    operating on image manifest lists has been added
  - The Libpod Healthcheck and Events API endpoints are now
    supported
  - The Swagger endpoint can now handle cases where no Swagger
    documentation has been generated

Update podman to v1.8.1:

* Features

  - Many networking-related flags have been added to podman pod
    create to enable customization of pod networks, including
    --add-host, --dns, --dns-opt, --dns-search, --ip,
    --mac-address, --network, and --no-hosts
  - The podman ps --format=json command now includes the ID of
    the image containers were created with
  - The podman run and podman create commands now feature an
    --rmi flag to remove the image the container was using after
    it exits (if no other containers are using said image)
    ([#4628](https://github.com/containers/libpod/issues/4628))
  - The podman create and podman run commands now support the
    --device-cgroup-rule flag (#4876)
  - While the HTTP API remains in alpha, many fixes and additions
    have landed. These are documented in a separate subsection
    below
  - The podman create and podman run commands now feature a
    --no-healthcheck flag to disable healthchecks for a container
    (#5299)
  - Containers now recognize the io.containers.capabilities
    label, which specifies a list of capabilities required by the
    image to run. These capabilities will be used as long as they
    are more restrictive than the default capabilities used
  - YAML produced by the podman generate kube command now
    includes SELinux configuration passed into the container via
    --security-opt label=... (#4950)

* Bugfixes

  - Fixed CVE-2020-1726, a security issue where volumes manually
    populated before first being mounted into a container could
    have those contents overwritten on first being mounted into a
    container
  - Fixed a bug where Podman containers with user namespaces in
    CNI networks with the DNS plugin enabled would not have the
    DNS plugin's nameserver added to their resolv.conf
    ([#5256](https://github.com/containers/libpod/issues/5256))
  - Fixed a bug where trailing / characters in image volume
    definitions could cause them to not be overridden by a
    user-specified mount at the same location
    ([#5219](https://github.com/containers/libpod/issues/5219))
  - Fixed a bug where the label option in libpod.conf, used to
    disable SELinux by default, was not being respected (#5087)
  - Fixed a bug where the podman login and podman logout commands
    required the registry to log into be specified (#5146)
  - Fixed a bug where detached rootless Podman containers could
    not forward ports (#5167)
  - Fixed a bug where rootless Podman could fail to run if the
    pause process had died
  - Fixed a bug where Podman ignored labels that were specified
    with only a key and no value (#3854)
  - Fixed a bug where Podman would fail to create named volumes
    when the backing filesystem did not support SELinux labelling
    (#5200)
  - Fixed a bug where --detach-keys='' would not disable
    detaching from a container (#5166)
  - Fixed a bug where the podman ps command was too aggressive
    when filtering containers and would force --all on in too
    many situations
  - Fixed a bug where the podman play kube command was ignoring
    image configuration, including volumes, working directory,
    labels, and stop signal (#5174)
  - Fixed a bug where the Created and CreatedTime fields in
    podman images --format=json were misnamed, which also broke
    Go template output for those fields
    ([#5110](https://github.com/containers/libpod/issues/5110))
  - Fixed a bug where rootless Podman containers with ports
    forwarded could hang when started (#5182)
  - Fixed a bug where podman pull could fail to parse registry
    names including port numbers
  - Fixed a bug where Podman would incorrectly attempt to
    validate image OS and architecture when starting containers
  - Fixed a bug where Bash completion for podman build -f would
    not list available files that could be built (#3878)
  - Fixed a bug where podman commit --change would perform
    incorrect validation, resulting in valid changes being
    rejected (#5148)
  - Fixed a bug where podman logs --tail could take large amounts
    of memory when the log file for a container was large (#5131)
  - Fixed a bug where Podman would sometimes incorrectly generate
    firewall rules on systems using firewalld
  - Fixed a bug where the podman inspect command would not
    display network information for containers properly if a
    container joined multiple CNI networks
    ([#4907](https://github.com/containers/libpod/issues/4907))
  - Fixed a bug where the --uts flag to podman create and podman
    run would only allow specifying containers by full ID (#5289)
  - Fixed a bug where rootless Podman could segfault when passed
    a large number of file descriptors
  - Fixed a bug where the podman port command was incorrectly
    interpreting additional arguments as container names, instead
    of port numbers
  - Fixed a bug where units created by podman generate systemd
    did not depend on network targets, and so could start before
    the system network was ready (#4130)
  - Fixed a bug where exec sessions in containers which did not
    specify a user would not inherit supplemental groups added to
    the container via --group-add
  - Fixed a bug where Podman would not respect the $TMPDIR
    environment variable for placing large temporary files during
    some operations (e.g. podman pull)
    ([#5411](https://github.com/containers/libpod/issues/5411))

* HTTP API

  - Initial support for secure connections to servers via SSH
    tunneling has been added
  - Initial support for the libpod create and logs endpoints for
    containers has been added
  - Added a /swagger/ endpoint to serve API documentation
  - The json endpoint for containers has received many fixes
  - Filtering images and containers has been greatly improved,
    with many bugs fixed and documentation improved
  - Image creation endpoints (commit, pull, etc) have seen many
    fixes
  - Server timeout has been fixed so that long operations will no
    longer trigger the timeout and shut the server down
  - The stats endpoint for containers has seen major fixes and
    now provides accurate output
  - Handling the HTTP 304 status code has been fixed for all
    endpoints
  - Many fixes have been made to API documentation to ensure it
    matches the code

* Misc

  - The Created field to podman images --format=json has been
    renamed to CreatedSince as part of the fix for (#5110). Go
    templates using the old name shou ld still work
  - The CreatedTime field to podman images --format=json has been
    renamed to CreatedAt as part of the fix for (#5110). Go
    templates using the old name should still work
  - The before filter to podman images has been renamed to since
    for Docker compatibility. Using before will still work, but
      documentation has been changed to use the new since filter
  - Using the --password flag to podman login now warns that
    passwords are being passed in plaintext
  - Some common cases where Podman would deadlock have been fixed
    to warn the user that podman system renumber must be run to
    resolve the deadlock

- Configure br_netfilter for podman automatically (bsc#1165738)
  The trigger is only excuted when updating podman-cni-config while the
  command was running

conmon was update to v2.0.20 (bsc#1175821)

- journald: fix logging container name
- container logging: Implement none driver - 'off', 'null' or
  'none' all work.
- ctrl: warn if we fail to unlink
- Drop fsync calls
- Reap PIDs before running exit command
- Fix log path parsing
- Add --sync option to prevent conmon from double forking
- Add --no-sync-log option to instruct conmon to not sync the
  logs of the containers upon shutting down. This feature fixes a
  regression where we unconditionally dropped the log sync. It is
  possible the container logs could be corrupted on a sudden
  power-off. If you need container logs to remain in consistent
  state after a sudden shutdown, please update from v2.0.19 to
  v2.0.20

- Update to v2.0.17:

  - Add option to delay execution of exit command

- Update to v2.0.16:

  - tty: flush pending data when fd is ready

- Enable support for journald logging (bsc#1162432)
- Update to v2.0.15:

  - store status while waiting for pid

- Update to v2.0.14:

  - drop usage of splice(2)
  - avoid hanging on stdin
  - stdio: sometimes quit main loop after io is done
  - ignore sigpipe

- Update to v2.0.12

  - oom: fix potential race between verification steps

- Update to v2.0.11

  - log: reject --log-tag with k8s-file
  - chmod std files pipes
  - adjust score to -1000 to prevent conmon from ever being OOM
    killed
  - container OOM: verify cgroup hasn't been cleaned up before
    reporting OOM
  - journal logging: write to /dev/null instead of -1

fuse-overlayfs was updated to 1.1.2 (bsc#1175821):

- fix memory leak when creating whiteout files.
- fix lookup for overflow uid when it is different than the overflow gid.
- use openat2(2) when available.
- accept 'ro' as mount option.
- fix set mtime for a symlink.
- fix some issues reported by static analysis.
- fix potential infinite loop on a short read.
- fix creating a directory if the destination already exists
  in the upper layer.
- report correctly the number of links for a directory also for
  subsequent stat calls
- stop looking up the ino in the lower layers if the file could
  not be opened
- make sure the destination is deleted before doing a rename(2).
  It prevents a left over directory to cause delete to fail with
  EEXIST.
- honor --debug.

libcontainers-common was updated to fix:

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)
- Added containers/common tarball for containers.conf(5) man page
- Install containers.conf default configuration in
  /usr/share/containers
- libpod repository on github got renamed to podman
- Update to image 5.5.1
  - Add documentation for credHelpera
  - Add defaults for using the rootless policy path
- Update libpod/podman to 2.0.3
  - docs: user namespace can't be shared in pods
  - Switch references from libpod.conf to containers.conf
  - Allow empty host port in --publish flag
  - update document login see config.json as valid
- Update storage to 1.20.2
  - Add back skip_mount_home

- Remove remaining difference between SLE and openSUSE package and
  ship the some mounts.conf default configuration on both platforms.
  As the sources for the mount point do not exist on openSUSE by
  default this config will basically have no effect on openSUSE.
  (jsc#SLE-12122, bsc#1175821) 

- Update to image 5.4.4
  - Remove registries.conf VERSION 2 references from man page
  - Intial authfile man page
  - Add $HOME/.config/containers/certs.d to perHostCertDirPath
  - Add $HOME/.config/containers/registries.conf to config path
  - registries.conf.d: add stances for the registries.conf
- update to libpod 1.9.3
  - userns: support --userns=auto
  - Switch to using --time as opposed to --timeout to better match Docker
  - Add support for specifying CNI networks in podman play kube
  - man pages: fix inconsistencies
- Update to storage 1.19.1
  - userns: add support for auto
  - store: change the default user to containers
  - config: honor XDG_CONFIG_HOME
- Remove the /var/lib/ca-certificates/pem/SUSE.pem workaround again.
  It never ended up in SLES and a different way to fix the underlying
  problem is being worked on.

- Add registry.opensuse.org as default registry [bsc#1171578] 

- Add /var/lib/ca-certificates/pem/SUSE.pem to the SLES mounts.
  This for making container-suseconnect working in the public
  cloud on-demand images. It needs that file for being able to
  verify the server certificates of the RMT servers hosted
  in the public cloud.
  (https://github.com/SUSE/container-suseconnect/issues/41)
  

      		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162432">SUSE bug 1162432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164090">SUSE bug 1164090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165738">SUSE bug 1165738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171578">SUSE bug 1171578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175821">SUSE bug 1175821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175957">SUSE bug 1175957</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-1726/">CVE-2020-1726</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494399" comment="conmon-2.0.20-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494400" comment="fuse-overlayfs-1.1.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494401" comment="podman-2.0.6-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494402" comment="podman-cni-config-2.0.6-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110348" version="1" class="patch">
	<metadata>
		<title>Security update for podman (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176804" ref_url="https://bugzilla.suse.com/1176804" source="BUGZILLA"/>
		<reference ref_id="1178122" ref_url="https://bugzilla.suse.com/1178122" source="BUGZILLA"/>
		<reference ref_id="1178392" ref_url="https://bugzilla.suse.com/1178392" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14370" ref_url="https://www.suse.com/security/cve/CVE-2020-14370/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007809.html" source="SUSE-SU"/>
		<description>
This update for podman fixes the following issues:

Security issue fixed:

- This release resolves CVE-2020-14370, in which environment variables could be leaked between containers created using the Varlink API (bsc#1176804).

Non-security issues fixed:

- add dependency to timezone package or podman fails to build a 
  container (bsc#1178122)

- Install new auto-update system units
- Update to v2.1.1 (bsc#1178392):
  * Changes
    - The `podman info` command now includes the cgroup manager
      Podman is using.
  * API
    - The REST API now includes a Server header in all responses.
    - Fixed a bug where the Libpod and Compat Attach endpoints
      could terminate early, before sending all output from the
      container.
    - Fixed a bug where the Compat Create endpoint for containers
      did not properly handle the Interactive parameter.
    - Fixed a bug where the Compat Kill endpoint for containers
      could continue to run after a fatal error.
    - Fixed a bug where the Limit parameter of the Compat List
      endpoint for Containers did not properly handle a limit of 0
      (returning nothing, instead of all containers) [#7722].
    - The Libpod Stats endpoint for containers is being deprecated
      and will be replaced by a similar endpoint with additional
      features in a future release.
- Changes in v2.1.0
  * Features
    - A new command, `podman image mount`, has been added. This
      allows for an image to be mounted, read-only, to inspect its
      contents without creating a container from it [#1433].
    - The `podman save` and `podman load` commands can now create
      and load archives containing multiple images [#2669].
    - Rootless Podman now supports all `podman network` commands,
      and rootless containers can now be joined to networks.
    - The performance of `podman build` on `ADD` and `COPY`
      instructions has been greatly improved, especially when a
      `.dockerignore` is present.
    - The `podman run` and `podman create` commands now support a
      new mode for the `--cgroups` option, `--cgroups=split`.
      Podman will create two cgroups under the cgroup it was
      launched in, one for the container and one for Conmon. This
      mode is useful for running Podman in a systemd unit, as it
      ensures that all processes are retained in systemd's cgroup
      hierarchy [#6400].
    - The `podman run` and `podman create` commands can now specify
      options to slirp4netns by using the `--network` option as
      follows:  `--net slirp4netns:opt1,opt2`. This allows for,
      among other things, switching the port forwarder used by
      slirp4netns away from rootlessport.
    - The `podman ps` command now features a new option,
      `--storage`, to show containers from Buildah, CRI-O and other
      applications.
    - The `podman run` and `podman create` commands now feature a
      `--sdnotify` option to control the behavior of systemd's
      sdnotify with containers, enabling improved support for
      Podman in `Type=notify` units.
    - The `podman run` command now features a `--preserve-fds`
      opton to pass file descriptors from the host into the
      container [#6458].
    - The `podman run` and `podman create` commands can now create
      overlay volume mounts, by adding the `:O` option to a bind
      mount (e.g. `-v /test:/test:O`). Overlay volume mounts will
      mount a directory into a container from the host and allow
      changes to it, but not write those changes back to the
      directory on the host.
    - The `podman play kube` command now supports the Socket
      HostPath type [#7112].
    - The `podman play kube` command now supports read-only mounts.
    - The `podman play kube` command now supports setting labels on
      pods from Kubernetes metadata labels.
    - The `podman play kube` command now supports setting container
      restart policy [#7656].
    - The `podman play kube` command now properly handles
      `HostAlias` entries.
    - The `podman generate kube` command now adds entries to
      `/etc/hosts` from `--host-add` generated YAML as `HostAlias`
      entries.
    - The `podman play kube` and `podman generate kube` commands
      now properly support `shareProcessNamespace` to share the PID
      namespace in pods.
    - The `podman volume ls` command now supports the `dangling`
      filter to identify volumes that are dangling (not attached to
      any container).
    - The `podman run` and `podman create` commands now feature a
      `--umask` option to set the umask of the created container.
    - The `podman create` and `podman run` commands now feature a
      `--tz` option to set the timezone within the container [#5128].
    - Environment variables for Podman can now be added in the
      `containers.conf` configuration file.
    - The `--mount` option of `podman run` and `podman create` now
      supports a new mount type, `type=devpts`, to add a `devpts`
      mount to the container. This is useful for containers that
      want to mount `/dev/` from the host into the container, but
      still create a terminal.
    - The `--security-opt` flag to `podman run` and `podman create`
      now supports a new option, `proc-opts`, to specify options
      for the container's `/proc` filesystem.
    - Podman with the `crun` OCI runtime now supports a new option
      to `podman run` and `podman create`, `--cgroup-conf`, which
      allows for advanced configuration of cgroups on cgroups v2
      systems.
    - The `podman create` and `podman run` commands now support a
      `--override-variant` option, to override the architecture
      variant of the image that will be pulled and ran.
    - A new global option has been added to Podman,
      `--runtime-flags`, which allows for setting flags to use when
      the OCI runtime is called.
    - The `podman manifest add` command now supports the
      `--cert-dir`, `--auth-file`, `--creds`, and `--tls-verify`
      options.
  * Security
    - This release resolves CVE-2020-14370, in which environment
      variables could be leaked between containers created using
      the Varlink API.
  * Changes
    - Podman will now retry pulling an image 3 times if a pull
      fails due to network errors.
    - The `podman exec` command would previously print error
      messages (e.g. `exec session exited with non-zero exit code
      -1`) when the command run exited with a non-0 exit code. It
      no longer does this. The `podman exec` command will still
      exit with the same exit code as the command run in the
      container did.
    - Error messages when creating a container or pod with a name
      that is already in use have been improved.
    - For read-only containers running systemd init, Podman creates
      a tmpfs filesystem at `/run`. This was previously limited to
      65k in size and mounted `noexec`, but is now unlimited size
      and mounted `exec`.
    - The `podman system reset` command no longer removes
      configuration files for rootless Podman.
  * API
    - The Libpod API version has been bumped to v2.0.0 due to a
      breaking change in the Image List API.
    - Docker-compatible Volume Endpoints (Create, Inspect, List,
      Remove, Prune) are now available!
    - Added an endpoint for generating systemd unit files for
      containers.
    - The `last` parameter to the Libpod container list endpoint
      now has an alias, `limit` [#6413].
    - The Libpod image list API new returns timestamps in Unix
      format, as integer, as opposed to as strings
    - The Compat Inspect endpoint for containers now includes port
      information in NetworkSettings.
    - The Compat List endpoint for images now features limited
      support for the (deprecated) `filter` query parameter [#6797].
    - Fixed a bug where the Compat Create endpoint for containers
      was not correctly handling bind mounts.
    - Fixed a bug where the Compat Create endpoint for containers
      would not return a 404 when the requested image was not
      present.
    - Fixed a bug where the Compat Create endpoint for containers
      did not properly handle Entrypoint and Command from images.
    - Fixed a bug where name history information was not properly
      added in the Libpod Image List endpoint.
    - Fixed a bug where the Libpod image search endpoint improperly
      populated the Description field of responses.
    - Added a `noTrunc` option to the Libpod image search endpoint.
    - Fixed a bug where the Pod List API would return null, instead
      of an empty array, when no pods were present [#7392].
    - Fixed a bug where endpoints that hijacked would do perform
      the hijack too early, before being ready to send and receive
      data [#7195].
    - Fixed a bug where Pod endpoints that can operate on multiple
      containers at once (e.g. Kill, Pause, Unpause, Stop) would
      not forward errors from individual containers that failed.
    - The Compat List endpoint for networks now supports filtering
      results [#7462].
    - Fixed a bug where the Top endpoint for pods would return both
      a 500 and 404 when run on a non-existent pod.
    - Fixed a bug where Pull endpoints did not stream progress back
      to the client.
    - The Version endpoints (Libpod and Compat) now provide version
      in a format compatible with Docker.
    - All non-hijacking responses to API requests should not
      include headers with the version of the server.
    - Fixed a bug where Libpod and Compat Events endpoints did not
      send response headers until the first event occurred [#7263].
    - Fixed a bug where the Build endpoints (Compat and Libpod) did
      not stream progress to the client.
    - Fixed a bug where the Stats endpoints (Compat and Libpod) did
      not properly handle clients disconnecting.
    - Fixed a bug where the Ignore parameter to the Libpod Stop
      endpoint was not performing properly.
    - Fixed a bug where the Compat Logs endpoint for containers did
      not stream its output in the correct format [#7196].
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176804">SUSE bug 1176804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178122">SUSE bug 1178122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178392">SUSE bug 1178392</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14370/">CVE-2020-14370</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494403" comment="podman-2.1.1-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494404" comment="podman-cni-config-2.1.1-4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110349" version="1" class="patch">
	<metadata>
		<title>Security update for buildah (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1165184" ref_url="https://bugzilla.suse.com/1165184" source="BUGZILLA"/>
		<reference ref_id="1167864" ref_url="https://bugzilla.suse.com/1167864" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-10214" ref_url="https://www.suse.com/security/cve/CVE-2019-10214/" source="CVE"/>
		<reference ref_id="CVE-2020-10696" ref_url="https://www.suse.com/security/cve/CVE-2020-10696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007820.html" source="SUSE-SU"/>
		<description>
This update for buildah fixes the following issues:

buildah was updated to v1.17.0 (bsc#1165184):

* Handle cases where other tools mount/unmount containers
* overlay.MountReadOnly: support RO overlay mounts
* overlay: use fusermount for rootless umounts
* overlay: fix umount
* Switch default log level of Buildah to Warn. Users need to see these messages
* Drop error messages about OCI/Docker format to Warning level
* build(deps): bump github.com/containers/common from 0.26.0 to 0.26.2
* tests/testreport: adjust for API break in storage v1.23.6
* build(deps): bump github.com/containers/storage from 1.23.5 to 1.23.7
* build(deps): bump github.com/fsouza/go-dockerclient from 1.6.5 to 1.6.6
* copier: put: ignore Typeflag='g'
* Use curl to get repo file (fix #2714)
* build(deps): bump github.com/containers/common from 0.25.0 to 0.26.0
* build(deps): bump github.com/spf13/cobra from 1.0.0 to 1.1.1
* Remove docs that refer to bors, since we're not using it
* Buildah bud should not use stdin by default
* bump containerd, docker, and golang.org/x/sys
* Makefile: cross: remove windows.386 target
* copier.copierHandlerPut: don't check length when there are errors
* Stop excessive wrapping
* CI: require that conformance tests pass
* bump(github.com/openshift/imagebuilder) to v1.1.8
* Skip tlsVerify insecure BUILD_REGISTRY_SOURCES
* Fix build path wrong containers/podman#7993
* refactor pullpolicy to avoid deps
* build(deps): bump github.com/containers/common from 0.24.0 to 0.25.0
* CI: run gating tasks with a lot more memory
* ADD and COPY: descend into excluded directories, sometimes
* copier: add more context to a couple of error messages
* copier: check an error earlier
* copier: log stderr output as debug on success
* Update nix pin with make nixpkgs
* Set directory ownership when copied with ID mapping
* build(deps): bump github.com/sirupsen/logrus from 1.6.0 to 1.7.0
* build(deps): bump github.com/containers/common from 0.23.0 to 0.24.0
* Cirrus: Remove bors artifacts
* Sort build flag definitions alphabetically
* ADD: only expand archives at the right time
* Remove configuration for bors
* Shell Completion for podman build flags
* Bump c/common to v0.24.0
* New CI check: xref --help vs man pages
* CI: re-enable several linters
* Move --userns-uid-map/--userns-gid-map description into buildah man page
* add: preserve ownerships and permissions on ADDed archives
* Makefile: tweak the cross-compile target
* Bump containers/common to v0.23.0
* chroot: create bind mount targets 0755 instead of 0700
* Change call to Split() to safer SplitN()
* chroot: fix handling of errno seccomp rules
* build(deps): bump github.com/containers/image/v5 from 5.5.2 to 5.6.0
* Add In Progress section to contributing
* integration tests: make sure tests run in ${topdir}/tests
* Run(): ignore containers.conf's environment configuration
* Warn when setting healthcheck in OCI format
* Cirrus: Skip git-validate on branches
* tools: update git-validation to the latest commit
* tools: update golangci-lint to v1.18.0
* Add a few tests of push command
* Add(): fix handling of relative paths with no ContextDir
* build(deps): bump github.com/containers/common from 0.21.0 to 0.22.0
* Lint: Use same linters as podman
* Validate: reference HEAD
* Fix buildah mount to display container names not ids
* Update nix pin with make nixpkgs
* Add missing --format option in buildah from man page
* Fix up code based on codespell
* build(deps): bump github.com/openshift/imagebuilder from 1.1.6 to 1.1.7
* build(deps): bump github.com/containers/storage from 1.23.4 to 1.23.5
* Improve buildah completions
* Cirrus: Fix validate commit epoch
* Fix bash completion of manifest flags
* Uniform some man pages
* Update Buildah Tutorial to address BZ1867426
* Update bash completion of manifest add sub command
* copier.Get(): hard link targets shouldn't be relative paths
* build(deps): bump github.com/onsi/gomega from 1.10.1 to 1.10.2
* Pass timestamp down to history lines
* Timestamp gets updated everytime you inspect an image
* bud.bats: use absolute paths in newly-added tests
* contrib/cirrus/lib.sh: don't use CN for the hostname
* tests: Add some tests
* Update manifest add man page
* Extend flags of manifest add
* build(deps): bump github.com/containers/storage from 1.23.3 to 1.23.4
* build(deps): bump github.com/onsi/ginkgo from 1.14.0 to 1.14.1
* CI: expand cross-compile checks

Update to v1.16.2:

* fix build on 32bit arches
* containerImageRef.NewImageSource(): don't always force timestamps
* Add fuse module warning to image readme
* Heed our retry delay option values when retrying commit/pull/push
* Switch to containers/common for seccomp
* Use --timestamp rather then --omit-timestamp
* docs: remove outdated notice
* docs: remove outdated notice
* build-using-dockerfile: add a hidden --log-rusage flag
* build(deps): bump github.com/containers/image/v5 from 5.5.1 to 5.5.2
* Discard ReportWriter if user sets options.Quiet
* build(deps): bump github.com/containers/common from 0.19.0 to 0.20.3
* Fix ownership of content copied using COPY --from
* newTarDigester: zero out timestamps in tar headers
* Update nix pin with `make nixpkgs`
* bud.bats: correct .dockerignore integration tests
* Use pipes for copying
* run: include stdout in error message
* run: use the correct error for errors.Wrapf
* copier: un-export internal types
* copier: add Mkdir()
* in_podman: don't get tripped up by $CIRRUS_CHANGE_TITLE
* docs/buildah-commit.md: tweak some wording, add a --rm example
* imagebuildah: don’t blank out destination names when COPYing
* Replace retry functions with common/pkg/retry
* StageExecutor.historyMatches: compare timestamps using .Equal
* Update vendor of containers/common
* Fix errors found in coverity scan
* Change namespace handling flags to better match podman commands
* conformance testing: ignore buildah.BuilderIdentityAnnotation labels
* Vendor in containers/storage v1.23.0
* Add buildah.IsContainer interface
* Avoid feeding run_buildah to pipe
* fix(buildahimage): add xz dependency in buildah image
* Bump github.com/containers/common from 0.15.2 to 0.18.0
* Howto for rootless image building from OpenShift
* Add --omit-timestamp flag to buildah bud
* Update nix pin with `make nixpkgs`
* Shutdown storage on failures
* Handle COPY --from when an argument is used
* Bump github.com/seccomp/containers-golang from 0.5.0 to 0.6.0
* Cirrus: Use newly built VM images
* Bump github.com/opencontainers/runc from 1.0.0-rc91 to 1.0.0-rc92
* Enhance the .dockerignore man pages
* conformance: add a test for COPY from subdirectory
* fix  bug manifest inspct
* Add documentation for .dockerignore
* Add BuilderIdentityAnnotation to identify buildah version
* DOC: Add quay.io/containers/buildah image to README.md
* Update buildahimages readme
* fix spelling mistake in 'info' command result display
* Don't bind /etc/host and /etc/resolv.conf if network is not present
* blobcache: avoid an unnecessary NewImage()
* Build static binary with `buildGoModule`
* copier: split StripSetidBits into StripSetuidBit/StripSetgidBit/StripStickyBit
* tarFilterer: handle multiple archives
* Fix a race we hit during conformance tests
* Rework conformance testing
* Update 02-registries-repositories.md
* test-unit: invoke cmd/buildah tests with --flags
* parse: fix a type mismatch in a test
* Fix compilation of tests/testreport/testreport
* build.sh: log the version of Go that we're using
* test-unit: increase the test timeout to 40/45 minutes
* Add the 'copier' package
* Fix &amp; add notes regarding problematic language in codebase
* Add dependency on github.com/stretchr/testify/require
* CompositeDigester: add the ability to filter tar streams
* BATS tests: make more robust
* vendor golang.org/x/text@v0.3.3
* Switch golang 1.12 to golang 1.13
* imagebuildah: wait for stages that might not have even started yet
* chroot, run: not fail on bind mounts from /sys
* chroot: do not use setgroups if it is blocked
* Set engine env from containers.conf
* imagebuildah: return the right stage's image as the 'final' image
* Fix a help string
* Deduplicate environment variables
* switch containers/libpod to containers/podman
* Bump github.com/containers/ocicrypt from 1.0.2 to 1.0.3
* Bump github.com/opencontainers/selinux from 1.5.2 to 1.6.0
* Mask out /sys/dev to prevent information leak
* linux: skip errors from the runtime kill
* Mask over the /sys/fs/selinux in mask branch
* Add VFS additional image store to container
* tests: add auth tests
* Allow 'readonly' as alias to 'ro' in mount options
* Ignore OS X specific consistency mount option
* Bump github.com/onsi/ginkgo from 1.13.0 to 1.14.0
* Bump github.com/containers/common from 0.14.0 to 0.15.2
* Rootless Buildah should default to IsolationOCIRootless
* imagebuildah: fix inheriting multi-stage builds
* Make imagebuildah.BuildOptions.Architecture/OS optional
* Make imagebuildah.BuildOptions.Jobs optional
* Resolve a possible race in imagebuildah.Executor.startStage()
* Switch scripts to use containers.conf
* Bump openshift/imagebuilder to v1.1.6
* Bump go.etcd.io/bbolt from 1.3.4 to 1.3.5
* buildah, bud: support --jobs=N for parallel execution
* executor: refactor build code inside new function
* Add bud regression tests
* Cirrus: Fix missing htpasswd in registry img
* docs: clarify the 'triples' format
* CHANGELOG.md: Fix markdown formatting
* Add nix derivation for static builds
* Bump to v1.16.0-dev

- Update to v1.15.1
* Mask over the /sys/fs/selinux in mask branch
* chroot: do not use setgroups if it is blocked
* chroot, run: not fail on bind mounts from /sys
* Allow 'readonly' as alias to 'ro' in mount options
* Add VFS additional image store to container
* vendor golang.org/x/text@v0.3.3
* Make imagebuildah.BuildOptions.Architecture/OS optional

Update to v1.15.0:

* Add CVE-2020-10696 to CHANGELOG.md and changelog.txt
* fix lighttpd example
* remove dependency on openshift struct
* Warn on unset build arguments
* vendor: update seccomp/containers-golang to v0.4.1
* Updated docs
* clean up comments
* update exit code for tests
* Implement commit for encryption
* implementation of encrypt/decrypt push/pull/bud/from
* fix resolve docker image name as transport
* Add preliminary profiling support to the CLI
* Evaluate symlinks in build context directory
* fix error info about get signatures for containerImageSource
* Add Security Policy
* Cirrus: Fixes from review feedback
* imagebuildah: stages shouldn't count as their base images
* Update containers/common v0.10.0
* Add registry to buildahimage Dockerfiles
* Cirrus: Use pre-installed VM packages + F32
* Cirrus: Re-enable all distro versions
* Cirrus: Update to F31 + Use cache images
* golangci-lint: Disable gosimple
* Lower number of golangci-lint threads
* Fix permissions on containers.conf
* Don't force tests to use runc
* Return exit code from failed containers
* cgroup_manager should be under [engine]
* Use c/common/pkg/auth in login/logout
* Cirrus: Temporarily disable Ubuntu 19 testing
* Add containers.conf to stablebyhand build
* Update gitignore to exclude test Dockerfiles
* Remove warning for systemd inside of container

Update to v1.14.6:

* Make image history work correctly with new args handling
* Don't add args to the RUN environment from the Builder

Update to v1.14.5:

* Revert FIPS mode change

Update to v1.14.4:

* Update unshare man page to fix script example
* Fix compilation errors on non linux platforms
* Preserve volume uid and gid through subsequent commands
* Fix potential CVE in tarfile w/ symlink
* Fix .dockerignore with globs and ! commands

Update to v1.14.2:

* Search for local runtime per values in containers.conf
* Set correct ownership on working directory
* Improve remote manifest retrieval
* Correct a couple of incorrect format specifiers
* manifest push --format: force an image type, not a list type
* run: adjust the order in which elements are added to $
* getDateAndDigestAndSize(): handle creation time not being set
* Make the commit id clear like Docker
* Show error on copied file above context directory in build
* pull/from/commit/push: retry on most failures
* Repair buildah so it can use containers.conf on the server side
* Fixing formatting &amp; build instructions
* Fix XDG_RUNTIME_DIR for authfile
* Show validation command-line

Update to v1.14.0:

* getDateAndDigestAndSize(): use manifest.Digest
* Touch up os/arch doc
* chroot: handle slightly broken seccomp defaults
* buildahimage: specify fuse-overlayfs mount options
* parse: don't complain about not being able to rename something to itself
* Fix build for 32bit platforms
* Allow users to set OS and architecture on bud
* Fix COPY in containerfile with envvar
* Add --sign-by to bud/commit/push, --remove-signatures for pull/push
* Add support for containers.conf
* manifest push: add --format option

Update to v1.13.1:

* copyFileWithTar: close source files at the right time
* copy: don't digest files that we ignore
* Check for .dockerignore specifically
* Don't setup excludes, if their is only one pattern to match
* set HOME env to /root on chroot-isolation by default
* docs: fix references to containers-*.5
* fix bug Add check .dockerignore COPY file
* buildah bud --volume: run from tmpdir, not source dir
* Fix imageNamePrefix to give consistent names in buildah-from
* cpp: use -traditional and -undef flags
* discard outputs coming from onbuild command on buildah-from --quiet
* make --format columnizing consistent with buildah images
* Fix option handling for volumes in build
* Rework overlay pkg for use with libpod
* Fix buildahimage builds for buildah
* Add support for FIPS-Mode backends
* Set the TMPDIR for pulling/pushing image to $TMPDIR

Update to v1.12.0:

* Allow ADD to use http src
* imgtype: reset storage opts if driver overridden
* Start using containers/common
* overlay.bats typo: fuse-overlays should be fuse-overlayfs
* chroot: Unmount with MNT_DETACH instead of UnmountMountpoints()
* bind: don't complain about missing mountpoints
* imgtype: check earlier for expected manifest type
* Add history names support

Update to v1.11.6:

* Handle missing equal sign in --from and --chown flags for COPY/ADD
* bud COPY does not download URL
* Fix .dockerignore exclude regression
* commit(docker): always set ContainerID and ContainerConfig
* Touch up commit man page image parameter
* Add builder identity annotations.

Update to v1.11.5:

* buildah: add 'manifest' command
* pkg/supplemented: add a package for grouping images together
* pkg/manifests: add a manifest list build/manipulation API
* Update for ErrUnauthorizedForCredentials API change in containers/image
* Update for manifest-lists API changes in containers/image
* version: also note the version of containers/image
* Move to containers/image v5.0.0
* Enable --device directory as src device
* Add clarification to the Tutorial for new users
* Silence 'using cache' to ensure -q is fully quiet
* Move runtime flag to bud from common
* Commit: check for storage.ErrImageUnknown using errors.Cause()
* Fix crash when invalid COPY --from flag is specified.

Update to v1.11.4:

* buildah: add a 'manifest' command
* pkg/manifests: add a manifest list build/manipulation API
* Update for ErrUnauthorizedForCredentials API change in containers/image
* Update for manifest-lists API changes in containers/image
* Move to containers/image v5.0.0
* Enable --device directory as src device
* Add clarification to the Tutorial for new users
* Silence 'using cache' to ensure -q is fully quiet
* Move runtime flag to bud from common
* Commit: check for storage.ErrImageUnknown using errors.Cause()
* Fix crash when invalid COPY --from flag is specified.

Update to v1.11.3:

* Add cgroups2
* Add support for retrieving context from stdin '-'
* Added tutorial on how to include Buildah as library
* Fix --build-args handling
* Print build 'STEP' line to stdout, not stderr
* Use Containerfile by default

Update to v1.11.2:

* Add some cleanup code
* Move devices code to unit specific directory.

Update to v1.11.1:

* Add --devices flag to bud and from
* Add support for /run/.containerenv
* Allow mounts.conf entries for equal source and destination paths
* Fix label and annotation for 1-line Dockerfiles
* Preserve file and directory mount permissions
* Replace --debug=false with --log-level=error
* Set TMPDIR to /var/tmp by default
* Truncate output of too long image names
* Ignore EmptyLayer if Squash is set

Update to v1.11.0:

* Add --digestfile and Re-add push statement as debug
* Add --log-level command line option and deprecate --debug
* Add security-related volume options to validator
* Allow buildah bud to be called without arguments
* Allow to override build date with SOURCE_DATE_EPOCH
* Correctly detect ExitError values from Run()
* Disable empty logrus timestamps to reduce logger noise
* Fix directory pull image names
* Fix handling of /dev/null masked devices
* Fix possible runtime panic on bud
* Update bud/from help to contain indicator for --dns=none
* Update documentation about bud
* Update shebangs to take env into consideration
* Use content digests in ADD/COPY history entries
* add support for cgroupsV2
* add: add a DryRun flag to AddAndCopyOptions
* add: handle hard links when copying with .dockerignore
* add: teach copyFileWithTar() about symlinks and directories
* imagebuilder: fix detection of referenced stage roots
* pull/commit/push: pay attention to $BUILD_REGISTRY_SOURCES
* run_linux: fix mounting /sys in a userns


Update to v1.10.1:

* Add automatic apparmor tag discovery
* Add overlayfs to fuse-overlayfs tip
* Bug fix for volume minus syntax
* Bump container/storage v1.13.1 and containers/image v3.0.1
* Bump containers/image to v3.0.2 to fix keyring issue
* Fix bug whereby --get-login has no effect
* Bump github.com/containernetworking/cni to v0.7.1
- Add appamor-pattern requirement

- Update build process to match the latest repository architecture
- Update to v1.10.0
* vendor github.com/containers/image@v3.0.0
* Remove GO111MODULE in favor of -mod=vendor
* Vendor in containers/storage v1.12.16
* Add '-' minus syntax for removal of config values
* tests: enable overlay tests for rootless
* rootless, overlay: use fuse-overlayfs
* vendor github.com/containers/image@v2.0.1
* Added '-' syntax to remove volume config option
* delete successfully pushed message
* Add golint linter and apply fixes
* vendor github.com/containers/storage@v1.12.15
* Change wait to sleep in buildahimage readme
* Handle ReadOnly images when deleting images
* Add support for listing read/only images
* from/import: record the base image's digest, if it has one
* Fix CNI version retrieval to not require network connection
* Add misspell linter and apply fixes
* Add goimports linter and apply fixes
* Add stylecheck linter and apply fixes
* Add unconvert linter and apply fixes
* image: make sure we don't try to use zstd compression
* run.bats: skip the 'z' flag when testing --mount
* Update to runc v1.0.0-rc8
* Update to match updated runtime-tools API
* bump github.com/opencontainers/runtime-tools to v0.9.0
* Build e2e tests using the proper build tags
* Add unparam linter and apply fixes
* Run: correct a typo in the --cap-add help text
* unshare: add a --mount flag
* fix push check image name is not empty
* add: fix slow copy with no excludes
* Add errcheck linter and fix missing error check
* Improve tests/tools/Makefile parallelism and abstraction
* Fix response body not closed resource leak
* Switch to golangci-lint
* Add gomod instructions and mailing list links
* On Masked path, check if /dev/null already mounted before mounting
* Update to containers/storage v1.12.13
* Refactor code in package imagebuildah
* Add rootless podman with NFS issue in documentation
* Add --mount for buildah run
* import method ValidateVolumeOpts from libpod
* Fix typo
* Makefile: set GO111MODULE=off
* rootless: add the built-in slirp DNS server
* Update docker/libnetwork to get rid of outdated sctp package
* Update buildah-login.md
* migrate to go modules
* install.md: mention go modules
* tests/tools: go module for test binaries
* fix --volume splits comma delimited option
* Add bud test for RUN with a priv'd command
* vendor logrus v1.4.2
* pkg/cli: panic when flags can't be hidden
* pkg/unshare: check all errors
* pull: check error during report write
* run_linux.go: ignore unchecked errors
* conformance test: catch copy error
* chroot/run_test.go: export funcs to actually be executed
* tests/imgtype: ignore error when shutting down the store
* testreport: check json error
* bind/util.go: remove unused func
* rm chroot/util.go
* imagebuildah: remove unused dedupeStringSlice
* StageExecutor: EnsureContainerPath: catch error from SecureJoin()
* imagebuildah/build.go: return instead of branching
* rmi: avoid redundant branching
* conformance tests: nilness: allocate map
* imagebuildah/build.go: avoid redundant filepath.Join()
* imagebuildah/build.go: avoid redundant os.Stat()
* imagebuildah: omit comparison to bool
* fix 'ineffectual assignment' lint errors
* docker: ignore 'repeats json tag' lint error
* pkg/unshare: use ... instead of iterating a slice
* conformance: bud test: use raw strings for regexes
* conformance suite: remove unused func/var
* buildah test suite: remove unused vars/funcs
* testreport: fix golangci-lint errors
* util: remove redundant return statement
* chroot: only log clean-up errors
* images_test: ignore golangci-lint error
* blobcache: log error when draining the pipe
* imagebuildah: check errors in deferred calls
* chroot: fix error handling in deferred funcs
* cmd: check all errors
* chroot/run_test.go: check errors
* chroot/run.go: check errors in deferred calls
* imagebuildah.Executor: remove unused onbuild field
* docker/types.go: remove unused struct fields
* util: use strings.ContainsRune instead of index check
* Cirrus: Initial implementation
* buildah-run: fix-out-of-range panic (2)
* Update containers/image to v2.0.0
* run: fix hang with run and --isolation=chroot
* run: fix hang when using run
* chroot: drop unused function call
* remove --&gt; before imgageID on build
* Always close stdin pipe
* Write deny to setgroups when doing single user mapping
* Avoid including linux/memfd.h
* Add a test for the symlink pointing to a directory
* Add missing continue
* Fix the handling of symlinks to absolute paths
* Only set default network sysctls if not rootless
* Support --dns=none like podman
* fix bug --cpu-shares parsing typo
* Fix validate complaint
* Update vendor on containers/storage to v1.12.10
* Create directory paths for COPY thereby ensuring correct perms
* imagebuildah: use a stable sort for comparing build args
* imagebuildah: tighten up cache checking
* bud.bats: add a test verying the order of --build-args
* add -t to podman run
* imagebuildah: simplify screening by top layers
* imagebuildah: handle ID mappings for COPY --from
* imagebuildah: apply additionalTags ourselves
* bud.bats: test additional tags with cached images
* bud.bats: add a test for WORKDIR and COPY with absolute destinations
* Cleanup Overlay Mounts content
* Add support for file secret mounts
* Add ability to skip secrets in mounts file
* allow 32bit builds
* fix tutorial instructions
* imagebuilder: pass the right contextDir to Add()
* add: use fileutils.PatternMatcher for .dockerignore
* bud.bats: add another .dockerignore test
* unshare: fallback to single usermapping
* addHelperSymlink: clear the destination on os.IsExist errors
* bud.bats: test replacing symbolic links
* imagebuildah: fix handling of destinations that end with '/'
* bud.bats: test COPY with a final '/' in the destination
* linux: add check for sysctl before using it
* unshare: set _CONTAINERS_ROOTLESS_GID
* Rework buildahimamges
* build context: support https git repos
* Add a test for ENV special chars behaviour
* Check in new Dockerfiles
* Apply custom SHELL during build time
* config: expand variables only at the command line
* SetEnv: we only need to expand v once
* Add default /root if empty on chroot iso
* Add support for Overlay volumes into the container.
* Export buildah validate volume functions so it can share code with libpod
* Bump baseline test to F30
* Fix rootless handling of /dev/shm size
* Avoid fmt.Printf() in the library
* imagebuildah: tighten cache checking back up
* Handle WORKDIR with dangling target
* Default Authfile to proper path
* Make buildah run --isolation follow BUILDAH_ISOLATION environment
* Vendor in latest containers/storage and containers/image
* getParent/getChildren: handle layerless images
* imagebuildah: recognize cache images for layerless images
* bud.bats: test scratch images with --layers caching
* Get CHANGELOG.md updates
* Add some symlinks to test our .dockerignore logic
* imagebuildah: addHelper: handle symbolic links
* commit/push: use an everything-allowed policy
* Correct manpage formatting in files section
* Remove must be root statement from buildah doc
* Change image names to stable, testing and upstream
* Don't create directory on container
* Replace kubernetes/pause in tests with k8s.gcr.io/pause
* imagebuildah: don't remove intermediate images if we need them
* Rework buildahimagegit to buildahimageupstream
* Fix Transient Mounts
* Handle WORKDIRs that are symlinks
* allow podman to build a client for windows
* Touch up 1.9-dev to 1.9.0-dev
* Resolve symlink when checking container path
* commit: commit on every instruction, but not always with layers
* CommitOptions: drop the unused OnBuild field
* makeImageRef: pass in the whole CommitOptions structure
* cmd: API cleanup: stores before images
* run: check if SELinux is enabled
* Fix buildahimages Dockerfiles to include support for additionalimages mounted from host.
* Detect changes in rootdir
* Fix typo in buildah-pull(1)
* Vendor in latest containers/storage
* Keep track of any build-args used during buildah bud --layers
* commit: always set a parent ID
* imagebuildah: rework unused-argument detection
* fix bug dest path when COPY .dockerignore
* Move Host IDMAppings code from util to unshare
* Add BUILDAH_ISOLATION rootless back
* Travis CI: fail fast, upon error in any step
* imagebuildah: only commit images for intermediate stages if we have to
* Use errors.Cause() when checking for IsNotExist errors
* auto pass http_proxy to container
* imagebuildah: don't leak image structs
* Add Dockerfiles for buildahimages
* Bump to Replace golang 1.10 with 1.12
* add --dns* flags to buildah bud
* Add hack/build_speed.sh test speeds on building container images
* Create buildahimage Dockerfile for Quay
* rename 'is' to 'expect_output'
* squash.bats: test squashing in multi-layered builds
* bud.bats: test COPY --from in a Dockerfile while using the cache
* commit: make target image names optional
* Fix bud-args to allow comma separation
* oops, missed some tests in commit.bats
* new helper: expect_line_count
* New tests for #1467 (string slices in cmdline opts)
* Workarounds for dealing with travis; review feedback
* BATS tests - extensive but minor cleanup
* imagebuildah: defer pulling images for COPY --from
* imagebuildah: centralize COMMIT and image ID output
* Travis: do not use traviswait
* imagebuildah: only initialize imagebuilder configuration once per stage
* Make cleaner error on Dockerfile build errors
* unshare: move to pkg/
* unshare: move some code from cmd/buildah/unshare
* Fix handling of Slices versus Arrays
* imagebuildah: reorganize stage and per-stage logic
* imagebuildah: add empty layers for instructions
* Add missing step in installing into Ubuntu
* fix bug in .dockerignore support
* imagebuildah: deduplicate prepended 'FROM' instructions
* Touch up intro
* commit: set created-by to the shell if it isn't set
* commit: check that we always set a 'created-by'
* docs/buildah.md: add 'containers-' prefixes under 'SEE ALSO'

Update to v1.7.2

* Updates vendored containers/storage to latest version
* rootless: by default use the host network namespace

- Full changelog: https://github.com/containers/buildah/releases/tag/v1.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1165184">SUSE bug 1165184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167864">SUSE bug 1167864</bugzilla>
	<cve impact="critical" cvss3="9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-10214/">CVE-2019-10214</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10696/">CVE-2020-10696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494405" comment="buildah-1.17.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110350" version="1" class="patch">
	<metadata>
		<title>Security update for umoci (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184147" ref_url="https://bugzilla.suse.com/1184147" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008608.html" source="SUSE-SU"/>
		<description>
This update for umoci fixes the following issues:

- Update to umoci v0.4.6.
- CVE-2021-29136: malicious layer allows overwriting of host files (bsc#1184147)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-09"/>
	<updated date="2021-04-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184147">SUSE bug 1184147</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494420" comment="umoci-0.4.6-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110351" version="1" class="patch">
	<metadata>
		<title>Security update for umoci (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184147" ref_url="https://bugzilla.suse.com/1184147" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29136" ref_url="https://www.suse.com/security/cve/CVE-2021-29136/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008938.html" source="SUSE-SU"/>
		<description>
This update for umoci fixes the following issues:

Update to v0.4.7 (bsc#1184147).

- CVE-2021-29136: Fixed overwriting of host files via malicious layer (bsc#1184147).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184147">SUSE bug 1184147</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29136/">CVE-2021-29136</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494421" comment="umoci-0.4.7-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110352" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168481" ref_url="https://bugzilla.suse.com/1168481" source="BUGZILLA"/>
		<reference ref_id="1175081" ref_url="https://bugzilla.suse.com/1175081" source="BUGZILLA"/>
		<reference ref_id="1175821" ref_url="https://bugzilla.suse.com/1175821" source="BUGZILLA"/>
		<reference ref_id="1181594" ref_url="https://bugzilla.suse.com/1181594" source="BUGZILLA"/>
		<reference ref_id="1181641" ref_url="https://bugzilla.suse.com/1181641" source="BUGZILLA"/>
		<reference ref_id="1181677" ref_url="https://bugzilla.suse.com/1181677" source="BUGZILLA"/>
		<reference ref_id="1181730" ref_url="https://bugzilla.suse.com/1181730" source="BUGZILLA"/>
		<reference ref_id="1181732" ref_url="https://bugzilla.suse.com/1181732" source="BUGZILLA"/>
		<reference ref_id="1181749" ref_url="https://bugzilla.suse.com/1181749" source="BUGZILLA"/>
		<reference ref_id="1182451" ref_url="https://bugzilla.suse.com/1182451" source="BUGZILLA"/>
		<reference ref_id="1182476" ref_url="https://bugzilla.suse.com/1182476" source="BUGZILLA"/>
		<reference ref_id="1182947" ref_url="https://bugzilla.suse.com/1182947" source="BUGZILLA"/>
		<reference ref_id="1183024" ref_url="https://bugzilla.suse.com/1183024" source="BUGZILLA"/>
		<reference ref_id="1183855" ref_url="https://bugzilla.suse.com/1183855" source="BUGZILLA"/>
		<reference ref_id="1184768" ref_url="https://bugzilla.suse.com/1184768" source="BUGZILLA"/>
		<reference ref_id="1184962" ref_url="https://bugzilla.suse.com/1184962" source="BUGZILLA"/>
		<reference ref_id="1185405" ref_url="https://bugzilla.suse.com/1185405" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285/" source="CVE"/>
		<reference ref_id="CVE-2021-21334" ref_url="https://www.suse.com/security/cve/CVE-2021-21334/" source="CVE"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008994.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker, runc fixes the following issues:

Docker was updated to 20.10.6-ce (bsc#1184768, bsc#1182947, bsc#1181594)

* Switch version to use -ce suffix rather than _ce to avoid confusing other
  tools (bsc#1182476).
* CVE-2021-21284: Fixed a potential privilege escalation when the root user in 
  the remapped namespace has access to the host filesystem (bsc#1181732)
* CVE-2021-21285: Fixed an issue where pulling a malformed Docker image manifest 
  crashes the dockerd daemon (bsc#1181730). 
* btrfs quotas being removed by Docker regularly (bsc#1183855, bsc#1175081)

runc was updated to v1.0.0~rc93 (bsc#1182451, bsc#1175821 bsc#1184962).

* Use the upstream runc package (bsc#1181641, bsc#1181677, bsc#1175821).
* Fixed /dev/null is not available (bsc#1168481).
* CVE-2021-30465: Fixed a symlink-exchange attack vulnarability (bsc#1185405).

containerd was updated to v1.4.4

* CVE-2021-21334: Fixed a potential information leak through environment variables (bsc#1183397).
* Handle a requirement from docker (bsc#1181594).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168481">SUSE bug 1168481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175081">SUSE bug 1175081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175821">SUSE bug 1175821</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181594">SUSE bug 1181594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181641">SUSE bug 1181641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181677">SUSE bug 1181677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181730">SUSE bug 1181730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181732">SUSE bug 1181732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181749">SUSE bug 1181749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182451">SUSE bug 1182451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182476">SUSE bug 1182476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182947">SUSE bug 1182947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183024">SUSE bug 1183024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183855">SUSE bug 1183855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184768">SUSE bug 1184768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184962">SUSE bug 1184962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21334/">CVE-2021-21334</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494422" comment="containerd-1.4.4-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494423" comment="docker-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494424" comment="docker-bash-completion-20.10.6_ce-6.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494425" comment="runc-1.0.0~rc93-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110353" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="CVE-2021-20286" ref_url="https://www.suse.com/security/cve/CVE-2021-20286/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009117.html" source="SUSE-SU"/>
		<description>
This update for kubevirt fixes the following issues:

General:

- Updated kubevirt to version 0.40.0
- Fixed an issue when calling `virsh-domcapabilities`
- Fixed the the wrong registry path for containers.

Security fixes:

- CVE-2021-20286: A flaw was found in libnbd 1.7.3. An assertion failure in nbd_unlocked_opt_go
  in ilb/opt.c may lead to denial of service.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-20286/">CVE-2021-20286</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624333" comment="containerized-data-importer-manifests-1.30.0-5.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624273" comment="kubevirt-manifests-0.40.0-5.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494426" comment="kubevirt-virtctl-0.40.0-5.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110354" version="1" class="patch">
	<metadata>
		<title>Security update for containerd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188282" ref_url="https://bugzilla.suse.com/1188282" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009163.html" source="SUSE-SU"/>
		<description>
This update for containerd fixes the following issues:

- CVE-2021-32760: Fixed a bug which allows untrusted container images to change permissions in the host's filesystem. (bsc#1188282)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625590" comment="containerd-1.4.4-5.36.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110355" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, runc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1185405" ref_url="https://bugzilla.suse.com/1185405" source="BUGZILLA"/>
		<reference ref_id="1187704" ref_url="https://bugzilla.suse.com/1187704" source="BUGZILLA"/>
		<reference ref_id="1188282" ref_url="https://bugzilla.suse.com/1188282" source="BUGZILLA"/>
		<reference ref_id="1190826" ref_url="https://bugzilla.suse.com/1190826" source="BUGZILLA"/>
		<reference ref_id="1191015" ref_url="https://bugzilla.suse.com/1191015" source="BUGZILLA"/>
		<reference ref_id="1191121" ref_url="https://bugzilla.suse.com/1191121" source="BUGZILLA"/>
		<reference ref_id="1191334" ref_url="https://bugzilla.suse.com/1191334" source="BUGZILLA"/>
		<reference ref_id="1191355" ref_url="https://bugzilla.suse.com/1191355" source="BUGZILLA"/>
		<reference ref_id="1191434" ref_url="https://bugzilla.suse.com/1191434" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30465" ref_url="https://www.suse.com/security/cve/CVE-2021-30465/" source="CVE"/>
		<reference ref_id="CVE-2021-32760" ref_url="https://www.suse.com/security/cve/CVE-2021-32760/" source="CVE"/>
		<reference ref_id="CVE-2021-41089" ref_url="https://www.suse.com/security/cve/CVE-2021-41089/" source="CVE"/>
		<reference ref_id="CVE-2021-41091" ref_url="https://www.suse.com/security/cve/CVE-2021-41091/" source="CVE"/>
		<reference ref_id="CVE-2021-41092" ref_url="https://www.suse.com/security/cve/CVE-2021-41092/" source="CVE"/>
		<reference ref_id="CVE-2021-41103" ref_url="https://www.suse.com/security/cve/CVE-2021-41103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009645.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker, runc fixes the following issues:

Docker was updated to 20.10.9-ce. (bsc#1191355)

See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md. 

  CVE-2021-41092 CVE-2021-41089 CVE-2021-41091 CVE-2021-41103

container was updated to v1.4.11, to fix CVE-2021-41103. bsc#1191355

- CVE-2021-32760: Fixed that a archive package allows chmod of file outside of unpack target directory (bsc#1188282)

- Install systemd service file as well (bsc#1190826)

Update to runc v1.0.2. Upstream changelog is available from

  https://github.com/opencontainers/runc/releases/tag/v1.0.2

* Fixed a failure to set CPU quota period in some cases on cgroup v1.
* Fixed the inability to start a container with the 'adding seccomp filter
  rule for syscall ...' error, caused by redundant seccomp rules (i.e. those
  that has action equal to the default one). Such redundant rules are now
  skipped.
* Made release builds reproducible from now on.
* Fixed a rare debug log race in runc init, which can result in occasional
  harmful 'failed to decode ...' errors from runc run or exec.
* Fixed the check in cgroup v1 systemd manager if a container needs to be
  frozen before Set, and add a setting to skip such freeze unconditionally.
  The previous fix for that issue, done in runc 1.0.1, was not working.

Update to runc v1.0.1. Upstream changelog is available from

https://github.com/opencontainers/runc/releases/tag/v1.0.1

* Fixed occasional runc exec/run failure ('interrupted system call') on an
  Azure volume.
* Fixed 'unable to find groups ... token too long' error with /etc/group
  containing lines longer than 64K characters.
* cgroup/systemd/v1: fix leaving cgroup frozen after Set if a parent cgroup is
  frozen. This is a regression in 1.0.0, not affecting runc itself but some
  of libcontainer users (e.g Kubernetes).
* cgroupv2: bpf: Ignore inaccessible existing programs in case of
  permission error when handling replacement of existing bpf cgroup
  programs. This fixes a regression in 1.0.0, where some SELinux
  policies would block runc from being able to run entirely.
* cgroup/systemd/v2: don't freeze cgroup on Set.
* cgroup/systemd/v1: avoid unnecessary freeze on Set.
- fix issues with runc under openSUSE MicroOS's SELinux policy. bsc#1187704

Update to runc v1.0.0. Upstream changelog is available from

https://github.com/opencontainers/runc/releases/tag/v1.0.0

! The usage of relative paths for mountpoints will now produce a warning
  (such configurations are outside of the spec, and in future runc will
  produce an error when given such configurations).
* cgroupv2: devices: rework the filter generation to produce consistent
  results with cgroupv1, and always clobber any existing eBPF
  program(s) to fix runc update and avoid leaking eBPF programs
  (resulting in errors when managing containers).
* cgroupv2: correctly convert 'number of IOs' statistics in a
  cgroupv1-compatible way.
* cgroupv2: support larger than 32-bit IO statistics on 32-bit architectures.
* cgroupv2: wait for freeze to finish before returning from the freezing
  code, optimize the method for checking whether a cgroup is frozen.
* cgroups/systemd: fixed 'retry on dbus disconnect' logic introduced in rc94
* cgroups/systemd: fixed returning 'unit already exists' error from a systemd
  cgroup manager (regression in rc94)
+ cgroupv2: support SkipDevices with systemd driver
+ cgroup/systemd: return, not ignore, stop unit error from Destroy
+ Make 'runc --version' output sane even when built with go get or
  otherwise outside of our build scripts.
+ cgroups: set SkipDevices during runc update (so we don't modify
  cgroups at all during runc update).
+ cgroup1: blkio: support BFQ weights.
+ cgroupv2: set per-device io weights if BFQ IO scheduler is available.

Update to runc v1.0.0~rc95. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc95

This release of runc contains a fix for CVE-2021-30465, and users are
strongly recommended to update (especially if you are providing
semi-limited access to spawn containers to untrusted users). (bsc#1185405)

Update to runc v1.0.0~rc94. Upstream changelog is available from https://github.com/opencontainers/runc/releases/tag/v1.0.0-rc94

Breaking Changes:
* cgroupv1: kernel memory limits are now always ignored, as kmemcg has
  been effectively deprecated by the kernel. Users should make use of regular
  memory cgroup controls.

Regression Fixes:

* seccomp: fix 32-bit compilation errors
* runc init: fix a hang caused by deadlock in seccomp/ebpf loading code
* runc start: fix 'chdir to cwd: permission denied' for some setups
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-25"/>
	<updated date="2021-10-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185405">SUSE bug 1185405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187704">SUSE bug 1187704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188282">SUSE bug 1188282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190826">SUSE bug 1190826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191015">SUSE bug 1191015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191121">SUSE bug 1191121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191334">SUSE bug 1191334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191355">SUSE bug 1191355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191434">SUSE bug 1191434</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30465/">CVE-2021-30465</cve>
	<cve impact="moderate" cvss3="3/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32760/">CVE-2021-32760</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41089/">CVE-2021-41089</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41091/">CVE-2021-41091</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41092/">CVE-2021-41092</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-41103/">CVE-2021-41103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651637" comment="containerd-1.4.11-56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651638" comment="docker-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651639" comment="docker-bash-completion-20.10.9_ce-156.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651640" comment="runc-1.0.2-23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110356" version="1" class="patch">
	<metadata>
		<title>Security update for runc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193436" ref_url="https://bugzilla.suse.com/1193436" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43784" ref_url="https://www.suse.com/security/cve/CVE-2021-43784/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009939.html" source="SUSE-SU"/>
		<description>
This update for runc fixes the following issues:

Update to runc v1.0.3. 
    
* CVE-2021-43784: Fixed a potential vulnerability related to the internal usage
  of netlink, which is believed to not be exploitable with any released versions of runc (bsc#1193436)
* Fixed inability to start a container with read-write bind mount of a read-only fuse host mount.
* Fixed inability to start when read-only /dev in set in spec.
* Fixed not removing sub-cgroups upon container delete, when rootless cgroup
  v2 is used with older systemd.
* Fixed returning error from GetStats when hugetlb is unsupported (which
  causes excessive logging for kubernetes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193436">SUSE bug 1193436</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43784/">CVE-2021-43784</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659247" comment="runc-1.0.3-27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110357" version="1" class="patch">
	<metadata>
		<title>Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Containers 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1176708" ref_url="https://bugzilla.suse.com/1176708" source="BUGZILLA"/>
		<reference ref_id="1178801" ref_url="https://bugzilla.suse.com/1178801" source="BUGZILLA"/>
		<reference ref_id="1178969" ref_url="https://bugzilla.suse.com/1178969" source="BUGZILLA"/>
		<reference ref_id="1180243" ref_url="https://bugzilla.suse.com/1180243" source="BUGZILLA"/>
		<reference ref_id="1180401" ref_url="https://bugzilla.suse.com/1180401" source="BUGZILLA"/>
		<reference ref_id="1181730" ref_url="https://bugzilla.suse.com/1181730" source="BUGZILLA"/>
		<reference ref_id="1181732" ref_url="https://bugzilla.suse.com/1181732" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15257" ref_url="https://www.suse.com/security/cve/CVE-2020-15257/" source="CVE"/>
		<reference ref_id="CVE-2021-21284" ref_url="https://www.suse.com/security/cve/CVE-2021-21284/" source="CVE"/>
		<reference ref_id="CVE-2021-21285" ref_url="https://www.suse.com/security/cve/CVE-2021-21285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008311.html" source="SUSE-SU"/>
		<description>
This update for containerd, docker, docker-runc, golang-github-docker-libnetwork fixes the following issues:

Security issues fixed:

- CVE-2020-15257: Fixed a privilege escalation in containerd (bsc#1178969).
- CVE-2021-21284: potential privilege escalation when the root user in the remapped namespace has access to the host filesystem (bsc#1181732)
- CVE-2021-21285: pulling a malformed Docker image manifest crashes the dockerd daemon (bsc#1181730)

Non-security issues fixed:

- Update Docker to 19.03.15-ce. See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md. This update includes fixes for
  bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285).

- Only apply the boo#1178801 libnetwork patch to handle firewalld on openSUSE.
  It appears that SLES doesn't like the patch. (bsc#1180401)

- Update to containerd v1.3.9, which is needed for Docker v19.03.14-ce and
  fixes CVE-2020-15257. bsc#1180243

- Update to containerd v1.3.7, which is required for Docker 19.03.13-ce.
  bsc#1176708

- Update to Docker 19.03.14-ce. See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243
  https://github.com/docker/docker-ce/releases/tag/v19.03.14

- Enable fish-completion

- Add a patch which makes Docker compatible with firewalld with
  nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548
  (bsc#1178801, SLE-16460)

- Update to Docker 19.03.13-ce. See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

- Emergency fix: %requires_eq does not work with provide symbols,
  only effective package names. Convert back to regular Requires.

- Update to Docker 19.03.12-ce. See upstream changelog in the packaged
  /usr/share/doc/packages/docker/CHANGELOG.md.
- Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of
  spurrious errors due to Go returning -EINTR from I/O syscalls much more often
  (due to Go 1.14's pre-emptive goroutine support).
- Add BuildRequires for all -git dependencies so that we catch missing
  dependencies much more quickly.

- Update to libnetwork 55e924b8a842, which is required for Docker 19.03.14-ce.
  bsc#1180243

- Add patch which makes libnetwork compatible with firewalld with
  nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548
  (bsc#1178801, SLE-16460)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176708">SUSE bug 1176708</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178801">SUSE bug 1178801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178969">SUSE bug 1178969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180243">SUSE bug 1180243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180401">SUSE bug 1180401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181730">SUSE bug 1181730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181732">SUSE bug 1181732</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15257/">CVE-2020-15257</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21284/">CVE-2021-21284</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21285/">CVE-2021-21285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-containers:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287070" comment="SUSE Linux Enterprise Module for Containers 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494427" comment="containerd-1.3.9-5.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494428" comment="docker-19.03.15_ce-6.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494429" comment="docker-bash-completion-19.03.15_ce-6.43.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494430" comment="docker-libnetwork-0.7.0.1+gitr2908_55e924b8a842-4.28.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494431" comment="docker-runc-1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110358" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166066" ref_url="https://bugzilla.suse.com/1166066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1297-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007106.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2020-0034: Fixed an out-of-bounds read on truncated key frames (bsc#1166066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495157" comment="libvpx-devel-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110359" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1092115" ref_url="https://bugzilla.suse.com/1092115" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-9154" ref_url="https://www.suse.com/security/cve/CVE-2018-9154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1420-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007133.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2018-9154: Fixed a potential denial of service in jpc_dec_process_sot() (bsc#1092115).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1092115">SUSE bug 1092115</bugzilla>
	<cve impact="low" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9154/">CVE-2018-9154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495170" comment="libjasper-devel-2.0.14-3.11.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110360" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172225" ref_url="https://bugzilla.suse.com/1172225" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20807" ref_url="https://www.suse.com/security/cve/CVE-2019-20807/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006896.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2019-20807: Fixed an issue where escaping from the restrictive mode of vim 
  was possible using interfaces (bsc#1172225). 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172225">SUSE bug 1172225</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-20807/">CVE-2019-20807</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495171" comment="gvim-8.0.1568-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110361" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<description>
This update for libexif to 0.6.22 fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495172" comment="libexif-devel-0.6.22-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495173" comment="libexif12-0.6.22-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110362" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006900.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- MozillaFirefox was updated to version 68.9.0 Extended Support Release (bsc#1172402).

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService. 
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety bugs.	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-08"/>
	<updated date="2020-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495174" comment="MozillaFirefox-68.9.0-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495175" comment="MozillaFirefox-devel-68.9.0-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495176" comment="MozillaFirefox-translations-common-68.9.0-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495177" comment="MozillaFirefox-translations-other-68.9.0-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110363" version="1" class="patch">
	<metadata>
		<title>Security update for texlive-filesystem (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1158910" ref_url="https://bugzilla.suse.com/1158910" source="BUGZILLA"/>
		<reference ref_id="1159740" ref_url="https://bugzilla.suse.com/1159740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8016" ref_url="https://www.suse.com/security/cve/CVE-2020-8016/" source="CVE"/>
		<reference ref_id="CVE-2020-8017" ref_url="https://www.suse.com/security/cve/CVE-2020-8017/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1580-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007107.html" source="SUSE-SU"/>
		<description>
This update for texlive-filesystem fixes the following issues:

Security issues fixed:

- CVE-2020-8016: Fixed a race condition in the spec file (bsc#1159740).
- CVE-2020-8017: Fixed a race condition on a cron job (bsc#1158910).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1158910">SUSE bug 1158910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159740">SUSE bug 1159740</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8016/">CVE-2020-8016</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8017/">CVE-2020-8017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495210" comment="texlive-collection-basic-2017.135.svn41616-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495211" comment="texlive-collection-bibtexextra-2017.135.svn44385-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495212" comment="texlive-collection-binextra-2017.135.svn44515-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495213" comment="texlive-collection-context-2017.135.svn42330-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495214" comment="texlive-collection-fontsextra-2017.135.svn43356-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495215" comment="texlive-collection-fontsrecommended-2017.135.svn35830-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495216" comment="texlive-collection-fontutils-2017.135.svn37105-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495217" comment="texlive-collection-formatsextra-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495218" comment="texlive-collection-games-2017.135.svn42992-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495219" comment="texlive-collection-humanities-2017.135.svn42268-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495220" comment="texlive-collection-langarabic-2017.135.svn44496-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495221" comment="texlive-collection-langchinese-2017.135.svn42675-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495222" comment="texlive-collection-langcjk-2017.135.svn43009-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495223" comment="texlive-collection-langcyrillic-2017.135.svn44401-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495224" comment="texlive-collection-langczechslovak-2017.135.svn32550-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495225" comment="texlive-collection-langenglish-2017.135.svn43650-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495226" comment="texlive-collection-langeuropean-2017.135.svn44414-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495227" comment="texlive-collection-langfrench-2017.135.svn40375-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495228" comment="texlive-collection-langgerman-2017.135.svn42045-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495229" comment="texlive-collection-langgreek-2017.135.svn44192-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495230" comment="texlive-collection-langitalian-2017.135.svn30372-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495231" comment="texlive-collection-langjapanese-2017.135.svn44554-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495232" comment="texlive-collection-langkorean-2017.135.svn42106-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495233" comment="texlive-collection-langother-2017.135.svn44414-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495234" comment="texlive-collection-langpolish-2017.135.svn44371-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495235" comment="texlive-collection-langportuguese-2017.135.svn30962-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495236" comment="texlive-collection-langspanish-2017.135.svn40587-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495237" comment="texlive-collection-latex-2017.135.svn41614-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495238" comment="texlive-collection-latexextra-2017.135.svn44544-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495239" comment="texlive-collection-latexrecommended-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495240" comment="texlive-collection-luatex-2017.135.svn44500-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495241" comment="texlive-collection-mathscience-2017.135.svn44396-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495242" comment="texlive-collection-metapost-2017.135.svn44297-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495243" comment="texlive-collection-music-2017.135.svn40561-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495244" comment="texlive-collection-pictures-2017.135.svn44395-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495245" comment="texlive-collection-plaingeneric-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495246" comment="texlive-collection-pstricks-2017.135.svn44460-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495247" comment="texlive-collection-publishers-2017.135.svn44485-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495248" comment="texlive-collection-xetex-2017.135.svn43059-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495261" comment="texlive-devel-2017.135-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495281" comment="texlive-extratools-2017.135-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495283" comment="texlive-filesystem-2017.135-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495370" comment="texlive-scheme-basic-2017.135.svn25923-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495371" comment="texlive-scheme-context-2017.135.svn35799-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495372" comment="texlive-scheme-full-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495373" comment="texlive-scheme-gust-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495374" comment="texlive-scheme-infraonly-2017.135.svn41515-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495375" comment="texlive-scheme-medium-2017.135.svn44177-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495376" comment="texlive-scheme-minimal-2017.135.svn13822-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495377" comment="texlive-scheme-small-2017.135.svn41825-9.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495378" comment="texlive-scheme-tetex-2017.135.svn44187-9.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110364" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494989" comment="libjpeg8-32bit-8.1.2-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110365" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166238" ref_url="https://bugzilla.suse.com/1166238" source="BUGZILLA"/>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="1173613" ref_url="https://bugzilla.suse.com/1173613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="CVE-2020-12415" ref_url="https://www.suse.com/security/cve/CVE-2020-12415/" source="CVE"/>
		<reference ref_id="CVE-2020-12416" ref_url="https://www.suse.com/security/cve/CVE-2020-12416/" source="CVE"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="CVE-2020-12422" ref_url="https://www.suse.com/security/cve/CVE-2020-12422/" source="CVE"/>
		<reference ref_id="CVE-2020-12423" ref_url="https://www.suse.com/security/cve/CVE-2020-12423/" source="CVE"/>
		<reference ref_id="CVE-2020-12424" ref_url="https://www.suse.com/security/cve/CVE-2020-12424/" source="CVE"/>
		<reference ref_id="CVE-2020-12425" ref_url="https://www.suse.com/security/cve/CVE-2020-12425/" source="CVE"/>
		<reference ref_id="CVE-2020-12426" ref_url="https://www.suse.com/security/cve/CVE-2020-12426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007123.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox to version 78.0.1 ESR fixes the following issues:

Security issues fixed:

- CVE-2020-12415: AppCache manifest poisoning due to url encoded character processing (bsc#1173576).
- CVE-2020-12416: Use-after-free in WebRTC VideoBroadcaster (bsc#1173576).
- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12402: RSA Key Generation vulnerable to side-channel attack (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
- CVE-2020-12422: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (bsc#1173576).
- CVE-2020-12423: DLL Hijacking due to searching %PATH% for a library (bsc#1173576).
- CVE-2020-12424: WebRTC permission prompt could have been bypassed by a compromised content process (bsc#1173576).
- CVE-2020-12425: Out of bound read in Date.parse() (bsc#1173576).
- CVE-2020-12426: Memory safety bugs fixed in Firefox 78 (bsc#1173576).
- FIPS: MozillaFirefox: allow /proc/sys/crypto/fips_enabled (bsc#1167231).

Non-security issues fixed:

- Fixed interaction with freetype6 (bsc#1173613).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166238">SUSE bug 1166238</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173613">SUSE bug 1173613</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12415/">CVE-2020-12415</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12416/">CVE-2020-12416</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12422/">CVE-2020-12422</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12423/">CVE-2020-12423</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12424/">CVE-2020-12424</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12425/">CVE-2020-12425</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12426/">CVE-2020-12426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495426" comment="MozillaFirefox-78.0.1-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495427" comment="MozillaFirefox-branding-SLE-78-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495428" comment="MozillaFirefox-devel-78.0.1-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495429" comment="MozillaFirefox-translations-common-78.0.1-3.94.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495430" comment="MozillaFirefox-translations-other-78.0.1-3.94.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110366" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173466" ref_url="https://bugzilla.suse.com/1173466" source="BUGZILLA"/>
		<reference ref_id="1173467" ref_url="https://bugzilla.suse.com/1173467" source="BUGZILLA"/>
		<reference ref_id="1173469" ref_url="https://bugzilla.suse.com/1173469" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15304" ref_url="https://www.suse.com/security/cve/CVE-2020-15304/" source="CVE"/>
		<reference ref_id="CVE-2020-15305" ref_url="https://www.suse.com/security/cve/CVE-2020-15305/" source="CVE"/>
		<reference ref_id="CVE-2020-15306" ref_url="https://www.suse.com/security/cve/CVE-2020-15306/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1931-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007137.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2020-15304: Fixed a NULL pointer dereference in TiledInputFile:TiledInputFile() (bsc#1173466).
- CVE-2020-15305: Fixed a use-after-free in DeepScanLineInputFile:DeepScanLineInputFile() (bsc#1173467).
- CVE-2020-15306: Fixed a heap buffer overflow in getChunkOffsetTableSize() (bsc#1173469).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173466">SUSE bug 1173466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173467">SUSE bug 1173467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173469">SUSE bug 1173469</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15304/">CVE-2020-15304</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15305/">CVE-2020-15305</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-15306/">CVE-2020-15306</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495431" comment="libIlmImf-2_2-23-2.2.1-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495432" comment="libIlmImfUtil-2_2-23-2.2.1-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495433" comment="openexr-devel-2.2.1-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110367" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173948" ref_url="https://bugzilla.suse.com/1173948" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007153.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Mozilla Firefox 78.0.2
  MFSA 2020-28 (bsc#1173948)
  * MFSA-2020-0003 (bmo#1644076)
    X-Frame-Options bypass using object or embed tags
- Firefox Extended Support Release 78.0.2esr ESR
  * Fixed: Security fix
  * Fixed: Fixed an accessibility regression in reader mode
    (bmo#1650922)
  * Fixed: Made the address bar more resilient to data corruption
    in the user profile (bmo#1649981)
  * Fixed: Fixed a regression opening certain external
    applications (bmo#1650162)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-20"/>
	<updated date="2020-07-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173948">SUSE bug 1173948</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495435" comment="MozillaFirefox-78.0.2-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495436" comment="MozillaFirefox-devel-78.0.2-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495437" comment="MozillaFirefox-translations-common-78.0.2-3.97.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495438" comment="MozillaFirefox-translations-other-78.0.2-3.97.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110368" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173998" ref_url="https://bugzilla.suse.com/1173998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9806" ref_url="https://www.suse.com/security/cve/CVE-2020-9806/" source="CVE"/>
		<reference ref_id="CVE-2020-9807" ref_url="https://www.suse.com/security/cve/CVE-2020-9807/" source="CVE"/>
		<reference ref_id="CVE-2020-9843" ref_url="https://www.suse.com/security/cve/CVE-2020-9843/" source="CVE"/>
		<reference ref_id="CVE-2020-9850" ref_url="https://www.suse.com/security/cve/CVE-2020-9850/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007168.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.3 (bsc#1173998):
  + Enable kinetic scrolling with async scrolling.
  + Fix web process hangs on large GitHub pages.
  + Bubblewrap sandbox should not attempt to bind empty paths.
  + Fix threading issues in the media player.
  + Fix several crashes and rendering issues.
  + Security fixes:  CVE-2020-9802, CVE-2020-9803, CVE-2020-9805,
    CVE-2020-9806, CVE-2020-9807, CVE-2020-9843, CVE-2020-9850,
    CVE-2020-13753.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173998">SUSE bug 1173998</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9806/">CVE-2020-9806</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9807/">CVE-2020-9807</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9843/">CVE-2020-9843</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9850/">CVE-2020-9850</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495635" comment="typelib-1_0-JavaScriptCore-4_0-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495636" comment="typelib-1_0-WebKit2-4_0-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495637" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495638" comment="webkit2gtk3-devel-2.28.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110369" version="1" class="patch">
	<metadata>
		<title>Security update for libX11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174628" ref_url="https://bugzilla.suse.com/1174628" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14344" ref_url="https://www.suse.com/security/cve/CVE-2020-14344/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007217.html" source="SUSE-SU"/>
		<description>
This update for libX11 fixes the following issues:

- Fixed XIM client heap overflows (CVE-2020-14344, bsc#1174628)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-04"/>
	<updated date="2020-08-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174628">SUSE bug 1174628</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14344/">CVE-2020-14344</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495445" comment="libxcb-render0-32bit-1.13-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495446" comment="libxcb-shm0-32bit-1.13-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110370" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169063" ref_url="https://bugzilla.suse.com/1169063" source="BUGZILLA"/>
		<reference ref_id="1171899" ref_url="https://bugzilla.suse.com/1171899" source="BUGZILLA"/>
		<reference ref_id="1173606" ref_url="https://bugzilla.suse.com/1173606" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11647" ref_url="https://www.suse.com/security/cve/CVE-2020-11647/" source="CVE"/>
		<reference ref_id="CVE-2020-13164" ref_url="https://www.suse.com/security/cve/CVE-2020-13164/" source="CVE"/>
		<reference ref_id="CVE-2020-15466" ref_url="https://www.suse.com/security/cve/CVE-2020-15466/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007228.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Wireshark to 3.2.5:
  * CVE-2020-15466: GVCP dissector infinite loop (bsc#1173606)
  * CVE-2020-13164: NFS dissector crash (bsc#1171899)
  * CVE-2020-11647: The BACapp dissector could crash (bsc#1169063)
- Further features, bug fixes and updated protocol support as listed in:
  https://www.wireshark.org/docs/relnotes/wireshark-3.2.5.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169063">SUSE bug 1169063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171899">SUSE bug 1171899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173606">SUSE bug 1173606</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11647/">CVE-2020-11647</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13164/">CVE-2020-13164</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15466/">CVE-2020-15466</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495451" comment="wireshark-devel-3.2.5-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495452" comment="wireshark-ui-qt-3.2.5-3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110371" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171433" ref_url="https://bugzilla.suse.com/1171433" source="BUGZILLA"/>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15653" ref_url="https://www.suse.com/security/cve/CVE-2020-15653/" source="CVE"/>
		<reference ref_id="CVE-2020-15654" ref_url="https://www.suse.com/security/cve/CVE-2020-15654/" source="CVE"/>
		<reference ref_id="CVE-2020-15655" ref_url="https://www.suse.com/security/cve/CVE-2020-15655/" source="CVE"/>
		<reference ref_id="CVE-2020-15656" ref_url="https://www.suse.com/security/cve/CVE-2020-15656/" source="CVE"/>
		<reference ref_id="CVE-2020-15657" ref_url="https://www.suse.com/security/cve/CVE-2020-15657/" source="CVE"/>
		<reference ref_id="CVE-2020-15658" ref_url="https://www.suse.com/security/cve/CVE-2020-15658/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007233.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update for MozillaFirefox and pipewire fixes the following issues:

MozillaFirefox Extended Support Release 78.1.0 ESR

* Fixed: Various stability, functionality, and security fixes (bsc#1174538)
* CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker
* CVE-2020-6514: WebRTC data channel leaks internal address to peer
* CVE-2020-15655: Extension APIs could be used to bypass Same-Origin Policy
* CVE-2020-15653: Bypassing iframe sandbox when allowing popups
* CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture
* CVE-2020-15656: Type confusion for special arguments in IonMonkey
* CVE-2020-15658: Overriding file type when saving to disk
* CVE-2020-15657: DLL hijacking due to incorrect loading path
* CVE-2020-15654: Custom cursor can overlay user interface
* CVE-2020-15659: Memory safety bugs fixed in Firefox 79 and Firefox ESR 78.1

pipewire was updated to version 0.3.6 (bsc#1171433, jsc#ECO-2308):

* Extensive memory leak fixing and stress testing was done.
  A big leak in screen sharing with DMA-BUF was fixed.
* Compile fixes
* Stability improvements in jack and pulseaudio layers.
* Added the old portal module to make the Camera portal
  work again. This will be moved to the session manager in
  future versions.
* Improvements to the GStreamer source and sink shutdown.
* Fix compatibility with v2 clients again when negotiating
  buffers.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171433">SUSE bug 1171433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15653/">CVE-2020-15653</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15654/">CVE-2020-15654</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15655/">CVE-2020-15655</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15656/">CVE-2020-15656</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15657/">CVE-2020-15657</cve>
	<cve impact="important" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15658/">CVE-2020-15658</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495639" comment="MozillaFirefox-78.1.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495640" comment="MozillaFirefox-branding-SLE-78-9.2.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495641" comment="MozillaFirefox-devel-78.1.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495642" comment="MozillaFirefox-translations-common-78.1.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495643" comment="MozillaFirefox-translations-other-78.1.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495644" comment="libpipewire-0_3-0-0.3.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495645" comment="pipewire-0.3.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495646" comment="pipewire-modules-0.3.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495647" comment="pipewire-spa-plugins-0_2-0.3.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495648" comment="pipewire-spa-tools-0.3.6-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495649" comment="pipewire-tools-0.3.6-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110372" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174662" ref_url="https://bugzilla.suse.com/1174662" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-9862" ref_url="https://www.suse.com/security/cve/CVE-2020-9862/" source="CVE"/>
		<reference ref_id="CVE-2020-9893" ref_url="https://www.suse.com/security/cve/CVE-2020-9893/" source="CVE"/>
		<reference ref_id="CVE-2020-9894" ref_url="https://www.suse.com/security/cve/CVE-2020-9894/" source="CVE"/>
		<reference ref_id="CVE-2020-9895" ref_url="https://www.suse.com/security/cve/CVE-2020-9895/" source="CVE"/>
		<reference ref_id="CVE-2020-9915" ref_url="https://www.suse.com/security/cve/CVE-2020-9915/" source="CVE"/>
		<reference ref_id="CVE-2020-9925" ref_url="https://www.suse.com/security/cve/CVE-2020-9925/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007250.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.28.4 (bsc#1174662):
  + Fix several crashes and rendering issues.
  + Security fixes: CVE-2020-9862, CVE-2020-9893, CVE-2020-9894,
    CVE-2020-9895, CVE-2020-9915, CVE-2020-9925.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-11"/>
	<updated date="2020-08-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174662">SUSE bug 1174662</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9862/">CVE-2020-9862</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9893/">CVE-2020-9893</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-9894/">CVE-2020-9894</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9895/">CVE-2020-9895</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9915/">CVE-2020-9915</cve>
	<cve impact="moderate" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-9925/">CVE-2020-9925</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495650" comment="typelib-1_0-JavaScriptCore-4_0-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495651" comment="typelib-1_0-WebKit2-4_0-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495652" comment="typelib-1_0-WebKit2WebExtension-4_0-2.28.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495653" comment="webkit2gtk3-devel-2.28.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110373" version="1" class="patch">
	<metadata>
		<title>Security update for fwupd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007270.html" source="SUSE-SU"/>
		<description>

This update of fwupd fixes the following issue:

- rebuild with new UEFI signing key (bsc#1174543)
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495654" comment="fwupd-1.2.11-5.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495655" comment="fwupd-devel-1.2.11-5.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495656" comment="fwupd-lang-1.2.11-5.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495657" comment="libfwupd2-1.2.11-5.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495658" comment="typelib-1_0-Fwupd-2_0-1.2.11-5.2.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110374" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495462" comment="python-tk-2.7.17-7.41.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110375" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172726" ref_url="https://bugzilla.suse.com/1172726" source="BUGZILLA"/>
		<reference ref_id="1173758" ref_url="https://bugzilla.suse.com/1173758" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13962" ref_url="https://www.suse.com/security/cve/CVE-2020-13962/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007309.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- Fixed a possible crash in certificate parsing.
- Fixed a DoS in QSslSocket (bsc#1172726, CVE-2020-13962).
- Added support for PostgreSQL 12 (bsc#1173758).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172726">SUSE bug 1172726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173758">SUSE bug 1173758</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13962/">CVE-2020-13962</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495659" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495660" comment="libQt5Sql5-mysql-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495661" comment="libQt5Sql5-postgresql-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495662" comment="libQt5Sql5-unixODBC-5.12.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495663" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110376" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495467" comment="libjpeg8-32bit-8.1.2-5.15.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110377" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1010979" ref_url="https://bugzilla.suse.com/1010979" source="BUGZILLA"/>
		<reference ref_id="1010980" ref_url="https://bugzilla.suse.com/1010980" source="BUGZILLA"/>
		<reference ref_id="1020451" ref_url="https://bugzilla.suse.com/1020451" source="BUGZILLA"/>
		<reference ref_id="1020456" ref_url="https://bugzilla.suse.com/1020456" source="BUGZILLA"/>
		<reference ref_id="1020458" ref_url="https://bugzilla.suse.com/1020458" source="BUGZILLA"/>
		<reference ref_id="1020460" ref_url="https://bugzilla.suse.com/1020460" source="BUGZILLA"/>
		<reference ref_id="1045450" ref_url="https://bugzilla.suse.com/1045450" source="BUGZILLA"/>
		<reference ref_id="1057152" ref_url="https://bugzilla.suse.com/1057152" source="BUGZILLA"/>
		<reference ref_id="1088278" ref_url="https://bugzilla.suse.com/1088278" source="BUGZILLA"/>
		<reference ref_id="1114498" ref_url="https://bugzilla.suse.com/1114498" source="BUGZILLA"/>
		<reference ref_id="1115637" ref_url="https://bugzilla.suse.com/1115637" source="BUGZILLA"/>
		<reference ref_id="1117328" ref_url="https://bugzilla.suse.com/1117328" source="BUGZILLA"/>
		<reference ref_id="1120805" ref_url="https://bugzilla.suse.com/1120805" source="BUGZILLA"/>
		<reference ref_id="1120807" ref_url="https://bugzilla.suse.com/1120807" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-9398" ref_url="https://www.suse.com/security/cve/CVE-2016-9398/" source="CVE"/>
		<reference ref_id="CVE-2016-9399" ref_url="https://www.suse.com/security/cve/CVE-2016-9399/" source="CVE"/>
		<reference ref_id="CVE-2017-14132" ref_url="https://www.suse.com/security/cve/CVE-2017-14132/" source="CVE"/>
		<reference ref_id="CVE-2017-5499" ref_url="https://www.suse.com/security/cve/CVE-2017-5499/" source="CVE"/>
		<reference ref_id="CVE-2017-5503" ref_url="https://www.suse.com/security/cve/CVE-2017-5503/" source="CVE"/>
		<reference ref_id="CVE-2017-5504" ref_url="https://www.suse.com/security/cve/CVE-2017-5504/" source="CVE"/>
		<reference ref_id="CVE-2017-5505" ref_url="https://www.suse.com/security/cve/CVE-2017-5505/" source="CVE"/>
		<reference ref_id="CVE-2017-9782" ref_url="https://www.suse.com/security/cve/CVE-2017-9782/" source="CVE"/>
		<reference ref_id="CVE-2018-18873" ref_url="https://www.suse.com/security/cve/CVE-2018-18873/" source="CVE"/>
		<reference ref_id="CVE-2018-19139" ref_url="https://www.suse.com/security/cve/CVE-2018-19139/" source="CVE"/>
		<reference ref_id="CVE-2018-19543" ref_url="https://www.suse.com/security/cve/CVE-2018-19543/" source="CVE"/>
		<reference ref_id="CVE-2018-20570" ref_url="https://www.suse.com/security/cve/CVE-2018-20570/" source="CVE"/>
		<reference ref_id="CVE-2018-20622" ref_url="https://www.suse.com/security/cve/CVE-2018-20622/" source="CVE"/>
		<reference ref_id="CVE-2018-9252" ref_url="https://www.suse.com/security/cve/CVE-2018-9252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007447.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2016-9398: Improved patch for already fixed issue (bsc#1010979).
- CVE-2016-9399: Fix assert in calcstepsizes (bsc#1010980).
- CVE-2017-5499: Validate component depth bit (bsc#1020451).
- CVE-2017-5503: Check bounds in jas_seq2d_bindsub() (bsc#1020456).
- CVE-2017-5504: Check bounds in jas_seq2d_bindsub() (bsc#1020458).
- CVE-2017-5505: Check bounds in jas_seq2d_bindsub() (bsc#1020460).
- CVE-2017-14132: Fix heap base overflow in by checking components (bsc#1057152).
- CVE-2018-9252: Fix reachable assertion in jpc_abstorelstepsize (bsc#1088278).
- CVE-2018-18873: Fix null pointer deref in ras_putdatastd (bsc#1114498).
- CVE-2018-19139: Fix mem leaks by registering jpc_unk_destroyparms (bsc#1115637).
- CVE-2018-19543, bsc#1045450 CVE-2017-9782: Fix numchans mixup (bsc#1117328).
- CVE-2018-20570: Fix heap based buffer over-read in jp2_encode (bsc#1120807).
- CVE-2018-20622: Fix memory leak in jas_malloc.c (bsc#1120805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1010979">SUSE bug 1010979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1010980">SUSE bug 1010980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020451">SUSE bug 1020451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020456">SUSE bug 1020456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020458">SUSE bug 1020458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1020460">SUSE bug 1020460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1045450">SUSE bug 1045450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1057152">SUSE bug 1057152</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1088278">SUSE bug 1088278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114498">SUSE bug 1114498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115637">SUSE bug 1115637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117328">SUSE bug 1117328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120805">SUSE bug 1120805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120807">SUSE bug 1120807</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9398/">CVE-2016-9398</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-9399/">CVE-2016-9399</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-14132/">CVE-2017-14132</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5499/">CVE-2017-5499</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5503/">CVE-2017-5503</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5504/">CVE-2017-5504</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2017-5505/">CVE-2017-5505</cve>
	<cve impact="low" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-9782/">CVE-2017-9782</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18873/">CVE-2018-18873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19139/">CVE-2018-19139</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19543/">CVE-2018-19543</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20570/">CVE-2018-20570</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20622/">CVE-2018-20622</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-9252/">CVE-2018-9252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495468" comment="libjasper-devel-2.0.14-3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110378" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172515" ref_url="https://bugzilla.suse.com/1172515" source="BUGZILLA"/>
		<reference ref_id="1176315" ref_url="https://bugzilla.suse.com/1176315" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17507" ref_url="https://www.suse.com/security/cve/CVE-2020-17507/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2742-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007479.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2020-17507: Fixed a buffer overflow in XBM parser (bsc#1176315)
- Fixed various issues discovered by fuzzing:
- Made handling of XDG_RUNTIME_DIR more secure (bsc#1172515):
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172515">SUSE bug 1172515</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176315">SUSE bug 1176315</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17507/">CVE-2020-17507</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495664" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495665" comment="libQt5Sql5-mysql-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495666" comment="libQt5Sql5-postgresql-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495667" comment="libQt5Sql5-unixODBC-5.12.7-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495668" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110379" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1146608" ref_url="https://bugzilla.suse.com/1146608" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2019-14973: Fixed an improper check which was depended on the compiler
  which could have led to integer overflow (bsc#1146608).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495474" comment="libtiff5-32bit-4.0.9-5.30.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110380" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1167976" ref_url="https://bugzilla.suse.com/1167976" source="BUGZILLA"/>
		<reference ref_id="1173986" ref_url="https://bugzilla.suse.com/1173986" source="BUGZILLA"/>
		<reference ref_id="1173991" ref_url="https://bugzilla.suse.com/1173991" source="BUGZILLA"/>
		<reference ref_id="1174284" ref_url="https://bugzilla.suse.com/1174284" source="BUGZILLA"/>
		<reference ref_id="1174420" ref_url="https://bugzilla.suse.com/1174420" source="BUGZILLA"/>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15670" ref_url="https://www.suse.com/security/cve/CVE-2020-15670/" source="CVE"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007483.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.3.0 ESR (bsc#1176756, MFSA 2020-43)
   - CVE-2020-15677: Download origin spoofing via redirect
   - CVE-2020-15676: Fixed an XSS when pasting attacker-controlled data into a
     contenteditable element 
   - CVE-2020-15678: When recursing through layers while scrolling, an iterator
     may have become invalid, resulting in a potential use-after-free scenario
   - CVE-2020-15673: Fixed memory safety bugs 
- Enhance fix for wayland-detection (bsc#1174420)
- Attempt to fix langpack-parallelization by introducing separate
  obj-dirs for each lang (bsc#1173986, bsc#1167976)

- Firefox was updated to 78.2.0 ESR (bsc#1175686, MFSA 2020-38)
   - CVE-2020-15663: Downgrade attack on the Mozilla Maintenance Service could
     have resulted in escalation of privilege
   - CVE-2020-15664: Attacker-induced prompt for extension installation
   - CVE-2020-15670: Fixed  memory safety bugs fixed in Firefox 80 and Firefox ESR 78.2

- Fixed Firefox tab crash in FIPS mode (bsc#1174284).
- Fixed broken translation-loading (bsc#1173991) 
  - allow addon sideloading
  - mark signatures for langpacks non-mandatory
  - do not autodisable user profile scopes
- Google API key is not usable for geolocation service any more
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167976">SUSE bug 1167976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173986">SUSE bug 1173986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173991">SUSE bug 1173991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174284">SUSE bug 1174284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174420">SUSE bug 1174420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15670/">CVE-2020-15670</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495669" comment="MozillaFirefox-78.3.0-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495670" comment="MozillaFirefox-devel-78.3.0-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495671" comment="MozillaFirefox-translations-common-78.3.0-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495672" comment="MozillaFirefox-translations-other-78.3.0-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110381" version="1" class="patch">
	<metadata>
		<title>Security update for tigervnc (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176733" ref_url="https://bugzilla.suse.com/1176733" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26117" ref_url="https://www.suse.com/security/cve/CVE-2020-26117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007537.html" source="SUSE-SU"/>
		<description>
This update for tigervnc fixes the following issues:

- CVE-2020-26117: Server certificates were stored as certiticate
  authorities, allowing malicious owners of these certificates
  to impersonate any server after a client had added an exception
  (bsc#1176733)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-09"/>
	<updated date="2020-10-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176733">SUSE bug 1176733</bugzilla>
	<cve impact="critical" cvss3="9.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26117/">CVE-2020-26117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495479" comment="libXvnc-devel-1.9.0-19.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110382" version="1" class="patch">
	<metadata>
		<title>Security update for freetype2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177914" ref_url="https://bugzilla.suse.com/1177914" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007607.html" source="SUSE-SU"/>
		<description>
This update for freetype2 fixes the following issues:

- CVE-2020-15999: fixed a heap buffer overflow found in the handling of embedded PNG bitmaps (bsc#1177914).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-22"/>
	<updated date="2020-10-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177914">SUSE bug 1177914</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495673" comment="ftdump-2.10.1-4.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110383" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1177872" ref_url="https://bugzilla.suse.com/1177872" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007619.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.0 ESR
  * Fixed: Various stability, functionality, and security fixes MFSA 2020-46 (bsc#1177872, bsc#1176756)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4
  * Fixed: Fixed legacy preferences not being properly applied when set via GPO
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-23"/>
	<updated date="2020-10-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177872">SUSE bug 1177872</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495674" comment="MozillaFirefox-78.4.0-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495675" comment="MozillaFirefox-devel-78.4.0-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495676" comment="MozillaFirefox-translations-common-78.4.0-8.11.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495677" comment="MozillaFirefox-translations-other-78.4.0-8.11.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110384" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="1177895" ref_url="https://bugzilla.suse.com/1177895" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-27153: Fixed crash on disconnect (bsc#1177895).
- CVE-2020-0556: Fixed potential escalation of privilege and denial of service via adjacent access, caused by improper access control (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495678" comment="bluez-devel-5.48-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110385" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

sane-backends was updated to 1.0.31 to further improve hardware enablement for scanner devices (jsc#ECO-2418 jsc#SLE-15561 jsc#SLE-15560)
and also fix various security issues:

- CVE-2020-12861,CVE-2020-12865: Fixed an out of bounds write (bsc#1172524)
- CVE-2020-12862,CVE-2020-12863,CVE-2020-12864,: Fixed an out of bounds read (bsc#1172524)
- CVE-2020-12866,CVE-2020-12867: Fixed a null pointer dereference (bsc#1172524)

The upstream changelogs can be found here:

- https://gitlab.com/sane-project/backends/-/releases/1.0.28
- https://gitlab.com/sane-project/backends/-/releases/1.0.29
- https://gitlab.com/sane-project/backends/-/releases/1.0.30
- https://gitlab.com/sane-project/backends/-/releases/1.0.31
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495484" comment="sane-backends-1.0.31-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495485" comment="sane-backends-autoconfig-1.0.31-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495486" comment="sane-backends-devel-1.0.31-6.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110386" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-02"/>
	<updated date="2020-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495487" comment="python-tk-2.7.17-7.44.4 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110387" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-settings-daemon, gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172760" ref_url="https://bugzilla.suse.com/1172760" source="BUGZILLA"/>
		<reference ref_id="1175155" ref_url="https://bugzilla.suse.com/1175155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007684.html" source="SUSE-SU"/>
		<description>
This update for gnome-settings-daemon, gnome-shell fixes the following issues:

gnome-settings-daemon:

- Add support for recent UCM related changes in ALSA and PulseAudio. (jsc#SLE-16518)
- Don't warn when a default source or sink is missing and the PulseAudio daemon is restarting. (jsc#SLE-16518)
- Don't warn about starting/stopping services which don't exist. (bsc#1172760).

gnome-shell:

- Add support for recent UCM related changes in ALSA and PulseAudio. (jsc#SLE-16518)
- CVE-2020-17489: reset auth prompt on vt switch before fade in in loginDialog (bsc#1175155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172760">SUSE bug 1172760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175155">SUSE bug 1175155</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495679" comment="gnome-settings-daemon-3.34.2+0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495680" comment="gnome-settings-daemon-devel-3.34.2+0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495681" comment="gnome-settings-daemon-lang-3.34.2+0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495682" comment="gnome-shell-3.34.5-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495683" comment="gnome-shell-devel-3.34.5-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495684" comment="gnome-shell-lang-3.34.5-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110388" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1106272" ref_url="https://bugzilla.suse.com/1106272" source="BUGZILLA"/>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007699.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
- Fixed greyish image produced by incorrect colorspace (bsc#1106272).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106272">SUSE bug 1106272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495685" comment="ImageMagick-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495686" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495687" comment="ImageMagick-devel-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495688" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495689" comment="libMagick++-devel-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495690" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495691" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110389" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175204" ref_url="https://bugzilla.suse.com/1175204" source="BUGZILLA"/>
		<reference ref_id="1176908" ref_url="https://bugzilla.suse.com/1176908" source="BUGZILLA"/>
		<reference ref_id="1176909" ref_url="https://bugzilla.suse.com/1176909" source="BUGZILLA"/>
		<reference ref_id="1176910" ref_url="https://bugzilla.suse.com/1176910" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17498" ref_url="https://www.suse.com/security/cve/CVE-2020-17498/" source="CVE"/>
		<reference ref_id="CVE-2020-25862" ref_url="https://www.suse.com/security/cve/CVE-2020-25862/" source="CVE"/>
		<reference ref_id="CVE-2020-25863" ref_url="https://www.suse.com/security/cve/CVE-2020-25863/" source="CVE"/>
		<reference ref_id="CVE-2020-25866" ref_url="https://www.suse.com/security/cve/CVE-2020-25866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007700.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to wireshark 3.2.7:
  * CVE-2020-25863: MIME Multipart dissector crash (bsc#1176908)
  * CVE-2020-25862: TCP dissector crash (bsc#1176909)
  * CVE-2020-25866: BLIP dissector crash (bsc#1176910)
  * CVE-2020-17498: Kafka dissector crash (bsc#1175204)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175204">SUSE bug 1175204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176908">SUSE bug 1176908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176909">SUSE bug 1176909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176910">SUSE bug 1176910</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17498/">CVE-2020-17498</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25862/">CVE-2020-25862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25863/">CVE-2020-25863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25866/">CVE-2020-25866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495497" comment="wireshark-devel-3.2.7-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495498" comment="wireshark-ui-qt-3.2.7-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110390" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1141844" ref_url="https://bugzilla.suse.com/1141844" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13616" ref_url="https://www.suse.com/security/cve/CVE-2019-13616/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007740.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

Security issue fixed:

- CVE-2019-13616: Fixed heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit (bsc#1141844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141844">SUSE bug 1141844</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-13616/">CVE-2019-13616</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495499" comment="libSDL-1_2-0-1.2.15-3.12.73 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495500" comment="libSDL-devel-1.2.15-3.12.73 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110391" version="1" class="patch">
	<metadata>
		<title>Security update for spice-vdagent (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173749" ref_url="https://bugzilla.suse.com/1173749" source="BUGZILLA"/>
		<reference ref_id="1177780" ref_url="https://bugzilla.suse.com/1177780" source="BUGZILLA"/>
		<reference ref_id="1177781" ref_url="https://bugzilla.suse.com/1177781" source="BUGZILLA"/>
		<reference ref_id="1177782" ref_url="https://bugzilla.suse.com/1177782" source="BUGZILLA"/>
		<reference ref_id="1177783" ref_url="https://bugzilla.suse.com/1177783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25650" ref_url="https://www.suse.com/security/cve/CVE-2020-25650/" source="CVE"/>
		<reference ref_id="CVE-2020-25651" ref_url="https://www.suse.com/security/cve/CVE-2020-25651/" source="CVE"/>
		<reference ref_id="CVE-2020-25652" ref_url="https://www.suse.com/security/cve/CVE-2020-25652/" source="CVE"/>
		<reference ref_id="CVE-2020-25653" ref_url="https://www.suse.com/security/cve/CVE-2020-25653/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007742.html" source="SUSE-SU"/>
		<description>
This update for spice-vdagent fixes the following issues:

Security issues fixed:

- CVE-2020-25650: Fixed a memory DoS via arbitrary entries in `active_xfers` hash table (bsc#1177780).
- CVE-2020-25651: Fixed a possible file transfer DoS and information leak via `active_xfers` hash map (bsc#1177781).
- CVE-2020-25652: Fixed a possibility to exhaust file descriptors in `vdagentd` (bsc#1177782).
- CVE-2020-25653: Fixed a race condition when the UNIX domain socket peer PID retrieved via `SO_PEERCRED` (bsc#1177783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173749">SUSE bug 1173749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177780">SUSE bug 1177780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177781">SUSE bug 1177781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177782">SUSE bug 1177782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177783">SUSE bug 1177783</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25650/">CVE-2020-25650</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25651/">CVE-2020-25651</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25652/">CVE-2020-25652</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25653/">CVE-2020-25653</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495692" comment="spice-vdagent-0.19.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110392" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178588" ref_url="https://bugzilla.suse.com/1178588" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007767.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.4.1 ESR
  * Fixed: Security fix
  MFSA 2020-49 (bsc#1178588)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178588">SUSE bug 1178588</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495693" comment="MozillaFirefox-78.4.1-8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495694" comment="MozillaFirefox-devel-78.4.1-8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495695" comment="MozillaFirefox-translations-common-78.4.1-8.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495696" comment="MozillaFirefox-translations-other-78.4.1-8.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110393" version="1" class="patch">
	<metadata>
		<title>Security update for gdm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178150" ref_url="https://bugzilla.suse.com/1178150" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16125" ref_url="https://www.suse.com/security/cve/CVE-2020-16125/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007777.html" source="SUSE-SU"/>
		<description>
This update for gdm fixes the following issues:

- Exit with failure if loading existing users fails (bsc#1178150 CVE-2020-16125).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-16"/>
	<updated date="2020-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178150">SUSE bug 1178150</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16125/">CVE-2020-16125</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495697" comment="gdm-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495698" comment="gdm-devel-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495699" comment="gdm-lang-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495700" comment="gdm-systemd-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495701" comment="gdmflexiserver-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495702" comment="libgdm1-3.34.1-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495703" comment="typelib-1_0-Gdm-1_0-3.34.1-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110394" version="1" class="patch">
	<metadata>
		<title>Security update for raptor (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178593" ref_url="https://bugzilla.suse.com/1178593" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18926" ref_url="https://www.suse.com/security/cve/CVE-2017-18926/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007785.html" source="SUSE-SU"/>
		<description>
This update for raptor fixes the following issues:

- Fixed a heap overflow vulnerability (bsc#1178593, CVE-2017-18926).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178593">SUSE bug 1178593</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18926/">CVE-2017-18926</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495704" comment="libraptor-devel-2.0.15-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495705" comment="libraptor2-0-2.0.15-9.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495706" comment="raptor-2.0.15-9.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110395" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177406" ref_url="https://bugzilla.suse.com/1177406" source="BUGZILLA"/>
		<reference ref_id="1178291" ref_url="https://bugzilla.suse.com/1178291" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26575" ref_url="https://www.suse.com/security/cve/CVE-2020-26575/" source="CVE"/>
		<reference ref_id="CVE-2020-28030" ref_url="https://www.suse.com/security/cve/CVE-2020-28030/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007794.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- wireshark was updated to 3.2.8:
  - CVE-2020-26575: Fixed an issue where FBZERO dissector was entering in infinite loop (bsc#1177406)
  - CVE-2020-28030: Fixed an issue where GQUIC dissector was crashing (bsc#1178291)
  * Infinite memory allocation while parsing this tcp packet
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177406">SUSE bug 1177406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178291">SUSE bug 1178291</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26575/">CVE-2020-26575</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28030/">CVE-2020-28030</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495508" comment="wireshark-devel-3.2.8-3.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495509" comment="wireshark-ui-qt-3.2.8-3.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110396" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178824" ref_url="https://bugzilla.suse.com/1178824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007823.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.5.0 ESR (bsc#1178824)
  * CVE-2020-26951: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code
  * CVE-2020-16012: Variable time processing of cross-origin images during drawImage calls
  * CVE-2020-26953: Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956: XSS through paste (manual and clipboard API)
  * CVE-2020-26958: Requests intercepted through ServiceWorkers lacked MIME type restrictions
  * CVE-2020-26959: Use-after-free in WebRequestService
  * CVE-2020-26960: Potential use-after-free in uses of nsTArray
  * CVE-2020-15999: Heap buffer overflow in freetype
  * CVE-2020-26961: DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965: Software keyboards may have remembered typed passwords
  * CVE-2020-26966: Single-word search queries were also broadcast to local network
  * CVE-2020-26968: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178824">SUSE bug 1178824</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495707" comment="MozillaFirefox-78.5.0-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495708" comment="MozillaFirefox-devel-78.5.0-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495709" comment="MozillaFirefox-translations-common-78.5.0-8.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495710" comment="MozillaFirefox-translations-other-78.5.0-8.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110397" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495519" comment="python-tk-2.7.17-7.47.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110398" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495711" comment="openssh-askpass-gnome-8.1p1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110399" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171531" ref_url="https://bugzilla.suse.com/1171531" source="BUGZILLA"/>
		<reference ref_id="1177087" ref_url="https://bugzilla.suse.com/1177087" source="BUGZILLA"/>
		<reference ref_id="1179122" ref_url="https://bugzilla.suse.com/1179122" source="BUGZILLA"/>
		<reference ref_id="1179451" ref_url="https://bugzilla.suse.com/1179451" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13543" ref_url="https://www.suse.com/security/cve/CVE-2020-13543/" source="CVE"/>
		<reference ref_id="CVE-2020-13584" ref_url="https://www.suse.com/security/cve/CVE-2020-13584/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9983" ref_url="https://www.suse.com/security/cve/CVE-2020-9983/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008084.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

-webkit2gtk3 was updated to version 2.30.3 (bsc#1179122 bsc#1179451):
   - CVE-2021-13543: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-13584: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-9948: Fixed a type confusion which could have led to arbitrary code execution.
   - CVE-2021-9951: Fixed a use after free which could have led to arbitrary code execution.
   - CVE-2021-9983: Fixed an out of bounds write which could have led to arbitrary code execution.
   - Have the libwebkit2gtk package require libjavascriptcoregtk of
     the same version (bsc#1171531).
   - Enable c_loop on aarch64: currently needed for compilation to
     succeed with JIT disabled. Also disable sampling profiler, since
     it conflicts with c_loop (bsc#1177087).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-17"/>
	<updated date="2020-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171531">SUSE bug 1171531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177087">SUSE bug 1177087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179122">SUSE bug 1179122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179451">SUSE bug 1179451</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13543/">CVE-2020-13543</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13584/">CVE-2020-13584</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9983/">CVE-2020-9983</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495712" comment="typelib-1_0-JavaScriptCore-4_0-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495713" comment="typelib-1_0-WebKit2-4_0-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495714" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.3-3.9.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495715" comment="webkit2gtk3-devel-2.30.3-3.9.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110400" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008104.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2020-55 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-21"/>
	<updated date="2020-12-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495716" comment="MozillaFirefox-78.6.0-8.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495717" comment="MozillaFirefox-devel-78.6.0-8.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495718" comment="MozillaFirefox-translations-common-78.6.0-8.20.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495719" comment="MozillaFirefox-translations-other-78.6.0-8.20.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110401" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1104313" ref_url="https://bugzilla.suse.com/1104313" source="BUGZILLA"/>
		<reference ref_id="1176930" ref_url="https://bugzilla.suse.com/1176930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008105.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issue:

- CVE-2020-16121: Fixed an  Information disclosure in InstallFiles, GetFilesLocal and GetDetailsLocal (bsc#1176930).
- Update summary and description of gstreamer-plugin and gtk3-module. (bsc#1104313)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1104313">SUSE bug 1104313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176930">SUSE bug 1176930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495720" comment="PackageKit-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495721" comment="PackageKit-backend-zypp-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495722" comment="PackageKit-devel-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495723" comment="PackageKit-lang-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495724" comment="libpackagekit-glib2-18-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495725" comment="libpackagekit-glib2-devel-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495726" comment="typelib-1_0-PackageKitGlib-1_0-1.1.13-4.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110402" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179879" ref_url="https://bugzilla.suse.com/1179879" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16587" ref_url="https://www.suse.com/security/cve/CVE-2020-16587/" source="CVE"/>
		<reference ref_id="CVE-2020-16588" ref_url="https://www.suse.com/security/cve/CVE-2020-16588/" source="CVE"/>
		<reference ref_id="CVE-2020-16589" ref_url="https://www.suse.com/security/cve/CVE-2020-16589/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008121.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

Security issues fixed:

- CVE-2020-16587: Fixed a heap-based buffer overflow in chunkOffsetReconstruction in ImfMultiPartInputFile.cpp (bsc#1179879).
- CVE-2020-16588: Fixed a null pointer deference in generatePreview (bsc#1179879).
- CVE-2020-16589: Fixed a heap-based buffer overflow in writeTileData in ImfTiledOutputFile.cpp (bsc#1179879).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-24"/>
	<updated date="2020-12-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179879">SUSE bug 1179879</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16587/">CVE-2020-16587</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16588/">CVE-2020-16588</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-16589/">CVE-2020-16589</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495543" comment="libIlmImf-2_2-23-2.2.1-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495544" comment="libIlmImfUtil-2_2-23-2.2.1-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495545" comment="openexr-devel-2.2.1-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110403" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1133120" ref_url="https://bugzilla.suse.com/1133120" source="BUGZILLA"/>
		<reference ref_id="1133124" ref_url="https://bugzilla.suse.com/1133124" source="BUGZILLA"/>
		<reference ref_id="1175899" ref_url="https://bugzilla.suse.com/1175899" source="BUGZILLA"/>
		<reference ref_id="1180996" ref_url="https://bugzilla.suse.com/1180996" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21261" ref_url="https://www.suse.com/security/cve/CVE-2021-21261/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008592.html" source="SUSE-SU"/>
		<description>
This update for flatpak, libostree, xdg-desktop-portal, xdg-desktop-portal-gtk fixes the following issues:

libostree:

Update to version 2020.8

- Enable LTO. (bsc#1133120)

- This update contains scalability improvements and bugfixes.
- Caching-related HTTP headers are now supported on summaries and signatures, so that they do not have to be 
  re-downloaded if not changed in the meanwhile.
- Summaries and delta have been reworked to allow more fine-grained fetching.
- Fixes several bugs related to atomic variables, HTTP timeouts, and 32-bit architectures.
- Static deltas can now be signed to more easily support offline verification.
- There's now support for multiple initramfs images; Is it possible to have a 'main' initramfs image and a 
  secondary one which represents local configuration.
- The documentation is now moved to https://ostreedev.github.io/ostree/
- Fix for an assertion failure when upgrading from systems before ostree supported devicetree.
- ostree no longer hardlinks zero sized files to avoid hitting filesystem maximum link counts.
- ostree now supports `/` and `/boot` being on the same filesystem.
- Improvements to the GObject Introspection metadata, some (cosmetic) static analyzer fixes, a fix for 
  the immutable bit on s390x, dropping a deprecated bit in the systemd unit file.
- Fix a regression 2020.4 where the 'readonly sysroot' changes incorrectly left the sysroot read-only 
  on systems that started out with a read-only `/` (most of them, e.g. Fedora Silverblue/IoT at least).
- The default dracut config now enables reproducibility.
- There is a new ostree admin unlock `--transient`. This should to be a foundation for further support 
  for 'live' updates.
- New `ed25519` signing support, powered by `libsodium`.
- stree commit gained a new `--base` argument, which significantly simplifies constructing 'derived' 
  commits, particularly for systems using SELinux.
- Handling of the read-only sysroot was reimplemented to run in the initramfs and be more reliable. 
  Enabling the `readonly=true` flag in the repo config is recommended.
- Several fixes in locking for the temporary 'staging' directories OSTree creates, particularly on NFS.
- A new `timestamp-check-from-rev` option was added for pulls, which makes downgrade protection more 
  reliable and will be used by Fedora CoreOS.
- Several fixes and enhancements made for 'collection' pulls including a new `--mirror` option.
- The ostree commit command learned a new `--mode-ro-executables` which enforces `W^R` semantics 
  on all executables.
- Added a new  commit metadata key `OSTREE_COMMIT_META_KEY_ARCHITECTURE` to help standardize 
  the architecture of the OSTree commit. This could be used on the client side for example to 
  sanity-check that the commit matches the architecture of the machine before deploying.
- Stop invalid usage of `%_libexecdir`:
  + Use `%{_prefix}/lib` where appropriate.
  + Use `_systemdgeneratordir` for the systemd-generators.
  + Define `_dracutmodulesdir` based on `dracut.pc`. Add BuildRequires(dracut) for this to work.

xdg-desktop-portal:

Update to version 1.8.0:

- Ensure systemd rpm macros are called at install/uninstall times for systemd user services.
- Add BuildRequires on systemd-rpm-macros.
- openuri:
  - Allow skipping the chooser for more URL tyles
  - Robustness fixes
- filechooser: 
  - Return the current filter
  - Add a 'directory' option
  - Document the 'writable' option
- camera:
  - Make the client node visible
  - Don't leak pipewire proxy
- Fix file descriptor leaks
- Testsuite improvements
- Updated translations.
- document:
  - Reduce the use of open fds
  - Add more tests and fix issues they found
  - Expose directories with their proper name
  - Support exporting directories
  - New fuse implementation
- background: Avoid a segfault
- screencast: Require pipewire 0.3
- Better support for snap and toolbox
- Require `/usr/bin/fusermount`: `xdg-document-portal` calls out to the binary. (bsc#1175899)
  Without it, files or dirs can be selected, but whatever is done with or in them, will not have any effect
- Fixes for `%_libexecdir` changing to `/usr/libexec`

xdg-desktop-portal-gtk:

Update to version 1.8.0:

- filechooser: 
  - Return the current filter
    - Handle the 'directory' option to select directories
    - Only show preview when we have an image
- screenshot: Fix cancellation
- appchooser: Avoid a crash
- wallpaper:
  - Properly preview placement settings
  - Drop the lockscreen option
- printing: Improve the notification
- Updated translations.
- settings: Fall back to gsettings for enable-animations
- screencast: Support Mutter version to 3 (New pipewire api ver 3).

flatpak:

-  Update to version 1.10.2 (jsc#SLE-17238, ECO-3148)

-  This is a security update which fixes a potential attack where a flatpak application could use custom formated 
   `.desktop` file to gain access to files on the host system.
- Fix memory leaks
- Documentation and translations updates
- Spawn portal better handles non-utf8 filenames
- Fix flatpak build on systems with setuid bwrap 
- Fix crash on updating apps with no deploy data
- Remove deprecated texinfo packaging macros.
- Support for the new repo format which should make updates faster and download less data.
- The systemd generator snippets now call flatpak `--print-updated-env` in place of a bunch of shell for better
  login performance.
- The `.profile` snippets now disable GVfs when calling flatpak to avoid spawning a gvfs daemon when logging in via ssh.
- Flatpak now finds the pulseaudio sockets better in uncommon configurations.
- Sandboxes with network access it now also has access to the `systemd-resolved` socket to do dns lookups.
- Flatpak supports unsetting environment variables in the sandbox using `--unset-env`, 
  and `--env=FOO=` now sets FOO to the empty string instead of unsetting it.
- The spawn portal now has an option to share the pid namespace with the sub-sandbox.
- This security update fixes a sandbox escape where a malicious application can execute code outside the sandbox by 
  controlling the environment of the 'flatpak run' command when spawning a sub-sandbox (bsc#1180996, CVE-2021-21261)
- Fix support for ppc64.
- Move flatpak-bisect and flatpak-coredumpctl to devel subpackage, allow to remove python3 dependency on main package.
- Enable LTO as gobject-introspection works fine with LTO. (bsc#1133124)
- Fixed progress reporting for OCI and extra-data.
- The in-memory summary cache is more efficient.
- Fixed authentication getting stuck in a loop in some cases.
- Fixed authentication error reporting.
- Extract OCI info for runtimes as well as apps. 
- Fixed crash if anonymous authentication fails and `-y` is specified.
- flatpak info now only looks at the specified installation if one is specified.
- Better error reporting for server HTTP errors during download. 
- Uninstall now removes applications before the runtime it depends on.
- Avoid updating metadata from the remote when uninstalling.
- FlatpakTransaction now verifies all passed in refs to avoid.
- Added validation of collection id settings for remotes.
- Fix seccomp filters on s390.
- Robustness fixes to the spawn portal.
- Fix support for masking update in the system installation.
- Better support for distros with uncommon models of merged `/usr`.
- Cache responses from localed/AccountService.
- Fix hangs in cases where `xdg-dbus-proxy` fails to start.
- Fix double-free in cups socket detection.
- OCI authenticator now doesn't ask for auth in case of http errors.
- Fix invalid usage of `%{_libexecdir}` to reference systemd directories.
- Fixes for `%_libexecdir` changing to `/usr/libexec`
- Avoid calling authenticator in update if ref didn't change
- Don't fail transaction if ref is already installed (after transaction start)
- Fix flatpak run handling of userns in the `--device=all` case
- Fix handling of extensions from different remotes
- Fix flatpak run `--no-session-bus`
- `FlatpakTransaction` has a new signal `install-authenticator` which clients can handle to install authenticators 
   needed for the transaction. This is done in the CLI commands.
- Now the host timezone data is always exposed, fixing several apps that had timezone issues.
- There's a new  systemd unit (not installed by default) to automatically detect plugged in usb sticks with 
  sideload repos.
- By default the `gdm env.d` file is no longer installed because the  systemd generators work better.
- `create-usb` now exports partial commits by default 
- Fix handling of docker media types in oci remotes
- Fix subjects in `remote-info --log` output
- This release is also able to host flatpak images on e.g. docker hub.
 		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1133120">SUSE bug 1133120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133124">SUSE bug 1133124</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175899">SUSE bug 1175899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180996">SUSE bug 1180996</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21261/">CVE-2021-21261</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495727" comment="flatpak-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495728" comment="flatpak-devel-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495729" comment="flatpak-zsh-completion-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495730" comment="libflatpak0-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495731" comment="libostree-2020.8-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495732" comment="libostree-devel-2020.8-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495733" comment="system-user-flatpak-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495734" comment="typelib-1_0-Flatpak-1_0-1.10.2-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495735" comment="typelib-1_0-OSTree-1_0-2020.8-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495736" comment="xdg-desktop-portal-1.8.0-5.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495737" comment="xdg-desktop-portal-devel-1.8.0-5.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495738" comment="xdg-desktop-portal-gtk-1.8.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495739" comment="xdg-desktop-portal-gtk-lang-1.8.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495740" comment="xdg-desktop-portal-lang-1.8.0-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110404" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184172" ref_url="https://bugzilla.suse.com/1184172" source="BUGZILLA"/>
		<reference ref_id="1184173" ref_url="https://bugzilla.suse.com/1184173" source="BUGZILLA"/>
		<reference ref_id="1184174" ref_url="https://bugzilla.suse.com/1184174" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3474" ref_url="https://www.suse.com/security/cve/CVE-2021-3474/" source="CVE"/>
		<reference ref_id="CVE-2021-3475" ref_url="https://www.suse.com/security/cve/CVE-2021-3475/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008595.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-3474: Undefined-shift in Imf_2_5::FastHufDecoder::FastHufDecoder (bsc#1184174)
- CVE-2021-3475: Integer-overflow in Imf_2_5::calculateNumTiles (bsc#1184173)
- CVE-2021-3476: Undefined-shift in Imf_2_5::unpack14 (bsc#1184172)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184172">SUSE bug 1184172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184173">SUSE bug 1184173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184174">SUSE bug 1184174</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3474/">CVE-2021-3474</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3475/">CVE-2021-3475</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495741" comment="libIlmImf-2_2-23-2.2.1-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495742" comment="libIlmImfUtil-2_2-23-2.2.1-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495743" comment="openexr-devel-2.2.1-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110405" version="1" class="patch">
	<metadata>
		<title>Security update for fwupd (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172643" ref_url="https://bugzilla.suse.com/1172643" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10759" ref_url="https://www.suse.com/security/cve/CVE-2020-10759/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008596.html" source="SUSE-SU"/>
		<description>
This update for fwupd fixes the following issues:

- Update to version 1.2.14: (bsc#1182057)
- Add SBAT section to EFI images (bsc#1182057)
- CVE-2020-10759: Validate that gpgme_op_verify_result() returned at least one signature (bsc#1172643)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-08"/>
	<updated date="2021-04-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172643">SUSE bug 1172643</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-10759/">CVE-2020-10759</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495744" comment="fwupd-1.2.14-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495745" comment="fwupd-devel-1.2.14-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495746" comment="fwupd-lang-1.2.14-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495747" comment="libfwupd2-1.2.14-5.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495748" comment="typelib-1_0-Fwupd-2_0-1.2.14-5.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110406" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184626" ref_url="https://bugzilla.suse.com/1184626" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20311: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c (bsc#1184626)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184626">SUSE bug 1184626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495749" comment="ImageMagick-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495750" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495751" comment="ImageMagick-config-7-upstream-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495752" comment="ImageMagick-devel-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495753" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495754" comment="libMagick++-devel-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495755" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495756" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110407" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008672.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-23"/>
	<updated date="2021-04-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495757" comment="MozillaFirefox-78.10.0-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495758" comment="MozillaFirefox-devel-78.10.0-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495759" comment="MozillaFirefox-translations-common-78.10.0-8.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495760" comment="MozillaFirefox-translations-other-78.10.0-8.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110408" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183403" ref_url="https://bugzilla.suse.com/1183403" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25900" ref_url="https://www.suse.com/security/cve/CVE-2021-25900/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008690.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

- librsvg was updated to 2.46.5:
  * Update dependent crates that had security vulnerabilities:
    smallvec to 0.6.14 - RUSTSEC-2018-0003 - CVE-2021-25900 (bsc#1183403)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183403">SUSE bug 1183403</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25900/">CVE-2021-25900</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495761" comment="librsvg-devel-2.46.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495762" comment="typelib-1_0-Rsvg-2_0-2.46.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110409" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182719" ref_url="https://bugzilla.suse.com/1182719" source="BUGZILLA"/>
		<reference ref_id="1184155" ref_url="https://bugzilla.suse.com/1184155" source="BUGZILLA"/>
		<reference ref_id="1184262" ref_url="https://bugzilla.suse.com/1184262" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1789" ref_url="https://www.suse.com/security/cve/CVE-2021-1789/" source="CVE"/>
		<reference ref_id="CVE-2021-1799" ref_url="https://www.suse.com/security/cve/CVE-2021-1799/" source="CVE"/>
		<reference ref_id="CVE-2021-1801" ref_url="https://www.suse.com/security/cve/CVE-2021-1801/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1870" ref_url="https://www.suse.com/security/cve/CVE-2021-1870/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008699.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.0 (bsc#1184155):
  * Fix the authentication request port when URL omits the port.
  * Fix iframe scrolling when main frame is scrolled in async
  * scrolling mode.
  * Stop using g_memdup.
  * Show a warning message when overriding signal handler for
  * threading suspension.
  * Fix the build on RISC-V with GCC 11.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871
- Update in version 2.30.6 (bsc#1184262):
  * Update user agent quirks again for Google Docs and Google Drive.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2020-27918, CVE-2020-29623, CVE-2021-1765
    CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870.
- Update _constraints for armv6/armv7 (bsc#1182719)
- restore NPAPI plugin support which was removed in 2.32.0
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182719">SUSE bug 1182719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184155">SUSE bug 1184155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184262">SUSE bug 1184262</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1789/">CVE-2021-1789</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1799/">CVE-2021-1799</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1801/">CVE-2021-1801</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1870/">CVE-2021-1870</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495763" comment="typelib-1_0-JavaScriptCore-4_0-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495764" comment="typelib-1_0-WebKit2-4_0-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495765" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495766" comment="webkit2gtk3-devel-2.32.0-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110410" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184353" ref_url="https://bugzilla.suse.com/1184353" source="BUGZILLA"/>
		<reference ref_id="1184354" ref_url="https://bugzilla.suse.com/1184354" source="BUGZILLA"/>
		<reference ref_id="1184355" ref_url="https://bugzilla.suse.com/1184355" source="BUGZILLA"/>
		<reference ref_id="1185216" ref_url="https://bugzilla.suse.com/1185216" source="BUGZILLA"/>
		<reference ref_id="1185217" ref_url="https://bugzilla.suse.com/1185217" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20296" ref_url="https://www.suse.com/security/cve/CVE-2021-20296/" source="CVE"/>
		<reference ref_id="CVE-2021-23215" ref_url="https://www.suse.com/security/cve/CVE-2021-23215/" source="CVE"/>
		<reference ref_id="CVE-2021-26260" ref_url="https://www.suse.com/security/cve/CVE-2021-26260/" source="CVE"/>
		<reference ref_id="CVE-2021-3477" ref_url="https://www.suse.com/security/cve/CVE-2021-3477/" source="CVE"/>
		<reference ref_id="CVE-2021-3479" ref_url="https://www.suse.com/security/cve/CVE-2021-3479/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008732.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-23215: Fixed an integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers (bsc#1185216).
- CVE-2021-26260: Fixed an Integer-overflow in Imf_2_5:DwaCompressor:initializeBuffers (bsc#1185217).
- CVE-2021-20296: Fixed a  Null Pointer dereference in Imf_2_5:hufUncompress (bsc#1184355).
- CVE-2021-3477: Fixed a Heap-buffer-overflow in Imf_2_5::DeepTiledInputFile::readPixelSampleCounts (bsc#1184353).
- CVE-2021-3479: Fixed an Out-of-memory caused by allocation of a very large buffer (bsc#1184354).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184353">SUSE bug 1184353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184354">SUSE bug 1184354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184355">SUSE bug 1184355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185216">SUSE bug 1185216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185217">SUSE bug 1185217</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20296/">CVE-2021-20296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23215/">CVE-2021-23215</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26260/">CVE-2021-26260</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3477/">CVE-2021-3477</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3479/">CVE-2021-3479</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495767" comment="libIlmImf-2_2-23-2.2.1-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495768" comment="libIlmImfUtil-2_2-23-2.2.1-3.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495769" comment="openexr-devel-2.2.1-3.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110411" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495770" comment="avahi-autoipd-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495771" comment="avahi-utils-gtk-0.7-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495772" comment="libavahi-gobject-devel-0.7-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110412" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179221" ref_url="https://bugzilla.suse.com/1179221" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179276" ref_url="https://bugzilla.suse.com/1179276" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="1179753" ref_url="https://bugzilla.suse.com/1179753" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed a division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27756: Fixed a division by zero at MagickCore/geometry.c (bsc#1179221).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27758: Fixed an outside the range of representable values of type 'unsigned long long' (bsc#1179276).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
- CVE-2020-29599: Fixed a shell command injection in -authenticate (bsc#1179753).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179221">SUSE bug 1179221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179276">SUSE bug 1179276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179753">SUSE bug 1179753</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495773" comment="ImageMagick-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495774" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495775" comment="ImageMagick-config-7-upstream-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495776" comment="ImageMagick-devel-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495777" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495778" comment="libMagick++-devel-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495779" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495780" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110413" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185895" ref_url="https://bugzilla.suse.com/1185895" source="BUGZILLA"/>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-32490 [bsc#1185895]: Out of bounds write in function DJVU:filter_bv() via crafted djvu file
- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185895">SUSE bug 1185895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495781" comment="libdjvulibre-devel-3.5.27-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495782" comment="libdjvulibre21-3.5.27-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110414" version="1" class="patch">
	<metadata>
		<title>Security update for fribidi (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1156260" ref_url="https://bugzilla.suse.com/1156260" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18397" ref_url="https://www.suse.com/security/cve/CVE-2019-18397/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1655-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008796.html" source="SUSE-SU"/>
		<description>
This update for fribidi fixes the following issues:

Security issues fixed:

- CVE-2019-18397: Avoid buffer overflow. (bsc#1156260)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156260">SUSE bug 1156260</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-18397/">CVE-2019-18397</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495783" comment="libfribidi0-32bit-1.0.5-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110415" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184153" ref_url="https://bugzilla.suse.com/1184153" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24994" ref_url="https://www.suse.com/security/cve/CVE-2020-24994/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008803.html" source="SUSE-SU"/>
		<description>
This update for libass fixes the following issues:

- CVE-2020-24994: Fixed a stack overflow in the parse_tag (bsc#1184153).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-20"/>
	<updated date="2021-05-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184153">SUSE bug 1184153</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24994/">CVE-2020-24994</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495784" comment="libass-devel-0.14.0-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495785" comment="libass9-0.14.0-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110416" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<description>
This update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly fixes the following issues:

gstreamer was updated to version 1.16.3 (bsc#1181255):

- delay creation of threadpools
- bin: Fix `deep-element-removed` log message
- buffer: fix meta sequence number fallback on rpi
- bufferlist: foreach: always remove as parent if buffer is changed
- bus: Make setting/replacing/clearing the sync handler thread-safe
- elementfactory: Fix missing features in case a feature moves to another filename
- element: When removing a ghost pad also unset its target
- meta: intern registered impl string
- registry: Use a toolchain-specific registry file on Windows
- systemclock: Invalid internal time calculation causes non-increasing clock time on Windows
- value: don't write to `const char *`
- value: Fix segfault comparing empty GValueArrays
- Revert floating enforcing
- aggregator: fix iteration direction in skip_buffers
- sparsefile: fix possible crash when seeking
- baseparse: cache fix
- baseparse: fix memory leak when subclass skips whole input buffer
- baseparse: Set the private duration before posting a duration-changed message
- basetransform: allow not passthrough if generate_output is implemented
- identity: Fix a minor leak using meta_str
- queue: protect against lost wakeups for iterm_del condition
- queue2: Avoid races when posting buffering messages
- queue2: Fix missing/dropped buffering messages at startup
- identity: Unblock condition variable on FLUSH_START
- check: Use `g_thread_yield()` instead of `g_usleep(1)`
- tests: use cpu_family for arch checks
- gst-launch: Follow up to missing `s/g_print/gst_print/g`
- gst-inspect: Add define guard for `g_log_writer_supports_color()`
- gst-launch: go back down to `GST_STATE_NULL` in one step.
- device-monitor: list hidden providers before listing devices
- autotools build fixes for GNU make 4.3

gstreamer-plugins-good was updated to version 1.16.3 (bsc#1181255):

- deinterlace: on-the-fly renegotiation
- flacenc: Pass audio info from set_format() to query_total_samples() explicitly
- flacparse: fix broken reordering of flac metadata
- jack: Use jack_free(3) to release ports
- jpegdec: check buffer size before dereferencing
- pulse: fix discovery of newly added devices
- qtdemux fuzzing fixes
- qtdemux: Add 'mp3 ' fourcc that VLC seems to produce now
- qtdemux: Specify REDIRECT information in error message
- rtpbin: fix shutdown crash in rtpbin
- rtpsession: rename RTCP thread
- rtpvp8pay, rtpvp9pay: fix caps leak in set_caps()
- rtpjpegdepay: outputs framed jpeg
- rtpjitterbuffer: Properly free internal packets queue in finalize()
- rtspsrc: Don't return TRUE for unhandled query
- rtspsrc: Avoid stack overflow recursing waiting for response
- rtspsrc: Use the correct type for storing the max-rtcp-rtp-time-diff property
- rtspsrc: Error out when failling to receive message response
- rtspsrc: Fix for segmentation fault when handling set/get_parameter requests
- speex: Fix crash on Windows caused by cross-CRT issue
- speexdec: Crash when stopping the pipeline
- splitmuxsrc: Properly stop the loop if no part reader is present
- use gst_element_class_set_metadata when passing dynamic strings
- v4l2videodec: Increase internal bitstream pool size
- v4l2: fix crash when handling unsupported video format
- videocrop: allow properties to be animated by GstController
- videomixer: Don't leak peer caps
- vp8enc/vp8enc: set 1 for the default value of VP8E_SET_STATIC_THRESHOLD
- wavenc: Fix writing of the channel mask with &gt;2 channels

gstreamer-plugins-bad was updated to version 1.16.3 (bsc#1181255):

- amcvideodec: fix sync meta copying not taking a reference
- audiobuffersplit: Perform discont tracking on running time
- audiobuffersplit: Specify in the template caps that only interleaved audio is supported
- audiobuffersplit: Unset DISCONT flag if not discontinuous
- autoconvert: Fix lock-less exchange or free condition
- autoconvert: fix compiler warnings with g_atomic on recent GLib versions
- avfvideosrc: element requests camera permissions even with capture-screen property is true
- codecparsers: h264parser: guard against ref_pic_markings overflow
- dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
- dtls/connection: fix EOF handling with openssl 1.1.1e
- fdkaacdec: add support for mpegversion=2
- hls: Check nettle version to ensure AES128 support
- ipcpipeline: Rework compiler checks
- interlace: Increment phase_index before checking if we're at the end of the phase
- lv2: Make it build with -fno-common
- h264parser: Do not allocate too large size of memory for registered user data SEI
- ladspa: fix unbounded integer properties
- modplug: avoid division by zero
- msdkdec: Fix GstMsdkContext leak
- msdkenc: fix leaks on windows
- musepackdec: Don't fail all queries if no sample rate is known yet
- openslessink: Allow openslessink to handle 48kHz streams.
- opencv: allow compilation against 4.2.x
- proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
- vulkan: Drop use of VK_RESULT_BEGIN_RANGE
- wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
- wasapi: Fix possible deadlock while downwards state change
- waylandsink: Clear window when pipeline is stopped
- webrtc: Support non-trickle ICE candidates in the SDP
- webrtc: Unmap all non-binary buffers received via the datachannel
- meson: build with neon 0.31
- Drop upstream fixed patch: gstreamer-h264parser-fix-overflow.patch

- h264parser: guard against ref_pic_markings overflow
  (bsc#1181255 CVE-2021-3185)

- Disable the kate/libtiger plugin.  Kate streams for karaoke are not
  used anymore, and the source tarball for libtiger is no longer
  available upstream. (jsc#SLE-13843)

gstreamer-plugins-ugly was updated to version 1.16.3 (bsc#1181255):

+ x264enc: corrected em_data value in CEA-708 CC SEI message

gstreamer-plugins-base was updated to version 1.16.3 (bsc#1181255):

- audioaggregator: Check all downstream allowed caps structures if they support the upstream rate
- audioaggregator: Fix negotiation with downstream if there is no peer yet
- audioencoder: fix segment event leak
- discoverer: Fix caps handling in `pad-added` signal handler
- discoverer: Start discovering next URI from right thread
- fft: Update our kiss fft version, fixes thread-safety and concurrency issues and misc other things
- gl: numerous memory fixes (use-after-free, leaks, missing NULL-ify)
- gl/display/egl: ensure debug category is initialized
- gstglwindow_x11: fix resize
- pbutils: Add latest H.264 level values
- rtpbuffer: fix header extension length validation
- video: Fix NV12_64Z32 number of component
- video-format: RGB16/15 are not 16 bit per component but only 5.333 and 5
- video: fix top/bottom field flags
- videodecoder: don't copy interlace-mode from reference state
- appsrc/appsink: Make setting/replacing callbacks thread-safe
- compositor: Fix checkerboard filling for BGRx/RGBx and UYVY/YUY2/YVYU
- decodebin3: only force streams-selected seqnum after a select-streams
- glupload: Fix fallback from direct dmabuf to dmabuf upload method
- glvideomixer: perform `_get_highest_precision()` on the GL thread
- libvisual: use `gst_element_class_set_metadata()` when passing dynamic strings
- oggstream: Workaround for broken PAR in VP8 BOS
- subparse: accept WebVTT timestamps without an hour component
- playbin: Handle error message with redirection indication
- textrender: Fix AYUV output.
- typefind: Consider MPEG-PS PSM to be a PES type
- uridecodebin3: default to non-0 buffer-size and buffer-duration, otherwise it could potentially cause big memory allocations over time
- videoaggregator: Don't configure NULL chroma-site/colorimetry
- videorate/videoscale/audioresample: Ensure that the caps returned from...
- build: Replace bashisms in configure for Wayland and GLES3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494282" comment="gstreamer-devel-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495786" comment="gstreamer-plugins-bad-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495787" comment="gstreamer-plugins-bad-chromaprint-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495788" comment="gstreamer-plugins-bad-devel-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495789" comment="gstreamer-plugins-bad-lang-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494283" comment="gstreamer-plugins-base-devel-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494284" comment="gstreamer-utils-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495790" comment="libgstadaptivedemux-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495791" comment="libgstbadaudio-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495792" comment="libgstbasecamerabinsrc-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495793" comment="libgstcodecparsers-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495794" comment="libgstinsertbin-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495795" comment="libgstisoff-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495796" comment="libgstmpegts-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495797" comment="libgstplayer-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495798" comment="libgstsctp-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495799" comment="libgsturidownloader-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495800" comment="libgstwayland-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495801" comment="libgstwebrtc-1_0-0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494285" comment="typelib-1_0-GstAllocators-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494286" comment="typelib-1_0-GstApp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494287" comment="typelib-1_0-GstAudio-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494288" comment="typelib-1_0-GstGL-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495802" comment="typelib-1_0-GstInsertBin-1_0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495803" comment="typelib-1_0-GstMpegts-1_0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494289" comment="typelib-1_0-GstPbutils-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495804" comment="typelib-1_0-GstPlayer-1_0-1.16.3-4.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494290" comment="typelib-1_0-GstRtp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494291" comment="typelib-1_0-GstRtsp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494292" comment="typelib-1_0-GstSdp-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494293" comment="typelib-1_0-GstTag-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009494294" comment="typelib-1_0-GstVideo-1_0-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495805" comment="typelib-1_0-GstWebRTC-1_0-1.16.3-4.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110417" version="1" class="patch">
	<metadata>
		<title>Security update for gdk-pixbuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174307" ref_url="https://bugzilla.suse.com/1174307" source="BUGZILLA"/>
		<reference ref_id="1180393" ref_url="https://bugzilla.suse.com/1180393" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29385" ref_url="https://www.suse.com/security/cve/CVE-2020-29385/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008233.html" source="SUSE-SU"/>
		<description>
This update for gdk-pixbuf fixes the following issues:

- CVE-2020-29385: Fixed an infinite loop in lzw.c in the function write_indexes (bsc#1180393).
- Fixed an integer underflow in the GIF loader (bsc#1174307).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-21"/>
	<updated date="2021-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174307">SUSE bug 1174307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180393">SUSE bug 1180393</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29385/">CVE-2020-29385</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495806" comment="gdk-pixbuf-query-loaders-32bit-2.40.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495807" comment="libgdk_pixbuf-2_0-0-32bit-2.40.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110418" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1091340" ref_url="https://bugzilla.suse.com/1091340" source="BUGZILLA"/>
		<reference ref_id="1091341" ref_url="https://bugzilla.suse.com/1091341" source="BUGZILLA"/>
		<reference ref_id="1091342" ref_url="https://bugzilla.suse.com/1091342" source="BUGZILLA"/>
		<reference ref_id="1091343" ref_url="https://bugzilla.suse.com/1091343" source="BUGZILLA"/>
		<reference ref_id="1091344" ref_url="https://bugzilla.suse.com/1091344" source="BUGZILLA"/>
		<reference ref_id="1180414" ref_url="https://bugzilla.suse.com/1180414" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-10536" ref_url="https://www.suse.com/security/cve/CVE-2018-10536/" source="CVE"/>
		<reference ref_id="CVE-2018-10537" ref_url="https://www.suse.com/security/cve/CVE-2018-10537/" source="CVE"/>
		<reference ref_id="CVE-2018-10538" ref_url="https://www.suse.com/security/cve/CVE-2018-10538/" source="CVE"/>
		<reference ref_id="CVE-2018-10539" ref_url="https://www.suse.com/security/cve/CVE-2018-10539/" source="CVE"/>
		<reference ref_id="CVE-2018-10540" ref_url="https://www.suse.com/security/cve/CVE-2018-10540/" source="CVE"/>
		<reference ref_id="CVE-2018-19840" ref_url="https://www.suse.com/security/cve/CVE-2018-19840/" source="CVE"/>
		<reference ref_id="CVE-2018-19841" ref_url="https://www.suse.com/security/cve/CVE-2018-19841/" source="CVE"/>
		<reference ref_id="CVE-2018-6767" ref_url="https://www.suse.com/security/cve/CVE-2018-6767/" source="CVE"/>
		<reference ref_id="CVE-2018-7253" ref_url="https://www.suse.com/security/cve/CVE-2018-7253/" source="CVE"/>
		<reference ref_id="CVE-2018-7254" ref_url="https://www.suse.com/security/cve/CVE-2018-7254/" source="CVE"/>
		<reference ref_id="CVE-2019-1010319" ref_url="https://www.suse.com/security/cve/CVE-2019-1010319/" source="CVE"/>
		<reference ref_id="CVE-2019-11498" ref_url="https://www.suse.com/security/cve/CVE-2019-11498/" source="CVE"/>
		<reference ref_id="CVE-2020-35738" ref_url="https://www.suse.com/security/cve/CVE-2020-35738/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008234.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- Update to version 5.4.0
  * CVE-2020-35738: Fixed an out-of-bounds write in WavpackPackSamples (bsc#1180414) 
  * fixed: disable A32 asm code when building for Apple silicon
  * fixed: issues with Adobe-style floating-point WAV files
  * added: --normalize-floats option to wvunpack for correctly
             exporting un-normalized floating-point files
- Update to version 5.3.0 
  * fixed: OSS-Fuzz issues 19925, 19928, 20060, 20448
  * fixed: trailing garbage characters on imported ID3v2 TXXX tags
  * fixed: various minor undefined behavior and memory access issues
  * fixed: sanitize tag extraction names for length and path inclusion
  * improved: reformat wvunpack 'help' and split into long + short versions
  * added: regression testing to Travis CI for OSS-Fuzz crashers
- Updated to version 5.2.0 
  *fixed: potential security issues including the following CVEs:
         CVE-2018-19840, CVE-2018-19841, CVE-2018-10536 (bsc#1091344),
         CVE-2018-10537 (bsc#1091343) CVE-2018-10538 (bsc#1091342),  
         CVE-2018-10539 (bsc#1091341), CVE-2018-10540 (bsc#1091340), 
         CVE-2018-7254,  CVE-2018-7253, CVE-2018-6767, CVE-2019-11498 
         and CVE-2019-1010319
  * added: support for CMake, Travis CI, and Google's OSS-fuzz
  * fixed: use correction file for encode verify (pipe input, Windows)
  * fixed: correct WAV header with actual length (pipe input, -i option)
  * fixed: thumb interworking and not needing v6 architecture (ARM asm)
  * added: handle more ID3v2.3 tag items and from all file types
  * fixed: coredump on Sparc64 (changed MD5 implementation)
  * fixed: handle invalid ID3v2.3 tags from sacd-ripper
  * fixed: several corner-case memory leaks
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-21"/>
	<updated date="2021-01-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1091340">SUSE bug 1091340</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091341">SUSE bug 1091341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091342">SUSE bug 1091342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091343">SUSE bug 1091343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1091344">SUSE bug 1091344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180414">SUSE bug 1180414</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10536/">CVE-2018-10536</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-10537/">CVE-2018-10537</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10538/">CVE-2018-10538</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10539/">CVE-2018-10539</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-10540/">CVE-2018-10540</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19840/">CVE-2018-19840</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19841/">CVE-2018-19841</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-6767/">CVE-2018-6767</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7253/">CVE-2018-7253</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-7254/">CVE-2018-7254</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-1010319/">CVE-2019-1010319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11498/">CVE-2019-11498</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35738/">CVE-2020-35738</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495808" comment="wavpack-5.4.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495809" comment="wavpack-devel-5.4.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110419" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008948.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.11.0 ESR (bsc#1186696)

  * CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
  * CVE-2021-29967: Memory safety bugs fixed in Firefox
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495810" comment="MozillaFirefox-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495811" comment="MozillaFirefox-devel-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495812" comment="MozillaFirefox-translations-common-78.11.0-8.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495813" comment="MozillaFirefox-translations-other-78.11.0-8.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110420" version="1" class="patch">
	<metadata>
		<title>Security update for libopenmpt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186663" ref_url="https://bugzilla.suse.com/1186663" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008976.html" source="SUSE-SU"/>
		<description>
This update for libopenmpt fixes the following issues:

Various bugfix and stability issues were fixed, some of those
might have security impact.

libopenmpt was updated to 0.3.28:

* Fixed excessive memory consumption with malformed files in
  various formats.

Changes in 0.3.27:

* AMS: Avoid allocating excessive amount of memory for compressed
  song message in malformed files.
* S3M: Some samples were imported with a too high sample rate if
  module was saved with Scream Tracker 3.

Changes in 0.3.26:

* DMF: Improve import of finetune effect with parameters larger
  than +/-15.

Changes in 0.3.25:

* AMS: An upper bound for uncompressed sample size is now
  established to avoid memory exhaustion from malformed files.
* MO3: Avoid certain ModPlug hacks from being fixed up twice,
  which could lead to e.g. very narrow pan swing range for old
  OpenMPT IT files saved with a recent MO3 encoder version.
* IMF: Instrument sample mapping was off by one octave, notable
  in the guitar part of Astaris by Karsten Koch.
* PLM: Percentage offset (Mxx) was slightly off.

Changes in 0.3.24:

* PP20: The first few bytes of some files were not decompressed
  properly, making some files unplayable (depending on the
  original format).

Changes in 0.3.23:

* IT: Global volume slides with both nibbles set preferred the
  “slide up” nibble over the “slide down” nibble in old OpenMPT
  versions, unlike other slides. Such old files are now imported
  correctly again.
* IT: Fixed an edge case where, if the filter hit full cutoff /
  no resonance on the first tick of a row where a new delayed
  note would be triggered, the filter would be disabled even
  though it should stay active. Fixes trace.it by maddie.
* XM: Out-of-range arpeggio clamping behaviour broke in OpenMPT
  1.23.05.00. The arpeggios in Binary World by Dakota now play
  correctly again.
* S3M: Support old-style sample pre-amp value in very early
  S3M files.
* S3M: Only force-enable fast slides for files ST 3.00.
  Previously, any S3M file made with an ST3 version older than
  3.20 enabled them.
* M15: Improve tracker detection heuristics to never assume
  SoundTracker 2.0 if there is a huge number of Dxx commands,
  as that is a definite hint that they should be treated as
  volume slides. Fixes Monty On The Run by Master Blaster.

Changes in 0.3.22:

* IT: Disable retrigger with short notes quirk for modules saved
  with Chibi Tracker, as it does not implement that quirk.
* MOD: Fix early song ending due to ProTracker pattern jump quirk
  (EEx + Dxx on same row) if infinite looping is disabled.
  Fixes Haunted Tracks.mod by Triace.
* MOD: Vibrato type “ramp down” was upside down.

Changes in 0.3.21:

* IT: Vibrato was too fast in Old Effects mode since
  libopenmpt 0.3.
* XM: Treat 8bitbubsy’s FT2 clone exactly like Fasttracker 2 with
  respect to compatibility and playback flags. For example,
  FT2 Pan Law was not applied.
* DMF: Some files had a wrong tempo since libopenmpt
  0.2.5705-beta15.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186663">SUSE bug 1186663</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495814" comment="libmodplug-devel-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495815" comment="libmodplug1-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495816" comment="libopenmpt-devel-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495817" comment="libopenmpt0-0.3.28-2.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495818" comment="libopenmpt_modplug1-0.3.28-2.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110421" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008988.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495819" comment="libdjvulibre-devel-3.5.27-11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495820" comment="libdjvulibre21-3.5.27-11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110422" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186764" ref_url="https://bugzilla.suse.com/1186764" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009002.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-17541: Fixed a stack-based buffer overflow in the 'transform' component (bsc#1186764).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495821" comment="libjpeg8-32bit-8.1.2-5.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110423" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179930" ref_url="https://bugzilla.suse.com/1179930" source="BUGZILLA"/>
		<reference ref_id="1179931" ref_url="https://bugzilla.suse.com/1179931" source="BUGZILLA"/>
		<reference ref_id="1179932" ref_url="https://bugzilla.suse.com/1179932" source="BUGZILLA"/>
		<reference ref_id="1179933" ref_url="https://bugzilla.suse.com/1179933" source="BUGZILLA"/>
		<reference ref_id="1180102" ref_url="https://bugzilla.suse.com/1180102" source="BUGZILLA"/>
		<reference ref_id="1180232" ref_url="https://bugzilla.suse.com/1180232" source="BUGZILLA"/>
		<reference ref_id="1181598" ref_url="https://bugzilla.suse.com/1181598" source="BUGZILLA"/>
		<reference ref_id="1181599" ref_url="https://bugzilla.suse.com/1181599" source="BUGZILLA"/>
		<reference ref_id="1183353" ref_url="https://bugzilla.suse.com/1183353" source="BUGZILLA"/>
		<reference ref_id="1184110" ref_url="https://bugzilla.suse.com/1184110" source="BUGZILLA"/>
		<reference ref_id="1185128" ref_url="https://bugzilla.suse.com/1185128" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26418" ref_url="https://www.suse.com/security/cve/CVE-2020-26418/" source="CVE"/>
		<reference ref_id="CVE-2020-26419" ref_url="https://www.suse.com/security/cve/CVE-2020-26419/" source="CVE"/>
		<reference ref_id="CVE-2020-26420" ref_url="https://www.suse.com/security/cve/CVE-2020-26420/" source="CVE"/>
		<reference ref_id="CVE-2020-26421" ref_url="https://www.suse.com/security/cve/CVE-2020-26421/" source="CVE"/>
		<reference ref_id="CVE-2020-26422" ref_url="https://www.suse.com/security/cve/CVE-2020-26422/" source="CVE"/>
		<reference ref_id="CVE-2021-22173" ref_url="https://www.suse.com/security/cve/CVE-2021-22173/" source="CVE"/>
		<reference ref_id="CVE-2021-22174" ref_url="https://www.suse.com/security/cve/CVE-2021-22174/" source="CVE"/>
		<reference ref_id="CVE-2021-22191" ref_url="https://www.suse.com/security/cve/CVE-2021-22191/" source="CVE"/>
		<reference ref_id="CVE-2021-22207" ref_url="https://www.suse.com/security/cve/CVE-2021-22207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009067.html" source="SUSE-SU"/>
		<description>
This update for wireshark, libvirt, sbc and libqt5-qtmultimedia fixes the following issues:

Update wireshark to version 3.4.5

- New and updated support and bug fixes for multiple protocols
- Asynchronous DNS resolution is always enabled
- Protobuf fields can be dissected as Wireshark (header) fields
- UI improvements

Including security fixes for:

- CVE-2021-22191: Wireshark could open unsafe URLs (bsc#1183353).
- CVE-2021-22207: MS-WSP dissector excessive memory consumption (bsc#1185128)
- CVE-2020-26422: QUIC dissector crash (bsc#1180232)
- CVE-2020-26418: Kafka dissector memory leak (bsc#1179930)
- CVE-2020-26419: Multiple dissector memory leaks (bsc#1179931)
- CVE-2020-26420: RTPS dissector memory leak (bsc#1179932) 
- CVE-2020-26421: USB HID dissector crash (bsc#1179933)
- CVE-2021-22173: Fix USB HID dissector memory leak (bsc#1181598)
- CVE-2021-22174: Fix USB HID dissector crash (bsc#1181599)

libqt5-qtmultimedia and sbc are necessary dependencies. libvirt is needed to rebuild wireshark-plugin-libvirt.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179930">SUSE bug 1179930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179931">SUSE bug 1179931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179932">SUSE bug 1179932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179933">SUSE bug 1179933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180102">SUSE bug 1180102</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180232">SUSE bug 1180232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181598">SUSE bug 1181598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181599">SUSE bug 1181599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183353">SUSE bug 1183353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184110">SUSE bug 1184110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185128">SUSE bug 1185128</bugzilla>
	<cve impact="low" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26418/">CVE-2020-26418</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26419/">CVE-2020-26419</cve>
	<cve impact="low" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26420/">CVE-2020-26420</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26421/">CVE-2020-26421</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-26422/">CVE-2020-26422</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22173/">CVE-2021-22173</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22174/">CVE-2021-22174</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22191/">CVE-2021-22191</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22207/">CVE-2021-22207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009494064" comment="libsbc1-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495822" comment="sbc-devel-1.3-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495823" comment="wireshark-devel-3.4.5-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495824" comment="wireshark-ui-qt-3.4.5-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110424" version="1" class="patch">
	<metadata>
		<title>Security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186590" ref_url="https://bugzilla.suse.com/1186590" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009082.html" source="SUSE-SU"/>
		<description>
This update for gupnp fixes the following issues:

- CVE-2021-33516: Fixed a DNS rebinding, which could trick the browser into triggering actions against local UPnP services (bsc#1186590).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495825" comment="libgupnp-1_2-0-1.2.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110425" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187310" ref_url="https://bugzilla.suse.com/1187310" source="BUGZILLA"/>
		<reference ref_id="1187395" ref_url="https://bugzilla.suse.com/1187395" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3598" ref_url="https://www.suse.com/security/cve/CVE-2021-3598/" source="CVE"/>
		<reference ref_id="CVE-2021-3605" ref_url="https://www.suse.com/security/cve/CVE-2021-3605/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009086.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- Fixed CVE-2021-3605 [bsc#1187395]: Heap buffer overflow in the rleUncompress function
- Fixed CVE-2021-3598 [bsc#1187310]: Heap buffer overflow in Imf_3_1:CharPtrIO:readChars
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187310">SUSE bug 1187310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187395">SUSE bug 1187395</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3598/">CVE-2021-3598</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3605/">CVE-2021-3605</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495826" comment="libIlmImf-2_2-23-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495827" comment="libIlmImfUtil-2_2-23-2.2.1-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495828" comment="openexr-devel-2.2.1-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110426" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172640" ref_url="https://bugzilla.suse.com/1172640" source="BUGZILLA"/>
		<reference ref_id="1186406" ref_url="https://bugzilla.suse.com/1186406" source="BUGZILLA"/>
		<reference ref_id="1186583" ref_url="https://bugzilla.suse.com/1186583" source="BUGZILLA"/>
		<reference ref_id="1186586" ref_url="https://bugzilla.suse.com/1186586" source="BUGZILLA"/>
		<reference ref_id="1186587" ref_url="https://bugzilla.suse.com/1186587" source="BUGZILLA"/>
		<reference ref_id="1186596" ref_url="https://bugzilla.suse.com/1186596" source="BUGZILLA"/>
		<reference ref_id="1186597" ref_url="https://bugzilla.suse.com/1186597" source="BUGZILLA"/>
		<reference ref_id="1186598" ref_url="https://bugzilla.suse.com/1186598" source="BUGZILLA"/>
		<reference ref_id="1186600" ref_url="https://bugzilla.suse.com/1186600" source="BUGZILLA"/>
		<reference ref_id="1186603" ref_url="https://bugzilla.suse.com/1186603" source="BUGZILLA"/>
		<reference ref_id="1186604" ref_url="https://bugzilla.suse.com/1186604" source="BUGZILLA"/>
		<reference ref_id="1186605" ref_url="https://bugzilla.suse.com/1186605" source="BUGZILLA"/>
		<reference ref_id="1186613" ref_url="https://bugzilla.suse.com/1186613" source="BUGZILLA"/>
		<reference ref_id="1186614" ref_url="https://bugzilla.suse.com/1186614" source="BUGZILLA"/>
		<reference ref_id="1186615" ref_url="https://bugzilla.suse.com/1186615" source="BUGZILLA"/>
		<reference ref_id="1186616" ref_url="https://bugzilla.suse.com/1186616" source="BUGZILLA"/>
		<reference ref_id="1186658" ref_url="https://bugzilla.suse.com/1186658" source="BUGZILLA"/>
		<reference ref_id="1186660" ref_url="https://bugzilla.suse.com/1186660" source="BUGZILLA"/>
		<reference ref_id="1186757" ref_url="https://bugzilla.suse.com/1186757" source="BUGZILLA"/>
		<reference ref_id="1186758" ref_url="https://bugzilla.suse.com/1186758" source="BUGZILLA"/>
		<reference ref_id="1186762" ref_url="https://bugzilla.suse.com/1186762" source="BUGZILLA"/>
		<reference ref_id="1186763" ref_url="https://bugzilla.suse.com/1186763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17539" ref_url="https://www.suse.com/security/cve/CVE-2019-17539/" source="CVE"/>
		<reference ref_id="CVE-2020-13904" ref_url="https://www.suse.com/security/cve/CVE-2020-13904/" source="CVE"/>
		<reference ref_id="CVE-2020-20448" ref_url="https://www.suse.com/security/cve/CVE-2020-20448/" source="CVE"/>
		<reference ref_id="CVE-2020-20451" ref_url="https://www.suse.com/security/cve/CVE-2020-20451/" source="CVE"/>
		<reference ref_id="CVE-2020-21041" ref_url="https://www.suse.com/security/cve/CVE-2020-21041/" source="CVE"/>
		<reference ref_id="CVE-2020-22015" ref_url="https://www.suse.com/security/cve/CVE-2020-22015/" source="CVE"/>
		<reference ref_id="CVE-2020-22016" ref_url="https://www.suse.com/security/cve/CVE-2020-22016/" source="CVE"/>
		<reference ref_id="CVE-2020-22017" ref_url="https://www.suse.com/security/cve/CVE-2020-22017/" source="CVE"/>
		<reference ref_id="CVE-2020-22019" ref_url="https://www.suse.com/security/cve/CVE-2020-22019/" source="CVE"/>
		<reference ref_id="CVE-2020-22020" ref_url="https://www.suse.com/security/cve/CVE-2020-22020/" source="CVE"/>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2020-22022" ref_url="https://www.suse.com/security/cve/CVE-2020-22022/" source="CVE"/>
		<reference ref_id="CVE-2020-22023" ref_url="https://www.suse.com/security/cve/CVE-2020-22023/" source="CVE"/>
		<reference ref_id="CVE-2020-22025" ref_url="https://www.suse.com/security/cve/CVE-2020-22025/" source="CVE"/>
		<reference ref_id="CVE-2020-22026" ref_url="https://www.suse.com/security/cve/CVE-2020-22026/" source="CVE"/>
		<reference ref_id="CVE-2020-22031" ref_url="https://www.suse.com/security/cve/CVE-2020-22031/" source="CVE"/>
		<reference ref_id="CVE-2020-22032" ref_url="https://www.suse.com/security/cve/CVE-2020-22032/" source="CVE"/>
		<reference ref_id="CVE-2020-22033" ref_url="https://www.suse.com/security/cve/CVE-2020-22033/" source="CVE"/>
		<reference ref_id="CVE-2020-22034" ref_url="https://www.suse.com/security/cve/CVE-2020-22034/" source="CVE"/>
		<reference ref_id="CVE-2020-22038" ref_url="https://www.suse.com/security/cve/CVE-2020-22038/" source="CVE"/>
		<reference ref_id="CVE-2020-22039" ref_url="https://www.suse.com/security/cve/CVE-2020-22039/" source="CVE"/>
		<reference ref_id="CVE-2020-22043" ref_url="https://www.suse.com/security/cve/CVE-2020-22043/" source="CVE"/>
		<reference ref_id="CVE-2020-22044" ref_url="https://www.suse.com/security/cve/CVE-2020-22044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009140.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-13904: Fixed use-after-free via a crafted EXTINF duration in an m3u8 file (bsc#1172640).
- CVE-2020-21041: Fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c  (bsc#1186406).
- CVE-2019-17539: Fixed NULL pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
- CVE-2020-22026: Fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
- CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
- CVE-2020-22020: Fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
- CVE-2020-22015: Fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
- CVE-2020-22016: Fixed a heap-based Buffer Overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
- CVE-2020-22017: Fixed a heap-based Buffer Overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
- CVE-2020-22022: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
- CVE-2020-22023: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604)
- CVE-2020-22025: Fixed a heap-based Buffer Overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
- CVE-2020-22031: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
- CVE-2020-22032: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
- CVE-2020-22034: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
- CVE-2020-20451: Fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
- CVE-2020-20448: Fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
- CVE-2020-22038: Fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
- CVE-2020-22039: Fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
- CVE-2020-22043: Fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
- CVE-2020-22044: Fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
- CVE-2020-22033,CVE-2020-22019: Fixed a heap-based Buffer Overflow Vulnerability at libavfilter/vf_vmafmotion.c in convolution_y_8bit() and in convolution_y_10bit() in libavfilter/vf_vmafmotion.c (bsc#1186615, bsc#1186597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172640">SUSE bug 1172640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186406">SUSE bug 1186406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186583">SUSE bug 1186583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186586">SUSE bug 1186586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186587">SUSE bug 1186587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186596">SUSE bug 1186596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186597">SUSE bug 1186597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186598">SUSE bug 1186598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186600">SUSE bug 1186600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186603">SUSE bug 1186603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186604">SUSE bug 1186604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186605">SUSE bug 1186605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186613">SUSE bug 1186613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186614">SUSE bug 1186614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186615">SUSE bug 1186615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186616">SUSE bug 1186616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186658">SUSE bug 1186658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186660">SUSE bug 1186660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186757">SUSE bug 1186757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186758">SUSE bug 1186758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186762">SUSE bug 1186762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186763">SUSE bug 1186763</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17539/">CVE-2019-17539</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13904/">CVE-2020-13904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20448/">CVE-2020-20448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20451/">CVE-2020-20451</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21041/">CVE-2020-21041</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22015/">CVE-2020-22015</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-22016/">CVE-2020-22016</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22017/">CVE-2020-22017</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22019/">CVE-2020-22019</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22020/">CVE-2020-22020</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22022/">CVE-2020-22022</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22023/">CVE-2020-22023</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22025/">CVE-2020-22025</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22026/">CVE-2020-22026</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22031/">CVE-2020-22031</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22032/">CVE-2020-22032</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22033/">CVE-2020-22033</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22034/">CVE-2020-22034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22038/">CVE-2020-22038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22039/">CVE-2020-22039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22043/">CVE-2020-22043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22044/">CVE-2020-22044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615885" comment="libavcodec57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615886" comment="libavformat57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615887" comment="libavutil-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615888" comment="libavutil55-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615889" comment="libpostproc-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615890" comment="libpostproc54-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615891" comment="libswresample-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615892" comment="libswresample2-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615893" comment="libswscale-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615894" comment="libswscale4-3.4.2-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110427" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019626.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.12.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-29 (bsc#1188275)

* CVE-2021-29970 (bmo#1709976): Use-after-free in accessibility features of a document
* CVE-2021-30547 (bmo#1715766): Out of bounds write in ANGLE
* CVE-2021-29976 (bmo#1700895, bmo#1703334, bmo#1706910, bmo#1711576, bmo#1714391): Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625193" comment="MozillaFirefox-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625194" comment="MozillaFirefox-devel-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625195" comment="MozillaFirefox-translations-common-78.12.0-8.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625196" comment="MozillaFirefox-translations-other-78.12.0-8.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110428" version="1" class="patch">
	<metadata>
		<title>Security update for caribou (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186617" ref_url="https://bugzilla.suse.com/1186617" source="BUGZILLA"/>
		<reference ref_id="1187112" ref_url="https://bugzilla.suse.com/1187112" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3567" ref_url="https://www.suse.com/security/cve/CVE-2021-3567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009161.html" source="SUSE-SU"/>
		<description>
This update for caribou fixes the following issues:

Security issue fixed:

- CVE-2021-3567: Fixed a segfault when attempting to use shifted characters (bsc#1186617).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186617">SUSE bug 1186617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187112">SUSE bug 1187112</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3567/">CVE-2021-3567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624118" comment="caribou-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624119" comment="caribou-common-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624120" comment="caribou-devel-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624121" comment="caribou-gtk-module-common-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624122" comment="caribou-gtk2-module-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624123" comment="caribou-gtk3-module-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624124" comment="caribou-lang-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624125" comment="libcaribou0-0.4.21-12.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624126" comment="typelib-1_0-Caribou-1_0-0.4.21-12.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110429" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186790" ref_url="https://bugzilla.suse.com/1186790" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009205.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update wireshark to 3.4.6.

Including a fix for:

- DVB-S2-BB dissector infinite loop (bsc#1186790).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186790">SUSE bug 1186790</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624706" comment="wireshark-devel-3.4.6-3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624707" comment="wireshark-ui-qt-3.4.6-3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110430" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008260.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.7.0 ESR  (MFSA 2021-04, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495829" comment="MozillaFirefox-78.7.0-8.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495830" comment="MozillaFirefox-devel-78.7.0-8.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495831" comment="MozillaFirefox-translations-common-78.7.0-8.26.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495832" comment="MozillaFirefox-translations-other-78.7.0-8.26.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110431" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21775" ref_url="https://www.suse.com/security/cve/CVE-2021-21775/" source="CVE"/>
		<reference ref_id="CVE-2021-21779" ref_url="https://www.suse.com/security/cve/CVE-2021-21779/" source="CVE"/>
		<reference ref_id="CVE-2021-30663" ref_url="https://www.suse.com/security/cve/CVE-2021-30663/" source="CVE"/>
		<reference ref_id="CVE-2021-30665" ref_url="https://www.suse.com/security/cve/CVE-2021-30665/" source="CVE"/>
		<reference ref_id="CVE-2021-30689" ref_url="https://www.suse.com/security/cve/CVE-2021-30689/" source="CVE"/>
		<reference ref_id="CVE-2021-30720" ref_url="https://www.suse.com/security/cve/CVE-2021-30720/" source="CVE"/>
		<reference ref_id="CVE-2021-30734" ref_url="https://www.suse.com/security/cve/CVE-2021-30734/" source="CVE"/>
		<reference ref_id="CVE-2021-30744" ref_url="https://www.suse.com/security/cve/CVE-2021-30744/" source="CVE"/>
		<reference ref_id="CVE-2021-30749" ref_url="https://www.suse.com/security/cve/CVE-2021-30749/" source="CVE"/>
		<reference ref_id="CVE-2021-30758" ref_url="https://www.suse.com/security/cve/CVE-2021-30758/" source="CVE"/>
		<reference ref_id="CVE-2021-30795" ref_url="https://www.suse.com/security/cve/CVE-2021-30795/" source="CVE"/>
		<reference ref_id="CVE-2021-30797" ref_url="https://www.suse.com/security/cve/CVE-2021-30797/" source="CVE"/>
		<reference ref_id="CVE-2021-30799" ref_url="https://www.suse.com/security/cve/CVE-2021-30799/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009247.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.3:
- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21775/">CVE-2021-21775</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21779/">CVE-2021-21779</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30663/">CVE-2021-30663</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30665/">CVE-2021-30665</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30689/">CVE-2021-30689</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30720/">CVE-2021-30720</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30734/">CVE-2021-30734</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30744/">CVE-2021-30744</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30749/">CVE-2021-30749</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30758/">CVE-2021-30758</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30795/">CVE-2021-30795</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30797/">CVE-2021-30797</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30799/">CVE-2021-30799</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626884" comment="typelib-1_0-JavaScriptCore-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626885" comment="typelib-1_0-WebKit2-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626886" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626887" comment="webkit2gtk3-devel-2.32.3-9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110432" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009253.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627351" comment="libdjvulibre-devel-3.5.27-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627352" comment="libdjvulibre21-3.5.27-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110433" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009311.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.13.0 ESR (MFSA 2021-34, bsc#1188891):

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-19"/>
	<updated date="2021-08-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630560" comment="MozillaFirefox-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630561" comment="MozillaFirefox-devel-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630562" comment="MozillaFirefox-translations-common-78.13.0-8.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630563" comment="MozillaFirefox-translations-other-78.13.0-8.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110434" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188034" ref_url="https://bugzilla.suse.com/1188034" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009317.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. (bsc#1188875)
- Change PASSWORDLEN from 64 to 256 (bsc#1188034)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188034">SUSE bug 1188034</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628202" comment="fetchmailconf-6.3.26-20.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110435" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188539" ref_url="https://bugzilla.suse.com/1188539" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36430" ref_url="https://www.suse.com/security/cve/CVE-2020-36430/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009325.html" source="SUSE-SU"/>
		<description>
This update for libass fixes the following issues:

- CVE-2020-36430: Fixed heap-based buffer overflow in decode_chars (bsc#1188539).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188539">SUSE bug 1188539</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36430/">CVE-2020-36430</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628040" comment="libass-devel-0.14.0-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628041" comment="libass9-0.14.0-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110436" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188457" ref_url="https://bugzilla.suse.com/1188457" source="BUGZILLA"/>
		<reference ref_id="1188458" ref_url="https://bugzilla.suse.com/1188458" source="BUGZILLA"/>
		<reference ref_id="1188459" ref_url="https://bugzilla.suse.com/1188459" source="BUGZILLA"/>
		<reference ref_id="1188460" ref_url="https://bugzilla.suse.com/1188460" source="BUGZILLA"/>
		<reference ref_id="1188461" ref_url="https://bugzilla.suse.com/1188461" source="BUGZILLA"/>
		<reference ref_id="1188462" ref_url="https://bugzilla.suse.com/1188462" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20298" ref_url="https://www.suse.com/security/cve/CVE-2021-20298/" source="CVE"/>
		<reference ref_id="CVE-2021-20299" ref_url="https://www.suse.com/security/cve/CVE-2021-20299/" source="CVE"/>
		<reference ref_id="CVE-2021-20300" ref_url="https://www.suse.com/security/cve/CVE-2021-20300/" source="CVE"/>
		<reference ref_id="CVE-2021-20302" ref_url="https://www.suse.com/security/cve/CVE-2021-20302/" source="CVE"/>
		<reference ref_id="CVE-2021-20303" ref_url="https://www.suse.com/security/cve/CVE-2021-20303/" source="CVE"/>
		<reference ref_id="CVE-2021-20304" ref_url="https://www.suse.com/security/cve/CVE-2021-20304/" source="CVE"/>
		<reference ref_id="CVE-2021-3476" ref_url="https://www.suse.com/security/cve/CVE-2021-3476/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2793-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009313.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-20298 [bsc#1188460]: Fixed Out-of-memory in B44Compressor
- CVE-2021-20299 [bsc#1188459]: Fixed Null-dereference READ in Imf_2_5:Header:operator
- CVE-2021-20300 [bsc#1188458]: Fixed Integer-overflow in Imf_2_5:hufUncompress
- CVE-2021-20302 [bsc#1188462]: Fixed Floating-point-exception in Imf_2_5:precalculateTileInfot
- CVE-2021-20303 [bsc#1188457]: Fixed Heap-buffer-overflow in Imf_2_5::copyIntoFrameBuffer
- CVE-2021-20304 [bsc#1188461]: Fixed Undefined-shift in Imf_2_5:hufDecode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188457">SUSE bug 1188457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188458">SUSE bug 1188458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188459">SUSE bug 1188459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188460">SUSE bug 1188460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188461">SUSE bug 1188461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188462">SUSE bug 1188462</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20298/">CVE-2021-20298</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20299/">CVE-2021-20299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20300/">CVE-2021-20300</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20302/">CVE-2021-20302</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-20303/">CVE-2021-20303</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20304/">CVE-2021-20304</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3476/">CVE-2021-3476</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627865" comment="libIlmImf-2_2-23-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627866" comment="libIlmImfUtil-2_2-23-2.2.1-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627867" comment="openexr-devel-2.2.1-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110437" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1129714" ref_url="https://bugzilla.suse.com/1129714" source="BUGZILLA"/>
		<reference ref_id="1186849" ref_url="https://bugzilla.suse.com/1186849" source="BUGZILLA"/>
		<reference ref_id="1186859" ref_url="https://bugzilla.suse.com/1186859" source="BUGZILLA"/>
		<reference ref_id="1186861" ref_url="https://bugzilla.suse.com/1186861" source="BUGZILLA"/>
		<reference ref_id="1186863" ref_url="https://bugzilla.suse.com/1186863" source="BUGZILLA"/>
		<reference ref_id="1189142" ref_url="https://bugzilla.suse.com/1189142" source="BUGZILLA"/>
		<reference ref_id="1189348" ref_url="https://bugzilla.suse.com/1189348" source="BUGZILLA"/>
		<reference ref_id="1189350" ref_url="https://bugzilla.suse.com/1189350" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9721" ref_url="https://www.suse.com/security/cve/CVE-2019-9721/" source="CVE"/>
		<reference ref_id="CVE-2020-21688" ref_url="https://www.suse.com/security/cve/CVE-2020-21688/" source="CVE"/>
		<reference ref_id="CVE-2020-21697" ref_url="https://www.suse.com/security/cve/CVE-2020-21697/" source="CVE"/>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2020-22048" ref_url="https://www.suse.com/security/cve/CVE-2020-22048/" source="CVE"/>
		<reference ref_id="CVE-2020-22049" ref_url="https://www.suse.com/security/cve/CVE-2020-22049/" source="CVE"/>
		<reference ref_id="CVE-2020-22054" ref_url="https://www.suse.com/security/cve/CVE-2020-22054/" source="CVE"/>
		<reference ref_id="CVE-2021-38114" ref_url="https://www.suse.com/security/cve/CVE-2021-38114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009387.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2019-9721: Fix denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
- CVE-2020-22046: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
- CVE-2020-22048: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
- CVE-2020-22049: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
- CVE-2020-22054: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
- CVE-2020-21688: Fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
- CVE-2020-21697: Fixed a heap-use-after-free in the mpeg_mux_write_packet function in libavformat/mpegenc.c (bsc#1189350).
- CVE-2021-38114: Fixed a not checked return value of the init_vlc function (bsc#1189142).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129714">SUSE bug 1129714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186849">SUSE bug 1186849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186859">SUSE bug 1186859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186861">SUSE bug 1186861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186863">SUSE bug 1186863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189142">SUSE bug 1189142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189348">SUSE bug 1189348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189350">SUSE bug 1189350</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9721/">CVE-2019-9721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21688/">CVE-2020-21688</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21697/">CVE-2020-21697</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22048/">CVE-2020-22048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22049/">CVE-2020-22049</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22054/">CVE-2020-22054</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38114/">CVE-2021-38114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631132" comment="libavcodec57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631133" comment="libavformat57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631134" comment="libavresample-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631135" comment="libavresample3-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631136" comment="libavresample3-32bit-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631137" comment="libavutil-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631138" comment="libavutil55-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631139" comment="libpostproc-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631140" comment="libpostproc54-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631141" comment="libswresample-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631142" comment="libswresample2-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631143" comment="libswscale-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631144" comment="libswscale4-3.4.2-11.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110438" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189497" ref_url="https://bugzilla.suse.com/1189497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30475" ref_url="https://www.suse.com/security/cve/CVE-2021-30475/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009426.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30475: Fixed buffer overflow in aom_dsp/noise_model.c (bsc#1189497).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189497">SUSE bug 1189497</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30475/">CVE-2021-30475</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632524" comment="libaom0-1.0.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110439" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188375" ref_url="https://bugzilla.suse.com/1188375" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22235" ref_url="https://www.suse.com/security/cve/CVE-2021-22235/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009432.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.7

- CVE-2021-22235: Fixed DNP dissector crash (bsc#1188375).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188375">SUSE bug 1188375</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22235/">CVE-2021-22235</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632018" comment="wireshark-devel-3.4.7-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632019" comment="wireshark-ui-qt-3.4.7-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110440" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="1190381" ref_url="https://bugzilla.suse.com/1190381" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3781" ref_url="https://www.suse.com/security/cve/CVE-2021-3781/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009444.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

Security issue fixed:

- CVE-2021-3781: Fixed a trivial -dSAFER bypass command injection (bsc#1190381)

Also a hardening fix was added:

- Link as position independent executable (bsc#1184123)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-15"/>
	<updated date="2021-09-15"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190381">SUSE bug 1190381</bugzilla>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3781/">CVE-2021-3781</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632744" comment="libspectre-devel-0.2.8-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632745" comment="libspectre1-0.2.8-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110441" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189724" ref_url="https://bugzilla.suse.com/1189724" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38171" ref_url="https://www.suse.com/security/cve/CVE-2021-38171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009495.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-38171: Fixed adts_decode_extradata in libavformat/adtsenc.c to check the init_get_bits return value (bsc#1189724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189724">SUSE bug 1189724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38171/">CVE-2021-38171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633282" comment="libavcodec57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633283" comment="libavformat57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633284" comment="libavresample-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633285" comment="libavresample3-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633286" comment="libavresample3-32bit-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633287" comment="libavutil-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633288" comment="libavutil55-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633289" comment="libpostproc-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633290" comment="libpostproc54-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633291" comment="libswresample-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633292" comment="libswresample2-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633293" comment="libswscale-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633294" comment="libswscale4-3.4.2-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110442" version="1" class="patch">
	<metadata>
		<title>Security update for grilo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189839" ref_url="https://bugzilla.suse.com/1189839" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009493.html" source="SUSE-SU"/>
		<description>
This update for grilo fixes the following issues:

- CVE-2021-39365: Fixed missing TLS certificate verification (bsc#1189839).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189839">SUSE bug 1189839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633275" comment="grilo-devel-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633276" comment="libgrilo-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633277" comment="libgrlnet-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633278" comment="libgrlpls-0_3-0-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633279" comment="typelib-1_0-Grl-0_3-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633280" comment="typelib-1_0-GrlNet-0_3-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633281" comment="typelib-1_0-GrlPls-0_3-0.3.12-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110443" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190400" ref_url="https://bugzilla.suse.com/1190400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40812" ref_url="https://www.suse.com/security/cve/CVE-2021-40812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009510.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

- CVE-2021-40812: Fixed out-of-bounds read caused by the lack of certain gdGetBuf and gdPutBuf return value checks (bsc#1190400).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190400">SUSE bug 1190400</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40812/">CVE-2021-40812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633466" comment="gd-2.2.5-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633464" comment="gd-devel-2.2.5-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110444" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186761" ref_url="https://bugzilla.suse.com/1186761" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22042" ref_url="https://www.suse.com/security/cve/CVE-2020-22042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009540.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-22042: Fixed a denial of service vulnerability led by a memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (bsc#1186761)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186761">SUSE bug 1186761</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22042/">CVE-2020-22042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634415" comment="libavcodec57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634416" comment="libavformat57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634417" comment="libavresample-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634418" comment="libavresample3-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634419" comment="libavresample3-32bit-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634420" comment="libavutil-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634421" comment="libavutil55-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634422" comment="libpostproc-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634423" comment="libpostproc54-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634424" comment="libswresample-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634425" comment="libswresample2-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634426" comment="libswscale-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634427" comment="libswscale4-3.4.2-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110445" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186799" ref_url="https://bugzilla.suse.com/1186799" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30474" ref_url="https://www.suse.com/security/cve/CVE-2021-30474/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009569.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30474: Fixed use-after-free in aom_dsp/grain_table.c (bsc#1186799).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1186799">SUSE bug 1186799</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30474/">CVE-2021-30474</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633465" comment="libaom0-1.0.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110446" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188697" ref_url="https://bugzilla.suse.com/1188697" source="BUGZILLA"/>
		<reference ref_id="1190701" ref_url="https://bugzilla.suse.com/1190701" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21806" ref_url="https://www.suse.com/security/cve/CVE-2021-21806/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009572.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188697">SUSE bug 1188697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190701">SUSE bug 1190701</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21806/">CVE-2021-21806</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634060" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634061" comment="typelib-1_0-WebKit2-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634062" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634063" comment="webkit2gtk3-devel-2.32.4-12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110447" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184783" ref_url="https://bugzilla.suse.com/1184783" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3481" ref_url="https://www.suse.com/security/cve/CVE-2021-3481/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009575.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtsvg fixes the following issues:

- CVE-2021-3481: Fixed an out of bounds read in function QRadialFetchSimd from crafted svg file. (bsc#1184783)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184783">SUSE bug 1184783</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3481/">CVE-2021-3481</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634568" comment="libqt5-qtsvg-private-headers-devel-5.12.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110448" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1190274" ref_url="https://bugzilla.suse.com/1190274" source="BUGZILLA"/>
		<reference ref_id="1190710" ref_url="https://bugzilla.suse.com/1190710" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29983" ref_url="https://www.suse.com/security/cve/CVE-2021-29983/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="CVE-2021-29990" ref_url="https://www.suse.com/security/cve/CVE-2021-29990/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009602.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

This update contains the Firefox Extended Support Release 91.2.0 ESR.

Release 91.2.0 ESR:

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332):

* CVE-2021-38496: Use-after-free in MessageTask
* CVE-2021-38497: Validation message could have been overlaid on another origin
* CVE-2021-38498: Use-after-free of nsLanguageAtomService object
* CVE-2021-32810: Fixed Data race in crossbeam-deque
* CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
* CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Release 91.1.0 ESR:

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274):

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Release 91.0.1esr ESR:

* Fixed: Fixed an issue causing buttons on the tab bar to be
  resized when loading certain websites (bug 1704404)
* Fixed: Fixed an issue which caused tabs from private windows
  to be visible in non-private windows when viewing switch-to-
  tab results in the address bar panel (bug 1720369)
* Fixed: Various stability fixes
* Fixed: Security fix MFSA 2021-37 (bsc#1189547)
* CVE-2021-29991 (bmo#1724896)
  Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

* New: Some of the highlights of the new Extended Support Release are:

  - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
  - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
  - On Windows, updates can now be applied in the background
    while Firefox is not running.
  - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
  - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
  - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
  - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
  - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
  - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
  - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
  - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
  - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
  - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
  - We’ve improved functionality and design for a number of
    Firefox search features:
    * Selecting a search engine at the bottom of the search
      panel now enters search mode for that engine, allowing you to
      see suggestions (if available) for your search terms. The old
      behavior (immediately performing a search) is available with
      a shift-click.
    * When Firefox autocompletes the URL of one of your search
      engines, you can now search with that engine directly in the
      address bar by selecting the shortcut in the address bar
      results.
    * We’ve added buttons at the bottom of the search panel to
      allow you to search your bookmarks, open tabs, and history.
  - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
  - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
  - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
* Changed: Firefox no longer supports Adobe Flash. There is no
  setting available to re-enable Flash support.
* Enterprise: Various bug fixes and new policies have been
  implemented in the latest version of Firefox. See more
  details in the Firefox for Enterprise 91 Release Notes.

  MFSA 2021-33 (bsc#1188891):

* CVE-2021-29986: Race condition when resolving DNS names could have led to
  memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting
  assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to
  memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted
  permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and
  type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-16"/>
	<updated date="2021-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190274">SUSE bug 1190274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190710">SUSE bug 1190710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-29983/">CVE-2021-29983</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29990/">CVE-2021-29990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651642" comment="MozillaFirefox-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651643" comment="MozillaFirefox-branding-SLE-91-9.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651644" comment="MozillaFirefox-devel-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651645" comment="MozillaFirefox-translations-common-91.2.0-8.54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651646" comment="MozillaFirefox-translations-other-91.2.0-8.54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110449" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191507" ref_url="https://bugzilla.suse.com/1191507" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41133" ref_url="https://www.suse.com/security/cve/CVE-2021-41133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009617.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

- Update to version 1.10.5:
- CVE-2021-41133: Fixed a bug that could lead to sandbox bypass via recent VFS-manipulating syscalls. (bsc#1191507)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191507">SUSE bug 1191507</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41133/">CVE-2021-41133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651649" comment="flatpak-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651650" comment="flatpak-devel-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651651" comment="flatpak-zsh-completion-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651652" comment="libflatpak0-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651653" comment="system-user-flatpak-1.10.5-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651654" comment="typelib-1_0-Flatpak-1_0-1.10.5-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110450" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651647" comment="python-tk-2.7.18-33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110451" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3493-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020542.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-39272: Fix failure to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH. (bsc#1190069)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651648" comment="fetchmailconf-6.3.26-20.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110452" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186756" ref_url="https://bugzilla.suse.com/1186756" source="BUGZILLA"/>
		<reference ref_id="1187852" ref_url="https://bugzilla.suse.com/1187852" source="BUGZILLA"/>
		<reference ref_id="1189166" ref_url="https://bugzilla.suse.com/1189166" source="BUGZILLA"/>
		<reference ref_id="1190718" ref_url="https://bugzilla.suse.com/1190718" source="BUGZILLA"/>
		<reference ref_id="1190719" ref_url="https://bugzilla.suse.com/1190719" source="BUGZILLA"/>
		<reference ref_id="1190722" ref_url="https://bugzilla.suse.com/1190722" source="BUGZILLA"/>
		<reference ref_id="1190723" ref_url="https://bugzilla.suse.com/1190723" source="BUGZILLA"/>
		<reference ref_id="1190726" ref_url="https://bugzilla.suse.com/1190726" source="BUGZILLA"/>
		<reference ref_id="1190729" ref_url="https://bugzilla.suse.com/1190729" source="BUGZILLA"/>
		<reference ref_id="1190733" ref_url="https://bugzilla.suse.com/1190733" source="BUGZILLA"/>
		<reference ref_id="1190734" ref_url="https://bugzilla.suse.com/1190734" source="BUGZILLA"/>
		<reference ref_id="1190735" ref_url="https://bugzilla.suse.com/1190735" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-20891" ref_url="https://www.suse.com/security/cve/CVE-2020-20891/" source="CVE"/>
		<reference ref_id="CVE-2020-20892" ref_url="https://www.suse.com/security/cve/CVE-2020-20892/" source="CVE"/>
		<reference ref_id="CVE-2020-20895" ref_url="https://www.suse.com/security/cve/CVE-2020-20895/" source="CVE"/>
		<reference ref_id="CVE-2020-20896" ref_url="https://www.suse.com/security/cve/CVE-2020-20896/" source="CVE"/>
		<reference ref_id="CVE-2020-20899" ref_url="https://www.suse.com/security/cve/CVE-2020-20899/" source="CVE"/>
		<reference ref_id="CVE-2020-20902" ref_url="https://www.suse.com/security/cve/CVE-2020-20902/" source="CVE"/>
		<reference ref_id="CVE-2020-22037" ref_url="https://www.suse.com/security/cve/CVE-2020-22037/" source="CVE"/>
		<reference ref_id="CVE-2020-35965" ref_url="https://www.suse.com/security/cve/CVE-2020-35965/" source="CVE"/>
		<reference ref_id="CVE-2021-3566" ref_url="https://www.suse.com/security/cve/CVE-2021-3566/" source="CVE"/>
		<reference ref_id="CVE-2021-38092" ref_url="https://www.suse.com/security/cve/CVE-2021-38092/" source="CVE"/>
		<reference ref_id="CVE-2021-38093" ref_url="https://www.suse.com/security/cve/CVE-2021-38093/" source="CVE"/>
		<reference ref_id="CVE-2021-38094" ref_url="https://www.suse.com/security/cve/CVE-2021-38094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009650.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-3566: Fixed information leak (bsc#1189166).
- CVE-2021-38093: Fixed integer overflow vulnerability in filter_robert() (bsc#1190734)
- CVE-2021-38092: Fixed integer overflow vulnerability in filter_prewitt() (bsc#1190733)
- CVE-2021-38094: Fixed integer overflow vulnerability in filter_sobel() (bsc#1190735)
- CVE-2020-22037: Fixed denial of service vulnerability caused by memory leak in avcodec_alloc_context3() (bsc#1186756)
- CVE-2020-35965: Fixed out-of-bounds write in decode_frame() (bsc#1187852)
- CVE-2020-20892: Fixed an issue with filter_frame() (bsc#1190719)
- CVE-2020-20891: Fixed a buffer overflow vulnerability in config_input() (bsc#1190718)
- CVE-2020-20895: Fixed a buffer overflow vulnerability in function filter_vertically_##name (bsc#1190722)
- CVE-2020-20896: Fixed an issue with latm_write_packet() (bsc#1190723)
- CVE-2020-20899: Fixed a buffer overflow vulnerability in config_props() (bsc#1190726)
- CVE-2020-20902: Fixed an out-of-bounds read vulnerabilit long_term_filter() (bsc#1190729)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186756">SUSE bug 1186756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187852">SUSE bug 1187852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189166">SUSE bug 1189166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190718">SUSE bug 1190718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190719">SUSE bug 1190719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190722">SUSE bug 1190722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190723">SUSE bug 1190723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190726">SUSE bug 1190726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190729">SUSE bug 1190729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190733">SUSE bug 1190733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190734">SUSE bug 1190734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190735">SUSE bug 1190735</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20891/">CVE-2020-20891</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20892/">CVE-2020-20892</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20895/">CVE-2020-20895</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20896/">CVE-2020-20896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20899/">CVE-2020-20899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20902/">CVE-2020-20902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22037/">CVE-2020-22037</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35965/">CVE-2020-35965</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3566/">CVE-2021-3566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38092/">CVE-2021-38092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38093/">CVE-2021-38093</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38094/">CVE-2021-38094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652744" comment="libavcodec57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652745" comment="libavformat57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652746" comment="libavresample-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652747" comment="libavresample3-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652748" comment="libavresample3-32bit-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652749" comment="libavutil-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652750" comment="libavutil55-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652751" comment="libpostproc-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652752" comment="libpostproc54-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652753" comment="libswresample-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652754" comment="libswresample2-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652755" comment="libswscale-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652756" comment="libswscale4-3.4.2-11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110453" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495833" comment="python-tk-2.7.17-7.52.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110454" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191937" ref_url="https://bugzilla.suse.com/1191937" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42762" ref_url="https://www.suse.com/security/cve/CVE-2021-42762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009691.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-42762: Updated seccomp rules with latest changes from flatpak (bsc#1191937).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191937">SUSE bug 1191937</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42762/">CVE-2021-42762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653653" comment="typelib-1_0-JavaScriptCore-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653654" comment="typelib-1_0-WebKit2-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653655" comment="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653656" comment="webkit2gtk3-devel-2.32.4-15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110455" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009752.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.3.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-49 (bsc#1192250)

  * CVE-2021-38503: iframe sandbox rules did not apply to XSLT stylesheets
  * CVE-2021-38504: Use-after-free in file picker dialog
  * CVE-2021-38505: Windows 10 Cloud Clipboard may have recorded sensitive user data
  * CVE-2021-38506: Firefox could be coaxed into going into fullscreen mode without notification or warning
  * CVE-2021-38507: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
  * CVE-2021-38508: Permission Prompt could be overlaid, resulting in user confusion and potential spoofing
  * CVE-2021-38509: Javascript alert box could have been spoofed onto an arbitrary domain
  * CVE-2021-38510: Download Protections were bypassed by .inetloc files on Mac OS
  * MOZ-2021-0008: Use-after-free in HTTP2 Session object
  * MOZ-2021-0007: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654090" comment="MozillaFirefox-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654091" comment="MozillaFirefox-devel-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654092" comment="MozillaFirefox-translations-common-91.3.0-152.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654093" comment="MozillaFirefox-translations-other-91.3.0-152.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110456" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192498" ref_url="https://bugzilla.suse.com/1192498" source="BUGZILLA"/>
		<reference ref_id="1192556" ref_url="https://bugzilla.suse.com/1192556" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3933" ref_url="https://www.suse.com/security/cve/CVE-2021-3933/" source="CVE"/>
		<reference ref_id="CVE-2021-3941" ref_url="https://www.suse.com/security/cve/CVE-2021-3941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009803.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-3941: Fixed divide-by-zero in Imf_3_1:RGBtoXYZ (bsc#1192556).
- CVE-2021-3933: Fixed integer-overflow in Imf_3_1:bytesPerDeepLineTable (bsc#1192498).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192498">SUSE bug 1192498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192556">SUSE bug 1192556</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3933/">CVE-2021-3933</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3941/">CVE-2021-3941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656737" comment="libIlmImf-2_2-23-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656738" comment="libIlmImfUtil-2_2-23-2.2.1-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656739" comment="openexr-devel-2.2.1-3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110457" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192063" ref_url="https://bugzilla.suse.com/1192063" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009815.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- CVE-2021-30846: Fixed memory corruption issue that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).
- CVE-2021-30851: Fixed memory corruption vulnerability that could lead to arbitrary code execution when processing maliciously crafted web content (bsc#1192063).   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-02"/>
	<updated date="2021-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192063">SUSE bug 1192063</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657446" comment="typelib-1_0-JavaScriptCore-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657447" comment="typelib-1_0-WebKit2-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657448" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.1-18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657449" comment="webkit2gtk3-devel-2.34.1-18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110458" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192830" ref_url="https://bugzilla.suse.com/1192830" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39920" ref_url="https://www.suse.com/security/cve/CVE-2021-39920/" source="CVE"/>
		<reference ref_id="CVE-2021-39921" ref_url="https://www.suse.com/security/cve/CVE-2021-39921/" source="CVE"/>
		<reference ref_id="CVE-2021-39922" ref_url="https://www.suse.com/security/cve/CVE-2021-39922/" source="CVE"/>
		<reference ref_id="CVE-2021-39924" ref_url="https://www.suse.com/security/cve/CVE-2021-39924/" source="CVE"/>
		<reference ref_id="CVE-2021-39925" ref_url="https://www.suse.com/security/cve/CVE-2021-39925/" source="CVE"/>
		<reference ref_id="CVE-2021-39926" ref_url="https://www.suse.com/security/cve/CVE-2021-39926/" source="CVE"/>
		<reference ref_id="CVE-2021-39928" ref_url="https://www.suse.com/security/cve/CVE-2021-39928/" source="CVE"/>
		<reference ref_id="CVE-2021-39929" ref_url="https://www.suse.com/security/cve/CVE-2021-39929/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009860.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

- Update to Wireshark 3.4.10:
- CVE-2021-39920: IPPUSB dissector crash (bsc#1192830).
- CVE-2021-39921: Modbus dissector crash (bsc#1192830).
- CVE-2021-39922: C12.22 dissector crash (bsc#1192830).
- CVE-2021-39924: Bluetooth DHT dissector large loop (bsc#1192830).
- CVE-2021-39925: Bluetooth SDP dissector crash (bsc#1192830).
- CVE-2021-39926: Bluetooth HCI_ISO dissector crash (bsc#1192830).
- CVE-2021-39928: IEEE 802.11 dissector crash (bsc#1192830).
- CVE-2021-39929: Bluetooth DHT dissector crash (bsc#1192830).      
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192830">SUSE bug 1192830</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39920/">CVE-2021-39920</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39921/">CVE-2021-39921</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39922/">CVE-2021-39922</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39924/">CVE-2021-39924</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39925/">CVE-2021-39925</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39926/">CVE-2021-39926</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39928/">CVE-2021-39928</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39929/">CVE-2021-39929</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658091" comment="wireshark-devel-3.4.10-3.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658092" comment="wireshark-ui-qt-3.4.10-3.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110459" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193321" ref_url="https://bugzilla.suse.com/1193321" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009878.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Update to Extended Support Release 91.4.0 (bsc#1193485):

- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4
- Removed x-scheme-handler/ftp from MozillaFirefox.desktop (bsc#1193321)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193321">SUSE bug 1193321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659329" comment="MozillaFirefox-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659330" comment="MozillaFirefox-devel-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659331" comment="MozillaFirefox-translations-common-91.4.0-152.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659332" comment="MozillaFirefox-translations-other-91.4.0-152.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110460" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009880.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed division by zero caused by processing crafted file (bsc#1181836).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659295" comment="ImageMagick-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659296" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659297" comment="ImageMagick-config-7-upstream-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659298" comment="ImageMagick-devel-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659299" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659300" comment="libMagick++-devel-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659301" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659302" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110461" version="1" class="patch">
	<metadata>
		<title>Security update for fetchmail (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152964" ref_url="https://bugzilla.suse.com/1152964" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1188875" ref_url="https://bugzilla.suse.com/1188875" source="BUGZILLA"/>
		<reference ref_id="1190069" ref_url="https://bugzilla.suse.com/1190069" source="BUGZILLA"/>
		<reference ref_id="1190896" ref_url="https://bugzilla.suse.com/1190896" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36386" ref_url="https://www.suse.com/security/cve/CVE-2021-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-39272" ref_url="https://www.suse.com/security/cve/CVE-2021-39272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009892.html" source="SUSE-SU"/>
		<description>
This update for fetchmail fixes the following issues:

- CVE-2021-36386: Fixed DoS or information disclosure in some configurations (bsc#1188875).
- CVE-2021-39272: Fixed STARTTLS session encryption bypassing (fetchmail-SA-2021-02) (bsc#1190069).

- Update to 6.4.22 (bsc#1152964, jsc#SLE-18159, jsc#SLE-17903, jsc#SLE-18059)
- Remove all python2 dependencies (bsc#1190896).
- De-hardcode /usr/lib path for launch executable (bsc#1174075).
- Added hardening to systemd service(s) (bsc#1181400).
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1152964">SUSE bug 1152964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188875">SUSE bug 1188875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190069">SUSE bug 1190069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190896">SUSE bug 1190896</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-36386/">CVE-2021-36386</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39272/">CVE-2021-39272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657445" comment="fetchmailconf-6.4.22-20.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110462" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193356" ref_url="https://bugzilla.suse.com/1193356" source="BUGZILLA"/>
		<reference ref_id="1193365" ref_url="https://bugzilla.suse.com/1193365" source="BUGZILLA"/>
		<reference ref_id="1193366" ref_url="https://bugzilla.suse.com/1193366" source="BUGZILLA"/>
		<reference ref_id="1193369" ref_url="https://bugzilla.suse.com/1193369" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36129" ref_url="https://www.suse.com/security/cve/CVE-2020-36129/" source="CVE"/>
		<reference ref_id="CVE-2020-36130" ref_url="https://www.suse.com/security/cve/CVE-2020-36130/" source="CVE"/>
		<reference ref_id="CVE-2020-36131" ref_url="https://www.suse.com/security/cve/CVE-2020-36131/" source="CVE"/>
		<reference ref_id="CVE-2020-36135" ref_url="https://www.suse.com/security/cve/CVE-2020-36135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009940.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2020-36129: Fixed stack buffer overflow via the component src/aom_image.c (bsc#1193356).
- CVE-2020-36131: Fixed stack buffer overflow via the component stats/rate_hist.c (bsc#1193365).
- CVE-2020-36135: Fixed NULL pointer dereference via the component rate_hist.c (bsc#1193366).
- CVE-2020-36130: Fixed NULL pointer dereference via the component av1/av1_dx_iface.c (bsc#1193369).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193356">SUSE bug 1193356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193365">SUSE bug 1193365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193366">SUSE bug 1193366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193369">SUSE bug 1193369</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36129/">CVE-2020-36129</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36130/">CVE-2020-36130</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36131/">CVE-2020-36131</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36135/">CVE-2020-36135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659303" comment="libaom0-1.0.0-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110463" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181848" ref_url="https://bugzilla.suse.com/1181848" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008306.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 78.7.1 ESR (bsc#1181848)

- Fixed: Prevent access to NTFS special paths that could lead to filesystem corruption. 
- Buffer overflow in depth pitch calculations for compressed textures 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1181848">SUSE bug 1181848</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495834" comment="MozillaFirefox-78.7.1-8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495835" comment="MozillaFirefox-devel-78.7.1-8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495836" comment="MozillaFirefox-translations-common-78.7.1-8.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495837" comment="MozillaFirefox-translations-other-78.7.1-8.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110464" version="1" class="patch">
	<metadata>
		<title>Security update for python-bottle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182181" ref_url="https://bugzilla.suse.com/1182181" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28473" ref_url="https://www.suse.com/security/cve/CVE-2020-28473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008331.html" source="SUSE-SU"/>
		<description>
This update for python-bottle fixes the following issues:

- CVE-2020-28473: Fixed Web Cache Poisoning vulnerability using parameter cloaking (bsc#1182181).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182181">SUSE bug 1182181</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28473/">CVE-2020-28473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495838" comment="python3-bottle-0.12.13-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110465" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179748" ref_url="https://bugzilla.suse.com/1179748" source="BUGZILLA"/>
		<reference ref_id="1181483" ref_url="https://bugzilla.suse.com/1181483" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27828" ref_url="https://www.suse.com/security/cve/CVE-2020-27828/" source="CVE"/>
		<reference ref_id="CVE-2021-3272" ref_url="https://www.suse.com/security/cve/CVE-2021-3272/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008334.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- bsc#1179748 CVE-2020-27828: Fix heap overflow by checking maxrlvls
- bsc#1181483 CVE-2021-3272: Fix buffer over-read in jp2_decode
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179748">SUSE bug 1179748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181483">SUSE bug 1181483</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27828/">CVE-2020-27828</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3272/">CVE-2021-3272</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495839" comment="libjasper-devel-2.0.14-3.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110466" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182286" ref_url="https://bugzilla.suse.com/1182286" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13558" ref_url="https://www.suse.com/security/cve/CVE-2020-13558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008356.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.30.5 (bsc#1182286):

  + Bring back the WebKitPluginProcess installation that was removed by mistake.
  + Fix RunLoop objects leaked in worker threads.
  + Fix aarch64 llint build with JIT disabled.
  + Use Internet Explorer quirk for Google Docs.
  + Security fixes: CVE-2020-13558.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182286">SUSE bug 1182286</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13558/">CVE-2020-13558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495840" comment="typelib-1_0-JavaScriptCore-4_0-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495841" comment="typelib-1_0-WebKit2-4_0-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495842" comment="typelib-1_0-WebKit2WebExtension-4_0-2.30.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495843" comment="webkit2gtk3-devel-2.30.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110467" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008360.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495844" comment="avahi-autoipd-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495845" comment="avahi-utils-gtk-0.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495846" comment="libavahi-gobject-devel-0.7-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110468" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182335" ref_url="https://bugzilla.suse.com/1182335" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241/" source="CVE"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in coders/jp2.c
- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182335">SUSE bug 1182335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495847" comment="ImageMagick-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495848" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495849" comment="ImageMagick-config-7-upstream-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495850" comment="ImageMagick-devel-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495851" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495852" comment="libMagick++-devel-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495853" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495854" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110469" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008402.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.8.0 ESR
  * Fixed: Various stability, functionality, and security fixes
  MFSA 2021-08 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495855" comment="MozillaFirefox-78.8.0-8.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495856" comment="MozillaFirefox-devel-78.8.0-8.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495857" comment="MozillaFirefox-translations-common-78.8.0-8.32.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495858" comment="MozillaFirefox-translations-other-78.8.0-8.32.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110470" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-autoar (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181930" ref_url="https://bugzilla.suse.com/1181930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36241" ref_url="https://www.suse.com/security/cve/CVE-2020-36241/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008420.html" source="SUSE-SU"/>
		<description>
This update for gnome-autoar fixes the following issues:

- CVE-2020-36241: Skip problematic files that might be extracted outside of the
  destination dir to prevent potential directory traversal (bsc#1181930).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181930">SUSE bug 1181930</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-36241/">CVE-2020-36241</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495859" comment="gnome-autoar-devel-0.2.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495860" comment="libgnome-autoar-0-0-0.2.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495861" comment="libgnome-autoar-gtk-0-0-0.2.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495862" comment="typelib-1_0-GnomeAutoar-0_1-0.2.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495863" comment="typelib-1_0-GnomeAutoarGtk-0_1-0.2.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110471" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008171.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox Extended Support Release 78.6.1 ESR
  * Fixed: Critical security issue MFSA 2021-01 (bsc#1180623)
  * CVE-2020-16044
    Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495864" comment="MozillaFirefox-78.6.1-8.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495865" comment="MozillaFirefox-devel-78.6.1-8.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495866" comment="MozillaFirefox-translations-common-78.6.1-8.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495867" comment="MozillaFirefox-translations-other-78.6.1-8.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110472" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-11"/>
	<updated date="2021-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495868" comment="python-tk-2.7.18-7.55.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110473" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008174.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667 [bsc#1179103]: Stack buffer overflow in XPM coder could result in a crash
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495869" comment="ImageMagick-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495870" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495871" comment="ImageMagick-config-7-upstream-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495872" comment="ImageMagick-devel-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495873" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495874" comment="libMagick++-devel-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495875" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.6.13 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495876" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.6.13 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110474" version="1" class="patch">
	<metadata>
		<title>Security update for libass (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177862" ref_url="https://bugzilla.suse.com/1177862" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26682" ref_url="https://www.suse.com/security/cve/CVE-2020-26682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008546.html" source="SUSE-SU"/>
		<description>
This update for libass fixes the following issues:

- CVE-2020-26682: Fixed a signed integer overflow in the call to outline_stroke() (bsc#1177862).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177862">SUSE bug 1177862</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26682/">CVE-2020-26682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495877" comment="libass-devel-0.14.0-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495878" comment="libass9-0.14.0-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110475" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Desktop Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008561.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- Firefox was updated to 78.9.0 ESR  (MFSA 2021-11, bsc#1183942)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-desktop-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009280223" comment="SUSE Linux Enterprise Module for Desktop Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009495879" comment="MozillaFirefox-78.9.0-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495880" comment="MozillaFirefox-devel-78.9.0-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495881" comment="MozillaFirefox-translations-common-78.9.0-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009495882" comment="MozillaFirefox-translations-other-78.9.0-8.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110476" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="1172348" ref_url="https://bugzilla.suse.com/1172348" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172348">SUSE bug 1172348</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496291" comment="perl-doc-5.26.1-7.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110477" version="1" class="patch">
	<metadata>
		<title>Security update for osc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1122675" ref_url="https://bugzilla.suse.com/1122675" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3681" ref_url="https://www.suse.com/security/cve/CVE-2019-3681/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1695-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007097.html" source="SUSE-SU"/>
		<description>
This update for osc to 0.169.1 fixes the following issues:

Security issue fixed:

- CVE-2019-3681: Fixed an insufficient validation of network-controlled filesystem paths (bsc#1122675).

Non-security issues fixed:

- Improved the speed and usability of osc bash completion.
- improved some error messages.
- osc add: support git@ (private github) or git:// URLs correctly.
- Split dependson and whatdependson commands.
- Added support for osc build --shell-cmd.
- Added pkg-ccache support for osc build.
- Added --ccache option to osc getbinaries 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122675">SUSE bug 1122675</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-3681/">CVE-2019-3681</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496292" comment="osc-0.169.1-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110478" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007067.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2020-14422: Fixed an improper computation of hash values in the IPv4Interface and IPv6Interface 
  could have led to denial of service (bsc#1173274).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-02"/>
	<updated date="2020-07-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496293" comment="python3-tools-3.6.10-3.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110479" version="1" class="patch">
	<metadata>
		<title>Security update for nasm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1084631" ref_url="https://bugzilla.suse.com/1084631" source="BUGZILLA"/>
		<reference ref_id="1086186" ref_url="https://bugzilla.suse.com/1086186" source="BUGZILLA"/>
		<reference ref_id="1086227" ref_url="https://bugzilla.suse.com/1086227" source="BUGZILLA"/>
		<reference ref_id="1086228" ref_url="https://bugzilla.suse.com/1086228" source="BUGZILLA"/>
		<reference ref_id="1090519" ref_url="https://bugzilla.suse.com/1090519" source="BUGZILLA"/>
		<reference ref_id="1090840" ref_url="https://bugzilla.suse.com/1090840" source="BUGZILLA"/>
		<reference ref_id="1106878" ref_url="https://bugzilla.suse.com/1106878" source="BUGZILLA"/>
		<reference ref_id="1107592" ref_url="https://bugzilla.suse.com/1107592" source="BUGZILLA"/>
		<reference ref_id="1107594" ref_url="https://bugzilla.suse.com/1107594" source="BUGZILLA"/>
		<reference ref_id="1108404" ref_url="https://bugzilla.suse.com/1108404" source="BUGZILLA"/>
		<reference ref_id="1115758" ref_url="https://bugzilla.suse.com/1115758" source="BUGZILLA"/>
		<reference ref_id="1115774" ref_url="https://bugzilla.suse.com/1115774" source="BUGZILLA"/>
		<reference ref_id="1115795" ref_url="https://bugzilla.suse.com/1115795" source="BUGZILLA"/>
		<reference ref_id="1173538" ref_url="https://bugzilla.suse.com/1173538" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-1000667" ref_url="https://www.suse.com/security/cve/CVE-2018-1000667/" source="CVE"/>
		<reference ref_id="CVE-2018-10016" ref_url="https://www.suse.com/security/cve/CVE-2018-10016/" source="CVE"/>
		<reference ref_id="CVE-2018-10254" ref_url="https://www.suse.com/security/cve/CVE-2018-10254/" source="CVE"/>
		<reference ref_id="CVE-2018-10316" ref_url="https://www.suse.com/security/cve/CVE-2018-10316/" source="CVE"/>
		<reference ref_id="CVE-2018-16382" ref_url="https://www.suse.com/security/cve/CVE-2018-16382/" source="CVE"/>
		<reference ref_id="CVE-2018-16517" ref_url="https://www.suse.com/security/cve/CVE-2018-16517/" source="CVE"/>
		<reference ref_id="CVE-2018-16999" ref_url="https://www.suse.com/security/cve/CVE-2018-16999/" source="CVE"/>
		<reference ref_id="CVE-2018-19214" ref_url="https://www.suse.com/security/cve/CVE-2018-19214/" source="CVE"/>
		<reference ref_id="CVE-2018-19215" ref_url="https://www.suse.com/security/cve/CVE-2018-19215/" source="CVE"/>
		<reference ref_id="CVE-2018-19216" ref_url="https://www.suse.com/security/cve/CVE-2018-19216/" source="CVE"/>
		<reference ref_id="CVE-2018-8881" ref_url="https://www.suse.com/security/cve/CVE-2018-8881/" source="CVE"/>
		<reference ref_id="CVE-2018-8882" ref_url="https://www.suse.com/security/cve/CVE-2018-8882/" source="CVE"/>
		<reference ref_id="CVE-2018-8883" ref_url="https://www.suse.com/security/cve/CVE-2018-8883/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007073.html" source="SUSE-SU"/>
		<description>

This update for nasm fixes the following issues:

nasm was updated to version 2.14.02.

This allows building of Mozilla Firefox 78ESR and also contains lots of bugfixes, security fixes
and improvements.

* Fix crash due to multiple errors or warnings during the code generation pass if a list file is specified.
* Create all system-defined macros defore processing command-line given preprocessing directives (-p, -d, -u, --pragma, --before).
* If debugging is enabled, define a __DEBUG_FORMAT__ predefined macro. See section 4.11.7.
* Fix an assert for the case in the obj format when a SEG operator refers to an EXTERN symbol declared further down in the code.
* Fix a corner case in the floating-point code where a binary, octal or
  hexadecimal floating-point having at least 32, 11, or 8 mantissa digits
  could produce slightly incorrect results under very specific conditions.
* Support -MD without a filename, for gcc compatibility. -MF can be used to set the dependencies output filename. See section 2.1.7.
* Fix -E in combination with -MD. See section 2.1.21.
* Fix missing errors on redefined labels; would cause convergence failure instead which is very slow and not easy to debug.
* Duplicate definitions of the same label with the same value is now explicitly permitted (2.14 would allow it in some circumstances.)
* Add the option --no-line to ignore %line directives in the source. See section 2.1.33 and section 4.10.1.
* Changed -I option semantics by adding a trailing path separator unconditionally.
* Fixed null dereference in corrupted invalid single line macros.
* Fixed division by zero which may happen if source code is malformed.
* Fixed out of bound access in processing of malformed segment override.
* Fixed out of bound access in certain EQU parsing.
* Fixed buffer underflow in float parsing.
* Added SGX (Intel Software Guard Extensions) instructions.
* Added +n syntax for multiple contiguous registers.
* Fixed subsections_via_symbols for macho object format.
* Added the --gprefix, --gpostfix, --lprefix, and --lpostfix command line options, to allow command line base symbol renaming. See section 2.1.28.
* Allow label renaming to be specified by %pragma in addition to from the command line. See section 6.9.
* Supported generic %pragma namespaces, output and debug. See section 6.10.
* Added the --pragma command line option to inject a %pragma directive. See section 2.1.29.
* Added the --before command line option to accept preprocess statement before input. See section 2.1.30.
* Added AVX512 VBMI2 (Additional Bit Manipulation), VNNI (Vector Neural Network), BITALG (Bit Algorithm), and GFNI (Galois Field New Instruction) instructions.
* Added the STATIC directive for local symbols that should be renamed using global-symbol rules. See section 6.8.
* Allow a symbol to be defined as EXTERN and then later overridden as GLOBAL or COMMON. Furthermore, a symbol declared EXTERN and then defined will be treated as GLOBAL. See section 6.5.
* The GLOBAL directive no longer is required to precede the definition of the symbol.
* Support private_extern as macho specific extension to the GLOBAL directive. See section 7.8.5.
* Updated UD0 encoding to match with the specification
* Added the --limit-X command line option to set execution limits. See section 2.1.31.
* Updated the Codeview version number to be aligned with MASM.
* Added the --keep-all command line option to preserve output files. See section 2.1.32.
* Added the --include command line option, an alias to -P (section 2.1.18).
* Added the --help command line option as an alias to -h (section 3.1).
* Added -W, -D, and -Q suffix aliases for RET instructions so the operand sizes of these instructions can be encoded without using o16, o32 or o64.

New upstream version 2.13.03:

* Add flags: AES, VAES, VPCLMULQDQ
* Add VPCLMULQDQ instruction
* elf: Add missing dwarf loc section
* documentation updates
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1084631">SUSE bug 1084631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086186">SUSE bug 1086186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086227">SUSE bug 1086227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1086228">SUSE bug 1086228</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090519">SUSE bug 1090519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1090840">SUSE bug 1090840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106878">SUSE bug 1106878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107592">SUSE bug 1107592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107594">SUSE bug 1107594</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108404">SUSE bug 1108404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115758">SUSE bug 1115758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115774">SUSE bug 1115774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115795">SUSE bug 1115795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173538">SUSE bug 1173538</bugzilla>
	<cve impact="low" cvss3="2.5/CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000667/">CVE-2018-1000667</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10016/">CVE-2018-10016</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10254/">CVE-2018-10254</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-10316/">CVE-2018-10316</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2018-16382/">CVE-2018-16382</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16517/">CVE-2018-16517</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16999/">CVE-2018-16999</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19214/">CVE-2018-19214</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19215/">CVE-2018-19215</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19216/">CVE-2018-19216</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8881/">CVE-2018-8881</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8882/">CVE-2018-8882</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8883/">CVE-2018-8883</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496294" comment="nasm-2.14.02-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110480" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496295" comment="openldap2-devel-32bit-2.4.46-9.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110481" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1132091" ref_url="https://bugzilla.suse.com/1132091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

Security issue fixed:

- CVE-2019-11023: Fixed a denial of service vulnerability, which was caused by a NULL pointer dereference in agroot() (bsc#1132091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496033" comment="graphviz-perl-2.40.1-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110482" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171696" ref_url="https://bugzilla.suse.com/1171696" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1945" ref_url="https://www.suse.com/security/cve/CVE-2020-1945/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007146.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

- CVE-2020-1945: Fixed an inseure temorary file vulnerability which could have potentially leaked sensitive information (bsc#1171696).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171696">SUSE bug 1171696</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-1945/">CVE-2020-1945</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496450" comment="ant-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496451" comment="ant-antlr-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496452" comment="ant-apache-bcel-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496453" comment="ant-apache-bsf-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496454" comment="ant-apache-log4j-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496455" comment="ant-apache-oro-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496456" comment="ant-apache-regexp-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496457" comment="ant-apache-resolver-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496458" comment="ant-commons-logging-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496459" comment="ant-javamail-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496460" comment="ant-jdepend-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496461" comment="ant-jmf-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496462" comment="ant-junit-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496463" comment="ant-manual-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496464" comment="ant-scripts-1.10.7-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496465" comment="ant-swing-1.10.7-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110483" version="1" class="patch">
	<metadata>
		<title>Security update for perl-YAML-LibYAML (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173703" ref_url="https://bugzilla.suse.com/1173703" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007176.html" source="SUSE-SU"/>
		<description>
This update for perl-YAML-LibYAML fixes the following issues:

perl-YAML-LibYAML was updated to 0.69: [bsc#1173703]

* Security fix: Add $LoadBlessed option to turn on/off loading objects:
  Default is set to true. Note that, the behavior is unchanged.
* Clarify documentation about exported functions
* Dump() was modifying original data, adding a PV to numbers
* Support standard tags !!str, !!map and !!seq instead of dying.
* Support JSON::PP::Boolean and boolean.pm via $YAML::XS::Boolean.
* Fix regex roundtrip. Fix loading of many regexes.

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173703">SUSE bug 1173703</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496296" comment="perl-YAML-LibYAML-0.69-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110484" version="1" class="patch">
	<metadata>
		<title>Security update for rust, rust-cbindgen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1115645" ref_url="https://bugzilla.suse.com/1115645" source="BUGZILLA"/>
		<reference ref_id="1154817" ref_url="https://bugzilla.suse.com/1154817" source="BUGZILLA"/>
		<reference ref_id="1173202" ref_url="https://bugzilla.suse.com/1173202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1967" ref_url="https://www.suse.com/security/cve/CVE-2020-1967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007183.html" source="SUSE-SU"/>
		<description>
This update for rust, rust-cbindgen fixes the following issues:

rust was updated for use by Firefox 76ESR.

- Fixed miscompilations with rustc 1.43 that lead to LTO failures (bsc#1173202)

Update to version 1.43.1

- Updated openssl-src to 1.1.1g for CVE-2020-1967.
- Fixed the stabilization of AVX-512 features.
- Fixed `cargo package --list` not working with unpublished dependencies.

Update to version 1.43.0

+ Language:

- Fixed using binary operations with `&amp;{number}` (e.g. `&amp;1.0`) 
  not having the type inferred correctly.
- Attributes such as `#[cfg()]` can now be used on `if` 
  expressions.
- Syntax only changes:
  * Allow `type Foo: Ord` syntactically.
  * Fuse associated and extern items up to defaultness.
  * Syntactically allow `self` in all `fn` contexts.
  * Merge `fn` syntax + cleanup item parsing.
  * `item` macro fragments can be interpolated into `trait`s, 
    `impl`s, and `extern` blocks.
    For example, you may now write:
    ```rust 
    macro_rules! mac_trait {
      ($i:item) =&gt; {
          trait T { $i }
      }
    }
    mac_trait! {
        fn foo() {}
    }
    ```
  * These are still rejected *semantically*, so you will likely 
    receive an error but these changes can be seen and parsed by 
    macros and conditional compilation.

+ Compiler

- You can now pass multiple lint flags to rustc to override the previous flags. 

  For example; `rustc -D unused -A unused-variables` denies
  everything in the `unused` lint group except `unused-variables` 
  which is explicitly allowed. However, passing 
  `rustc -A unused-variables -D unused` denies everything in 
  the `unused` lint group **including** `unused-variables` since 
  the allow flag is specified before the deny flag (and therefore 
  overridden).
- rustc will now prefer your system MinGW libraries over its 
  bundled libraries if they are available on `windows-gnu`.
- rustc now buffers errors/warnings printed in JSON.

Libraries:

- `Arc&lt;[T; N]&gt;`, `Box&lt;[T; N]&gt;`, and `Rc&lt;[T; N]&gt;`, now implement 
  `TryFrom&lt;Arc&lt;[T]&gt;&gt;`,`TryFrom&lt;Box&lt;[T]&gt;&gt;`, and `TryFrom&lt;Rc&lt;[T]&gt;&gt;`
  respectively.
  **Note** These conversions are only available when `N` is 
  `0..=32`.
- You can now use associated constants on floats and integers 
  directly, rather than having to import the module.
  e.g. You can now write `u32::MAX` or `f32::NAN` with no imports.
- `u8::is_ascii` is now `const`.
- `String` now implements `AsMut&lt;str&gt;`.
- Added the `primitive` module to `std` and `core`. 
  This module reexports Rust's primitive types. This is mainly 
  useful in macros where you want avoid these types being shadowed.
- Relaxed some of the trait bounds on `HashMap` and `HashSet`.
- `string::FromUtf8Error` now implements `Clone + Eq`.

+ Stabilized APIs

- `Once::is_completed`
- `f32::LOG10_2`
- `f32::LOG2_10`
- `f64::LOG10_2`
- `f64::LOG2_10`
- `iter::once_with`

+ Cargo

  - You can now set config `[profile]`s in your `.cargo/config`, 
    or through your environment.
  - Cargo will now set `CARGO_BIN_EXE_&lt;name&gt;` pointing to a 
    binary's executable path when running integration tests or 
    benchmarks.
    `&lt;name&gt;` is the name of your binary as-is e.g. If you wanted 
    the executable path for a binary named `my-program`you would 
    use `env!('CARGO_BIN_EXE_my-program')`.

+ Misc

  - Certain checks in the `const_err` lint were deemed unrelated 
    to const evaluation, and have been moved to the 
    `unconditional_panic` and `arithmetic_overflow` lints.

+ Compatibility Notes

  - Having trailing syntax in the `assert!` macro is now a hard 
    error. This has been a warning since 1.36.0.
  - Fixed `Self` not having the correctly inferred type. This 
    incorrectly led to some instances being accepted, and now 
    correctly emits a hard error.

Update to version 1.42.0:

+ Language

  - You can now use the slice pattern syntax with subslices.
  - You can now use #[repr(transparent)] on univariant enums. Meaning
    that you can create an enum that has the exact layout and ABI of
    the type it contains.
  - There are some syntax-only changes:
    * default is syntactically allowed before items in trait
      definitions.
    * Items in impls (i.e. consts, types, and fns) may syntactically
      leave out their bodies in favor of ;.
    * Bounds on associated types in impls are now syntactically
      allowed (e.g. type Foo: Ord;).
    * ... (the C-variadic type) may occur syntactically directly
      as the type of any function parameter.
    These are still rejected semantically, so you will likely receive
    an error but these changes can be seen and parsed by procedural
    macros and conditional compilation.

+ Compiler

  - Added tier 2 support for armv7a-none-eabi.
  - Added tier 2 support for riscv64gc-unknown-linux-gnu.
  - Option::{expect,unwrap} and Result::{expect, expect_err, unwrap,
    unwrap_err} now produce panic messages pointing to the location
    where they were called, rather than core's internals.
    Refer to Rust's platform support page for more information on
    Rust's tiered platform support.

+ Libraries

  - iter::Empty&lt;T&gt; now implements Send and Sync for any T.
  - Pin::{map_unchecked, map_unchecked_mut} no longer require the
    return type to implement Sized.
  - io::Cursor now derives PartialEq and Eq.
  - Layout::new is now const.
  - Added Standard Library support for riscv64gc-unknown-linux-gnu.

+ Stabilized APIs

  - CondVar::wait_while
  - CondVar::wait_timeout_while
  - DebugMap::key
  - DebugMap::value
  - ManuallyDrop::take
  - matches!
  - ptr::slice_from_raw_parts_mut
  - ptr::slice_from_raw_parts

+ Cargo

  - You no longer need to include extern crate proc_macro; to be
    able to use proc_macro; in the 2018 edition.

+ Compatibility Notes

  - Error::description has been deprecated, and its use will now
    produce a warning. It's recommended to use Display/to_string
    instead.

Update to version 1.41.1:

  - Always check types of static items
  - Always check lifetime bounds of `Copy` impls
  - Fix miscompilation in callers of `Layout::repeat`

Update to version 1.41.0:

+ Language

  - You can now pass type parameters to foreign items when implementing
    traits. E.g. You can now write `impl&lt;T&gt; From&lt;Foo&gt; for Vec&lt;T&gt; {}`.
  - You can now arbitrarily nest receiver types in the `self` position. E.g. you can
    now write `fn foo(self: Box&lt;Box&lt;Self&gt;&gt;) {}`. Previously only `Self`, `&amp;Self`,
    `&amp;mut Self`, `Arc&lt;Self&gt;`, `Rc&lt;Self&gt;`, and `Box&lt;Self&gt;` were allowed.
  - You can now use any valid identifier in a `format_args` macro.
    Previously identifiers starting with an underscore were not allowed.
  - Visibility modifiers (e.g. `pub`) are now syntactically allowed on trait items and
    enum variants. These are still rejected semantically, but
    can be seen and parsed by procedural macros and conditional compilation.
  
+ Compiler

  - Rustc will now warn if you have unused loop `'label`s.
  - Removed support for the `i686-unknown-dragonfly` target.
  - Added tier 3 support\* for the `riscv64gc-unknown-linux-gnu` target.
  - You can now pass an arguments file passing the `@path` syntax
    to rustc. Note that the format differs somewhat from what is
    found in other tooling; please see the documentation for
    more information.
  - You can now provide `--extern` flag without a path, indicating that it is
    available from the search path or specified with an `-L` flag.
  
  Refer to Rust's [platform support page][forge-platform-support] for more
  information on Rust's tiered platform support.
  
+ Libraries

  - The `core::panic` module is now stable. It was already stable
    through `std`.
  - `NonZero*` numerics now implement `From&lt;NonZero*&gt;` if it's a smaller integer
    width. E.g. `NonZeroU16` now implements `From&lt;NonZeroU8&gt;`.
  - `MaybeUninit&lt;T&gt;` now implements `fmt::Debug`.
  
+ Stabilized APIs

  - `Result::map_or`
  - `Result::map_or_else`
  - `std::rc::Weak::weak_count`
  - `std::rc::Weak::strong_count`
  - `std::sync::Weak::weak_count`
  - `std::sync::Weak::strong_count`
  
+ Cargo

  - Cargo will now document all the private items for binary crates
    by default.
  - `cargo-install` will now reinstall the package if it detects that it is out
    of date.
  - Cargo.lock now uses a more git friendly format that should help to reduce
    merge conflicts.
  - You can now override specific dependencies's build settings. E.g.
    `[profile.dev.package.image] opt-level = 2` sets the `image` crate's
    optimisation level to `2` for debug builds. You can also use
    `[profile.&lt;profile&gt;.build-override]` to override build scripts and
    their dependencies.

+ Misc

  - You can now specify `edition` in documentation code blocks to compile the block
    for that edition. E.g. `edition2018` tells rustdoc that the code sample
    should be compiled the 2018 edition of Rust.
  - You can now provide custom themes to rustdoc with `--theme`, and check the
    current theme with `--check-theme`.
  - You can use `#[cfg(doc)]` to compile an item when building documentation.
  
+ Compatibility Notes

  - As previously announced 1.41.0 will be the last tier 1 release for 32-bit
    Apple targets. This means that the source code is still
    available to build, but the targets are no longer being tested and release
    binaries for those platforms will no longer be distributed by the Rust project.
    Please refer to the linked blog post for more information.

- Bump version of libssh2 for SLE15; we now need a version with
  libssh2_userauth_publickey_frommemory(), which appeared in libssh2
  1.6.0.

Update to version 1.40.0

+ Language

  - You can now use tuple `struct`s and tuple `enum` variant's constructors in
    `const` contexts. e.g.
    pub struct Point(i32, i32);
    const ORIGIN: Point = {
      let constructor = Point;
      constructor(0, 0)
    };
  - You can now mark `struct`s, `enum`s, and `enum` variants with the `#[non_exhaustive]` attribute to
    indicate that there may be variants or fields added in the future.
    For example this requires adding a wild-card branch (`_ =&gt; {}`) to any match
    statements on a non-exhaustive `enum`.
  - You can now use function-like procedural macros in `extern` blocks and in
    type positions. e.g. `type Generated = macro!();`
  - Function-like and attribute procedural macros can now emit
    `macro_rules!` items, so you can now have your macros generate macros.
  - The `meta` pattern matcher in `macro_rules!` now correctly matches the modern
    attribute syntax. For example `(#[$m:meta])` now matches `#[attr]`,
    `#[attr{tokens}]`, `#[attr[tokens]]`, and `#[attr(tokens)]`.

+ Compiler

  - Added tier 3 support\* for the
    `thumbv7neon-unknown-linux-musleabihf` target.
  - Added tier 3 support for the
    `aarch64-unknown-none-softfloat` target.
  - Added tier 3 support for the `mips64-unknown-linux-muslabi64`, and
    `mips64el-unknown-linux-muslabi64` targets.

+ Libraries

  - The `is_power_of_two` method on unsigned numeric types is now a `const` function.

+ Stabilized APIs

  - BTreeMap::get_key_value
  - HashMap::get_key_value
  - Option::as_deref_mut
  - Option::as_deref
  - Option::flatten
  - UdpSocket::peer_addr
  - f32::to_be_bytes
  - f32::to_le_bytes
  - f32::to_ne_bytes
  - f64::to_be_bytes
  - f64::to_le_bytes
  - f64::to_ne_bytes
  - f32::from_be_bytes
  - f32::from_le_bytes
  - f32::from_ne_bytes
  - f64::from_be_bytes
  - f64::from_le_bytes
  - f64::from_ne_bytes
  - mem::take
  - slice::repeat
  - todo!

+ Cargo

  - Cargo will now always display warnings, rather than only on
    fresh builds.
  - Feature flags (except `--all-features`) passed to a virtual workspace will
    now produce an error. Previously these flags were ignored.
  - You can now publish `dev-dependencies` without including
    a `version`.

+ Misc

  - You can now specify the `#[cfg(doctest)]` attribute to include an item only
    when running documentation tests with `rustdoc`.

+ Compatibility Notes

  - As previously announced, any previous NLL warnings in the 2015 edition are
    now hard errors.
  - The `include!` macro will now warn if it failed to include the
    entire file. The `include!` macro unintentionally only includes the
    first _expression_ in a file, and this can be unintuitive. This will become
    either a hard error in a future release, or the behavior may be fixed to include all expressions as expected.
  - Using `#[inline]` on function prototypes and consts now emits a warning under
    `unused_attribute` lint. Using `#[inline]` anywhere else inside traits
    or `extern` blocks now correctly emits a hard error.

Update to version 1.39.0

+ Language

  - You can now create async functions and blocks with async fn,
    async move {}, and async {} respectively, and you can now call
    .await on async expressions.
  - You can now use certain attributes on function, closure, and
    function pointer parameters.
  - You can now take shared references to bind-by-move patterns in
    the if guards of match arms.

+ Compiler

  - Added tier 3 support for the i686-unknown-uefi target.
  - Added tier 3 support for the sparc64-unknown-openbsd target.
  - rustc will now trim code snippets in diagnostics to fit in your
    terminal.
  - You can now pass --show-output argument to test binaries to
    print the output of successful tests.

+ For more details:
    https://github.com/rust-lang/rust/blob/stable/RELEASES.md#version-1390-2019-11-07

- Switch to bundled version of libgit2 for now. libgit2-sys seems
  to expect using the bundled variant, which just seems to point
  to a snapshot of the master branch and doesn't match any released
  libgit2 (bsc#1154817).
  See: https://github.com/rust-lang/rust/issues/63476 and
  https://github.com/rust-lang/git2-rs/issues/458 for details.

Update to version 1.38.0

+ Language

  - The `#[global_allocator]` attribute can now be used in submodules.
  - The `#[deprecated]` attribute can now be used on macros.

+ Compiler

  - Added pipelined compilation support to `rustc`. This will
    improve compilation times in some cases.

+ Libraries

  - `ascii::EscapeDefault` now implements `Clone` and `Display`.
  - Derive macros for prelude traits (e.g. `Clone`, `Debug`, `Hash`) are now
    available at the same path as the trait. (e.g. The `Clone` derive macro
    is available at `std::clone::Clone`). This also makes all built-in macros
    available in `std`/`core` root. e.g. `std::include_bytes!`.
  - `str::Chars` now implements `Debug`.
  - `slice::{concat, connect, join}` now accepts `&amp;[T]` in addition to `&amp;T`.
  - `*const T` and `*mut T` now implement `marker::Unpin`.
  - `Arc&lt;[T]&gt;` and `Rc&lt;[T]&gt;` now implement `FromIterator&lt;T&gt;`.
  - Added euclidean remainder and division operations (`div_euclid`,
    `rem_euclid`) to all numeric primitives. Additionally `checked`,
    `overflowing`, and `wrapping` versions are available for all
    integer primitives.
  - `thread::AccessError` now implements `Clone`, `Copy`, `Eq`, `Error`, and
    `PartialEq`.
  - `iter::{StepBy, Peekable, Take}` now implement `DoubleEndedIterator`.

+ Stabilized APIs

  - `&lt;*const T&gt;::cast`
  - `&lt;*mut T&gt;::cast`
  - `Duration::as_secs_f32`
  - `Duration::as_secs_f64`
  - `Duration::div_f32`
  - `Duration::div_f64`
  - `Duration::from_secs_f32`
  - `Duration::from_secs_f64`
  - `Duration::mul_f32`
  - `Duration::mul_f64`
  - `any::type_name`

+ Cargo

  - Added pipelined compilation support to `cargo`.
  - You can now pass the `--features` option multiple times to enable
    multiple features.

+ Misc

  - `rustc` will now warn about some incorrect uses of
    `mem::{uninitialized, zeroed}` that are known to cause undefined behaviour.

Update to version 1.37.0

  + Language

    - #[must_use] will now warn if the type is contained in a tuple,
      Box, or an array and unused.
    - You can now use the `cfg` and `cfg_attr` attributes on
      generic parameters.
    - You can now use enum variants through type alias. e.g. You can
      write the following:
      ```
      type MyOption = Option&lt;u8&gt;;
      fn increment_or_zero(x: MyOption) -&gt; u8 {
          match x {
              MyOption::Some(y) =&gt; y + 1,
              MyOption::None =&gt; 0,
          }
      }
      ```
    - You can now use `_` as an identifier for consts. e.g. You can write
      `const _: u32 = 5;`.
    - You can now use `#[repr(align(X)]` on enums.
    - The  `?` Kleene macro operator is now available in the
      2015 edition.

  + Compiler

    - You can now enable Profile-Guided Optimization with the `-C profile-generate`
      and `-C profile-use` flags. For more information on how to use profile
      guided optimization, please refer to the rustc book.
    - The `rust-lldb` wrapper script should now work again.

  + Libraries

    - `mem::MaybeUninit&lt;T&gt;` is now ABI-compatible with `T`.

  + Stabilized APIs

    - BufReader::buffer
    - BufWriter::buffer
    - Cell::from_mut
    - Cell&lt;[T]&gt;::as_slice_of_cells
    - Cell&lt;slice&gt;::as_slice_of_cells
    - DoubleEndedIterator::nth_back
    - Option::xor
    - Wrapping::reverse_bits
    - i128::reverse_bits
    - i16::reverse_bits
    - i32::reverse_bits
    - i64::reverse_bits
    - i8::reverse_bits
    - isize::reverse_bits
    - slice::copy_within
    - u128::reverse_bits
    - u16::reverse_bits
    - u32::reverse_bits
    - u64::reverse_bits
    - u8::reverse_bits
    - usize::reverse_bits

  + Cargo

    - Cargo.lock files are now included by default when publishing executable crates
      with executables.
    - You can now specify `default-run='foo'` in `[package]` to specify the
      default executable to use for `cargo run`.
    - cargo-vendor is now provided as a sub-command of cargo

  + Compatibility Notes

    - Using `...` for inclusive range patterns will now warn by default.
      Please transition your code to using the `..=` syntax for inclusive
      ranges instead.
    - Using a trait object without the `dyn` will now warn by default.
      Please transition your code to use `dyn Trait` for trait objects instead.
      Crab(String),
      Lobster(String),
      Person(String),
      let state = Creature::Crab('Ferris');
      if let Creature::Crab(name) | Creature::Person(name) = state {
            println!('This creature's name is: {}', name);
      }
      unsafe { foo() }
    pub fn new(x: i32, y: i32) -&gt; Self {
        Self(x, y)
    }
    pub fn is_origin(&amp;self) -&gt; bool {
        match self {
      Self(0, 0) =&gt; true,
      _ =&gt; false,
        }
    }
    Self: PartialOrd&lt;Self&gt; // can write `Self` instead of `List&lt;T&gt;`
    Nil,
    Cons(T, Box&lt;Self&gt;) // likewise here
    fn test(&amp;self) { println!('one'); } //~ ERROR duplicate definitions with name `test`
    fn test(&amp;self) { println!('two'); }

* Basic procedural macros allowing custom `#[derive]`, aka 'macros 1.1', are
  stable. This allows popular code-generating crates like Serde and Diesel to
  work ergonomically. [RFC 1681].
* [Tuple structs may be empty. Unary and empty tuple structs may be instantiated
  with curly braces][36868]. Part of [RFC 1506].
* [A number of minor changes to name resolution have been activated][37127].
  They add up to more consistent semantics, allowing for future evolution of
  Rust macros. Specified in [RFC 1560], see its section on ['changes'] for
  details of what is different. The breaking changes here have been transitioned
  through the [`legacy_imports`] lint since 1.14, with no known regressions.
* [In `macro_rules`, `path` fragments can now be parsed as type parameter
  bounds][38279]
* [`?Sized` can be used in `where` clauses][37791]
* [There is now a limit on the size of monomorphized types and it can be
  modified with the `#![type_size_limit]` crate attribute, similarly to
  the `#![recursion_limit]` attribute][37789]
* [On Windows, the compiler will apply dllimport attributes when linking to
  extern functions][37973]. Additional attributes and flags can control which
  library kind is linked and its name. [RFC 1717].
* [Rust-ABI symbols are no longer exported from cdylibs][38117]
* [The `--test` flag works with procedural macro crates][38107]
* [Fix `extern 'aapcs' fn` ABI][37814]
* [The `-C no-stack-check` flag is deprecated][37636]. It does nothing.
* [The `format!` expander recognizes incorrect `printf` and shell-style
  formatting directives and suggests the correct format][37613].
* [Only report one error for all unused imports in an import list][37456]
* [Avoid unnecessary `mk_ty` calls in `Ty::super_fold_with`][37705]
* [Avoid more unnecessary `mk_ty` calls in `Ty::super_fold_with`][37979]
* [Don't clone in `UnificationTable::probe`][37848]
* [Remove `scope_auxiliary` to cut RSS by 10%][37764]
* [Use small vectors in type walker][37760]
* [Macro expansion performance was improved][37701]
* [Change `HirVec&lt;P&lt;T&gt;&gt;` to `HirVec&lt;T&gt;` in `hir::Expr`][37642]
* [Replace FNV with a faster hash function][37229]
  https://raw.githubusercontent.com/rust-lang/rust/master/RELEASES.md

rust-cbindgen is shipped in version 0.14.1.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1115645">SUSE bug 1115645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154817">SUSE bug 1154817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173202">SUSE bug 1173202</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1967/">CVE-2020-1967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496297" comment="cargo-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496298" comment="clippy-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496299" comment="rls-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496300" comment="rust-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496301" comment="rust-analysis-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496302" comment="rust-src-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496303" comment="rust-std-static-1.43.1-12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496304" comment="rustfmt-1.43.1-12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110485" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496466" comment="kernel-docs-5.3.18-24.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496467" comment="kernel-obs-build-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496468" comment="kernel-preempt-devel-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496469" comment="kernel-source-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496470" comment="kernel-syms-5.3.18-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110486" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496471" comment="xorg-x11-server-sdk-1.20.3-22.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110487" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007282.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- bsc#1174091, CVE-2019-20907: avoiding possible infinite loop in specifically crafted tarball.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496310" comment="python3-tools-3.6.10-3.59.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110488" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496472" comment="xorg-x11-server-sdk-1.20.3-22.5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110489" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496473" comment="kernel-docs-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496474" comment="kernel-obs-build-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496475" comment="kernel-preempt-devel-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496476" comment="kernel-source-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496477" comment="kernel-syms-5.3.18-24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110490" version="1" class="patch">
	<metadata>
		<title>Security update for go1.14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1164903" ref_url="https://bugzilla.suse.com/1164903" source="BUGZILLA"/>
		<reference ref_id="1169832" ref_url="https://bugzilla.suse.com/1169832" source="BUGZILLA"/>
		<reference ref_id="1170826" ref_url="https://bugzilla.suse.com/1170826" source="BUGZILLA"/>
		<reference ref_id="1172868" ref_url="https://bugzilla.suse.com/1172868" source="BUGZILLA"/>
		<reference ref_id="1174153" ref_url="https://bugzilla.suse.com/1174153" source="BUGZILLA"/>
		<reference ref_id="1174191" ref_url="https://bugzilla.suse.com/1174191" source="BUGZILLA"/>
		<reference ref_id="1174977" ref_url="https://bugzilla.suse.com/1174977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039/" source="CVE"/>
		<reference ref_id="CVE-2020-15586" ref_url="https://www.suse.com/security/cve/CVE-2020-15586/" source="CVE"/>
		<reference ref_id="CVE-2020-16845" ref_url="https://www.suse.com/security/cve/CVE-2020-16845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007377.html" source="SUSE-SU"/>
		<description>
This update for go1.14 fixes the following issues:

- go1.14 was updated to version 1.14.7 
- CVE-2020-16845: dUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs (bsc#1174977).	  

- go1.14.6 (released 2020-07-16) includes fixes to the go command,
  the compiler, the linker, vet, and the database/sql,
  encoding/json, net/http, reflect, and testing packages.
  Refs bsc#1164903 go1.14 release tracking
  Refs bsc#1174153 bsc#1174191
  * go#39991 runtime: missing deferreturn on linux/ppc64le
  * go#39920 net/http: panic on misformed If-None-Match Header with http.ServeContent
  * go#39849 cmd/compile: internal compile error when using sync.Pool: mismatched zero/store sizes
  * go#39824 cmd/go: TestBuildIDContainsArchModeEnv/386 fails on linux/386 in Go 1.14 and 1.13, not 1.15
  * go#39698 reflect: panic from malloc after MakeFunc function returns value that is also stored globally
  * go#39636 reflect: DeepEqual can return true for values that are not equal
  * go#39585 encoding/json: incorrect object key unmarshaling when using custom TextUnmarshaler as Key with string va
lues
  * go#39562 cmd/compile/internal/ssa: TestNexting/dlv-dbg-hist failing on linux-386-longtest builder because it trie
s to use an older version of dlv which only supports linux/amd64
  * go#39308 testing: streaming output loses parallel subtest associations
  * go#39288 cmd/vet: update for new number formats
  * go#39101 database/sql: context cancellation allows statements to execute after rollback
  * go#38030 doc: BuildNameToCertificate deprecated in go 1.14 not mentioned in the release notes
  * go#40212 net/http: Expect 100-continue panics in httputil.ReverseProxy bsc#1174153 CVE-2020-15586
  * go#40210 crypto/x509: Certificate.Verify method seemingly ignoring EKU requirements on Windows bsc#1174191 CVE-2020-14039 (Windows only)
- Add patch to ensure /etc/hosts is used if /etc/nsswitch.conf is
  not present bsc#1172868 gh#golang/go#35305
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-07"/>
	<updated date="2020-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1164903">SUSE bug 1164903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169832">SUSE bug 1169832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170826">SUSE bug 1170826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172868">SUSE bug 1172868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174153">SUSE bug 1174153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174191">SUSE bug 1174191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174977">SUSE bug 1174977</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15586/">CVE-2020-15586</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16845/">CVE-2020-16845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496313" comment="go1.14-1.14.7-1.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496314" comment="go1.14-doc-1.14.7-1.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110491" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496478" comment="kernel-docs-5.3.18-24.15.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496479" comment="kernel-obs-build-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496480" comment="kernel-preempt-devel-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496481" comment="kernel-source-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496482" comment="kernel-syms-5.3.18-24.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110492" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174154" ref_url="https://bugzilla.suse.com/1174154" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1174154 - CVE-2020-15719 - This resolves an issue with x509
  SAN's falling back to CN validation in violation of rfc6125.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496319" comment="openldap2-devel-32bit-2.4.46-9.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110493" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175568" ref_url="https://bugzilla.suse.com/1175568" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8027: openldap_update_modules_path.sh starts daemons unconditionally and uses fixed paths in /tmp (bsc#1175568).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-22"/>
	<updated date="2020-09-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496320" comment="openldap2-devel-32bit-2.4.46-9.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110494" version="1" class="patch">
	<metadata>
		<title>Security update for go1.14 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1164903" ref_url="https://bugzilla.suse.com/1164903" source="BUGZILLA"/>
		<reference ref_id="1176031" ref_url="https://bugzilla.suse.com/1176031" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007488.html" source="SUSE-SU"/>
		<description>
This update for go1.14 fixes the following issues:

- go1.14.9 (released 2020-09-09) includes fixes to the compiler,
  linker, runtime, documentation, and the net/http and testing
  packages.
  Refs bsc#1164903 go1.14 release tracking
  * go#41192 net/http/fcgi: race detected during execution of TestResponseWriterSniffsContentType test
  * go#41016 net/http: Transport.CancelRequest no longer cancels in-flight request
  * go#40973 net/http: RoundTrip unexpectedly changes Request
  * go#40968 runtime: checkptr incorrectly -race flagging when using &amp;^ arithmetic
  * go#40938 cmd/compile: R12 can be clobbered for write barrier call on PPC64
  * go#40848 testing: '=== PAUSE' lines do not change the test name for the next log line
  * go#40797 cmd/compile: inline marker targets not reachable after assembly on arm
  * go#40766 cmd/compile: inline marker targets not reachable after assembly on ppc64x
  * go#40501 cmd/compile: for range loop reading past slice end
  * go#40411 runtime: Windows service lifecycle events behave incorrectly when called within a golang environment
  * go#40398 runtime: fatal error: checkdead: runnable g
  * go#40192 runtime: pageAlloc.searchAddr may point to unmapped memory in discontiguous heaps, violating its invariant
  * go#39955 cmd/link: incorrect GC bitmap when global's type is in another shared object
  * go#39690 cmd/compile: s390x floating point &lt;-&gt; integer conversions clobbering the condition code
  * go#39279 net/http: Re-connect with upgraded HTTP2 connection fails to send Request.body
  * go#38904 doc: include fix for #34437 in Go 1.14 release notes

- go1.14.8 (released 2020-09-01) includes security fixes to the
  net/http/cgi and net/http/fcgi packages.
  CVE-2020-24553
  Refs bsc#1164903 go1.14 release tracking
  * bsc#1176031 CVE-2020-24553
  * go#41164 net/http/cgi,net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164903">SUSE bug 1164903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176031">SUSE bug 1176031</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496321" comment="go1.14-1.14.9-1.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496322" comment="go1.14-doc-1.14.9-1.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110495" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1170826" ref_url="https://bugzilla.suse.com/1170826" source="BUGZILLA"/>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1176031" ref_url="https://bugzilla.suse.com/1176031" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24553" ref_url="https://www.suse.com/security/cve/CVE-2020-24553/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007495.html" source="SUSE-SU"/>
		<description>

  
go1.15 (released 2020-08-11) Go 1.15 is a major release of Go.

go1.15.x minor releases will be provided through August 2021.

  https://github.com/golang/go/wiki/Go-Release-Cycle

Most changes are in the implementation of the toolchain, runtime,
and libraries. As always, the release maintains the Go 1 promise
of compatibility. We expect almost all Go programs to continue to
compile and run as before.

* See release notes https://golang.org/doc/go1.15. Excerpts
  relevant to OBS environment and for SUSE/openSUSE follow:
* Module support in the go command is ready for production use,
  and we encourage all users to migrate to Go modules for
  dependency management.
* Module cache: The location of the module cache may now be set
  with the GOMODCACHE environment variable. The default value of
  GOMODCACHE is GOPATH[0]/pkg/mod, the location of the module
  cache before this change.
* Compiler flag parsing: Various flag parsing issues in go test
  and go vet have been fixed. Notably, flags specified in
  GOFLAGS are handled more consistently, and the -outputdir flag
  now interprets relative paths relative to the working
  directory of the go command (rather than the working directory
  of each individual test).
* The GOPROXY environment variable now supports skipping proxies
  that return errors. Proxy URLs may now be separated with
  either commas (,) or pipe characters (|). If a proxy URL is
  followed by a comma, the go command will only try the next
  proxy in the list after a 404 or 410 HTTP response. If a proxy
  URL is followed by a pipe character, the go command will try
  the next proxy in the list after any error. Note that the
  default value of GOPROXY remains
  https://proxy.golang.org,direct, which does not fall back to
  direct in case of errors.
* On a Unix system, if the kill command or kill system call is
  used to send a SIGSEGV, SIGBUS, or SIGFPE signal to a Go
  program, and if the signal is not being handled via
  os/signal.Notify, the Go program will now reliably crash with
  a stack trace. In earlier releases the behavior was
  unpredictable.
* Allocation of small objects now performs much better at high
  core counts, and has lower worst-case latency.
* Go 1.15 reduces typical binary sizes by around 5% compared to
  Go 1.14 by eliminating certain types of GC metadata and more
  aggressively eliminating unused type metadata.
* The toolchain now mitigates Intel CPU erratum SKX102 on
  GOARCH=amd64 by aligning functions to 32 byte boundaries and
  padding jump instructions. While this padding increases binary
  sizes, this is more than made up for by the binary size
  improvements mentioned above.
* Go 1.15 adds a -spectre flag to both the compiler and the
  assembler, to allow enabling Spectre mitigations. These should
  almost never be needed and are provided mainly as a 'defense
  in depth' mechanism. See the Spectre Go wiki page for details.
* The compiler now rejects //go: compiler directives that have
  no meaning for the declaration they are applied to with a
  'misplaced compiler directive' error. Such misapplied
  directives were broken before, but were silently ignored by
  the compiler.
* Substantial improvements to the Go linker, which reduce linker
  resource usage (both time and memory) and improve code
  robustness/maintainability. Linking is 20% faster and requires
  30% less memory on average. These changes are part of a
  multi-release project to modernize the Go linker, meaning that
  there will be additional linker improvements expected in
  future releases.
* The linker now defaults to internal linking mode for
  -buildmode=pie on linux/amd64 and linux/arm64, so these
  configurations no longer require a C linker.
* There has been progress in improving the stability and
  performance of the 64-bit RISC-V port on Linux (GOOS=linux,
  GOARCH=riscv64). It also now supports asynchronous preemption.
* crypto/x509: The deprecated, legacy behavior of treating the
  CommonName field on X.509 certificates as a host name when no
  Subject Alternative Names are present is now disabled by
  default. It can be temporarily re-enabled by adding the value
  x509ignoreCN=0 to the GODEBUG environment variable. Note that
  if the CommonName is an invalid host name, it's always
  ignored, regardless of GODEBUG settings. Invalid names include
  those with any characters other than letters, digits, hyphens
  and underscores, and those with empty labels or trailing dots.
* crypto/x509: go1.15 applications with an AWS DB instance that
  was created or updated to the rds-ca-2019 certificate prior to
  July 28, 2020, you must update the certificate again. If you
  created your DB instance or updated its certificate after July
  28, 2020, no action is required. For more information, see
  go#39568


This update ships go1.15.2 (released 2020-09-09) includes fixes to the compiler,
runtime, documentation, the go command, and the net/mail, os, sync, and testing packages.

* go#41193 net/http/fcgi: race detected during execution of TestResponseWriterSniffsContentType test
* go#41178 doc: include fix for #34437 in Go 1.14 release notes
* go#41034 testing: Cleanup races with Logf and Errorf
* go#41011 sync: sync.Map keys will never be garbage collected
* go#40934 runtime: checkptr incorrectly -race flagging when using &amp;^ arithmetic
* go#40900 internal/poll: CopyFileRange returns EPERM on CircleCI Docker Host running 4.10.0-40-generic
* go#40868 cmd/compile: R12 can be clobbered for write barrier call on PPC64
* go#40849 testing: '=== PAUSE' lines do not change the test name for the next log line
* go#40845 runtime: Panic if newstack at runtime.acquireLockRank
* go#40805 cmd/test2json: tests that panic are marked as passing
* go#40804 net/mail: change in behavior of ParseAddressList('') in 1.15
* go#40802 cmd/go: in 1.15: change in 'go test' argument parsing
* go#40798 cmd/compile: inline marker targets not reachable after assembly on arm
* go#40772 cmd/compile: compiler crashes in ssa: isNonNegative bad type
* go#40767 cmd/compile: inline marker targets not reachable after assembly on ppc64x
* go#40739 internal/poll: CopyFileRange returns ENOTSUP on Linux 3.10.0 kernel on NFS mount
* go#40412 runtime: Windows service lifecycle events behave incorrectly when called within a golang environment

go1.15.1 (released 2020-09-01) includes security fixes to the net/http/cgi and net/http/fcgi packages.

* bsc#1176031 CVE-2020-24553: go net/http/cgi,net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified
* go#41165 net/http/cgi,net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170826">SUSE bug 1170826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176031">SUSE bug 1176031</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24553/">CVE-2020-24553</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496323" comment="go1.15-1.15.2-1.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496324" comment="go1.15-doc-1.15.2-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110496" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496483" comment="kernel-docs-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496484" comment="kernel-obs-build-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496485" comment="kernel-preempt-devel-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496486" comment="kernel-source-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496487" comment="kernel-syms-5.3.18-24.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110497" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496325" comment="perl-Net-Libproxy-0.4.15-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110498" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1100369" ref_url="https://bugzilla.suse.com/1100369" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1128220" ref_url="https://bugzilla.suse.com/1128220" source="BUGZILLA"/>
		<reference ref_id="1156205" ref_url="https://bugzilla.suse.com/1156205" source="BUGZILLA"/>
		<reference ref_id="1157051" ref_url="https://bugzilla.suse.com/1157051" source="BUGZILLA"/>
		<reference ref_id="1161168" ref_url="https://bugzilla.suse.com/1161168" source="BUGZILLA"/>
		<reference ref_id="1170667" ref_url="https://bugzilla.suse.com/1170667" source="BUGZILLA"/>
		<reference ref_id="1170713" ref_url="https://bugzilla.suse.com/1170713" source="BUGZILLA"/>
		<reference ref_id="1171313" ref_url="https://bugzilla.suse.com/1171313" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172958" ref_url="https://bugzilla.suse.com/1172958" source="BUGZILLA"/>
		<reference ref_id="1173307" ref_url="https://bugzilla.suse.com/1173307" source="BUGZILLA"/>
		<reference ref_id="1173311" ref_url="https://bugzilla.suse.com/1173311" source="BUGZILLA"/>
		<reference ref_id="1173983" ref_url="https://bugzilla.suse.com/1173983" source="BUGZILLA"/>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1176092" ref_url="https://bugzilla.suse.com/1176092" source="BUGZILLA"/>
		<reference ref_id="1176674" ref_url="https://bugzilla.suse.com/1176674" source="BUGZILLA"/>
		<reference ref_id="906079" ref_url="https://bugzilla.suse.com/906079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

BIND was upgraded to version 9.16.6:

Note:

- bind is now more strict in regards to DNSSEC. If queries are not working,
  check for DNSSEC issues. For instance, if bind is used in a namserver
  forwarder chain, the forwarding DNS servers must support DNSSEC.

Fixing security issues:

- CVE-2020-8616: Further limit the number of queries that can be triggered from
  a request.  Root and TLD servers are no longer exempt
  from max-recursion-queries.  Fetches for missing name server. (bsc#1171740)
  Address records are limited to 4 for any domain.
- CVE-2020-8617: Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. (bsc#1171740)
- CVE-2019-6477: Fixed an issue where TCP-pipelined queries could bypass 
  the tcp-clients limit (bsc#1157051).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- CVE-2020-8618: It was possible to trigger an INSIST when determining
  whether a record would fit into a TCP message buffer (bsc#1172958).
- CVE-2020-8619: It was possible to trigger an INSIST in
  lib/dns/rbtdb.c:new_reference() with a particular zone content
  and query patterns (bsc#1172958).
- CVE-2020-8624: 'update-policy' rules of type 'subdomain' were
  incorrectly treated as 'zonesub' rules, which allowed
  keys used in 'subdomain' rules to update names outside
  of the specified subdomains. The problem was fixed by
  making sure 'subdomain' rules are again processed as
  described in the ARM (bsc#1175443).
- CVE-2020-8623: When BIND 9 was compiled with native PKCS#11 support, it
  was possible to trigger an assertion failure in code
  determining the number of bits in the PKCS#11 RSA public
  key with a specially crafted packet (bsc#1175443).
- CVE-2020-8621: named could crash in certain query resolution scenarios
  where QNAME minimization and forwarding were both
  enabled (bsc#1175443).
- CVE-2020-8620: It was possible to trigger an assertion failure by
  sending a specially crafted large TCP DNS message (bsc#1175443).
- CVE-2020-8622: It was possible to trigger an assertion failure when
  verifying the response to a TSIG-signed request (bsc#1175443).

Other issues fixed:

- Add engine support to OpenSSL EdDSA implementation.
- Add engine support to OpenSSL ECDSA implementation.
- Update PKCS#11 EdDSA implementation to PKCS#11 v3.0.
- Warn about AXFR streams with inconsistent message IDs.
- Make ISC rwlock implementation the default again.
- Fixed issues when using cookie-secrets for AES and SHA2 (bsc#1161168)
- Installed the default files in /var/lib/named and created 
  chroot environment on systems using transactional-updates (bsc#1100369, fate#325524)
- Fixed an issue where bind was not working in FIPS mode (bsc#906079).
- Fixed dependency issues (bsc#1118367 and bsc#1118368).
- GeoIP support is now discontinued, now GeoIP2 is used(bsc#1156205).
- Fixed an issue with FIPS (bsc#1128220).
- The liblwres library is discontinued upstream and is no longer included.
- Added service dependency on NTP to make sure the clock is accurate when bind is starts (bsc#1170667, bsc#1170713).
- Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE.
- The default value of 'max-stale-ttl' has been changed from 1 week to 12 hours.
- Zone timers are now exported via statistics channel.
- The 'primary' and 'secondary' keywords, when used as parameters for 'check-names', were not processed correctly and were being ignored.
- 'rndc dnstap -roll &lt;value&gt;' did not limit the number of saved files to &lt;value&gt;.
- Add 'rndc dnssec -status' command.
- Addressed a couple of situations where named could crash.
- Changed /var/lib/named to owner root:named and perms rwxrwxr-t
  so that named, being a/the only member of the 'named' group
  has full r/w access yet cannot change directories owned by root
  in the case of a compromized named.
  [bsc#1173307, bind-chrootenv.conf]
- Added '/etc/bind.keys' to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file (bsc#1173983).
- Removed '-r /dev/urandom' from all invocations of rndc-confgen
  (init/named system/lwresd.init system/named.init in vendor-files)
  as this option is deprecated and causes rndc-confgen to fail.
  (bsc#1173311, bsc#1176674, bsc#1170713)
- /usr/bin/genDDNSkey: Removing the use of the -r option in the call
  of /usr/sbin/dnssec-keygen as BIND now uses the random number
  functions provided by the crypto library (i.e., OpenSSL or a
  PKCS#11 provider) as a source of randomness rather than /dev/random.
  Therefore the -r command line option no longer has any effect on
  dnssec-keygen. Leaving the option in genDDNSkey as to not break
  compatibility. Patch provided by Stefan Eisenwiener.
  [bsc#1171313]
- Put libns into a separate subpackage to avoid file conflicts
  in the libisc subpackage due to different sonums (bsc#1176092).
- Require /sbin/start_daemon: both init scripts, the one used in
  systemd context as well as legacy sysv, make use of start_daemon.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100369">SUSE bug 1100369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128220">SUSE bug 1128220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156205">SUSE bug 1156205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161168">SUSE bug 1161168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170667">SUSE bug 1170667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170713">SUSE bug 1170713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171313">SUSE bug 1171313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173307">SUSE bug 1173307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173311">SUSE bug 1173311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173983">SUSE bug 1173983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176092">SUSE bug 1176092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176674">SUSE bug 1176674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906079">SUSE bug 906079</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492629" comment="sysuser-tools-2.0-4.2.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110499" version="1" class="patch">
	<metadata>
		<title>Security update for gcc10, nvptx-tools (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1172846" ref_url="https://bugzilla.suse.com/1172846" source="BUGZILLA"/>
		<reference ref_id="1173972" ref_url="https://bugzilla.suse.com/1173972" source="BUGZILLA"/>
		<reference ref_id="1174753" ref_url="https://bugzilla.suse.com/1174753" source="BUGZILLA"/>
		<reference ref_id="1174817" ref_url="https://bugzilla.suse.com/1174817" source="BUGZILLA"/>
		<reference ref_id="1175168" ref_url="https://bugzilla.suse.com/1175168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007583.html" source="SUSE-SU"/>
		<description>
This update for gcc10, nvptx-tools fixes the following issues:

This update provides the GCC10 compiler suite and runtime libraries.

The base SUSE Linux Enterprise libraries libgcc_s1, libstdc++6 are replaced by
the gcc10 variants.

The new compiler variants are available with '-10' suffix, you can specify them
via:

	CC=gcc-10
	CXX=g++-10

or similar commands.

For a detailed changelog check out https://gcc.gnu.org/gcc-10/changes.html

Changes in nvptx-tools:

- Enable build on aarch64
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-04"/>
	<updated date="2020-12-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172846">SUSE bug 1172846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173972">SUSE bug 1173972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174753">SUSE bug 1174753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174817">SUSE bug 1174817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175168">SUSE bug 1175168</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496330" comment="cpp10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496488" comment="cross-nvptx-gcc10-10.2.1+git583-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496489" comment="cross-nvptx-newlib10-devel-10.2.1+git583-1.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496333" comment="gcc10-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496334" comment="gcc10-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496335" comment="gcc10-ada-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496490" comment="gcc10-ada-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496337" comment="gcc10-c++-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496338" comment="gcc10-c++-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496339" comment="gcc10-fortran-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496340" comment="gcc10-fortran-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496341" comment="gcc10-go-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496342" comment="gcc10-go-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496343" comment="gcc10-info-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496344" comment="gcc10-locale-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496346" comment="libstdc++6-devel-gcc10-32bit-10.2.1+git583-1.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496350" comment="nvptx-tools-1.0-4.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110500" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496491" comment="kernel-docs-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496492" comment="kernel-obs-build-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496493" comment="kernel-preempt-devel-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496494" comment="kernel-source-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496495" comment="kernel-syms-5.3.18-24.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110501" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to version 2.35. (jsc#ECO-2373)

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

- fix DT_NEEDED order with -flto [bsc#1163744]


Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
  bsc#1153768 aka CVE-2019-17451 aka PR25070
  bsc#1153770 aka CVE-2019-17450 aka PR25078

- fix various build fails on aarch64 (PR25210, bsc#1157755).

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.
- Includes fixes for these CVEs:
  bsc#1126826 aka CVE-2019-9077 aka PR1126826
  bsc#1126829 aka CVE-2019-9075 aka PR1126829
  bsc#1126831 aka CVE-2019-9074 aka PR24235
  bsc#1140126 aka CVE-2019-12972 aka PR23405
  bsc#1143609 aka CVE-2019-14444 aka PR24829
  bsc#1142649 aka CVE-2019-14250 aka PR90924

* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496355" comment="binutils-devel-32bit-2.35-7.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110502" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496496" comment="kernel-docs-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496497" comment="kernel-obs-build-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496498" comment="kernel-preempt-devel-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496499" comment="kernel-source-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496500" comment="kernel-syms-5.3.18-24.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110503" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1106272" ref_url="https://bugzilla.suse.com/1106272" source="BUGZILLA"/>
		<reference ref_id="1178067" ref_url="https://bugzilla.suse.com/1178067" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27560" ref_url="https://www.suse.com/security/cve/CVE-2020-27560/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007699.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-27560: Fixed potential denial of service in OptimizeLayerFrames function in MagickCore/layer.c (bsc#1178067).
- Fixed greyish image produced by incorrect colorspace (bsc#1106272).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1106272">SUSE bug 1106272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178067">SUSE bug 1178067</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27560/">CVE-2020-27560</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496501" comment="perl-PerlMagick-7.0.7.34-10.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110504" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496502" comment="kernel-docs-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496503" comment="kernel-obs-build-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496504" comment="kernel-preempt-devel-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496505" comment="kernel-source-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496506" comment="kernel-syms-5.3.18-24.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110505" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496361" comment="openldap2-devel-32bit-2.4.46-9.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110506" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1178750" ref_url="https://bugzilla.suse.com/1178750" source="BUGZILLA"/>
		<reference ref_id="1178752" ref_url="https://bugzilla.suse.com/1178752" source="BUGZILLA"/>
		<reference ref_id="1178753" ref_url="https://bugzilla.suse.com/1178753" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362/" source="CVE"/>
		<reference ref_id="CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366/" source="CVE"/>
		<reference ref_id="CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007806.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

- go1.15.5 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.
  * go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)
  * go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)
  * go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)
  * go#42169 cmd/compile, runtime, reflect: pointers to go:notinheap types must be stored indirectly in interfaces
  * go#42151 cmd/cgo: opaque struct pointers are broken since Go 1.15.3
  * go#42138 time: Location interprets wrong timezone (DST) with slim zoneinfo
  * go#42113 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly
  * go#41914 net/http: request.Clone doesn't deep copy TransferEncoding
  * go#41704 runtime: macOS syscall.Exec can get SIGILL due to preemption signal
  * go#41463 compress/flate: deflatefast produces corrupted output
  * go#41387 x/net/http2: connection-level flow control not returned if stream errors, causes server hang
  * go#40974 cmd/link: sectionForAddress(0xA9D67F) address not in any section file
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178750">SUSE bug 1178750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178752">SUSE bug 1178752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178753">SUSE bug 1178753</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496362" comment="go1.15-1.15.5-1.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496363" comment="go1.15-doc-1.15.5-1.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110507" version="1" class="patch">
	<metadata>
		<title>Security update for go1.14 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1164903" ref_url="https://bugzilla.suse.com/1164903" source="BUGZILLA"/>
		<reference ref_id="1178750" ref_url="https://bugzilla.suse.com/1178750" source="BUGZILLA"/>
		<reference ref_id="1178752" ref_url="https://bugzilla.suse.com/1178752" source="BUGZILLA"/>
		<reference ref_id="1178753" ref_url="https://bugzilla.suse.com/1178753" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28362" ref_url="https://www.suse.com/security/cve/CVE-2020-28362/" source="CVE"/>
		<reference ref_id="CVE-2020-28366" ref_url="https://www.suse.com/security/cve/CVE-2020-28366/" source="CVE"/>
		<reference ref_id="CVE-2020-28367" ref_url="https://www.suse.com/security/cve/CVE-2020-28367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007807.html" source="SUSE-SU"/>
		<description>
This update for go1.14 fixes the following issues:

- go1.14.12 (released 2020-11-12) includes security fixes to the cmd/go and math/big packages.
  * go#42553 math/big: panic during recursive division of very large numbers (bsc#1178750 CVE-2020-28362)
  * go#42560 cmd/go: arbitrary code can be injected into cgo generated files (bsc#1178752 CVE-2020-28367)
  * go#42557 cmd/go: improper validation of cgo flags can lead to remote code execution at build time (bsc#1178753 CVE-2020-28366)
  * go#42155 time: Location interprets wrong timezone (DST) with slim zoneinfo
  * go#42112 x/net/http2: the first write error on a connection will cause all subsequent write requests to fail blindly
  * go#41991 runtime: macOS-only segfault on 1.14+ with 'split stack overflow'
  * go#41913 net/http: request.Clone doesn't deep copy TransferEncoding
  * go#41703 runtime: macOS syscall.Exec can get SIGILL due to preemption signal
  * go#41386 x/net/http2: connection-level flow control not returned if stream errors, causes server hang
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164903">SUSE bug 1164903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178750">SUSE bug 1178750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178752">SUSE bug 1178752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178753">SUSE bug 1178753</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28362/">CVE-2020-28362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28366/">CVE-2020-28366</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28367/">CVE-2020-28367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496364" comment="go1.14-1.14.12-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496365" comment="go1.14-doc-1.14.12-1.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110508" version="1" class="patch">
	<metadata>
		<title>Security update for dash (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178978" ref_url="https://bugzilla.suse.com/1178978" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007839.html" source="SUSE-SU"/>
		<description>
This update for dash fixes the following issues:

- Fixed an issue where code was executed even if noexec ('-n')  was specified (bsc#1178978).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-23"/>
	<updated date="2020-11-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178978">SUSE bug 1178978</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496366" comment="dash-0.5.11.2-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110509" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496507" comment="xorg-x11-server-sdk-1.20.3-22.5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110510" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1179193" ref_url="https://bugzilla.suse.com/1179193" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3593-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007908.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

Update to 3.6.12 (bsc#1179193), including:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179193">SUSE bug 1179193</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496393" comment="python3-tools-3.6.12-3.64.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110511" version="1" class="patch">
	<metadata>
		<title>Security update for rpmlint (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169614" ref_url="https://bugzilla.suse.com/1169614" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007913.html" source="SUSE-SU"/>
		<description>
This update for rpmlint fixes the following issues:

- Whitelist PAM modules and DBUS rules for cockpit (bsc#1169614)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169614">SUSE bug 1169614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496394" comment="rpmlint-1.10-7.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110512" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496508" comment="kernel-docs-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496509" comment="kernel-obs-build-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496510" comment="kernel-preempt-devel-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496511" comment="kernel-source-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496512" comment="kernel-syms-5.3.18-24.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110513" version="1" class="patch">
	<metadata>
		<title>Security update for gcc7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1150164" ref_url="https://bugzilla.suse.com/1150164" source="BUGZILLA"/>
		<reference ref_id="1161913" ref_url="https://bugzilla.suse.com/1161913" source="BUGZILLA"/>
		<reference ref_id="1167939" ref_url="https://bugzilla.suse.com/1167939" source="BUGZILLA"/>
		<reference ref_id="1172798" ref_url="https://bugzilla.suse.com/1172798" source="BUGZILLA"/>
		<reference ref_id="1178577" ref_url="https://bugzilla.suse.com/1178577" source="BUGZILLA"/>
		<reference ref_id="1178614" ref_url="https://bugzilla.suse.com/1178614" source="BUGZILLA"/>
		<reference ref_id="1178624" ref_url="https://bugzilla.suse.com/1178624" source="BUGZILLA"/>
		<reference ref_id="1178675" ref_url="https://bugzilla.suse.com/1178675" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13844" ref_url="https://www.suse.com/security/cve/CVE-2020-13844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3749-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007963.html" source="SUSE-SU"/>
		<description>
This update for gcc7 fixes the following issues:

- CVE-2020-13844: Added mitigation for aarch64 Straight Line Speculation issue (bsc#1172798)
- Enable fortran for the nvptx offload compiler. 
- Update README.First-for.SuSE.packagers
- avoid assembler errors with AVX512 gather and scatter instructions when using -masm=intel.
- Backport the aarch64 -moutline-atomics feature and accumulated fixes but not its
  default enabling.  [jsc#SLE-12209, bsc#1167939]
- Fixed 32bit libgnat.so link.  [bsc#1178675]
- Fixed memcpy miscompilation on aarch64. [bsc#1178624, bsc#1178577]
- Fixed debug line info for try/catch.  [bsc#1178614]
- Remove -mbranch-protection=standard (aarch64 flag) when gcc7 is used to build gcc7 (ie when ada is enabled)
- Fixed corruption of pass private -&gt;aux via DF. [gcc#94148]
- Fixed debug information issue with inlined functions and passed by reference arguments.  [gcc#93888]
- Fixed binutils release date detection issue.
- Fixed register allocation issue with exception handling code on s390x.  [bsc#1161913] 
- Fixed miscompilation of some atomic code on aarch64. [bsc#1150164]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1150164">SUSE bug 1150164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161913">SUSE bug 1161913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167939">SUSE bug 1167939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172798">SUSE bug 1172798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178577">SUSE bug 1178577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178614">SUSE bug 1178614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178624">SUSE bug 1178624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178675">SUSE bug 1178675</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13844/">CVE-2020-13844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496399" comment="cross-nvptx-gcc7-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496400" comment="cross-nvptx-newlib7-devel-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496401" comment="gcc7-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496402" comment="gcc7-ada-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496403" comment="gcc7-c++-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496404" comment="gcc7-fortran-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496405" comment="gcc7-info-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496406" comment="gcc7-locale-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496407" comment="gcc7-objc-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496408" comment="libada7-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496409" comment="libasan4-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496410" comment="libcilkrts5-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496411" comment="libstdc++6-devel-gcc7-32bit-7.5.0+r278197-4.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496412" comment="libubsan0-32bit-7.5.0+r278197-4.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110514" version="1" class="patch">
	<metadata>
		<title>Security update for groovy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179729" ref_url="https://bugzilla.suse.com/1179729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17521" ref_url="https://www.suse.com/security/cve/CVE-2020-17521/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008109.html" source="SUSE-SU"/>
		<description>
This update for groovy fixes the following issues:
	  
- groovy was updated to 2.4.21
- CVE-2020-17521: Fixed an information disclosure vulnerability (bsc#1179729).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179729">SUSE bug 1179729</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17521/">CVE-2020-17521</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496513" comment="groovy-lib-2.4.21-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110515" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179727" ref_url="https://bugzilla.suse.com/1179727" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27218" ref_url="https://www.suse.com/security/cve/CVE-2020-27218/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008114.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- jetty-minimal was upgraded to version 9.4.35.v20201120
- CVE-2020-27218: Fixed an issue where buffer not correctly recycled in Gzip Request inflation (bsc#1179727).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179727">SUSE bug 1179727</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27218/">CVE-2020-27218</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496514" comment="jetty-http-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496515" comment="jetty-io-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496516" comment="jetty-security-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496517" comment="jetty-server-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496518" comment="jetty-servlet-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496519" comment="jetty-util-9.4.35-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496520" comment="jetty-util-ajax-9.4.35-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110516" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1155094" ref_url="https://bugzilla.suse.com/1155094" source="BUGZILLA"/>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="1174571" ref_url="https://bugzilla.suse.com/1174571" source="BUGZILLA"/>
		<reference ref_id="1174701" ref_url="https://bugzilla.suse.com/1174701" source="BUGZILLA"/>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="1178009" ref_url="https://bugzilla.suse.com/1178009" source="BUGZILLA"/>
		<reference ref_id="1179193" ref_url="https://bugzilla.suse.com/1179193" source="BUGZILLA"/>
		<reference ref_id="1179630" ref_url="https://bugzilla.suse.com/1179630" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16935" ref_url="https://www.suse.com/security/cve/CVE-2019-16935/" source="CVE"/>
		<reference ref_id="CVE-2019-18348" ref_url="https://www.suse.com/security/cve/CVE-2019-18348/" source="CVE"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="CVE-2019-5010" ref_url="https://www.suse.com/security/cve/CVE-2019-5010/" source="CVE"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="CVE-2020-27619" ref_url="https://www.suse.com/security/cve/CVE-2020-27619/" source="CVE"/>
		<reference ref_id="CVE-2020-8492" ref_url="https://www.suse.com/security/cve/CVE-2020-8492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008118.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- Fixed CVE-2020-27619 (bsc#1178009), where Lib/test/multibytecodec_support
  calls eval() on content retrieved via HTTP.
- Change setuptools and pip version numbers according to new wheels
- Handful of changes to make python36 compatible with SLE15 and SLE12
  (jsc#ECO-2799, jsc#SLE-13738)
- add triplets for mips-r6 and riscv
- RISC-V needs CTYPES_PASS_BY_REF_HACK

Update to 3.6.12 (bsc#1179193)

* Ensure python3.dll is loaded from correct locations when Python is embedded
* The __hash__() methods of ipaddress.IPv4Interface and ipaddress.IPv6Interface 
  incorrectly generated constant hash values of 32 and 128 respectively. This 
  resulted in always causing hash collisions. The fix uses hash() to generate 
  hash values for the tuple of (address, mask length, network address).
* Prevent http header injection by rejecting control characters in 
  http.client.putrequest(…).
* Unpickling invalid NEWOBJ_EX opcode with the C implementation raises now 
  UnpicklingError instead of crashing.
* Avoid infinite loop when reading specially crafted TAR files using the tarfile 
  module

- This release also fixes CVE-2020-26116 (bsc#1177211) and CVE-2019-20907 (bsc#1174091).

Update to 3.6.11:

- Disallow CR or LF in email.headerregistry. Address
  arguments to guard against header injection attacks.
- Disallow control characters in hostnames in http.client, addressing
  CVE-2019-18348. Such potentially malicious header injection URLs now
  cause a InvalidURL to be raised. (bsc#1155094)
- CVE-2020-8492: The AbstractBasicAuthHandler class
  of the urllib.request module uses an inefficient regular
  expression which can be exploited by an attacker to cause
  a denial of service. Fix the regex to prevent the
  catastrophic backtracking. Vulnerability reported by Ben
  Caller and Matt Schwager.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-23"/>
	<updated date="2020-12-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155094">SUSE bug 1155094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174571">SUSE bug 1174571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174701">SUSE bug 1174701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178009">SUSE bug 1178009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179193">SUSE bug 1179193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179630">SUSE bug 1179630</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-16935/">CVE-2019-16935</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-18348/">CVE-2019-18348</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5010/">CVE-2019-5010</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27619/">CVE-2020-27619</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8492/">CVE-2020-8492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496413" comment="python3-tools-3.6.12-3.67.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110517" version="1" class="patch">
	<metadata>
		<title>Security update for bcc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183399" ref_url="https://bugzilla.suse.com/1183399" source="BUGZILLA"/>
		<description>
This update for bcc fixes the following issues:

- Enabled PIE for bcc-lua if lua support is enabled (bsc#1183399)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183399">SUSE bug 1183399</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496521" comment="bcc-devel-0.12.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496522" comment="bcc-docs-0.12.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496523" comment="bcc-examples-0.12.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496524" comment="bcc-tools-0.12.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496525" comment="libbcc0-0.12.0-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496526" comment="python3-bcc-0.12.0-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110518" version="1" class="patch">
	<metadata>
		<title>Security update for spamassassin (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159133" ref_url="https://bugzilla.suse.com/1159133" source="BUGZILLA"/>
		<reference ref_id="1184221" ref_url="https://bugzilla.suse.com/1184221" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12420" ref_url="https://www.suse.com/security/cve/CVE-2019-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-1946" ref_url="https://www.suse.com/security/cve/CVE-2020-1946/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008622.html" source="SUSE-SU"/>
		<description>
This update for spamassassin fixes the following issues:

- CVE-2019-12420: memory leak via crafted messages (bsc#1159133)
- CVE-2020-1946: security update (bsc#1184221)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159133">SUSE bug 1159133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184221">SUSE bug 1184221</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-12420/">CVE-2019-12420</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1946/">CVE-2020-1946</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496527" comment="perl-Mail-SpamAssassin-Plugin-iXhash2-2.05-12.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110519" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496528" comment="kernel-docs-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496529" comment="kernel-obs-build-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496530" comment="kernel-preempt-devel-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496531" comment="kernel-source-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496532" comment="kernel-syms-5.3.18-24.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110520" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496533" comment="xorg-x11-server-sdk-1.20.3-22.5.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110521" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496534" comment="kernel-docs-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496535" comment="kernel-obs-build-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496536" comment="kernel-preempt-devel-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496537" comment="kernel-source-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496538" comment="kernel-syms-5.3.18-24.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110522" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184624" ref_url="https://bugzilla.suse.com/1184624" source="BUGZILLA"/>
		<reference ref_id="1184626" ref_url="https://bugzilla.suse.com/1184626" source="BUGZILLA"/>
		<reference ref_id="1184627" ref_url="https://bugzilla.suse.com/1184627" source="BUGZILLA"/>
		<reference ref_id="1184628" ref_url="https://bugzilla.suse.com/1184628" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20309" ref_url="https://www.suse.com/security/cve/CVE-2021-20309/" source="CVE"/>
		<reference ref_id="CVE-2021-20311" ref_url="https://www.suse.com/security/cve/CVE-2021-20311/" source="CVE"/>
		<reference ref_id="CVE-2021-20312" ref_url="https://www.suse.com/security/cve/CVE-2021-20312/" source="CVE"/>
		<reference ref_id="CVE-2021-20313" ref_url="https://www.suse.com/security/cve/CVE-2021-20313/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008667.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20309: Division by zero in WaveImage() of MagickCore/visual-effects. (bsc#1184624)
- CVE-2021-20311: Division by zero in sRGBTransformImage() in MagickCore/colorspace.c (bsc#1184626)
- CVE-2021-20312: Integer overflow in WriteTHUMBNAILImage of coders/thumbnail.c (bsc#1184627)
- CVE-2021-20313: Cipher leak when the calculating signatures in TransformSignatureof MagickCore/signature.c (bsc#1184628)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-20"/>
	<updated date="2021-04-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184624">SUSE bug 1184624</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184626">SUSE bug 1184626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184627">SUSE bug 1184627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184628">SUSE bug 1184628</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20309/">CVE-2021-20309</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20311/">CVE-2021-20311</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20312/">CVE-2021-20312</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20313/">CVE-2021-20313</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496539" comment="perl-PerlMagick-7.0.7.34-10.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110523" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="1179503" ref_url="https://bugzilla.suse.com/1179503" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

Non-security issue fixed:

- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179503">SUSE bug 1179503</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496540" comment="openldap2-devel-32bit-2.4.46-9.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110524" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184161" ref_url="https://bugzilla.suse.com/1184161" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25317" ref_url="https://www.suse.com/security/cve/CVE-2021-25317/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008715.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2021-25317: ownership of /var/log/cups could allow privilege escalation from lp user to root via symlink attacks (bsc#1184161)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-30"/>
	<updated date="2021-04-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184161">SUSE bug 1184161</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-25317/">CVE-2021-25317</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496541" comment="cups-ddk-2.2.7-3.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110525" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179202" ref_url="https://bugzilla.suse.com/1179202" source="BUGZILLA"/>
		<reference ref_id="1179208" ref_url="https://bugzilla.suse.com/1179208" source="BUGZILLA"/>
		<reference ref_id="1179212" ref_url="https://bugzilla.suse.com/1179212" source="BUGZILLA"/>
		<reference ref_id="1179221" ref_url="https://bugzilla.suse.com/1179221" source="BUGZILLA"/>
		<reference ref_id="1179223" ref_url="https://bugzilla.suse.com/1179223" source="BUGZILLA"/>
		<reference ref_id="1179240" ref_url="https://bugzilla.suse.com/1179240" source="BUGZILLA"/>
		<reference ref_id="1179244" ref_url="https://bugzilla.suse.com/1179244" source="BUGZILLA"/>
		<reference ref_id="1179260" ref_url="https://bugzilla.suse.com/1179260" source="BUGZILLA"/>
		<reference ref_id="1179268" ref_url="https://bugzilla.suse.com/1179268" source="BUGZILLA"/>
		<reference ref_id="1179269" ref_url="https://bugzilla.suse.com/1179269" source="BUGZILLA"/>
		<reference ref_id="1179276" ref_url="https://bugzilla.suse.com/1179276" source="BUGZILLA"/>
		<reference ref_id="1179278" ref_url="https://bugzilla.suse.com/1179278" source="BUGZILLA"/>
		<reference ref_id="1179281" ref_url="https://bugzilla.suse.com/1179281" source="BUGZILLA"/>
		<reference ref_id="1179285" ref_url="https://bugzilla.suse.com/1179285" source="BUGZILLA"/>
		<reference ref_id="1179311" ref_url="https://bugzilla.suse.com/1179311" source="BUGZILLA"/>
		<reference ref_id="1179312" ref_url="https://bugzilla.suse.com/1179312" source="BUGZILLA"/>
		<reference ref_id="1179313" ref_url="https://bugzilla.suse.com/1179313" source="BUGZILLA"/>
		<reference ref_id="1179315" ref_url="https://bugzilla.suse.com/1179315" source="BUGZILLA"/>
		<reference ref_id="1179317" ref_url="https://bugzilla.suse.com/1179317" source="BUGZILLA"/>
		<reference ref_id="1179321" ref_url="https://bugzilla.suse.com/1179321" source="BUGZILLA"/>
		<reference ref_id="1179322" ref_url="https://bugzilla.suse.com/1179322" source="BUGZILLA"/>
		<reference ref_id="1179327" ref_url="https://bugzilla.suse.com/1179327" source="BUGZILLA"/>
		<reference ref_id="1179333" ref_url="https://bugzilla.suse.com/1179333" source="BUGZILLA"/>
		<reference ref_id="1179336" ref_url="https://bugzilla.suse.com/1179336" source="BUGZILLA"/>
		<reference ref_id="1179338" ref_url="https://bugzilla.suse.com/1179338" source="BUGZILLA"/>
		<reference ref_id="1179339" ref_url="https://bugzilla.suse.com/1179339" source="BUGZILLA"/>
		<reference ref_id="1179343" ref_url="https://bugzilla.suse.com/1179343" source="BUGZILLA"/>
		<reference ref_id="1179345" ref_url="https://bugzilla.suse.com/1179345" source="BUGZILLA"/>
		<reference ref_id="1179346" ref_url="https://bugzilla.suse.com/1179346" source="BUGZILLA"/>
		<reference ref_id="1179347" ref_url="https://bugzilla.suse.com/1179347" source="BUGZILLA"/>
		<reference ref_id="1179361" ref_url="https://bugzilla.suse.com/1179361" source="BUGZILLA"/>
		<reference ref_id="1179362" ref_url="https://bugzilla.suse.com/1179362" source="BUGZILLA"/>
		<reference ref_id="1179397" ref_url="https://bugzilla.suse.com/1179397" source="BUGZILLA"/>
		<reference ref_id="1179753" ref_url="https://bugzilla.suse.com/1179753" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25664" ref_url="https://www.suse.com/security/cve/CVE-2020-25664/" source="CVE"/>
		<reference ref_id="CVE-2020-25665" ref_url="https://www.suse.com/security/cve/CVE-2020-25665/" source="CVE"/>
		<reference ref_id="CVE-2020-25666" ref_url="https://www.suse.com/security/cve/CVE-2020-25666/" source="CVE"/>
		<reference ref_id="CVE-2020-25674" ref_url="https://www.suse.com/security/cve/CVE-2020-25674/" source="CVE"/>
		<reference ref_id="CVE-2020-25675" ref_url="https://www.suse.com/security/cve/CVE-2020-25675/" source="CVE"/>
		<reference ref_id="CVE-2020-25676" ref_url="https://www.suse.com/security/cve/CVE-2020-25676/" source="CVE"/>
		<reference ref_id="CVE-2020-27750" ref_url="https://www.suse.com/security/cve/CVE-2020-27750/" source="CVE"/>
		<reference ref_id="CVE-2020-27751" ref_url="https://www.suse.com/security/cve/CVE-2020-27751/" source="CVE"/>
		<reference ref_id="CVE-2020-27752" ref_url="https://www.suse.com/security/cve/CVE-2020-27752/" source="CVE"/>
		<reference ref_id="CVE-2020-27753" ref_url="https://www.suse.com/security/cve/CVE-2020-27753/" source="CVE"/>
		<reference ref_id="CVE-2020-27754" ref_url="https://www.suse.com/security/cve/CVE-2020-27754/" source="CVE"/>
		<reference ref_id="CVE-2020-27755" ref_url="https://www.suse.com/security/cve/CVE-2020-27755/" source="CVE"/>
		<reference ref_id="CVE-2020-27756" ref_url="https://www.suse.com/security/cve/CVE-2020-27756/" source="CVE"/>
		<reference ref_id="CVE-2020-27757" ref_url="https://www.suse.com/security/cve/CVE-2020-27757/" source="CVE"/>
		<reference ref_id="CVE-2020-27758" ref_url="https://www.suse.com/security/cve/CVE-2020-27758/" source="CVE"/>
		<reference ref_id="CVE-2020-27759" ref_url="https://www.suse.com/security/cve/CVE-2020-27759/" source="CVE"/>
		<reference ref_id="CVE-2020-27760" ref_url="https://www.suse.com/security/cve/CVE-2020-27760/" source="CVE"/>
		<reference ref_id="CVE-2020-27761" ref_url="https://www.suse.com/security/cve/CVE-2020-27761/" source="CVE"/>
		<reference ref_id="CVE-2020-27762" ref_url="https://www.suse.com/security/cve/CVE-2020-27762/" source="CVE"/>
		<reference ref_id="CVE-2020-27763" ref_url="https://www.suse.com/security/cve/CVE-2020-27763/" source="CVE"/>
		<reference ref_id="CVE-2020-27764" ref_url="https://www.suse.com/security/cve/CVE-2020-27764/" source="CVE"/>
		<reference ref_id="CVE-2020-27765" ref_url="https://www.suse.com/security/cve/CVE-2020-27765/" source="CVE"/>
		<reference ref_id="CVE-2020-27766" ref_url="https://www.suse.com/security/cve/CVE-2020-27766/" source="CVE"/>
		<reference ref_id="CVE-2020-27767" ref_url="https://www.suse.com/security/cve/CVE-2020-27767/" source="CVE"/>
		<reference ref_id="CVE-2020-27768" ref_url="https://www.suse.com/security/cve/CVE-2020-27768/" source="CVE"/>
		<reference ref_id="CVE-2020-27769" ref_url="https://www.suse.com/security/cve/CVE-2020-27769/" source="CVE"/>
		<reference ref_id="CVE-2020-27770" ref_url="https://www.suse.com/security/cve/CVE-2020-27770/" source="CVE"/>
		<reference ref_id="CVE-2020-27771" ref_url="https://www.suse.com/security/cve/CVE-2020-27771/" source="CVE"/>
		<reference ref_id="CVE-2020-27772" ref_url="https://www.suse.com/security/cve/CVE-2020-27772/" source="CVE"/>
		<reference ref_id="CVE-2020-27773" ref_url="https://www.suse.com/security/cve/CVE-2020-27773/" source="CVE"/>
		<reference ref_id="CVE-2020-27774" ref_url="https://www.suse.com/security/cve/CVE-2020-27774/" source="CVE"/>
		<reference ref_id="CVE-2020-27775" ref_url="https://www.suse.com/security/cve/CVE-2020-27775/" source="CVE"/>
		<reference ref_id="CVE-2020-27776" ref_url="https://www.suse.com/security/cve/CVE-2020-27776/" source="CVE"/>
		<reference ref_id="CVE-2020-29599" ref_url="https://www.suse.com/security/cve/CVE-2020-29599/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008217.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-25664: Fixed a heap-based buffer overflow in PopShortPixel (bsc#1179202).
- CVE-2020-25665: Fixed a heap-based buffer overflow in WritePALMImage (bsc#1179208).
- CVE-2020-25666: Fixed an outside the range of representable values of type 'int' and signed integer overflow (bsc#1179212).
- CVE-2020-25674: Fixed a heap-based buffer overflow in WriteOnePNGImage (bsc#1179223).
- CVE-2020-25675: Fixed an outside the range of representable values of type 'long' and integer overflow (bsc#1179240).
- CVE-2020-25676: Fixed an outside the range of representable values of type 'long' and integer overflow at MagickCore/pixel.c (bsc#1179244).
- CVE-2020-27750: Fixed a division by zero in MagickCore/colorspace-private.h (bsc#1179260).
- CVE-2020-27751: Fixed an integer overflow in MagickCore/quantum-export.c (bsc#1179269).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27752: Fixed a heap-based buffer overflow in PopShortPixel in MagickCore/quantum-private.h (bsc#1179346).
- CVE-2020-27753: Fixed memory leaks in AcquireMagickMemory function (bsc#1179397).
- CVE-2020-27755: Fixed memory leaks in ResizeMagickMemory function in ImageMagick/MagickCore/memory.c (bsc#1179345).
- CVE-2020-27756: Fixed a division by zero at MagickCore/geometry.c (bsc#1179221).
- CVE-2020-27757: Fixed an outside the range of representable values of type 'unsigned long long' at MagickCore/quantum-private.h (bsc#1179268).
- CVE-2020-27758: Fixed an outside the range of representable values of type 'unsigned long long' (bsc#1179276).
- CVE-2020-27759: Fixed an outside the range of representable values of type 'int' at MagickCore/quantize.c (bsc#1179313).
- CVE-2020-27760: Fixed a division by zero at MagickCore/enhance.c (bsc#1179281).
- CVE-2020-27761: Fixed an outside the range of representable values of type 'unsigned long' at coders/palm.c (bsc#1179315).
- CVE-2020-27762: Fixed an outside the range of representable values of type 'unsigned char' (bsc#1179278).
- CVE-2020-27763: Fixed a division by zero at MagickCore/resize.c (bsc#1179312).
- CVE-2020-27764: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179317).
- CVE-2020-27765: Fixed a division by zero at MagickCore/segment.c (bsc#1179311).
- CVE-2020-27766: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179361).
- CVE-2020-27767: Fixed an outside the range of representable values of type 'float' at MagickCore/quantum.h (bsc#1179322).
- CVE-2020-27768: Fixed an outside the range of representable values of type 'unsigned int' at MagickCore/quantum-private.h (bsc#1179339).
- CVE-2020-27770: Fixed an unsigned offset overflowed at MagickCore/string.c (bsc#1179343).
- CVE-2020-27771: Fixed an outside the range of representable values of type 'unsigned char' at coders/pdf.c (bsc#1179327).
- CVE-2020-27772: Fixed an outside the range of representable values of type 'unsigned int' at coders/bmp.c (bsc#1179347).
- CVE-2020-27773: Fixed a division by zero at MagickCore/gem-private.h (bsc#1179285).
- CVE-2020-27774: Fixed an integer overflow at MagickCore/statistic.c (bsc#1179333).
- CVE-2020-27775: Fixed an outside the range of representable values of type 'unsigned char' at MagickCore/quantum.h (bsc#1179338).
- CVE-2020-27776: Fixed an outside the range of representable values of type 'unsigned long' at MagickCore/statistic.c (bsc#1179362).
- CVE-2020-29599: Fixed a shell command injection in -authenticate (bsc#1179753).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-15"/>
	<updated date="2021-01-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179202">SUSE bug 1179202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179208">SUSE bug 1179208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179212">SUSE bug 1179212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179221">SUSE bug 1179221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179223">SUSE bug 1179223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179240">SUSE bug 1179240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179244">SUSE bug 1179244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179260">SUSE bug 1179260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179268">SUSE bug 1179268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179269">SUSE bug 1179269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179276">SUSE bug 1179276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179278">SUSE bug 1179278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179281">SUSE bug 1179281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179285">SUSE bug 1179285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179311">SUSE bug 1179311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179312">SUSE bug 1179312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179313">SUSE bug 1179313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179315">SUSE bug 1179315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179317">SUSE bug 1179317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179321">SUSE bug 1179321</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179322">SUSE bug 1179322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179327">SUSE bug 1179327</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179333">SUSE bug 1179333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179336">SUSE bug 1179336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179338">SUSE bug 1179338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179339">SUSE bug 1179339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179343">SUSE bug 1179343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179345">SUSE bug 1179345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179346">SUSE bug 1179346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179347">SUSE bug 1179347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179361">SUSE bug 1179361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179362">SUSE bug 1179362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179397">SUSE bug 1179397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179753">SUSE bug 1179753</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-25664/">CVE-2020-25664</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25665/">CVE-2020-25665</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25666/">CVE-2020-25666</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25674/">CVE-2020-25674</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25675/">CVE-2020-25675</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25676/">CVE-2020-25676</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27750/">CVE-2020-27750</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27751/">CVE-2020-27751</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27752/">CVE-2020-27752</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27753/">CVE-2020-27753</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27754/">CVE-2020-27754</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27755/">CVE-2020-27755</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27756/">CVE-2020-27756</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27757/">CVE-2020-27757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27758/">CVE-2020-27758</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27759/">CVE-2020-27759</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27760/">CVE-2020-27760</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27761/">CVE-2020-27761</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27762/">CVE-2020-27762</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27763/">CVE-2020-27763</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27764/">CVE-2020-27764</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27765/">CVE-2020-27765</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27766/">CVE-2020-27766</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27767/">CVE-2020-27767</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27768/">CVE-2020-27768</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27769/">CVE-2020-27769</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27770/">CVE-2020-27770</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27771/">CVE-2020-27771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27772/">CVE-2020-27772</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27773/">CVE-2020-27773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27774/">CVE-2020-27774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27775/">CVE-2020-27775</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27776/">CVE-2020-27776</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29599/">CVE-2020-29599</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496542" comment="perl-PerlMagick-7.0.7.34-10.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110526" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008753.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3426: Fixed an information disclosure via pydoc (bsc#1183374)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496543" comment="python3-tools-3.6.13-3.81.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110527" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496544" comment="kernel-docs-5.3.18-24.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496545" comment="kernel-obs-build-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496546" comment="kernel-preempt-devel-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496547" comment="kernel-source-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496548" comment="kernel-syms-5.3.18-24.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110528" version="1" class="patch">
	<metadata>
		<title>Security update for dtc (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184122" ref_url="https://bugzilla.suse.com/1184122" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008772.html" source="SUSE-SU"/>
		<description>
This update for dtc fixes the following issues:

-  make all packaged binaries PIE-executables (bsc#1184122).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-13"/>
	<updated date="2021-05-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184122">SUSE bug 1184122</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496549" comment="dtc-1.5.1-4.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110529" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496550" comment="graphviz-perl-2.40.1-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110530" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180145" ref_url="https://bugzilla.suse.com/1180145" source="BUGZILLA"/>
		<reference ref_id="1180146" ref_url="https://bugzilla.suse.com/1180146" source="BUGZILLA"/>
		<reference ref_id="1180994" ref_url="https://bugzilla.suse.com/1180994" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26217" ref_url="https://www.suse.com/security/cve/CVE-2020-26217/" source="CVE"/>
		<reference ref_id="CVE-2020-26258" ref_url="https://www.suse.com/security/cve/CVE-2020-26258/" source="CVE"/>
		<reference ref_id="CVE-2020-26259" ref_url="https://www.suse.com/security/cve/CVE-2020-26259/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008228.html" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

xstream was updated to version 1.4.15.

- CVE-2020-26217: Fixed a remote code execution due to insecure XML deserialization when relying on blocklists (bsc#1180994).
- CVE-2020-26258: Fixed a server-side request forgery vulnerability (bsc#1180146).
- CVE-2020-26259: Fixed an arbitrary file deletion vulnerability (bsc#1180145).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-20"/>
	<updated date="2021-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180145">SUSE bug 1180145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180146">SUSE bug 1180146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180994">SUSE bug 1180994</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26217/">CVE-2020-26217</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26258/">CVE-2020-26258</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-26259/">CVE-2020-26259</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496551" comment="xstream-1.4.15-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110531" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185013" ref_url="https://bugzilla.suse.com/1185013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3504" ref_url="https://www.suse.com/security/cve/CVE-2021-3504/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008840.html" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3504: hivex: missing bounds check within hivex_open() (bsc#1185013)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185013">SUSE bug 1185013</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3504/">CVE-2021-3504</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496552" comment="ocaml-hivex-1.3.14-5.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496553" comment="ocaml-hivex-devel-1.3.14-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110532" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184372" ref_url="https://bugzilla.suse.com/1184372" source="BUGZILLA"/>
		<reference ref_id="1184373" ref_url="https://bugzilla.suse.com/1184373" source="BUGZILLA"/>
		<reference ref_id="1184374" ref_url="https://bugzilla.suse.com/1184374" source="BUGZILLA"/>
		<reference ref_id="1184375" ref_url="https://bugzilla.suse.com/1184375" source="BUGZILLA"/>
		<reference ref_id="1184376" ref_url="https://bugzilla.suse.com/1184376" source="BUGZILLA"/>
		<reference ref_id="1184377" ref_url="https://bugzilla.suse.com/1184377" source="BUGZILLA"/>
		<reference ref_id="1184378" ref_url="https://bugzilla.suse.com/1184378" source="BUGZILLA"/>
		<reference ref_id="1184379" ref_url="https://bugzilla.suse.com/1184379" source="BUGZILLA"/>
		<reference ref_id="1184380" ref_url="https://bugzilla.suse.com/1184380" source="BUGZILLA"/>
		<reference ref_id="1184796" ref_url="https://bugzilla.suse.com/1184796" source="BUGZILLA"/>
		<reference ref_id="1184797" ref_url="https://bugzilla.suse.com/1184797" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21341" ref_url="https://www.suse.com/security/cve/CVE-2021-21341/" source="CVE"/>
		<reference ref_id="CVE-2021-21342" ref_url="https://www.suse.com/security/cve/CVE-2021-21342/" source="CVE"/>
		<reference ref_id="CVE-2021-21343" ref_url="https://www.suse.com/security/cve/CVE-2021-21343/" source="CVE"/>
		<reference ref_id="CVE-2021-21344" ref_url="https://www.suse.com/security/cve/CVE-2021-21344/" source="CVE"/>
		<reference ref_id="CVE-2021-21345" ref_url="https://www.suse.com/security/cve/CVE-2021-21345/" source="CVE"/>
		<reference ref_id="CVE-2021-21346" ref_url="https://www.suse.com/security/cve/CVE-2021-21346/" source="CVE"/>
		<reference ref_id="CVE-2021-21347" ref_url="https://www.suse.com/security/cve/CVE-2021-21347/" source="CVE"/>
		<reference ref_id="CVE-2021-21348" ref_url="https://www.suse.com/security/cve/CVE-2021-21348/" source="CVE"/>
		<reference ref_id="CVE-2021-21349" ref_url="https://www.suse.com/security/cve/CVE-2021-21349/" source="CVE"/>
		<reference ref_id="CVE-2021-21350" ref_url="https://www.suse.com/security/cve/CVE-2021-21350/" source="CVE"/>
		<reference ref_id="CVE-2021-21351" ref_url="https://www.suse.com/security/cve/CVE-2021-21351/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008912.html" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

- Upgrade to 1.4.16
- CVE-2021-21351: remote attacker to load and execute arbitrary code (bsc#1184796)
- CVE-2021-21349: SSRF can lead to a remote attacker to request data from internal resources (bsc#1184797)
- CVE-2021-21350: arbitrary code execution (bsc#1184380)
- CVE-2021-21348: remote attacker could cause denial of service by consuming maximum CPU time (bsc#1184374)
- CVE-2021-21347: remote attacker to load and execute arbitrary code from a remote host (bsc#1184378)
- CVE-2021-21344: remote attacker could load and execute arbitrary code from a remote host (bsc#1184375)
- CVE-2021-21342: server-side forgery (bsc#1184379)
- CVE-2021-21341: remote attacker could cause a denial of service by allocating 100% CPU time (bsc#1184377)
- CVE-2021-21346: remote attacker could load and execute arbitrary code (bsc#1184373)
- CVE-2021-21345: remote attacker with sufficient rights could execute commands (bsc#1184372)
- CVE-2021-21343: replace or inject objects, that result in the deletion of files on the local host (bsc#1184376)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184372">SUSE bug 1184372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184373">SUSE bug 1184373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184374">SUSE bug 1184374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184375">SUSE bug 1184375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184376">SUSE bug 1184376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184377">SUSE bug 1184377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184378">SUSE bug 1184378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184379">SUSE bug 1184379</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184380">SUSE bug 1184380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184796">SUSE bug 1184796</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184797">SUSE bug 1184797</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21341/">CVE-2021-21341</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21342/">CVE-2021-21342</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21343/">CVE-2021-21343</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21344/">CVE-2021-21344</cve>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21345/">CVE-2021-21345</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21346/">CVE-2021-21346</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21347/">CVE-2021-21347</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21348/">CVE-2021-21348</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21349/">CVE-2021-21349</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21350/">CVE-2021-21350</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21351/">CVE-2021-21351</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496554" comment="xstream-1.4.16-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110533" version="1" class="patch">
	<metadata>
		<title>Security update for snakeyaml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159488" ref_url="https://bugzilla.suse.com/1159488" source="BUGZILLA"/>
		<reference ref_id="1186088" ref_url="https://bugzilla.suse.com/1186088" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18640" ref_url="https://www.suse.com/security/cve/CVE-2017-18640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008943.html" source="SUSE-SU"/>
		<description>
This update for snakeyaml fixes the following issues:

- Upgrade to 1.28
- CVE-2017-18640: The Alias feature allows entity expansion during a load operation (bsc#1159488, bsc#1186088)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-07"/>
	<updated date="2021-06-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159488">SUSE bug 1159488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186088">SUSE bug 1186088</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18640/">CVE-2017-18640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496555" comment="snakeyaml-1.28-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110534" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496556" comment="kernel-docs-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496557" comment="kernel-obs-build-5.3.18-24.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496558" comment="kernel-preempt-devel-5.3.18-24.67.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496559" comment="kernel-source-5.3.18-24.67.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496560" comment="kernel-syms-5.3.18-24.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110535" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186651" ref_url="https://bugzilla.suse.com/1186651" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29505" ref_url="https://www.suse.com/security/cve/CVE-2021-29505/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009027.html" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

Upgrade to 1.4.17

- CVE-2021-29505: Fixed potential code execution when unmarshalling with XStream instances
  using an uninitialized security framework (bsc#1186651)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186651">SUSE bug 1186651</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29505/">CVE-2021-29505</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496563" comment="xstream-1.4.17-3.11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110536" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184366" ref_url="https://bugzilla.suse.com/1184366" source="BUGZILLA"/>
		<reference ref_id="1184367" ref_url="https://bugzilla.suse.com/1184367" source="BUGZILLA"/>
		<reference ref_id="1184368" ref_url="https://bugzilla.suse.com/1184368" source="BUGZILLA"/>
		<reference ref_id="1187117" ref_url="https://bugzilla.suse.com/1187117" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28163" ref_url="https://www.suse.com/security/cve/CVE-2021-28163/" source="CVE"/>
		<reference ref_id="CVE-2021-28164" ref_url="https://www.suse.com/security/cve/CVE-2021-28164/" source="CVE"/>
		<reference ref_id="CVE-2021-28165" ref_url="https://www.suse.com/security/cve/CVE-2021-28165/" source="CVE"/>
		<reference ref_id="CVE-2021-28169" ref_url="https://www.suse.com/security/cve/CVE-2021-28169/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009033.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

Update to version 9.4.42.v20210604

- Fix: bsc#1187117, CVE-2021-28169 - possible for requests to the ConcatServlet with a doubly encoded path to access protected resources within the WEB-INF directory
- Fix: bsc#1184367, CVE-2021-28165 - jetty server high CPU when client send data length &gt; 17408
- Fix: bsc#1184368, CVE-2021-28164 - Normalize ambiguous URIs
- Fix: bsc#1184366, CVE-2021-28163 - Exclude webapps directory from deployment scan
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184366">SUSE bug 1184366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184367">SUSE bug 1184367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184368">SUSE bug 1184368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187117">SUSE bug 1187117</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28163/">CVE-2021-28163</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28164/">CVE-2021-28164</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28165/">CVE-2021-28165</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28169/">CVE-2021-28169</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496564" comment="jetty-http-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496565" comment="jetty-io-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496566" comment="jetty-security-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496567" comment="jetty-server-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496568" comment="jetty-servlet-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496569" comment="jetty-util-9.4.42-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496570" comment="jetty-util-ajax-9.4.42-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110537" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1185790" ref_url="https://bugzilla.suse.com/1185790" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009051.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

- Updated go to upstream version 1.15.12 (released 2021-05-06) (bsc#1175132).
- CVE-2021-31525: Fixed stack overflow via net/http ReadRequest (bsc#1185790).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185790">SUSE bug 1185790</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496571" comment="go1.15-1.15.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496572" comment="go1.15-doc-1.15.12-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496573" comment="go1.15-race-1.15.12-1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110538" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1185790" ref_url="https://bugzilla.suse.com/1185790" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31525" ref_url="https://www.suse.com/security/cve/CVE-2021-31525/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009052.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- Updated go to upstream version 1.16.4 (released 2021-05-06) (bsc#1182345).
- CVE-2021-31525: Fixed stack overflow via net/http ReadRequest (bsc#1185790).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185790">SUSE bug 1185790</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31525/">CVE-2021-31525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496574" comment="go1.16-1.16.4-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496575" comment="go1.16-doc-1.16.4-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496576" comment="go1.16-race-1.16.4-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110539" version="1" class="patch">
	<metadata>
		<title>Security update for bouncycastle (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186328" ref_url="https://bugzilla.suse.com/1186328" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15522" ref_url="https://www.suse.com/security/cve/CVE-2020-15522/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009091.html" source="SUSE-SU"/>
		<description>
This update for bouncycastle fixes the following issues:

- CVE-2020-15522: Fixed a timing issue within the EC math library (bsc#1186328).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-25"/>
	<updated date="2021-06-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186328">SUSE bug 1186328</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15522/">CVE-2020-15522</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496561" comment="bouncycastle-1.64-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496562" comment="bouncycastle-pg-1.64-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110540" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1186622" ref_url="https://bugzilla.suse.com/1186622" source="BUGZILLA"/>
		<reference ref_id="1187443" ref_url="https://bugzilla.suse.com/1187443" source="BUGZILLA"/>
		<reference ref_id="1187444" ref_url="https://bugzilla.suse.com/1187444" source="BUGZILLA"/>
		<reference ref_id="1187445" ref_url="https://bugzilla.suse.com/1187445" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009096.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to 1.16.5.

Includes these security fixes 

- CVE-2021-33195: net: Lookup functions may return invalid host names (bsc#1187443).
- CVE-2021-33196: archive/zip: malformed archive may cause panic or memory exhaustion (bsc#1186622).
- CVE-2021-33197: net/http/httputil: ReverseProxy forwards Connection headers if first one is empty (bsc#1187444)
- CVE-2021-33198: math/big: (*Rat).SetString with '1.770p02041010010011001001' crashes with 'makeslice: len out of range' (bsc#1187445).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-28"/>
	<updated date="2021-06-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186622">SUSE bug 1186622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615799" comment="go1.16-1.16.5-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615800" comment="go1.16-doc-1.16.5-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615801" comment="go1.16-race-1.16.5-1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110541" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1186622" ref_url="https://bugzilla.suse.com/1186622" source="BUGZILLA"/>
		<reference ref_id="1187443" ref_url="https://bugzilla.suse.com/1187443" source="BUGZILLA"/>
		<reference ref_id="1187444" ref_url="https://bugzilla.suse.com/1187444" source="BUGZILLA"/>
		<reference ref_id="1187445" ref_url="https://bugzilla.suse.com/1187445" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33195" ref_url="https://www.suse.com/security/cve/CVE-2021-33195/" source="CVE"/>
		<reference ref_id="CVE-2021-33196" ref_url="https://www.suse.com/security/cve/CVE-2021-33196/" source="CVE"/>
		<reference ref_id="CVE-2021-33197" ref_url="https://www.suse.com/security/cve/CVE-2021-33197/" source="CVE"/>
		<reference ref_id="CVE-2021-33198" ref_url="https://www.suse.com/security/cve/CVE-2021-33198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009104.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

Update to 1.15.13.
    
Includes these security fixes 

- CVE-2021-33195: net: Lookup functions may return invalid host names (bsc#1187443).
- CVE-2021-33196: archive/zip: malformed archive may cause panic or memory exhaustion (bsc#1186622).
- CVE-2021-33197: net/http/httputil: ReverseProxy forwards Connection headers if first one is empty (bsc#1187444)
- CVE-2021-33198: math/big: (*Rat).SetString with '1.770p02041010010011001001' crashes with 'makeslice: len out of range' (bsc#1187445).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186622">SUSE bug 1186622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187443">SUSE bug 1187443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187444">SUSE bug 1187444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187445">SUSE bug 1187445</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33195/">CVE-2021-33195</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33196/">CVE-2021-33196</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33197/">CVE-2021-33197</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33198/">CVE-2021-33198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615796" comment="go1.15-1.15.13-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615797" comment="go1.15-doc-1.15.13-1.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615798" comment="go1.15-race-1.15.13-1.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110542" version="1" class="patch">
	<metadata>
		<title>Security update for go1.14 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1164903" ref_url="https://bugzilla.suse.com/1164903" source="BUGZILLA"/>
		<reference ref_id="1181145" ref_url="https://bugzilla.suse.com/1181145" source="BUGZILLA"/>
		<reference ref_id="1181146" ref_url="https://bugzilla.suse.com/1181146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008248.html" source="SUSE-SU"/>
		<description>
This update for go1.14 fixes the following issues:

Go was updated to version 1.14.14 (bsc#1164903).

Security issues fixed:

- CVE-2021-3114: Fixed incorrect operations on the P-224 curve in crypto/elliptic (bsc#1181145).
- CVE-2021-3115: Fixed a potential arbitrary code execution in the build process (bsc#1181146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-26"/>
	<updated date="2021-01-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1164903">SUSE bug 1164903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181145">SUSE bug 1181145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181146">SUSE bug 1181146</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496577" comment="go1.14-1.14.14-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496578" comment="go1.14-doc-1.14.14-1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110543" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1181145" ref_url="https://bugzilla.suse.com/1181145" source="BUGZILLA"/>
		<reference ref_id="1181146" ref_url="https://bugzilla.suse.com/1181146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3114" ref_url="https://www.suse.com/security/cve/CVE-2021-3114/" source="CVE"/>
		<reference ref_id="CVE-2021-3115" ref_url="https://www.suse.com/security/cve/CVE-2021-3115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008246.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

Go was updated to version 1.15.7 (bsc#1175132).

Security issues fixed:

- CVE-2021-3114: Fixed incorrect operations on the P-224 curve in crypto/elliptic (bsc#1181145).
- CVE-2021-3115: Fixed a potential arbitrary code execution in the build process (bsc#1181146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-28"/>
	<updated date="2021-01-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181145">SUSE bug 1181145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181146">SUSE bug 1181146</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3114/">CVE-2021-3114</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3115/">CVE-2021-3115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496579" comment="go1.15-1.15.7-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496580" comment="go1.15-doc-1.15.7-1.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496581" comment="go1.15-race-1.15.7-1.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110544" version="1" class="patch">
	<metadata>
		<title>Security update for jdom2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187446" ref_url="https://bugzilla.suse.com/1187446" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33813" ref_url="https://www.suse.com/security/cve/CVE-2021-33813/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009125.html" source="SUSE-SU"/>
		<description>
This update for jdom2 fixes the following issues:

- CVE-2021-33813: XXE issue in SAXBuilder can cause a denial of service via a crafted HTTP request (bsc#1187446)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187446">SUSE bug 1187446</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33813/">CVE-2021-33813</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615896" comment="jdom2-2.0.6-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110545" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624274" comment="kernel-docs-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624275" comment="kernel-obs-build-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624276" comment="kernel-preempt-devel-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624277" comment="kernel-source-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624278" comment="kernel-syms-5.3.18-24.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110546" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1188229" ref_url="https://bugzilla.suse.com/1188229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009156.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

go1.16.6 (released 2021-07-12, bsc#1182345) includes a security fix to the
crypto/tls package, as well as bug fixes to the compiler, and the
net and net/http packages.

Security issue fixed:

CVE-2021-34558: Fixed crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters (bsc#1188229)

go1.16 release:

* bsc#1188229 go#47143 CVE-2021-34558
* go#47145 security: fix CVE-2021-34558
* go#46999 net: LookupMX behaviour broken
* go#46981 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots larger than 3
* go#46769 syscall: TestGroupCleanupUserNamespace test failure on Fedora
* go#46657 runtime: deeply nested struct initialized with non-zero values
* go#44984 net/http: server not setting Content-Length in certain cases
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624708" comment="go1.16-1.16.6-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624709" comment="go1.16-doc-1.16.6-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624710" comment="go1.16-race-1.16.6-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110547" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1188229" ref_url="https://bugzilla.suse.com/1188229" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34558" ref_url="https://www.suse.com/security/cve/CVE-2021-34558/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009158.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

- go1.15.14 (released 2021-07-12) includes a security fix to the
  crypto/tls package, as well as bug fixes to the linker, and the
  net package.
  CVE-2021-34558
  Refs bsc#1175132 go1.15 release tracking
  * bsc#1188229 go#47143 CVE-2021-34558
  * go#47144 security: fix CVE-2021-34558
  * go#47012 net: LookupMX behaviour broken
  * go#46994 net: TestCVE202133195 fails if /etc/resolv.conf specifies ndots larger than 3
  * go#46768 syscall: TestGroupCleanupUserNamespace test failure on Fedora
  * go#46684 x/build/cmd/release: linux-armv6l release tests aren't passing
  * go#46656 runtime: deeply nested struct initialized with non-zero values

- Fix extraneous trailing percent character %endif% in spec file.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-19"/>
	<updated date="2021-07-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188229">SUSE bug 1188229</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34558/">CVE-2021-34558</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624711" comment="go1.15-1.15.14-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624712" comment="go1.15-doc-1.15.14-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624713" comment="go1.15-race-1.15.14-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110548" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1180391" ref_url="https://bugzilla.suse.com/1180391" source="BUGZILLA"/>
		<reference ref_id="1181118" ref_url="https://bugzilla.suse.com/1181118" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-35728" ref_url="https://www.suse.com/security/cve/CVE-2020-35728/" source="CVE"/>
		<reference ref_id="CVE-2021-20190" ref_url="https://www.suse.com/security/cve/CVE-2021-20190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008253.html" source="SUSE-SU"/>
		<description>
This update for jackson-databind fixes the following issues:

jackson-databind was updated to 2.10.5.1:
  * #2589: `DOMDeserializer`: setExpandEntityReferences(false) may
    not prevent external entity expansion in all cases
    (CVE-2020-25649, bsc#1177616)
  * #2787 (partial fix): NPE after add mixin for enum
  * #2679: 'ObjectMapper.readValue('123', Void.TYPE)' throws
    'should never occur'
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-29"/>
	<updated date="2021-01-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180391">SUSE bug 1180391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181118">SUSE bug 1181118</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-35728/">CVE-2020-35728</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20190/">CVE-2021-20190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496582" comment="jackson-databind-2.10.5.1-3.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110549" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625592" comment="kernel-docs-5.3.18-24.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625987" comment="kernel-obs-build-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625988" comment="kernel-preempt-devel-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625595" comment="kernel-source-5.3.18-24.75.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625989" comment="kernel-syms-5.3.18-24.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110550" version="1" class="patch">
	<metadata>
		<title>Security update for apache-commons-compress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188463" ref_url="https://bugzilla.suse.com/1188463" source="BUGZILLA"/>
		<reference ref_id="1188464" ref_url="https://bugzilla.suse.com/1188464" source="BUGZILLA"/>
		<reference ref_id="1188465" ref_url="https://bugzilla.suse.com/1188465" source="BUGZILLA"/>
		<reference ref_id="1188466" ref_url="https://bugzilla.suse.com/1188466" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35515" ref_url="https://www.suse.com/security/cve/CVE-2021-35515/" source="CVE"/>
		<reference ref_id="CVE-2021-35516" ref_url="https://www.suse.com/security/cve/CVE-2021-35516/" source="CVE"/>
		<reference ref_id="CVE-2021-35517" ref_url="https://www.suse.com/security/cve/CVE-2021-35517/" source="CVE"/>
		<reference ref_id="CVE-2021-36090" ref_url="https://www.suse.com/security/cve/CVE-2021-36090/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009259.html" source="SUSE-SU"/>
		<description>
This update for apache-commons-compress fixes the following issues:

- Updated to 1.21
- CVE-2021-35515: Fixed an infinite loop when reading a specially crafted 7Z archive. (bsc#1188463)
- CVE-2021-35516: Fixed an excessive memory allocation when reading a specially crafted 7Z archive. (bsc#1188464)
- CVE-2021-35517: Fixed an excessive memory allocation when reading a specially crafted TAR archive. (bsc#1188465)
- CVE-2021-36090: Fixed an excessive memory allocation when reading a specially crafted ZIP archive. (bsc#1188466)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188463">SUSE bug 1188463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188464">SUSE bug 1188464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188465">SUSE bug 1188465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188466">SUSE bug 1188466</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35515/">CVE-2021-35515</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35516/">CVE-2021-35516</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-35517/">CVE-2021-35517</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36090/">CVE-2021-36090</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625986" comment="apache-commons-compress-1.21-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110551" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627868" comment="kernel-docs-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627869" comment="kernel-obs-build-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627870" comment="kernel-preempt-devel-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627871" comment="kernel-source-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627872" comment="kernel-syms-5.3.18-24.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110552" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1188906" ref_url="https://bugzilla.suse.com/1188906" source="BUGZILLA"/>
		<reference ref_id="1189162" ref_url="https://bugzilla.suse.com/1189162" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009321.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

Update to go1.15.15:

- go#47473 net/http: panic due to racy read of persistConn after handler panic (CVE-2021-36221 bsc#1189162)
- go#47347 cmd/go: 'go list -f '{{.Stale}}'' stack overflow with cyclic imports
- go#47014 cmd/go: go mod vendor: open C:\Users\LICENSE: Access is denied.
- go#46927 cmd/compile: register conflict between external linker and duffzero on arm64
- go#46857 runtime: ppc64x binaries randomly segfault on linux 5.13rc6
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188906">SUSE bug 1188906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189162">SUSE bug 1189162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630565" comment="go1.15-1.15.15-1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630566" comment="go1.15-doc-1.15.15-1.39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630567" comment="go1.15-race-1.15.15-1.39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110553" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1189162" ref_url="https://bugzilla.suse.com/1189162" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36221" ref_url="https://www.suse.com/security/cve/CVE-2021-36221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009314.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to go1.16.7:

- go#47473 net/http: panic due to racy read of persistConn after handler panic (CVE-2021-36221 bsc#1189162)
- go#47348 cmd/go: 'go list -f '{{.Stale}}'' stack overflow with cyclic imports
- go#47332 time: Timer reset broken under heavy use since go1.16 timer optimizations added
- go#47289 cmd/link: build error with cgo in Windows, redefinition of go.map.zero
- go#47015 cmd/go: go mod vendor: open C:\Users\LICENSE: Access is denied.
- go#46928 cmd/compile: register conflict between external linker and duffzero on arm64
- go#46858 runtime: ppc64x binaries randomly segfault on linux 5.13rc6
- go#46551 cmd/go: unhelpful error message when running 'go install' on a replaced-but-not-required package
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189162">SUSE bug 1189162</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-36221/">CVE-2021-36221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630568" comment="go1.16-1.16.7-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630569" comment="go1.16-doc-1.16.7-1.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630570" comment="go1.16-race-1.16.7-1.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110554" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188438" ref_url="https://bugzilla.suse.com/1188438" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34429" ref_url="https://www.suse.com/security/cve/CVE-2021-34429/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009354.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- Update to version 9.4.43.v20210629
- CVE-2021-34429: URIs can be crafted using some encoded characters to access the content of the WEB-INF directory and/or bypass some security constraints. (bsc#1188438)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188438">SUSE bug 1188438</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-34429/">CVE-2021-34429</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626232" comment="jetty-http-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626233" comment="jetty-io-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626234" comment="jetty-security-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626235" comment="jetty-server-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626236" comment="jetty-servlet-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626237" comment="jetty-util-9.4.43-3.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626238" comment="jetty-util-ajax-9.4.43-3.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110555" version="1" class="patch">
	<metadata>
		<title>Security update for cups (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1170671" ref_url="https://bugzilla.suse.com/1170671" source="BUGZILLA"/>
		<reference ref_id="1180520" ref_url="https://bugzilla.suse.com/1180520" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8842" ref_url="https://www.suse.com/security/cve/CVE-2019-8842/" source="CVE"/>
		<reference ref_id="CVE-2020-10001" ref_url="https://www.suse.com/security/cve/CVE-2020-10001/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008267.html" source="SUSE-SU"/>
		<description>
This update for cups fixes the following issues:

- CVE-2020-10001: Fixed an out-of-bounds read in the ippReadIO function (bsc#1180520).
- CVE-2019-8842: Fixed an out-of-bounds read in an extension field (bsc#1170671).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-02"/>
	<updated date="2021-02-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1170671">SUSE bug 1170671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180520">SUSE bug 1180520</bugzilla>
	<cve impact="low" cvss3="2.6/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-8842/">CVE-2019-8842</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-10001/">CVE-2020-10001</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496583" comment="cups-ddk-2.2.7-3.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110556" version="1" class="patch">
	<metadata>
		<title>Security update for hivex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189060" ref_url="https://bugzilla.suse.com/1189060" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3622" ref_url="https://www.suse.com/security/cve/CVE-2021-3622/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009494.html" source="SUSE-SU"/>
		<description>
This update for hivex fixes the following issues:

- CVE-2021-3622: Fixed stack overflow due to recursive call of _get_children() (bsc#1189060).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189060">SUSE bug 1189060</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3622/">CVE-2021-3622</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632566" comment="ocaml-hivex-1.3.14-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632567" comment="ocaml-hivex-devel-1.3.14-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110557" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633298" comment="kernel-docs-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633299" comment="kernel-obs-build-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633300" comment="kernel-preempt-devel-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633301" comment="kernel-source-5.3.18-24.83.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633302" comment="kernel-syms-5.3.18-24.83.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110558" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1190589" ref_url="https://bugzilla.suse.com/1190589" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39293" ref_url="https://www.suse.com/security/cve/CVE-2021-39293/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009545.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- Update to go 1.16.8
- CVE-2021-39293: Fixed a buffer overflow issue in preallocation check that can cause OOM panic. (bas#)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190589">SUSE bug 1190589</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39293/">CVE-2021-39293</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634431" comment="go1.16-1.16.8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634432" comment="go1.16-doc-1.16.8-1.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634433" comment="go1.16-race-1.16.8-1.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110559" version="1" class="patch">
	<metadata>
		<title>Security update for git (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189992" ref_url="https://bugzilla.suse.com/1189992" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40330" ref_url="https://www.suse.com/security/cve/CVE-2021-40330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009544.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2021-40330: Fixed unexpected cross-protocol requests via newline character in git_connect_git repository path (bsc#1189992).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189992">SUSE bug 1189992</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-40330/">CVE-2021-40330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633883" comment="git-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633884" comment="git-arch-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633885" comment="git-cvs-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633886" comment="git-daemon-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633887" comment="git-doc-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633888" comment="git-email-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633889" comment="git-gui-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633890" comment="git-svn-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633891" comment="git-web-2.26.2-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633892" comment="gitk-2.26.2-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110560" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186489" ref_url="https://bugzilla.suse.com/1186489" source="BUGZILLA"/>
		<reference ref_id="1187911" ref_url="https://bugzilla.suse.com/1187911" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33574" ref_url="https://www.suse.com/security/cve/CVE-2021-33574/" source="CVE"/>
		<reference ref_id="CVE-2021-35942" ref_url="https://www.suse.com/security/cve/CVE-2021-35942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009579.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- CVE-2021-35942: wordexp: handle overflow in positional parameter number (bsc#1187911)
- CVE-2021-33574: Use __pthread_attr_copy in mq_notify (bsc#1186489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186489">SUSE bug 1186489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187911">SUSE bug 1187911</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33574/">CVE-2021-33574</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35942/">CVE-2021-35942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634569" comment="glibc-devel-32bit-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634570" comment="glibc-devel-static-2.26-13.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634571" comment="glibc-utils-2.26-13.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110561" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179416" ref_url="https://bugzilla.suse.com/1179416" source="BUGZILLA"/>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="1187670" ref_url="https://bugzilla.suse.com/1187670" source="BUGZILLA"/>
		<reference ref_id="1188548" ref_url="https://bugzilla.suse.com/1188548" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security issues fixed:

- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)
- PGP hardening changes (bsc#1185299)
- Fixed potential access of freed mem in ndb's glue code (bsc#1179416)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179416">SUSE bug 1179416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187670">SUSE bug 1187670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188548">SUSE bug 1188548</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652127" comment="rpm-build-4.14.1-22.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110562" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652121" comment="kernel-docs-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652122" comment="kernel-obs-build-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652123" comment="kernel-preempt-devel-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652124" comment="kernel-source-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652125" comment="kernel-syms-5.3.18-24.86.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652126" comment="perl-Bootloader-YAML-0.931-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110563" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189798" ref_url="https://bugzilla.suse.com/1189798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39139" ref_url="https://www.suse.com/security/cve/CVE-2021-39139/" source="CVE"/>
		<reference ref_id="CVE-2021-39140" ref_url="https://www.suse.com/security/cve/CVE-2021-39140/" source="CVE"/>
		<reference ref_id="CVE-2021-39141" ref_url="https://www.suse.com/security/cve/CVE-2021-39141/" source="CVE"/>
		<reference ref_id="CVE-2021-39144" ref_url="https://www.suse.com/security/cve/CVE-2021-39144/" source="CVE"/>
		<reference ref_id="CVE-2021-39145" ref_url="https://www.suse.com/security/cve/CVE-2021-39145/" source="CVE"/>
		<reference ref_id="CVE-2021-39146" ref_url="https://www.suse.com/security/cve/CVE-2021-39146/" source="CVE"/>
		<reference ref_id="CVE-2021-39147" ref_url="https://www.suse.com/security/cve/CVE-2021-39147/" source="CVE"/>
		<reference ref_id="CVE-2021-39148" ref_url="https://www.suse.com/security/cve/CVE-2021-39148/" source="CVE"/>
		<reference ref_id="CVE-2021-39149" ref_url="https://www.suse.com/security/cve/CVE-2021-39149/" source="CVE"/>
		<reference ref_id="CVE-2021-39150" ref_url="https://www.suse.com/security/cve/CVE-2021-39150/" source="CVE"/>
		<reference ref_id="CVE-2021-39151" ref_url="https://www.suse.com/security/cve/CVE-2021-39151/" source="CVE"/>
		<reference ref_id="CVE-2021-39152" ref_url="https://www.suse.com/security/cve/CVE-2021-39152/" source="CVE"/>
		<reference ref_id="CVE-2021-39153" ref_url="https://www.suse.com/security/cve/CVE-2021-39153/" source="CVE"/>
		<reference ref_id="CVE-2021-39154" ref_url="https://www.suse.com/security/cve/CVE-2021-39154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-October/020532.html" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:

- Upgrade to 1.4.18
- CVE-2021-39139: Fixed an issue that allowed an attacker to execute arbitrary code execution by manipulating the processed input stream with type information. (bsc#1189798)
- CVE-2021-39140: Fixed an issue that allowed an attacker to execute a DoS attack by manipulating the processed input stream. (bsc#1189798)
- CVE-2021-39141: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39144: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39145: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39146: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39147: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39148: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39149: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39150: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
- CVE-2021-39151: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39152: Fixed an issue that allowed an attacker to access protected resources hosted within the intranet or in the host itself. (bsc#1189798)
- CVE-2021-39153: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
- CVE-2021-39154: Fixed an issue that allowed an attacker to achieve arbitrary code execution. (bsc#1189798)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189798">SUSE bug 1189798</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39139/">CVE-2021-39139</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39140/">CVE-2021-39140</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39141/">CVE-2021-39141</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39144/">CVE-2021-39144</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39145/">CVE-2021-39145</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39146/">CVE-2021-39146</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39147/">CVE-2021-39147</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39148/">CVE-2021-39148</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39149/">CVE-2021-39149</cve>
	<cve impact="important" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39150/">CVE-2021-39150</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39151/">CVE-2021-39151</cve>
	<cve impact="important" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39152/">CVE-2021-39152</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39153/">CVE-2021-39153</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39154/">CVE-2021-39154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634572" comment="xstream-1.4.18-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110564" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1191468" ref_url="https://bugzilla.suse.com/1191468" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009624.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to go1.16.9

- CVE-2021-38297: misc/wasm, cmd/link: do not let command line args overwrite global data (bsc#1191468)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191468">SUSE bug 1191468</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651656" comment="go1.16-1.16.9-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651657" comment="go1.16-doc-1.16.9-1.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651658" comment="go1.16-race-1.16.9-1.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110565" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1191468" ref_url="https://bugzilla.suse.com/1191468" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38297" ref_url="https://www.suse.com/security/cve/CVE-2021-38297/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009631.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to go1.17.2

- CVE-2021-38297: misc/wasm, cmd/link: do not let command line args overwrite global data (bsc#1191468)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191468">SUSE bug 1191468</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38297/">CVE-2021-38297</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652128" comment="go1.17-1.17.2-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652129" comment="go1.17-doc-1.17.2-1.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652130" comment="go1.17-race-1.17.2-1.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110566" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009630.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652200" comment="ncurses-devel-32bit-6.1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110567" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496584" comment="kernel-docs-5.3.18-24.49.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496585" comment="kernel-obs-build-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496586" comment="kernel-preempt-devel-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496587" comment="kernel-source-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496588" comment="kernel-syms-5.3.18-24.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110568" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.

* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

   * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
     Locker instructions. 
   * Support non-absolute segment values for lcall and ljmp.
   * Add {disp16} pseudo prefix to x86 assembler.
   * Configure with --enable-x86-used-note by default for Linux/x86.

-  ARM/AArch64:

   * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
     Cortex-R82, Neoverse V1, and Neoverse N2 cores.
   * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
     Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
     Stack Recorder Extension) and BRBE (Branch Record Buffer
     Extension) system registers.
   * Add support for Armv8-R and Armv8.7-A ISA extensions.
   * Add support for DSB memory nXS barrier, WFET and WFIT
     instruction for Armv8.7.
   * Add support for +csre feature for -march. Add CSR PDEC
     instruction for CSRE feature in AArch64.
   * Add support for +flagm feature for -march in Armv8.4 AArch64.
   * Add support for +ls64 feature for -march in Armv8.7
     AArch64. Add atomic 64-byte load/store instructions for this
     feature. 
   * Add support for +pauth (Pointer Authentication) feature for
     -march in AArch64.

New features in the Linker:

  * Add --error-handling-script=&lt;NAME&gt; command line option to allow
    a helper script to be invoked when an undefined symbol or a
    missing library is encountered.  This option can be suppressed
    via the configure time switch: --enable-error-handling-script=no.
  * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
    x86-64-{baseline|v[234]} ISA level as needed.
  * Add -z unique-symbol to avoid duplicated local symbol names.
  * The creation of PE format DLLs now defaults to using a more
    secure set of DLL characteristics.
  * The linker now deduplicates the types in .ctf sections.  The new 
     command-line option --ctf-share-types describes how to do this:
     its default value, share-unconflicted, produces the most compact
     output.
  * The linker now omits the 'variable section' from .ctf sections
    by default, saving space.  This is almost certainly what you
    want unless you are working on a project that has its own
    analogue of symbol tables that are not reflected in the ELF
    symtabs.

New features in other binary tools:

  * The ar tool's previously unused l modifier is now used for
    specifying dependencies of a static library. The arguments of
    this option (or --record-libdeps long form option) will be
    stored verbatim in the __.LIBDEP member of the archive, which
    the linker may read at link time.
  * Readelf can now display the contents of LTO symbol table
    sections when asked to do so via the --lto-syms command line
    option.
  * Readelf now accepts the -C command line option to enable the
    demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
    --no-demangle, --recurse-limit and --no-recurse-limit options
    are also now availale.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653455" comment="binutils-devel-32bit-2.37-7.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110569" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009711.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).
- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654320" comment="binutils-devel-32bit-2.37-7.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110570" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655886" comment="kernel-docs-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655887" comment="kernel-obs-build-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655888" comment="kernel-preempt-devel-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655889" comment="kernel-source-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655890" comment="kernel-syms-5.3.18-24.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110571" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027496" ref_url="https://bugzilla.suse.com/1027496" source="BUGZILLA"/>
		<reference ref_id="1183085" ref_url="https://bugzilla.suse.com/1183085" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-10228" ref_url="https://www.suse.com/security/cve/CVE-2016-10228/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009781.html" source="SUSE-SU"/>
		<description>

This update for glibc fixes the following issues:


- libio: do not attempt to free wide buffers of legacy streams (bsc#1183085) 
- CVE-2016-10228: Rewrite iconv option parsing to fix security issue (bsc#1027496)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027496">SUSE bug 1027496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183085">SUSE bug 1183085</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-10228/">CVE-2016-10228</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654317" comment="glibc-devel-32bit-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654318" comment="glibc-devel-static-2.26-13.62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654319" comment="glibc-utils-2.26-13.62.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110572" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1192377" ref_url="https://bugzilla.suse.com/1192377" source="BUGZILLA"/>
		<reference ref_id="1192378" ref_url="https://bugzilla.suse.com/1192378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009791.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Security update go1.17.3 (released 2021-11-04) (bsc#1190649).

- CVE-2021-41771: Fixed invalid dynamic symbol table command that could have caused panic (bsc#1192377).
- CVE-2021-41772: Fixed panic on (*Reader).Open (bsc#1192378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192377">SUSE bug 1192377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192378">SUSE bug 1192378</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654576" comment="go1.17-1.17.3-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654577" comment="go1.17-doc-1.17.3-1.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654578" comment="go1.17-race-1.17.3-1.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110573" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1192377" ref_url="https://bugzilla.suse.com/1192377" source="BUGZILLA"/>
		<reference ref_id="1192378" ref_url="https://bugzilla.suse.com/1192378" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41771" ref_url="https://www.suse.com/security/cve/CVE-2021-41771/" source="CVE"/>
		<reference ref_id="CVE-2021-41772" ref_url="https://www.suse.com/security/cve/CVE-2021-41772/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009801.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Security update go1.16.10 (released 2021-11-04) (bsc#1182345).

- CVE-2021-41771: Fixed invalid dynamic symbol table command that could have caused panic (bsc#1192377).
- CVE-2021-41772: Fixed panic on (*Reader).Open (bsc#1192378).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192377">SUSE bug 1192377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192378">SUSE bug 1192378</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-41771/">CVE-2021-41771</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41772/">CVE-2021-41772</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654573" comment="go1.16-1.16.10-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654574" comment="go1.16-doc-1.16.10-1.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654575" comment="go1.16-race-1.16.10-1.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110574" version="1" class="patch">
	<metadata>
		<title>Security update for aaa_base (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162581" ref_url="https://bugzilla.suse.com/1162581" source="BUGZILLA"/>
		<reference ref_id="1174504" ref_url="https://bugzilla.suse.com/1174504" source="BUGZILLA"/>
		<reference ref_id="1191563" ref_url="https://bugzilla.suse.com/1191563" source="BUGZILLA"/>
		<reference ref_id="1192248" ref_url="https://bugzilla.suse.com/1192248" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:3899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009830.html" source="SUSE-SU"/>
		<description>
This update for aaa_base fixes the following issues:

- Allowed ping and ICMP commands without CAP_NET_RAW (bsc#1174504).
- Add $HOME/.local/bin to PATH, if it exists (bsc#1192248).
- Fixed get_kernel_version.c to work also for recent kernels on the s390/X platform (bsc#1191563).
- Support xz compressed kernel (bsc#1162581)   
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-03"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162581">SUSE bug 1162581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174504">SUSE bug 1174504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191563">SUSE bug 1191563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192248">SUSE bug 1192248</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658789" comment="aaa_base-malloccheck-84.87+git20180409.04c9dae-3.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110575" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657450" comment="kernel-docs-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657451" comment="kernel-obs-build-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657452" comment="kernel-preempt-devel-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657453" comment="kernel-source-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657454" comment="kernel-syms-5.3.18-24.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110576" version="1" class="patch">
	<metadata>
		<title>Security update for gmp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192717" ref_url="https://bugzilla.suse.com/1192717" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43618" ref_url="https://www.suse.com/security/cve/CVE-2021-43618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009846.html" source="SUSE-SU"/>
		<description>
This update for gmp fixes the following issues:
    
- CVE-2021-43618: Fixed buffer overflow via crafted input in mpz/inp_raw.c (bsc#1192717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192717">SUSE bug 1192717</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43618/">CVE-2021-43618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656942" comment="gmp-devel-32bit-6.1.2-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656943" comment="libgmpxx4-32bit-6.1.2-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110577" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181836" ref_url="https://bugzilla.suse.com/1181836" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20176" ref_url="https://www.suse.com/security/cve/CVE-2021-20176/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009880.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20176: Fixed division by zero caused by processing crafted file (bsc#1181836).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-10"/>
	<updated date="2021-12-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181836">SUSE bug 1181836</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20176/">CVE-2021-20176</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659304" comment="perl-PerlMagick-7.0.7.34-10.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110578" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180125" ref_url="https://bugzilla.suse.com/1180125" source="BUGZILLA"/>
		<reference ref_id="1183374" ref_url="https://bugzilla.suse.com/1183374" source="BUGZILLA"/>
		<reference ref_id="1183858" ref_url="https://bugzilla.suse.com/1183858" source="BUGZILLA"/>
		<reference ref_id="1185588" ref_url="https://bugzilla.suse.com/1185588" source="BUGZILLA"/>
		<reference ref_id="1187338" ref_url="https://bugzilla.suse.com/1187338" source="BUGZILLA"/>
		<reference ref_id="1187668" ref_url="https://bugzilla.suse.com/1187668" source="BUGZILLA"/>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3426" ref_url="https://www.suse.com/security/cve/CVE-2021-3426/" source="CVE"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009890.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:


- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
- CVE-2021-3426: Fixed an information disclosure via pydoc. (bsc#1183374)

- Rebuild to get new headers, avoid building in support for stropts.h (bsc#1187338).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180125">SUSE bug 1180125</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183374">SUSE bug 1183374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183858">SUSE bug 1183858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185588">SUSE bug 1185588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187338">SUSE bug 1187338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187668">SUSE bug 1187668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3426/">CVE-2021-3426</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659024" comment="python3-tools-3.6.15-3.91.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110579" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
	  
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659807" comment="xorg-x11-server-sdk-1.20.3-22.5.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110580" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193662" ref_url="https://bugzilla.suse.com/1193662" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4104" ref_url="https://www.suse.com/security/cve/CVE-2021-4104/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009916.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2021-4104: Disable the JMSAppender class from log4j to protect against
  the log4jshell vulnerability. [bsc#1193662]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-17"/>
	<updated date="2021-12-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193662">SUSE bug 1193662</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4104/">CVE-2021-4104</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660089" comment="log4j12-javadoc-1.2.17-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660090" comment="log4j12-manual-1.2.17-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110581" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659804" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659805" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110582" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659801" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659802" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110583" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181687" ref_url="https://bugzilla.suse.com/1181687" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008302.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2020-17525: A null-pointer-dereference has been found in mod_authz_svn that results in
    a remote unauthenticated Denial-of-Service in some server configurations (bsc#1181687).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181687">SUSE bug 1181687</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496589" comment="subversion-bash-completion-1.10.6-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496590" comment="subversion-perl-1.10.6-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496591" comment="subversion-python-1.10.6-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496592" comment="subversion-tools-1.10.6-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110584" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1179756" ref_url="https://bugzilla.suse.com/1179756" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008350.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- CVE-2021-3177: Fixed buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution (bsc#1181126).
- Provide the newest setuptools wheel (bsc#1176262, CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179756">SUSE bug 1179756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496593" comment="python3-tools-3.6.12-3.75.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110585" version="1" class="patch">
	<metadata>
		<title>Security update for pcp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152533" ref_url="https://bugzilla.suse.com/1152533" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008364.html" source="SUSE-SU"/>
		<description>
This update for pcp fixes the following issues:

- Drop unnecessary %pre/%post recursive chown calls (bsc#1152533)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1152533">SUSE bug 1152533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496594" comment="libpcp-devel-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496595" comment="libpcp3-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496596" comment="libpcp_gui2-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496597" comment="libpcp_import1-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496598" comment="libpcp_mmv1-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496599" comment="libpcp_trace2-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496600" comment="libpcp_web1-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496601" comment="pcp-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496602" comment="pcp-conf-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496603" comment="pcp-devel-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496604" comment="pcp-doc-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496605" comment="pcp-import-iostat2pcp-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496606" comment="pcp-import-mrtg2pcp-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496607" comment="pcp-import-sar2pcp-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496608" comment="pcp-pmda-perfevent-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496609" comment="pcp-system-tools-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496610" comment="perl-PCP-LogImport-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496611" comment="perl-PCP-LogSummary-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496612" comment="perl-PCP-MMV-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496613" comment="perl-PCP-PMDA-4.3.1-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496614" comment="python3-pcp-4.3.1-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110586" version="1" class="patch">
	<metadata>
		<title>Security update for rpmlint (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169614" ref_url="https://bugzilla.suse.com/1169614" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008367.html" source="SUSE-SU"/>
		<description>
This update for rpmlint fixes the following issues:

- Whitelist PAM modules and DBUS rules for cockpit (bsc#1169614)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169614">SUSE bug 1169614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496615" comment="rpmlint-mini-1.10-13.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110587" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182325" ref_url="https://bugzilla.suse.com/1182325" source="BUGZILLA"/>
		<reference ref_id="1182335" ref_url="https://bugzilla.suse.com/1182335" source="BUGZILLA"/>
		<reference ref_id="1182336" ref_url="https://bugzilla.suse.com/1182336" source="BUGZILLA"/>
		<reference ref_id="1182337" ref_url="https://bugzilla.suse.com/1182337" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20241" ref_url="https://www.suse.com/security/cve/CVE-2021-20241/" source="CVE"/>
		<reference ref_id="CVE-2021-20243" ref_url="https://www.suse.com/security/cve/CVE-2021-20243/" source="CVE"/>
		<reference ref_id="CVE-2021-20244" ref_url="https://www.suse.com/security/cve/CVE-2021-20244/" source="CVE"/>
		<reference ref_id="CVE-2021-20246" ref_url="https://www.suse.com/security/cve/CVE-2021-20246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008374.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2021-20241 [bsc#1182335]: Division by zero in WriteJP2Image() in coders/jp2.c
- CVE-2021-20243 [bsc#1182336]: Division by zero in GetResizeFilterWeight in MagickCore/resize.c
- CVE-2021-20244 [bsc#1182325]: Division by zero in ImplodeImage in MagickCore/visual-effects.c
- CVE-2021-20246 [bsc#1182337]: Division by zero in ScaleResampleFilter in MagickCore/resample.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182325">SUSE bug 1182325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182335">SUSE bug 1182335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182336">SUSE bug 1182336</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182337">SUSE bug 1182337</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20241/">CVE-2021-20241</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20243/">CVE-2021-20243</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20244/">CVE-2021-20244</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20246/">CVE-2021-20246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496616" comment="perl-PerlMagick-7.0.7.34-10.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110588" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178386" ref_url="https://bugzilla.suse.com/1178386" source="BUGZILLA"/>
		<reference ref_id="1179694" ref_url="https://bugzilla.suse.com/1179694" source="BUGZILLA"/>
		<reference ref_id="1179721" ref_url="https://bugzilla.suse.com/1179721" source="BUGZILLA"/>
		<reference ref_id="1180038" ref_url="https://bugzilla.suse.com/1180038" source="BUGZILLA"/>
		<reference ref_id="1181505" ref_url="https://bugzilla.suse.com/1181505" source="BUGZILLA"/>
		<reference ref_id="1182117" ref_url="https://bugzilla.suse.com/1182117" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25013" ref_url="https://www.suse.com/security/cve/CVE-2019-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-27618" ref_url="https://www.suse.com/security/cve/CVE-2020-27618/" source="CVE"/>
		<reference ref_id="CVE-2020-29562" ref_url="https://www.suse.com/security/cve/CVE-2020-29562/" source="CVE"/>
		<reference ref_id="CVE-2020-29573" ref_url="https://www.suse.com/security/cve/CVE-2020-29573/" source="CVE"/>
		<reference ref_id="CVE-2021-3326" ref_url="https://www.suse.com/security/cve/CVE-2021-3326/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008397.html" source="SUSE-SU"/>
		<description>
This update for glibc fixes the following issues:

- Fix buffer overrun in EUC-KR conversion module (CVE-2019-25013, bsc#1182117, BZ #24973)
- x86: Harden printf against non-normal long double values (CVE-2020-29573, bsc#1179721, BZ #26649)
- gconv: Fix assertion failure in ISO-2022-JP-3 module (CVE-2021-3326, bsc#1181505, BZ #27256)
- iconv: Accept redundant shift sequences in IBM1364 (CVE-2020-27618, bsc#1178386, BZ #26224)
- iconv: Fix incorrect UCS4 inner loop bounds (CVE-2020-29562, bsc#1179694, BZ #26923)
- Fix parsing of /sys/devices/system/cpu/online (bsc#1180038, BZ #25859)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178386">SUSE bug 1178386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179694">SUSE bug 1179694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179721">SUSE bug 1179721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180038">SUSE bug 1180038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181505">SUSE bug 1181505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182117">SUSE bug 1182117</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-25013/">CVE-2019-25013</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27618/">CVE-2020-27618</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29562/">CVE-2020-29562</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29573/">CVE-2020-29573</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3326/">CVE-2021-3326</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496617" comment="glibc-devel-32bit-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496618" comment="glibc-devel-static-2.26-13.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496619" comment="glibc-utils-2.26-13.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110589" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-08"/>
	<updated date="2021-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496620" comment="openldap2-devel-32bit-2.4.46-9.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110590" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496621" comment="kernel-docs-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496622" comment="kernel-obs-build-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496623" comment="kernel-preempt-devel-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496624" comment="kernel-source-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496625" comment="kernel-syms-5.3.18-24.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110591" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183026" ref_url="https://bugzilla.suse.com/1183026" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21300" ref_url="https://www.suse.com/security/cve/CVE-2021-21300/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008461.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- On case-insensitive filesystems, with support for symbolic links,
  if Git is configured globally to apply delay-capable clean/smudge
  filters (such as Git LFS), Git could be fooled into running
  remote code during a clone. (bsc#1183026, CVE-2021-21300)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183026">SUSE bug 1183026</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21300/">CVE-2021-21300</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496626" comment="git-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496627" comment="git-arch-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496628" comment="git-cvs-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496629" comment="git-daemon-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496630" comment="git-doc-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496631" comment="git-email-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496632" comment="git-gui-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496633" comment="git-svn-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496634" comment="git-web-2.26.2-3.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496635" comment="gitk-2.26.2-3.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110592" version="1" class="patch">
	<metadata>
		<title>Security update for velocity (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183360" ref_url="https://bugzilla.suse.com/1183360" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13936" ref_url="https://www.suse.com/security/cve/CVE-2020-13936/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008494.html" source="SUSE-SU"/>
		<description>
This update for velocity fixes the following issues:

- CVE-2020-13936: Fixed an arbitrary code execution when attacker is able to modify templates (bsc#1183360).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-16"/>
	<updated date="2021-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183360">SUSE bug 1183360</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13936/">CVE-2020-13936</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496636" comment="velocity-1.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110593" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179103" ref_url="https://bugzilla.suse.com/1179103" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19667" ref_url="https://www.suse.com/security/cve/CVE-2020-19667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008174.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2020-19667 [bsc#1179103]: Stack buffer overflow in XPM coder could result in a crash
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179103">SUSE bug 1179103</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19667/">CVE-2020-19667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496637" comment="perl-PerlMagick-7.0.7.34-10.6.13 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110594" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183333" ref_url="https://bugzilla.suse.com/1183333" source="BUGZILLA"/>
		<reference ref_id="1183334" ref_url="https://bugzilla.suse.com/1183334" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918/" source="CVE"/>
		<reference ref_id="CVE-2021-27919" ref_url="https://www.suse.com/security/cve/CVE-2021-27919/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008547.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- go1.16.2 (released 2021-03-11) (bsc#1182345) 
- go1.16.1 (released 2021-03-10) (bsc#1182345) 
  - CVE-2021-27918: Fixed an infinite loop when using xml.NewTokenDecoder with a custom TokenReader (bsc#1183333).
  - CVE-2021-27919: Fixed an issue where archive/zip: can panic when calling Reader.Open (bsc#1183334).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183333">SUSE bug 1183333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183334">SUSE bug 1183334</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27919/">CVE-2021-27919</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496638" comment="go1.16-1.16.2-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496639" comment="go1.16-doc-1.16.2-1.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496640" comment="go1.16-race-1.16.2-1.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110595" version="1" class="patch">
	<metadata>
		<title>Security update for go1.15 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175132" ref_url="https://bugzilla.suse.com/1175132" source="BUGZILLA"/>
		<reference ref_id="1183333" ref_url="https://bugzilla.suse.com/1183333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27918" ref_url="https://www.suse.com/security/cve/CVE-2021-27918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008542.html" source="SUSE-SU"/>
		<description>
This update for go1.15 fixes the following issues:

- go1.15.10 (released 2021-03-11) (bsc#1175132)
- go1.15.9 (released 2021-03-10) (bsc#1175132)
  - CVE-2021-27918: Fixed an infinite loop when using xml.NewTokenDecoder with a custom TokenReader (bsc#1183333).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175132">SUSE bug 1175132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183333">SUSE bug 1183333</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-27918/">CVE-2021-27918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496641" comment="go1.15-1.15.10-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496642" comment="go1.15-doc-1.15.10-1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496643" comment="go1.15-race-1.15.10-1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110596" version="1" class="patch">
	<metadata>
		<title>Security update for jetty-minimal (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182898" ref_url="https://bugzilla.suse.com/1182898" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27223" ref_url="https://www.suse.com/security/cve/CVE-2020-27223/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008550.html" source="SUSE-SU"/>
		<description>
This update for jetty-minimal fixes the following issues:

- jetty-minimal was upgraded to version 9.4.38.v20210224
  - CVE-2020-27223: Fixed an issue with Accept request header which might have led to Denial of Service (bsc#1182898).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182898">SUSE bug 1182898</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27223/">CVE-2020-27223</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496644" comment="jetty-http-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496645" comment="jetty-io-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496646" comment="jetty-security-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496647" comment="jetty-server-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496648" comment="jetty-servlet-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496649" comment="jetty-util-9.4.38-3.6.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496650" comment="jetty-util-ajax-9.4.38-3.6.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110597" version="1" class="patch">
	<metadata>
		<title>Security update for python3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Development Tools 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008556.html" source="SUSE-SU"/>
		<description>
This update for python3 fixes the following issues:

- python36 was updated to 3.6.13
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-development-tools:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009281318" comment="SUSE Linux Enterprise Module for Development Tools 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496651" comment="python3-tools-3.6.13-3.78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110598" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="1173805" ref_url="https://bugzilla.suse.com/1173805" source="BUGZILLA"/>
		<reference ref_id="1178890" ref_url="https://bugzilla.suse.com/1178890" source="BUGZILLA"/>
		<reference ref_id="1178891" ref_url="https://bugzilla.suse.com/1178891" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27745" ref_url="https://www.suse.com/security/cve/CVE-2020-27745/" source="CVE"/>
		<reference ref_id="CVE-2020-27746" ref_url="https://www.suse.com/security/cve/CVE-2020-27746/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007850.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- Updated to 20.02.6:
  * CVE-2020-27745: PMIx - fix potential buffer overflows from use of unpackmem() (bsc#1178890).
  * CVE-2020-27746: X11 forwarding - fix potential leak of the magic cookie when 
    sent as an argument to the xauth command (bsc#1178891).
  * Added support for openPMIx (bsc#1173805).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173805">SUSE bug 1173805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178890">SUSE bug 1178890</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178891">SUSE bug 1178891</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27745/">CVE-2020-27745</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27746/">CVE-2020-27746</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496874" comment="libnss_slurm2-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496875" comment="libpmi0-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496876" comment="libslurm35-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496877" comment="perl-slurm-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496878" comment="slurm-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496879" comment="slurm-auth-none-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496880" comment="slurm-config-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496881" comment="slurm-config-man-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496882" comment="slurm-devel-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496883" comment="slurm-doc-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496884" comment="slurm-lua-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496885" comment="slurm-munge-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496886" comment="slurm-node-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496887" comment="slurm-pam_slurm-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496888" comment="slurm-plugins-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496889" comment="slurm-slurmdbd-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496890" comment="slurm-sql-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496891" comment="slurm-sview-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496892" comment="slurm-torque-20.02.6-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496893" comment="slurm-webdoc-20.02.6-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110599" version="1" class="patch">
	<metadata>
		<title>Security update for slurm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="1186024" ref_url="https://bugzilla.suse.com/1186024" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31215" ref_url="https://www.suse.com/security/cve/CVE-2021-31215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008893.html" source="SUSE-SU"/>
		<description>
This update for slurm fixes the following issues:

- CVE-2021-31215: Fixed a environment mishandling that allowed remote code execution as SlurmUser (bsc#1186024).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186024">SUSE bug 1186024</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-31215/">CVE-2021-31215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496894" comment="libnss_slurm2-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496895" comment="libpmi0-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496896" comment="libslurm35-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496897" comment="perl-slurm-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496898" comment="slurm-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496899" comment="slurm-auth-none-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496900" comment="slurm-config-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496901" comment="slurm-config-man-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496902" comment="slurm-devel-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496903" comment="slurm-doc-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496904" comment="slurm-lua-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496905" comment="slurm-munge-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496906" comment="slurm-node-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496907" comment="slurm-pam_slurm-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496908" comment="slurm-plugins-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496909" comment="slurm-slurmdbd-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496910" comment="slurm-sql-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496911" comment="slurm-sview-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496912" comment="slurm-torque-20.02.7-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496913" comment="slurm-webdoc-20.02.7-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110600" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="1180700" ref_url="https://bugzilla.suse.com/1180700" source="BUGZILLA"/>
		<reference ref_id="1185603" ref_url="https://bugzilla.suse.com/1185603" source="BUGZILLA"/>
		<reference ref_id="1186024" ref_url="https://bugzilla.suse.com/1186024" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31215" ref_url="https://www.suse.com/security/cve/CVE-2021-31215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009122.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_11 fixes the following issues:

Updated to 20.11.7 

Summary of new features:

* CVE-2021-31215: Fixed a remote code execution as SlurmUser (bsc#1186024).
* slurmd - handle configless failures gracefully instead of hanging indefinitely.
* select/cons_tres - fix Dragonfly topology not selecting nodes in the same
  leaf switch when it should as well as requests with *-switches option.
* Fix issue where certain step requests wouldn't run if the first node in the
  job allocation was full and there were idle resources on other nodes in
  the job allocation.
* Fix deadlock issue with &lt;Prolog|Epilog&gt;Slurmctld.
* torque/qstat - fix printf error message in output.
* When adding associations or wckeys avoid checking multiple times a user or cluster name.
* Fix wrong jobacctgather information on a step on multiple nodes
  due to timeouts sending its the information gathered on its node.
* Fix missing xstrdup which could result in slurmctld segfault on array jobs.
* Fix security issue in PrologSlurmctld and EpilogSlurmctld by always
  prepending SPANK_ to all user-set environment variables. CVE-2021-31215.
* Fix sacct assert with the --qos option.
* Use pkg-config --atleast-version instead of --modversion for systemd.
* common/fd - fix getsockopt() call in fd_get_socket_error().
* Properly handle the return from fd_get_socket_error() in _conn_readable().
* cons_res - Fix issue where running jobs were not taken into consideration
  when creating a reservation.
* Avoid a deadlock between job_list for_each and assoc QOS_LOCK.
* Fix TRESRunMins usage for partition qos on restart/reconfig.
* Fix printing of number of tasks on a completed job that didn't request tasks.
* Fix updating GrpTRESRunMins when decrementing job time is bigger than it.
* Make it so we handle multithreaded allocations correctly when doing
  --exclusive or --core-spec allocations.
* Fix incorrect round-up division in _pick_step_cores
* Use appropriate math to adjust cpu counts when --ntasks-per-core=1.
* cons_tres - Fix consideration of power downed nodes.
* cons_tres - Fix DefCpuPerGPU, increase cpus-per-task to match with
  gpus-per-task * cpus-per-gpu.
* Fix under-cpu memory auto-adjustment when MaxMemPerCPU is set.
* Make it possible to override CR_CORE_DEFAULT_DIST_BLOCK.
* Perl API - fix retrieving/storing of slurm_step_id_t in job_step_info_t.
* Recover state of burst buffers when slurmctld is restarted to avoid skipping
  burst buffer stages.
* Fix race condition in burst buffer plugin which caused a burst buffer
  in stage-in to not get state saved if slurmctld stopped.
* auth/jwt - print an error if jwt_file= has not been set in slurmdbd.
* Fix RESV_DEL_HOLD not being a valid state when using squeue --states.
* Add missing squeue selectable states in valid states error message.
* Fix scheduling last array task multiple times on error, causing segfault.
* Fix issue where a step could be allocated more memory than the job when
  dealing with --mem-per-cpu and --threads-per-core.
* Fix removing qos from assoc with -= can lead to assoc with no qos
* auth/jwt - fix segfault on invalid credential in slurmdbd due to
  missing validate_slurm_user() function in context.
* Fix single Port= not being applied to range of nodes in slurm.conf
* Fix Jobs not requesting a tres are not starting because of that tres limit.
* acct_gather_energy/rapl - fix AveWatts calculation.
* job_container/tmpfs - Fix issues with cleanup and slurmd restarting on
  running jobs.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180700">SUSE bug 1180700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185603">SUSE bug 1185603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186024">SUSE bug 1186024</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-31215/">CVE-2021-31215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496914" comment="libnss_slurm2_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496915" comment="libpmi0_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496916" comment="libslurm36-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496917" comment="perl-slurm_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496918" comment="slurm_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496919" comment="slurm_20_11-auth-none-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496920" comment="slurm_20_11-config-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496921" comment="slurm_20_11-config-man-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496922" comment="slurm_20_11-devel-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496923" comment="slurm_20_11-doc-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496924" comment="slurm_20_11-lua-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496925" comment="slurm_20_11-munge-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496926" comment="slurm_20_11-node-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496927" comment="slurm_20_11-pam_slurm-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496928" comment="slurm_20_11-plugins-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496929" comment="slurm_20_11-slurmdbd-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496930" comment="slurm_20_11-sql-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496931" comment="slurm_20_11-sview-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496932" comment="slurm_20_11-torque-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496933" comment="slurm_20_11-webdoc-20.11.7-6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110601" version="1" class="patch">
	<metadata>
		<title>Security update for netcdf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="1191856" ref_url="https://bugzilla.suse.com/1191856" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20005" ref_url="https://www.suse.com/security/cve/CVE-2019-20005/" source="CVE"/>
		<reference ref_id="CVE-2019-20006" ref_url="https://www.suse.com/security/cve/CVE-2019-20006/" source="CVE"/>
		<reference ref_id="CVE-2019-20007" ref_url="https://www.suse.com/security/cve/CVE-2019-20007/" source="CVE"/>
		<reference ref_id="CVE-2019-20198" ref_url="https://www.suse.com/security/cve/CVE-2019-20198/" source="CVE"/>
		<reference ref_id="CVE-2019-20199" ref_url="https://www.suse.com/security/cve/CVE-2019-20199/" source="CVE"/>
		<reference ref_id="CVE-2019-20200" ref_url="https://www.suse.com/security/cve/CVE-2019-20200/" source="CVE"/>
		<reference ref_id="CVE-2019-20201" ref_url="https://www.suse.com/security/cve/CVE-2019-20201/" source="CVE"/>
		<reference ref_id="CVE-2019-20202" ref_url="https://www.suse.com/security/cve/CVE-2019-20202/" source="CVE"/>
		<reference ref_id="CVE-2021-26220" ref_url="https://www.suse.com/security/cve/CVE-2021-26220/" source="CVE"/>
		<reference ref_id="CVE-2021-26221" ref_url="https://www.suse.com/security/cve/CVE-2021-26221/" source="CVE"/>
		<reference ref_id="CVE-2021-26222" ref_url="https://www.suse.com/security/cve/CVE-2021-26222/" source="CVE"/>
		<reference ref_id="CVE-2021-30485" ref_url="https://www.suse.com/security/cve/CVE-2021-30485/" source="CVE"/>
		<reference ref_id="CVE-2021-31229" ref_url="https://www.suse.com/security/cve/CVE-2021-31229/" source="CVE"/>
		<reference ref_id="CVE-2021-31347" ref_url="https://www.suse.com/security/cve/CVE-2021-31347/" source="CVE"/>
		<reference ref_id="CVE-2021-31348" ref_url="https://www.suse.com/security/cve/CVE-2021-31348/" source="CVE"/>
		<reference ref_id="CVE-2021-31598" ref_url="https://www.suse.com/security/cve/CVE-2021-31598/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009775.html" source="SUSE-SU"/>
		<description>
This update for netcdf fixes the following issues:

- Fixed multiple vulnerabilities in ezXML:
    CVE-2019-20007, CVE-2019-20006, CVE-2019-20201, CVE-2019-20202,
    CVE-2019-20199, CVE-2019-20200, CVE-2019-20198, CVE-2021-26221,
    CVE-2021-26222, CVE-2021-30485, CVE-2021-31229, CVE-2021-31347,
    CVE-2021-31348, CVE-2021-31598 (bsc#1191856)
   Note:
   * CVE-2021-26220 https://sourceforge.net/p/ezxml/bugs/23
     not relevant for netcdf: code isn't used.
   * CVE-2019-20005 https://sourceforge.net/p/ezxml/bugs/14
     Issue cannot be reproduced and no patch is available upstream.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-25"/>
	<updated date="2021-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191856">SUSE bug 1191856</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20005/">CVE-2019-20005</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20006/">CVE-2019-20006</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20007/">CVE-2019-20007</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20198/">CVE-2019-20198</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20199/">CVE-2019-20199</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20200/">CVE-2019-20200</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20201/">CVE-2019-20201</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20202/">CVE-2019-20202</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26220/">CVE-2021-26220</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26221/">CVE-2021-26221</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26222/">CVE-2021-26222</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30485/">CVE-2021-30485</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31229/">CVE-2021-31229</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31347/">CVE-2021-31347</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31348/">CVE-2021-31348</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31598/">CVE-2021-31598</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009299864" comment="SUSE Linux Enterprise Module for High Performance Computing 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657455" comment="libnetcdf-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657456" comment="libnetcdf-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657457" comment="libnetcdf-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657458" comment="libnetcdf-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657459" comment="libnetcdf-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657460" comment="libnetcdf_4_7_3-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657461" comment="libnetcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657462" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657463" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657464" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657465" comment="netcdf-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657466" comment="netcdf-gnu-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657467" comment="netcdf-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657468" comment="netcdf-gnu-mpich-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657469" comment="netcdf-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657470" comment="netcdf-gnu-mvapich2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657471" comment="netcdf-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657472" comment="netcdf-gnu-openmpi2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657473" comment="netcdf-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657474" comment="netcdf-gnu-openmpi3-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657475" comment="netcdf_4_7_3-gnu-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657476" comment="netcdf_4_7_3-gnu-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657477" comment="netcdf_4_7_3-gnu-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657478" comment="netcdf_4_7_3-gnu-mpich-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657479" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657480" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657481" comment="netcdf_4_7_3-gnu-mvapich2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657482" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657483" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657484" comment="netcdf_4_7_3-gnu-openmpi2-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657485" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657486" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657487" comment="netcdf_4_7_3-gnu-openmpi3-hpc-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657488" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-4.7.3-3.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657489" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static-4.7.3-3.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110602" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1160398" ref_url="https://bugzilla.suse.com/1160398" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2773" ref_url="https://www.suse.com/security/cve/CVE-2020-2773/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1569-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007125.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk to version jdk8u252 fixes the following issues:

- CVE-2020-2754: Forward references to Nashorn (bsc#1169511)
- CVE-2020-2755: Improve Nashorn matching (bsc#1169511)
- CVE-2020-2756: Better mapping of serial ENUMs (bsc#1169511)
- CVE-2020-2757: Less Blocking Array Queues (bsc#1169511)
- CVE-2020-2773: Better signatures in XML (bsc#1169511)
- CVE-2020-2781: Improve TLS session handling (bsc#1169511)
- CVE-2020-2800: Better Headings for HTTP Servers (bsc#1169511)
- CVE-2020-2803: Enhance buffering of byte buffers (bsc#1169511)
- CVE-2020-2805: Enhance typing of methods (bsc#1169511)
- CVE-2020-2830: Better Scanner conversions (bsc#1169511)
- Ignore whitespaces after the header or footer in PEM X.509 cert (bsc#1171352)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-14"/>
	<updated date="2020-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160398">SUSE bug 1160398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2773/">CVE-2020-2773</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497056" comment="java-1_8_0-openjdk-1.8.0.252-3.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497057" comment="java-1_8_0-openjdk-demo-1.8.0.252-3.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497058" comment="java-1_8_0-openjdk-devel-1.8.0.252-3.35.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497059" comment="java-1_8_0-openjdk-headless-1.8.0.252-3.35.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110603" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1160968" ref_url="https://bugzilla.suse.com/1160968" source="BUGZILLA"/>
		<reference ref_id="1169511" ref_url="https://bugzilla.suse.com/1169511" source="BUGZILLA"/>
		<reference ref_id="1171352" ref_url="https://bugzilla.suse.com/1171352" source="BUGZILLA"/>
		<reference ref_id="1172277" ref_url="https://bugzilla.suse.com/1172277" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2949" ref_url="https://www.suse.com/security/cve/CVE-2019-2949/" source="CVE"/>
		<reference ref_id="CVE-2020-2654" ref_url="https://www.suse.com/security/cve/CVE-2020-2654/" source="CVE"/>
		<reference ref_id="CVE-2020-2754" ref_url="https://www.suse.com/security/cve/CVE-2020-2754/" source="CVE"/>
		<reference ref_id="CVE-2020-2755" ref_url="https://www.suse.com/security/cve/CVE-2020-2755/" source="CVE"/>
		<reference ref_id="CVE-2020-2756" ref_url="https://www.suse.com/security/cve/CVE-2020-2756/" source="CVE"/>
		<reference ref_id="CVE-2020-2757" ref_url="https://www.suse.com/security/cve/CVE-2020-2757/" source="CVE"/>
		<reference ref_id="CVE-2020-2781" ref_url="https://www.suse.com/security/cve/CVE-2020-2781/" source="CVE"/>
		<reference ref_id="CVE-2020-2800" ref_url="https://www.suse.com/security/cve/CVE-2020-2800/" source="CVE"/>
		<reference ref_id="CVE-2020-2803" ref_url="https://www.suse.com/security/cve/CVE-2020-2803/" source="CVE"/>
		<reference ref_id="CVE-2020-2805" ref_url="https://www.suse.com/security/cve/CVE-2020-2805/" source="CVE"/>
		<reference ref_id="CVE-2020-2830" ref_url="https://www.suse.com/security/cve/CVE-2020-2830/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006981.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

java-1_8_0-ibm was updated to Java 8.0 Service Refresh 6 Fix Pack 10 (bsc#1172277,bsc#1169511,bsc#1160968)

- CVE-2020-2654: Fixed an issue which could have resulted in unauthorized ability to cause a partial denial of service    
- CVE-2020-2754: Forwarded references to Nashorn 
- CVE-2020-2755: Improved Nashorn matching 
- CVE-2020-2756: Improved mapping of serial ENUMs 
- CVE-2020-2757: Less Blocking Array Queues 
- CVE-2020-2781: Improved TLS session handling 
- CVE-2020-2800: Improved Headings for HTTP Servers 
- CVE-2020-2803: Enhanced buffering of byte buffers 
- CVE-2020-2805: Enhanced typing of methods 
- CVE-2020-2830: Improved Scanner conversions 
- CVE-2019-2949: Fixed an issue which could have resulted in unauthorized access to critical data 
- Added RSA PSS SUPPORT TO IBMPKCS11IMPL
- The pack200 and unpack200 alternatives should be slaves of java (bsc#1171352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1160968">SUSE bug 1160968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169511">SUSE bug 1169511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171352">SUSE bug 1171352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172277">SUSE bug 1172277</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-2949/">CVE-2019-2949</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-2654/">CVE-2020-2654</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2754/">CVE-2020-2754</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2755/">CVE-2020-2755</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2756/">CVE-2020-2756</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2757/">CVE-2020-2757</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2781/">CVE-2020-2781</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-2800/">CVE-2020-2800</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2803/">CVE-2020-2803</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-2805/">CVE-2020-2805</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-2830/">CVE-2020-2830</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497061" comment="java-1_8_0-ibm-1.8.0_sr6.10-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497062" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.10-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497063" comment="java-1_8_0-ibm-devel-1.8.0_sr6.10-3.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497064" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.10-3.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110604" version="1" class="patch">
	<metadata>
		<title>Security update for ntp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1125401" ref_url="https://bugzilla.suse.com/1125401" source="BUGZILLA"/>
		<reference ref_id="1169740" ref_url="https://bugzilla.suse.com/1169740" source="BUGZILLA"/>
		<reference ref_id="1171355" ref_url="https://bugzilla.suse.com/1171355" source="BUGZILLA"/>
		<reference ref_id="1172651" ref_url="https://bugzilla.suse.com/1172651" source="BUGZILLA"/>
		<reference ref_id="1173334" ref_url="https://bugzilla.suse.com/1173334" source="BUGZILLA"/>
		<reference ref_id="992038" ref_url="https://bugzilla.suse.com/992038" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-8956" ref_url="https://www.suse.com/security/cve/CVE-2018-8956/" source="CVE"/>
		<reference ref_id="CVE-2020-11868" ref_url="https://www.suse.com/security/cve/CVE-2020-11868/" source="CVE"/>
		<reference ref_id="CVE-2020-13817" ref_url="https://www.suse.com/security/cve/CVE-2020-13817/" source="CVE"/>
		<reference ref_id="CVE-2020-15025" ref_url="https://www.suse.com/security/cve/CVE-2020-15025/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007066.html" source="SUSE-SU"/>
		<description>
This update for ntp fixes the following issues:

ntp was updated to 4.2.8p15

- CVE-2020-11868: Fixed an issue which a server mode packet with spoofed source address 
  frequently send to the client ntpd could have caused denial of service (bsc#1169740).
- CVE-2018-8956: Fixed an issue which could have allowed remote attackers to prevent 
  a broadcast client from synchronizing its clock with a broadcast NTP server via spoofed 
  mode 3 and mode 5 packets (bsc#1171355).
- CVE-2020-13817: Fixed an issue which an off-path attacker with the ability to query time 
  from victim's ntpd instance could have modified the victim's clock by a limited amount (bsc#1172651).
- CVE-2020-15025: Fixed an issue which remote attacker could have caused denial of service by consuming 
  the memory when a CMAC key was used andassociated with a CMAC algorithm in the ntp.keys (bsc#1173334).
- Removed an OpenSSL version warning (bsc#992038 and bsc#1125401).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-02"/>
	<updated date="2020-07-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1125401">SUSE bug 1125401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169740">SUSE bug 1169740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171355">SUSE bug 1171355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172651">SUSE bug 1172651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173334">SUSE bug 1173334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/992038">SUSE bug 992038</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-8956/">CVE-2018-8956</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11868/">CVE-2020-11868</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13817/">CVE-2020-13817</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15025/">CVE-2020-15025</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497065" comment="ntp-4.2.8p15-4.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110605" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172698" ref_url="https://bugzilla.suse.com/1172698" source="BUGZILLA"/>
		<reference ref_id="1172704" ref_url="https://bugzilla.suse.com/1172704" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8023" ref_url="https://www.suse.com/security/cve/CVE-2020-8023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007078.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8023: Fixed a potential local privilege escalation from ldap to root when OPENLDAP_CONFIG_BACKEND='ldap' was used (bsc#1172698).	  
- Changed DB_CONFIG to root:ldap permissions (bsc#1172704).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172698">SUSE bug 1172698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172704">SUSE bug 1172704</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8023/">CVE-2020-8023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497066" comment="openldap2-back-meta-2.4.46-9.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497067" comment="openldap2-back-perl-2.4.46-9.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110606" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497109" comment="reiserfs-kmp-default-5.3.18-24.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110607" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1175259" ref_url="https://bugzilla.suse.com/1175259" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17639" ref_url="https://www.suse.com/security/cve/CVE-2019-17639/" source="CVE"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007336.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 15 [bsc#1175259, bsc#1174157]
  CVE-2020-14577 CVE-2020-14578 CVE-2020-14579 CVE-2020-14581
  CVE-2020-14556 CVE-2020-14621 CVE-2020-14593 CVE-2020-14583
  CVE-2019-17639
  * Class Libraries:
    - JAVA.UTIL.ZIP.DEFLATER OPERATIONS THROW JAVA.LANG.INTERNALERROR
    - JAVA 8 DECODER OBJECTS CONSUME A LARGE AMOUNT OF JAVA HEAP
    - TRANSLATION MESSAGES UPDATE FOR JCL
    - UPDATE TIMEZONE INFORMATION TO TZDATA2020A
  * Java Virtual Machine:
    - IBM JAVA REGISTERS A HANDLER BY DEFAULT FOR SIGABRT
    - LARGE MEMORY FOOTPRINT HELD BY TRACECONTEXT OBJECT
  * JIT Compiler:
    - CRASH IN THE INTERPRETER AFTER OSR FROM INLINED SYNCHRONIZED METHOD
      IN DEBUGGING MODE
    - INTERMITTENT ASSERTION FAILURE REPORTED
    - CRASH IN RESOLVECLASSREF() DURING AOT LOAD
    - JIT CRASH DURING CLASS UNLOADING IN J9METHOD_HT::ONCLASSUNLOADING()
    - SEGMENTATION FAULT WHILE COMPILING A METHOD
    - UNEXPECTED CLASSCASTEXCEPTION THROWN IN HIGH LEVEL PARALLEL
      APPLICATION ON IBM Z PLATFORM
  * Security:
    - CERTIFICATEEXCEPTION OCCURS WHEN FILE.ENCODING PROPERTY SET TO
      NON DEFAULT VALUE
    - CHANGES TO IBMJCE AND IBMJCEPLUS PROVIDERS
    - IBMJCEPLUS FAILS, WHEN THE SECURITY MANAGER IS ENABLED, WITH
      DEFAULT PERMISSIONS, SPECIFIED IN JAVA.POLICY FILE
    - IN CERTAIN INSTANCES, IBMJCEPLUS PROVIDER THROWS EXCEPTION FROM
      KEYFACTORY CLASS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175259">SUSE bug 1175259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-17639/">CVE-2019-17639</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497069" comment="java-1_8_0-ibm-1.8.0_sr6.15-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497070" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.15-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497071" comment="java-1_8_0-ibm-devel-1.8.0_sr6.15-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497072" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.15-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110608" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497110" comment="reiserfs-kmp-default-5.3.18-24.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110609" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497111" comment="reiserfs-kmp-default-5.3.18-24.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110610" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174154" ref_url="https://bugzilla.suse.com/1174154" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15719" ref_url="https://www.suse.com/security/cve/CVE-2020-15719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007391.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1174154 - CVE-2020-15719 - This resolves an issue with x509
  SAN's falling back to CN validation in violation of rfc6125.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174154">SUSE bug 1174154</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15719/">CVE-2020-15719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497074" comment="openldap2-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497075" comment="openldap2-back-meta-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497076" comment="openldap2-back-perl-2.4.46-9.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497077" comment="openldap2-ppolicy-check-password-1.2-9.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110611" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175568" ref_url="https://bugzilla.suse.com/1175568" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8027" ref_url="https://www.suse.com/security/cve/CVE-2020-8027/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007454.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-8027: openldap_update_modules_path.sh starts daemons unconditionally and uses fixed paths in /tmp (bsc#1175568).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-25"/>
	<updated date="2020-09-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175568">SUSE bug 1175568</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8027/">CVE-2020-8027</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497078" comment="openldap2-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497079" comment="openldap2-back-meta-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497080" comment="openldap2-back-perl-2.4.46-9.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497081" comment="openldap2-ppolicy-check-password-1.2-9.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110612" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497112" comment="reiserfs-kmp-default-5.3.18-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110613" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497113" comment="reiserfs-kmp-default-5.3.18-24.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110614" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497114" comment="reiserfs-kmp-default-5.3.18-24.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110615" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497115" comment="reiserfs-kmp-default-5.3.18-24.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110616" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178387" ref_url="https://bugzilla.suse.com/1178387" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25692" ref_url="https://www.suse.com/security/cve/CVE-2020-25692/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007765.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- CVE-2020-25692: Fixed an unauthenticated remote denial of service due to incorrect validation of modrdn equality rules (bsc#1178387).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-12"/>
	<updated date="2020-11-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178387">SUSE bug 1178387</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25692/">CVE-2020-25692</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497085" comment="openldap2-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497086" comment="openldap2-back-meta-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497087" comment="openldap2-back-perl-2.4.46-9.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497088" comment="openldap2-ppolicy-check-password-1.2-9.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110617" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14578" ref_url="https://www.suse.com/security/cve/CVE-2020-14578/" source="CVE"/>
		<reference ref_id="CVE-2020-14579" ref_url="https://www.suse.com/security/cve/CVE-2020-14579/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007829.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)',
  introduced in October 2020 CPU.

- Update to version jdk8u272 (icedtea 3.17.0) (July 2020 CPU,
  bsc#1174157, and October 2020 CPU, bsc#1177943)
  * New features
    + JDK-8245468: Add TLSv1.3 implementation classes from 11.0.7
    + PR3796: Allow the number of curves supported to be specified
  * Security fixes
    + JDK-8028431, CVE-2020-14579: NullPointerException in
      DerValue.equals(DerValue)
    + JDK-8028591, CVE-2020-14578: NegativeArraySizeException in
      sun.security.util.DerInputStream.getUnalignedBitString()
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233255: Better Swing Buttons
    + JDK-8233624: Enhance JNI linkage
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240124: Better VM Interning
    + JDK-8240482: Improved WAV file playback
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Import of OpenJDK 8 u262 build 01
    + JDK-4949105: Access Bridge lacks html tags parsing
    + JDK-8003209: JFR events for network utilization
    + JDK-8030680: 292 cleanup from default method code assessment
    + JDK-8035633: TEST_BUG: java/net/NetworkInterface/Equals.java
      and some tests failed on windows intermittently
    + JDK-8041626: Shutdown tracing event
    + JDK-8141056: Erroneous assignment in HeapRegionSet.cpp
    + JDK-8149338: JVM Crash caused by Marlin renderer not handling
       NaN coordinates
    + JDK-8151582: (ch) test java/nio/channels/
      /AsyncCloseAndInterrupt.java failing due to 'Connection
      succeeded'
    + JDK-8165675: Trace event for thread park has incorrect unit
       for timeout
    + JDK-8176182: 4 security tests are not run
    + JDK-8178910: Problemlist sample tests
    + JDK-8183925: Decouple crash protection from watcher thread
    + JDK-8191393: Random crashes during cfree+0x1c
    + JDK-8195817: JFR.stop should require name of recording
    + JDK-8195818: JFR.start should increase autogenerated name by
       one
    + JDK-8195819: Remove recording=x from jcmd JFR.check output
    + JDK-8199712: Flight Recorder
    + JDK-8202578: Revisit location for class unload events
    + JDK-8202835: jfr/event/os/TestSystemProcess.java fails on
      missing events
    + JDK-8203287: Zero fails to build after JDK-8199712 (Flight
      Recorder)
    + JDK-8203346: JFR: Inconsistent signature of
      jfr_add_string_constant
    + JDK-8203664: JFR start failure after AppCDS archive created
      with JFR StartFlightRecording
    + JDK-8203921: JFR thread sampling is missing fixes from
      JDK-8194552
    + JDK-8203929: Limit amount of data for JFR.dump
    + JDK-8205516: JFR tool
    + JDK-8207392: [PPC64] Implement JFR profiling
    + JDK-8207829: FlightRecorderMXBeanImpl is leaking the first
      classloader which calls it
    + JDK-8209960: -Xlog:jfr* doesn't work with the JFR
    + JDK-8210024: JFR calls virtual is_Java_thread from ~Thread()
    + JDK-8210776: Upgrade X Window System 6.8.2 to the latest XWD
      1.0.7
    + JDK-8211239: Build fails without JFR: empty JFR events
      signatures mismatch
    + JDK-8212232: Wrong metadata for the configuration of the
      cutoff for old object sample events
    + JDK-8213015: Inconsistent settings between JFR.configure and
      -XX:FlightRecorderOptions
    + JDK-8213421: Line number information for execution samples
      always 0
    + JDK-8213617: JFR should record the PID of the recorded process
    + JDK-8213734: SAXParser.parse(File, ..) does not close
      resources when Exception occurs.
    + JDK-8213914: [TESTBUG] Several JFR VM events are not covered
      by tests
    + JDK-8213917: [TESTBUG] Shutdown JFR event is not covered by
      test
    + JDK-8213966: The ZGC JFR events should be marked as
      experimental
    + JDK-8214542: JFR: Old Object Sample event slow on a deep heap
      in debug builds
    + JDK-8214750: Unnecessary &lt;p&gt; tags in jfr classes
    + JDK-8214896: JFR Tool left files behind
    + JDK-8214906: [TESTBUG] jfr/event/sampling/TestNative.java
      fails with UnsatisfiedLinkError
    + JDK-8214925: JFR tool fails to execute
    + JDK-8215175: Inconsistencies in JFR event metadata
    + JDK-8215237: jdk.jfr.Recording javadoc does not compile
    + JDK-8215284: Reduce noise induced by periodic task
      getFileSize()
    + JDK-8215355: Object monitor deadlock with no threads holding
      the monitor (using jemalloc 5.1)
    + JDK-8215362: JFR GTest JfrTestNetworkUtilization fails
    + JDK-8215771: The jfr tool should pretty print reference chains
    + JDK-8216064: -XX:StartFlightRecording:settings= doesn't work
      properly
    + JDK-8216486: Possibility of integer overflow in
      JfrThreadSampler::run()
    + JDK-8216528: test/jdk/java/rmi/transport/
       /runtimeThreadInheritanceLeak/
       /RuntimeThreadInheritanceLeak.java failing with Xcomp
    + JDK-8216559: [JFR] Native libraries not correctly parsed from
      /proc/self/maps
    + JDK-8216578: Remove unused/obsolete method in JFR code
    + JDK-8216995: Clean up JFR command line processing
    + JDK-8217744: [TESTBUG] JFR TestShutdownEvent fails on some
      systems due to process surviving SIGINT
    + JDK-8217748: [TESTBUG] Exclude TestSig test case from JFR
      TestShutdownEvent
    + JDK-8218935: Make jfr strncpy uses GCC 8.x friendly
    + JDK-8223147: JFR Backport
    + JDK-8223689: Add JFR Thread Sampling Support
    + JDK-8223690: Add JFR BiasedLock Event Support
    + JDK-8223691: Add JFR G1 Region Type Change Event Support
    + JDK-8223692: Add JFR G1 Heap Summary Event Support
    + JDK-8224172: assert(jfr_is_event_enabled(id)) failed:
      invariant
    + JDK-8224475: JTextPane does not show images in HTML rendering
    + JDK-8226253: JAWS reports wrong number of radio buttons when
      buttons are hidden.
    + JDK-8226779: [TESTBUG] Test JFR API from Java agent
    + JDK-8226892: ActionListeners on JRadioButtons don't get
      notified when selection is changed with arrow keys
    + JDK-8227011: Starting a JFR recording in response to JVMTI
      VMInit and / or Java agent premain corrupts memory
    + JDK-8227605: Kitchensink fails 'assert((((klass)-&gt;trace_id()
      &amp; (JfrTraceIdEpoch::leakp_in_use_this_epoch_bit())) != 0))
      failed: invariant'
    + JDK-8229366: JFR backport allows unchecked writing to memory
    + JDK-8229401: Fix JFR code cache test failures
    + JDK-8229708: JFR backport code does not initialize
    + JDK-8229873: 8229401 broke jdk8u-jfr-incubator
    + JDK-8230448: [test] JFRSecurityTestSuite.java is failing on
      Windows
    + JDK-8230707: JFR related tests are failing
    + JDK-8230782: Robot.createScreenCapture() fails if
      'awt.robot.gtk' is set to false
    + JDK-8230856: Java_java_net_NetworkInterface_getByName0 on
       unix misses ReleaseStringUTFChars in early return
    + JDK-8230947: TestLookForUntestedEvents.java is failing after
      JDK-8230707
    + JDK-8231995: two jtreg tests failed after 8229366 is fixed
    + JDK-8233623: Add classpath exception to copyright in
      EventHandlerProxyCreator.java file
    + JDK-8236002: CSR for JFR backport suggests not leaving out
      the package-info
    + JDK-8236008: Some backup files were accidentally left in the
      hotspot tree
    + JDK-8236074: Missed package-info
    + JDK-8236174: Should update javadoc since tags
    + JDK-8238076: Fix OpenJDK 7 Bootstrap Broken by JFR Backport
    + JDK-8238452: Keytool generates wrong expiration date if
      validity is set to 2050/01/01
    + JDK-8238555: Allow Initialization of SunPKCS11 with NSS when
      there are external FIPS modules in the NSSDB
    + JDK-8238589: Necessary code cleanup in JFR for JDK8u
    + JDK-8238590: Enable JFR by default during compilation in 8u
    + JDK-8239055: Wrong implementation of VMState.hasListener
    + JDK-8239476: JDK-8238589 broke windows build by moving
      OrderedPair
    + JDK-8239479: minimal1 and zero builds are failing
    + JDK-8239867: correct over use of INCLUDE_JFR macro
    + JDK-8240375: Disable JFR by default for July 2020 release
    + JDK-8241444: Metaspace::_class_vsm not initialized if
      compressed class pointers are disabled
    + JDK-8241902: AIX Build broken after integration of
      JDK-8223147 (JFR Backport)
    + JDK-8242788: Non-PCH build is broken after JDK-8191393
  * Import of OpenJDK 8 u262 build 02
    + JDK-8130737: AffineTransformOp can't handle child raster with
      non-zero x-offset
    + JDK-8172559: [PIT][TEST_BUG] Move @test to be 1st annotation
      in java/awt/image/Raster/TestChildRasterOp.java
    + JDK-8230926: [macosx] Two apostrophes are entered instead of
      one with 'U.S. International - PC' layout
    + JDK-8240576: JVM crashes after transformation in C2
      IdealLoopTree::merge_many_backedges
    + JDK-8242883: Incomplete backport of JDK-8078268: backport
      test part
  * Import of OpenJDK 8 u262 build 03
    + JDK-8037866: Replace the Fun class in tests with lambdas
    + JDK-8146612: C2: Precedence edges specification violated
    + JDK-8150986: serviceability/sa/jmap-hprof/
       /JMapHProfLargeHeapTest.java failing because expects HPROF
      JAVA PROFILE 1.0.1 file format
    + JDK-8229888: (zipfs) Updating an existing zip file does not
      preserve original permissions
    + JDK-8230597: Update GIFlib library to the 5.2.1
    + JDK-8230769: BufImg_SetupICM add
      ReleasePrimitiveArrayCritical call in early return
    + JDK-8233880, PR3798: Support compilers with multi-digit major
      version numbers
    + JDK-8239852: java/util/concurrent tests fail with
      -XX:+VerifyGraphEdges: assert(!VerifyGraphEdges) failed:
      verification should have failed
    + JDK-8241638: launcher time metrics always report 1 on Linux
      when _JAVA_LAUNCHER_DEBUG set
    + JDK-8243059: Build fails when --with-vendor-name contains a
      comma
    + JDK-8243474: [TESTBUG] removed three tests of 0 bytes
    + JDK-8244461: [JDK 8u] Build fails with glibc 2.32
    + JDK-8244548: JDK 8u: sun.misc.Version.jdkUpdateVersion()
      returns wrong result
  * Import of OpenJDK 8 u262 build 04
    + JDK-8067796: (process) Process.waitFor(timeout, unit) doesn't
      throw NPE if timeout is less than, or equal to zero when unit
      == null
    + JDK-8148886: SEGV in sun.java2d.marlin.Renderer._endRendering
    + JDK-8171934:
      ObjectSizeCalculator.getEffectiveMemoryLayoutSpecification()
      does not recognize OpenJDK's HotSpot VM
    + JDK-8196969: JTreg Failure:
      serviceability/sa/ClhsdbJstack.java causes NPE
    + JDK-8243539: Copyright info (Year) should be updated for fix
      of 8241638
    + JDK-8244777: ClassLoaderStats VM Op uses constant hash value
  * Import of OpenJDK 8 u262 build 05
    + JDK-7147060: com/sun/org/apache/xml/internal/security/
      /transforms/ClassLoaderTest.java doesn't run in agentvm mode
    + JDK-8178374: Problematic ByteBuffer handling in
      CipherSpi.bufferCrypt method
    + JDK-8181841: A TSA server returns timestamp with precision
      higher than milliseconds
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8229899: Make java.io.File.isInvalid() less racy
    + JDK-8236996: Incorrect Roboto font rendering on Windows with
      subpixel antialiasing
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8244407: JVM crashes after transformation in C2
      IdealLoopTree::split_fall_in
    + JDK-8244843: JapanEraNameCompatTest fails
  * Import of OpenJDK 8 u262 build 06
    + JDK-8246223: Windows build fails after JDK-8227269
  * Import of OpenJDK 8 u262 build 07
    + JDK-8233197: Invert JvmtiExport::post_vm_initialized() and
      Jfr:on_vm_start() start-up order for correct option parsing
    + JDK-8243541: (tz) Upgrade time-zone data to tzdata2020a
    + JDK-8245167: Top package in method profiling shows null in JMC
    + JDK-8246703: [TESTBUG] Add test for JDK-8233197
  * Import of OpenJDK 8 u262 build 08
    + JDK-8220293: Deadlock in JFR string pool
    + JDK-8225068: Remove DocuSign root certificate that is
      expiring in May 2020
    + JDK-8225069: Remove Comodo root certificate that is expiring
      in May 2020
  * Import of OpenJDK 8 u262 build 09
    + JDK-8248399: Build installs jfr binary when JFR is disabled
  * Import of OpenJDK 8 u262 build 10
    + JDK-8248715: New JavaTimeSupplementary localisation for 'in'
      installed in wrong package
  * Import of OpenJDK 8 u265 build 01
    + JDK-8249677: Regression in 8u after JDK-8237117: Better
      ForkJoinPool behavior
    + JDK-8250546: Expect changed behaviour reported in JDK-8249846
  * Import of OpenJDK 8 u272 build 01
    + JDK-8006205: [TESTBUG] NEED_TEST: please JTREGIFY
      test/compiler/7177917/Test7177917.java
    + JDK-8035493: JVMTI PopFrame capability must instruct
      compilers not to prune locals
    + JDK-8036088: Replace strtok() with its safe equivalent
      strtok_s() in DefaultProxySelector.c
    + JDK-8039082: [TEST_BUG] Test java/awt/dnd/
      /BadSerializationTest/BadSerializationTest.java fails
    + JDK-8075774: Small readability and performance improvements
      for zipfs
    + JDK-8132206: move ScanTest.java into OpenJDK
    + JDK-8132376: Add @requires os.family to the client tests with
      access to internal OS-specific API
    + JDK-8132745: minor cleanup of java/util/Scanner/ScanTest.java
    + JDK-8137087: [TEST_BUG] Cygwin failure of java/awt/
      /appletviewer/IOExceptionIfEncodedURLTest/
      /IOExceptionIfEncodedURLTest.sh
    + JDK-8145808: java/awt/Graphics2D/MTGraphicsAccessTest/
      /MTGraphicsAccessTest.java hangs on Win. 8
    + JDK-8151788: NullPointerException from ntlm.Client.type3
    + JDK-8151834: Test SmallPrimeExponentP.java times out
      intermittently
    + JDK-8153430: jdk regression test MletParserLocaleTest,
      ParserInfiniteLoopTest reduce default timeout
    + JDK-8153583: Make OutputAnalyzer.reportDiagnosticSummary
      public
    + JDK-8156169: Some sound tests rarely hangs because of
      incorrect synchronization
    + JDK-8165936: Potential Heap buffer overflow when seaching
      timezone info files
    + JDK-8166148: Fix for JDK-8165936 broke solaris builds
    + JDK-8167300: Scheduling failures during gcm should be fatal
    + JDK-8167615: Opensource unit/regression tests for JavaSound
    + JDK-8172012: [TEST_BUG] delays needed in
      javax/swing/JTree/4633594/bug4633594.java
    + JDK-8177628: Opensource unit/regression tests for ImageIO
    + JDK-8183341: Better cleanup for javax/imageio/AllowSearch.java
    + JDK-8183351: Better cleanup for jdk/test/javax/imageio/spi/
      /AppletContextTest/BadPluginConfigurationTest.sh
    + JDK-8193137: Nashorn crashes when given an empty script file
    + JDK-8194298: Add support for per Socket configuration of TCP
      keepalive
    + JDK-8198004: javax/swing/JFileChooser/6868611/bug6868611.java
      throws error
    + JDK-8200313: java/awt/Gtk/GtkVersionTest/GtkVersionTest.java
      fails
    + JDK-8210147: adjust some WSAGetLastError usages in windows
      network coding
    + JDK-8211714: Need to update vm_version.cpp to recognise
      VS2017 minor versions
    + JDK-8214862: assert(proj != __null) at compile.cpp:3251
    + JDK-8217606: LdapContext#reconnect always opens a new
      connection
    + JDK-8217647: JFR: recordings on 32-bit systems unreadable
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8230303: JDB hangs when running monitor command
    + JDK-8230711: ConnectionGraph::unique_java_object(Node* N)
      return NULL if n is not in the CG
    + JDK-8234617: C1: Incorrect result of field load due to
      missing narrowing conversion
    + JDK-8235243: handle VS2017 15.9 and VS2019 in
      abstract_vm_version
    + JDK-8235325: build failure on Linux after 8235243
    + JDK-8235687: Contents/MacOS/libjli.dylib cannot be a symlink
    + JDK-8237951: CTW: C2 compilation fails with 'malformed
      control flow'
    + JDK-8238225: Issues reported after replacing symlink at
      Contents/MacOS/libjli.dylib with binary
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8239819: XToolkit: Misread of screen information memory
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8241888: Mirror jdk.security.allowNonCaAnchor system
      property with a security one
    + JDK-8242498: Invalid 'sun.awt.TimedWindowEvent' object leads
      to JVM crash
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8246310: Clean commented-out code about ModuleEntry
      and PackageEntry in JFR
    + JDK-8246384: Enable JFR by default on supported architectures
      for October 2020 release
    + JDK-8248643: Remove extra leading space in JDK-8240295 8u
      backport
    + JDK-8249610: Make
      sun.security.krb5.Config.getBooleanObject(String... keys)
      method public
  * Import of OpenJDK 8 u272 build 02
    + JDK-8023697: failed class resolution reports different class
      name in detail message for the first and subsequent times
    + JDK-8025886: replace [[ and == bash extensions in regtest
    + JDK-8046274: Removing dependency on jakarta-regexp
    + JDK-8048933: -XX:+TraceExceptions output should include the
      message
    + JDK-8076151: [TESTBUG] Test java/awt/FontClass/CreateFont/
      /fileaccess/FontFile.java fails
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8154313: Generated javadoc scattered all over the place
    + JDK-8163251: Hard coded loop limit prevents reading of smart
      card data greater than 8k
    + JDK-8173300: [TESTBUG]compiler/tiered/NonTieredLevelsTest.java
      fails with compiler.whitebox.SimpleTestCaseHelper(int) must be
      compiled
    + JDK-8183349: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java and WriteAfterAbort.java
    + JDK-8191678: [TESTBUG] Add keyword headful in java/awt
      FocusTransitionTest test.
    + JDK-8201633: Problems with AES-GCM native acceleration
    + JDK-8211049: Second parameter of 'initialize' method is not
          used
    + JDK-8219566: JFR did not collect call stacks when
      MaxJavaStackTraceDepth is set to zero
    + JDK-8220165: Encryption using GCM results in
      RuntimeException- input length out of bound
    + JDK-8220555: JFR tool shows potentially misleading message
      when it cannot access a file
    + JDK-8224217: RecordingInfo should use textual representation
      of path
    + JDK-8231779: crash
      HeapWord*ParallelScavengeHeap::failed_mem_allocate
    + JDK-8238380, PR3798: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386, PR3798: (sctp) jdk.sctp/unix/native/libsctp/
      /SctpNet.c 'multiple definition' link errors with GCC10
    + JDK-8238388, PR3798: libj2gss/NativeFunc.o 'multiple
      definition' link errors with GCC10
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8250755: Better cleanup for jdk/test/javax/imageio/
      /plugins/shared/CanWriteSequence.java
  * Import of OpenJDK 8 u272 build 03
    + JDK-6574989: TEST_BUG:
      javax/sound/sampled/Clip/bug5070081.java fails sometimes
    + JDK-8148754: C2 loop unrolling fails due to unexpected graph
      shape
    + JDK-8192953: sun/management/jmxremote/bootstrap/*.sh tests
      fail with error : revokeall.exe: Permission denied
    + JDK-8203357: Container Metrics
    + JDK-8209113: Use WeakReference for lastFontStrike for created
      Fonts
    + JDK-8216283: Allow shorter method sampling interval than 10 ms
    + JDK-8221569: JFR tool produces incorrect output when both
      --categories and --events are specified
    + JDK-8233097: Fontmetrics for large Fonts has zero width
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8250875: Incorrect parameter type for update_number in
      JDK_Version::jdk_update
  * Import of OpenJDK 8 u272 build 04
    + JDK-8061616: HotspotDiagnosticMXBean.getVMOption() throws
      IllegalArgumentException for flags of type double
    + JDK-8177334: Update xmldsig implementation to Apache
      Santuario 2.1.1
    + JDK-8217878: ENVELOPING XML signature no longer works in JDK
      11
    + JDK-8218629: XML Digital Signature throws NAMESPACE_ERR
      exception on OpenJDK 11, works 8/9/10
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
  * Import of OpenJDK 8 u272 build 05
    + JDK-8026236: Add PrimeTest for BigInteger
    + JDK-8057003: Large reference arrays cause extremely long
      synchronization times
    + JDK-8060721: Test runtime/SharedArchiveFile/
      /LimitSharedSizes.java fails in jdk 9 fcs new
      platforms/compiler
    + JDK-8152077: (cal) Calendar.roll does not always roll the
      hours during daylight savings
    + JDK-8168517: java/lang/ProcessBuilder/Basic.java failed
    + JDK-8211163: UNIX version of Java_java_io_Console_echo does
      not return a clean boolean
    + JDK-8220674: [TESTBUG] MetricsMemoryTester failcount test in
      docker container only works with debug JVMs
    + JDK-8231213: Migrate SimpleDateFormatConstTest to JDK Repo
    + JDK-8236645: JDK 8u231 introduces a regression with
      incompatible handling of XML messages
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8249158: THREAD_START and THREAD_END event posted in
      primordial phase
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8251546: 8u backport of JDK-8194298 breaks AIX and
      Solaris builds
    + JDK-8252084: Minimal VM fails to bootcycle: undefined symbol:
      AgeTableTracer::is_tenuring_distribution_event_enabled
  * Import of OpenJDK 8 u272 build 06
    + JDK-8064319: Need to enable -XX:+TraceExceptions in release
      builds
    + JDK-8080462, PR3801: Update SunPKCS11 provider with PKCS11
      v2.40 support
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8161973: PKIXRevocationChecker.getSoftFailExceptions()
      not working
    + JDK-8169925, PR3801: PKCS #11 Cryptographic Token Interface
      license
    + JDK-8184762: ZapStackSegments should use optimized memset
    + JDK-8193234: When using -Xcheck:jni an internally allocated
      buffer can leak
    + JDK-8219919: RuntimeStub name lost with
      PrintFrameConverterAssembly
    + JDK-8220313: [TESTBUG] Update base image for Docker testing
      to OL 7.6
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8225695: 32-bit build failures after JDK-8080462 (Update
      SunPKCS11 provider with PKCS11 v2.40 support)
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8228835: Memory leak in PKCS11 provider when using AES GCM
    + JDK-8233621: Mismatch in jsse.enableMFLNExtension property
      name
    + JDK-8238898, PR3801: Missing hash characters for header on
      license file
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8245467: Remove 8u TLSv1.2 implementation files
    + JDK-8245469: Remove DTLS protocol implementation
    + JDK-8245470: Fix JDK8 compatibility issues
    + JDK-8245471: Revert JDK-8148188
    + JDK-8245472: Backport JDK-8038893 to JDK8
    + JDK-8245473: OCSP stapling support
    + JDK-8245474: Add TLS_KRB5 cipher suites support according to
      RFC-2712
    + JDK-8245476: Disable TLSv1.3 protocol in the ClientHello
      message by default
    + JDK-8245477: Adjust TLS tests location
    + JDK-8245653: Remove 8u TLS tests
    + JDK-8245681: Add TLSv1.3 regression test from 11.0.7
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251120, PR3793: [8u] HotSpot build assumes ENABLE_JFR is
      set to either true or false
    + JDK-8251341: Minimal Java specification change
    + JDK-8251478: Backport TLSv1.3 regression tests to JDK8u
  * Import of OpenJDK 8 u272 build 07
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
  * Import of OpenJDK 8 u272 build 08
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8252573: 8u: Windows build failed after 8222079 backport
  * Import of OpenJDK 8 u272 build 09
    + JDK-8252886: [TESTBUG] sun/security/ec/TestEC.java :
      Compilation failed
  * Import of OpenJDK 8 u272 build 10
    + JDK-8254673: Call to JvmtiExport::post_vm_start() was removed
      by the fix for JDK-8249158
    + JDK-8254937: Revert JDK-8148854 for 8u272
  * Backports
    + JDK-8038723, PR3806: Openup some PrinterJob tests
    + JDK-8041480, PR3806: ArrayIndexOutOfBoundsException when
      JTable contains certain string
    + JDK-8058779, PR3805: Faster implementation of
      String.replace(CharSequence, CharSequence)
    + JDK-8130125, PR3806: [TEST_BUG] add @modules to the several
      client tests unaffected by the automated bulk update
    + JDK-8144015, PR3806: [PIT] failures of text layout font tests
    + JDK-8144023, PR3806: [PIT] failure of text measurements in
      javax/swing/text/html/parser/Parser/6836089/bug6836089.java
    + JDK-8144240, PR3806: [macosx][PIT] AIOOB in
      closed/javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8145542, PR3806: The case failed automatically and thrown
      java.lang.ArrayIndexOutOfBoundsException exception
    + JDK-8151725, PR3806: [macosx] ArrayIndexOOB exception when
      displaying Devanagari text in JEditorPane
    + JDK-8152358, PR3800: code and comment cleanups found during
      the hunt for 8077392
    + JDK-8152545, PR3804: Use preprocessor instead of compiling a
      program to generate native nio constants
    + JDK-8152680, PR3806: Regression in
      GlyphVector.getGlyphCharIndex behaviour
    + JDK-8158924, PR3806: Incorrect i18n text document layout
    + JDK-8166003, PR3806: [PIT][TEST_BUG] missing helper for
      javax/swing/text/GlyphPainter2/6427244/bug6427244.java
    + JDK-8166068, PR3806: test/java/awt/font/GlyphVector/
      /GetGlyphCharIndexTest.java does not compile
    + JDK-8169879, PR3806: [TEST_BUG] javax/swing/text/
      /GlyphPainter2/6427244/bug6427244.java - compilation failed
    + JDK-8191512, PR3806: T2K font rasterizer code removal
    + JDK-8191522, PR3806: Remove Bigelow&amp;Holmes Lucida fonts from
      JDK sources
    + JDK-8236512, PR3801: PKCS11 Connection closed after
      Cipher.doFinal and NoPadding
    + JDK-8254177, PR3809: (tz) Upgrade time-zone data to
      tzdata2020b
  * Bug fixes
    + PR3798: Fix format-overflow error on GCC 10, caused by
      passing NULL to a '%s' directive
    + PR3795: ECDSAUtils for XML digital signatures should support
      the same curve set as the rest of the JDK
    + PR3799: Adapt elliptic curve patches to JDK-8245468: Add
      TLSv1.3 implementation classes from 11.0.7
    + PR3808: IcedTea does not install the JFR *.jfc files
    + PR3810: Enable JFR on x86 (32-bit) now that JDK-8252096 has
      fixed its use with Shenandoah
    + PR3811: Don't attempt to install JFR files when JFR is
      disabled
  * Shenandoah
    + [backport] 8221435: Shenandoah should not mark through weak
      roots
    + [backport] 8221629: Shenandoah: Cleanup class unloading logic
    + [backport] 8222992: Shenandoah: Pre-evacuate all roots
    + [backport] 8223215: Shenandoah: Support verifying subset of
      roots
    + [backport] 8223774: Shenandoah: Refactor
      ShenandoahRootProcessor and family
    + [backport] 8224210: Shenandoah: Refactor
      ShenandoahRootScanner to support scanning CSet codecache roots
    + [backport] 8224508: Shenandoah: Need to update thread roots
      in final mark for piggyback ref update cycle
    + [backport] 8224579: ResourceMark not declared in
      shenandoahRootProcessor.inline.hpp with
      --disable-precompiled-headers
    + [backport] 8224679: Shenandoah: Make
      ShenandoahParallelCodeCacheIterator noncopyable
    + [backport] 8224751: Shenandoah: Shenandoah Verifier should
      select proper roots according to current GC cycle
    + [backport] 8225014: Separate ShenandoahRootScanner method for
      object_iterate
    + [backport] 8225216: gc/logging/TestMetaSpaceLog.java doesn't
      work for Shenandoah
    + [backport] 8225573: Shenandoah: Enhance ShenandoahVerifier to
      ensure roots to-space invariant
    + [backport] 8225590: Shenandoah: Refactor
      ShenandoahClassLoaderDataRoots API
    + [backport] 8226413: Shenandoah: Separate root scanner for
      SH::object_iterate()
    + [backport] 8230853: Shenandoah: replace leftover
      assert(is_in(...)) with rich asserts
    + [backport] 8231198: Shenandoah: heap walking should visit all
      roots most of the time
    + [backport] 8231244: Shenandoah: all-roots heap walking misses
      some weak roots
    + [backport] 8237632: Shenandoah: accept NULL fwdptr to
      cooperate with JVMTI and JFR
    + [backport] 8239786: Shenandoah: print per-cycle statistics
    + [backport] 8239926: Shenandoah: Shenandoah needs to mark
      nmethod's metadata
    + [backport] 8240671: Shenandoah: refactor
      ShenandoahPhaseTimings
    + [backport] 8240749: Shenandoah: refactor ShenandoahUtils
    + [backport] 8240750: Shenandoah: remove leftover files and
      mentions of ShenandoahAllocTracker
    + [backport] 8240868: Shenandoah: remove CM-with-UR
      piggybacking cycles
    + [backport] 8240872: Shenandoah: Avoid updating new regions
      from start of evacuation
    + [backport] 8240873: Shenandoah: Short-cut arraycopy barriers
    + [backport] 8240915: Shenandoah: Remove unused fields in init
      mark tasks
    + [backport] 8240948: Shenandoah: cleanup not-forwarded-objects
      paths after JDK-8240868
    + [backport] 8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + [backport] 8241062: Shenandoah: rich asserts trigger 'empty
      statement' inspection
    + [backport] 8241081: Shenandoah: Do not modify
      update-watermark concurrently
    + [backport] 8241093: Shenandoah: editorial changes in flag
      descriptions
    + [backport] 8241139: Shenandoah: distribute mark-compact work
      exactly to minimize fragmentation
    + [backport] 8241142: Shenandoah: should not use parallel
      reference processing with single GC thread
    + [backport] 8241351: Shenandoah: fragmentation metrics overhaul
    + [backport] 8241435: Shenandoah: avoid disabling pacing with
      'aggressive'
    + [backport] 8241520: Shenandoah: simplify region sequence
      numbers handling
    + [backport] 8241534: Shenandoah: region status should include
      update watermark
    + [backport] 8241574: Shenandoah: remove
      ShenandoahAssertToSpaceClosure
    + [backport] 8241583: Shenandoah: turn heap lock asserts into
      macros
    + [backport] 8241668: Shenandoah: make ShenandoahHeapRegion not
      derive from ContiguousSpace
    + [backport] 8241673: Shenandoah: refactor anti-false-sharing
      padding
    + [backport] 8241675: Shenandoah: assert(n-&gt;outcnt() &gt; 0) at
      shenandoahSupport.cpp:2858 with
      java/util/Collections/FindSubList.java
    + [backport] 8241692: Shenandoah: remove
      ShenandoahHeapRegion::_reserved
    + [backport] 8241700: Shenandoah: Fold
      ShenandoahKeepAliveBarrier flag into ShenandoahSATBBarrier
    + [backport] 8241740: Shenandoah: remove
      ShenandoahHeapRegion::_heap
    + [backport] 8241743: Shenandoah: refactor and inline
      ShenandoahHeap::heap()
    + [backport] 8241748: Shenandoah: inline MarkingContext TAMS
      methods
    + [backport] 8241838: Shenandoah: no need to trash cset during
      final mark
    + [backport] 8241841: Shenandoah: ditch one of allocation type
      counters in ShenandoahHeapRegion
    + [backport] 8241842: Shenandoah: inline
      ShenandoahHeapRegion::region_number
    + [backport] 8241844: Shenandoah: rename
      ShenandoahHeapRegion::region_number
    + [backport] 8241845: Shenandoah: align ShenandoahHeapRegions
      to cache lines
    + [backport] 8241926: Shenandoah: only print heap changes for
      operations that directly affect it
    + [backport] 8241983: Shenandoah: simplify FreeSet logging
    + [backport] 8241985: Shenandoah: simplify collectable garbage
      logging
    + [backport] 8242040: Shenandoah: print allocation failure type
    + [backport] 8242041: Shenandoah: adaptive heuristics should
      account evac reserve in free target
    + [backport] 8242042: Shenandoah: tune down
      ShenandoahGarbageThreshold
    + [backport] 8242054: Shenandoah: New incremental-update mode
    + [backport] 8242075: Shenandoah: rename
      ShenandoahHeapRegionSize flag
    + [backport] 8242082: Shenandoah: Purge Traversal mode
    + [backport] 8242083: Shenandoah: split 'Prepare Evacuation'
      tracking into cset/freeset counters
    + [backport] 8242089: Shenandoah: per-worker stats should be
      summed up, not averaged
    + [backport] 8242101: Shenandoah: coalesce and parallelise heap
      region walks during the pauses
    + [backport] 8242114: Shenandoah: remove
      ShenandoahHeapRegion::reset_alloc_metadata_to_shared
    + [backport] 8242130: Shenandoah: Simplify arraycopy-barrier
      dispatching
    + [backport] 8242211: Shenandoah: remove
      ShenandoahHeuristics::RegionData::_seqnum_last_alloc
    + [backport] 8242212: Shenandoah: initialize
      ShenandoahHeuristics::_region_data eagerly
    + [backport] 8242213: Shenandoah: remove
      ShenandoahHeuristics::_bytes_in_cset
    + [backport] 8242217: Shenandoah: Enable GC mode to be
      diagnostic/experimental and have a name
    + [backport] 8242227: Shenandoah: transit regions to cset state
      when adding to collection set
    + [backport] 8242228: Shenandoah: remove unused
      ShenandoahCollectionSet methods
    + [backport] 8242229: Shenandoah: inline ShenandoahHeapRegion
      liveness-related methods
    + [backport] 8242267: Shenandoah: regions space needs to be
      aligned by os::vm_allocation_granularity()
    + [backport] 8242271: Shenandoah: add test to verify GC mode
      unlock
    + [backport] 8242273: Shenandoah: accept either SATB or IU
      barriers, but not both
    + [backport] 8242301: Shenandoah: Inline LRB runtime call
    + [backport] 8242316: Shenandoah: Turn NULL-check into assert
      in SATB slow-path entry
    + [backport] 8242353: Shenandoah: micro-optimize region
      liveness handling
    + [backport] 8242365: Shenandoah: use uint16_t instead of
      jushort for liveness cache
    + [backport] 8242375: Shenandoah: Remove
      ShenandoahHeuristic::record_gc_start/end methods
    + [backport] 8242641: Shenandoah: clear live data and update
      TAMS optimistically
    + [backport] 8243238: Shenandoah: explicit GC request should
      wait for a complete GC cycle
    + [backport] 8243301: Shenandoah: ditch
      ShenandoahAllowMixedAllocs
    + [backport] 8243307: Shenandoah: remove
      ShCollectionSet::live_data
    + [backport] 8243395: Shenandoah: demote guarantee in
      ShenandoahPhaseTimings::record_workers_end
    + [backport] 8243463: Shenandoah: ditch total_pause counters
    + [backport] 8243464: Shenandoah: print statistic counters in
      time order
    + [backport] 8243465: Shenandoah: ditch unused pause_other,
      conc_other counters
    + [backport] 8243487: Shenandoah: make _num_phases illegal
      phase type
    + [backport] 8243494: Shenandoah: set counters once per cycle
    + [backport] 8243573: Shenandoah: rename GCParPhases and
      related code
    + [backport] 8243848: Shenandoah: Windows build fails after
      JDK-8239786
    + [backport] 8244180: Shenandoah: carry Phase to
      ShWorkerTimingsTracker explicitly
    + [backport] 8244200: Shenandoah: build breakages after
      JDK-8241743
    + [backport] 8244226: Shenandoah: per-cycle statistics contain
      worker data from previous cycles
    + [backport] 8244326: Shenandoah: global statistics should not
      accept bogus samples
    + [backport] 8244509: Shenandoah: refactor
      ShenandoahBarrierC2Support::test_* methods
    + [backport] 8244551: Shenandoah: Fix racy update of
      update_watermark
    + [backport] 8244667: Shenandoah: SBC2Support::test_gc_state
      takes loop for wrong control
    + [backport] 8244730: Shenandoah: gc/shenandoah/options/
      /TestHeuristicsUnlock.java should only verify the heuristics
    + [backport] 8244732: Shenandoah: move heuristics code to
      gc/shenandoah/heuristics
    + [backport] 8244737: Shenandoah: move mode code to
      gc/shenandoah/mode
    + [backport] 8244739: Shenandoah: break superclass dependency
      on ShenandoahNormalMode
    + [backport] 8244740: Shenandoah: rename ShenandoahNormalMode
      to ShenandoahSATBMode
    + [backport] 8245461: Shenandoah: refine mode name()-s
    + [backport] 8245463: Shenandoah: refine ShenandoahPhaseTimings
      constructor arguments
    + [backport] 8245464: Shenandoah: allocate collection set
      bitmap at lower addresses
    + [backport] 8245465: Shenandoah: test_in_cset can use more
      efficient encoding
    + [backport] 8245726: Shenandoah: lift/cleanup
      ShenandoahHeuristics names and properties
    + [backport] 8245754: Shenandoah: ditch ShenandoahAlwaysPreTouch
    + [backport] 8245757: Shenandoah: AlwaysPreTouch should not
      disable heap resizing or uncommits
    + [backport] 8245773: Shenandoah: Windows assertion failure
      after JDK-8245464
    + [backport] 8245812: Shenandoah: compute root phase parallelism
    + [backport] 8245814: Shenandoah: reconsider format specifiers
      for stats
    + [backport] 8245825: Shenandoah: Remove diagnostic flag
      ShenandoahConcurrentScanCodeRoots
    + [backport] 8246162: Shenandoah: full GC does not mark code
      roots when class unloading is off
    + [backport] 8247310: Shenandoah: pacer should not affect
      interrupt status
    + [backport] 8247358: Shenandoah: reconsider free budget slice
      for marking
    + [backport] 8247367: Shenandoah: pacer should wait on lock
      instead of exponential backoff
    + [backport] 8247474: Shenandoah: Windows build warning after
      JDK-8247310
    + [backport] 8247560: Shenandoah: heap iteration holds root
      locks all the time
    + [backport] 8247593: Shenandoah: should not block pacing
      reporters
    + [backport] 8247751: Shenandoah: options tests should run with
      smaller heaps
    + [backport] 8247754: Shenandoah: mxbeans tests can be shorter
    + [backport] 8247757: Shenandoah: split heavy tests by
      heuristics to improve parallelism
    + [backport] 8247860: Shenandoah: add update watermark line in
      rich assert failure message
    + [backport] 8248041: Shenandoah: pre-Full GC root updates may
      miss some roots
    + [backport] 8248652: Shenandoah: SATB buffer handling may
      assume no forwarded objects
    + [backport] 8249560: Shenandoah: Fix racy GC request handling
    + [backport] 8249649: Shenandoah: provide per-cycle pacing stats
    + [backport] 8249801: Shenandoah: Clear soft-refs on requested
      GC cycle
    + [backport] 8249953: Shenandoah: gc/shenandoah/mxbeans tests
      should account for corner cases
    + Fix slowdebug build after JDK-8230853 backport
    + JDK-8252096: Shenandoah: adjust SerialPageShiftCount for
      x86_32 and JFR
    + JDK-8252366: Shenandoah: revert/cleanup changes in
      graphKit.cpp
    + Shenandoah: add JFR roots to root processor after JFR
      integration
    + Shenandoah: add root statistics for string dedup table/queues
    + Shenandoah: enable low-frequency STW class unloading
    + Shenandoah: fix build failures after JDK-8244737 backport
    + Shenandoah: Fix build failure with +JFR -PCH
    + Shenandoah: fix forceful pacer claim
    + Shenandoah: fix formats in
      ShenandoahStringSymbolTableUnlinkTask
    + Shenandoah: fix runtime linking failure due to non-compiled
      shenandoahBarrierSetC1
    + Shenandoah: hook statistics printing to PrintGCDetails, not
      PrintGC
    + Shenandoah: JNI weak roots are always cleared before Full GC
      mark
    + Shenandoah: missing SystemDictionary roots in
      ShenandoahHeapIterationRootScanner
    + Shenandoah: move barrier sets to their proper locations
    + Shenandoah: move parallelCleaning.* to shenandoah/
    + Shenandoah: pacer should use proper Atomics for intptr_t
    + Shenandoah: properly deallocates class loader metadata
    + Shenandoah: specialize String Table scans for better pause
      performance
    + Shenandoah: Zero build fails after recent Atomic cleanup in
      Pacer
  * AArch64 port
    + JDK-8161072, PR3797: AArch64: jtreg
      compiler/uncommontrap/TestDeoptOOM failure
    + JDK-8171537, PR3797: aarch64: compiler/c1/Test6849574.java
      generates guarantee failure in C1
    + JDK-8183925, PR3797: [AArch64] Decouple crash protection from
      watcher thread
    + JDK-8199712, PR3797: [AArch64] Flight Recorder
    + JDK-8203481, PR3797: Incorrect constraint for unextended_sp
      in frame:safe_for_sender
    + JDK-8203699, PR3797: java/lang/invoke/SpecialInterfaceCall
      fails with SIGILL on aarch64
    + JDK-8209413, PR3797: AArch64: NPE in clhsdb jstack command
    + JDK-8215961, PR3797: jdk/jfr/event/os/TestCPUInformation.java
      fails on AArch64
    + JDK-8216989, PR3797:
      CardTableBarrierSetAssembler::gen_write_ref_array_post_barrier()
      does not check for zero length on AARCH64
    + JDK-8217368, PR3797: AArch64: C2 recursive stack locking
      optimisation not triggered
    + JDK-8221658, PR3797: aarch64: add necessary predicate for
      ubfx patterns
    + JDK-8237512, PR3797: AArch64: aarch64TestHook leaks a
      BufferBlob
    + JDK-8246482, PR3797: Build failures with +JFR -PCH
    + JDK-8247979, PR3797: aarch64: missing side effect of killing
      flags for clearArray_reg_reg
    + JDK-8248219, PR3797: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14578/">CVE-2020-14578</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14579/">CVE-2020-14579</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497089" comment="java-1_8_0-openjdk-1.8.0.272-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497090" comment="java-1_8_0-openjdk-demo-1.8.0.272-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497091" comment="java-1_8_0-openjdk-devel-1.8.0.272-3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497092" comment="java-1_8_0-openjdk-headless-1.8.0.272-3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110618" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179441" ref_url="https://bugzilla.suse.com/1179441" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:3591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007906.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u275 (icedtea 3.17.1)
  * JDK-8214440, bsc#1179441: Fix StartTLS functionality that was broken in openjdk272. (bsc#1179441)
  * JDK-8223940: Private key not supported by chosen signature algorithm
  * JDK-8236512: PKCS11 Connection closed after Cipher.doFinal and NoPadding
  * JDK-8250861: Crash in MinINode::Ideal(PhaseGVN*, bool)
  * PR3815: Fix new s390 size_t issue in g1ConcurrentMarkObjArrayProcessor.cpp
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179441">SUSE bug 1179441</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497094" comment="java-1_8_0-openjdk-1.8.0.275-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497095" comment="java-1_8_0-openjdk-demo-1.8.0.275-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497096" comment="java-1_8_0-openjdk-devel-1.8.0.275-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497097" comment="java-1_8_0-openjdk-headless-1.8.0.275-3.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110619" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497116" comment="reiserfs-kmp-default-5.3.18-24.43.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110620" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1155346" ref_url="https://bugzilla.suse.com/1155346" source="BUGZILLA"/>
		<reference ref_id="1176029" ref_url="https://bugzilla.suse.com/1176029" source="BUGZILLA"/>
		<reference ref_id="1177479" ref_url="https://bugzilla.suse.com/1177479" source="BUGZILLA"/>
		<reference ref_id="1177575" ref_url="https://bugzilla.suse.com/1177575" source="BUGZILLA"/>
		<reference ref_id="1177673" ref_url="https://bugzilla.suse.com/1177673" source="BUGZILLA"/>
		<reference ref_id="1177793" ref_url="https://bugzilla.suse.com/1177793" source="BUGZILLA"/>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007974.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2020-1971: Fixed a null pointer dereference in EDIPARTYNAME (bsc#1179491).
- Initialized dh-&gt;nid to NID_undef in DH_new_method() (bsc#1177673).
- Fixed a test failure in apache_ssl in fips mode (bsc#1177793).
- Renamed BN_get_rfc3526_prime_* functions back to get_rfc3526_prime_* (bsc#1177575).
- Restored private key check in EC_KEY_check_key (bsc#1177479).
- Added shared secret KAT to FIPS DH selftest (bsc#1176029).
- Included ECDH/DH Requirements from SP800-56Arev3 (bsc#1176029).
- Used SHA-2 in the RSA pairwise consistency check (bsc#1155346)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1155346">SUSE bug 1155346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176029">SUSE bug 1176029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177479">SUSE bug 1177479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177575">SUSE bug 1177575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177673">SUSE bug 1177673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177793">SUSE bug 1177793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497099" comment="libopenssl-1_0_0-devel-1.0.2p-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497100" comment="libopenssl1_0_0-1.0.2p-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497101" comment="openssl-1_0_0-1.0.2p-3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110621" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="1180063" ref_url="https://bugzilla.suse.com/1180063" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008117.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 20 [bsc#1180063,bsc#1177943]
  CVE-2020-14792 CVE-2020-14797 CVE-2020-14781 CVE-2020-14779
  CVE-2020-14798 CVE-2020-14796 CVE-2020-14803
  * Class libraries:
    - SOCKETADAPTOR$SOCKETINPUTSTREAM.READ is blocking for more time
      that the set timeout
    - Z/OS specific C function send_file is changing the file pointer
      position
  * Java Virtual Machine:
    - Crash on iterate java stack
    - Java process hang on SIGTERM
  * JIT Compiler:
    - JMS performance regression from JDK8 SR5 FP40 TO FP41

  * Class Libraries:
    - z15 high utilization following Z/VM and Linux migration from
      z14 To z15
  * Java Virtual Machine:
    - Assertion failed when trying to write a class file
    - Assertion failure at modronapi.cpp
    - Improve the performance of defining and finding classes
  * JIT Compiler:
    - An assert in ppcbinaryencoding.cpp may trigger when running
      with traps disabled on power
    - AOT field offset off by n bytes
    - Segmentation fault in jit module on ibm z platform		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-23"/>
	<updated date="2020-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180063">SUSE bug 1180063</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497102" comment="java-1_8_0-ibm-1.8.0_sr6.20-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497103" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.20-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497104" comment="java-1_8_0-ibm-devel-1.8.0_sr6.20-3.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497105" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.20-3.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110622" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497117" comment="reiserfs-kmp-default-5.3.18-24.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110623" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497118" comment="reiserfs-kmp-default-5.3.18-24.61.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110624" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178909" ref_url="https://bugzilla.suse.com/1178909" source="BUGZILLA"/>
		<reference ref_id="1179503" ref_url="https://bugzilla.suse.com/1179503" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25709" ref_url="https://www.suse.com/security/cve/CVE-2020-25709/" source="CVE"/>
		<reference ref_id="CVE-2020-25710" ref_url="https://www.suse.com/security/cve/CVE-2020-25710/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0129-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008206.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

Security issues fixed:

- CVE-2020-25709: Fixed a crash caused by specially crafted network traffic (bsc#1178909).
- CVE-2020-25710: Fixed a crash caused by specially crafted network traffic (bsc#1178909).

Non-security issue fixed:

- Retry binds in the LDAP backend when the remote LDAP server disconnected the (idle) LDAP connection. (bsc#1179503)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178909">SUSE bug 1178909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179503">SUSE bug 1179503</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25709/">CVE-2020-25709</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25710/">CVE-2020-25710</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497119" comment="openldap2-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497120" comment="openldap2-back-meta-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497121" comment="openldap2-back-perl-2.4.46-9.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497122" comment="openldap2-ppolicy-check-password-1.2-9.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110625" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497123" comment="reiserfs-kmp-default-5.3.18-24.64.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110626" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497124" comment="reiserfs-kmp-default-5.3.18-24.67.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110627" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1989-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009025.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u292 (icedtea 3.19.0).
- CVE-2021-2161: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497125" comment="java-1_8_0-openjdk-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497126" comment="java-1_8_0-openjdk-demo-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497127" comment="java-1_8_0-openjdk-devel-1.8.0.292-3.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497128" comment="java-1_8_0-openjdk-headless-1.8.0.292-3.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110628" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624279" comment="reiserfs-kmp-default-5.3.18-24.70.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110629" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625990" comment="reiserfs-kmp-default-5.3.18-24.75.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110630" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627878" comment="reiserfs-kmp-default-5.3.18-24.78.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110631" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009324.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u302 (icedtea 3.20.0)
- CVE-2021-2341: Improve file transfers. (bsc#1188564)
- CVE-2021-2369: Better jar file validation. (bsc#1188565)
- CVE-2021-2388: Enhance compiler validation. (bsc#1188566)
- CVE-2021-2161: Less ambiguous processing. (bsc#1185056)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627144" comment="java-1_8_0-openjdk-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627145" comment="java-1_8_0-openjdk-demo-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627146" comment="java-1_8_0-openjdk-devel-1.8.0.302-3.55.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627147" comment="java-1_8_0-openjdk-headless-1.8.0.302-3.55.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110632" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009344.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2021-3712: a bug in the code for printing certificate details could lead
  to a buffer overrun that a malicious actor could exploit to crash the
  application, causing a denial-of-service attack. [bsc#1189521]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-24"/>
	<updated date="2021-08-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631628" comment="libopenssl-1_0_0-devel-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631629" comment="libopenssl1_0_0-1.0.2p-3.40.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631630" comment="openssl-1_0_0-1.0.2p-3.40.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110633" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189521" ref_url="https://bugzilla.suse.com/1189521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3712" ref_url="https://www.suse.com/security/cve/CVE-2021-3712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009429.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2021-3712: This is an update for the incomplete fix for CVE-2021-3712. 
  Read buffer overruns processing ASN.1 strings (bsc#1189521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-09"/>
	<updated date="2021-09-09"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1189521">SUSE bug 1189521</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3712/">CVE-2021-3712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632344" comment="libopenssl-1_0_0-devel-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632345" comment="libopenssl1_0_0-1.0.2p-3.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632346" comment="openssl-1_0_0-1.0.2p-3.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110634" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633303" comment="reiserfs-kmp-default-5.3.18-24.83.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110635" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652131" comment="reiserfs-kmp-default-5.3.18-24.86.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110636" version="1" class="patch">
	<metadata>
		<title>Security update for ncurses (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190793" ref_url="https://bugzilla.suse.com/1190793" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39537" ref_url="https://www.suse.com/security/cve/CVE-2021-39537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009630.html" source="SUSE-SU"/>
		<description>
This update for ncurses fixes the following issues:

- CVE-2021-39537: Fixed an heap-based buffer overflow in _nc_captoinfo. (bsc#1190793)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190793">SUSE bug 1190793</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39537/">CVE-2021-39537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652201" comment="libncurses5-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652202" comment="libncurses5-32bit-6.1-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652203" comment="ncurses5-devel-6.1-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110637" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497129" comment="reiserfs-kmp-default-5.3.18-24.49.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110638" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655891" comment="reiserfs-kmp-default-5.3.18-24.93.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110639" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009768.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version OpenJDK 8u312 (October 2021 CPU):
  
- CVE-2021-35550: Fixed weak ciphers preferred over stronger ones for TLS (bsc#1191901).
- CVE-2021-35556: Fixed excessive memory allocation in RTFParser (bsc#1191910).
- CVE-2021-35559: Fixed excessive memory allocation in RTFReader (bsc#1191911).
- CVE-2021-35561: Fixed excessive memory allocation in HashMap and HashSet (bsc#1191912).
- CVE-2021-35564: Fixed certificates with end dates too far in the future can corrupt keystore (bsc#1191913).
- CVE-2021-35565: Fixed loop in HttpsServer triggered during TLS session close (bsc#1191909).
- CVE-2021-35567: Fixed incorrect principal selection when using Kerberos Constrained Delegation (bsc#1191903).
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake (bsc#1191904).
- CVE-2021-35586: Fixed excessive memory allocation in BMPImageReader (bsc#1191914).
- CVE-2021-35588: Fixed incomplete validation of inner class references in ClassFileParser (bsc#1191905)
- CVE-2021-35603: Fixed non-constant comparison during TLS handshakes (bsc#1191906).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656976" comment="java-1_8_0-openjdk-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656977" comment="java-1_8_0-openjdk-demo-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656978" comment="java-1_8_0-openjdk-devel-1.8.0.312-3.58.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656979" comment="java-1_8_0-openjdk-headless-1.8.0.312-3.58.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110640" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657490" comment="reiserfs-kmp-default-5.3.18-24.96.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110641" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008405.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

- Update to version jdk8u282 (icedtea 3.18.0)
  * January 2021 CPU (bsc#1181239)
  * Security fixes
    + JDK-8247619: Improve Direct Buffering of Characters (CVE-2020-14803)
  * Import of OpenJDK 8 u282 build 01
    + JDK-6962725: Regtest javax/swing/JFileChooser/6738668/
      /bug6738668.java fails under Linux
    + JDK-8025936: Windows .pdb and .map files does not have proper
      dependencies setup
    + JDK-8030350: Enable additional compiler warnings for GCC
    + JDK-8031423: Test java/awt/dnd/DisposeFrameOnDragCrash/
      /DisposeFrameOnDragTest.java fails by Timeout on Windows
    + JDK-8036122: Fix warning 'format not a string literal'
    + JDK-8051853: new
      URI('x/').resolve('..').getSchemeSpecificPart() returns null!
    + JDK-8132664: closed/javax/swing/DataTransfer/DefaultNoDrop/
      /DefaultNoDrop.java locks on Windows
    + JDK-8134632: Mark javax/sound/midi/Devices/
      /InitializationHang.java as headful
    + JDK-8148854: Class names 'SomeClass' and 'LSomeClass;'
      treated by JVM as an equivalent
    + JDK-8148916: Mark bug6400879.java as intermittently failing
    + JDK-8148983: Fix extra comma in changes for JDK-8148916
    + JDK-8160438: javax/swing/plaf/nimbus/8057791/bug8057791.java
      fails
    + JDK-8165808: Add release barriers when allocating objects
      with concurrent collection
    + JDK-8185003: JMX: Add a version of
      ThreadMXBean.dumpAllThreads with a maxDepth argument
    + JDK-8202076: test/jdk/java/io/File/WinSpecialFiles.java on
      windows with VS2017
    + JDK-8207766: [testbug] Adapt tests for Aix.
    + JDK-8212070: Introduce diagnostic flag to abort VM on failed
      JIT compilation
    + JDK-8213448: [TESTBUG] enhance jfr/jvm/TestDumpOnCrash
    + JDK-8215727: Restore JFR thread sampler loop to old /
      previous behavior
    + JDK-8220657: JFR.dump does not work when filename is set
    + JDK-8221342: [TESTBUG] Generate Dockerfile for docker testing
    + JDK-8224502: [TESTBUG] JDK docker test TestSystemMetrics.java
      fails with access issues and OOM
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232114: JVM crashed at imjpapi.dll in native code
    + JDK-8234270: [REDO] JDK-8204128 NMT might report incorrect
      numbers for Compiler area
    + JDK-8234339: replace JLI_StrTok in java_md_solinux.c
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8242335: Additional Tests for RSASSA-PSS
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8245400: Upgrade to LittleCMS 2.11
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8249176: Update GlobalSignR6CA test certificates
    + JDK-8250665: Wrong translation for the month name of May in
      ar_JO,LB,SY
    + JDK-8250928: JFR: Improve hash algorithm for stack traces
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251840: Java_sun_awt_X11_XToolkit_getDefaultScreenData
      should not be in make/mapfiles/libawt_xawt/mapfile-vers
    + JDK-8252384: [TESTBUG] Some tests refer to COMPAT provider
      rather than JRE
    + JDK-8252395: [8u] --with-native-debug-symbols=external
      doesn't include debuginfo files for binaries
    + JDK-8252497: Incorrect numeric currency code for ROL
    + JDK-8252754: Hash code calculation of JfrStackTrace is
      inconsistent
    + JDK-8252904: VM crashes when JFR is used and JFR event class
      is transformed
    + JDK-8252975: [8u] JDK-8252395 breaks the build for
      --with-native-debug-symbols=internal
    + JDK-8253284: Zero OrderAccess barrier mappings are incorrect
    + JDK-8253550: [8u] JDK-8252395 breaks the build for make
      STRIP_POLICY=no_strip
    + JDK-8253752: test/sun/management/jmxremote/bootstrap/
      /RmiBootstrapTest.java fails randomly
    + JDK-8254081: java/security/cert/PolicyNode/
      /GetPolicyQualifiers.java fails due to an expired certificate
    + JDK-8254144: Non-x86 Zero builds fail with return-type
      warning in os_linux_zero.cpp
    + JDK-8254166: Zero: return-type warning in
       zeroInterpreter_zero.cpp
    + JDK-8254683: [TEST_BUG] jdk/test/sun/tools/jconsole/
      /WorkerDeadlockTest.java fails
    + JDK-8255003: Build failures on Solaris
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497130" comment="java-1_8_0-openjdk-1.8.0.282-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497131" comment="java-1_8_0-openjdk-demo-1.8.0.282-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497132" comment="java-1_8_0-openjdk-devel-1.8.0.282-3.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497133" comment="java-1_8_0-openjdk-headless-1.8.0.282-3.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110642" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="1182186" ref_url="https://bugzilla.suse.com/1182186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="CVE-2020-27221" ref_url="https://www.suse.com/security/cve/CVE-2020-27221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008406.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 6 Fix Pack 25
  [bsc#1182186, bsc#1181239, CVE-2020-27221, CVE-2020-14803]
  * CVE-2020-27221: Potential for a stack-based buffer overflow
    when the virtual machine or JNI natives are converting from
    UTF-8 characters to platform encoding.
  * CVE-2020-14803: Unauthenticated attacker with network access
    via multiple protocols allows to compromise Java SE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182186">SUSE bug 1182186</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27221/">CVE-2020-27221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497134" comment="java-1_8_0-ibm-1.8.0_sr6.25-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497135" comment="java-1_8_0-ibm-alsa-1.8.0_sr6.25-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497136" comment="java-1_8_0-ibm-devel-1.8.0_sr6.25-3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497137" comment="java-1_8_0-ibm-plugin-1.8.0_sr6.25-3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110643" version="1" class="patch">
	<metadata>
		<title>Security update for openldap2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182279" ref_url="https://bugzilla.suse.com/1182279" source="BUGZILLA"/>
		<reference ref_id="1182408" ref_url="https://bugzilla.suse.com/1182408" source="BUGZILLA"/>
		<reference ref_id="1182411" ref_url="https://bugzilla.suse.com/1182411" source="BUGZILLA"/>
		<reference ref_id="1182412" ref_url="https://bugzilla.suse.com/1182412" source="BUGZILLA"/>
		<reference ref_id="1182413" ref_url="https://bugzilla.suse.com/1182413" source="BUGZILLA"/>
		<reference ref_id="1182415" ref_url="https://bugzilla.suse.com/1182415" source="BUGZILLA"/>
		<reference ref_id="1182416" ref_url="https://bugzilla.suse.com/1182416" source="BUGZILLA"/>
		<reference ref_id="1182417" ref_url="https://bugzilla.suse.com/1182417" source="BUGZILLA"/>
		<reference ref_id="1182418" ref_url="https://bugzilla.suse.com/1182418" source="BUGZILLA"/>
		<reference ref_id="1182419" ref_url="https://bugzilla.suse.com/1182419" source="BUGZILLA"/>
		<reference ref_id="1182420" ref_url="https://bugzilla.suse.com/1182420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36221" ref_url="https://www.suse.com/security/cve/CVE-2020-36221/" source="CVE"/>
		<reference ref_id="CVE-2020-36222" ref_url="https://www.suse.com/security/cve/CVE-2020-36222/" source="CVE"/>
		<reference ref_id="CVE-2020-36223" ref_url="https://www.suse.com/security/cve/CVE-2020-36223/" source="CVE"/>
		<reference ref_id="CVE-2020-36224" ref_url="https://www.suse.com/security/cve/CVE-2020-36224/" source="CVE"/>
		<reference ref_id="CVE-2020-36225" ref_url="https://www.suse.com/security/cve/CVE-2020-36225/" source="CVE"/>
		<reference ref_id="CVE-2020-36226" ref_url="https://www.suse.com/security/cve/CVE-2020-36226/" source="CVE"/>
		<reference ref_id="CVE-2020-36227" ref_url="https://www.suse.com/security/cve/CVE-2020-36227/" source="CVE"/>
		<reference ref_id="CVE-2020-36228" ref_url="https://www.suse.com/security/cve/CVE-2020-36228/" source="CVE"/>
		<reference ref_id="CVE-2020-36229" ref_url="https://www.suse.com/security/cve/CVE-2020-36229/" source="CVE"/>
		<reference ref_id="CVE-2020-36230" ref_url="https://www.suse.com/security/cve/CVE-2020-36230/" source="CVE"/>
		<reference ref_id="CVE-2021-27212" ref_url="https://www.suse.com/security/cve/CVE-2021-27212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008438.html" source="SUSE-SU"/>
		<description>
This update for openldap2 fixes the following issues:

- bsc#1182408 CVE-2020-36230 - an assertion failure in slapd in the
  X.509 DN parsing in decode.c ber_next_element, resulting in denial
  of service.
- bsc#1182411 CVE-2020-36229 - ldap_X509dn2bv crash in the X.509 DN
  parsing in ad_keystring, resulting in denial of service.
- bsc#1182412 CVE-2020-36228 - integer underflow leading to crash
  in the Certificate List Exact Assertion processing, resulting in
  denial of service.
- bsc#1182413 CVE-2020-36227 - infinite loop in slapd with the
  cancel_extop Cancel operation, resulting in denial of service.
- bsc#1182416 CVE-2020-36225 - double free and slapd crash in the
  saslAuthzTo processing, resulting in denial of service.
- bsc#1182417 CVE-2020-36224 - invalid pointer free and slapd crash
  in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182415 CVE-2020-36226 - memch-&gt;bv_len miscalculation and slapd
  crash in the saslAuthzTo processing, resulting in denial of service.
- bsc#1182419 CVE-2020-36222 - assertion failure in slapd in the
  saslAuthzTo validation, resulting in denial of service.
- bsc#1182420 CVE-2020-36221 - slapd crashes in the Certificate Exact
  Assertion processing, resulting in denial of service (schema_init.c
  serialNumberAndIssuerCheck).
- bsc#1182418 CVE-2020-36223 - slapd crash in the Values Return Filter
  control handling, resulting in denial of service (double free and
  out-of-bounds read).
- bsc#1182279 CVE-2021-27212 - an assertion failure in slapd can occur
    in the issuerAndThisUpdateCheck function via a crafted packet,
    resulting in a denial of service (daemon exit) via a short timestamp.
    This is related to schema_init.c and checkTime.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-08"/>
	<updated date="2021-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182279">SUSE bug 1182279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182408">SUSE bug 1182408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182411">SUSE bug 1182411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182412">SUSE bug 1182412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182413">SUSE bug 1182413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182415">SUSE bug 1182415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182416">SUSE bug 1182416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182417">SUSE bug 1182417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182418">SUSE bug 1182418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182419">SUSE bug 1182419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182420">SUSE bug 1182420</bugzilla>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36221/">CVE-2020-36221</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36222/">CVE-2020-36222</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36223/">CVE-2020-36223</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36224/">CVE-2020-36224</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36225/">CVE-2020-36225</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36226/">CVE-2020-36226</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36227/">CVE-2020-36227</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36228/">CVE-2020-36228</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36229/">CVE-2020-36229</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36230/">CVE-2020-36230</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27212/">CVE-2021-27212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497138" comment="openldap2-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497139" comment="openldap2-back-meta-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497140" comment="openldap2-back-perl-2.4.46-9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497141" comment="openldap2-ppolicy-check-password-1.2-9.48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110644" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497142" comment="reiserfs-kmp-default-5.3.18-24.52.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110645" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Legacy 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182331" ref_url="https://bugzilla.suse.com/1182331" source="BUGZILLA"/>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="CVE-2021-23841" ref_url="https://www.suse.com/security/cve/CVE-2021-23841/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008473.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2021-23840: Fixed an Integer overflow in CipherUpdate (bsc#1182333)
- CVE-2021-23841: Fixed a Null pointer dereference in X509_issuer_and_serial_hash() (bsc#1182331)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-11"/>
	<updated date="2021-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182331">SUSE bug 1182331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-23841/">CVE-2021-23841</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-legacy:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285886" comment="SUSE Linux Enterprise Module for Legacy 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497143" comment="libopenssl-1_0_0-devel-1.0.2p-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497144" comment="libopenssl1_0_0-1.0.2p-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497145" comment="openssl-1_0_0-1.0.2p-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110646" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497648" comment="kernel-default-livepatch-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497649" comment="kernel-default-livepatch-devel-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497650" comment="kernel-livepatch-5_3_18-24_9-default-1-5.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110647" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497651" comment="kernel-default-livepatch-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497652" comment="kernel-default-livepatch-devel-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497653" comment="kernel-livepatch-5_3_18-24_12-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110648" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1174186" ref_url="https://bugzilla.suse.com/1174186" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007372.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
- CVE-2020-15780: Fixed a lockdown bypass via injection of malicious ACPI tables via configfs (bsc#1174186).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174186">SUSE bug 1174186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497654" comment="kernel-livepatch-5_3_18-22-default-2-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110649" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2537-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007371.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes one issue.

The following security issue was fixed:

- CVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-04"/>
	<updated date="2020-09-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497655" comment="kernel-livepatch-5_3_18-24_9-default-2-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110650" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497656" comment="kernel-default-livepatch-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497657" comment="kernel-default-livepatch-devel-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497658" comment="kernel-livepatch-5_3_18-24_15-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110651" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497659" comment="kernel-default-livepatch-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497660" comment="kernel-default-livepatch-devel-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497661" comment="kernel-livepatch-5_3_18-24_24-default-1-5.3.6 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110652" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497662" comment="kernel-default-livepatch-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497663" comment="kernel-default-livepatch-devel-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497664" comment="kernel-livepatch-5_3_18-24_29-default-1-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110653" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497665" comment="kernel-default-livepatch-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497666" comment="kernel-default-livepatch-devel-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497667" comment="kernel-livepatch-5_3_18-24_34-default-1-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110654" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007711.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes one issue.

The following security issue was fixed:

- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497668" comment="kernel-livepatch-5_3_18-24_24-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110655" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes one issue.

The following security issue was fixed:

- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497669" comment="kernel-livepatch-5_3_18-24_15-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110656" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007710.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497670" comment="kernel-livepatch-5_3_18-24_12-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110657" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497671" comment="kernel-livepatch-5_3_18-24_9-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110658" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1175992" ref_url="https://bugzilla.suse.com/1175992" source="BUGZILLA"/>
		<reference ref_id="1176072" ref_url="https://bugzilla.suse.com/1176072" source="BUGZILLA"/>
		<reference ref_id="1176382" ref_url="https://bugzilla.suse.com/1176382" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="CVE-2020-24394" ref_url="https://www.suse.com/security/cve/CVE-2020-24394/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007709.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c (bsc#1176381).
- CVE-2020-14386: Fixed a memory corruption which could have lead to an attacker gaining root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity (bsc#1176069).
- CVE-2020-24394: The NFS server code can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support. This occurs because the current umask is not considered (bsc#1175518).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-05"/>
	<updated date="2020-11-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175992">SUSE bug 1175992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176072">SUSE bug 1176072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176382">SUSE bug 1176382</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24394/">CVE-2020-24394</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497672" comment="kernel-livepatch-5_3_18-22-default-3-8.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110659" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497673" comment="kernel-default-livepatch-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497674" comment="kernel-default-livepatch-devel-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497675" comment="kernel-livepatch-5_3_18-24_37-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110660" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3402-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007803.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497676" comment="kernel-livepatch-5_3_18-24_24-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110661" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497677" comment="kernel-livepatch-5_3_18-24_15-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110662" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497678" comment="kernel-livepatch-5_3_18-24_12-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110663" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177727" ref_url="https://bugzilla.suse.com/1177727" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007798.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726, bsc#1177727).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497679" comment="kernel-livepatch-5_3_18-24_9-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110664" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177513" ref_url="https://bugzilla.suse.com/1177513" source="BUGZILLA"/>
		<reference ref_id="1177727" ref_url="https://bugzilla.suse.com/1177727" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724, bsc#1177729, bsc#1178397).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726, bsc#1177727).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177513">SUSE bug 1177513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497680" comment="kernel-livepatch-5_3_18-22-default-4-11.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110665" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007930.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497681" comment="kernel-livepatch-5_3_18-22-default-5-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110666" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497682" comment="kernel-livepatch-5_3_18-24_9-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110667" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497683" comment="kernel-livepatch-5_3_18-24_12-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110668" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497684" comment="kernel-livepatch-5_3_18-24_15-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110669" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497685" comment="kernel-livepatch-5_3_18-24_24-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110670" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497686" comment="kernel-livepatch-5_3_18-24_29-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110671" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178783" ref_url="https://bugzilla.suse.com/1178783" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
- CVE-2020-8694: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1178700).
- CVE-2020-25705: Fixed a flaw which could have allowed an off-path remote user to effectively bypass source port UDP randomization (bsc#1178783).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178783">SUSE bug 1178783</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497687" comment="kernel-livepatch-5_3_18-24_34-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110672" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3698-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007927.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes one issue.

The following security issue was fixed:

- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178622).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-07"/>
	<updated date="2020-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497688" comment="kernel-livepatch-5_3_18-24_37-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110673" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007962.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497689" comment="kernel-default-livepatch-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497690" comment="kernel-default-livepatch-devel-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497691" comment="kernel-livepatch-5_3_18-24_43-default-1-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110674" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179646" ref_url="https://bugzilla.suse.com/1179646" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3843-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008076.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes one issue.

The following security issue was fixed:

- CVE-2020-29369: Fixed a race condition between certain expand functions and page-table free operations from an munmap call, aka CID-246c320a8cfe (bsc#1179646).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-16"/>
	<updated date="2020-12-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179646">SUSE bug 1179646</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497692" comment="kernel-livepatch-5_3_18-22-default-6-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110675" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008591.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497693" comment="kernel-livepatch-5_3_18-24_12-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110676" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497694" comment="kernel-livepatch-5_3_18-24_37-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110677" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497695" comment="kernel-livepatch-5_3_18-24_52-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110678" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497696" comment="kernel-livepatch-5_3_18-24_15-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110679" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497697" comment="kernel-livepatch-5_3_18-24_24-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110680" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497698" comment="kernel-livepatch-5_3_18-24_29-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110681" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497699" comment="kernel-livepatch-5_3_18-24_34-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110682" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497700" comment="kernel-livepatch-5_3_18-24_43-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110683" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497701" comment="kernel-livepatch-5_3_18-24_46-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110684" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497702" comment="kernel-livepatch-5_3_18-24_49-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110685" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497703" comment="kernel-livepatch-5_3_18-22-default-9-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110686" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2021-27365: Fixed an issue where data structures did not have appropriate length constraints or checks, and could exceed the PAGE_SIZE value (bsc#1183491).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1183120).
- CVE-2021-27364: Fixed an issue where an unprivileged user could  craft Netlink messages (bsc#1182717).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-07"/>
	<updated date="2021-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497704" comment="kernel-livepatch-5_3_18-24_9-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110687" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497705" comment="kernel-default-livepatch-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497706" comment="kernel-default-livepatch-devel-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497707" comment="kernel-livepatch-5_3_18-24_46-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110688" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497708" comment="kernel-default-livepatch-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497709" comment="kernel-default-livepatch-devel-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497710" comment="kernel-livepatch-5_3_18-24_61-default-1-5.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110689" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008688.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497711" comment="kernel-livepatch-5_3_18-24_9-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110690" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497712" comment="kernel-livepatch-5_3_18-24_24-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110691" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497713" comment="kernel-livepatch-5_3_18-22-default-10-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110692" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497714" comment="kernel-livepatch-5_3_18-24_12-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110693" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497715" comment="kernel-livepatch-5_3_18-24_15-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110694" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497716" comment="kernel-livepatch-5_3_18-24_29-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110695" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497717" comment="kernel-livepatch-5_3_18-24_34-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110696" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497718" comment="kernel-livepatch-5_3_18-24_37-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110697" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497719" comment="kernel-livepatch-5_3_18-24_43-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110698" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497720" comment="kernel-livepatch-5_3_18-24_46-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110699" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1182294).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1183022).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497721" comment="kernel-livepatch-5_3_18-24_49-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110700" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182294" ref_url="https://bugzilla.suse.com/1182294" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008686.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184171).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183658).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc##1182294, bsc#1183646).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-28"/>
	<updated date="2021-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182294">SUSE bug 1182294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497722" comment="kernel-livepatch-5_3_18-24_52-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110701" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497723" comment="kernel-default-livepatch-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497724" comment="kernel-default-livepatch-devel-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497725" comment="kernel-livepatch-5_3_18-24_64-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110702" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008815.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497726" comment="kernel-livepatch-5_3_18-24_52-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110703" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497727" comment="kernel-livepatch-5_3_18-24_49-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110704" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497728" comment="kernel-livepatch-5_3_18-24_46-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110705" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497729" comment="kernel-livepatch-5_3_18-24_43-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110706" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497730" comment="kernel-livepatch-5_3_18-24_37-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110707" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497731" comment="kernel-livepatch-5_3_18-24_34-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110708" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497732" comment="kernel-livepatch-5_3_18-24_29-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110709" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497733" comment="kernel-livepatch-5_3_18-24_24-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110710" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497734" comment="kernel-livepatch-5_3_18-24_15-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110711" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497735" comment="kernel-livepatch-5_3_18-24_12-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110712" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497736" comment="kernel-livepatch-5_3_18-24_9-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110713" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-36322: Fixed an issue inside the FUSE filesystem implementation where fuse_do_getattr() calls make_bad_inode() in inappropriate situations, could have caused a system crash. NOTE: the original fix for this vulnerability was incomplete, and its incompleteness is tracked as CVE-2021-28950 (bsc#1184952).
- CVE-2021-29154: Fixed BPF JIT compilers that allowed to execute arbitrary code within the kernel context (bsc#1184710)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-25"/>
	<updated date="2021-05-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497737" comment="kernel-livepatch-5_3_18-22-default-11-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110714" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497738" comment="kernel-default-livepatch-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497739" comment="kernel-default-livepatch-devel-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497740" comment="kernel-livepatch-5_3_18-24_67-default-1-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110715" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009046.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following issues were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497741" comment="kernel-livepatch-5_3_18-24_64-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110716" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009043.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges (bnc#1186060).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497742" comment="kernel-livepatch-5_3_18-24_61-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110717" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009042.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497743" comment="kernel-livepatch-5_3_18-24_52-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110718" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497744" comment="kernel-livepatch-5_3_18-24_49-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110719" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497745" comment="kernel-livepatch-5_3_18-24_46-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110720" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497746" comment="kernel-livepatch-5_3_18-24_43-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110721" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497747" comment="kernel-livepatch-5_3_18-24_37-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110722" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497748" comment="kernel-livepatch-5_3_18-24_34-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110723" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497749" comment="kernel-livepatch-5_3_18-24_29-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110724" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497750" comment="kernel-livepatch-5_3_18-24_24-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110725" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497751" comment="kernel-livepatch-5_3_18-24_15-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110726" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497752" comment="kernel-livepatch-5_3_18-24_12-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110727" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497753" comment="kernel-livepatch-5_3_18-24_9-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110728" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following issues were fixed:

- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values (bsc#1186111).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- Fixed a data loss/data corruption that occurs if there is a write error on an md/raid array (bsc#1185680).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-18"/>
	<updated date="2021-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497754" comment="kernel-livepatch-5_3_18-22-default-12-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110729" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624280" comment="kernel-default-livepatch-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624281" comment="kernel-default-livepatch-devel-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624282" comment="kernel-livepatch-5_3_18-24_70-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110730" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009148.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624741" comment="kernel-livepatch-5_3_18-24_43-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110731" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624742" comment="kernel-livepatch-5_3_18-24_46-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110732" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624743" comment="kernel-livepatch-5_3_18-24_49-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110733" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2366-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009144.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes one issue.

The following security issue was fixed:

- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624744" comment="kernel-livepatch-5_3_18-24_52-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110734" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes one issue.

The following security issue was fixed:

- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624745" comment="kernel-livepatch-5_3_18-24_61-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110735" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009152.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625198" comment="kernel-livepatch-5_3_18-22-default-13-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110736" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009154.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes one issue.

The following security issue was fixed:

- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624746" comment="kernel-livepatch-5_3_18-24_64-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110737" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009153.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624740" comment="kernel-livepatch-5_3_18-24_37-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110738" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624737" comment="kernel-livepatch-5_3_18-24_24-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110739" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624736" comment="kernel-livepatch-5_3_18-24_15-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110740" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624735" comment="kernel-livepatch-5_3_18-24_12-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110741" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="1187687" ref_url="https://bugzilla.suse.com/1187687" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187687)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187687">SUSE bug 1187687</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624734" comment="kernel-livepatch-5_3_18-24_9-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110742" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624739" comment="kernel-livepatch-5_3_18-24_34-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110743" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1187597" ref_url="https://bugzilla.suse.com/1187597" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187597)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that can lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bsc#1185901)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-16"/>
	<updated date="2021-07-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187597">SUSE bug 1187597</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624738" comment="kernel-livepatch-5_3_18-24_29-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110744" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625991" comment="kernel-default-livepatch-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625992" comment="kernel-default-livepatch-devel-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625993" comment="kernel-livepatch-5_3_18-24_75-default-1-5.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110745" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009222.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626419" comment="kernel-livepatch-5_3_18-24_70-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110746" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009221.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626417" comment="kernel-livepatch-5_3_18-24_67-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110747" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626416" comment="kernel-livepatch-5_3_18-24_64-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110748" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626415" comment="kernel-livepatch-5_3_18-24_61-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110749" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626414" comment="kernel-livepatch-5_3_18-24_52-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110750" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626410" comment="kernel-livepatch-5_3_18-24_37-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110751" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626409" comment="kernel-livepatch-5_3_18-24_34-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110752" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626408" comment="kernel-livepatch-5_3_18-24_29-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110753" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626407" comment="kernel-livepatch-5_3_18-24_24-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110754" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626406" comment="kernel-livepatch-5_3_18-24_15-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110755" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626405" comment="kernel-livepatch-5_3_18-24_12-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110756" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626404" comment="kernel-livepatch-5_3_18-24_9-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110757" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626403" comment="kernel-livepatch-5_3_18-22-default-14-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110758" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009226.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-28"/>
	<updated date="2021-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626411" comment="kernel-livepatch-5_3_18-24_43-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110759" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-28"/>
	<updated date="2021-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626412" comment="kernel-livepatch-5_3_18-24_46-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110760" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-28"/>
	<updated date="2021-07-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626413" comment="kernel-livepatch-5_3_18-24_49-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110761" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1183120" ref_url="https://bugzilla.suse.com/1183120" source="BUGZILLA"/>
		<reference ref_id="1183491" ref_url="https://bugzilla.suse.com/1183491" source="BUGZILLA"/>
		<reference ref_id="1183658" ref_url="https://bugzilla.suse.com/1183658" source="BUGZILLA"/>
		<reference ref_id="1184171" ref_url="https://bugzilla.suse.com/1184171" source="BUGZILLA"/>
		<reference ref_id="1184710" ref_url="https://bugzilla.suse.com/1184710" source="BUGZILLA"/>
		<reference ref_id="1184952" ref_url="https://bugzilla.suse.com/1184952" source="BUGZILLA"/>
		<reference ref_id="1185847" ref_url="https://bugzilla.suse.com/1185847" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185901" ref_url="https://bugzilla.suse.com/1185901" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1187052" ref_url="https://bugzilla.suse.com/1187052" source="BUGZILLA"/>
		<reference ref_id="1188117" ref_url="https://bugzilla.suse.com/1188117" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-23133" ref_url="https://www.suse.com/security/cve/CVE-2021-23133/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009234.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges. (bsc#1188062)
- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2020-36385: Fixed a use-after-free vulnerability reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called. (bnc#1187050)
- CVE-2021-23133: Fixed a race condition in the SCTP sockets that could lead to kernel privilege escalation from the context of a network service or an unprivileged process. (bnc#1184675)
- CVE-2021-33034: Fixed a use-after-free vulnerability when destroying an hci_chan which leads to writing an arbitrary value. (bnc#1186111)
- CVE-2021-32399: Fixed a race condition in net/bluetooth/hci_request.c for removal of the HCI controller. (bsc#1184611)
- CVE-2020-36322: Fixed an issue in the FUSE filesystem implementation. This bug was addressed with a previous fix, which turned out was incomplete, and its incompleteness is tracked as CVE-2021-28950. (bsc#1184211)
- CVE-2021-29154: Fixed an incorrect computation of branch displacements in the BPF JIT compilers, which could allow to execute arbitrary code within the kernel context. (bsc#1184391)
- CVE-2021-3444: The bpf verifier did not properly handle mod32 destination register truncation when the source register was known to be 0. A local attacker with the ability to load bpf programs could use this gain out-of-bounds reads in kernel memory leading to information disclosure (kernel memory), and possibly out-of-bounds writes that could potentially lead to code execution. (bsc#1184170)
- CVE-2021-28660: Fixed an out-of-bounds write in rtw_wx_set_scan which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1183593)
- CVE-2021-27365: Fixed an issue in certain iSCSI data structures that do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. (bsc#1182715)
- CVE-2021-28688: Fixed some uninitialization pointers in Xen that could result in leaking persistent grants. The leak in turn would prevent fully cleaning up after a respective guest has died, leaving around zombie domains. (bsc#1183646)
- CVE-2021-27363: Fixed a kernel pointer leak that can be used to determine the address of the iscsi_transport structure. (bsc#1182716)
- CVE-2021-27364: Fixed an issue that provides an unprivileged user the ability of craft Netlink messages. (bsc#1182717)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-30"/>
	<updated date="2021-07-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183120">SUSE bug 1183120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183491">SUSE bug 1183491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183658">SUSE bug 1183658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184171">SUSE bug 1184171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184710">SUSE bug 1184710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184952">SUSE bug 1184952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185847">SUSE bug 1185847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185901">SUSE bug 1185901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187052">SUSE bug 1187052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188117">SUSE bug 1188117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23133/">CVE-2021-23133</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626418" comment="kernel-livepatch-5_3_18-24_53_4-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110762" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009296.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630688" comment="kernel-livepatch-5_3_18-24_75-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110763" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2746-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009298.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630687" comment="kernel-livepatch-5_3_18-24_70-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110764" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630686" comment="kernel-livepatch-5_3_18-24_53_4-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110765" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630685" comment="kernel-livepatch-5_3_18-24_67-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110766" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630684" comment="kernel-livepatch-5_3_18-24_64-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110767" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630683" comment="kernel-livepatch-5_3_18-24_61-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110768" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630682" comment="kernel-livepatch-5_3_18-24_52-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110769" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630681" comment="kernel-livepatch-5_3_18-24_49-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110770" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630680" comment="kernel-livepatch-5_3_18-24_46-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110771" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630679" comment="kernel-livepatch-5_3_18-24_43-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110772" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630678" comment="kernel-livepatch-5_3_18-24_37-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110773" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630677" comment="kernel-livepatch-5_3_18-24_34-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110774" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630676" comment="kernel-livepatch-5_3_18-24_29-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110775" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630675" comment="kernel-livepatch-5_3_18-24_24-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110776" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630674" comment="kernel-livepatch-5_3_18-24_15-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110777" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1188323" ref_url="https://bugzilla.suse.com/1188323" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2021-22543: Fixed an issue with KVM, related to the handling of VM_IO|VM_PFNMAP vmas, which allowed users with the ability to start and control a VM to read/write random pages of memory and could result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: On the powerpc platform KVM guest OS users could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-3609: Fixed a local privilege escalation via a race condition in net/can/bcm.c (bsc#1187215).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188323">SUSE bug 1188323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630673" comment="kernel-livepatch-5_3_18-24_12-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110778" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627880" comment="kernel-default-livepatch-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627881" comment="kernel-default-livepatch-devel-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627882" comment="kernel-livepatch-5_3_18-24_78-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110779" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009450.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632837" comment="kernel-livepatch-5_3_18-24_15-default-14-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110780" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632838" comment="kernel-livepatch-5_3_18-24_24-default-14-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110781" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632839" comment="kernel-livepatch-5_3_18-24_29-default-12-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110782" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632840" comment="kernel-livepatch-5_3_18-24_34-default-12-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110783" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632841" comment="kernel-livepatch-5_3_18-24_37-default-12-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110784" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632842" comment="kernel-livepatch-5_3_18-24_43-default-11-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110785" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632843" comment="kernel-livepatch-5_3_18-24_46-default-11-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110786" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632844" comment="kernel-livepatch-5_3_18-24_49-default-10-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110787" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632845" comment="kernel-livepatch-5_3_18-24_52-default-9-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110788" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632846" comment="kernel-livepatch-5_3_18-24_61-default-6-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110789" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632847" comment="kernel-livepatch-5_3_18-24_64-default-6-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110790" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632848" comment="kernel-livepatch-5_3_18-24_67-default-4-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110791" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632849" comment="kernel-livepatch-5_3_18-24_53_4-default-4-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110792" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632850" comment="kernel-livepatch-5_3_18-24_70-default-4-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110793" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632851" comment="kernel-livepatch-5_3_18-24_75-default-3-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110794" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189418" ref_url="https://bugzilla.suse.com/1189418" source="BUGZILLA"/>
		<reference ref_id="1189420" ref_url="https://bugzilla.suse.com/1189420" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2021-3653: Fixed missing validation of the KVM `int_ctl` VMCB field that would have allowed a malicious L1 guest to enable AVIC support for the L2 guest (bsc#1189420).
- CVE-2021-3656: Fixed KVM nSVM nested VMLOAD/VMSAVE interception (bsc#1189418).
- CVE-2021-38198: Fixed KVM MMU to use the correct inherited permissions to get shadow page (bsc#1189278).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189418">SUSE bug 1189418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189420">SUSE bug 1189420</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632852" comment="kernel-livepatch-5_3_18-24_78-default-2-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110795" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633304" comment="kernel-default-livepatch-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633305" comment="kernel-default-livepatch-devel-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633306" comment="kernel-livepatch-5_3_18-24_83-default-1-5.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110796" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3361-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009574.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651489" comment="kernel-livepatch-5_3_18-24_78-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110797" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009571.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651488" comment="kernel-livepatch-5_3_18-24_75-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110798" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651487" comment="kernel-livepatch-5_3_18-24_70-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110799" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651486" comment="kernel-livepatch-5_3_18-24_53_4-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110800" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651485" comment="kernel-livepatch-5_3_18-24_67-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110801" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651484" comment="kernel-livepatch-5_3_18-24_64-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110802" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651483" comment="kernel-livepatch-5_3_18-24_61-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110803" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009594.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651528" comment="kernel-livepatch-5_3_18-24_43-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110804" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651527" comment="kernel-livepatch-5_3_18-24_37-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110805" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651530" comment="kernel-livepatch-5_3_18-24_49-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110806" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651529" comment="kernel-livepatch-5_3_18-24_46-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110807" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651526" comment="kernel-livepatch-5_3_18-24_34-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110808" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651525" comment="kernel-livepatch-5_3_18-24_29-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110809" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651524" comment="kernel-livepatch-5_3_18-24_24-default-15-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110810" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1187054" ref_url="https://bugzilla.suse.com/1187054" source="BUGZILLA"/>
		<reference ref_id="1188613" ref_url="https://bugzilla.suse.com/1188613" source="BUGZILLA"/>
		<reference ref_id="1190118" ref_url="https://bugzilla.suse.com/1190118" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-38160: Fixed a bug that could lead to a data corruption or loss. This can be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190118)
- CVE-2021-3640: Fixed a user-after-free bug in the function sco_sock_sendmsg which could lead to local privilege escalation. (bsc#1188613)
- CVE-2021-3573: Fixed a user-after-free bug in the function hci_sock_bound_ioctl which could lead to local privilege escalation. (bsc#1187054).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-14"/>
	<updated date="2021-10-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187054">SUSE bug 1187054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188613">SUSE bug 1188613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190118">SUSE bug 1190118</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651531" comment="kernel-livepatch-5_3_18-24_52-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110811" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652132" comment="kernel-default-livepatch-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652133" comment="kernel-default-livepatch-devel-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652134" comment="kernel-livepatch-5_3_18-24_86-default-1-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110812" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497755" comment="kernel-default-livepatch-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497756" comment="kernel-default-livepatch-devel-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497757" comment="kernel-livepatch-5_3_18-24_49-default-1-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110813" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008297.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497758" comment="kernel-livepatch-5_3_18-24_46-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110814" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0362-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008298.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497759" comment="kernel-livepatch-5_3_18-24_43-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110815" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497760" comment="kernel-livepatch-5_3_18-24_37-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110816" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497761" comment="kernel-livepatch-5_3_18-24_34-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110817" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497762" comment="kernel-livepatch-5_3_18-24_29-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110818" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497763" comment="kernel-livepatch-5_3_18-24_24-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110819" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008296.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497764" comment="kernel-livepatch-5_3_18-24_15-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110820" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497765" comment="kernel-livepatch-5_3_18-24_12-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110821" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497766" comment="kernel-livepatch-5_3_18-24_9-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110822" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="1179877" ref_url="https://bugzilla.suse.com/1179877" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180030" ref_url="https://bugzilla.suse.com/1180030" source="BUGZILLA"/>
		<reference ref_id="1180032" ref_url="https://bugzilla.suse.com/1180032" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations (bsc#1179779).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180562).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180030).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180032. 
- CVE-2020-29569: Fixed a use after free due to a logic error (bsc#1180008).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bsc#1179877).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179877).
- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could grant unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179877">SUSE bug 1179877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180030">SUSE bug 1180030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180032">SUSE bug 1180032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497767" comment="kernel-livepatch-5_3_18-22-default-7-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110823" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009738.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656440" comment="kernel-livepatch-5_3_18-24_37-default-14-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110824" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656441" comment="kernel-livepatch-5_3_18-24_43-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110825" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656442" comment="kernel-livepatch-5_3_18-24_46-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110826" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656444" comment="kernel-livepatch-5_3_18-24_52-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110827" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656445" comment="kernel-livepatch-5_3_18-24_61-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110828" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656446" comment="kernel-livepatch-5_3_18-24_64-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110829" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009739.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656447" comment="kernel-livepatch-5_3_18-24_67-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110830" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656448" comment="kernel-livepatch-5_3_18-24_53_4-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110831" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656449" comment="kernel-livepatch-5_3_18-24_70-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110832" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656450" comment="kernel-livepatch-5_3_18-24_75-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110833" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656451" comment="kernel-livepatch-5_3_18-24_78-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110834" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-17"/>
	<updated date="2021-11-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656452" comment="kernel-livepatch-5_3_18-24_83-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110835" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009749.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-3752: Fixed vulnerability in the linux kernel Bluetooth uaf module (bsc#1190432).
- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656443" comment="kernel-livepatch-5_3_18-24_49-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110836" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191318" ref_url="https://bugzilla.suse.com/1191318" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3743-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009751.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes one issue.

The following security issue was fixed:

- CVE-2021-41864: Fixed an integer overflow with a resultant out-of-bounds write in prealloc_elems_and_freelist in kernel/bpf/stackmap.c (bsc#1191318).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191318">SUSE bug 1191318</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656748" comment="kernel-livepatch-5_3_18-24_86-default-2-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110837" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655892" comment="kernel-default-livepatch-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655893" comment="kernel-default-livepatch-devel-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655894" comment="kernel-livepatch-5_3_18-24_93-default-1-5.3.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110838" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657491" comment="kernel-default-livepatch-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657492" comment="kernel-default-livepatch-devel-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657493" comment="kernel-livepatch-5_3_18-24_96-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110839" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009910.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659405" comment="kernel-livepatch-5_3_18-24_86-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110840" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659406" comment="kernel-livepatch-5_3_18-24_93-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110841" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659404" comment="kernel-livepatch-5_3_18-24_83-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110842" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659403" comment="kernel-livepatch-5_3_18-24_78-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110843" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659402" comment="kernel-livepatch-5_3_18-24_75-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110844" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659401" comment="kernel-livepatch-5_3_18-24_70-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110845" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="1192048" ref_url="https://bugzilla.suse.com/1192048" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009909.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659400" comment="kernel-livepatch-5_3_18-24_53_4-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110846" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659399" comment="kernel-livepatch-5_3_18-24_67-default-7-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110847" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659398" comment="kernel-livepatch-5_3_18-24_64-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110848" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="1192048" ref_url="https://bugzilla.suse.com/1192048" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659396" comment="kernel-livepatch-5_3_18-24_52-default-12-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110849" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="1192048" ref_url="https://bugzilla.suse.com/1192048" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659394" comment="kernel-livepatch-5_3_18-24_46-default-14-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110850" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="1192048" ref_url="https://bugzilla.suse.com/1192048" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659393" comment="kernel-livepatch-5_3_18-24_43-default-14-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110851" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="1192048" ref_url="https://bugzilla.suse.com/1192048" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192048">SUSE bug 1192048</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659395" comment="kernel-livepatch-5_3_18-24_49-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110852" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191813" ref_url="https://bugzilla.suse.com/1191813" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes one issue.

The following security issue was fixed:

- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191813">SUSE bug 1191813</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659397" comment="kernel-livepatch-5_3_18-24_61-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110853" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497768" comment="kernel-default-livepatch-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497769" comment="kernel-default-livepatch-devel-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497770" comment="kernel-livepatch-5_3_18-24_52-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110854" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008501.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_46 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497771" comment="kernel-livepatch-5_3_18-24_46-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110855" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008510.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_43 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497772" comment="kernel-livepatch-5_3_18-24_43-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110856" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008496.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_37 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497773" comment="kernel-livepatch-5_3_18-24_37-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110857" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_34 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497774" comment="kernel-livepatch-5_3_18-24_34-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110858" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_29 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497775" comment="kernel-livepatch-5_3_18-24_29-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110859" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_24 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497776" comment="kernel-livepatch-5_3_18-24_24-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110860" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_15 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497777" comment="kernel-livepatch-5_3_18-24_15-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110861" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_12 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497778" comment="kernel-livepatch-5_3_18-24_12-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110862" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_9 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497779" comment="kernel-livepatch-5_3_18-24_9-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110863" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1182468" ref_url="https://bugzilla.suse.com/1182468" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008498.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-22 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- Fixed an issue where NFS client filesystems got unmounted on fail-over (bsc#1182468). 
- CVE-2021-3347: Fixed a use-after-free in the PI futexes during fault handling, allowing local users to execute code in the kernel (bsc#1181553).
- CVE-2020-28374: Fixed insufficient identifier checking in the LIO SCSI target code which could have been used by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#1178684).
- CVE-2021-0342: Fixed a potential memory corruption due to a use after free which could have led to local escalation of privilege with System execution privileges required (bsc#1180859).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182468">SUSE bug 1182468</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497780" comment="kernel-livepatch-5_3_18-22-default-8-5.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110864" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179664" ref_url="https://bugzilla.suse.com/1179664" source="BUGZILLA"/>
		<reference ref_id="1179779" ref_url="https://bugzilla.suse.com/1179779" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008507.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2020-29368: Fixed an issue in copy-on-write implementation which could have granted unintended write access because of a race condition in a THP mapcount check (bsc#1179664).
- CVE-2020-29373: Fixed an issue where kernel unsafely handles the root directory during path lookups, and thus a process inside a mount namespace could escape to unintended filesystem locations (bsc#1179779).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-17"/>
	<updated date="2021-03-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179664">SUSE bug 1179664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179779">SUSE bug 1179779</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497781" comment="kernel-livepatch-5_3_18-24_49-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110865" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010554.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676919" comment="kernel-livepatch-5_3_18-24_83-default-7-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110866" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010561.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676915" comment="kernel-livepatch-5_3_18-24_53_4-default-11-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110867" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676913" comment="kernel-livepatch-5_3_18-24_64-default-13-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110868" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010565.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676912" comment="kernel-livepatch-5_3_18-24_61-default-13-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110869" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010721.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679055" comment="kernel-livepatch-5_3_18-24_78-default-10-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110870" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679057" comment="kernel-livepatch-5_3_18-24_86-default-8-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110871" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679151" comment="kernel-default-livepatch-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679152" comment="kernel-default-livepatch-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679153" comment="kernel-livepatch-5_3_18-150200_24_112-default-1-150200.5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110872" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010738.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679056" comment="kernel-livepatch-5_3_18-24_83-default-8-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110873" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679052" comment="kernel-livepatch-5_3_18-24_53_4-default-12-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110874" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679050" comment="kernel-livepatch-5_3_18-24_64-default-14-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110875" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679054" comment="kernel-livepatch-5_3_18-24_75-default-11-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110876" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679058" comment="kernel-livepatch-5_3_18-24_93-default-7-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110877" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_99 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679060" comment="kernel-livepatch-5_3_18-24_99-default-5-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110878" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010736.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_102 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679061" comment="kernel-livepatch-5_3_18-24_102-default-4-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110879" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_107 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679062" comment="kernel-livepatch-5_3_18-24_107-default-3-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110880" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679059" comment="kernel-livepatch-5_3_18-24_96-default-6-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110881" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-15"/>
	<updated date="2022-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679049" comment="kernel-livepatch-5_3_18-24_61-default-14-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110882" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-15"/>
	<updated date="2022-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679051" comment="kernel-livepatch-5_3_18-24_67-default-12-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110883" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195951" ref_url="https://bugzilla.suse.com/1195951" source="BUGZILLA"/>
		<reference ref_id="1196959" ref_url="https://bugzilla.suse.com/1196959" source="BUGZILLA"/>
		<reference ref_id="1197133" ref_url="https://bugzilla.suse.com/1197133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy. (bsc#1195065)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-15"/>
	<updated date="2022-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195951">SUSE bug 1195951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196959">SUSE bug 1196959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197133">SUSE bug 1197133</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679053" comment="kernel-livepatch-5_3_18-24_70-default-12-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110884" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1326-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010817.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_102 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-24"/>
	<updated date="2022-04-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680227" comment="kernel-livepatch-5_3_18-24_102-default-5-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110885" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-24"/>
	<updated date="2022-04-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680225" comment="kernel-livepatch-5_3_18-24_96-default-7-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110886" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010820.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_107 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680228" comment="kernel-livepatch-5_3_18-24_107-default-4-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110887" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680216" comment="kernel-livepatch-5_3_18-24_64-default-15-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110888" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680222" comment="kernel-livepatch-5_3_18-24_83-default-9-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110889" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680224" comment="kernel-livepatch-5_3_18-24_93-default-8-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110890" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_99 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680226" comment="kernel-livepatch-5_3_18-24_99-default-6-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110891" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680217" comment="kernel-livepatch-5_3_18-24_67-default-13-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110892" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680218" comment="kernel-livepatch-5_3_18-24_53_4-default-13-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110893" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680219" comment="kernel-livepatch-5_3_18-24_70-default-13-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110894" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680220" comment="kernel-livepatch-5_3_18-24_75-default-12-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110895" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680221" comment="kernel-livepatch-5_3_18-24_78-default-11-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110896" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680223" comment="kernel-livepatch-5_3_18-24_86-default-9-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110897" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197335" ref_url="https://bugzilla.suse.com/1197335" source="BUGZILLA"/>
		<reference ref_id="1197344" ref_url="https://bugzilla.suse.com/1197344" source="BUGZILLA"/>
		<reference ref_id="1197705" ref_url="https://bugzilla.suse.com/1197705" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1011" ref_url="https://www.suse.com/security/cve/CVE-2022-1011/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197335)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197705)
- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bsc#1197344)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197335">SUSE bug 1197335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197344">SUSE bug 1197344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197705">SUSE bug 1197705</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1011/">CVE-2022-1011</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680215" comment="kernel-livepatch-5_3_18-24_61-default-15-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110898" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664515" comment="kernel-default-livepatch-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664516" comment="kernel-default-livepatch-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664517" comment="kernel-livepatch-5_3_18-24_99-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110899" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010148.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665163" comment="kernel-livepatch-5_3_18-24_86-default-4-2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110900" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0239-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010142.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes one issue.

The following security issue was fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665164" comment="kernel-livepatch-5_3_18-24_93-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110901" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0241-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010149.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665161" comment="kernel-livepatch-5_3_18-24_78-default-6-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110902" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665162" comment="kernel-livepatch-5_3_18-24_83-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110903" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes one issue.

The following security issue was fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665165" comment="kernel-livepatch-5_3_18-24_96-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110904" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665160" comment="kernel-livepatch-5_3_18-24_75-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110905" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665159" comment="kernel-livepatch-5_3_18-24_70-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110906" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-31"/>
	<updated date="2022-01-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665157" comment="kernel-livepatch-5_3_18-24_67-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110907" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010155.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665158" comment="kernel-livepatch-5_3_18-24_53_4-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110908" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665155" comment="kernel-livepatch-5_3_18-24_61-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110909" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 10 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010172.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_49 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-02"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665153" comment="kernel-livepatch-5_3_18-24_49-default-14-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110910" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194680" ref_url="https://bugzilla.suse.com/1194680" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2021-23134: Fixed multiple bugs in NFC subsytem (bsc#1178181, bsc#1186060).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-02"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194680">SUSE bug 1194680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665154" comment="kernel-livepatch-5_3_18-24_52-default-13-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110911" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191529" ref_url="https://bugzilla.suse.com/1191529" source="BUGZILLA"/>
		<reference ref_id="1192036" ref_url="https://bugzilla.suse.com/1192036" source="BUGZILLA"/>
		<reference ref_id="1194461" ref_url="https://bugzilla.suse.com/1194461" source="BUGZILLA"/>
		<reference ref_id="1194737" ref_url="https://bugzilla.suse.com/1194737" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-4154" ref_url="https://www.suse.com/security/cve/CVE-2021-4154/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010176.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2021-4154: Fixed option parsing with cgroups version 1 (bsc#1193842).
- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bsc#1191193)
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-02"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191529">SUSE bug 1191529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192036">SUSE bug 1192036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194461">SUSE bug 1194461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194737">SUSE bug 1194737</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4154/">CVE-2021-4154</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665156" comment="kernel-livepatch-5_3_18-24_64-default-10-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110912" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667457" comment="kernel-default-livepatch-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667458" comment="kernel-default-livepatch-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667459" comment="kernel-livepatch-5_3_18-24_102-default-1-5.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110913" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010228.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667876" comment="kernel-livepatch-5_3_18-24_61-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110914" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667877" comment="kernel-livepatch-5_3_18-24_64-default-11-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110915" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667878" comment="kernel-livepatch-5_3_18-24_67-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110916" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667879" comment="kernel-livepatch-5_3_18-24_53_4-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110917" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667880" comment="kernel-livepatch-5_3_18-24_70-default-9-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110918" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667881" comment="kernel-livepatch-5_3_18-24_75-default-8-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110919" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667882" comment="kernel-livepatch-5_3_18-24_78-default-7-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110920" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667883" comment="kernel-livepatch-5_3_18-24_83-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110921" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667884" comment="kernel-livepatch-5_3_18-24_86-default-5-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110922" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667885" comment="kernel-livepatch-5_3_18-24_93-default-4-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110923" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667886" comment="kernel-livepatch-5_3_18-24_96-default-3-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110924" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010227.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_99 fixes one issue.

The following security issue was fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-16"/>
	<updated date="2022-02-16"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667887" comment="kernel-livepatch-5_3_18-24_99-default-2-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110925" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194460" ref_url="https://bugzilla.suse.com/1194460" source="BUGZILLA"/>
		<reference ref_id="1194533" ref_url="https://bugzilla.suse.com/1194533" source="BUGZILLA"/>
		<reference ref_id="1195308" ref_url="https://bugzilla.suse.com/1195308" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010238.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2021-4202: Fixed NFC race condition by adding NCI_UNREG flag (bsc#1194533).
- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195308).
- CVE-2021-4083: Fixed a read-after-free memory flaw inside the garbage collection for Unix domain socket file handlers when users call close() and fget() simultaneouslyand can potentially trigger a race condition (bnc#1194460).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194460">SUSE bug 1194460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194533">SUSE bug 1194533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195308">SUSE bug 1195308</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667875" comment="kernel-livepatch-5_3_18-24_52-default-14-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110926" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010319.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_102 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669950" comment="kernel-livepatch-5_3_18-24_102-default-2-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110927" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010320.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_99 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669951" comment="kernel-livepatch-5_3_18-24_99-default-3-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110928" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669952" comment="kernel-livepatch-5_3_18-24_96-default-4-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110929" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669953" comment="kernel-livepatch-5_3_18-24_93-default-5-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110930" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669954" comment="kernel-livepatch-5_3_18-24_86-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110931" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_83 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669955" comment="kernel-livepatch-5_3_18-24_83-default-6-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110932" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669956" comment="kernel-livepatch-5_3_18-24_78-default-8-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110933" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669957" comment="kernel-livepatch-5_3_18-24_75-default-9-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110934" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669958" comment="kernel-livepatch-5_3_18-24_70-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110935" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_53_4 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669959" comment="kernel-livepatch-5_3_18-24_53_4-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110936" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669960" comment="kernel-livepatch-5_3_18-24_67-default-10-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110937" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_64 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669961" comment="kernel-livepatch-5_3_18-24_64-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110938" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_61 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669962" comment="kernel-livepatch-5_3_18-24_61-default-12-2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110939" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 11 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="1195307" ref_url="https://bugzilla.suse.com/1195307" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_52 fixes several issues.

The following security issues were fixed:

- CVE-2022-0516: Fixed KVM s390 return error on SIDA memop on normal guest (bsc#1195947).
- CVE-2021-0920: Fixed a local privilege escalation due to an use after free bug in unix_gc (bsc#1194463).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bsc#1195307).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-01"/>
	<updated date="2022-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195307">SUSE bug 1195307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669963" comment="kernel-livepatch-5_3_18-24_52-default-15-2.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110940" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671402" comment="kernel-default-livepatch-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671403" comment="kernel-default-livepatch-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671404" comment="kernel-livepatch-5_3_18-24_107-default-1-5.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110941" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 18 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_78 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676918" comment="kernel-livepatch-5_3_18-24_78-default-9-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110942" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 16 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_70 fixes several issues.

The following security issues were fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676916" comment="kernel-livepatch-5_3_18-24_70-default-11-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110943" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_67 fixes several issues.

The following security issues were fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676914" comment="kernel-livepatch-5_3_18-24_67-default-11-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110944" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_75 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676917" comment="kernel-livepatch-5_3_18-24_75-default-10-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110945" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_86 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676920" comment="kernel-livepatch-5_3_18-24_86-default-7-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110946" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_93 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676921" comment="kernel-livepatch-5_3_18-24_93-default-6-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110947" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_96 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676922" comment="kernel-livepatch-5_3_18-24_96-default-5-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110948" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_99 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676923" comment="kernel-livepatch-5_3_18-24_99-default-4-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110949" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 24 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<description>
This update for the Linux Kernel 5.3.18-24_102 fixes one issue.

The following security issue was fixed:

- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676924" comment="kernel-livepatch-5_3_18-24_102-default-3-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110950" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP2) (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Live Patching 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194463" ref_url="https://bugzilla.suse.com/1194463" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010551.html" source="SUSE-SU"/>
		<description>
This update for the Linux Kernel 5.3.18-24_107 fixes one issue.

The following security issue was fixed:

- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free vulnerability in unix_scm_to_skb of af_unix (bsc#1193731).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194463">SUSE bug 1194463</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-live-patching:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009288462" comment="SUSE Linux Enterprise Module for Live Patching 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676925" comment="kernel-livepatch-5_3_18-24_107-default-2-150200.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110951" version="1" class="patch">
	<metadata>
		<title>Security update for libvpx (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1166066" ref_url="https://bugzilla.suse.com/1166066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0034" ref_url="https://www.suse.com/security/cve/CVE-2020-0034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1297-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007106.html" source="SUSE-SU"/>
		<description>
This update for libvpx fixes the following issues:

- CVE-2020-0034: Fixed an out-of-bounds read on truncated key frames (bsc#1166066).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1166066">SUSE bug 1166066</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0034/">CVE-2020-0034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497858" comment="vpx-tools-1.6.1-6.6.8 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110952" version="1" class="patch">
	<metadata>
		<title>Security update for freetds (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1141132" ref_url="https://bugzilla.suse.com/1141132" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1417-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007103.html" source="SUSE-SU"/>
		<description>
This update for freetds to 1.1.36 fixes the following issues:

Security issue fixed:

- CVE-2019-13508: Fixed a heap overflow that could have been caused by malicious servers sending UDT types over protocol version 5.0 (bsc#1141132).

Non-security issues fixed:

- Enabled Kerberos support
- Version update to 1.1.36:
  * Default TDS protocol version is now 'auto'
  * Improved UTF-8 performances
  * TDS Pool Server is enabled
  * MARS support is enabled
  * NTLMv2 is enabled
  * See NEWS and ChangeLog for a complete list of changes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141132">SUSE bug 1141132</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497862" comment="libsybdb5-1.1.36-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110953" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1055857" ref_url="https://bugzilla.suse.com/1055857" source="BUGZILLA"/>
		<reference ref_id="1059893" ref_url="https://bugzilla.suse.com/1059893" source="BUGZILLA"/>
		<reference ref_id="1120943" ref_url="https://bugzilla.suse.com/1120943" source="BUGZILLA"/>
		<reference ref_id="1160770" ref_url="https://bugzilla.suse.com/1160770" source="BUGZILLA"/>
		<reference ref_id="1171475" ref_url="https://bugzilla.suse.com/1171475" source="BUGZILLA"/>
		<reference ref_id="1171847" ref_url="https://bugzilla.suse.com/1171847" source="BUGZILLA"/>
		<reference ref_id="1172105" ref_url="https://bugzilla.suse.com/1172105" source="BUGZILLA"/>
		<reference ref_id="1172116" ref_url="https://bugzilla.suse.com/1172116" source="BUGZILLA"/>
		<reference ref_id="1172121" ref_url="https://bugzilla.suse.com/1172121" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-6328" ref_url="https://www.suse.com/security/cve/CVE-2016-6328/" source="CVE"/>
		<reference ref_id="CVE-2017-7544" ref_url="https://www.suse.com/security/cve/CVE-2017-7544/" source="CVE"/>
		<reference ref_id="CVE-2018-20030" ref_url="https://www.suse.com/security/cve/CVE-2018-20030/" source="CVE"/>
		<reference ref_id="CVE-2019-9278" ref_url="https://www.suse.com/security/cve/CVE-2019-9278/" source="CVE"/>
		<reference ref_id="CVE-2020-0093" ref_url="https://www.suse.com/security/cve/CVE-2020-0093/" source="CVE"/>
		<reference ref_id="CVE-2020-12767" ref_url="https://www.suse.com/security/cve/CVE-2020-12767/" source="CVE"/>
		<reference ref_id="CVE-2020-13112" ref_url="https://www.suse.com/security/cve/CVE-2020-13112/" source="CVE"/>
		<reference ref_id="CVE-2020-13113" ref_url="https://www.suse.com/security/cve/CVE-2020-13113/" source="CVE"/>
		<reference ref_id="CVE-2020-13114" ref_url="https://www.suse.com/security/cve/CVE-2020-13114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1553-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007105.html" source="SUSE-SU"/>
		<description>
This update for libexif to 0.6.22 fixes the following issues:

Security issues fixed:

- CVE-2016-6328: Fixed an integer overflow in parsing MNOTE entry data of the input file (bsc#1055857).
- CVE-2017-7544: Fixed an out-of-bounds heap read vulnerability in exif_data_save_data_entry function in libexif/exif-data.c (bsc#1059893).
- CVE-2018-20030: Fixed a denial of service by endless recursion (bsc#1120943).
- CVE-2019-9278: Fixed an integer overflow (bsc#1160770).
- CVE-2020-0093: Fixed an out-of-bounds read in exif_data_save_data_entry (bsc#1171847).
- CVE-2020-12767: Fixed a divide-by-zero error in exif_entry_get_value (bsc#1171475).
- CVE-2020-13112: Fixed a time consumption DoS when parsing canon array markers (bsc#1172121).
- CVE-2020-13113: Fixed a potential use of uninitialized memory (bsc#1172105).
- CVE-2020-13114: Fixed various buffer overread fixes due to integer overflows in maker notes (bsc#1172116).

Non-security issues fixed:

- libexif was updated to version 0.6.22:
  * New translations: ms
  * Updated translations for most languages
  * Some useful EXIF 2.3 tag added:
    * EXIF_TAG_GAMMA
    * EXIF_TAG_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_IMAGE_NUMBER_OF_COMPOSITE_IMAGE
    * EXIF_TAG_SOURCE_EXPOSURE_TIMES_OF_COMPOSITE_IMAGE
    * EXIF_TAG_GPS_H_POSITIONING_ERROR
    * EXIF_TAG_CAMERA_OWNER_NAME
    * EXIF_TAG_BODY_SERIAL_NUMBER
    * EXIF_TAG_LENS_SPECIFICATION
    * EXIF_TAG_LENS_MAKE
    * EXIF_TAG_LENS_MODEL
    * EXIF_TAG_LENS_SERIAL_NUMBER
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1055857">SUSE bug 1055857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1059893">SUSE bug 1059893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120943">SUSE bug 1120943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160770">SUSE bug 1160770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171475">SUSE bug 1171475</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171847">SUSE bug 1171847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172105">SUSE bug 1172105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172116">SUSE bug 1172116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172121">SUSE bug 1172121</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2016-6328/">CVE-2016-6328</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-7544/">CVE-2017-7544</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20030/">CVE-2018-20030</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9278/">CVE-2019-9278</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0093/">CVE-2020-0093</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12767/">CVE-2020-12767</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13112/">CVE-2020-13112</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13113/">CVE-2020-13113</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13114/">CVE-2020-13114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497865" comment="libexif12-32bit-0.6.22-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110954" version="1" class="patch">
	<metadata>
		<title>Security update for perl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1171863" ref_url="https://bugzilla.suse.com/1171863" source="BUGZILLA"/>
		<reference ref_id="1171864" ref_url="https://bugzilla.suse.com/1171864" source="BUGZILLA"/>
		<reference ref_id="1171866" ref_url="https://bugzilla.suse.com/1171866" source="BUGZILLA"/>
		<reference ref_id="1172348" ref_url="https://bugzilla.suse.com/1172348" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10543" ref_url="https://www.suse.com/security/cve/CVE-2020-10543/" source="CVE"/>
		<reference ref_id="CVE-2020-10878" ref_url="https://www.suse.com/security/cve/CVE-2020-10878/" source="CVE"/>
		<reference ref_id="CVE-2020-12723" ref_url="https://www.suse.com/security/cve/CVE-2020-12723/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006983.html" source="SUSE-SU"/>
		<description>
This update for perl fixes the following issues:

- CVE-2020-10543: Fixed a heap buffer overflow in regular expression compiler which could have 
  allowed overwriting of allocated memory with attacker's data (bsc#1171863).
- CVE-2020-10878: Fixed multiple integer overflows which could have allowed the insertion of 
  instructions into the compiled form of Perl regular expression (bsc#1171864).
- CVE-2020-12723: Fixed an attacker's corruption of the intermediate language state of a 
  compiled regular expression (bsc#1171866).
- Fixed a bad warning in features.ph (bsc#1172348).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-19"/>
	<updated date="2020-06-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171863">SUSE bug 1171863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171864">SUSE bug 1171864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171866">SUSE bug 1171866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172348">SUSE bug 1172348</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10543/">CVE-2020-10543</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-10878/">CVE-2020-10878</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-12723/">CVE-2020-12723</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497867" comment="perl-32bit-5.26.1-7.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110955" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1156402" ref_url="https://bugzilla.suse.com/1156402" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-2201" ref_url="https://www.suse.com/security/cve/CVE-2019-2201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2971-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007075.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2019-2201: Several integer overflow issues and subsequent segfaults occurred in libjpeg-turbo,
  when attempting to compress or decompress gigapixel images. [bsc#1156402]

		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1156402">SUSE bug 1156402</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-2201/">CVE-2019-2201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497831" comment="libjpeg-turbo-1.5.3-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110956" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2017-18922: Fixed an issue which could have allowed to an attacker to pre-auth overwrite a function pointer 
  which subsequently used leading to potential remote code execution (bsc#1173477).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-07"/>
	<updated date="2020-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497869" comment="libvncserver0-0.9.10-4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110957" version="1" class="patch">
	<metadata>
		<title>Security update for nmap (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1135350" ref_url="https://bugzilla.suse.com/1135350" source="BUGZILLA"/>
		<reference ref_id="1148742" ref_url="https://bugzilla.suse.com/1148742" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18594" ref_url="https://www.suse.com/security/cve/CVE-2017-18594/" source="CVE"/>
		<reference ref_id="CVE-2018-15173" ref_url="https://www.suse.com/security/cve/CVE-2018-15173/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2425-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007102.html" source="SUSE-SU"/>
		<description>
This update for nmap fixes the following issues:

Security issue fixed:

- CVE-2017-18594: Fixed a denial of service condition due to a double free when an SSH connection fails. (bsc#1148742)

Non-security issue fixed:

- Fixed a regression in the version scanner caused, by the fix for CVE-2018-15173. (bsc#1135350)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1135350">SUSE bug 1135350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148742">SUSE bug 1148742</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2017-18594/">CVE-2017-18594</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-15173/">CVE-2018-15173</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497822" comment="nping-7.70-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110958" version="1" class="patch">
	<metadata>
		<title>Security update for opencv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1144348" ref_url="https://bugzilla.suse.com/1144348" source="BUGZILLA"/>
		<reference ref_id="1144352" ref_url="https://bugzilla.suse.com/1144352" source="BUGZILLA"/>
		<reference ref_id="1149742" ref_url="https://bugzilla.suse.com/1149742" source="BUGZILLA"/>
		<reference ref_id="1154091" ref_url="https://bugzilla.suse.com/1154091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-14492" ref_url="https://www.suse.com/security/cve/CVE-2019-14492/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3192-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007098.html" source="SUSE-SU"/>
		<description>
This update for opencv fixes the following issues:

Security issues fixed:

- CVE-2019-14491: Fixed an out of bounds read in the function cv:predictOrdered&lt;cv:HaarEvaluator&gt;, leading to DOS (bsc#1144352).
- CVE-2019-14492: Fixed an out of bounds read/write in the function HaarEvaluator:OptFeature:calc, which leads to denial of service (bsc#1144348).
- CVE-2019-15939: Fixed a divide-by-zero error in cv:HOGDescriptor:getDescriptorSize (bsc#1149742).

Non-security issue fixed:

- Fixed an issue in opencv-devel that broke builds with 'No rule to make target opencv_calib3d-NOTFOUND' (bsc#1154091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144348">SUSE bug 1144348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144352">SUSE bug 1144352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149742">SUSE bug 1149742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154091">SUSE bug 1154091</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14492/">CVE-2019-14492</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497837" comment="python2-opencv-3.3.1-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497838" comment="python3-opencv-3.3.1-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110959" version="1" class="patch">
	<metadata>
		<title>Security update for python-ecdsa (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1153165" ref_url="https://bugzilla.suse.com/1153165" source="BUGZILLA"/>
		<reference ref_id="1154217" ref_url="https://bugzilla.suse.com/1154217" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14853" ref_url="https://www.suse.com/security/cve/CVE-2019-14853/" source="CVE"/>
		<reference ref_id="CVE-2019-14859" ref_url="https://www.suse.com/security/cve/CVE-2019-14859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:2891-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007100.html" source="SUSE-SU"/>
		<description>
This update for python-ecdsa to version 0.13.3 fixes the following issues:

Security issues fixed:

- CVE-2019-14853: Fixed unexpected exceptions during signature decoding (bsc#1153165).
- CVE-2019-14859: Fixed a signature malleability caused by insufficient checks of DER encoding (bsc#1154217).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1153165">SUSE bug 1153165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154217">SUSE bug 1154217</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14853/">CVE-2019-14853</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14859/">CVE-2019-14859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497830" comment="python2-ecdsa-0.13.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110960" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1132091" ref_url="https://bugzilla.suse.com/1132091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

Security issue fixed:

- CVE-2019-11023: Fixed a denial of service vulnerability, which was caused by a NULL pointer dereference in agroot() (bsc#1132091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497804" comment="graphviz-gnome-2.40.1-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110961" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  + LibVNCServer-CVE-2018-21247.patch
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  + LibVNCServer-CVE-2019-20839.patch
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  + LibVNCServer-CVE-2019-20840.patch
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497870" comment="libvncserver0-0.9.10-4.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110962" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1174157" ref_url="https://bugzilla.suse.com/1174157" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14556" ref_url="https://www.suse.com/security/cve/CVE-2020-14556/" source="CVE"/>
		<reference ref_id="CVE-2020-14562" ref_url="https://www.suse.com/security/cve/CVE-2020-14562/" source="CVE"/>
		<reference ref_id="CVE-2020-14573" ref_url="https://www.suse.com/security/cve/CVE-2020-14573/" source="CVE"/>
		<reference ref_id="CVE-2020-14577" ref_url="https://www.suse.com/security/cve/CVE-2020-14577/" source="CVE"/>
		<reference ref_id="CVE-2020-14581" ref_url="https://www.suse.com/security/cve/CVE-2020-14581/" source="CVE"/>
		<reference ref_id="CVE-2020-14583" ref_url="https://www.suse.com/security/cve/CVE-2020-14583/" source="CVE"/>
		<reference ref_id="CVE-2020-14593" ref_url="https://www.suse.com/security/cve/CVE-2020-14593/" source="CVE"/>
		<reference ref_id="CVE-2020-14621" ref_url="https://www.suse.com/security/cve/CVE-2020-14621/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007229.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.8+10 (July 2020 CPU, bsc#1174157)
  * Security fixes:
    + JDK-8230613: Better ASCII conversions
    + JDK-8231800: Better listing of arrays
    + JDK-8232014: Expand DTD support
    + JDK-8233234: Better Zip Naming
    + JDK-8233239, CVE-2020-14562: Enhance TIFF support
    + JDK-8233255: Better Swing Buttons
    + JDK-8234032: Improve basic calendar services
    + JDK-8234042: Better factory production of certificates
    + JDK-8234418: Better parsing with CertificateFactory
    + JDK-8234836: Improve serialization handling
    + JDK-8236191: Enhance OID processing
    + JDK-8236867, CVE-2020-14573: Enhance Graal interface handling
    + JDK-8237117, CVE-2020-14556: Better ForkJoinPool behavior
    + JDK-8237592, CVE-2020-14577: Enhance certificate verification
    + JDK-8238002, CVE-2020-14581: Better matrix operations
    + JDK-8238013: Enhance String writing
    + JDK-8238804: Enhance key handling process
    + JDK-8238842: AIOOBE in GIFImageReader.initializeStringTable
    + JDK-8238843: Enhanced font handing
    + JDK-8238920, CVE-2020-14583: Better Buffer support
    + JDK-8238925: Enhance WAV file playback
    + JDK-8240119, CVE-2020-14593: Less Affine Transformations
    + JDK-8240482: Improved WAV file playback
    + JDK-8241379: Update JCEKS support
    + JDK-8241522: Manifest improved jar headers redux
    + JDK-8242136, CVE-2020-14621: Better XML namespace handling
  * Other changes:
    + JDK-6933331: (d3d/ogl) java.lang.IllegalStateException:
      Buffers have not been created
    + JDK-7124307: JSpinner and changing value by mouse
    + JDK-8022574: remove HaltNode code after uncommon trap calls
    + JDK-8039082: [TEST_BUG] Test
      java/awt/dnd/BadSerializationTest/BadSerializationTest.java
      fails
    + JDK-8040630: Popup menus and tooltips flicker with previous
       popup contents when first shown
    + JDK-8044365: (dc) MulticastSendReceiveTests.java failing with
      ENOMEM when joining group (OS X 10.9)
    + JDK-8048215: [TESTBUG]
      java/lang/management/ManagementFactory/ThreadMXBeanProxy.java
       Expected non-null LockInfo
    + JDK-8051349: nsk/jvmti/scenarios/sampling/SP06/sp06t003 fails
      in nightly
    + JDK-8080353: JShell: Better error message on attempting to
       add default method
    + JDK-8139876: Exclude hanging nsk/stress/stack from execution
      with deoptimization enabled
    + JDK-8146090: java/lang/ref/ReachabilityFenceTest.java fails
       with -XX:+DeoptimizeALot
    + JDK-8153430: jdk regression test MletParserLocaleTest,
       ParserInfiniteLoopTest reduce default timeout
    + JDK-8156207: Resource allocated BitMaps are often cleared
      unnecessarily
    + JDK-8159740: JShell: corralled declarations do not have
      correct source to wrapper mapping
    + JDK-8175984: ICC_Profile has un-needed, not-empty finalize
      method
    + JDK-8176359: Frame#setMaximizedbounds not working properly in
       multi screen environments
    + JDK-8183369: RFC unconformity of HttpURLConnection with proxy
    + JDK-8187078: -XX:+VerifyOops finds numerous problems when
       running JPRT
    + JDK-8189861: Refactor CacheFind
    + JDK-8191169: java/net/Authenticator/B4769350.java failed
      intermittently
    + JDK-8191930: [Graal] emits unparseable XML into compile log
    + JDK-8193879: Java debugger hangs on method invocation
    + JDK-8196019: java/awt/Window/Grab/GrabTest.java fails on
      Windows
    + JDK-8196181: sun/java2d/GdiRendering/InsetClipping.java fails
    + JDK-8198000:
      java/awt/List/EmptyListEventTest/EmptyListEventTest.java
      debug assert on Windows
    + JDK-8198001: java/awt/Menu/WrongParentAfterRemoveMenu/
      /WrongParentAfterRemoveMenu.java debug assert on Windows
    + JDK-8198339: Test javax/swing/border/Test6981576.java is
      unstable
    + JDK-8200701: jdk/jshell/ExceptionsTest.java fails on Windows,
      after JDK-8198801
    + JDK-8203264: JNI exception pending in
      PlainDatagramSocketImpl.c:740
    + JDK-8203672: JNI exception pending in PlainSocketImpl.c
    + JDK-8203673: JNI exception pending in
      DualStackPlainDatagramSocketImpl.c:398
    + JDK-8204834: Fix confusing 'allocate' naming in OopStorage
    + JDK-8205399: Set node color on pinned HashMap.TreeNode
      deletion
    + JDK-8205653: test/jdk/sun/management/jmxremote/bootstrap/
      /RmiRegistrySslTest.java and RmiSslBootstrapTest.sh fail with
      handshake_failure
    + JDK-8206179: com/sun/management/OperatingSystemMXBean/
      /GetCommittedVirtualMemorySize.java fails with Committed
      virtual memory size illegal value
    + JDK-8207334: VM times out in VM_HandshakeAllThreads::doit()
      with RunThese30M
    + JDK-8208277: Code cache heap (-XX:ReservedCodeCacheSize)
      doesn't work with 1GB LargePages
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174157">SUSE bug 1174157</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14556/">CVE-2020-14556</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14562/">CVE-2020-14562</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14573/">CVE-2020-14573</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14577/">CVE-2020-14577</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14581/">CVE-2020-14581</cve>
	<cve impact="moderate" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14583/">CVE-2020-14583</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-14593/">CVE-2020-14593</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14621/">CVE-2020-14621</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497871" comment="java-11-openjdk-javadoc-11.0.8.0-3.45.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110963" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1175223" ref_url="https://bugzilla.suse.com/1175223" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007334.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7068: Use of freed hash key in the phar_parse_zipfile function (bsc#1175223).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497889" comment="php7-embed-7.4.6-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110964" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1172491" ref_url="https://bugzilla.suse.com/1172491" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13790" ref_url="https://www.suse.com/security/cve/CVE-2020-13790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007380.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-13790: Fixed a heap-based buffer over-read via a malformed PPM input file (bsc#1172491).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-08"/>
	<updated date="2020-09-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172491">SUSE bug 1172491</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13790/">CVE-2020-13790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497874" comment="libjpeg-turbo-1.5.3-5.15.7 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110965" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1146608" ref_url="https://bugzilla.suse.com/1146608" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14973" ref_url="https://www.suse.com/security/cve/CVE-2019-14973/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007480.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2019-14973: Fixed an improper check which was depended on the compiler
  which could have led to integer overflow (bsc#1146608).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-24"/>
	<updated date="2020-09-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1146608">SUSE bug 1146608</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14973/">CVE-2019-14973</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497876" comment="tiff-4.0.9-5.30.28 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110966" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1176590" ref_url="https://bugzilla.suse.com/1176590" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374/" source="CVE"/>
		<reference ref_id="CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375/" source="CVE"/>
		<reference ref_id="CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376/" source="CVE"/>
		<reference ref_id="CVE-2020-14377" ref_url="https://www.suse.com/security/cve/CVE-2020-14377/" source="CVE"/>
		<reference ref_id="CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

- dpdk was updated to 19.11.4
  - CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: Fixed multiple issues where a malicious guest could 
    harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest 
    and causing partially denial of service in the host(bsc#1176590).
- For a list of fixes check:
  https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#id8
  denial of service in the host (bsc#1176590).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376</cve>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14377/">CVE-2020-14377</cve>
	<cve impact="critical" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497890" comment="libdpdk-20_0-19.11.4-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110967" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1177351" ref_url="https://bugzilla.suse.com/1177351" source="BUGZILLA"/>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069/" source="CVE"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7069: Fixed an issue when AES-CCM mode was used with openssl_encrypt() function with 12 bytes IV, 
  only first 7 bytes of the IV was used (bsc#1177351). 
- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177351">SUSE bug 1177351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497891" comment="php7-embed-7.4.6-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110968" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1126826" ref_url="https://bugzilla.suse.com/1126826" source="BUGZILLA"/>
		<reference ref_id="1126829" ref_url="https://bugzilla.suse.com/1126829" source="BUGZILLA"/>
		<reference ref_id="1126831" ref_url="https://bugzilla.suse.com/1126831" source="BUGZILLA"/>
		<reference ref_id="1140126" ref_url="https://bugzilla.suse.com/1140126" source="BUGZILLA"/>
		<reference ref_id="1142649" ref_url="https://bugzilla.suse.com/1142649" source="BUGZILLA"/>
		<reference ref_id="1143609" ref_url="https://bugzilla.suse.com/1143609" source="BUGZILLA"/>
		<reference ref_id="1153768" ref_url="https://bugzilla.suse.com/1153768" source="BUGZILLA"/>
		<reference ref_id="1153770" ref_url="https://bugzilla.suse.com/1153770" source="BUGZILLA"/>
		<reference ref_id="1157755" ref_url="https://bugzilla.suse.com/1157755" source="BUGZILLA"/>
		<reference ref_id="1160254" ref_url="https://bugzilla.suse.com/1160254" source="BUGZILLA"/>
		<reference ref_id="1160590" ref_url="https://bugzilla.suse.com/1160590" source="BUGZILLA"/>
		<reference ref_id="1163333" ref_url="https://bugzilla.suse.com/1163333" source="BUGZILLA"/>
		<reference ref_id="1163744" ref_url="https://bugzilla.suse.com/1163744" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-12972" ref_url="https://www.suse.com/security/cve/CVE-2019-12972/" source="CVE"/>
		<reference ref_id="CVE-2019-14250" ref_url="https://www.suse.com/security/cve/CVE-2019-14250/" source="CVE"/>
		<reference ref_id="CVE-2019-14444" ref_url="https://www.suse.com/security/cve/CVE-2019-14444/" source="CVE"/>
		<reference ref_id="CVE-2019-17450" ref_url="https://www.suse.com/security/cve/CVE-2019-17450/" source="CVE"/>
		<reference ref_id="CVE-2019-17451" ref_url="https://www.suse.com/security/cve/CVE-2019-17451/" source="CVE"/>
		<reference ref_id="CVE-2019-9074" ref_url="https://www.suse.com/security/cve/CVE-2019-9074/" source="CVE"/>
		<reference ref_id="CVE-2019-9075" ref_url="https://www.suse.com/security/cve/CVE-2019-9075/" source="CVE"/>
		<reference ref_id="CVE-2019-9077" ref_url="https://www.suse.com/security/cve/CVE-2019-9077/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007650.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

binutils was updated to version 2.35. (jsc#ECO-2373)

Update to binutils 2.35:

* The assembler can now produce DWARF-5 format line number tables.
* Readelf now has a 'lint' mode to enable extra checks of the files it is processing.
* Readelf will now display '[...]' when it has to truncate a symbol name.  
  The old behaviour - of displaying as many characters as possible, up to
  the 80 column limit - can be restored by the use of the --silent-truncation
  option.
* The linker can now produce a dependency file listing the inputs that it
  has processed, much like the -M -MP option supported by the compiler.

- fix DT_NEEDED order with -flto [bsc#1163744]


Update to binutils 2.34:

* The disassembler (objdump --disassemble) now has an option to
  generate ascii art thats show the arcs between that start and end
  points of control flow instructions.
* The binutils tools now have support for debuginfod.  Debuginfod is a 
  HTTP service for distributing ELF/DWARF debugging information as
  well as source code.  The tools can now connect to debuginfod
  servers in order to download debug information about the files that
  they are processing.
* The assembler and linker now support the generation of ELF format
  files for the Z80 architecture.

- Add new subpackages for libctf and libctf-nobfd.
- Disable LTO due to bsc#1163333.
- Includes fixes for these CVEs:
  bsc#1153768 aka CVE-2019-17451 aka PR25070
  bsc#1153770 aka CVE-2019-17450 aka PR25078

- fix various build fails on aarch64 (PR25210, bsc#1157755).

Update to binutils 2.33.1:

* Adds support for the Arm Scalable Vector Extension version 2
  (SVE2) instructions, the Arm Transactional Memory Extension (TME)
  instructions and the Armv8.1-M Mainline and M-profile Vector
  Extension (MVE) instructions.
* Adds support for the Arm Cortex-A76AE, Cortex-A77 and Cortex-M35P
  processors and the AArch64 Cortex-A34, Cortex-A65, Cortex-A65AE,
  Cortex-A76AE, and Cortex-A77 processors.
* Adds a .float16 directive for both Arm and AArch64 to allow
  encoding of 16-bit floating point literals.
* For MIPS, Add -m[no-]fix-loongson3-llsc option to fix (or not)
  Loongson3 LLSC Errata.  Add a --enable-mips-fix-loongson3-llsc=[yes|no]
  configure time option to set the default behavior. Set the default
  if the configure option is not used to 'no'.
* The Cortex-A53 Erratum 843419 workaround now supports a choice of
  which workaround to use.  The option --fix-cortex-a53-843419 now
  takes an optional argument --fix-cortex-a53-843419[=full|adr|adrp]
  which can be used to force a particular workaround to be used.
  See --help for AArch64 for more details.
* Add support for GNU_PROPERTY_AARCH64_FEATURE_1_BTI and
  GNU_PROPERTY_AARCH64_FEATURE_1_PAC  in ELF GNU program properties
  in the AArch64 ELF linker. 
* Add -z force-bti for AArch64 to enable GNU_PROPERTY_AARCH64_FEATURE_1_BTI
  on output while warning about missing GNU_PROPERTY_AARCH64_FEATURE_1_BTI 
  on inputs and use PLTs protected with BTI.
* Add -z pac-plt for AArch64 to pick PAC enabled PLTs.
* Add --source-comment[=&lt;txt&gt;] option to objdump which if present,
  provides a prefix to source code lines displayed in a disassembly.
* Add --set-section-alignment &lt;section-name&gt;=&lt;power-of-2-align&gt;
  option to objcopy to allow the changing of section alignments.
* Add --verilog-data-width option to objcopy for verilog targets to
  control width of data elements in verilog hex format.
* The separate debug info file options of readelf (--debug-dump=links
  and --debug-dump=follow) and objdump (--dwarf=links and
  --dwarf=follow-links) will now display and/or follow multiple
  links if more than one are present in a file.  (This usually
  happens when gcc's -gsplit-dwarf option is used).
  In addition objdump's --dwarf=follow-links now also affects its
  other display options, so that for example, when combined with
  --syms it will cause the symbol tables in any linked debug info
  files to also be displayed.  In addition when combined with
  --disassemble the --dwarf= follow-links option will ensure that
  any symbol tables in the linked files are read and used when
  disassembling code in the main file.
* Add support for dumping types encoded in the Compact Type Format
  to objdump and readelf.
- Includes fixes for these CVEs:
  bsc#1126826 aka CVE-2019-9077 aka PR1126826
  bsc#1126829 aka CVE-2019-9075 aka PR1126829
  bsc#1126831 aka CVE-2019-9074 aka PR24235
  bsc#1140126 aka CVE-2019-12972 aka PR23405
  bsc#1143609 aka CVE-2019-14444 aka PR24829
  bsc#1142649 aka CVE-2019-14250 aka PR90924

* Add xBPF target
* Fix various problems with DWARF 5 support in gas
* fix nm -B for objects compiled with -flto and -fcommon.

  		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1126826">SUSE bug 1126826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126829">SUSE bug 1126829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1126831">SUSE bug 1126831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140126">SUSE bug 1140126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142649">SUSE bug 1142649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143609">SUSE bug 1143609</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153768">SUSE bug 1153768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153770">SUSE bug 1153770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157755">SUSE bug 1157755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160254">SUSE bug 1160254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160590">SUSE bug 1160590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163333">SUSE bug 1163333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163744">SUSE bug 1163744</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-12972/">CVE-2019-12972</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14250/">CVE-2019-14250</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14444/">CVE-2019-14444</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17450/">CVE-2019-17450</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17451/">CVE-2019-17451</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9074/">CVE-2019-9074</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9075/">CVE-2019-9075</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-9077/">CVE-2019-9077</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497878" comment="binutils-gold-2.35-7.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110969" version="1" class="patch">
	<metadata>
		<title>Security update for sane-backends (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1172524" ref_url="https://bugzilla.suse.com/1172524" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12861" ref_url="https://www.suse.com/security/cve/CVE-2020-12861/" source="CVE"/>
		<reference ref_id="CVE-2020-12862" ref_url="https://www.suse.com/security/cve/CVE-2020-12862/" source="CVE"/>
		<reference ref_id="CVE-2020-12863" ref_url="https://www.suse.com/security/cve/CVE-2020-12863/" source="CVE"/>
		<reference ref_id="CVE-2020-12864" ref_url="https://www.suse.com/security/cve/CVE-2020-12864/" source="CVE"/>
		<reference ref_id="CVE-2020-12865" ref_url="https://www.suse.com/security/cve/CVE-2020-12865/" source="CVE"/>
		<reference ref_id="CVE-2020-12866" ref_url="https://www.suse.com/security/cve/CVE-2020-12866/" source="CVE"/>
		<reference ref_id="CVE-2020-12867" ref_url="https://www.suse.com/security/cve/CVE-2020-12867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007652.html" source="SUSE-SU"/>
		<description>
This update for sane-backends fixes the following issues:

sane-backends was updated to 1.0.31 to further improve hardware enablement for scanner devices (jsc#ECO-2418 jsc#SLE-15561 jsc#SLE-15560)
and also fix various security issues:

- CVE-2020-12861,CVE-2020-12865: Fixed an out of bounds write (bsc#1172524)
- CVE-2020-12862,CVE-2020-12863,CVE-2020-12864,: Fixed an out of bounds read (bsc#1172524)
- CVE-2020-12866,CVE-2020-12867: Fixed a null pointer dereference (bsc#1172524)

The upstream changelogs can be found here:

- https://gitlab.com/sane-project/backends/-/releases/1.0.28
- https://gitlab.com/sane-project/backends/-/releases/1.0.29
- https://gitlab.com/sane-project/backends/-/releases/1.0.30
- https://gitlab.com/sane-project/backends/-/releases/1.0.31
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172524">SUSE bug 1172524</bugzilla>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12861/">CVE-2020-12861</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12862/">CVE-2020-12862</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12863/">CVE-2020-12863</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12864/">CVE-2020-12864</cve>
	<cve impact="moderate" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12865/">CVE-2020-12865</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12866/">CVE-2020-12866</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12867/">CVE-2020-12867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497879" comment="sane-backends-32bit-1.0.31-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110970" version="1" class="patch">
	<metadata>
		<title>Security update for zeromq (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1176116" ref_url="https://bugzilla.suse.com/1176116" source="BUGZILLA"/>
		<reference ref_id="1176256" ref_url="https://bugzilla.suse.com/1176256" source="BUGZILLA"/>
		<reference ref_id="1176257" ref_url="https://bugzilla.suse.com/1176257" source="BUGZILLA"/>
		<reference ref_id="1176258" ref_url="https://bugzilla.suse.com/1176258" source="BUGZILLA"/>
		<reference ref_id="1176259" ref_url="https://bugzilla.suse.com/1176259" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15166" ref_url="https://www.suse.com/security/cve/CVE-2020-15166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007741.html" source="SUSE-SU"/>
		<description>
This update for zeromq fixes the following issues:

- CVE-2020-15166: Fixed the possibility of unauthenticated clients causing a denial-of-service (bsc#1176116).
- Fixed a heap overflow when receiving malformed ZMTP v1 packets (bsc#1176256)
- Fixed a memory leak in client induced by malicious server(s) without CURVE/ZAP (bsc#1176257)
- Fixed memory leak when processing PUB messages with metadata (bsc#1176259)
- Fixed a stack overflow in PUB/XPUB subscription store (bsc#1176258)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176116">SUSE bug 1176116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176256">SUSE bug 1176256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176257">SUSE bug 1176257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176258">SUSE bug 1176258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176259">SUSE bug 1176259</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15166/">CVE-2020-15166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009492788" comment="libunwind-32bit-1.2.1-4.2.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110971" version="1" class="patch">
	<metadata>
		<title>Security update for python-waitress (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1160790" ref_url="https://bugzilla.suse.com/1160790" source="BUGZILLA"/>
		<reference ref_id="1161088" ref_url="https://bugzilla.suse.com/1161088" source="BUGZILLA"/>
		<reference ref_id="1161089" ref_url="https://bugzilla.suse.com/1161089" source="BUGZILLA"/>
		<reference ref_id="1161670" ref_url="https://bugzilla.suse.com/1161670" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16785" ref_url="https://www.suse.com/security/cve/CVE-2019-16785/" source="CVE"/>
		<reference ref_id="CVE-2019-16786" ref_url="https://www.suse.com/security/cve/CVE-2019-16786/" source="CVE"/>
		<reference ref_id="CVE-2019-16789" ref_url="https://www.suse.com/security/cve/CVE-2019-16789/" source="CVE"/>
		<reference ref_id="CVE-2019-16792" ref_url="https://www.suse.com/security/cve/CVE-2019-16792/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007743.html" source="SUSE-SU"/>
		<description>
This update for python-waitress to 1.4.3 fixes the following security issues:

- CVE-2019-16785: HTTP request smuggling through LF vs CRLF handling (bsc#1161088).
- CVE-2019-16786: HTTP request smuggling through invalid Transfer-Encoding (bsc#1161089).
- CVE-2019-16789: HTTP request smuggling through invalid whitespace characters (bsc#1160790).
- CVE-2019-16792: HTTP request smuggling by sending the Content-Length header twice (bsc#1161670).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-10"/>
	<updated date="2020-11-10"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1160790">SUSE bug 1160790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161088">SUSE bug 1161088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161089">SUSE bug 1161089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161670">SUSE bug 1161670</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16785/">CVE-2019-16785</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16786/">CVE-2019-16786</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16789/">CVE-2019-16789</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-16792/">CVE-2019-16792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497880" comment="python2-waitress-1.4.3-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110972" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1177943" ref_url="https://bugzilla.suse.com/1177943" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14779" ref_url="https://www.suse.com/security/cve/CVE-2020-14779/" source="CVE"/>
		<reference ref_id="CVE-2020-14781" ref_url="https://www.suse.com/security/cve/CVE-2020-14781/" source="CVE"/>
		<reference ref_id="CVE-2020-14782" ref_url="https://www.suse.com/security/cve/CVE-2020-14782/" source="CVE"/>
		<reference ref_id="CVE-2020-14792" ref_url="https://www.suse.com/security/cve/CVE-2020-14792/" source="CVE"/>
		<reference ref_id="CVE-2020-14796" ref_url="https://www.suse.com/security/cve/CVE-2020-14796/" source="CVE"/>
		<reference ref_id="CVE-2020-14797" ref_url="https://www.suse.com/security/cve/CVE-2020-14797/" source="CVE"/>
		<reference ref_id="CVE-2020-14798" ref_url="https://www.suse.com/security/cve/CVE-2020-14798/" source="CVE"/>
		<reference ref_id="CVE-2020-14803" ref_url="https://www.suse.com/security/cve/CVE-2020-14803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007787.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.9-11 (October 2020 CPU,
  bsc#1177943)
  * New features
    + JDK-8250784: Shenandoah: A Low-Pause-Time Garbage Collector
  * Security fixes
    + JDK-8233624: Enhance JNI linkage
    + JDK-8236196: Improve string pooling
    + JDK-8236862, CVE-2020-14779: Enhance support of Proxy class
    + JDK-8237990, CVE-2020-14781: Enhanced LDAP contexts
    + JDK-8237995, CVE-2020-14782: Enhance certificate processing
    + JDK-8240124: Better VM Interning
    + JDK-8241114, CVE-2020-14792: Better range handling
    + JDK-8242680, CVE-2020-14796: Improved URI Support
    + JDK-8242685, CVE-2020-14797: Better Path Validation
    + JDK-8242695, CVE-2020-14798: Enhanced buffer support
    + JDK-8243302: Advanced class supports
    + JDK-8244136, CVE-2020-14803: Improved Buffer supports
    + JDK-8244479: Further constrain certificates
    + JDK-8244955: Additional Fix for JDK-8240124
    + JDK-8245407: Enhance zoning of times
    + JDK-8245412: Better class definitions
    + JDK-8245417: Improve certificate chain handling
    + JDK-8248574: Improve jpeg processing
    + JDK-8249927: Specify limits of jdk.serialProxyInterfaceLimit
    + JDK-8253019: Enhanced JPEG decoding
  * Other changes
    + JDK-6532025: GIF reader throws misleading exception with
      truncated images
    + JDK-6949753: [TEST BUG]: java/awt/print/PageFormat/
      /PDialogTest.java needs update by removing an infinite loop
    + JDK-8022535: [TEST BUG] javax/swing/text/html/parser/
      /Test8017492.java fails
    + JDK-8062947: Fix exception message to correctly represent
      LDAP connection failure
    + JDK-8067354: com/sun/jdi/GetLocalVariables4Test.sh failed
    + JDK-8134599: TEST_BUG: java/rmi/transport/closeServerSocket/
      /CloseServerSocket.java fails intermittently with Address
      already in use
    + JDK-8151678: com/sun/jndi/ldap/LdapTimeoutTest.java failed
      due to timeout on DeadServerNoTimeoutTest is incorrect
    + JDK-8160768: Add capability to custom resolve host/domain
      names within the default JNDI LDAP provider
    + JDK-8172404: Tools should warn if weak algorithms are used
      before restricting them
    + JDK-8193367: Annotated type variable bounds crash javac
    + JDK-8202117: com/sun/jndi/ldap/RemoveNamingListenerTest.java
      fails intermittently: Connection reset
    + JDK-8203026: java.rmi.NoSuchObjectException: no such object
      in table
    + JDK-8203281: [Windows] JComboBox change in ui when
      editor.setBorder() is called
    + JDK-8203382: Rename SystemDictionary::initialize_wk_klass to
      resolve_wk_klass
    + JDK-8203393: com/sun/jdi/JdbMethodExitTest.sh and
      JdbExprTest.sh fail due to timeout
    + JDK-8203928: [Test] Convert non-JDB scaffolding
      serviceability shell script tests to java
    + JDK-8204963: javax.swing.border.TitledBorder has a memory leak
    + JDK-8204994: SA might fail to attach to process with 'Windbg
      Error: WaitForEvent failed'
    + JDK-8205534: Remove SymbolTable dependency from
      serviceability agent
    + JDK-8206309: Tier1 SA tests fail
    + JDK-8208281: java/nio/channels/
      /AsynchronousSocketChannel/Basic.java timed out
    + JDK-8209109: [TEST] rewrite com/sun/jdi shell tests to java
      version - step1
    + JDK-8209332: [TEST] test/jdk/com/sun/jdi/CatchPatternTest.sh
      is incorrect
    + JDK-8209342: Problemlist SA tests on Solaris due to Error
      attaching to process: Can't create thread_db agent!
    + JDK-8209343: Test javax/swing/border/TestTitledBorderLeak.java
      should be marked as headful
    + JDK-8209517: com/sun/jdi/BreakpointWithFullGC.java fails with
      timeout
    + JDK-8209604: [TEST] rewrite com/sun/jdi shell tests to java
      version - step2
    + JDK-8209605: com/sun/jdi/BreakpointWithFullGC.java fails with
      ZGC
    + JDK-8209608: Problem list com/sun/jdi/BreakpointWithFullGC.java
    + JDK-8210131: vmTestbase/nsk/jvmti/scenarios/allocation/AP10/
      /ap10t001/TestDescription.java failed with ObjectFree:
      GetCurrentThreadCpuTimerInfo returned unexpected error code
    + JDK-8210243: [TEST] rewrite com/sun/jdi shell tests to java
      version - step3
    + JDK-8210527: JShell: NullPointerException in
      jdk.jshell.Eval.translateExceptionStack
    + JDK-8210560: [TEST] convert com/sun/jdi redefineClass-related
      tests
    + JDK-8210725: com/sun/jdi/RedefineClearBreakpoint.java fails
      with waitForPrompt timed out after 60 seconds
    + JDK-8210748: [TESTBUG] lib.jdb.Jdb.waitForPrompt() should
      clarify which output is the pending reply after a timeout
    + JDK-8210760: [TEST] rewrite com/sun/jdi shell tests to java
      version - step4
    + JDK-8210977: jdk/jfr/event/oldobject/TestThreadLocalLeak.java
      fails to find ThreadLocalObject
    + JDK-8211292: [TEST] convert com/sun/jdi/DeferredStepTest.sh
      test
    + JDK-8211694: JShell: Redeclared variable should be reset
    + JDK-8212200: assert when shared java.lang.Object is redefined
      by JVMTI agent
    + JDK-8212629: [TEST] wrong breakpoint in
      test/jdk/com/sun/jdi/DeferredStepTest
    + JDK-8212665: com/sun/jdi/DeferredStepTest.java: jj1 (line 57)
      - unexpected. lastLine=52, minLine=52, maxLine=55
    + JDK-8212807: tools/jar/multiRelease/Basic.java times out
    + JDK-8213182: Minimal VM build failure after JDK-8212200
      (assert when shared java.lang.Object is redefined by JVMTI
      agent)
    + JDK-8213214: Set -Djava.io.tmpdir= when running tests
    + JDK-8213275: ReplaceCriticalClasses.java fails with
      jdk.internal.vm.PostVMInitHook not found
    + JDK-8213574: Deadlock in string table expansion when dumping
      lots of CDS classes
    + JDK-8213703: LambdaConversionException: Invalid receiver type
      not a subtype of implementation type interface
    + JDK-8214074: Ghash optimization using AVX instructions
    + JDK-8214491: Upgrade to JLine 3.9.0
    + JDK-8214797: TestJmapCoreMetaspace.java timed out
    + JDK-8215243: JShell tests failing intermitently with
      'Problem cleaning up the following threads:'
    + JDK-8215244: jdk/jshell/ToolBasicTest.java
      testHistoryReference failed
    + JDK-8215354: x86_32 build failures after JDK-8214074 (Ghash
      optimization using AVX instructions)
    + JDK-8215438: jshell tool: Ctrl-D causes EOF
    + JDK-8216021: RunTest.gmk might set concurrency level to 1 on
      Windows
    + JDK-8216974: HttpConnection not returned to the pool after
      204 response
    + JDK-8218948: SimpleDateFormat :: format - Zone Names are not
      reflected correctly during run time
    + JDK-8219712: code_size2 (defined in stub_routines_x86.hpp) is
      too small on new Skylake CPUs
    + JDK-8220150: macos10.14 Mojave returns anti-aliased glyphs
      instead of aliased B&amp;W glyphs
    + JDK-8221658: aarch64: add necessary predicate for ubfx
      patterns
    + JDK-8221759: Crash when completing 'java.io.File.path'
    + JDK-8221918: runtime/SharedArchiveFile/serviceability/
      /ReplaceCriticalClasses.java fails: Shared archive not found
    + JDK-8222074: Enhance auto vectorization for x86
    + JDK-8222079: Don't use memset to initialize fields decode_env
      constructor in disassembler.cpp
    + JDK-8222769: [TESTBUG] TestJFRNetworkEvents should not rely
      on hostname command
    + JDK-8223688: JShell: crash on the instantiation of raw
      anonymous class
    + JDK-8223777: In posix_spawn mode, failing to exec()
      jspawnhelper does not result in an error
    + JDK-8223940: Private key not supported by chosen signature
      algorithm
    + JDK-8224184: jshell got IOException at exiting with AIX
    + JDK-8224234: compiler/codegen/TestCharVect2.java fails in
      test_mulc
    + JDK-8225037: java.net.JarURLConnection::getJarEntry() throws
      NullPointerException
    + JDK-8225625: AES Electronic Codebook (ECB) encryption and
      decryption optimization using AVX512 + VAES instructions
    + JDK-8226536: Catch OOM from deopt that fails rematerializing
      objects
    + JDK-8226575: OperatingSystemMXBean should be made container
      aware
    + JDK-8226697: Several tests which need the @key headful
      keyword are missing it.
    + JDK-8226809: Circular reference in printed stack trace is not
      correctly indented &amp; ambiguous
    + JDK-8227059: sun/security/tools/keytool/
      /DefaultSignatureAlgorithm.java timed out
    + JDK-8227269: Slow class loading when running with JDWP
    + JDK-8227595: keytool/fakegen/DefaultSignatureAlgorithm.java
      fails due to 'exitValue = 6'
    + JDK-8228448: Jconsole can't connect to itself
    + JDK-8228967: Trust/Key store and SSL context utilities for
      tests
    + JDK-8229378: jdwp library loader in linker_md.c quietly
      truncates on buffer overflow
    + JDK-8229815: Upgrade Jline to 3.12.1
    + JDK-8230000: some httpclients testng tests run zero test
    + JDK-8230002: javax/xml/jaxp/unittest/transform/
      /SecureProcessingTest.java runs zero test
    + JDK-8230010: Remove jdk8037819/BasicTest1.java
    + JDK-8230094: CCE in createXMLEventWriter(Result) over an
      arbitrary XMLStreamWriter
    + JDK-8230402: Allocation of compile task fails with assert:
      'Leaking compilation tasks?'
    + JDK-8230767: FlightRecorderListener returns null recording
    + JDK-8230870: (zipfs) Add a ZIP FS test that is similar to
      test/jdk/java/util/zip/EntryCount64k.java
    + JDK-8231209: [REDO] ThreadMXBean::getThreadAllocatedBytes()
      can be quicker for self thread
    + JDK-8231586: enlarge encoding space for OopMapValue offsets
    + JDK-8231953: Wrong assumption in assertion in
      oop::register_oop
    + JDK-8231968: getCurrentThreadAllocatedBytes default
      implementation s/b getThreadAllocatedBytes
    + JDK-8232083: Minimal VM is broken after JDK-8231586
    + JDK-8232161: Align some one-way conversion in MS950 charset
      with Windows
    + JDK-8232855: jshell missing word in /help help
    + JDK-8233027: OopMapSet::all_do does oms.next() twice during
      iteration
    + JDK-8233228: Disable weak named curves by default in TLS,
      CertPath, and Signed JAR
    + JDK-8233386: Initialize NULL fields for unused decorations
    + JDK-8233452: java.math.BigDecimal.sqrt() with
      RoundingMode.FLOOR results in incorrect result
    + JDK-8233686: XML transformer uses excessive amount of memory
    + JDK-8233741: AES Countermode (AES-CTR) optimization using
      AVX512 + VAES instructions
    + JDK-8233829: javac cannot find non-ASCII module name under
      non-UTF8 environment
    + JDK-8233958: Memory retention due to HttpsURLConnection
      finalizer that serves no purpose
    + JDK-8234011: (zipfs) Memory leak in
      ZipFileSystem.releaseDeflater()
    + JDK-8234058: runtime/CompressedOops/
      /CompressedClassPointers.java fails with 'Narrow klass base:
      0x0000000000000000' missing from stdout/stderr
    + JDK-8234149: Several regression tests do not dispose Frame at
      end
    + JDK-8234347: 'Turkey' meta time zone does not generate
      composed localized names
    + JDK-8234385: [TESTBUG] java/awt/EventQueue/6980209/
      /bug6980209.java fails in linux nightly
    + JDK-8234535: Cross compilation fails due to missing CFLAGS
      for the BUILD_CC
    + JDK-8234541: C1 emits an empty message when it inlines
      successfully
    + JDK-8234687: change javap reporting on unknown attributes
    + JDK-8236464: SO_LINGER option is ignored by SSLSocket in JDK
      11
    + JDK-8236548: Localized time zone name inconsistency between
      English and other locales
    + JDK-8236617: jtreg test containers/docker/
      /TestMemoryAwareness.java fails after 8226575
    + JDK-8237182: Update copyright header for shenandoah and
      epsilon files
    + JDK-8237888: security/infra/java/security/cert/
      /CertPathValidator/certification/LuxTrustCA.java fails when
      checking validity interval
    + JDK-8237977: Further update
      javax/net/ssl/compatibility/Compatibility.java
    + JDK-8238270: java.net HTTP/2 client does not decrease stream
      count when receives 204 response
    + JDK-8238284: [macos] Zero VM build fails due to an obvious
      typo
    + JDK-8238380: java.base/unix/native/libjava/childproc.c
      'multiple definition' link errors with GCC10
    + JDK-8238386: (sctp) jdk.sctp/unix/native/libsctp/SctpNet.c
      'multiple definition' link errors with GCC10
    + JDK-8238388: libj2gss/NativeFunc.o 'multiple definition' link
      errors with GCC10
    + JDK-8238448: RSASSA-PSS signature verification fail when
      using certain odd key sizes
    + JDK-8238710: LingeredApp doesn't log stdout/stderr if exits
      with non-zero code
    + JDK-8239083: C1 assert(known_holder == NULL ||
      (known_holder-&gt;is_instance_klass() &amp;&amp;
      (!known_holder-&gt;is_interface() ||
      ((ciInstanceKlass*)known_holder)-&gt;has_nonstatic_concrete_methods())),
      'should be non-static concrete method');
    + JDK-8239385: KerberosTicket client name refers wrongly to
      sAMAccountName in AD
    + JDK-8240169: javadoc fails to link to non-modular api docs
    + JDK-8240295: hs_err elapsed time in seconds is not accurate
      enough
    + JDK-8240360: NativeLibraryEvent has wrong library name on
      Linux
    + JDK-8240676: Meet not symmetric failure when running lucene
      on jdk8
    + JDK-8241007: Shenandoah: remove
      ShenandoahCriticalControlThreadPriority support
    + JDK-8241065: Shenandoah: remove leftover code after
      JDK-8231086
    + JDK-8241086: Test runtime/NMT/HugeArenaTracking.java is
      failing on 32bit Windows
    + JDK-8241130: com.sun.jndi.ldap.EventSupport.removeDeadNotifier:
      java.lang.NullPointerException
    + JDK-8241138: http.nonProxyHosts=* causes
      StringIndexOutOfBoundsException in DefaultProxySelector
    + JDK-8241319: WB_GetCodeBlob doesn't have ResourceMark
    + JDK-8241478: vmTestbase/gc/gctests/Steal/steal001/steal001.java
      fails with OOME
    + JDK-8241574: Shenandoah: remove ShenandoahAssertToSpaceClosure
    + JDK-8241750: x86_32 build failure after JDK-8227269
    + JDK-8242184: CRL generation error with RSASSA-PSS
    + JDK-8242283: Can't start JVM when java home path includes
      non-ASCII character
    + JDK-8242556: Cannot load RSASSA-PSS public key with non-null
      params from byte array
    + JDK-8243029: Rewrite javax/net/ssl/compatibility/
      /Compatibility.java with a flexible interop test framework
    + JDK-8243138: Enhance BaseLdapServer to support starttls
      extended request
    + JDK-8243320: Add SSL root certificates to Oracle Root CA
      program
    + JDK-8243321: Add Entrust root CA - G4 to Oracle Root CA
      program
    + JDK-8243389: enhance os::pd_print_cpu_info on linux
    + JDK-8243453: java --describe-module failed with non-ASCII
      module name under non-UTF8 environment
    + JDK-8243470: [macos] bring back O2 opt level for unsafe.cpp
    + JDK-8243489: Thread CPU Load event may contain wrong data for
      CPU time under certain conditions
    + JDK-8243925: Toolkit#getScreenInsets() returns wrong value on
      HiDPI screens (Windows)
    + JDK-8244087: 2020-04-24 public suffix list update
    + JDK-8244151: Update MUSCLE PC/SC-Lite headers to the latest
      release 1.8.26
    + JDK-8244164: AArch64: jaotc generates incorrect code for
      compressed OOPs with non-zero heap base
    + JDK-8244196: adjust output in os_linux
    + JDK-8244225: stringop-overflow warning on strncpy call from
      compile_the_world_in
    + JDK-8244287: JFR: Methods samples have line number 0
    + JDK-8244703: 'platform encoding not initialized' exceptions
      with debugger, JNI
    + JDK-8244719: CTW: C2 compilation fails with
      'assert(!VerifyHashTableKeys || _hash_lock == 0) failed:
      remove node from hash table before modifying it'
    + JDK-8244729: Shenandoah: remove resolve paths from
      SBSA::generate_shenandoah_lrb
    + JDK-8244763: Update --release 8 symbol information after JSR
      337 MR3
    + JDK-8244818: Java2D Queue Flusher crash while moving
      application window to external monitor
    + JDK-8245151: jarsigner should not raise duplicate warnings on
      verification
    + JDK-8245616: Bump update version for OpenJDK: jdk-11.0.9
    + JDK-8245714: 'Bad graph detected in build_loop_late' when
      loads are pinned on loop limit check uncommon branch
    + JDK-8245801: StressRecompilation triggers assert 'redundunt
      OSR recompilation detected. memory leak in CodeCache!'
    + JDK-8245832: JDK build make-static-libs should build all JDK
      libraries
    + JDK-8245880: Shenandoah: check class unloading flag early in
      concurrent code root scan
    + JDK-8245981: Upgrade to jQuery 3.5.1
    + JDK-8246027: Minimal fastdebug build broken after JDK-8245801
    + JDK-8246094: [macos] Sound Recording and playback is not
      working
    + JDK-8246153: TestEliminateArrayCopy fails with
      -XX:+StressReflectiveCode
    + JDK-8246193: Possible NPE in ENC-PA-REP search in AS-REQ
    + JDK-8246196: javax/management/MBeanServer/OldMBeanServerTest
      fails with AssertionError
    + JDK-8246203: Segmentation fault in verification due to stack
      overflow with -XX:+VerifyIterativeGVN
    + JDK-8246330: Add TLS Tests for Legacy ECDSA curves
    + JDK-8246453: TestClone crashes with 'all collected exceptions
      must come from the same place'
    + JDK-8247246: Add explicit ResolvedJavaType.link and expose
      presence of default methods
    + JDK-8247350: [aarch64] assert(false) failed: wrong size of
      mach node
    + JDK-8247502: PhaseStringOpts crashes while optimising
      effectively dead code
    + JDK-8247615: Initialize the bytes left for the heap sampler
    + JDK-8247824: CTW: C2 (Shenandoah) compilation fails with SEGV
      in SBC2Support::pin_and_expand
    + JDK-8247874: Replacement in VersionProps.java.template not
      working when --with-vendor-bug-url contains '&amp;'
    + JDK-8247979: aarch64: missing side effect of killing flags
      for clearArray_reg_reg
    + JDK-8248214: Add paddings for TaskQueueSuper to reduce
      false-sharing cache contention
    + JDK-8248219: aarch64: missing memory barrier in
      fast_storefield and fast_accessfield
    + JDK-8248348: Regression caused by the update to BCEL 6.0
    + JDK-8248385: [testbug][11u] Adapt TestInitiExceptions to
      jtreg 5.1
    + JDK-8248495: [macos] zerovm is broken due to libffi headers
      location
    + JDK-8248851: CMS: Missing memory fences between free chunk
      check and klass read
    + JDK-8248987: AOT's Linker.java seems to eagerly fail-fast on
      Windows
    + JDK-8249159: Downport test rework for SSLSocketTemplate from
      8224650
    + JDK-8249215: JFrame::setVisible crashed with
      -Dfile.encoding=UTF-8 on Japanese Windows.
    + JDK-8249251: [dark_mode ubuntu 20.04] The selected menu is
      not highlighted in GTKLookAndFeel
    + JDK-8249255: Build fails if source code in cygwin home dir
    + JDK-8249277: TestVerifyIterativeGVN.java is failing with
      timeout in OpenJDK 11
    + JDK-8249278: Revert JDK-8226253 which breaks the spec of
      AccessibleState.SHOWING for JList
    + JDK-8249560: Shenandoah: Fix racy GC request handling
    + JDK-8249801: Shenandoah: Clear soft-refs on requested GC cycle
    + JDK-8249953: Shenandoah: gc/shenandoah/mxbeans tests should
      account for corner cases
    + JDK-8250582: Revert Principal Name type to NT-UNKNOWN when
      requesting TGS Kerberos tickets
    + JDK-8250609: C2 crash in IfNode::fold_compares
    + JDK-8250627: Use -XX:+/-UseContainerSupport for
      enabling/disabling Java container metrics
    + JDK-8250755: Better cleanup for
      jdk/test/javax/imageio/plugins/shared/CanWriteSequence.java
    + JDK-8250787: Provider.put no longer registering aliases in
      FIPS env
    + JDK-8250826: jhsdb does not work with coredump which comes
      from Substrate VM
    + JDK-8250827: Shenandoah: needs to reset/finish StringTable's
      dead count before/after parallel walk
    + JDK-8250844: Make sure {type,obj}ArrayOopDesc accessors check
      the bounds
    + JDK-8251117: Cannot check P11Key size in P11Cipher and
      P11AEADCipher
    + JDK-8251354: Shenandoah: Fix jdk/jfr/tool/TestPrintJSON.java
      test failure
    + JDK-8251451: Shenandoah: Remark ObjectSynchronizer roots with
      I-U
    + JDK-8251469: Better cleanup for
      test/jdk/javax/imageio/SetOutput.java
    + JDK-8251487: Shenandoah: missing detail timing tracking for
      final mark cleaning phase
    + JDK-8252120: compiler/oracle/TestCompileCommand.java
      misspells 'occured'
    + JDK-8252157: JDK-8231209 11u backport breaks jmm binary
      compatibility
    + JDK-8252258: [11u] JDK-8242154 changes the default vendor
    + JDK-8252804: [test] Fix 'ReleaseDeflater.java' test after
      downport of 8234011
    + JDK-8253134: JMM_VERSION should remain at 0x20020000 (JDK 10)
      in JDK 11
    + JDK-8253283: [11u] Test build/translations/
      /VerifyTranslations.java failing after JDK-8252258
    + JDK-8253813: Backout JDK-8244287 from 11u: it causes several
      crashes
    + Fix regression '8250861: Crash in MinINode::Ideal(PhaseGVN*,
      bool)' introduced in jdk 11.0.9
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-17"/>
	<updated date="2020-11-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177943">SUSE bug 1177943</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14779/">CVE-2020-14779</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14781/">CVE-2020-14781</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14782/">CVE-2020-14782</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14792/">CVE-2020-14792</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14796/">CVE-2020-14796</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14797/">CVE-2020-14797</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14798/">CVE-2020-14798</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14803/">CVE-2020-14803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497881" comment="java-11-openjdk-javadoc-11.0.9.0-3.48.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110973" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007855.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497882" comment="libvncserver0-0.9.10-4.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110974" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1180099" ref_url="https://bugzilla.suse.com/1180099" source="BUGZILLA"/>
		<reference ref_id="1180112" ref_url="https://bugzilla.suse.com/1180112" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0487" ref_url="https://www.suse.com/security/cve/CVE-2020-0487/" source="CVE"/>
		<reference ref_id="CVE-2020-0499" ref_url="https://www.suse.com/security/cve/CVE-2020-0499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2020-0487: Fixed a memory leak (bsc#1180112).
- CVE-2020-0499: Fixed an out-of-bounds access (bsc#1180099).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-24"/>
	<updated date="2020-12-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180099">SUSE bug 1180099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180112">SUSE bug 1180112</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0487/">CVE-2020-0487</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0499/">CVE-2020-0499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497883" comment="flac-1.3.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497884" comment="libFLAC8-32bit-1.3.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110975" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1162501" ref_url="https://bugzilla.suse.com/1162501" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20446" ref_url="https://www.suse.com/security/cve/CVE-2019-20446/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0629-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007091.html" source="SUSE-SU"/>
		<description>
This update for librsvg to version 2.42.8 fixes the following issues:

librsvg was updated to version 2.42.8 fixing the following issues:	  

- CVE-2019-20446: Fixed an issue where a crafted SVG file with nested
  patterns can cause denial of service (bsc#1162501).
  NOTE: Librsvg now has limits on the number of loaded XML elements,
  and the number of referenced elements within an SVG document. 
- Fixed a stack exhaustion with circular references in &lt;use&gt;
  elements.
- Fixed a denial-of-service condition from exponential explosion
  of rendered elements, through nested use of SVG 'use' elements in
  malicious SVGs.  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-07"/>
	<updated date="2020-07-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1162501">SUSE bug 1162501</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20446/">CVE-2019-20446</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497887" comment="rsvg-view-2.42.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110976" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008202.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497892" comment="php7-embed-7.4.6-3.14.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110977" version="1" class="patch">
	<metadata>
		<title>Security update for librsvg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1148293" ref_url="https://bugzilla.suse.com/1148293" source="BUGZILLA"/>
		<reference ref_id="1181571" ref_url="https://bugzilla.suse.com/1181571" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20991" ref_url="https://www.suse.com/security/cve/CVE-2018-20991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008674.html" source="SUSE-SU"/>
		<description>
This update for librsvg fixes the following issues:

- librsvg was updated to 2.42.9:
  * Update dependent crates that had security vulnerabilities:
    smallvec to 0.6.14 - RUSTSEC-2018-0003 - CVE-2018-20991 (bsc#1148293)
-the bundled version of the cssparser crate now builds correctly on Rust 1.43 (bsc#1181571).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-23"/>
	<updated date="2021-04-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1148293">SUSE bug 1148293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181571">SUSE bug 1181571</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2018-20991/">CVE-2018-20991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497893" comment="rsvg-view-2.42.9-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110978" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1184521" ref_url="https://bugzilla.suse.com/1184521" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3468" ref_url="https://www.suse.com/security/cve/CVE-2021-3468/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008736.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-3468: avoid infinite loop by handling  HUP event in client_work (bsc#1184521).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184521">SUSE bug 1184521</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3468/">CVE-2021-3468</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497894" comment="python3-avahi-0.7-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110979" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1183169" ref_url="https://bugzilla.suse.com/1183169" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20270" ref_url="https://www.suse.com/security/cve/CVE-2021-20270/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008728.html" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-20270: Fixed an infinite loop in SML lexer which may lead to DoS (bsc#1183169)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183169">SUSE bug 1183169</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20270/">CVE-2021-20270</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497895" comment="python2-Pygments-2.2.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110980" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1184606" ref_url="https://bugzilla.suse.com/1184606" source="BUGZILLA"/>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1185056" ref_url="https://bugzilla.suse.com/1185056" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2161" ref_url="https://www.suse.com/security/cve/CVE-2021-2161/" source="CVE"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008756.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to upstream tag jdk-11.0.11+9 (April 2021 CPU)
  * CVE-2021-2163: Fixed incomplete enforcement of JAR signing disabled algorithms (bsc#1185055)
  * CVE-2021-2161: Fixed incorrect handling of partially quoted arguments in ProcessBuilder (bsc#1185056)
- moved mozilla-nss dependency to java-11-openjdk-headless package, this is necessary to be able to do crypto 
  with just java-11-openjdk-headless installed (bsc#1184606).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184606">SUSE bug 1184606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185056">SUSE bug 1185056</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2161/">CVE-2021-2161</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497896" comment="java-11-openjdk-javadoc-11.0.11.0-3.56.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110981" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1185895" ref_url="https://bugzilla.suse.com/1185895" source="BUGZILLA"/>
		<reference ref_id="1185900" ref_url="https://bugzilla.suse.com/1185900" source="BUGZILLA"/>
		<reference ref_id="1185904" ref_url="https://bugzilla.suse.com/1185904" source="BUGZILLA"/>
		<reference ref_id="1185905" ref_url="https://bugzilla.suse.com/1185905" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32490" ref_url="https://www.suse.com/security/cve/CVE-2021-32490/" source="CVE"/>
		<reference ref_id="CVE-2021-32491" ref_url="https://www.suse.com/security/cve/CVE-2021-32491/" source="CVE"/>
		<reference ref_id="CVE-2021-32492" ref_url="https://www.suse.com/security/cve/CVE-2021-32492/" source="CVE"/>
		<reference ref_id="CVE-2021-32493" ref_url="https://www.suse.com/security/cve/CVE-2021-32493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008792.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-32490 [bsc#1185895]: Out of bounds write in function DJVU:filter_bv() via crafted djvu file
- CVE-2021-32491 [bsc#1185900]: Integer overflow in function render() in tools/ddjvu via crafted djvu file
- CVE-2021-32492 [bsc#1185904]: Out of bounds read in function DJVU:DataPool:has_data() via crafted djvu file
- CVE-2021-32493 [bsc#1185905]: Heap buffer overflow in function DJVU:GBitmap:decode() via crafted djvu file
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185895">SUSE bug 1185895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185900">SUSE bug 1185900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185904">SUSE bug 1185904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185905">SUSE bug 1185905</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32490/">CVE-2021-32490</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32491/">CVE-2021-32491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32492/">CVE-2021-32492</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32493/">CVE-2021-32493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497897" comment="djvulibre-3.5.27-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110982" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497898" comment="graphviz-gnome-2.40.1-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110983" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 fixes the following issues:

This update ships postgresql13.

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

- bsc#1178961: %ghost the symlinks to pg_config and ecpg.

Changes in postgresql wrapper package:

- Bump major version to 13.
- We also transfer PostgreSQL 9.4.26 to the new package layout in
  SLE12-SP2 and newer. Reflect this in the conflict with
  postgresql94.
- Also conflict with PostgreSQL versions before 9.
- Conflicting with older versions is not limited to SLE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-20"/>
	<updated date="2021-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497899" comment="postgresql-test-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497900" comment="postgresql13-test-13.1-5.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110984" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497901" comment="postgresql13-test-13.3-5.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110985" version="1" class="patch">
	<metadata>
		<title>Security update for python-httplib2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1171998" ref_url="https://bugzilla.suse.com/1171998" source="BUGZILLA"/>
		<reference ref_id="1182053" ref_url="https://bugzilla.suse.com/1182053" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11078" ref_url="https://www.suse.com/security/cve/CVE-2020-11078/" source="CVE"/>
		<reference ref_id="CVE-2021-21240" ref_url="https://www.suse.com/security/cve/CVE-2021-21240/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008895.html" source="SUSE-SU"/>
		<description>
This update for python-httplib2 fixes the following issues:

- Update to version 0.19.0 (bsc#1182053).
- CVE-2021-21240: Fixed regular expression denial of service via malicious header (bsc#1182053).
- CVE-2020-11078: Fixed unescaped part of uri where an attacker could change request headers and body (bsc#1182053).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171998">SUSE bug 1171998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182053">SUSE bug 1182053</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11078/">CVE-2020-11078</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21240/">CVE-2021-21240</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497902" comment="python2-httplib2-0.19.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110986" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<description>
This update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly fixes the following issues:

gstreamer was updated to version 1.16.3 (bsc#1181255):

- delay creation of threadpools
- bin: Fix `deep-element-removed` log message
- buffer: fix meta sequence number fallback on rpi
- bufferlist: foreach: always remove as parent if buffer is changed
- bus: Make setting/replacing/clearing the sync handler thread-safe
- elementfactory: Fix missing features in case a feature moves to another filename
- element: When removing a ghost pad also unset its target
- meta: intern registered impl string
- registry: Use a toolchain-specific registry file on Windows
- systemclock: Invalid internal time calculation causes non-increasing clock time on Windows
- value: don't write to `const char *`
- value: Fix segfault comparing empty GValueArrays
- Revert floating enforcing
- aggregator: fix iteration direction in skip_buffers
- sparsefile: fix possible crash when seeking
- baseparse: cache fix
- baseparse: fix memory leak when subclass skips whole input buffer
- baseparse: Set the private duration before posting a duration-changed message
- basetransform: allow not passthrough if generate_output is implemented
- identity: Fix a minor leak using meta_str
- queue: protect against lost wakeups for iterm_del condition
- queue2: Avoid races when posting buffering messages
- queue2: Fix missing/dropped buffering messages at startup
- identity: Unblock condition variable on FLUSH_START
- check: Use `g_thread_yield()` instead of `g_usleep(1)`
- tests: use cpu_family for arch checks
- gst-launch: Follow up to missing `s/g_print/gst_print/g`
- gst-inspect: Add define guard for `g_log_writer_supports_color()`
- gst-launch: go back down to `GST_STATE_NULL` in one step.
- device-monitor: list hidden providers before listing devices
- autotools build fixes for GNU make 4.3

gstreamer-plugins-good was updated to version 1.16.3 (bsc#1181255):

- deinterlace: on-the-fly renegotiation
- flacenc: Pass audio info from set_format() to query_total_samples() explicitly
- flacparse: fix broken reordering of flac metadata
- jack: Use jack_free(3) to release ports
- jpegdec: check buffer size before dereferencing
- pulse: fix discovery of newly added devices
- qtdemux fuzzing fixes
- qtdemux: Add 'mp3 ' fourcc that VLC seems to produce now
- qtdemux: Specify REDIRECT information in error message
- rtpbin: fix shutdown crash in rtpbin
- rtpsession: rename RTCP thread
- rtpvp8pay, rtpvp9pay: fix caps leak in set_caps()
- rtpjpegdepay: outputs framed jpeg
- rtpjitterbuffer: Properly free internal packets queue in finalize()
- rtspsrc: Don't return TRUE for unhandled query
- rtspsrc: Avoid stack overflow recursing waiting for response
- rtspsrc: Use the correct type for storing the max-rtcp-rtp-time-diff property
- rtspsrc: Error out when failling to receive message response
- rtspsrc: Fix for segmentation fault when handling set/get_parameter requests
- speex: Fix crash on Windows caused by cross-CRT issue
- speexdec: Crash when stopping the pipeline
- splitmuxsrc: Properly stop the loop if no part reader is present
- use gst_element_class_set_metadata when passing dynamic strings
- v4l2videodec: Increase internal bitstream pool size
- v4l2: fix crash when handling unsupported video format
- videocrop: allow properties to be animated by GstController
- videomixer: Don't leak peer caps
- vp8enc/vp8enc: set 1 for the default value of VP8E_SET_STATIC_THRESHOLD
- wavenc: Fix writing of the channel mask with &gt;2 channels

gstreamer-plugins-bad was updated to version 1.16.3 (bsc#1181255):

- amcvideodec: fix sync meta copying not taking a reference
- audiobuffersplit: Perform discont tracking on running time
- audiobuffersplit: Specify in the template caps that only interleaved audio is supported
- audiobuffersplit: Unset DISCONT flag if not discontinuous
- autoconvert: Fix lock-less exchange or free condition
- autoconvert: fix compiler warnings with g_atomic on recent GLib versions
- avfvideosrc: element requests camera permissions even with capture-screen property is true
- codecparsers: h264parser: guard against ref_pic_markings overflow
- dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
- dtls/connection: fix EOF handling with openssl 1.1.1e
- fdkaacdec: add support for mpegversion=2
- hls: Check nettle version to ensure AES128 support
- ipcpipeline: Rework compiler checks
- interlace: Increment phase_index before checking if we're at the end of the phase
- lv2: Make it build with -fno-common
- h264parser: Do not allocate too large size of memory for registered user data SEI
- ladspa: fix unbounded integer properties
- modplug: avoid division by zero
- msdkdec: Fix GstMsdkContext leak
- msdkenc: fix leaks on windows
- musepackdec: Don't fail all queries if no sample rate is known yet
- openslessink: Allow openslessink to handle 48kHz streams.
- opencv: allow compilation against 4.2.x
- proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
- vulkan: Drop use of VK_RESULT_BEGIN_RANGE
- wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
- wasapi: Fix possible deadlock while downwards state change
- waylandsink: Clear window when pipeline is stopped
- webrtc: Support non-trickle ICE candidates in the SDP
- webrtc: Unmap all non-binary buffers received via the datachannel
- meson: build with neon 0.31
- Drop upstream fixed patch: gstreamer-h264parser-fix-overflow.patch

- h264parser: guard against ref_pic_markings overflow
  (bsc#1181255 CVE-2021-3185)

- Disable the kate/libtiger plugin.  Kate streams for karaoke are not
  used anymore, and the source tarball for libtiger is no longer
  available upstream. (jsc#SLE-13843)

gstreamer-plugins-ugly was updated to version 1.16.3 (bsc#1181255):

+ x264enc: corrected em_data value in CEA-708 CC SEI message

gstreamer-plugins-base was updated to version 1.16.3 (bsc#1181255):

- audioaggregator: Check all downstream allowed caps structures if they support the upstream rate
- audioaggregator: Fix negotiation with downstream if there is no peer yet
- audioencoder: fix segment event leak
- discoverer: Fix caps handling in `pad-added` signal handler
- discoverer: Start discovering next URI from right thread
- fft: Update our kiss fft version, fixes thread-safety and concurrency issues and misc other things
- gl: numerous memory fixes (use-after-free, leaks, missing NULL-ify)
- gl/display/egl: ensure debug category is initialized
- gstglwindow_x11: fix resize
- pbutils: Add latest H.264 level values
- rtpbuffer: fix header extension length validation
- video: Fix NV12_64Z32 number of component
- video-format: RGB16/15 are not 16 bit per component but only 5.333 and 5
- video: fix top/bottom field flags
- videodecoder: don't copy interlace-mode from reference state
- appsrc/appsink: Make setting/replacing callbacks thread-safe
- compositor: Fix checkerboard filling for BGRx/RGBx and UYVY/YUY2/YVYU
- decodebin3: only force streams-selected seqnum after a select-streams
- glupload: Fix fallback from direct dmabuf to dmabuf upload method
- glvideomixer: perform `_get_highest_precision()` on the GL thread
- libvisual: use `gst_element_class_set_metadata()` when passing dynamic strings
- oggstream: Workaround for broken PAR in VP8 BOS
- subparse: accept WebVTT timestamps without an hour component
- playbin: Handle error message with redirection indication
- textrender: Fix AYUV output.
- typefind: Consider MPEG-PS PSM to be a PES type
- uridecodebin3: default to non-0 buffer-size and buffer-duration, otherwise it could potentially cause big memory allocations over time
- videoaggregator: Don't configure NULL chroma-site/colorimetry
- videorate/videoscale/audioresample: Ensure that the caps returned from...
- build: Replace bashisms in configure for Wayland and GLES3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497903" comment="gstreamer-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497904" comment="libgstaudio-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497905" comment="libgstreamer-1_0-0-32bit-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497906" comment="libgsttag-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497907" comment="libgstvideo-1_0-0-32bit-1.16.3-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110987" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185688" ref_url="https://bugzilla.suse.com/1185688" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2020-36328: Fixed heap-based buffer overflow in WebPDecode*Into functions (bsc#1185688).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185688">SUSE bug 1185688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497908" comment="libwebp6-32bit-0.5.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110988" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1186253" ref_url="https://bugzilla.suse.com/1186253" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3500" ref_url="https://www.suse.com/security/cve/CVE-2021-3500/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008988.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3500: Stack overflow in function DJVU:DjVuDocument:get_djvu_file() via crafted djvu file (bsc#1186253)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186253">SUSE bug 1186253</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3500/">CVE-2021-3500</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497909" comment="djvulibre-3.5.27-11.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110989" version="1" class="patch">
	<metadata>
		<title>Security update for libjpeg-turbo (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1186764" ref_url="https://bugzilla.suse.com/1186764" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17541" ref_url="https://www.suse.com/security/cve/CVE-2020-17541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009002.html" source="SUSE-SU"/>
		<description>
This update for libjpeg-turbo fixes the following issues:

- CVE-2020-17541: Fixed a stack-based buffer overflow in the 'transform' component (bsc#1186764).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186764">SUSE bug 1186764</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-17541/">CVE-2020-17541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497910" comment="libjpeg-turbo-1.5.3-5.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110990" version="1" class="patch">
	<metadata>
		<title>Security update for python-rsa (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1172389" ref_url="https://bugzilla.suse.com/1172389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13757" ref_url="https://www.suse.com/security/cve/CVE-2020-13757/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009029.html" source="SUSE-SU"/>
		<description>
This update for python-rsa fixes the following issues:

- CVE-2020-13757: Proper handling of leading '\0' bytes during decryption of ciphertext (bsc#1172389)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172389">SUSE bug 1172389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13757/">CVE-2020-13757</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497911" comment="python2-rsa-3.4.2-3.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110991" version="1" class="patch">
	<metadata>
		<title>Security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1186590" ref_url="https://bugzilla.suse.com/1186590" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009082.html" source="SUSE-SU"/>
		<description>
This update for gupnp fixes the following issues:

- CVE-2021-33516: Fixed a DNS rebinding, which could trick the browser into triggering actions against local UPnP services (bsc#1186590).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497912" comment="libgupnp-devel-1.2.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497913" comment="typelib-1_0-GUPnP-1_0-1.2.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110992" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1172640" ref_url="https://bugzilla.suse.com/1172640" source="BUGZILLA"/>
		<reference ref_id="1186406" ref_url="https://bugzilla.suse.com/1186406" source="BUGZILLA"/>
		<reference ref_id="1186583" ref_url="https://bugzilla.suse.com/1186583" source="BUGZILLA"/>
		<reference ref_id="1186586" ref_url="https://bugzilla.suse.com/1186586" source="BUGZILLA"/>
		<reference ref_id="1186587" ref_url="https://bugzilla.suse.com/1186587" source="BUGZILLA"/>
		<reference ref_id="1186596" ref_url="https://bugzilla.suse.com/1186596" source="BUGZILLA"/>
		<reference ref_id="1186597" ref_url="https://bugzilla.suse.com/1186597" source="BUGZILLA"/>
		<reference ref_id="1186598" ref_url="https://bugzilla.suse.com/1186598" source="BUGZILLA"/>
		<reference ref_id="1186600" ref_url="https://bugzilla.suse.com/1186600" source="BUGZILLA"/>
		<reference ref_id="1186603" ref_url="https://bugzilla.suse.com/1186603" source="BUGZILLA"/>
		<reference ref_id="1186604" ref_url="https://bugzilla.suse.com/1186604" source="BUGZILLA"/>
		<reference ref_id="1186605" ref_url="https://bugzilla.suse.com/1186605" source="BUGZILLA"/>
		<reference ref_id="1186613" ref_url="https://bugzilla.suse.com/1186613" source="BUGZILLA"/>
		<reference ref_id="1186614" ref_url="https://bugzilla.suse.com/1186614" source="BUGZILLA"/>
		<reference ref_id="1186615" ref_url="https://bugzilla.suse.com/1186615" source="BUGZILLA"/>
		<reference ref_id="1186616" ref_url="https://bugzilla.suse.com/1186616" source="BUGZILLA"/>
		<reference ref_id="1186658" ref_url="https://bugzilla.suse.com/1186658" source="BUGZILLA"/>
		<reference ref_id="1186660" ref_url="https://bugzilla.suse.com/1186660" source="BUGZILLA"/>
		<reference ref_id="1186757" ref_url="https://bugzilla.suse.com/1186757" source="BUGZILLA"/>
		<reference ref_id="1186758" ref_url="https://bugzilla.suse.com/1186758" source="BUGZILLA"/>
		<reference ref_id="1186762" ref_url="https://bugzilla.suse.com/1186762" source="BUGZILLA"/>
		<reference ref_id="1186763" ref_url="https://bugzilla.suse.com/1186763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17539" ref_url="https://www.suse.com/security/cve/CVE-2019-17539/" source="CVE"/>
		<reference ref_id="CVE-2020-13904" ref_url="https://www.suse.com/security/cve/CVE-2020-13904/" source="CVE"/>
		<reference ref_id="CVE-2020-20448" ref_url="https://www.suse.com/security/cve/CVE-2020-20448/" source="CVE"/>
		<reference ref_id="CVE-2020-20451" ref_url="https://www.suse.com/security/cve/CVE-2020-20451/" source="CVE"/>
		<reference ref_id="CVE-2020-21041" ref_url="https://www.suse.com/security/cve/CVE-2020-21041/" source="CVE"/>
		<reference ref_id="CVE-2020-22015" ref_url="https://www.suse.com/security/cve/CVE-2020-22015/" source="CVE"/>
		<reference ref_id="CVE-2020-22016" ref_url="https://www.suse.com/security/cve/CVE-2020-22016/" source="CVE"/>
		<reference ref_id="CVE-2020-22017" ref_url="https://www.suse.com/security/cve/CVE-2020-22017/" source="CVE"/>
		<reference ref_id="CVE-2020-22019" ref_url="https://www.suse.com/security/cve/CVE-2020-22019/" source="CVE"/>
		<reference ref_id="CVE-2020-22020" ref_url="https://www.suse.com/security/cve/CVE-2020-22020/" source="CVE"/>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2020-22022" ref_url="https://www.suse.com/security/cve/CVE-2020-22022/" source="CVE"/>
		<reference ref_id="CVE-2020-22023" ref_url="https://www.suse.com/security/cve/CVE-2020-22023/" source="CVE"/>
		<reference ref_id="CVE-2020-22025" ref_url="https://www.suse.com/security/cve/CVE-2020-22025/" source="CVE"/>
		<reference ref_id="CVE-2020-22026" ref_url="https://www.suse.com/security/cve/CVE-2020-22026/" source="CVE"/>
		<reference ref_id="CVE-2020-22031" ref_url="https://www.suse.com/security/cve/CVE-2020-22031/" source="CVE"/>
		<reference ref_id="CVE-2020-22032" ref_url="https://www.suse.com/security/cve/CVE-2020-22032/" source="CVE"/>
		<reference ref_id="CVE-2020-22033" ref_url="https://www.suse.com/security/cve/CVE-2020-22033/" source="CVE"/>
		<reference ref_id="CVE-2020-22034" ref_url="https://www.suse.com/security/cve/CVE-2020-22034/" source="CVE"/>
		<reference ref_id="CVE-2020-22038" ref_url="https://www.suse.com/security/cve/CVE-2020-22038/" source="CVE"/>
		<reference ref_id="CVE-2020-22039" ref_url="https://www.suse.com/security/cve/CVE-2020-22039/" source="CVE"/>
		<reference ref_id="CVE-2020-22043" ref_url="https://www.suse.com/security/cve/CVE-2020-22043/" source="CVE"/>
		<reference ref_id="CVE-2020-22044" ref_url="https://www.suse.com/security/cve/CVE-2020-22044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009140.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-13904: Fixed use-after-free via a crafted EXTINF duration in an m3u8 file (bsc#1172640).
- CVE-2020-21041: Fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c  (bsc#1186406).
- CVE-2019-17539: Fixed NULL pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
- CVE-2020-22026: Fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
- CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
- CVE-2020-22020: Fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
- CVE-2020-22015: Fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
- CVE-2020-22016: Fixed a heap-based Buffer Overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
- CVE-2020-22017: Fixed a heap-based Buffer Overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
- CVE-2020-22022: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
- CVE-2020-22023: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604)
- CVE-2020-22025: Fixed a heap-based Buffer Overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
- CVE-2020-22031: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
- CVE-2020-22032: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
- CVE-2020-22034: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
- CVE-2020-20451: Fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
- CVE-2020-20448: Fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
- CVE-2020-22038: Fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
- CVE-2020-22039: Fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
- CVE-2020-22043: Fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
- CVE-2020-22044: Fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
- CVE-2020-22033,CVE-2020-22019: Fixed a heap-based Buffer Overflow Vulnerability at libavfilter/vf_vmafmotion.c in convolution_y_8bit() and in convolution_y_10bit() in libavfilter/vf_vmafmotion.c (bsc#1186615, bsc#1186597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172640">SUSE bug 1172640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186406">SUSE bug 1186406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186583">SUSE bug 1186583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186586">SUSE bug 1186586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186587">SUSE bug 1186587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186596">SUSE bug 1186596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186597">SUSE bug 1186597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186598">SUSE bug 1186598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186600">SUSE bug 1186600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186603">SUSE bug 1186603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186604">SUSE bug 1186604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186605">SUSE bug 1186605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186613">SUSE bug 1186613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186614">SUSE bug 1186614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186615">SUSE bug 1186615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186616">SUSE bug 1186616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186658">SUSE bug 1186658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186660">SUSE bug 1186660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186757">SUSE bug 1186757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186758">SUSE bug 1186758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186762">SUSE bug 1186762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186763">SUSE bug 1186763</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17539/">CVE-2019-17539</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13904/">CVE-2020-13904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20448/">CVE-2020-20448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20451/">CVE-2020-20451</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21041/">CVE-2020-21041</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22015/">CVE-2020-22015</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-22016/">CVE-2020-22016</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22017/">CVE-2020-22017</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22019/">CVE-2020-22019</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22020/">CVE-2020-22020</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22022/">CVE-2020-22022</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22023/">CVE-2020-22023</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22025/">CVE-2020-22025</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22026/">CVE-2020-22026</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22031/">CVE-2020-22031</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22032/">CVE-2020-22032</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22033/">CVE-2020-22033</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22034/">CVE-2020-22034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22038/">CVE-2020-22038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22039/">CVE-2020-22039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22043/">CVE-2020-22043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22044/">CVE-2020-22044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615906" comment="ffmpeg-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615907" comment="libavdevice57-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615908" comment="libavfilter6-3.4.2-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110993" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008262.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- openvswitch was updated to 2.13.2 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497914" comment="libopenvswitch-2_13-0-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497915" comment="python3-ovs-2.13.2-9.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110994" version="1" class="patch">
	<metadata>
		<title>Security update for djvulibre (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1187869" ref_url="https://bugzilla.suse.com/1187869" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3630" ref_url="https://www.suse.com/security/cve/CVE-2021-3630/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2619-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009253.html" source="SUSE-SU"/>
		<description>
This update for djvulibre fixes the following issues:

- CVE-2021-3630: out-of-bounds write in DJVU:DjVuTXT:decode() in DjVuText.cpp (bsc#1187869)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187869">SUSE bug 1187869</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3630/">CVE-2021-3630</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627353" comment="djvulibre-3.5.27-11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110995" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1188035" ref_url="https://bugzilla.suse.com/1188035" source="BUGZILLA"/>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704/" source="CVE"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009261.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21704: Fixed security issues in pdo_firebase module (bsc#1188035).
- CVE-2021-21705: Fixed SSRF bypass in FILTER_VALIDATE_URL (bsc#1188037).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188035">SUSE bug 1188035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627354" comment="php7-embed-7.4.6-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110996" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1100167" ref_url="https://bugzilla.suse.com/1100167" source="BUGZILLA"/>
		<reference ref_id="1116993" ref_url="https://bugzilla.suse.com/1116993" source="BUGZILLA"/>
		<reference ref_id="1117954" ref_url="https://bugzilla.suse.com/1117954" source="BUGZILLA"/>
		<reference ref_id="1188540" ref_url="https://bugzilla.suse.com/1188540" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-13139" ref_url="https://www.suse.com/security/cve/CVE-2018-13139/" source="CVE"/>
		<reference ref_id="CVE-2018-19432" ref_url="https://www.suse.com/security/cve/CVE-2018-19432/" source="CVE"/>
		<reference ref_id="CVE-2018-19758" ref_url="https://www.suse.com/security/cve/CVE-2018-19758/" source="CVE"/>
		<reference ref_id="CVE-2021-3246" ref_url="https://www.suse.com/security/cve/CVE-2021-3246/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009301.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2018-13139: Fixed a stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. (bsc#1100167)
- CVE-2018-19432: Fixed a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service. (bsc#1116993)
- CVE-2021-3246: Fixed a heap buffer overflow vulnerability in msadpcm_decode_block. (bsc#1188540)
- CVE-2018-19758: Fixed a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service. (bsc#1117954)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1100167">SUSE bug 1100167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116993">SUSE bug 1116993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1117954">SUSE bug 1117954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188540">SUSE bug 1188540</bugzilla>
	<cve impact="moderate" cvss3="8.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-13139/">CVE-2018-13139</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-19432/">CVE-2018-19432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-19758/">CVE-2018-19758</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3246/">CVE-2021-3246</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626848" comment="libsndfile1-32bit-1.0.28-5.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110997" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<description>
This patch updates the Python AWS SDK stack in SLE 15:

General:

# aws-cli

- Version updated to upstream release v1.19.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-boto3

- Version updated to upstream release 1.17.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-botocore

- Version updated to upstream release 1.20.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-urllib3

- Version updated to upstream release 1.25.10
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-service_identity

- Added this new package to resolve runtime dependencies for other packages.
  Version: 18.1.0

# python-trustme

- Added this new package to resolve runtime dependencies for other packages.
  Version: 0.6.0

Security fixes:

# python-urllib3:
  
- CVE-2020-26137: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated
  by inserting CR and LF control characters in the first argument of putrequest() (bsc#1177120)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626954" comment="python2-boto3-1.17.9-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626955" comment="python2-botocore-1.20.9-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110998" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1129714" ref_url="https://bugzilla.suse.com/1129714" source="BUGZILLA"/>
		<reference ref_id="1186849" ref_url="https://bugzilla.suse.com/1186849" source="BUGZILLA"/>
		<reference ref_id="1186859" ref_url="https://bugzilla.suse.com/1186859" source="BUGZILLA"/>
		<reference ref_id="1186861" ref_url="https://bugzilla.suse.com/1186861" source="BUGZILLA"/>
		<reference ref_id="1186863" ref_url="https://bugzilla.suse.com/1186863" source="BUGZILLA"/>
		<reference ref_id="1189142" ref_url="https://bugzilla.suse.com/1189142" source="BUGZILLA"/>
		<reference ref_id="1189348" ref_url="https://bugzilla.suse.com/1189348" source="BUGZILLA"/>
		<reference ref_id="1189350" ref_url="https://bugzilla.suse.com/1189350" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9721" ref_url="https://www.suse.com/security/cve/CVE-2019-9721/" source="CVE"/>
		<reference ref_id="CVE-2020-21688" ref_url="https://www.suse.com/security/cve/CVE-2020-21688/" source="CVE"/>
		<reference ref_id="CVE-2020-21697" ref_url="https://www.suse.com/security/cve/CVE-2020-21697/" source="CVE"/>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2020-22048" ref_url="https://www.suse.com/security/cve/CVE-2020-22048/" source="CVE"/>
		<reference ref_id="CVE-2020-22049" ref_url="https://www.suse.com/security/cve/CVE-2020-22049/" source="CVE"/>
		<reference ref_id="CVE-2020-22054" ref_url="https://www.suse.com/security/cve/CVE-2020-22054/" source="CVE"/>
		<reference ref_id="CVE-2021-38114" ref_url="https://www.suse.com/security/cve/CVE-2021-38114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009387.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2019-9721: Fix denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
- CVE-2020-22046: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
- CVE-2020-22048: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
- CVE-2020-22049: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
- CVE-2020-22054: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
- CVE-2020-21688: Fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
- CVE-2020-21697: Fixed a heap-use-after-free in the mpeg_mux_write_packet function in libavformat/mpegenc.c (bsc#1189350).
- CVE-2021-38114: Fixed a not checked return value of the init_vlc function (bsc#1189142).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129714">SUSE bug 1129714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186849">SUSE bug 1186849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186859">SUSE bug 1186859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186861">SUSE bug 1186861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186863">SUSE bug 1186863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189142">SUSE bug 1189142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189348">SUSE bug 1189348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189350">SUSE bug 1189350</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9721/">CVE-2019-9721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21688/">CVE-2020-21688</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21697/">CVE-2020-21697</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22048/">CVE-2020-22048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22049/">CVE-2020-22049</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22054/">CVE-2020-22054</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38114/">CVE-2021-38114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631148" comment="ffmpeg-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631149" comment="libavdevice57-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631150" comment="libavfilter6-3.4.2-11.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:110999" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1185476" ref_url="https://bugzilla.suse.com/1185476" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1188566" ref_url="https://bugzilla.suse.com/1188566" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-2388" ref_url="https://www.suse.com/security/cve/CVE-2021-2388/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009404.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- Update to jdk-11.0.12+7
- CVE-2021-2369: Fixed JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2388: Fixed a flaw inside the Hotspot component performed range check elimination. (bsc#1188566)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185476">SUSE bug 1185476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188566">SUSE bug 1188566</bugzilla>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-2388/">CVE-2021-2388</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626424" comment="java-11-openjdk-javadoc-11.0.12.0-3.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626425" comment="java-11-openjdk-jmods-11.0.12.0-3.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111000" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008270.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:
	  
- openvswitch was updated to 2.11.5 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-03"/>
	<updated date="2021-02-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497916" comment="python2-ovs-2.11.5-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111001" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1189724" ref_url="https://bugzilla.suse.com/1189724" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38171" ref_url="https://www.suse.com/security/cve/CVE-2021-38171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009495.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-38171: Fixed adts_decode_extradata in libavformat/adtsenc.c to check the init_get_bits return value (bsc#1189724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189724">SUSE bug 1189724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38171/">CVE-2021-38171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633307" comment="ffmpeg-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633308" comment="libavdevice57-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633309" comment="libavfilter6-3.4.2-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111002" version="1" class="patch">
	<metadata>
		<title>Security update for gd (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1190400" ref_url="https://bugzilla.suse.com/1190400" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40812" ref_url="https://www.suse.com/security/cve/CVE-2021-40812/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009510.html" source="SUSE-SU"/>
		<description>
This update for gd fixes the following issues:

- CVE-2021-40812: Fixed out-of-bounds read caused by the lack of certain gdGetBuf and gdPutBuf return value checks (bsc#1190400).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-27"/>
	<updated date="2021-09-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190400">SUSE bug 1190400</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40812/">CVE-2021-40812</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633477" comment="libgd3-32bit-2.2.5-11.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111003" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009522.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632666" comment="postgresql13-test-13.4-5.16.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111004" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1186761" ref_url="https://bugzilla.suse.com/1186761" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22042" ref_url="https://www.suse.com/security/cve/CVE-2020-22042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009540.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-22042: Fixed a denial of service vulnerability led by a memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (bsc#1186761)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186761">SUSE bug 1186761</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22042/">CVE-2020-22042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634434" comment="ffmpeg-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634435" comment="libavdevice57-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634436" comment="libavfilter6-3.4.2-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111005" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1191367" ref_url="https://bugzilla.suse.com/1191367" source="BUGZILLA"/>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

A feature was added:

- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)

Security issues fixed:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652763" comment="strongswan-nm-5.8.2-11.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111006" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1181239" ref_url="https://bugzilla.suse.com/1181239" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008289.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

java-11-openjdk was upgraded to include January 2021 CPU  (bsc#1181239)
- Enable Sheandoah GC for x86_64 (jsc#ECO-3171)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181239">SUSE bug 1181239</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497917" comment="java-11-openjdk-javadoc-11.0.10.0-3.53.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111007" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1186756" ref_url="https://bugzilla.suse.com/1186756" source="BUGZILLA"/>
		<reference ref_id="1187852" ref_url="https://bugzilla.suse.com/1187852" source="BUGZILLA"/>
		<reference ref_id="1189166" ref_url="https://bugzilla.suse.com/1189166" source="BUGZILLA"/>
		<reference ref_id="1190718" ref_url="https://bugzilla.suse.com/1190718" source="BUGZILLA"/>
		<reference ref_id="1190719" ref_url="https://bugzilla.suse.com/1190719" source="BUGZILLA"/>
		<reference ref_id="1190722" ref_url="https://bugzilla.suse.com/1190722" source="BUGZILLA"/>
		<reference ref_id="1190723" ref_url="https://bugzilla.suse.com/1190723" source="BUGZILLA"/>
		<reference ref_id="1190726" ref_url="https://bugzilla.suse.com/1190726" source="BUGZILLA"/>
		<reference ref_id="1190729" ref_url="https://bugzilla.suse.com/1190729" source="BUGZILLA"/>
		<reference ref_id="1190733" ref_url="https://bugzilla.suse.com/1190733" source="BUGZILLA"/>
		<reference ref_id="1190734" ref_url="https://bugzilla.suse.com/1190734" source="BUGZILLA"/>
		<reference ref_id="1190735" ref_url="https://bugzilla.suse.com/1190735" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-20891" ref_url="https://www.suse.com/security/cve/CVE-2020-20891/" source="CVE"/>
		<reference ref_id="CVE-2020-20892" ref_url="https://www.suse.com/security/cve/CVE-2020-20892/" source="CVE"/>
		<reference ref_id="CVE-2020-20895" ref_url="https://www.suse.com/security/cve/CVE-2020-20895/" source="CVE"/>
		<reference ref_id="CVE-2020-20896" ref_url="https://www.suse.com/security/cve/CVE-2020-20896/" source="CVE"/>
		<reference ref_id="CVE-2020-20899" ref_url="https://www.suse.com/security/cve/CVE-2020-20899/" source="CVE"/>
		<reference ref_id="CVE-2020-20902" ref_url="https://www.suse.com/security/cve/CVE-2020-20902/" source="CVE"/>
		<reference ref_id="CVE-2020-22037" ref_url="https://www.suse.com/security/cve/CVE-2020-22037/" source="CVE"/>
		<reference ref_id="CVE-2020-35965" ref_url="https://www.suse.com/security/cve/CVE-2020-35965/" source="CVE"/>
		<reference ref_id="CVE-2021-3566" ref_url="https://www.suse.com/security/cve/CVE-2021-3566/" source="CVE"/>
		<reference ref_id="CVE-2021-38092" ref_url="https://www.suse.com/security/cve/CVE-2021-38092/" source="CVE"/>
		<reference ref_id="CVE-2021-38093" ref_url="https://www.suse.com/security/cve/CVE-2021-38093/" source="CVE"/>
		<reference ref_id="CVE-2021-38094" ref_url="https://www.suse.com/security/cve/CVE-2021-38094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009650.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-3566: Fixed information leak (bsc#1189166).
- CVE-2021-38093: Fixed integer overflow vulnerability in filter_robert() (bsc#1190734)
- CVE-2021-38092: Fixed integer overflow vulnerability in filter_prewitt() (bsc#1190733)
- CVE-2021-38094: Fixed integer overflow vulnerability in filter_sobel() (bsc#1190735)
- CVE-2020-22037: Fixed denial of service vulnerability caused by memory leak in avcodec_alloc_context3() (bsc#1186756)
- CVE-2020-35965: Fixed out-of-bounds write in decode_frame() (bsc#1187852)
- CVE-2020-20892: Fixed an issue with filter_frame() (bsc#1190719)
- CVE-2020-20891: Fixed a buffer overflow vulnerability in config_input() (bsc#1190718)
- CVE-2020-20895: Fixed a buffer overflow vulnerability in function filter_vertically_##name (bsc#1190722)
- CVE-2020-20896: Fixed an issue with latm_write_packet() (bsc#1190723)
- CVE-2020-20899: Fixed a buffer overflow vulnerability in config_props() (bsc#1190726)
- CVE-2020-20902: Fixed an out-of-bounds read vulnerabilit long_term_filter() (bsc#1190729)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186756">SUSE bug 1186756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187852">SUSE bug 1187852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189166">SUSE bug 1189166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190718">SUSE bug 1190718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190719">SUSE bug 1190719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190722">SUSE bug 1190722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190723">SUSE bug 1190723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190726">SUSE bug 1190726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190729">SUSE bug 1190729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190733">SUSE bug 1190733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190734">SUSE bug 1190734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190735">SUSE bug 1190735</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20891/">CVE-2020-20891</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20892/">CVE-2020-20892</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20895/">CVE-2020-20895</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20896/">CVE-2020-20896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20899/">CVE-2020-20899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20902/">CVE-2020-20902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22037/">CVE-2020-22037</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35965/">CVE-2020-35965</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3566/">CVE-2021-3566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38092/">CVE-2021-38092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38093/">CVE-2021-38093</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38094/">CVE-2021-38094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652760" comment="ffmpeg-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652761" comment="libavdevice57-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652762" comment="libavfilter6-3.4.2-11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111008" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1179898" ref_url="https://bugzilla.suse.com/1179898" source="BUGZILLA"/>
		<reference ref_id="1179899" ref_url="https://bugzilla.suse.com/1179899" source="BUGZILLA"/>
		<reference ref_id="1179900" ref_url="https://bugzilla.suse.com/1179900" source="BUGZILLA"/>
		<reference ref_id="1179901" ref_url="https://bugzilla.suse.com/1179901" source="BUGZILLA"/>
		<reference ref_id="1179902" ref_url="https://bugzilla.suse.com/1179902" source="BUGZILLA"/>
		<reference ref_id="1179903" ref_url="https://bugzilla.suse.com/1179903" source="BUGZILLA"/>
		<reference ref_id="1180451" ref_url="https://bugzilla.suse.com/1180451" source="BUGZILLA"/>
		<reference ref_id="1180454" ref_url="https://bugzilla.suse.com/1180454" source="BUGZILLA"/>
		<reference ref_id="1180461" ref_url="https://bugzilla.suse.com/1180461" source="BUGZILLA"/>
		<reference ref_id="1181452" ref_url="https://bugzilla.suse.com/1181452" source="BUGZILLA"/>
		<reference ref_id="1182252" ref_url="https://bugzilla.suse.com/1182252" source="BUGZILLA"/>
		<reference ref_id="1183511" ref_url="https://bugzilla.suse.com/1183511" source="BUGZILLA"/>
		<reference ref_id="1184620" ref_url="https://bugzilla.suse.com/1184620" source="BUGZILLA"/>
		<reference ref_id="1184794" ref_url="https://bugzilla.suse.com/1184794" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16590" ref_url="https://www.suse.com/security/cve/CVE-2020-16590/" source="CVE"/>
		<reference ref_id="CVE-2020-16591" ref_url="https://www.suse.com/security/cve/CVE-2020-16591/" source="CVE"/>
		<reference ref_id="CVE-2020-16592" ref_url="https://www.suse.com/security/cve/CVE-2020-16592/" source="CVE"/>
		<reference ref_id="CVE-2020-16593" ref_url="https://www.suse.com/security/cve/CVE-2020-16593/" source="CVE"/>
		<reference ref_id="CVE-2020-16598" ref_url="https://www.suse.com/security/cve/CVE-2020-16598/" source="CVE"/>
		<reference ref_id="CVE-2020-16599" ref_url="https://www.suse.com/security/cve/CVE-2020-16599/" source="CVE"/>
		<reference ref_id="CVE-2020-35448" ref_url="https://www.suse.com/security/cve/CVE-2020-35448/" source="CVE"/>
		<reference ref_id="CVE-2020-35493" ref_url="https://www.suse.com/security/cve/CVE-2020-35493/" source="CVE"/>
		<reference ref_id="CVE-2020-35496" ref_url="https://www.suse.com/security/cve/CVE-2020-35496/" source="CVE"/>
		<reference ref_id="CVE-2020-35507" ref_url="https://www.suse.com/security/cve/CVE-2020-35507/" source="CVE"/>
		<reference ref_id="CVE-2021-20197" ref_url="https://www.suse.com/security/cve/CVE-2021-20197/" source="CVE"/>
		<reference ref_id="CVE-2021-20284" ref_url="https://www.suse.com/security/cve/CVE-2021-20284/" source="CVE"/>
		<reference ref_id="CVE-2021-3487" ref_url="https://www.suse.com/security/cve/CVE-2021-3487/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009696.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

Update to binutils 2.37:

* The GNU Binutils sources now requires a C99 compiler and library to
  build.
* Support for Realm Management Extension (RME) for AArch64 has been
  added.
* A new linker option '-z report-relative-reloc' for x86 ELF targets
  has been added to report dynamic relative relocations.
* A new linker option '-z start-stop-gc' has been added to disable
  special treatment of __start_*/__stop_* references when
  --gc-sections.
* A new linker options '-Bno-symbolic' has been added which will
  cancel the '-Bsymbolic' and '-Bsymbolic-functions' options.
* The readelf tool has a new command line option which can be used to
  specify how the numeric values of symbols are reported.
  --sym-base=0|8|10|16 tells readelf to display the values in base 8,
  base 10 or base 16.  A sym base of 0 represents the default action
  of displaying values under 10000 in base 10 and values above that in
  base 16.
* A new format has been added to the nm program.  Specifying
  '--format=just-symbols' (or just using -j) will tell the program to
  only display symbol names and nothing else.
* A new command line option '--keep-section-symbols' has been added to
  objcopy and strip.  This stops the removal of unused section symbols
  when the file is copied.  Removing these symbols saves space, but
  sometimes they are needed by other tools.
* The '--weaken', '--weaken-symbol' and '--weaken-symbols' options
  supported by objcopy now make undefined symbols weak on targets that
  support weak symbols. 
* Readelf and objdump can now display and use the contents of .debug_sup
  sections.
* Readelf and objdump will now follow links to separate debug info
  files by default.  This behaviour can be stopped via the use of the
  new '-wN' or '--debug-dump=no-follow-links' options for readelf and
  the '-WN' or '--dwarf=no-follow-links' options for objdump.  Also
  the old behaviour can be restored by the use of the
  '--enable-follow-debug-links=no' configure time option.

  The semantics of the =follow-links option have also been slightly
  changed.  When enabled, the option allows for the loading of symbol
  tables and string tables from the separate files which can be used
  to enhance the information displayed when dumping other sections,
  but it does not automatically imply that information from the
  separate files should be displayed.

  If other debug section display options are also enabled (eg
  '--debug-dump=info') then the contents of matching sections in both
  the main file and the separate debuginfo file *will* be displayed.
  This is because in most cases the debug section will only be present
  in one of the files.

  If however non-debug section display options are enabled (eg
  '--sections') then the contents of matching parts of the separate
  debuginfo file will *not* be displayed.  This is because in most
  cases the user probably only wanted to load the symbol information
  from the separate debuginfo file.  In order to change this behaviour
  a new command line option --process-links can be used.  This will
  allow di0pslay options to applied to both the main file and any
  separate debuginfo files.

* Nm has a new command line option: '--quiet'.  This suppresses 'no
  symbols' diagnostic.

Update to binutils 2.36:

New features in the Assembler:

- General:

   * When setting the link order attribute of ELF sections, it is now
     possible to use a numeric section index instead of symbol name.
   * Added a .nop directive to generate a single no-op instruction in
     a target neutral manner.  This instruction does have an effect on
     DWARF line number generation, if that is active.
   * Removed --reduce-memory-overheads and --hash-size as gas now
     uses hash tables that can be expand and shrink automatically.

- X86/x86_64:

   * Add support for AVX VNNI, HRESET, UINTR, TDX, AMX and Key
     Locker instructions. 
   * Support non-absolute segment values for lcall and ljmp.
   * Add {disp16} pseudo prefix to x86 assembler.
   * Configure with --enable-x86-used-note by default for Linux/x86.

-  ARM/AArch64:

   * Add support for Cortex-A78, Cortex-A78AE and Cortex-X1,
     Cortex-R82, Neoverse V1, and Neoverse N2 cores.
   * Add support for ETMv4 (Embedded Trace Macrocell), ETE (Embedded
     Trace Extension), TRBE (Trace Buffer Extension), CSRE (Call
     Stack Recorder Extension) and BRBE (Branch Record Buffer
     Extension) system registers.
   * Add support for Armv8-R and Armv8.7-A ISA extensions.
   * Add support for DSB memory nXS barrier, WFET and WFIT
     instruction for Armv8.7.
   * Add support for +csre feature for -march. Add CSR PDEC
     instruction for CSRE feature in AArch64.
   * Add support for +flagm feature for -march in Armv8.4 AArch64.
   * Add support for +ls64 feature for -march in Armv8.7
     AArch64. Add atomic 64-byte load/store instructions for this
     feature. 
   * Add support for +pauth (Pointer Authentication) feature for
     -march in AArch64.

New features in the Linker:

  * Add --error-handling-script=&lt;NAME&gt; command line option to allow
    a helper script to be invoked when an undefined symbol or a
    missing library is encountered.  This option can be suppressed
    via the configure time switch: --enable-error-handling-script=no.
  * Add -z x86-64-{baseline|v[234]} to the x86 ELF linker to mark
    x86-64-{baseline|v[234]} ISA level as needed.
  * Add -z unique-symbol to avoid duplicated local symbol names.
  * The creation of PE format DLLs now defaults to using a more
    secure set of DLL characteristics.
  * The linker now deduplicates the types in .ctf sections.  The new 
     command-line option --ctf-share-types describes how to do this:
     its default value, share-unconflicted, produces the most compact
     output.
  * The linker now omits the 'variable section' from .ctf sections
    by default, saving space.  This is almost certainly what you
    want unless you are working on a project that has its own
    analogue of symbol tables that are not reflected in the ELF
    symtabs.

New features in other binary tools:

  * The ar tool's previously unused l modifier is now used for
    specifying dependencies of a static library. The arguments of
    this option (or --record-libdeps long form option) will be
    stored verbatim in the __.LIBDEP member of the archive, which
    the linker may read at link time.
  * Readelf can now display the contents of LTO symbol table
    sections when asked to do so via the --lto-syms command line
    option.
  * Readelf now accepts the -C command line option to enable the
    demangling of symbol names.  In addition the --demangle=&lt;style&gt;,
    --no-demangle, --recurse-limit and --no-recurse-limit options
    are also now availale.

The following security fixes are addressed by the update:

- CVE-2021-20197: Fixed a race condition which allows users to own arbitrary files (bsc#1181452).
- CVE-2021-20284: Fixed a heap-based buffer overflow in _bfd_elf_slurp_secondary_reloc_section in elf.c (bsc#1183511).
- CVE-2021-3487: Fixed a denial of service via excessive debug section size causing excessive memory consumption in bfd's dwarf2.c read_section() (bsc#1184620).
- CVE-2020-35448: Fixed a heap-based buffer over-read in bfd_getl_signed_32() in libbfd.c (bsc#1184794).
- CVE-2020-16590: Fixed a double free vulnerability in process_symbol_table() (bsc#1179898).
- CVE-2020-16591: Fixed an invalid read in process_symbol_table() (bsc#1179899).
- CVE-2020-16592: Fixed an use-after-free in bfd_hash_lookup() (bsc#1179900).
- CVE-2020-16593: Fixed a null pointer dereference in scan_unit_for_symbols() (bsc#1179901).
- CVE-2020-16598: Fixed a null pointer dereference in debug_get_real_type() (bsc#1179902).
- CVE-2020-16599: Fixed a null pointer dereference in _bfd_elf_get_symbol_version_string() (bsc#1179903)
- CVE-2020-35493: Fixed heap-based buffer overflow in bfd_pef_parse_function_stubs function in bfd/pef.c via crafted PEF file (bsc#1180451).
- CVE-2020-35496: Fixed multiple null pointer dereferences in bfd module due to not checking return value of bfd_malloc (bsc#1180454).
- CVE-2020-35507: Fixed a null pointer dereference in bfd_pef_parse_function_stubs() (bsc#1180461).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-04"/>
	<updated date="2021-11-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179898">SUSE bug 1179898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179899">SUSE bug 1179899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179900">SUSE bug 1179900</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179901">SUSE bug 1179901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179902">SUSE bug 1179902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179903">SUSE bug 1179903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180451">SUSE bug 1180451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180454">SUSE bug 1180454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180461">SUSE bug 1180461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181452">SUSE bug 1181452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182252">SUSE bug 1182252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183511">SUSE bug 1183511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184620">SUSE bug 1184620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184794">SUSE bug 1184794</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16590/">CVE-2020-16590</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16591/">CVE-2020-16591</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16592/">CVE-2020-16592</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16593/">CVE-2020-16593</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-16598/">CVE-2020-16598</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16599/">CVE-2020-16599</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-35448/">CVE-2020-35448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35493/">CVE-2020-35493</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35496/">CVE-2020-35496</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35507/">CVE-2020-35507</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20197/">CVE-2021-20197</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20284/">CVE-2021-20284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3487/">CVE-2021-3487</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653458" comment="binutils-gold-2.37-7.21.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111009" version="1" class="patch">
	<metadata>
		<title>Security update for binutils (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1183909" ref_url="https://bugzilla.suse.com/1183909" source="BUGZILLA"/>
		<reference ref_id="1184519" ref_url="https://bugzilla.suse.com/1184519" source="BUGZILLA"/>
		<reference ref_id="1188941" ref_url="https://bugzilla.suse.com/1188941" source="BUGZILLA"/>
		<reference ref_id="1191473" ref_url="https://bugzilla.suse.com/1191473" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20294" ref_url="https://www.suse.com/security/cve/CVE-2021-20294/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009711.html" source="SUSE-SU"/>
		<description>
This update for binutils fixes the following issues:

- For compatibility on old code stream that expect 'brcl 0,label' to
  not be disassembled as 'jgnop label' on s390x.  (bsc#1192267)
  This reverts IBM zSeries HLASM support for now.
- Fixed that ppc64 optflags did not enable LTO (bsc#1188941).
- Fix empty man-pages from broken release tarball
- Fixed a memory corruption with rpath option (bsc#1191473).
- Fixed slow performance of stripping some binaries (bsc#1183909).

Security issue fixed:

- CVE-2021-20294: Fixed out-of-bounds write in print_dynamic_symbol in readelf (bnc#1184519)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183909">SUSE bug 1183909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184519">SUSE bug 1184519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188941">SUSE bug 1188941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191473">SUSE bug 1191473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<cve impact="moderate" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20294/">CVE-2021-20294</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654334" comment="binutils-gold-2.37-7.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111010" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1191901" ref_url="https://bugzilla.suse.com/1191901" source="BUGZILLA"/>
		<reference ref_id="1191903" ref_url="https://bugzilla.suse.com/1191903" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191906" ref_url="https://bugzilla.suse.com/1191906" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191912" ref_url="https://bugzilla.suse.com/1191912" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35550" ref_url="https://www.suse.com/security/cve/CVE-2021-35550/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35561" ref_url="https://www.suse.com/security/cve/CVE-2021-35561/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35567" ref_url="https://www.suse.com/security/cve/CVE-2021-35567/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35603" ref_url="https://www.suse.com/security/cve/CVE-2021-35603/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3671-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009728.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

Update to 11.0.13+8 (October 2021 CPU)

- CVE-2021-35550, bsc#1191901: Update the default enabled cipher suites preference
- CVE-2021-35565, bsc#1191909: com.sun.net.HttpsServer spins on TLS session close
- CVE-2021-35556, bsc#1191910: Richer Text Editors
- CVE-2021-35559, bsc#1191911: Enhanced style for RTF kit
- CVE-2021-35561, bsc#1191912: Better hashing support
- CVE-2021-35564, bsc#1191913: Improve Keystore integrity
- CVE-2021-35567, bsc#1191903: More Constrained Delegation
- CVE-2021-35578, bsc#1191904: Improve TLS client handshaking
- CVE-2021-35586, bsc#1191914: Better BMP support
- CVE-2021-35603, bsc#1191906: Better session identification
- Improve Stream handling for SSL
- Improve requests of certificates
- Correct certificate requests
- Enhance DTLS client handshake
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191901">SUSE bug 1191901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191903">SUSE bug 1191903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191906">SUSE bug 1191906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191912">SUSE bug 1191912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35550/">CVE-2021-35550</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35561/">CVE-2021-35561</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35567/">CVE-2021-35567</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35603/">CVE-2021-35603</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653313" comment="java-11-openjdk-javadoc-11.0.13.0-3.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653314" comment="java-11-openjdk-jmods-11.0.13.0-3.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111011" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656750" comment="postgresql12-llvmjit-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656751" comment="postgresql12-test-12.9-8.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111012" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1191782" ref_url="https://bugzilla.suse.com/1191782" source="BUGZILLA"/>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

- Let rpmlint ignore shlib-policy-name-error (boo#1191782).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191782">SUSE bug 1191782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656462" comment="postgresql14-llvmjit-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656463" comment="postgresql14-test-14.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111013" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655895" comment="postgresql13-llvmjit-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655896" comment="postgresql13-test-13.5-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111014" version="1" class="patch">
	<metadata>
		<title>Security update for python-Pygments (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1184812" ref_url="https://bugzilla.suse.com/1184812" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27291" ref_url="https://www.suse.com/security/cve/CVE-2021-27291/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009793.html" source="SUSE-SU"/>
		<description>
This update for python-Pygments fixes the following issues:

- CVE-2021-27291: Fixed ReDoS via crafted malicious input (bsc#1184812).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184812">SUSE bug 1184812</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27291/">CVE-2021-27291</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658099" comment="python2-Pygments-2.2.0-4.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111015" version="1" class="patch">
	<metadata>
		<title>Security update for speex (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1192580" ref_url="https://bugzilla.suse.com/1192580" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-23903" ref_url="https://www.suse.com/security/cve/CVE-2020-23903/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009798.html" source="SUSE-SU"/>
		<description>
This update for speex fixes the following issues:

- CVE-2020-23903: Fixed zero division error in read_samples (bsc#1192580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1192580">SUSE bug 1192580</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-23903/">CVE-2020-23903</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656461" comment="libspeex1-32bit-1.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111016" version="1" class="patch">
	<metadata>
		<title>Recommended update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1175508" ref_url="https://bugzilla.suse.com/1175508" source="BUGZILLA"/>
		<reference ref_id="1192050" ref_url="https://bugzilla.suse.com/1192050" source="BUGZILLA"/>
		<reference ref_id="1193041" ref_url="https://bugzilla.suse.com/1193041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009845.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21703: Fixed local privilege escalation via PHP-FPM (bsc#1192050).
- CVE-2021-21707: Fixed special character breaks path in xml parsing (bsc#1193041).

- Added patch to prevent memory access violation in php7 when running test suite (bsc#1175508)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175508">SUSE bug 1175508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192050">SUSE bug 1192050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658537" comment="php7-embed-7.4.6-3.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111017" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659808" comment="p11-kit-32bit-0.23.2-4.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111018" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008315.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497918" comment="libopenvswitch-2_13-0-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497919" comment="python3-ovs-2.13.2-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111019" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008313.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497920" comment="python2-ovs-2.11.5-3.15.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111020" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008338.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497921" comment="php7-embed-7.4.6-3.17.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111021" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1182039" ref_url="https://bugzilla.suse.com/1182039" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to version 13.2:

  * Updating stored views and reindexing might be needed after applying this update.
  * CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
  * CVE-2021-20229, bsc#1182039: Fix failure to check per-column SELECT privileges in some join queries.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182039">SUSE bug 1182039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497922" comment="postgresql13-test-13.2-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111022" version="1" class="patch">
	<metadata>
		<title>Security update for avahi (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1180827" ref_url="https://bugzilla.suse.com/1180827" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26720" ref_url="https://www.suse.com/security/cve/CVE-2021-26720/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008360.html" source="SUSE-SU"/>
		<description>
This update for avahi fixes the following issues:

- CVE-2021-26720: drop privileges when invoking avahi-daemon-check-dns.sh (bsc#1180827)
- Update avahi-daemon-check-dns.sh from Debian. Our previous version relied on ifconfig, route, and init.d.
- Add sudo to requires: used to drop privileges.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180827">SUSE bug 1180827</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26720/">CVE-2021-26720</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497923" comment="python3-avahi-0.7-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111023" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Package Hub 15 SP2</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0091-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010042.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Apache2 was updated to the current stable version 2.4.51 (jsc#SLE-22733 jsc#SLE-22849)

It fixes all CVEs and selected bugs represented by patches found between 2.4.23 and 2.4.51.

See https://downloads.apache.org/httpd/CHANGES_2.4 for a complete change log.

Also fixed:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua (bsc#1193942)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:packagehub:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009282574" comment="SUSE Linux Enterprise Module for Package Hub 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662937" comment="apache2-event-2.4.51-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111024" version="1" class="patch">
	<metadata>
		<title>Security update for google-compute-engine (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1169978" ref_url="https://bugzilla.suse.com/1169978" source="BUGZILLA"/>
		<reference ref_id="1173258" ref_url="https://bugzilla.suse.com/1173258" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8903" ref_url="https://www.suse.com/security/cve/CVE-2020-8903/" source="CVE"/>
		<reference ref_id="CVE-2020-8907" ref_url="https://www.suse.com/security/cve/CVE-2020-8907/" source="CVE"/>
		<reference ref_id="CVE-2020-8933" ref_url="https://www.suse.com/security/cve/CVE-2020-8933/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1934-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007139.html" source="SUSE-SU"/>
		<description>
This update for google-compute-engine fixes the following issues:

- Don't enable and start google-network-daemon.service when it's
  already installed (bsc#1169978)

  + Do not add the created user to the adm (CVE-2020-8903),
    docker (CVE-2020-8907), or lxd (CVE-2020-8933) groups
    if they exist (bsc#1173258)		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169978">SUSE bug 1169978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173258">SUSE bug 1173258</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8903/">CVE-2020-8903</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8907/">CVE-2020-8907</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-8933/">CVE-2020-8933</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498051" comment="google-compute-engine-init-20190801-4.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498052" comment="google-compute-engine-oslogin-20190801-4.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111025" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007172.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).

The following non-security bugs were fixed:

- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- Add a GIT commit ID of already cherry-picked x86/platform patch
- Add cherry-picked ID to the already applied pinctrl patch
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- Crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- Disable PINCTRL_TIGERLAKE
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) 
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- Fix boot crash with MD (bsc#1173860) 
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) Delete obsoleted downstream fix
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: do not let vrate run wild while there's no saturation signal (bsc1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- Move an upstreamed sound patch into sorted section
- Move upstreamed IMA patches into sorted section
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'fs/seq_file.c: seq_read(): add info message about buggy .next functions' (bsc#1172751)
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm/modules.fips:  * add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bsk
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- Update patch reference for intel_th patch (jsc#SLE-12705)
- Update patch reference tag for ACPI lockdown fix (bsc#1173573)
- Update the patch reference for ish-hid fix (jsc#SLE-12683)
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498112" comment="kernel-azure-5.3.18-18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498113" comment="kernel-azure-devel-5.3.18-18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498114" comment="kernel-devel-azure-5.3.18-18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498115" comment="kernel-source-azure-5.3.18-18.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498116" comment="kernel-syms-azure-5.3.18-18.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111026" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007207.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489)
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489)
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/radeon: fix double free (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- net/smc: fix restoring of fallback changes (git-fixes).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: free record only on encryption error (git-fixes).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- NTB: Fix static check warning in perf_clear_test (git-fixes).
- NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- NTB: ntb_test: Fix bug when counting remote files (git-fixes).
- NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- NTB: perf: Do not require one more memory window than number of peers (git-fixes).
- NTB: perf: Fix race condition when run with ntb_test (git-fixes).
- NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498117" comment="kernel-azure-5.3.18-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498118" comment="kernel-azure-devel-5.3.18-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498119" comment="kernel-devel-azure-5.3.18-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498120" comment="kernel-source-azure-5.3.18-18.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498121" comment="kernel-syms-azure-5.3.18-18.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111027" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007348.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bnc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ARM: percpu.h: fix build error (git-fixes).
- ARM: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: Fix protection usage propagation (bsc#1174002).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498122" comment="kernel-azure-5.3.18-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498123" comment="kernel-azure-devel-5.3.18-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498124" comment="kernel-devel-azure-5.3.18-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498125" comment="kernel-source-azure-5.3.18-18.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498126" comment="kernel-syms-azure-5.3.18-18.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111028" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007387.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).

The following non-security bugs were fixed:

- bcache: allocate meta data pages as compound pages (bsc#1172873).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- ext4: handle read only external journal device (bsc#1176063).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- kabi: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). Replace patches.suse/lpfc-synchronize-nvme-transport-and-lpfc-driver-devloss_tmo.patch with upstream version of the fix.
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498127" comment="kernel-azure-5.3.18-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498128" comment="kernel-azure-devel-5.3.18-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498129" comment="kernel-devel-azure-5.3.18-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498130" comment="kernel-source-azure-5.3.18-18.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498131" comment="kernel-syms-azure-5.3.18-18.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111029" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007551.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA; firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: Convert pr_&lt;level&gt; uses to a more typical style (git fixes (block drivers)).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- cxgb4: fix thermal zone device registration (git-fixes).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- ftrace: Setup correct FTRACE_FL_REGS flags for module (git-fixes).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dp83640: fix SIOCSHWTSTAMP to update the struct with actual configuration (networking-stable-20_07_29).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- Remove patch causing regression (bsc#1094244 ltc#168122).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/constraints.in: recognize also kernel-source-azure (bsc#1176732)
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisusbvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498132" comment="kernel-azure-5.3.18-18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498133" comment="kernel-azure-devel-5.3.18-18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498134" comment="kernel-devel-azure-5.3.18-18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498135" comment="kernel-source-azure-5.3.18-18.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498136" comment="kernel-syms-azure-5.3.18-18.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111030" version="1" class="patch">
	<metadata>
		<title>Security update for rmt-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1165548" ref_url="https://bugzilla.suse.com/1165548" source="BUGZILLA"/>
		<reference ref_id="1168554" ref_url="https://bugzilla.suse.com/1168554" source="BUGZILLA"/>
		<reference ref_id="1172177" ref_url="https://bugzilla.suse.com/1172177" source="BUGZILLA"/>
		<reference ref_id="1172182" ref_url="https://bugzilla.suse.com/1172182" source="BUGZILLA"/>
		<reference ref_id="1172184" ref_url="https://bugzilla.suse.com/1172184" source="BUGZILLA"/>
		<reference ref_id="1172186" ref_url="https://bugzilla.suse.com/1172186" source="BUGZILLA"/>
		<reference ref_id="1173351" ref_url="https://bugzilla.suse.com/1173351" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<reference ref_id="CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077/" source="CVE"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247/" source="CVE"/>
		<reference ref_id="CVE-2020-5249" ref_url="https://www.suse.com/security/cve/CVE-2020-5249/" source="CVE"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<description>
This update for rmt-server fixes the following issues:

Update to version 2.6.5:
- Solved potential bug of SCC repository URLs changing over time. RMT
  now self heals by removing the previous invalid repository and
  creating the correct one.
- Add web server settings to /etc/rmt.conf:
  Now it's possible to configure the minimum and maximum threads count as well
  the number of web server workers to be booted through /etc/rmt.conf.
- Instead of using an MD5 of URLs for custom repository friendly_ids,
  RMT now builds an ID from the name.
- Fix RMT file caching based on timestamps:
  Previously, RMT sent GET requests with the header 'If-Modified-Since' to a
  repository server and if the response had a 304 (Not Modified), it would copy
  a file from the local cache instead of downloading. However, if the local file
  timestamp accidentally changed to a date newer than the one on the repository
  server, RMT would have an outdated file, which caused some errors.
  Now, RMT makes HEAD requests to the repositories servers and inspect the
  'Last-Modified' header to decide whether to download a file or copy it from
  cache, by comparing the equalness of timestamps.
- Fixed an issue where relative paths supplied to `rmt-cli import repos`
  caused the command to fail.
- Friendlier IDs for custom repositories:
  In an effort to simplify the handling of SCC and custom repositories,
  RMT now has friendly IDs. For SCC repositories, it's the same SCC ID
  as before. For custom repositories, it can either be user provided
  or RMT generated (MD5 of the provided URL).
  Benefits:
  * `rmt-cli mirror repositories` now works for custom repositories.
  * Custom repository IDs can be the same across RMT instances.
  * No more confusing 'SCC ID' vs 'ID' in `rmt-cli` output.
  Deprecation Warnings:
  * RMT now uses a different ID for custom repositories than before.
    RMT still supports that old ID, but it's recommended to start
    using the new ID to ensure future compatibility.
- Updated rails and puma dependencies for security fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165548">SUSE bug 1165548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168554">SUSE bug 1168554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172184">SUSE bug 1172184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5249/">CVE-2020-5249</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498137" comment="rmt-server-pubcloud-2.6.5-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111031" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="CVE-2020-27675" ref_url="https://www.suse.com/security/cve/CVE-2020-27675/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007842.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed a permissions issue in ovl_path_open() (bsc#1177470).
- CVE-2020-12351: Implemented a kABI workaround for bluetooth l2cap_ops filter addition (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25212: Fixed a TOCTOU mismatch in the NFS client code (bnc#1176381).
- CVE-2020-25645: Fixed an an issue in IPsec that caused traffic between two Geneve endpoints to be unencrypted (bnc#1177511).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2020-27675: Fixed a race condition in event handler which may crash dom0 (XSA-331 bsc#1177410).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- Add CONFIG_CHECK_CODESIGN_EKU
- airo: Fix read overflows sending packets (git-fixes).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch: (bsc#1177090).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- target-rbd-support-COMPARE_AND_WRITE.patch: (bsc#1177090).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- USB: core: Solve race condition in anchor cleanup functions (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: dwc3: simple: add support for Hikey 970 (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- USB: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- USB: xhci-mtk: Fix typo (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- whitespace cleanup
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755). 
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-23"/>
	<updated date="2020-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27675/">CVE-2020-27675</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498138" comment="kernel-azure-5.3.18-18.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498139" comment="kernel-azure-devel-5.3.18-18.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498140" comment="kernel-devel-azure-5.3.18-18.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498141" comment="kernel-source-azure-5.3.18-18.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498142" comment="kernel-syms-azure-5.3.18-18.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111032" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154852" ref_url="https://bugzilla.suse.com/1154852" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="1179802" ref_url="https://bugzilla.suse.com/1179802" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="CVE-2020-8695" ref_url="https://www.suse.com/security/cve/CVE-2020-8695/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007937.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-8694, CVE-2020-8695: Fixed an insufficient access control in the Linux kernel driver for some Intel(R) Processors which might have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415 bsc#1170446)
- CVE-2020-28368: Fixed Intel RAPL sidechannel attack aka PLATYPUS attack (XSA-351 bsc#1178591).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 bsc#1179432).

The following non-security bugs were fixed:

- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550)
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (bsc#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-08"/>
	<updated date="2020-12-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154852">SUSE bug 1154852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179802">SUSE bug 1179802</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8695/">CVE-2020-8695</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498143" comment="kernel-azure-5.3.18-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498144" comment="kernel-azure-devel-5.3.18-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498145" comment="kernel-devel-azure-5.3.18-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498146" comment="kernel-source-azure-5.3.18-18.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498147" comment="kernel-syms-azure-5.3.18-18.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111033" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008624.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- certs: Fix blacklist flag type confusion (git-fixes).
- cifs: check pointer before freeing (bsc#1183534).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530)
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: 	* context changes
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) Backporting notes: 	* rename amd/pm to amd/powerplay 	* context changes
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) Backporting notes: 	
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm/mdp5: Fix wait-for-commit for cmd panels (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) Backporting notes: 	
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Fix job timeout handling (bsc#1152472) Backporting notes: 	* context changes
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) Backporting notes: 	* context changes
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) Backporting notes: 	* context changes
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) Backporting notes: 	* context changes 	* change vc4_hdmi to vc4-&gt;hdmi 	* removed references to encoder-&gt;hdmi_monitor
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: ignore more configs Specifially, these:  * CONFIG_CC_HAS_*  * CONFIG_CC_HAVE_*  * CONFIG_CC_CAN_*  * CONFIG_HAVE_[A-Z]*_COMPILER  * CONFIG_TOOLS_SUPPORT_* are compiler specific too. This will allow us to use super configs using kernel's dummy-tools.
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- usb-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498148" comment="kernel-azure-5.3.18-18.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498149" comment="kernel-azure-devel-5.3.18-18.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498150" comment="kernel-devel-azure-5.3.18-18.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498151" comment="kernel-source-azure-5.3.18-18.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498152" comment="kernel-syms-azure-5.3.18-18.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111034" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008670.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).

The following non-security bugs were fixed:

- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) 
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: fix setting irq affinity (bsc#1184583).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-21"/>
	<updated date="2021-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498153" comment="kernel-azure-5.3.18-18.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498154" comment="kernel-azure-devel-5.3.18-18.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498155" comment="kernel-devel-azure-5.3.18-18.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498156" comment="kernel-source-azure-5.3.18-18.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498157" comment="kernel-syms-azure-5.3.18-18.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111035" version="1" class="patch">
	<metadata>
		<title>Security update for python-aiohttp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184745" ref_url="https://bugzilla.suse.com/1184745" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21330" ref_url="https://www.suse.com/security/cve/CVE-2021-21330/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008677.html" source="SUSE-SU"/>
		<description>
This update for python-aiohttp fixes the following issues:

- CVE-2021-21330: Fixed the way pure-Python HTTP parser interprets `//` (bsc#1184745)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-26"/>
	<updated date="2021-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184745">SUSE bug 1184745</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-21330/">CVE-2021-21330</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498104" comment="python-aiohttp-doc-3.4.4-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498105" comment="python3-aiohttp-3.4.4-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111036" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008778.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-17"/>
	<updated date="2021-05-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498158" comment="kernel-azure-5.3.18-18.47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498159" comment="kernel-azure-devel-5.3.18-18.47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498160" comment="kernel-devel-azure-5.3.18-18.47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498161" comment="kernel-source-azure-5.3.18-18.47.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498162" comment="kernel-syms-azure-5.3.18-18.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111037" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008950.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: Update nvme repositories
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498163" comment="kernel-azure-5.3.18-18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498164" comment="kernel-azure-devel-5.3.18-18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498165" comment="kernel-devel-azure-5.3.18-18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498166" comment="kernel-source-azure-5.3.18-18.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498167" comment="kernel-syms-azure-5.3.18-18.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111038" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2303-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009127.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-13"/>
	<updated date="2021-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624283" comment="kernel-azure-5.3.18-18.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624284" comment="kernel-azure-devel-5.3.18-18.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624285" comment="kernel-devel-azure-5.3.18-18.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624286" comment="kernel-source-azure-5.3.18-18.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624287" comment="kernel-syms-azure-5.3.18-18.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111039" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009160.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to andobtain full root privileges (bsc#1188062).
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation (bsc#1187215).
- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)
- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Blacklist already cherry-picked ASoC commits
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- kernel-binary.spec: Fix up usrmerge for non-modular kernels.
- kernel-binary.spec: Remove obsolete and wrong comment mkmakefile is repleced by echo on newer kernel
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify and fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- UsrMerge the kernel (boo#1184804)
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-20"/>
	<updated date="2021-07-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625625" comment="kernel-azure-5.3.18-18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625626" comment="kernel-azure-devel-5.3.18-18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625627" comment="kernel-devel-azure-5.3.18-18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625628" comment="kernel-source-azure-5.3.18-18.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625629" comment="kernel-syms-azure-5.3.18-18.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111040" version="1" class="patch">
	<metadata>
		<title>Security update for terraform (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168921" ref_url="https://bugzilla.suse.com/1168921" source="BUGZILLA"/>
		<reference ref_id="1170264" ref_url="https://bugzilla.suse.com/1170264" source="BUGZILLA"/>
		<reference ref_id="1177421" ref_url="https://bugzilla.suse.com/1177421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14039" ref_url="https://www.suse.com/security/cve/CVE-2020-14039/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008259.html" source="SUSE-SU"/>
		<description>
This update for terraform fixes the following issues:

- Updated terraform to version 0.13.4 (bsc#1177421)

  * Many features, bug fixes, and enhancements were made during this update. Please refer to the
    terraform rpm changelog, for a full list of all changes.

- The following terraform providers were updated:

  * terraform-provider-aws
  * terraform-provider-azurerm
  * terraform-provider-external
  * terraform-provider-google
  * terraform-provider-helm
  * terraform-provider-kubernetes
  * terraform-provider-local
  * terraform-provider-null
  * terraform-provider-random
  * terraform-provider-tls
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168921">SUSE bug 1168921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170264">SUSE bug 1170264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177421">SUSE bug 1177421</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-14039/">CVE-2020-14039</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498168" comment="terraform-0.13.4-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498169" comment="terraform-provider-aws-3.11.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498170" comment="terraform-provider-azurerm-2.32.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498171" comment="terraform-provider-external-2.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498172" comment="terraform-provider-google-3.43.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498173" comment="terraform-provider-helm-1.3.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498174" comment="terraform-provider-kubernetes-1.13.2-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498175" comment="terraform-provider-local-2.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498176" comment="terraform-provider-null-3.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498177" comment="terraform-provider-random-3.0.0-6.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498178" comment="terraform-provider-tls-3.0.0-5.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111041" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009277.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-10"/>
	<updated date="2021-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627886" comment="kernel-azure-5.3.18-18.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627887" comment="kernel-azure-devel-5.3.18-18.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627888" comment="kernel-devel-azure-5.3.18-18.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627889" comment="kernel-source-azure-5.3.18-18.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627890" comment="kernel-syms-azure-5.3.18-18.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111042" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<description>
This patch updates the Python AWS SDK stack in SLE 15:

General:

# aws-cli

- Version updated to upstream release v1.19.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-boto3

- Version updated to upstream release 1.17.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-botocore

- Version updated to upstream release 1.20.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-urllib3

- Version updated to upstream release 1.25.10
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-service_identity

- Added this new package to resolve runtime dependencies for other packages.
  Version: 18.1.0

# python-trustme

- Added this new package to resolve runtime dependencies for other packages.
  Version: 0.6.0

Security fixes:

# python-urllib3:
  
- CVE-2020-26137: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated
  by inserting CR and LF control characters in the first argument of putrequest() (bsc#1177120)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626957" comment="aws-cli-1.19.9-26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111043" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189278" ref_url="https://bugzilla.suse.com/1189278" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189278">SUSE bug 1189278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633310" comment="kernel-azure-5.3.18-18.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633311" comment="kernel-azure-devel-5.3.18-18.66.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633312" comment="kernel-devel-azure-5.3.18-18.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633313" comment="kernel-source-azure-5.3.18-18.66.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633314" comment="kernel-syms-azure-5.3.18-18.66.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111044" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009568.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- backlight: pwm_bl: Improve bootloader/kernel device handover (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- Update kabi files.
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651669" comment="kernel-azure-5.3.18-18.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651670" comment="kernel-azure-devel-5.3.18-18.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651671" comment="kernel-devel-azure-5.3.18-18.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651672" comment="kernel-source-azure-5.3.18-18.69.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651673" comment="kernel-syms-azure-5.3.18-18.69.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111045" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179416" ref_url="https://bugzilla.suse.com/1179416" source="BUGZILLA"/>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="1187670" ref_url="https://bugzilla.suse.com/1187670" source="BUGZILLA"/>
		<reference ref_id="1188548" ref_url="https://bugzilla.suse.com/1188548" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security issues fixed:

- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)
- PGP hardening changes (bsc#1185299)
- Fixed potential access of freed mem in ndb's glue code (bsc#1179416)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179416">SUSE bug 1179416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187670">SUSE bug 1187670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188548">SUSE bug 1188548</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652136" comment="rpm-ndb-4.14.1-22.4.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111046" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180562" ref_url="https://bugzilla.suse.com/1180562" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="1180676" ref_url="https://bugzilla.suse.com/1180676" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008287.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-36158: Fixed an issue wich might have allowed a remote attackers to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start() (bnc#1180559).
- CVE-2020-28374: Fixed a vulnerability caused by insufficient identifier checking in the LIO SCSI target code. This could have been used by a remote attackers to read or write files via directory traversal in an XCOPY request (bnc#1178372).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- Move 'btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).' to sorted section
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revert 'ceph: allow rename operation under different quota realms' (bsc#1180541).
- Revert 'nfsd4: support change_attr_type attribute' (for-next).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180562">SUSE bug 1180562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498179" comment="kernel-azure-5.3.18-18.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498180" comment="kernel-azure-devel-5.3.18-18.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498181" comment="kernel-devel-azure-5.3.18-18.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498182" comment="kernel-source-azure-5.3.18-18.35.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498183" comment="kernel-syms-azure-5.3.18-18.35.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111047" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009710.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654335" comment="kernel-azure-5.3.18-18.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654336" comment="kernel-azure-devel-5.3.18-18.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654337" comment="kernel-devel-azure-5.3.18-18.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654338" comment="kernel-source-azure-5.3.18-18.72.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654339" comment="kernel-syms-azure-5.3.18-18.72.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111048" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.
- Fix problem with missing installkernel on Tumbleweed.
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- USB: iowarrior: fix control-message timeouts (git-fixes).
- USB: serial: keyspan: fix memleak on probe errors (git-fixes).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- Update patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch (bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in older kernels, not the cookie itself.
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- series.conf: cleanup
- series.conf: cleanup
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- tracing: use %ps format string to print symbols (git-fixes).
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-25"/>
	<updated date="2021-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657752" comment="kernel-azure-5.3.18-18.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657753" comment="kernel-azure-devel-5.3.18-18.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657754" comment="kernel-devel-azure-5.3.18-18.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657755" comment="kernel-source-azure-5.3.18-18.75.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657756" comment="kernel-syms-azure-5.3.18-18.75.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111049" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008445.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel Azure was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPICA: Fix exception code class checks (git-fixes).
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259)
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- Remove debug patch for boot failure (bsc#1182602 ltc#190924). 
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: musb: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498184" comment="kernel-azure-5.3.18-18.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498185" comment="kernel-azure-devel-5.3.18-18.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498186" comment="kernel-devel-azure-5.3.18-18.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498187" comment="kernel-source-azure-5.3.18-18.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498188" comment="kernel-syms-azure-5.3.18-18.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111050" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489)
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472)
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489)
- drm/i915: Fix sha_text population code (bsc#1152489)
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472)
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489)
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472)
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472)
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489)
- drm/vkms: fix xrgb on compute crc (bsc#1152472)
- drm: mxsfb: check framebuffer pitch (bsc#1152472)
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472)
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472)
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498189" comment="kernel-azure-5.3.18-18.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498190" comment="kernel-azure-devel-5.3.18-18.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498191" comment="kernel-devel-azure-5.3.18-18.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498192" comment="kernel-source-azure-5.3.18-18.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498193" comment="kernel-syms-azure-5.3.18-18.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111051" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1195258" ref_url="https://bugzilla.suse.com/1195258" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010568.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672751" comment="python3-protobuf-3.9.2-4.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111052" version="1" class="patch">
	<metadata>
		<title>Security update for amazon-ssm-agent (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Public Cloud 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1196556" ref_url="https://bugzilla.suse.com/1196556" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-29527" ref_url="https://www.suse.com/security/cve/CVE-2022-29527/" source="CVE"/>
		<description>
This update for amazon-ssm-agent fixes the following issues:

- CVE-2022-29527: Fixed unsafe file creation mode of ssm-agent-users sudoer file (bsc#1196556).

Update to version 3.1.1260.0

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196556">SUSE bug 1196556</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-29527/">CVE-2022-29527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-public-cloud:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287160" comment="SUSE Linux Enterprise Module for Public Cloud 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681167" comment="amazon-ssm-agent-3.1.1260.0-150000.5.9.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111053" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172021" ref_url="https://bugzilla.suse.com/1172021" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19956" ref_url="https://www.suse.com/security/cve/CVE-2019-19956/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1532-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007131.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2019-19956: Reverted the upstream fix for this memory leak because it introduced other, more severe vulnerabilities (bsc#1172021).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172021">SUSE bug 1172021</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19956/">CVE-2019-19956</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498234" comment="python2-libxml2-python-2.9.7-3.22.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111054" version="1" class="patch">
	<metadata>
		<title>Security update for mercurial (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1133035" ref_url="https://bugzilla.suse.com/1133035" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-3902" ref_url="https://www.suse.com/security/cve/CVE-2019-3902/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1709-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007141.html" source="SUSE-SU"/>
		<description>
This update for mercurial fixes the following issues:

Security issue fixed:

- CVE-2019-3902: Fixed incorrect patch-checking with symlinks and subrepos (bsc#1133035).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1133035">SUSE bug 1133035</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-3902/">CVE-2019-3902</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498235" comment="mercurial-4.5.2-3.9.44 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111055" version="1" class="patch">
	<metadata>
		<title>Security update for python-ipaddress (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173274" ref_url="https://bugzilla.suse.com/1173274" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14422" ref_url="https://www.suse.com/security/cve/CVE-2020-14422/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007129.html" source="SUSE-SU"/>
		<description>
This update for python-ipaddress fixes the following issues:

- Add CVE-2020-14422-ipaddress-hash-collision.patch fixing
  CVE-2020-14422 (bsc#1173274, bpo#41004), where hash collisions
  in IPv4Interface and IPv6Interface could lead to DOS. 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173274">SUSE bug 1173274</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14422/">CVE-2020-14422</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498241" comment="python-ipaddress-1.0.18-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111056" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1141320" ref_url="https://bugzilla.suse.com/1141320" source="BUGZILLA"/>
		<reference ref_id="1162680" ref_url="https://bugzilla.suse.com/1162680" source="BUGZILLA"/>
		<reference ref_id="1169095" ref_url="https://bugzilla.suse.com/1169095" source="BUGZILLA"/>
		<reference ref_id="1169521" ref_url="https://bugzilla.suse.com/1169521" source="BUGZILLA"/>
		<reference ref_id="1169850" ref_url="https://bugzilla.suse.com/1169850" source="BUGZILLA"/>
		<reference ref_id="1169851" ref_url="https://bugzilla.suse.com/1169851" source="BUGZILLA"/>
		<reference ref_id="1171437" ref_url="https://bugzilla.suse.com/1171437" source="BUGZILLA"/>
		<reference ref_id="1172307" ref_url="https://bugzilla.suse.com/1172307" source="BUGZILLA"/>
		<reference ref_id="1173159" ref_url="https://bugzilla.suse.com/1173159" source="BUGZILLA"/>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1173161" ref_url="https://bugzilla.suse.com/1173161" source="BUGZILLA"/>
		<reference ref_id="1173359" ref_url="https://bugzilla.suse.com/1173359" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<description>
This update for ldb, samba fixes the following issues:

Changes in samba:
- Update to samba 4.11.11
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ
    and VLV combined; (bso#14364); (bsc#1173159]
  + CVE-2020-10745: invalid DNS or NBT queries containing dots use
    several seconds of CPU each; (bso#14378); (bsc#1173160).
  + CVE-2020-10760: Use-after-free in AD DC Global Catalog LDAP
    server with paged_result or VLV; (bso#14402); (bsc#1173161)
  + CVE-2020-14303: Endless loop from empty UDP packet sent to
    AD DC nbt_server; (bso#14417); (bsc#1173359).
- Update to samba 4.11.10
  + Fix segfault when using SMBC_opendir_ctx() routine for share
    folder that contains incorrect symbols in any file name;
    (bso#14374).
  + vfs_shadow_copy2 doesn't fail case looking in
    snapdirseverywhere mode; (bso#14350)
  + ldb_ldap: Fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + Malicous SMB1 server can crash libsmbclient; (bso#14366)
  + winbindd: Fix a use-after-free when winbind clients exit;
    (bso#14382)
  + ldb: Bump version to 2.0.11, LMDB databases can grow without
    bounds. (bso#14330)
- Update to samba 4.11.9
  + nmblib: Avoid undefined behaviour in handle_name_ptrs();
    (bso#14242).
  + 'samba-tool group' commands do not handle group names with
    special chars correctly; (bso#14296).
  + smbd: avoid calling vfs_file_id_from_sbuf() if statinfo
    is not valid; (bso#14237).
  + Missing check for DMAPI offline status in async DOS
    attributes; (bso#14293).
  + smbd: Ignore set NTACL requests which contain
    S-1-5-88 NFS ACEs; (bso#14307).
  + vfs_recycle: Prevent flooding the log if we're called on
    non-existant paths; (bso#14316)
  + smbd mistakenly updates a file's write-time on close;
    (bso#14320).
  + RPC handles cannot be differentiated in source3 RPC server;
    (bso#14359).
  + librpc: Fix IDL for svcctl_ChangeServiceConfigW; (bso#14313).
  + nsswitch: Fix use-after-free causing segfault in
    _pam_delete_cred; (bso#14327).
  + Fix fruit:time machine max size on arm; (bso#13622)
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294).
  + ctdb: Fix a memleak; (bso#14348).
  + libsmb: Don't try to find posix stat info in SMBC_getatr().
  + ctdb-tcp: Move free of inbound queue to TCP restart;
    (bso#14295); (bsc#1162680).
  + s3/librpc/crypto: Fix double free with unresolved
    credential cache; (bso#14344); (bsc#1169095)
  + s3:libads: Fix ads_get_upn(); (bso#14336).
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294)
  + Starting ctdb node that was powered off hard before
    results in recovery loop; (bso#14295); (bsc#1162680).
  + ctdb-recoverd: Avoid dereferencing NULL rec-&gt;nodemap;
    (bso#14324)
- Update to samba 4.11.8
  + CVE-2020-10700: Use-after-free in Samba AD DC LDAP
    Server with ASQ; (bso#14331); (bsc#1169850);
  + CVE-2020-10704: LDAP Denial of Service (stack overflow)
    in Samba AD DC; (bso#14334); (bsc#1169851);
- Update to samba 4.11.7
  + s3: lib: nmblib. Clean up and harden nmb packet
    processing; (bso#14239).
  + s3: VFS: full_audit. Use system session_info if called
    from a temporary share definition; (bso#14283)
  + dsdb: Correctly handle memory in objectclass_attrs;
    (bso#14258).
  + ldb: version 2.0.9, Samba 4.11 and later give incorrect
    results for SCOPE_ONE searches; (bso#14270)
  + auth: Fix CIDs 1458418 and 1458420 Null pointer
    dereferences; (bso#14247).
  + smbd: Handle EINTR from open(2) properly; (bso#14285)
  + winbind member (source3) fails local SAM auth with empty
    domain name; (bso#14247)
  + winbindd: Handling missing idmap in getgrgid(); (bso#14265).
  + lib:util: Log mkdir error on correct debug levels;
    (bso#14253).
  + wafsamba: Do not use 'rU' as the 'U' is deprecated in
    Python 3.9; (bso#14266).
  + ctdb-tcp: Make error handling for outbound connection
    consistent; (bso#14274).
- Update to samba 4.11.6
  + pygpo: Use correct method flags; (bso#14209).
  + vfs_ceph_snapshots: Fix root relative path handling;
    (bso#14216); (bsc#1141320).
  + Avoiding bad call flags with python 3.8, using METH_NOARGS
    instead of zero; (bso#14209).
  + source4/utils/oLschema2ldif: Include stdint.h before
    cmocka.h; (bso#14218).
  + docs-xml/winbindnssinfo: Clarify interaction with
    idmap_ad etc; (bso#14122).
  + smbd: Fix the build with clang; (bso#14251).
  + upgradedns: Ensure lmdb lock files linked; (bso#14199).
  + s3: VFS: glusterfs: Reset nlinks for symlink entries during
    readdir; (bso#14182).
  + smbc_stat() doesn't return the correct st_mode and also
    the uid/gid is not filled (SMBv1) file; (bso#14101).
  + librpc: Fix string length checking in
    ndr_pull_charset_to_null(); (bso#14219).
  + ctdb-scripts: Strip square brackets when gathering
    connection info; (bso#14227).

- Add libnetapi-devel to baselibs conf, for wine usage; (bsc#1172307);

- Installing: samba - samba-ad-dc.service does not exist and unit
  not found; (bsc#1171437);

- Fix samba_winbind package is installing python3-base without
  python3 package; (bsc#1169521);

Changes in ldb:
- Update to version 2.0.12
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server
    when ASQ and VLV combined; (bso#14364); (bsc#1173159).
  + ldb_ldap: fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + lib/ldb: add unit test for ldb_ldap internal code.
- Update to version 2.0.11
  + lib ldb: lmdb init var before calling mdb_reader_check.
  + lib ldb: lmdb clear stale readers on write txn start;
    (bso#14330).
  + ldb tests: Confirm lmdb free list handling
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141320">SUSE bug 1141320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162680">SUSE bug 1162680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169095">SUSE bug 1169095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169521">SUSE bug 1169521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169850">SUSE bug 1169850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169851">SUSE bug 1169851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171437">SUSE bug 1171437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172307">SUSE bug 1172307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173161">SUSE bug 1173161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173359">SUSE bug 1173359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498286" comment="samba-ad-dc-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498287" comment="samba-dsdb-modules-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111057" version="1" class="patch">
	<metadata>
		<title>Security update for targetcli-fb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172743" ref_url="https://bugzilla.suse.com/1172743" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13867" ref_url="https://www.suse.com/security/cve/CVE-2020-13867/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007205.html" source="SUSE-SU"/>
		<description>
This update for targetcli-fb fixes the following issues:

- CVE-2020-13867: Fixed the permissions in /etc/target (bsc#1172743)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-31"/>
	<updated date="2020-07-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172743">SUSE bug 1172743</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13867/">CVE-2020-13867</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498288" comment="python2-targetcli-fb-2.1.52-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111058" version="1" class="patch">
	<metadata>
		<title>Security update for python-rtslib-fb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173257" ref_url="https://bugzilla.suse.com/1173257" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14019" ref_url="https://www.suse.com/security/cve/CVE-2020-14019/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007211.html" source="SUSE-SU"/>
		<description>
This update for python-rtslib-fb fixes the following issues:

- Update to version v2.1.73 (bsc#1173257 CVE-2020-14019):
  * version 2.1.73
  * save_to_file: fix fd open mode
  * saveconfig: copy temp configfile with permissions
  * saveconfig: open the temp configfile with modes set
  * Fix 'is not' with a literal SyntaxWarning
  * Fix an incorrect config path in two comments
  * version 2.1.72
  * Do not change dbroot after drivers have been registered
  * Remove '_if_needed' from RTSRoot._set_dbroot()'s name
  Replacing old tarball with python-rtslib-fb-v2.1.73.tar.xz
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173257">SUSE bug 1173257</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14019/">CVE-2020-14019</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498289" comment="python2-rtslib-fb-2.1.73-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111059" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174091" ref_url="https://bugzilla.suse.com/1174091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20907" ref_url="https://www.suse.com/security/cve/CVE-2019-20907/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007284.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2019-20907: Avoid a possible infinite loop caused by specifically crafted tarballs (bsc#1174091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-19"/>
	<updated date="2020-08-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174091">SUSE bug 1174091</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20907/">CVE-2019-20907</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498251" comment="python-curses-2.7.17-7.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498252" comment="python-devel-2.7.17-7.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498253" comment="python-gdbm-2.7.17-7.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498254" comment="python-xml-2.7.17-7.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111060" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176179" ref_url="https://bugzilla.suse.com/1176179" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24977" ref_url="https://www.suse.com/security/cve/CVE-2020-24977/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007411.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2020-24977: Fixed a global-buffer-overflow in xmlEncodeEntitiesInternal (bsc#1176179).  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-11"/>
	<updated date="2020-09-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176179">SUSE bug 1176179</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-24977/">CVE-2020-24977</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498255" comment="python2-libxml2-python-2.9.7-3.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111061" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some non default configurations when an attacker established
 a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
 (CVE-2020-1472, bsc#1176579).

- Update to samba 4.11.13
  + s3: libsmb: Fix SMB2 client rename bug to a Windows server; (bso#14403);
  + dsdb: Allow 'password hash userPassword schemes = CryptSHA256' to work
    on RHEL7; (bso#14424);
  + dbcheck: Allow a dangling forward link outside our known NCs; (bso#14450);
  + lib/debug: Set the correct default backend loglevel to MAX_DEBUG_LEVEL;
    (bso#14426);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + lib/util: do not install 'test_util_paths'; (bso#14370);
  + lib:util: Fix smbclient -l basename dir; (bso#14345);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + util: Allow symlinks in directory_create_or_exist; (bso#14166);
  + docs: Fix documentation for require_membership_of of pam_winbind;
    (bso#14358);
  + s3:winbind:idmap_ad: Make failure to get attrnames for schema mode fatal;
    (bso#14425);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498290" comment="samba-ad-dc-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498291" comment="samba-dsdb-modules-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111062" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007496.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2019-20916: Fixed a directory traversal in _download_http_url (bsc#1176262)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498261" comment="python2-pip-10.0.1-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111063" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Update to samba 4.11.14

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
- lib/util: Do not install /usr/bin/test_util
- smbd: don't log success as error
- idmap_ad does not deal properly with a RFC4511 section 4.4.1 response;
- winbind: Fix a memleak
- idmap_ad: Pass tldap debug messages on to DEBUG()
- lib/replace: Move lib/replace/closefrom.c from ROKEN_HOSTCC_SOURCE to REPLACE_HOSTCC_SOURCE
- ctdb disable/enable can fail due to race condition
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498292" comment="samba-ad-dc-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498293" comment="samba-dsdb-modules-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111064" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177211" ref_url="https://bugzilla.suse.com/1177211" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26116" ref_url="https://www.suse.com/security/cve/CVE-2020-26116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007679.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- bsc#1177211 (CVE-2020-26116) no longer allowing special characters in the method parameter 
  of HTTPConnection.putrequest in httplib, stopping injection of headers.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-02"/>
	<updated date="2020-11-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177211">SUSE bug 1177211</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-26116/">CVE-2020-26116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498267" comment="python-curses-2.7.17-7.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498268" comment="python-devel-2.7.17-7.44.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498269" comment="python-gdbm-2.7.17-7.44.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498270" comment="python-xml-2.7.17-7.44.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111065" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159670" ref_url="https://bugzilla.suse.com/1159670" source="BUGZILLA"/>
		<reference ref_id="1175987" ref_url="https://bugzilla.suse.com/1175987" source="BUGZILLA"/>
		<reference ref_id="1176024" ref_url="https://bugzilla.suse.com/1176024" source="BUGZILLA"/>
		<reference ref_id="1176294" ref_url="https://bugzilla.suse.com/1176294" source="BUGZILLA"/>
		<reference ref_id="1176397" ref_url="https://bugzilla.suse.com/1176397" source="BUGZILLA"/>
		<reference ref_id="1177867" ref_url="https://bugzilla.suse.com/1177867" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)
- Fix disk.blkid to avoid unexpected keyword argument '__pub_user'. (bsc#1177867)
- Ensure virt.update stop_on_reboot is updated with its default value.
- Do not break package building for systemd OSes.
- Drop wrong mock from chroot unit test.
- Support systemd versions with dot. (bsc#1176294)
- Fix for grains.test_core unit test.
- Fix file/directory user and group ownership containing UTF-8 characters. (bsc#1176024)
- Several changes to virtualization:
  * Fix virt update when cpu and memory are changed.
  * Memory Tuning GSoC.
  * Properly fix memory setting regression in virt.update.
  * Expose libvirt on_reboot in virt states.
- Support transactional systems (MicroOS).
- zypperpkg module ignores retcode 104 for search(). (bsc#1159670)
- Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding
  file or block disk. (bsc#1175987)
- Invalidate file list cache when cache file modified time is in the future. (bsc#1176397)
- Prevent import errors when running test_btrfs unit tests.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1159670">SUSE bug 1159670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175987">SUSE bug 1175987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176024">SUSE bug 1176024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176294">SUSE bug 1176294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176397">SUSE bug 1176397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177867">SUSE bug 1177867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498294" comment="python2-salt-3000-4.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111066" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007889.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:
  
- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498272" comment="python2-pip-10.0.1-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111067" version="1" class="patch">
	<metadata>
		<title>Security update for python-setuptools (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007890.html" source="SUSE-SU"/>
		<description>
This update for python-setuptools fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498273" comment="python2-setuptools-40.5.0-6.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111068" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178168" ref_url="https://bugzilla.suse.com/1178168" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25659" ref_url="https://www.suse.com/security/cve/CVE-2020-25659/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007905.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-25659: Attempted to mitigate Bleichenbacher attacks on RSA decryption (bsc#1178168).
 		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178168">SUSE bug 1178168</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25659/">CVE-2020-25659</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498295" comment="python2-cryptography-2.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111069" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007904.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- Fixed a directory traversal in _download_http_url() (bsc#1176262 CVE-2019-20916)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-02"/>
	<updated date="2020-12-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498274" comment="python-curses-2.7.17-7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498275" comment="python-devel-2.7.17-7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498276" comment="python-gdbm-2.7.17-7.47.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498277" comment="python-xml-2.7.17-7.47.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111070" version="1" class="patch">
	<metadata>
		<title>Security update for python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007944.html" source="SUSE-SU"/>
		<description>
This update for python-urllib3 fixes the following issues:

- CVE-2020-26137: Fixed a CRLF injection via HTTP request method (bsc#1177120).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498278" comment="python2-urllib3-1.24-9.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111071" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip, python-scripttest (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175297" ref_url="https://bugzilla.suse.com/1175297" source="BUGZILLA"/>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007949.html" source="SUSE-SU"/>
		<description>
This update for python-pip, python-scripttest fixes the following issues:

- Update in SLE-15 (bsc#1175297, jsc#ECO-3035, jsc#PM-2318)

python-pip was updated to 20.0.2:

* Fix a regression in generation of compatibility tags
* Rename an internal module, to avoid ImportErrors due to improper uninstallation
* Switch to a dedicated CLI tool for vendoring dependencies.
* Remove wheel tag calculation from pip and use packaging.tags. This should provide more tags ordered better than in prior releases.
*  Deprecate setup.py-based builds that do not generate an .egg-info directory.
*  The pip&gt;=20 wheel cache is not retro-compatible with previous versions. Until pip 21.0, pip will continue to take advantage of existing legacy cache entries.
*  Deprecate undocumented --skip-requirements-regex option.
*  Deprecate passing install-location-related options via --install-option.
*  Use literal 'abi3' for wheel tag on CPython 3.x, to align with PEP 384 which only defines it for this platform.
*  Remove interpreter-specific major version tag e.g. cp3-none-any from consideration. This behavior was not documented strictly, and this tag in particular is not useful. Anyone with a use case can create an issue with pypa/packaging.
*  Wheel processing no longer permits wheels containing more than one top-level .dist-info directory.
*  Support for the git+git@ form of VCS requirement is being deprecated and will be removed in pip 21.0. Switch to git+https:// or git+ssh://. git+git:// also works but its use is discouraged as it is insecure.
*  Default to doing a user install (as if --user was passed) when the main site-packages directory is not writeable and user site-packages are enabled.
*  Warn if a path in PATH starts with tilde during pip install.
*  Cache wheels built from Git requirements that are considered immutable, because they point to a commit hash.
*  Add option --no-python-version-warning to silence warnings related to deprecation of Python versions.
*  Cache wheels that pip wheel built locally, matching what pip install does. This particularly helps performance in workflows where pip wheel is used for building before installing. Users desiring the original behavior can use pip wheel --no-cache-dir
*  Display CA information in pip debug.
*  Show only the filename (instead of full URL), when downloading from PyPI.
*  Suggest a more robust command to upgrade pip itself to avoid confusion when the current pip command is not available as pip.
*  Define all old pip console script entrypoints to prevent import issues in stale wrapper scripts.
*  The build step of pip wheel now builds all wheels to a cache first, then copies them to the wheel directory all at once. Before, it built them to a temporary directory and moved them to the wheel directory one by one.
*  Expand ~ prefix to user directory in path options, configs, and environment variables. Values that may be either URL or path are not currently supported, to avoid ambiguity:

   --find-links
   --constraint, -c
   --requirement, -r
   --editable, -e

*  Correctly handle system site-packages, in virtual environments created with venv (PEP 405).
*  Fix case sensitive comparison of pip freeze when used with -r option.
*  Enforce PEP 508 requirement format in pyproject.toml build-system.requires.
*  Make ensure_dir() also ignore ENOTEMPTY as seen on Windows.
*  Fix building packages which specify backend-path in pyproject.toml.
*  Do not attempt to run setup.py clean after a pep517 build error, since a setup.py may not exist in that case.
*  Fix passwords being visible in the index-url in 'Downloading &lt;url&gt;' message.
*  Change method from shutil.remove to shutil.rmtree in noxfile.py.
*  Skip running tests which require subversion, when svn isn't installed
*  Fix not sending client certificates when using --trusted-host.
*  Make sure pip wheel never outputs pure python wheels with a python implementation tag. Better fix/workaround for #3025 by using a per-implementation wheel cache instead of caching pure python wheels with an implementation tag in their name.
*  Include subdirectory URL fragments in cache keys.
*  Fix typo in warning message when any of --build-option, --global-option and --install-option is used in requirements.txt
*  Fix the logging of cached HTTP response shown as downloading.
*  Effectively disable the wheel cache when it is not writable, as is the case with the http cache.
*  Correctly handle relative cache directory provided via --cache-dir.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175297">SUSE bug 1175297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498279" comment="python2-pip-20.0.2-6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111072" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="1184310" ref_url="https://bugzilla.suse.com/1184310" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- s3-libads: use dns name to open a ldap session (bsc#1184310).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184310">SUSE bug 1184310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498296" comment="samba-ad-dc-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493815" comment="samba-dsdb-modules-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111073" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008740.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-05"/>
	<updated date="2021-05-05"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498297" comment="python2-libxml2-python-2.9.7-3.31.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111074" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185408" ref_url="https://bugzilla.suse.com/1185408" source="BUGZILLA"/>
		<reference ref_id="1185409" ref_url="https://bugzilla.suse.com/1185409" source="BUGZILLA"/>
		<reference ref_id="1185410" ref_url="https://bugzilla.suse.com/1185410" source="BUGZILLA"/>
		<reference ref_id="1185698" ref_url="https://bugzilla.suse.com/1185698" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3516" ref_url="https://www.suse.com/security/cve/CVE-2021-3516/" source="CVE"/>
		<reference ref_id="CVE-2021-3517" ref_url="https://www.suse.com/security/cve/CVE-2021-3517/" source="CVE"/>
		<reference ref_id="CVE-2021-3518" ref_url="https://www.suse.com/security/cve/CVE-2021-3518/" source="CVE"/>
		<reference ref_id="CVE-2021-3537" ref_url="https://www.suse.com/security/cve/CVE-2021-3537/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008795.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3537: NULL pointer dereference in valid.c:xmlValidBuildAContentModel (bsc#1185698)
- CVE-2021-3518: Fixed a use after free in xinclude.c:xmlXIncludeDoProcess (bsc#1185408).
- CVE-2021-3517: Fixed a heap based buffer overflow in entities.c:xmlEncodeEntitiesInternal (bsc#1185410).
- CVE-2021-3516: Fixed a use after free in entities.c:xmlEncodeEntitiesInternal (bsc#1185409).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185408">SUSE bug 1185408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185409">SUSE bug 1185409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185410">SUSE bug 1185410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185698">SUSE bug 1185698</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3516/">CVE-2021-3516</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3517/">CVE-2021-3517</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3518/">CVE-2021-3518</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3537/">CVE-2021-3537</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498298" comment="python2-libxml2-python-2.9.7-3.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111075" version="1" class="patch">
	<metadata>
		<title>Security update for python-py (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179805" ref_url="https://bugzilla.suse.com/1179805" source="BUGZILLA"/>
		<reference ref_id="1184505" ref_url="https://bugzilla.suse.com/1184505" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29651" ref_url="https://www.suse.com/security/cve/CVE-2020-29651/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008931.html" source="SUSE-SU"/>
		<description>
This update for python-py fixes the following issues:

- CVE-2020-29651: Fixed regular expression denial of service in svnwc.py (bsc#1179805, bsc#1184505).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179805">SUSE bug 1179805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184505">SUSE bug 1184505</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29651/">CVE-2020-29651</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498299" comment="python2-py-1.8.1-5.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111076" version="1" class="patch">
	<metadata>
		<title>Security update for libxml2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186015" ref_url="https://bugzilla.suse.com/1186015" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3541" ref_url="https://www.suse.com/security/cve/CVE-2021-3541/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008970.html" source="SUSE-SU"/>
		<description>
This update for libxml2 fixes the following issues:

- CVE-2021-3541: Fixed exponential entity expansion attack bypasses all existing protection mechanisms. (bsc#1186015)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186015">SUSE bug 1186015</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3541/">CVE-2021-3541</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498300" comment="python2-libxml2-python-2.9.7-3.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111077" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171257" ref_url="https://bugzilla.suse.com/1171257" source="BUGZILLA"/>
		<reference ref_id="1176293" ref_url="https://bugzilla.suse.com/1176293" source="BUGZILLA"/>
		<reference ref_id="1179831" ref_url="https://bugzilla.suse.com/1179831" source="BUGZILLA"/>
		<reference ref_id="1181368" ref_url="https://bugzilla.suse.com/1181368" source="BUGZILLA"/>
		<reference ref_id="1182281" ref_url="https://bugzilla.suse.com/1182281" source="BUGZILLA"/>
		<reference ref_id="1182293" ref_url="https://bugzilla.suse.com/1182293" source="BUGZILLA"/>
		<reference ref_id="1182382" ref_url="https://bugzilla.suse.com/1182382" source="BUGZILLA"/>
		<reference ref_id="1185092" ref_url="https://bugzilla.suse.com/1185092" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028) 

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- virt module updates
  * network: handle missing ipv4 netmask attribute
  * more network support
  * PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in requirements/base.txt
- Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382)
- Always require `python3-distro` (bsc#1182293)
- Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing
- Fix pkg states when DEB package has 'all' arch
- Do not force beacons configuration to be a list.
- Remove msgpack &lt; 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version &gt;= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Improvements on 'ansiblegate' module (bsc#1185092):
  * New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171257">SUSE bug 1171257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176293">SUSE bug 1176293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179831">SUSE bug 1179831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181368">SUSE bug 1181368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182281">SUSE bug 1182281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182293">SUSE bug 1182293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185092">SUSE bug 1185092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498301" comment="python2-distro-1.5.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111078" version="1" class="patch">
	<metadata>
		<title>Security update for aws-cli, python-boto3, python-botocore, python-service_identity, python-trustme, python-urllib3 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1102408" ref_url="https://bugzilla.suse.com/1102408" source="BUGZILLA"/>
		<reference ref_id="1138715" ref_url="https://bugzilla.suse.com/1138715" source="BUGZILLA"/>
		<reference ref_id="1138746" ref_url="https://bugzilla.suse.com/1138746" source="BUGZILLA"/>
		<reference ref_id="1176389" ref_url="https://bugzilla.suse.com/1176389" source="BUGZILLA"/>
		<reference ref_id="1177120" ref_url="https://bugzilla.suse.com/1177120" source="BUGZILLA"/>
		<reference ref_id="1182421" ref_url="https://bugzilla.suse.com/1182421" source="BUGZILLA"/>
		<reference ref_id="1182422" ref_url="https://bugzilla.suse.com/1182422" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26137" ref_url="https://www.suse.com/security/cve/CVE-2020-26137/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009334.html" source="SUSE-SU"/>
		<description>
This patch updates the Python AWS SDK stack in SLE 15:

General:

# aws-cli

- Version updated to upstream release v1.19.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-boto3

- Version updated to upstream release 1.17.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-botocore

- Version updated to upstream release 1.20.9
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-urllib3

- Version updated to upstream release 1.25.10
  For a detailed list of all changes, please refer to the changelog file of this package.

# python-service_identity

- Added this new package to resolve runtime dependencies for other packages.
  Version: 18.1.0

# python-trustme

- Added this new package to resolve runtime dependencies for other packages.
  Version: 0.6.0

Security fixes:

# python-urllib3:
  
- CVE-2020-26137: urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated
  by inserting CR and LF control characters in the first argument of putrequest() (bsc#1177120)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-23"/>
	<updated date="2021-08-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1102408">SUSE bug 1102408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138715">SUSE bug 1138715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138746">SUSE bug 1138746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176389">SUSE bug 1176389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177120">SUSE bug 1177120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182421">SUSE bug 1182421</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182422">SUSE bug 1182422</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26137/">CVE-2020-26137</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626960" comment="python2-asn1crypto-0.24.0-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626961" comment="python2-cffi-1.13.2-3.2.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626962" comment="python2-cryptography-2.8-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626963" comment="python2-pyOpenSSL-17.5.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626964" comment="python2-pyasn1-0.4.2-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626965" comment="python2-pycparser-2.17-3.2.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626966" comment="python2-urllib3-1.25.10-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111079" version="1" class="patch">
	<metadata>
		<title>Security update for rpm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179416" ref_url="https://bugzilla.suse.com/1179416" source="BUGZILLA"/>
		<reference ref_id="1183543" ref_url="https://bugzilla.suse.com/1183543" source="BUGZILLA"/>
		<reference ref_id="1183545" ref_url="https://bugzilla.suse.com/1183545" source="BUGZILLA"/>
		<reference ref_id="1183632" ref_url="https://bugzilla.suse.com/1183632" source="BUGZILLA"/>
		<reference ref_id="1183659" ref_url="https://bugzilla.suse.com/1183659" source="BUGZILLA"/>
		<reference ref_id="1185299" ref_url="https://bugzilla.suse.com/1185299" source="BUGZILLA"/>
		<reference ref_id="1187670" ref_url="https://bugzilla.suse.com/1187670" source="BUGZILLA"/>
		<reference ref_id="1188548" ref_url="https://bugzilla.suse.com/1188548" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20266" ref_url="https://www.suse.com/security/cve/CVE-2021-20266/" source="CVE"/>
		<reference ref_id="CVE-2021-20271" ref_url="https://www.suse.com/security/cve/CVE-2021-20271/" source="CVE"/>
		<reference ref_id="CVE-2021-3421" ref_url="https://www.suse.com/security/cve/CVE-2021-3421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html" source="SUSE-SU"/>
		<description>
This update for rpm fixes the following issues:

Security issues fixed:

- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)
- PGP hardening changes (bsc#1185299)
- Fixed potential access of freed mem in ndb's glue code (bsc#1179416)

Maintaince issues fixed:

- Fixed zstd detection (bsc#1187670)
- Added ndb rofs support (bsc#1188548)
- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179416">SUSE bug 1179416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183543">SUSE bug 1183543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183545">SUSE bug 1183545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183632">SUSE bug 1183632</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183659">SUSE bug 1183659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185299">SUSE bug 1185299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187670">SUSE bug 1187670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188548">SUSE bug 1188548</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20266/">CVE-2021-20266</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20271/">CVE-2021-20271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3421/">CVE-2021-3421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652137" comment="python2-rpm-4.14.1-22.4.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111080" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189241" ref_url="https://bugzilla.suse.com/1189241" source="BUGZILLA"/>
		<reference ref_id="1189287" ref_url="https://bugzilla.suse.com/1189287" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3733" ref_url="https://www.suse.com/security/cve/CVE-2021-3733/" source="CVE"/>
		<reference ref_id="CVE-2021-3737" ref_url="https://www.suse.com/security/cve/CVE-2021-3737/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009628.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2021-3737: Fixed http client infinite line reading (DoS) after a http 100. (bsc#1189241)
- CVE-2021-3733: Fixed ReDoS in urllib.request. (bsc#1189287)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189241">SUSE bug 1189241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189287">SUSE bug 1189287</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3733/">CVE-2021-3733</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3737/">CVE-2021-3737</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651680" comment="python-curses-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651681" comment="python-devel-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651682" comment="python-gdbm-2.7.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651683" comment="python-xml-2.7.18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111081" version="1" class="patch">
	<metadata>
		<title>Security update for python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1180686" ref_url="https://bugzilla.suse.com/1180686" source="BUGZILLA"/>
		<reference ref_id="1181126" ref_url="https://bugzilla.suse.com/1181126" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="CVE-2021-3177" ref_url="https://www.suse.com/security/cve/CVE-2021-3177/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008291.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- buffer overflow in PyCArg_repr in _ctypes/callproc.c,
  which may lead to remote code execution (bsc#1181126, CVE-2021-3177).
- Provide the newest setuptools wheel (bsc#1176262,
  CVE-2019-20916) in their correct form (bsc#1180686).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180686">SUSE bug 1180686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181126">SUSE bug 1181126</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3177/">CVE-2021-3177</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498302" comment="python-curses-2.7.17-7.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498303" comment="python-devel-2.7.17-7.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498304" comment="python-gdbm-2.7.17-7.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498305" comment="python-xml-2.7.17-7.52.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111082" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192214" ref_url="https://bugzilla.suse.com/1192214" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654814" comment="samba-ad-dc-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654731" comment="samba-dsdb-modules-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111083" version="1" class="patch">
	<metadata>
		<title>Security update for python-Babel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185768" ref_url="https://bugzilla.suse.com/1185768" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42771" ref_url="https://www.suse.com/security/cve/CVE-2021-42771/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009858.html" source="SUSE-SU"/>
		<description>
This update for python-Babel fixes the following issues:

- CVE-2021-42771: Fixed relative path traversal that may lead to arbitrary locale files loading and arbitrary code execution (bsc#1185768).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185768">SUSE bug 1185768</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42771/">CVE-2021-42771</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658538" comment="python2-Babel-2.8.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111084" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009888.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- CVE-2021-3572: Fixed incorrect handling of unicode separators in git references (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-13"/>
	<updated date="2021-12-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659041" comment="python2-pip-20.0.2-6.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111085" version="1" class="patch">
	<metadata>
		<title>Security update for python-bottle (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182181" ref_url="https://bugzilla.suse.com/1182181" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28473" ref_url="https://www.suse.com/security/cve/CVE-2020-28473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0483-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008331.html" source="SUSE-SU"/>
		<description>
This update for python-bottle fixes the following issues:

- CVE-2020-28473: Fixed Web Cache Poisoning vulnerability using parameter cloaking (bsc#1182181).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-16"/>
	<updated date="2021-02-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182181">SUSE bug 1182181</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28473/">CVE-2020-28473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498306" comment="python2-bottle-0.12.13-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111086" version="1" class="patch">
	<metadata>
		<title>Security update for python-cryptography (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182066" ref_url="https://bugzilla.suse.com/1182066" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36242" ref_url="https://www.suse.com/security/cve/CVE-2020-36242/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0594-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008369.html" source="SUSE-SU"/>
		<description>
This update for python-cryptography fixes the following issues:

- CVE-2020-36242: Using the Fernet class to symmetrically encrypt multi gigabyte
  values could result in an integer overflow and buffer overflow (bsc#1182066).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-25"/>
	<updated date="2021-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182066">SUSE bug 1182066</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36242/">CVE-2020-36242</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498307" comment="python2-cryptography-2.8-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111087" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix errors with virt.update
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for `grub.xen` path
- Xen spicevmc, DNS SRV records backports:
  - Fix virtual network generated DNS XML for SRV records
  - Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when `efi=True` 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498308" comment="python2-salt-3000-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111088" version="1" class="patch">
	<metadata>
		<title>Security update for python-Jinja2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181944" ref_url="https://bugzilla.suse.com/1181944" source="BUGZILLA"/>
		<reference ref_id="1182244" ref_url="https://bugzilla.suse.com/1182244" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28493" ref_url="https://www.suse.com/security/cve/CVE-2020-28493/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008398.html" source="SUSE-SU"/>
		<description>
This update for python-Jinja2 fixes the following issues:

- CVE-2020-28493: Fixed a ReDOS vulnerability where urlize could have 
  been called with untrusted user data (bsc#1181944).  
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181944">SUSE bug 1181944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182244">SUSE bug 1182244</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28493/">CVE-2020-28493</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498309" comment="python2-Jinja2-2.10.1-3.10.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111089" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182379" ref_url="https://bugzilla.suse.com/1182379" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23336" ref_url="https://www.suse.com/security/cve/CVE-2021-23336/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-March/018251.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- python27 was upgraded to 2.7.18
- CVE-2021-23336: Fixed a potential web cache poisoning by using a semicolon in query parameters use of semicolon as a query string separator (bsc#1182379).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-11"/>
	<updated date="2021-03-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182379">SUSE bug 1182379</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23336/">CVE-2021-23336</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498310" comment="python-curses-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498311" comment="python-devel-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498312" comment="python-gdbm-2.7.18-7.55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498313" comment="python-xml-2.7.18-7.55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111090" version="1" class="patch">
	<metadata>
		<title>Security update for ldb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Python 2 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008557.html" source="SUSE-SU"/>
		<description>
This update for ldb fixes the following issues:

- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).
- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-python2:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009287164" comment="SUSE Linux Enterprise Module for Python 2 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498314" comment="libldb1-1.4.6-3.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111091" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177027" ref_url="https://bugzilla.suse.com/1177027" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007730.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).
- CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#1177121).
- CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states are disabled (bnc#1176588).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfs: Fix security label length not being reset (bsc#1176381).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- power: supply: max17040: Correct voltage reading (git-fixes).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Avoid creating large imbalances at task creation time (bnc#1176588).
- sched/numa: Check numa balancing information only when enabled (bnc#1176588).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- usb: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-06"/>
	<updated date="2020-11-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177027">SUSE bug 1177027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498448" comment="cluster-md-kmp-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498449" comment="dlm-kmp-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498450" comment="gfs2-kmp-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498451" comment="kernel-devel-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498452" comment="kernel-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498453" comment="kernel-rt-devel-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498454" comment="kernel-rt_debug-devel-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498455" comment="kernel-source-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498456" comment="kernel-syms-rt-5.3.18-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498457" comment="ocfs2-kmp-rt-5.3.18-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111092" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1170446" ref_url="https://bugzilla.suse.com/1170446" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176564" ref_url="https://bugzilla.suse.com/1176564" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177698" ref_url="https://bugzilla.suse.com/1177698" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="1177727" ref_url="https://bugzilla.suse.com/1177727" source="BUGZILLA"/>
		<reference ref_id="1177729" ref_url="https://bugzilla.suse.com/1177729" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178622" ref_url="https://bugzilla.suse.com/1178622" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178700" ref_url="https://bugzilla.suse.com/1178700" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007856.html" source="SUSE-SU"/>
		<description>
 The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:


- CVE-2020-25705: A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-8694: Insufficient access control for some Intel(R) Processors may have allowed an authenticated user to potentially enable information disclosure via local access (bsc#1170415).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2020-14351: Fixed a race in the perf_mmap_close() function (bsc#1177086).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file (bsc#1177470).
- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' (bsc#1177725).
- CVE-2020-25704: Fixed a memory leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth (bsc#1177726).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon (bsc#1178589)

The following non-security bugs were fixed:

- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ccp - fix error handling (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dma-buf: Remove custom seqcount lockdep class key (bsc#1176564 bsc#1162702).
- dma-buf: Use sequence counter with associated wound/wait mutex (bsc#1176564 bsc#1162702).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- Documentation: locking: Describe seqlock design and usage (bsc#1176564 bsc#1162702).
- Do not create null.i000.ipa-clones file (bsc#1178330)
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- exfat: fix wrong size update of stream entry by typo (git-fixes).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- hrtimer: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iocost: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- kexec: Do not take mutex when crashing kernel (bsc#1177698).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- kvm/eventfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- leds: mt6323: move period calculation (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- lockdep: Add preemption enabled/disabled assertion APIs (bsc#1176564 bsc#1162702).
- lockdep: Split header file into lockdep and lockdep_types (bsc#1176564 bsc#1162702).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm: fix a race during THP splitting (bsc#1178255).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm: madvise: fix vma user-after-free (git-fixes).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692).
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- mm/swap: Do not abuse the seqcount_t latching API (bsc#1176564 bsc#1162702). Remove:
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- netfilter: conntrack: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- netfilter: nft_set_rbtree: Use sequence counter with associated rwlock (bsc#1176564 bsc#1162702).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- nfs: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- nfs: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification.
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- raid5: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- rbtree_latch: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983)
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- sched_clock: Expose struct clock_read_data (bsc#1176564 bsc#1162702).
- sched: tasks: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- seqcount: Compress SEQCNT_LOCKNAME_ZERO() (bsc#1176564 bsc#1162702).
- seqcount: More consistent seqprop names (bsc#1176564 bsc#1162702).
- seqlock: Add kernel-doc for seqcount_t and seqlock_t APIs (bsc#1176564 bsc#1162702).
- seqlock: Align multi-line macros newline escapes at 72 columns (bsc#1176564 bsc#1162702).
- seqlock: Extend seqcount API with associated locks (bsc#1176564 bsc#1162702).
- seqlock: Fold seqcount_LOCKNAME_init() definition (bsc#1176564 bsc#1162702).
- seqlock: Fold seqcount_LOCKNAME_t definition (bsc#1176564 bsc#1162702).
- seqlock: Implement raw_seqcount_begin() in terms of raw_read_seqcount() (bsc#1176564 bsc#1162702).
- seqlock: Introduce seqcount_latch_t (bsc#1176564 bsc#1162702).
- seqlock, kcsan: Add annotations for KCSAN (bsc#1176564 bsc#1162702).
- seqlock: lockdep assert non-preemptibility on seqcount_t write (bsc#1176564 bsc#1162702).
- seqlock: PREEMPT_RT: Do not starve seqlock_t writers (bsc#1176564 bsc#1162702).
- seqlock: Properly format kernel-doc code samples (bsc#1176564 bsc#1162702).
- seqlock: Reorder seqcount_t and seqlock_t API definitions (bsc#1176564 bsc#1162702).
- seqlock: Require WRITE_ONCE surrounding raw_seqcount_barrier (bsc#1176564 bsc#1162702).
- seqlock: seqcount latch APIs: Only allow seqcount_latch_t (bsc#1176564 bsc#1162702).
- seqlock: seqcount_LOCKNAME_t: Introduce PREEMPT_RT support (bsc#1176564 bsc#1162702).
- seqlock: seqcount_LOCKNAME_t: Standardize naming convention (bsc#1176564 bsc#1162702).
- seqlock: seqcount_t: Implement all read APIs as statement expressions (bsc#1176564 bsc#1162702).
- seqlock: seqcount_t latch: End read sections with read_seqcount_retry() (bsc#1176564 bsc#1162702).
- seqlock: s/__SEQ_LOCKDEP/__SEQ_LOCK/g (bsc#1176564 bsc#1162702).
- seqlock: Unbreak lockdep (bsc#1176564 bsc#1162702).
- seqlock: Use unique prefix for seqcount_t property accessors (bsc#1176564 bsc#1162702).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- SUNRPC: Revert 241b1f419f0e ('SUNRPC: Remove xdr_buf_trim()') (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- Sync rt_debug config file.
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- timekeeping: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- timekeeping: Use sequence counter with associated raw spinlock (bsc#1176564 bsc#1162702).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- time/sched_clock: Use raw_read_seqcount_latch() (bsc#1176564 bsc#1162702).
- time/sched_clock: Use raw_read_seqcount_latch() during suspend (bsc#1176564 bsc#1162702).
- time/sched_clock: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tracing: Save normal string variables (git-fixes).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: cdc-acm: handle broken union descriptors (git-fixes).
- USB: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- usb: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- usb: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- usb: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- usb: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- usb: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- usb: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usb: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- usb: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- usb: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- usb: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- userfaultfd: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- vfs: Use sequence counter with associated spinlock (bsc#1176564 bsc#1162702).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- whitespace cleanup
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/tsc: Use seqcount_latch_t (bsc#1176564 bsc#1162702).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfrm: policy: Use sequence counters with associated lock (bsc#1176564 bsc#1162702).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: limit entries returned when counting fsmap records (git-fixes).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170446">SUSE bug 1170446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176564">SUSE bug 1176564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177698">SUSE bug 1177698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177727">SUSE bug 1177727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177729">SUSE bug 1177729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178622">SUSE bug 1178622</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178700">SUSE bug 1178700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498458" comment="cluster-md-kmp-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498459" comment="dlm-kmp-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498460" comment="gfs2-kmp-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498461" comment="kernel-devel-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498462" comment="kernel-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498463" comment="kernel-rt-devel-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498464" comment="kernel-rt_debug-devel-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498465" comment="kernel-source-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498466" comment="kernel-syms-rt-5.3.18-16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498467" comment="ocfs2-kmp-rt-5.3.18-16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111093" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178782" ref_url="https://bugzilla.suse.com/1178782" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007977.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25705: Fixed A flaw in the way reply ICMP packets are limited in was found that allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software and services that rely on UDP source port randomization (like DNS) are indirectly affected as well. Kernel versions may be vulnerable to this issue (bsc#1175721, bsc#1178782).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 bsc#1179432).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- blk-mq-blk-mq-provide-forced-completion-method.patch: (bsc#1175995,jsc#SLE-15608,bsc#1178756).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- Convert trailing spaces and periods in path components (bsc#1179424).
- coredump: fix core_pattern parse error (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for HD-audio (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- net/x25: prevent a couple of overflows (bsc#1178590).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-force-complete-cancelled-requests.patch: (bsc#1175995,bsc#1178756,jsc#SLE-15608). 
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550)
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- time/sched_clock: Mark sched_clock_read_begin/retry() as notrace (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- Update patches.suse/xfrm-Fix-memleak-on-xfrm-state-destroy.patch references (add bsc#1158775).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- USB: serial: kl5kusb105: fix memleak on open (git-fixes).
- USB: serial: kl5kusb105: fix memleak on open (git-fixes).
- USB: serial: option: fix Quectel BG96 matching (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178782">SUSE bug 1178782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498468" comment="cluster-md-kmp-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498469" comment="dlm-kmp-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498470" comment="gfs2-kmp-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498471" comment="kernel-devel-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498472" comment="kernel-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498473" comment="kernel-rt-devel-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498474" comment="kernel-rt_debug-devel-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498475" comment="kernel-source-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498476" comment="kernel-syms-rt-5.3.18-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498477" comment="ocfs2-kmp-rt-5.3.18-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111094" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180349" ref_url="https://bugzilla.suse.com/1180349" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).

The following non-security bugs were fixed:

- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- add reference to CVE and its bsc
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- Documentation: seqlock: s/LOCKTYPE/LOCKNAME/g (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: hrtimer-trigger: Mark hrtimer to expire in hard interrupt context (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- seqlock: avoid -Wshadow warnings (git-fixes).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- timers: Do not block on -&gt;expiry_lock for TIMER_IRQSAFE timers (bsc#1180349).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-13"/>
	<updated date="2021-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180349">SUSE bug 1180349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498478" comment="cluster-md-kmp-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498479" comment="dlm-kmp-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498480" comment="gfs2-kmp-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498481" comment="kernel-devel-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498482" comment="kernel-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498483" comment="kernel-rt-devel-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498484" comment="kernel-rt_debug-devel-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498485" comment="kernel-source-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498486" comment="kernel-syms-rt-5.3.18-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498487" comment="ocfs2-kmp-rt-5.3.18-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111095" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182712" ref_url="https://bugzilla.suse.com/1182712" source="BUGZILLA"/>
		<reference ref_id="1182713" ref_url="https://bugzilla.suse.com/1182713" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1211-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-April/018582.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- certs: Fix blacklist flag type confusion (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) Backporting notes: 	* context changes
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) Backporting notes: 	* rename amd/pm to amd/powerplay 	* context changes
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &amp;lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&amp;lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-15"/>
	<updated date="2021-04-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182712">SUSE bug 1182712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182713">SUSE bug 1182713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498488" comment="cluster-md-kmp-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498489" comment="dlm-kmp-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498490" comment="gfs2-kmp-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498491" comment="kernel-devel-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498492" comment="kernel-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498493" comment="kernel-rt-devel-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498494" comment="kernel-rt_debug-devel-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498495" comment="kernel-source-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498496" comment="kernel-syms-rt-5.3.18-33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498497" comment="ocfs2-kmp-rt-5.3.18-33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111096" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008760.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf, libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- bpf, samples: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498498" comment="cluster-md-kmp-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498499" comment="dlm-kmp-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498500" comment="gfs2-kmp-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498501" comment="kernel-devel-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498502" comment="kernel-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498503" comment="kernel-rt-devel-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498504" comment="kernel-rt_debug-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498505" comment="kernel-rt_debug-devel-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498506" comment="kernel-source-rt-5.3.18-36.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498507" comment="kernel-syms-rt-5.3.18-36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498508" comment="ocfs2-kmp-rt-5.3.18-36.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111097" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1176564" ref_url="https://bugzilla.suse.com/1176564" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185696" ref_url="https://bugzilla.suse.com/1185696" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008956.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- locking/seqlock: Tweak DEFINE_SEQLOCK() kernel doc (bsc#1176564 bsc#1162702).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- net: xfrm: Localize sequence counter per network namespace (bsc#1185696).
- net: xfrm: Use sequence counter with associated spinlock (bsc#1185696).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr
- seqlock,lockdep: Fix seqcount_latch_init() (bsc#1176564 bsc#1162702).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176564">SUSE bug 1176564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185696">SUSE bug 1185696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498509" comment="cluster-md-kmp-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498510" comment="dlm-kmp-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498511" comment="gfs2-kmp-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498512" comment="kernel-devel-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498513" comment="kernel-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498514" comment="kernel-rt-devel-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498515" comment="kernel-rt_debug-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498516" comment="kernel-rt_debug-devel-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498517" comment="kernel-source-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498518" comment="kernel-syms-rt-5.3.18-39.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498519" comment="ocfs2-kmp-rt-5.3.18-39.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111098" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187834" ref_url="https://bugzilla.suse.com/1187834" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009188.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- net: Treat __napi_schedule_irqoff() as __napi_schedule() on PREEMPT_RT (bsc#1187834).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: Fix RCU vs hash_resize_mutex lock inversion (bsc#1185675).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187834">SUSE bug 1187834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625454" comment="cluster-md-kmp-rt-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625455" comment="dlm-kmp-rt-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625456" comment="gfs2-kmp-rt-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625457" comment="kernel-devel-rt-5.3.18-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625458" comment="kernel-rt-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625459" comment="kernel-rt-devel-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625460" comment="kernel-rt_debug-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625461" comment="kernel-rt_debug-devel-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625462" comment="kernel-source-rt-5.3.18-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625463" comment="kernel-syms-rt-5.3.18-42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625464" comment="lttng-modules-kmp-rt-2.10.10_k5.3.18_42-1.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625465" comment="ocfs2-kmp-rt-5.3.18-42.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625466" comment="oracleasm-kmp-rt-2.0.8_k5.3.18_42-1.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111099" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188525" ref_url="https://bugzilla.suse.com/1188525" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009244.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-22555: Fixed an heap out-of-bounds write in net/netfilter/x_tables.c that could allow local provilege escalation. (bsc#1188116)
- CVE-2021-3609: Fixed a race condition in the CAN BCM networking protocol which allows for local privilege escalation. (bsc#1187215)
- CVE-2021-3612: Fixed an out-of-bounds memory write flaw which could allows a local user to crash the system or possibly escalate their privileges on the system. (bsc#1187585)
- CVE-2021-35039: Fixed a bug where modules signature verification did not occur if CONFIG_MODULE_SIG is not set, regardless of the value of module.sig_enforce command-line argument. (bnc#1188080)

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472) Backporting changes: 	* context changes
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489) Backporting changes: 	* context changes
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472) Backporting changes: 	* unsigned long -&gt; uint32_t
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472) Backporting changes: 	* only panel-samsung-s6d16d0.c exists
- drm/msm: Small msm_gem_purge() fix (bsc#1152489) Backporting changes: 	* context changes 	* GEM_WARN_ON() -&gt; WARN_ON()
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489) Backporting changes: 	* context changes
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489) Backporting changes: 	* context changes 	* vc4_hdmi -&gt; vc4-&gt;hdmi
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- mac80211: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme: fix in-casule data send for chained sgls (git-fixes).
- nvme: introduce nvme_rdma_sgl structure (git-fixes).
- nvme: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- tcp: Remove superfluous BH-disable around listening_hash (bsc#1188525).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify and fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- Update patches.suse/Revert-ibmvnic-remove-duplicate-napi_schedule-call-i.patch (bsc#1065729 bsc#1188405 ltc#193509).
- Update patches.suse/Revert-ibmvnic-simplify-reset_long_term_buff-functio.patch (bsc#1186206 ltc#191041 bsc#1188405 ltc#193509).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- UsrMerge the kernel (boo#1184804)
- vfio: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors and warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-03"/>
	<updated date="2021-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188525">SUSE bug 1188525</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626888" comment="cluster-md-kmp-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626889" comment="dlm-kmp-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626890" comment="gfs2-kmp-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626891" comment="kernel-devel-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626892" comment="kernel-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626893" comment="kernel-rt-devel-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626894" comment="kernel-rt_debug-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626895" comment="kernel-rt_debug-devel-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626896" comment="kernel-source-rt-5.3.18-45.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626897" comment="kernel-syms-rt-5.3.18-45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626898" comment="ocfs2-kmp-rt-5.3.18-45.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111100" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188063" ref_url="https://bugzilla.suse.com/1188063" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188257" ref_url="https://bugzilla.suse.com/1188257" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188842" ref_url="https://bugzilla.suse.com/1188842" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009288.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).
- CVE-2021-33909: Fixed an out-of-bounds write in the filesystem layer that allows to obtain full root privileges. (bsc#1188062)

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-12"/>
	<updated date="2021-08-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188063">SUSE bug 1188063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188257">SUSE bug 1188257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188842">SUSE bug 1188842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009628042" comment="cluster-md-kmp-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628043" comment="dlm-kmp-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628044" comment="gfs2-kmp-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628045" comment="kernel-devel-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628046" comment="kernel-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628047" comment="kernel-rt-devel-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628048" comment="kernel-rt_debug-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628049" comment="kernel-rt_debug-devel-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628050" comment="kernel-source-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628051" comment="kernel-syms-rt-5.3.18-48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009628052" comment="ocfs2-kmp-rt-5.3.18-48.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111101" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3177-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009470.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Realtime kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-21"/>
	<updated date="2021-09-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633316" comment="cluster-md-kmp-rt-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633317" comment="dlm-kmp-rt-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633318" comment="gfs2-kmp-rt-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633319" comment="kernel-devel-rt-5.3.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633320" comment="kernel-rt-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633321" comment="kernel-rt-devel-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633322" comment="kernel-rt_debug-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633323" comment="kernel-rt_debug-devel-5.3.18-51.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633324" comment="kernel-source-rt-5.3.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633325" comment="kernel-syms-rt-5.3.18-51.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633326" comment="ocfs2-kmp-rt-5.3.18-51.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111102" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009567.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- backlight: pwm_bl: Improve bootloader/kernel device handover (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-12"/>
	<updated date="2021-10-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651685" comment="cluster-md-kmp-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651686" comment="dlm-kmp-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651687" comment="gfs2-kmp-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651688" comment="kernel-devel-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651689" comment="kernel-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651690" comment="kernel-rt-devel-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651691" comment="kernel-rt_debug-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651692" comment="kernel-rt_debug-devel-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651693" comment="kernel-source-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651694" comment="kernel-syms-rt-5.3.18-54.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651695" comment="ocfs2-kmp-rt-5.3.18-54.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111103" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009719.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 Real Time kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-11"/>
	<updated date="2021-11-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009651696" comment="cluster-md-kmp-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651697" comment="dlm-kmp-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651698" comment="gfs2-kmp-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651699" comment="kernel-devel-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651700" comment="kernel-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651701" comment="kernel-rt-devel-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654345" comment="kernel-rt_debug-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651702" comment="kernel-rt_debug-devel-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651703" comment="kernel-source-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651704" comment="kernel-syms-rt-5.3.18-57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651705" comment="ocfs2-kmp-rt-5.3.18-57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111104" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux RT Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).
- CVE-2020-27820: Fixed a use-after-free in nouveau's postclose() handler that could have happened during device or driver removal (bnc#1179599).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- elfcore: fix building with clang (bsc#1169514).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Track RX buffer allocation failures (bsc#1176940).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-09"/>
	<updated date="2021-12-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658970" comment="cluster-md-kmp-rt-5.3.18-62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658971" comment="dlm-kmp-rt-5.3.18-62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658972" comment="gfs2-kmp-rt-5.3.18-62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658973" comment="kernel-devel-rt-5.3.18-62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658974" comment="kernel-rt-5.3.18-62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658975" comment="kernel-rt-devel-5.3.18-62.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658976" comment="kernel-rt_debug-5.3.18-62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658977" comment="kernel-rt_debug-devel-5.3.18-62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658978" comment="kernel-source-rt-5.3.18-62.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658979" comment="kernel-syms-rt-5.3.18-62.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658980" comment="ocfs2-kmp-rt-5.3.18-62.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111105" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1178684" ref_url="https://bugzilla.suse.com/1178684" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180676" ref_url="https://bugzilla.suse.com/1180676" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008305.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 realtime kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- PM: hibernate: flush swap writer after marking (git-fixes).
- Revert 'nfsd4: support change_attr_type attribute' (for-next).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- bitmap: remove unused function declaration (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472)
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489)
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178684">SUSE bug 1178684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498520" comment="cluster-md-kmp-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498521" comment="dlm-kmp-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498522" comment="gfs2-kmp-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498523" comment="kernel-devel-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498524" comment="kernel-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498525" comment="kernel-rt-devel-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498526" comment="kernel-rt_debug-devel-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498527" comment="kernel-source-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498528" comment="kernel-syms-rt-5.3.18-25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498529" comment="ocfs2-kmp-rt-5.3.18-25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111106" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008450.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPICA: Fix exception code class checks (git-fixes).
- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- Remove debug patch for boot failure (bsc#1182602 ltc#190924). 
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in usbhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009498530" comment="cluster-md-kmp-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498531" comment="dlm-kmp-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498532" comment="gfs2-kmp-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498533" comment="kernel-devel-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498534" comment="kernel-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498535" comment="kernel-rt-devel-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498536" comment="kernel-rt_debug-devel-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498537" comment="kernel-source-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498538" comment="kernel-syms-rt-5.3.18-28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498539" comment="ocfs2-kmp-rt-5.3.18-28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111107" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="CVE-2022-28748" ref_url="https://www.suse.com/security/cve/CVE-2022-28748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010746.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space (bnc#1196823).
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel (bnc#1198032).
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel (bnc#1198033).
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel (bnc#1198031).
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock (bsc#1197331).
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation (bnc#1197702).
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation (bnc#1197462).
- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file (bnc#1197366).
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device (bsc#1196836).
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed (bsc#1196956).
- CVE-2021-0920: Fixed a local privilege escalation due to a use-after-free bug in unix_gc (bsc#1193731).
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers (bsc#1196488).
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could trigger crash the system or corrupt system memory (bsc#1196830).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image (bsc#1196079).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-28748: Fixed various information leaks that could be caused by malicious USB devices (bsc#1196018).
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c (bsc#1196761).
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution (bsc#1197227).


The following non-security bugs were fixed:

- cifs: use the correct max-length for dentry_path_raw() (bsc#1196196).
- gve: multiple bugfixes (jsc#SLE-23652).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28748/">CVE-2022-28748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679471" comment="cluster-md-kmp-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679472" comment="dlm-kmp-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679473" comment="gfs2-kmp-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679474" comment="kernel-devel-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679475" comment="kernel-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679476" comment="kernel-rt-devel-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679477" comment="kernel-rt_debug-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679478" comment="kernel-rt_debug-devel-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679479" comment="kernel-source-rt-5.3.18-150200.79.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679480" comment="kernel-syms-rt-5.3.18-150200.79.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679481" comment="ocfs2-kmp-rt-5.3.18-150200.79.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111108" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010073.html" source="SUSE-SU"/>
		<description>

The SUSE MicroOS 5.0 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-4001: Fixed a race condition when the EBPF map is frozen. (bsc#1192990)
- CVE-2021-4002: Added a missing TLB flush that could lead to leak or corruption of data in hugetlbfs. (bsc#1192946)
- CVE-2021-28711: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening blkfront against event channel storms. (bsc#1193440)
- CVE-2021-28712: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening netfront against event channel storms. (bsc#1193440)
- CVE-2021-28713: Fixed a rogue backends that could cause DoS of guests via high frequency events by hardening hvc_xen against event channel storms. (bsc#1193440)
- CVE-2021-28714: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by fixing rx queue stall detection. (bsc#1193442)
- CVE-2021-28715: Fixed an issue where a guest could force Linux netback driver to hog large amounts of kernel memory by do not queueing unlimited number of packages.  (bsc#1193442)
- CVE-2021-33098: Fixed improper input validation in the Intel(R) Ethernet ixgbe driver that could allow an authenticate user to cause a denial of service (bnc#1192877).
- CVE-2021-43975: Fixed a flaw in hw_atl_utils_fw_rpc_wait that could allow an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value. (bnc#1192845)
- CVE-2021-43976: Fixed a flaw that could allow an attacker (who can connect a crafted USB device) to cause a denial of service. (bnc#1192847)

The following non-security bugs were fixed:

- acpi: battery: Accept charges over the design capacity as full (git-fixes).
- acpi: pmic: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- acpica: Avoid evaluating methods too early during system resume (git-fixes).
- alsa: ISA: not for M68K (git-fixes).
- alsa: ctxfi: Fix out-of-range access (git-fixes).
- alsa: gus: fix null pointer dereference on pointer block (git-fixes).
- alsa: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- alsa: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- alsa: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- alsa: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- alsa: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- alsa: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- alsa: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- alsa: timer: Fix use-after-free problem (git-fixes).
- alsa: timer: Unconditionally unlink slave instances, too (git-fixes).
- alsa: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- arm: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- arm: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- arm: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- arm: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- arm: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- arm: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- arm: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- arm: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- arm: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- arm: 9134/1: remove duplicate memcpy() definition (git-fixes)
- arm: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- arm: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- arm: 9155/1: fix early early_iounmap() (git-fixes)
- arm: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- arm: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- arm: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- arm: at91: pm: of_node_put() after its usage (git-fixes)
- arm: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- arm: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- arm: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- arm: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- arm: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- arm: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- arm: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- arm: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- arm: dts: NSP: Correct FA2 mailbox node (git-fixes)
- arm: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- arm: dts: NSP: Fixed QSPI compatible string (git-fixes)
- arm: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- arm: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- arm: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- arm: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- arm: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- arm: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- arm: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- arm: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- arm: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- arm: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- arm: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- arm: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- arm: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- arm: dts: at91: sama5d2: map securam as device (git-fixes)
- arm: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- arm: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- arm: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- arm: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- arm: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- arm: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- arm: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- arm: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- arm: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- arm: dts: dra76x: m_can: fix order of clocks (git-fixes)
- arm: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- arm: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- arm: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- arm: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- arm: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- arm: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- arm: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- arm: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- arm: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- arm: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- arm: dts: gose: Fix ports node name for adv7180 (git-fixes)
- arm: dts: gose: Fix ports node name for adv7612 (git-fixes)
- arm: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- arm: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- arm: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- arm: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- arm: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- arm: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- arm: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- arm: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- arm: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- arm: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- arm: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- arm: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- arm: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- arm: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: imx6sl: fix rng node (git-fixes)
- arm: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- arm: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- arm: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- arm: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- arm: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- arm: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- arm: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- arm: dts: imx7ulp: Correct gpio ranges (git-fixes)
- arm: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- arm: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- arm: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- arm: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- arm: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- arm: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- arm: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- arm: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- arm: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- arm: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- arm: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- arm: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- arm: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- arm: dts: meson: fix PHY deassert timing requirements (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- arm: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- arm: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- arm: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- arm: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- arm: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- arm: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- arm: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- arm: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- arm: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- arm: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- arm: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- arm: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- arm: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- arm: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- arm: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- arm: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- arm: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- arm: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- arm: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- arm: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- arm: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- arm: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- arm: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- arm: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- arm: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- arm: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- arm: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- arm: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- arm: dts: turris-omnia: add SFP node (git-fixes)
- arm: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- arm: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- arm: dts: turris-omnia: describe switch interrupt (git-fixes)
- arm: dts: turris-omnia: enable HW buffer management (git-fixes)
- arm: dts: turris-omnia: fix hardware buffer management (git-fixes)
- arm: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- arm: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- arm: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- arm: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- arm: exynos: add missing of_node_put for loop iteration (git-fixes)
- arm: footbridge: fix PCI interrupt mapping (git-fixes)
- arm: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- arm: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- arm: imx: add missing clk_disable_unprepare() (git-fixes)
- arm: imx: add missing iounmap() (git-fixes)
- arm: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- arm: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- arm: mvebu: drop pointless check for coherency_base (git-fixes)
- arm: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- arm: s3c24xx: fix missing system reset (git-fixes)
- arm: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- arm: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- arm: samsung: do not build plat/pm-common for Exynos (git-fixes)
- arm: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- arm: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- asoc: DAPM: Cover regression by kctl change notification fix (git-fixes).
- asoc: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- asoc: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- asoc: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- asoc: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Create (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- cifs: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- cifs: Clarify SMB1 code for SetFileSize (bsc#1192606).
- cifs: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- cifs: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- cifs: Clarify SMB1 code for delete (bsc#1192606).
- cifs: Clarify SMB1 code for rename open file (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Close cached root handle only if it had a lease (bsc#1164565).
- cifs: Close open handle after interrupted close (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not miss cancelled OPEN responses (bsc#1164565).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix NULL pointer dereference in mid callback (bsc#1164565).
- cifs: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- cifs: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix task struct use-after-free on reconnect (bsc#1164565).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use after free of file info structures (bnc#1151927 5.3.8).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- cifs: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Properly process SMB3 lease breaks (bsc#1164565).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Replace HTTP links with HTTPS ones (bsc#1192606).
- cifs: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set cifs_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- cifs: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- cifs: Warn less noisily on default mount (bsc#1192606).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of cifs_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check new file size when extending file by fallocate (bsc#1192606).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs: cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix max ea value size (bnc#1151927 5.3.4).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle ERRBaduid for SMB1 (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor cifs_get_inode_info() (bsc#1164565).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- edac/amd64: Handle three rank interleaving mode (bsc#1152489).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- fs: cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Fix resource leak (bsc#1192606).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: Simplify bool comparison (bsc#1192606).
- fs: cifs: cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: fix misspellings using codespell tool (bsc#1192606).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fs: cifs: sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs: cifs: smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs: cifs: smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fuse: release pipe buf after last use (bsc#1193318).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- input: iforce - fix control-message timeout (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kabi: hide changes to struct uv_info (git-fixes).
- kernel-obs-build: include the preferred kernel parameters Currently the Open Build Service hardcodes the kernel boot parameters globally. Recently functionality was added to control the parameters by the kernel-obs-build package, so make use of that. parameters here will overwrite what is used by OBS otherwise.
- kernel-obs-build: inform build service about virtio-serial Inform the build worker code that this kernel supports virtio-serial, which improves performance and relability of logging.
- kernel-obs-build: remove duplicated/unused parameters lbs=0 - this parameters is just giving 'unused parameter' and it looks like I can not find any version that implemented this. rd.driver.pre=binfmt_misc is not needed when setup_obs is used, it alread loads the kernel module. quiet and panic=1 will now be also always added by OBS, so we do not have to set it here anymore.
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mm: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: add NCI_UNREG flag to eliminate the race (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfc: reorder the logic in nfc_{un,}register_device (git-fixes).
- nfc: reorganize the functions in nci_request (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfs: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- nfs: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- nfs: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- nfs: Fix up commit deadlocks (git-fixes).
- nfs: do not take i_rwsem for swap IO (bsc#1191876).
- nfs: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- pci/msi: Deal with devices lying about their MSI mask capability (git-fixes).
- pci: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- pci: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pm: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- pm: hibernate: use correct mode for swsusp_close() (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- qede: validate non LSO skb length (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new compression flags (bsc#1192606).
- smb3: Add new info level for query directory (bsc#1192606).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb3: Add support for getting and setting SACLs (bsc#1192606).
- smb3: Add support for lookup with posix extensions query info (bsc#1192606).
- smb3: Add support for negotiating signing algorithm (bsc#1192606).
- smb3: Add support for query info using posix extensions (level 100) (bsc#1192606).
- smb3: Add tracepoints for new compound posix query info (bsc#1192606).
- smb3: Additional compression structures (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Backup intent flag missing from some more ops (bsc#1164565).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- smb3: Fix ids returned in POSIX query dir (bsc#1192606).
- smb3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- smb3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- smb3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- smb3: Honor lease disabling for multiuser mounts (git-fixes).
- smb3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: Minor cleanup of protocol definitions (bsc#1192606).
- smb3: Resolve data corruption of TCP server info fields (bsc#1192606).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add defines for new signing negotiate context (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3: add new module load parm require_gcm_256 (bsc#1192606).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for recognizing WSL reparse tags (bsc#1192606).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: add support for using info level for posix extensions query (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: avoid confusing warning message on mount to Azure (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3: do not log warning message if server does not populate salt (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable negotiating stronger encryption by default (bsc#1192606).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix mount failure to some servers when compression enabled (bsc#1192606).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix readpage for large swap cache (bsc#1192606).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in compression flag (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: incorrect file id in requests compounded with open (bsc#1192606).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: print warning if server does not support requested encryption type (bsc#1192606).
- smb3: print warning once if posix context returned on open  (bsc#1164565).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- smb3: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: set gcm256 when requested (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: update structures for new compression protocol definitions (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- sunrpc/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- sunrpc/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- sunrpc/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- sunrpc: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- sunrpc: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: serial: option: add Fibocom FM101-GL variants (git-fixes).
- usb: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658981" comment="cluster-md-kmp-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658982" comment="dlm-kmp-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658983" comment="gfs2-kmp-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658984" comment="kernel-devel-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658985" comment="kernel-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658986" comment="kernel-rt-devel-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664526" comment="kernel-rt_debug-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658987" comment="kernel-rt_debug-devel-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658988" comment="kernel-source-rt-5.3.18-65.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658989" comment="kernel-syms-rt-5.3.18-65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658990" comment="ocfs2-kmp-rt-5.3.18-65.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111109" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-February/021587.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-4083: Fixed race condition in Unix domain socket garbage collection that could lead to read memory after free (bsc#1193727).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4149: Fixed improper lock operation in btrfs that allowed users to crash the kernel or deadlock the system (bsc#1194001).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4202: Fixed race condition in nci_request() that could cause use-after-free (bsc#1194529).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-45485: Fixed an information leak because of certain use of a hash table which use IPv6 source addresses (bsc#1194094).
- CVE-2021-45486: Fixed an information leak because the hash table is very small in net/ipv4/route.c (bnc#1194087).
- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).

The following non-security bugs were fixed:

- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- kabi/severities: Add a kabi exception for drivers/tee/tee
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901).
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209, bsc#1193660).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-02"/>
	<updated date="2022-02-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662943" comment="cluster-md-kmp-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662944" comment="dlm-kmp-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662945" comment="gfs2-kmp-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662946" comment="kernel-devel-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662947" comment="kernel-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662948" comment="kernel-rt-devel-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666523" comment="kernel-rt_debug-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662949" comment="kernel-rt_debug-devel-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662950" comment="kernel-source-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662951" comment="kernel-syms-rt-5.3.18-68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662952" comment="ocfs2-kmp-rt-5.3.18-68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111110" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux RT Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1187428" ref_url="https://bugzilla.suse.com/1187428" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010284.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).


The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187428">SUSE bug 1187428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668282" comment="cluster-md-kmp-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668283" comment="dlm-kmp-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668284" comment="gfs2-kmp-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668285" comment="kernel-devel-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668286" comment="kernel-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668287" comment="kernel-rt-devel-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668288" comment="kernel-rt_debug-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668289" comment="kernel-rt_debug-devel-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668290" comment="kernel-source-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668291" comment="kernel-syms-rt-5.3.18-73.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668292" comment="ocfs2-kmp-rt-5.3.18-73.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111111" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Realtime packages 15 SP2</platform>
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0764-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010389.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-rt:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009298381" comment="SUSE Linux Enterprise Module for Realtime packages 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671413" comment="cluster-md-kmp-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671414" comment="dlm-kmp-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671415" comment="gfs2-kmp-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671416" comment="kernel-devel-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671417" comment="kernel-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671418" comment="kernel-rt-devel-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671419" comment="kernel-rt_debug-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671420" comment="kernel-rt_debug-devel-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671421" comment="kernel-source-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671422" comment="kernel-syms-rt-5.3.18-76.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671423" comment="ocfs2-kmp-rt-5.3.18-76.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111112" version="1" class="patch">
	<metadata>
		<title>Security update for freetds (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1141132" ref_url="https://bugzilla.suse.com/1141132" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13508" ref_url="https://www.suse.com/security/cve/CVE-2019-13508/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1417-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007103.html" source="SUSE-SU"/>
		<description>
This update for freetds to 1.1.36 fixes the following issues:

Security issue fixed:

- CVE-2019-13508: Fixed a heap overflow that could have been caused by malicious servers sending UDT types over protocol version 5.0 (bsc#1141132).

Non-security issues fixed:

- Enabled Kerberos support
- Version update to 1.1.36:
  * Default TDS protocol version is now 'auto'
  * Improved UTF-8 performances
  * TDS Pool Server is enabled
  * MARS support is enabled
  * NTLMv2 is enabled
  * See NEWS and ChangeLog for a complete list of changes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1141132">SUSE bug 1141132</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-13508/">CVE-2019-13508</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499317" comment="libct4-1.1.36-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111113" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nspr, mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159819" ref_url="https://bugzilla.suse.com/1159819" source="BUGZILLA"/>
		<reference ref_id="1169746" ref_url="https://bugzilla.suse.com/1169746" source="BUGZILLA"/>
		<reference ref_id="1171978" ref_url="https://bugzilla.suse.com/1171978" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17006" ref_url="https://www.suse.com/security/cve/CVE-2019-17006/" source="CVE"/>
		<reference ref_id="CVE-2020-12399" ref_url="https://www.suse.com/security/cve/CVE-2020-12399/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1677-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006980.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nspr, mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53

- CVE-2020-12399: Fixed a timing attack on DSA signature generation (bsc#1171978).
- CVE-2019-17006: Added length checks for cryptographic primitives (bsc#1159819).
Release notes: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.53_release_notes

mozilla-nspr to version 4.25
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-18"/>
	<updated date="2020-06-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1159819">SUSE bug 1159819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169746">SUSE bug 1169746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171978">SUSE bug 1171978</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-17006/">CVE-2019-17006</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-12399/">CVE-2020-12399</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499345" comment="libfreebl3-hmac-3.53-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499346" comment="libsoftokn3-hmac-3.53-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111114" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173304" ref_url="https://bugzilla.suse.com/1173304" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14059" ref_url="https://www.suse.com/security/cve/CVE-2020-14059/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/007038.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

squid was updated to version 4.12 

Security issue fixed: 

- CVE-2020-14059: Fixed an issue where a client could potentially deny the service of a server 
  during TLS Handshake (bsc#1173304).
  
Other issues addressed: 

- Reverted to slow search for new SMP shm pages due to a regression 
- Fixed an issue where negative responses were never cached
- Fixed stall if transaction was overwriting a recently active cache entry
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-26"/>
	<updated date="2020-06-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173304">SUSE bug 1173304</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14059/">CVE-2020-14059</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499353" comment="squid-4.12-5.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111115" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168669" ref_url="https://bugzilla.suse.com/1168669" source="BUGZILLA"/>
		<reference ref_id="1173032" ref_url="https://bugzilla.suse.com/1173032" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12402" ref_url="https://www.suse.com/security/cve/CVE-2020-12402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007074.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

mozilla-nss was updated to version 3.53.1
 
- CVE-2020-12402: Fixed a potential side channel attack during RSA key generation (bsc#1173032)
- Fixed various FIPS issues in libfreebl3 which were causing segfaults in the test suite of chrony (bsc#1168669).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-06"/>
	<updated date="2020-07-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1168669">SUSE bug 1168669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173032">SUSE bug 1173032</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12402/">CVE-2020-12402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499354" comment="libfreebl3-hmac-3.53.1-3.45.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499355" comment="libsoftokn3-hmac-3.53.1-3.45.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111116" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1132091" ref_url="https://bugzilla.suse.com/1132091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

Security issue fixed:

- CVE-2019-11023: Fixed a denial of service vulnerability, which was caused by a NULL pointer dereference in agroot() (bsc#1132091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009498738" comment="graphviz-tcl-2.40.1-6.3.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111117" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1172205" ref_url="https://bugzilla.suse.com/1172205" source="BUGZILLA"/>
		<reference ref_id="1173376" ref_url="https://bugzilla.suse.com/1173376" source="BUGZILLA"/>
		<reference ref_id="1173377" ref_url="https://bugzilla.suse.com/1173377" source="BUGZILLA"/>
		<reference ref_id="1173378" ref_url="https://bugzilla.suse.com/1173378" source="BUGZILLA"/>
		<reference ref_id="1173380" ref_url="https://bugzilla.suse.com/1173380" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="CVE-2020-15563" ref_url="https://www.suse.com/security/cve/CVE-2020-15563/" source="CVE"/>
		<reference ref_id="CVE-2020-15565" ref_url="https://www.suse.com/security/cve/CVE-2020-15565/" source="CVE"/>
		<reference ref_id="CVE-2020-15566" ref_url="https://www.suse.com/security/cve/CVE-2020-15566/" source="CVE"/>
		<reference ref_id="CVE-2020-15567" ref_url="https://www.suse.com/security/cve/CVE-2020-15567/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007126.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).

Additional upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-14"/>
	<updated date="2020-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172205">SUSE bug 1172205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173376">SUSE bug 1173376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173377">SUSE bug 1173377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173378">SUSE bug 1173378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173380">SUSE bug 1173380</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15563/">CVE-2020-15563</cve>
	<cve impact="important" cvss3="7.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15565/">CVE-2020-15565</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-15566/">CVE-2020-15566</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-15567/">CVE-2020-15567</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499629" comment="xen-4.13.1_04-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499630" comment="xen-devel-4.13.1_04-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499631" comment="xen-tools-4.13.1_04-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499632" comment="xen-tools-xendomains-wait-disk-4.13.1_04-3.4.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111118" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172383" ref_url="https://bugzilla.suse.com/1172383" source="BUGZILLA"/>
		<reference ref_id="1172384" ref_url="https://bugzilla.suse.com/1172384" source="BUGZILLA"/>
		<reference ref_id="1172386" ref_url="https://bugzilla.suse.com/1172386" source="BUGZILLA"/>
		<reference ref_id="1172495" ref_url="https://bugzilla.suse.com/1172495" source="BUGZILLA"/>
		<reference ref_id="1172710" ref_url="https://bugzilla.suse.com/1172710" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10761" ref_url="https://www.suse.com/security/cve/CVE-2020-10761/" source="CVE"/>
		<reference ref_id="CVE-2020-13361" ref_url="https://www.suse.com/security/cve/CVE-2020-13361/" source="CVE"/>
		<reference ref_id="CVE-2020-13362" ref_url="https://www.suse.com/security/cve/CVE-2020-13362/" source="CVE"/>
		<reference ref_id="CVE-2020-13659" ref_url="https://www.suse.com/security/cve/CVE-2020-13659/" source="CVE"/>
		<reference ref_id="CVE-2020-13800" ref_url="https://www.suse.com/security/cve/CVE-2020-13800/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007171.html" source="SUSE-SU"/>
		<description>
This update for qemu to version 4.2.1 fixes the following issues:

- CVE-2020-10761: Fixed a denial of service in Network Block Device (nbd) support infrastructure (bsc#1172710).
- CVE-2020-13800: Fixed a denial of service possibility in ati-vga emulation (bsc#1172495).
- CVE-2020-13659: Fixed a null pointer dereference possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172386).
- CVE-2020-13362: Fixed an OOB access possibility in MegaRAID SAS 8708EM2 emulation (bsc#1172383).
- CVE-2020-13361: Fixed an OOB access possibility in ES1370 audio device emulation (bsc#1172384).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172383">SUSE bug 1172383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172384">SUSE bug 1172384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172386">SUSE bug 1172386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172495">SUSE bug 1172495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172710">SUSE bug 1172710</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10761/">CVE-2020-10761</cve>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13361/">CVE-2020-13361</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13362/">CVE-2020-13362</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13659/">CVE-2020-13659</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13800/">CVE-2020-13800</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499633" comment="qemu-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499634" comment="qemu-arm-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499635" comment="qemu-audio-alsa-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499636" comment="qemu-audio-pa-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499637" comment="qemu-block-curl-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499638" comment="qemu-block-iscsi-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499639" comment="qemu-block-rbd-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499640" comment="qemu-block-ssh-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499641" comment="qemu-guest-agent-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499642" comment="qemu-ipxe-1.0.0+-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499643" comment="qemu-kvm-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499644" comment="qemu-lang-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499645" comment="qemu-microvm-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499646" comment="qemu-ppc-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499647" comment="qemu-s390-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499648" comment="qemu-seabios-1.12.1+-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499649" comment="qemu-sgabios-8-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499650" comment="qemu-ui-curses-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499651" comment="qemu-ui-gtk-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499652" comment="qemu-ui-spice-app-4.2.1-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499653" comment="qemu-vgabios-1.12.1+-11.4.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499654" comment="qemu-x86-4.2.1-11.4.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111119" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1168994" ref_url="https://bugzilla.suse.com/1168994" source="BUGZILLA"/>
		<reference ref_id="1173812" ref_url="https://bugzilla.suse.com/1173812" source="BUGZILLA"/>
		<reference ref_id="1174463" ref_url="https://bugzilla.suse.com/1174463" source="BUGZILLA"/>
		<reference ref_id="1174570" ref_url="https://bugzilla.suse.com/1174570" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10713" ref_url="https://www.suse.com/security/cve/CVE-2020-10713/" source="CVE"/>
		<reference ref_id="CVE-2020-14308" ref_url="https://www.suse.com/security/cve/CVE-2020-14308/" source="CVE"/>
		<reference ref_id="CVE-2020-14309" ref_url="https://www.suse.com/security/cve/CVE-2020-14309/" source="CVE"/>
		<reference ref_id="CVE-2020-14310" ref_url="https://www.suse.com/security/cve/CVE-2020-14310/" source="CVE"/>
		<reference ref_id="CVE-2020-14311" ref_url="https://www.suse.com/security/cve/CVE-2020-14311/" source="CVE"/>
		<reference ref_id="CVE-2020-15706" ref_url="https://www.suse.com/security/cve/CVE-2020-15706/" source="CVE"/>
		<reference ref_id="CVE-2020-15707" ref_url="https://www.suse.com/security/cve/CVE-2020-15707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007199.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fix for CVE-2020-10713 (bsc#1168994)
- Fix for CVE-2020-14308 CVE-2020-14309, CVE-2020-14310, CVE-2020-14311 (bsc#1173812)
- Fix for CVE-2020-15706 (bsc#1174463)
- Fix for CVE-2020-15707 (bsc#1174570)

- Use overflow checking primitives where the arithmetic expression for buffer
- Use grub_calloc for overflow check and return NULL when it would occur 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1168994">SUSE bug 1168994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173812">SUSE bug 1173812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174463">SUSE bug 1174463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174570">SUSE bug 1174570</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10713/">CVE-2020-10713</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14308/">CVE-2020-14308</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14309/">CVE-2020-14309</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14310/">CVE-2020-14310</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14311/">CVE-2020-14311</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15706/">CVE-2020-15706</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15707/">CVE-2020-15707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499655" comment="grub2-x86_64-xen-2.04-9.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111120" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172356" ref_url="https://bugzilla.suse.com/1172356" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007240.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1174543 - secure boot related fixes
- bsc#1172356 - Not able to hot-plug NIC via virt-manager, asks to attach on next 
    reboot while it should be live attached
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-06"/>
	<updated date="2020-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172356">SUSE bug 1172356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499656" comment="xen-4.13.1_06-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499657" comment="xen-devel-4.13.1_06-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499658" comment="xen-tools-4.13.1_06-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499659" comment="xen-tools-xendomains-wait-disk-4.13.1_06-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111121" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007276.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- update to 12.4:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/12/release-12-4.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499660" comment="libecpg6-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499661" comment="postgresql12-contrib-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499662" comment="postgresql12-devel-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499663" comment="postgresql12-docs-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499664" comment="postgresql12-plperl-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499665" comment="postgresql12-plpython-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499666" comment="postgresql12-pltcl-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499667" comment="postgresql12-server-12.4-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499668" comment="postgresql12-server-devel-12.4-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111122" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1161883" ref_url="https://bugzilla.suse.com/1161883" source="BUGZILLA"/>
		<reference ref_id="1174458" ref_url="https://bugzilla.suse.com/1174458" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14339" ref_url="https://www.suse.com/security/cve/CVE-2020-14339/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007278.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-14339: Don't leak /dev/mapper/control into QEMU. Use
  ioctl's to obtain the dependency tree of disks and drop use of
  libdevmapper.  bsc#1161883, bsc#1174458
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-18"/>
	<updated date="2020-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1161883">SUSE bug 1161883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174458">SUSE bug 1174458</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14339/">CVE-2020-14339</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499669" comment="libvirt-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499670" comment="libvirt-admin-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499671" comment="libvirt-bash-completion-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499672" comment="libvirt-client-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499673" comment="libvirt-daemon-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499674" comment="libvirt-daemon-config-network-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499675" comment="libvirt-daemon-config-nwfilter-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499676" comment="libvirt-daemon-driver-interface-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499677" comment="libvirt-daemon-driver-libxl-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499678" comment="libvirt-daemon-driver-lxc-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499679" comment="libvirt-daemon-driver-network-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499680" comment="libvirt-daemon-driver-nodedev-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499681" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499682" comment="libvirt-daemon-driver-qemu-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499683" comment="libvirt-daemon-driver-secret-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499684" comment="libvirt-daemon-driver-storage-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499685" comment="libvirt-daemon-driver-storage-core-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499686" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499687" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499688" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499689" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499690" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499691" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499692" comment="libvirt-daemon-hooks-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499693" comment="libvirt-daemon-lxc-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499694" comment="libvirt-daemon-qemu-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499695" comment="libvirt-daemon-xen-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499696" comment="libvirt-devel-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499697" comment="libvirt-doc-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499698" comment="libvirt-lock-sanlock-6.0.0-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499699" comment="libvirt-nss-6.0.0-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111123" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172745" ref_url="https://bugzilla.suse.com/1172745" source="BUGZILLA"/>
		<reference ref_id="1174421" ref_url="https://bugzilla.suse.com/1174421" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15705" ref_url="https://www.suse.com/security/cve/CVE-2020-15705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007295.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issue:

- CVE-2020-15705: Fail kernel validation without shim protocol (bsc#1174421).
- Add fibre channel device's ofpath support to grub-ofpathname and search hint to speed up root device discovery (bsc#1172745).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172745">SUSE bug 1172745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174421">SUSE bug 1174421</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15705/">CVE-2020-15705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499700" comment="grub2-x86_64-xen-2.04-9.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111124" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174052" ref_url="https://bugzilla.suse.com/1174052" source="BUGZILLA"/>
		<reference ref_id="1175070" ref_url="https://bugzilla.suse.com/1175070" source="BUGZILLA"/>
		<reference ref_id="1175071" ref_url="https://bugzilla.suse.com/1175071" source="BUGZILLA"/>
		<reference ref_id="1175074" ref_url="https://bugzilla.suse.com/1175074" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11984" ref_url="https://www.suse.com/security/cve/CVE-2020-11984/" source="CVE"/>
		<reference ref_id="CVE-2020-11993" ref_url="https://www.suse.com/security/cve/CVE-2020-11993/" source="CVE"/>
		<reference ref_id="CVE-2020-9490" ref_url="https://www.suse.com/security/cve/CVE-2020-9490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007291.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
- CVE-2020-11984: Fixed an information disclosure bug in mod_proxy_uwsgi (bsc#1175074).
- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).

- Solve a crash in mod_proxy_uwsgi for empty values of environment variables. (bsc#1174052)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174052">SUSE bug 1174052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175070">SUSE bug 1175070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175071">SUSE bug 1175071</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175074">SUSE bug 1175074</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11984/">CVE-2020-11984</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11993/">CVE-2020-11993</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-9490/">CVE-2020-9490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499701" comment="apache2-devel-2.4.43-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499702" comment="apache2-doc-2.4.43-3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499703" comment="apache2-worker-2.4.43-3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111125" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175193" ref_url="https://bugzilla.suse.com/1175193" source="BUGZILLA"/>
		<reference ref_id="1175194" ref_url="https://bugzilla.suse.com/1175194" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14349" ref_url="https://www.suse.com/security/cve/CVE-2020-14349/" source="CVE"/>
		<reference ref_id="CVE-2020-14350" ref_url="https://www.suse.com/security/cve/CVE-2020-14350/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007312.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- update to 10.14:
  * CVE-2020-14349, bsc#1175193: Set a secure search_path in
    logical replication walsenders and apply workers
  * CVE-2020-14350, bsc#1175194: Make contrib modules' installation
    scripts more secure.
  * https://www.postgresql.org/docs/10/release-10-14.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-27"/>
	<updated date="2020-08-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175193">SUSE bug 1175193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175194">SUSE bug 1175194</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14349/">CVE-2020-14349</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14350/">CVE-2020-14350</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499445" comment="postgresql10-contrib-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499446" comment="postgresql10-devel-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499447" comment="postgresql10-docs-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499448" comment="postgresql10-plperl-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499449" comment="postgresql10-plpython-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499450" comment="postgresql10-pltcl-10.14-8.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499451" comment="postgresql10-server-10.14-8.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111126" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173455" ref_url="https://bugzilla.suse.com/1173455" source="BUGZILLA"/>
		<reference ref_id="1175664" ref_url="https://bugzilla.suse.com/1175664" source="BUGZILLA"/>
		<reference ref_id="1175665" ref_url="https://bugzilla.suse.com/1175665" source="BUGZILLA"/>
		<reference ref_id="1175671" ref_url="https://bugzilla.suse.com/1175671" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15049" ref_url="https://www.suse.com/security/cve/CVE-2020-15049/" source="CVE"/>
		<reference ref_id="CVE-2020-15810" ref_url="https://www.suse.com/security/cve/CVE-2020-15810/" source="CVE"/>
		<reference ref_id="CVE-2020-15811" ref_url="https://www.suse.com/security/cve/CVE-2020-15811/" source="CVE"/>
		<reference ref_id="CVE-2020-24606" ref_url="https://www.suse.com/security/cve/CVE-2020-24606/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007330.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

squid was updated to version 4.13:

- CVE-2020-24606: Fix livelocking in peerDigestHandleReply (bsc#1175671).
- CVE-2020-15811: Improve Transfer-Encoding handling (bsc#1175665).
- CVE-2020-15810: Enforce token characters for field-name (bsc#1175664).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1173455">SUSE bug 1173455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175664">SUSE bug 1175664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175665">SUSE bug 1175665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175671">SUSE bug 1175671</bugzilla>
	<cve impact="important" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15049/">CVE-2020-15049</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15810/">CVE-2020-15810</cve>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15811/">CVE-2020-15811</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-24606/">CVE-2020-24606</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499452" comment="squid-4.13-5.23.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111127" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1119454" ref_url="https://bugzilla.suse.com/1119454" source="BUGZILLA"/>
		<reference ref_id="1175476" ref_url="https://bugzilla.suse.com/1175476" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14562" ref_url="https://www.suse.com/security/cve/CVE-2019-14562/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2691-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007444.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14562: Fixed an overflow in DxeImageVerificationHandler (bsc#1175476).
- Support more SCSI drivers (PvScsi, MptScsi and LsiScsi). (bsc#1119454) 
- Enable LsiScsi explicitly since it's disabled by default
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-21"/>
	<updated date="2020-09-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1119454">SUSE bug 1119454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175476">SUSE bug 1175476</bugzilla>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14562/">CVE-2019-14562</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499704" comment="ovmf-201911-7.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499705" comment="ovmf-tools-201911-7.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499706" comment="qemu-ovmf-x86_64-201911-7.5.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499707" comment="qemu-uefi-aarch64-201911-7.5.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111128" version="1" class="patch">
	<metadata>
		<title>Security update for dpdk (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176590" ref_url="https://bugzilla.suse.com/1176590" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14374" ref_url="https://www.suse.com/security/cve/CVE-2020-14374/" source="CVE"/>
		<reference ref_id="CVE-2020-14375" ref_url="https://www.suse.com/security/cve/CVE-2020-14375/" source="CVE"/>
		<reference ref_id="CVE-2020-14376" ref_url="https://www.suse.com/security/cve/CVE-2020-14376/" source="CVE"/>
		<reference ref_id="CVE-2020-14377" ref_url="https://www.suse.com/security/cve/CVE-2020-14377/" source="CVE"/>
		<reference ref_id="CVE-2020-14378" ref_url="https://www.suse.com/security/cve/CVE-2020-14378/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007493.html" source="SUSE-SU"/>
		<description>
This update for dpdk fixes the following issues:

- dpdk was updated to 19.11.4
  - CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: Fixed multiple issues where a malicious guest could 
    harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest 
    and causing partially denial of service in the host(bsc#1176590).
- For a list of fixes check:
  https://doc.dpdk.org/guides-19.11/rel_notes/release_19_11.html#id8
  denial of service in the host (bsc#1176590).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-28"/>
	<updated date="2020-09-28"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1176590">SUSE bug 1176590</bugzilla>
	<cve impact="critical" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14374/">CVE-2020-14374</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14375/">CVE-2020-14375</cve>
	<cve impact="critical" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14376/">CVE-2020-14376</cve>
	<cve impact="critical" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14377/">CVE-2020-14377</cve>
	<cve impact="critical" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14378/">CVE-2020-14378</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499708" comment="dpdk-19.11.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499709" comment="dpdk-devel-19.11.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499710" comment="dpdk-kmp-default-19.11.4_k5.3.18_24.15-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499711" comment="dpdk-thunderx-19.11.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499712" comment="dpdk-thunderx-devel-19.11.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499713" comment="dpdk-thunderx-kmp-default-19.11.4_k5.3.18_24.15-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499714" comment="dpdk-tools-19.11.4-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499715" comment="libdpdk-20_0-19.11.4-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111129" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176339" ref_url="https://bugzilla.suse.com/1176339" source="BUGZILLA"/>
		<reference ref_id="1176341" ref_url="https://bugzilla.suse.com/1176341" source="BUGZILLA"/>
		<reference ref_id="1176343" ref_url="https://bugzilla.suse.com/1176343" source="BUGZILLA"/>
		<reference ref_id="1176344" ref_url="https://bugzilla.suse.com/1176344" source="BUGZILLA"/>
		<reference ref_id="1176345" ref_url="https://bugzilla.suse.com/1176345" source="BUGZILLA"/>
		<reference ref_id="1176346" ref_url="https://bugzilla.suse.com/1176346" source="BUGZILLA"/>
		<reference ref_id="1176347" ref_url="https://bugzilla.suse.com/1176347" source="BUGZILLA"/>
		<reference ref_id="1176348" ref_url="https://bugzilla.suse.com/1176348" source="BUGZILLA"/>
		<reference ref_id="1176349" ref_url="https://bugzilla.suse.com/1176349" source="BUGZILLA"/>
		<reference ref_id="1176350" ref_url="https://bugzilla.suse.com/1176350" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25595" ref_url="https://www.suse.com/security/cve/CVE-2020-25595/" source="CVE"/>
		<reference ref_id="CVE-2020-25596" ref_url="https://www.suse.com/security/cve/CVE-2020-25596/" source="CVE"/>
		<reference ref_id="CVE-2020-25597" ref_url="https://www.suse.com/security/cve/CVE-2020-25597/" source="CVE"/>
		<reference ref_id="CVE-2020-25598" ref_url="https://www.suse.com/security/cve/CVE-2020-25598/" source="CVE"/>
		<reference ref_id="CVE-2020-25599" ref_url="https://www.suse.com/security/cve/CVE-2020-25599/" source="CVE"/>
		<reference ref_id="CVE-2020-25600" ref_url="https://www.suse.com/security/cve/CVE-2020-25600/" source="CVE"/>
		<reference ref_id="CVE-2020-25601" ref_url="https://www.suse.com/security/cve/CVE-2020-25601/" source="CVE"/>
		<reference ref_id="CVE-2020-25602" ref_url="https://www.suse.com/security/cve/CVE-2020-25602/" source="CVE"/>
		<reference ref_id="CVE-2020-25603" ref_url="https://www.suse.com/security/cve/CVE-2020-25603/" source="CVE"/>
		<reference ref_id="CVE-2020-25604" ref_url="https://www.suse.com/security/cve/CVE-2020-25604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007499.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-25602: Fixed an issue where there was a crash when
  handling guest access to MSR_MISC_ENABLE was thrown (bsc#1176339,XSA-333)
- CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path
  (bsc#1176341,XSA-334)
- CVE-2020-25604: Fixed a race condition when migrating timers between x86 
  HVM vCPU-s (bsc#1176343,XSA-336)
- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)
- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)
- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)
- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)
- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)
- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)
- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)
- Various other fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-29"/>
	<updated date="2020-09-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176339">SUSE bug 1176339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176341">SUSE bug 1176341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176343">SUSE bug 1176343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176344">SUSE bug 1176344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176345">SUSE bug 1176345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176346">SUSE bug 1176346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176347">SUSE bug 1176347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176348">SUSE bug 1176348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176349">SUSE bug 1176349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176350">SUSE bug 1176350</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25595/">CVE-2020-25595</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25596/">CVE-2020-25596</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25597/">CVE-2020-25597</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25598/">CVE-2020-25598</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25599/">CVE-2020-25599</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25600/">CVE-2020-25600</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25601/">CVE-2020-25601</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25602/">CVE-2020-25602</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25603/">CVE-2020-25603</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25604/">CVE-2020-25604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499716" comment="xen-4.13.1_08-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499717" comment="xen-devel-4.13.1_08-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499718" comment="xen-tools-4.13.1_08-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499719" comment="xen-tools-xendomains-wait-disk-4.13.1_08-3.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111130" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174386" ref_url="https://bugzilla.suse.com/1174386" source="BUGZILLA"/>
		<reference ref_id="1174641" ref_url="https://bugzilla.suse.com/1174641" source="BUGZILLA"/>
		<reference ref_id="1174863" ref_url="https://bugzilla.suse.com/1174863" source="BUGZILLA"/>
		<reference ref_id="1175370" ref_url="https://bugzilla.suse.com/1175370" source="BUGZILLA"/>
		<reference ref_id="1175441" ref_url="https://bugzilla.suse.com/1175441" source="BUGZILLA"/>
		<reference ref_id="1176494" ref_url="https://bugzilla.suse.com/1176494" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-15863" ref_url="https://www.suse.com/security/cve/CVE-2020-15863/" source="CVE"/>
		<reference ref_id="CVE-2020-16092" ref_url="https://www.suse.com/security/cve/CVE-2020-16092/" source="CVE"/>
		<reference ref_id="CVE-2020-24352" ref_url="https://www.suse.com/security/cve/CVE-2020-24352/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007532.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-14364: Fixed an OOB access while processing USB packets (bsc#1175441,bsc#1176494).
- CVE-2020-16092: Fixed a denial of service in packet processing of various emulated NICs (bsc#1174641).
- CVE-2020-15863: Fixed a buffer overflow in the XGMAC device (bsc#1174386).
- CVE-2020-24352: Fixed an out-of-bounds read/write in ati-vga device emulation in ati_2d_blt (bsc#1175370).
- Allow to IPL secure guests with -no-reboot (bsc#1174863)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-07"/>
	<updated date="2020-10-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174386">SUSE bug 1174386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174641">SUSE bug 1174641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174863">SUSE bug 1174863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175370">SUSE bug 1175370</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175441">SUSE bug 1175441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176494">SUSE bug 1176494</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15863/">CVE-2020-15863</cve>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16092/">CVE-2020-16092</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-24352/">CVE-2020-24352</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499720" comment="qemu-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499721" comment="qemu-arm-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499722" comment="qemu-audio-alsa-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499723" comment="qemu-audio-pa-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499724" comment="qemu-block-curl-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499725" comment="qemu-block-iscsi-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499726" comment="qemu-block-rbd-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499727" comment="qemu-block-ssh-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499728" comment="qemu-guest-agent-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499729" comment="qemu-ipxe-1.0.0+-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499730" comment="qemu-kvm-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499731" comment="qemu-lang-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499732" comment="qemu-microvm-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499733" comment="qemu-ppc-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499734" comment="qemu-s390-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499735" comment="qemu-seabios-1.12.1+-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499736" comment="qemu-sgabios-8-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499737" comment="qemu-ui-curses-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499738" comment="qemu-ui-gtk-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499739" comment="qemu-ui-spice-app-4.2.1-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499740" comment="qemu-vgabios-1.12.1+-11.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499741" comment="qemu-x86-4.2.1-11.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111131" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1100369" ref_url="https://bugzilla.suse.com/1100369" source="BUGZILLA"/>
		<reference ref_id="1109160" ref_url="https://bugzilla.suse.com/1109160" source="BUGZILLA"/>
		<reference ref_id="1118367" ref_url="https://bugzilla.suse.com/1118367" source="BUGZILLA"/>
		<reference ref_id="1118368" ref_url="https://bugzilla.suse.com/1118368" source="BUGZILLA"/>
		<reference ref_id="1128220" ref_url="https://bugzilla.suse.com/1128220" source="BUGZILLA"/>
		<reference ref_id="1156205" ref_url="https://bugzilla.suse.com/1156205" source="BUGZILLA"/>
		<reference ref_id="1157051" ref_url="https://bugzilla.suse.com/1157051" source="BUGZILLA"/>
		<reference ref_id="1161168" ref_url="https://bugzilla.suse.com/1161168" source="BUGZILLA"/>
		<reference ref_id="1170667" ref_url="https://bugzilla.suse.com/1170667" source="BUGZILLA"/>
		<reference ref_id="1170713" ref_url="https://bugzilla.suse.com/1170713" source="BUGZILLA"/>
		<reference ref_id="1171313" ref_url="https://bugzilla.suse.com/1171313" source="BUGZILLA"/>
		<reference ref_id="1171740" ref_url="https://bugzilla.suse.com/1171740" source="BUGZILLA"/>
		<reference ref_id="1172958" ref_url="https://bugzilla.suse.com/1172958" source="BUGZILLA"/>
		<reference ref_id="1173307" ref_url="https://bugzilla.suse.com/1173307" source="BUGZILLA"/>
		<reference ref_id="1173311" ref_url="https://bugzilla.suse.com/1173311" source="BUGZILLA"/>
		<reference ref_id="1173983" ref_url="https://bugzilla.suse.com/1173983" source="BUGZILLA"/>
		<reference ref_id="1175443" ref_url="https://bugzilla.suse.com/1175443" source="BUGZILLA"/>
		<reference ref_id="1176092" ref_url="https://bugzilla.suse.com/1176092" source="BUGZILLA"/>
		<reference ref_id="1176674" ref_url="https://bugzilla.suse.com/1176674" source="BUGZILLA"/>
		<reference ref_id="906079" ref_url="https://bugzilla.suse.com/906079" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-3136" ref_url="https://www.suse.com/security/cve/CVE-2017-3136/" source="CVE"/>
		<reference ref_id="CVE-2018-5741" ref_url="https://www.suse.com/security/cve/CVE-2018-5741/" source="CVE"/>
		<reference ref_id="CVE-2019-6477" ref_url="https://www.suse.com/security/cve/CVE-2019-6477/" source="CVE"/>
		<reference ref_id="CVE-2020-8616" ref_url="https://www.suse.com/security/cve/CVE-2020-8616/" source="CVE"/>
		<reference ref_id="CVE-2020-8617" ref_url="https://www.suse.com/security/cve/CVE-2020-8617/" source="CVE"/>
		<reference ref_id="CVE-2020-8618" ref_url="https://www.suse.com/security/cve/CVE-2020-8618/" source="CVE"/>
		<reference ref_id="CVE-2020-8619" ref_url="https://www.suse.com/security/cve/CVE-2020-8619/" source="CVE"/>
		<reference ref_id="CVE-2020-8620" ref_url="https://www.suse.com/security/cve/CVE-2020-8620/" source="CVE"/>
		<reference ref_id="CVE-2020-8621" ref_url="https://www.suse.com/security/cve/CVE-2020-8621/" source="CVE"/>
		<reference ref_id="CVE-2020-8622" ref_url="https://www.suse.com/security/cve/CVE-2020-8622/" source="CVE"/>
		<reference ref_id="CVE-2020-8623" ref_url="https://www.suse.com/security/cve/CVE-2020-8623/" source="CVE"/>
		<reference ref_id="CVE-2020-8624" ref_url="https://www.suse.com/security/cve/CVE-2020-8624/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007552.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

BIND was upgraded to version 9.16.6:

Note:

- bind is now more strict in regards to DNSSEC. If queries are not working,
  check for DNSSEC issues. For instance, if bind is used in a namserver
  forwarder chain, the forwarding DNS servers must support DNSSEC.

Fixing security issues:

- CVE-2020-8616: Further limit the number of queries that can be triggered from
  a request.  Root and TLD servers are no longer exempt
  from max-recursion-queries.  Fetches for missing name server. (bsc#1171740)
  Address records are limited to 4 for any domain.
- CVE-2020-8617: Replaying a TSIG BADTIME response as a request could trigger an
  assertion failure. (bsc#1171740)
- CVE-2019-6477: Fixed an issue where TCP-pipelined queries could bypass 
  the tcp-clients limit (bsc#1157051).
- CVE-2018-5741: Fixed the documentation (bsc#1109160).
- CVE-2020-8618: It was possible to trigger an INSIST when determining
  whether a record would fit into a TCP message buffer (bsc#1172958).
- CVE-2020-8619: It was possible to trigger an INSIST in
  lib/dns/rbtdb.c:new_reference() with a particular zone content
  and query patterns (bsc#1172958).
- CVE-2020-8624: 'update-policy' rules of type 'subdomain' were
  incorrectly treated as 'zonesub' rules, which allowed
  keys used in 'subdomain' rules to update names outside
  of the specified subdomains. The problem was fixed by
  making sure 'subdomain' rules are again processed as
  described in the ARM (bsc#1175443).
- CVE-2020-8623: When BIND 9 was compiled with native PKCS#11 support, it
  was possible to trigger an assertion failure in code
  determining the number of bits in the PKCS#11 RSA public
  key with a specially crafted packet (bsc#1175443).
- CVE-2020-8621: named could crash in certain query resolution scenarios
  where QNAME minimization and forwarding were both
  enabled (bsc#1175443).
- CVE-2020-8620: It was possible to trigger an assertion failure by
  sending a specially crafted large TCP DNS message (bsc#1175443).
- CVE-2020-8622: It was possible to trigger an assertion failure when
  verifying the response to a TSIG-signed request (bsc#1175443).

Other issues fixed:

- Add engine support to OpenSSL EdDSA implementation.
- Add engine support to OpenSSL ECDSA implementation.
- Update PKCS#11 EdDSA implementation to PKCS#11 v3.0.
- Warn about AXFR streams with inconsistent message IDs.
- Make ISC rwlock implementation the default again.
- Fixed issues when using cookie-secrets for AES and SHA2 (bsc#1161168)
- Installed the default files in /var/lib/named and created 
  chroot environment on systems using transactional-updates (bsc#1100369, fate#325524)
- Fixed an issue where bind was not working in FIPS mode (bsc#906079).
- Fixed dependency issues (bsc#1118367 and bsc#1118368).
- GeoIP support is now discontinued, now GeoIP2 is used(bsc#1156205).
- Fixed an issue with FIPS (bsc#1128220).
- The liblwres library is discontinued upstream and is no longer included.
- Added service dependency on NTP to make sure the clock is accurate when bind is starts (bsc#1170667, bsc#1170713).
- Reject DS records at the zone apex when loading master files. Log but otherwise ignore attempts to add DS records at the zone apex via UPDATE.
- The default value of 'max-stale-ttl' has been changed from 1 week to 12 hours.
- Zone timers are now exported via statistics channel.
- The 'primary' and 'secondary' keywords, when used as parameters for 'check-names', were not processed correctly and were being ignored.
- 'rndc dnstap -roll &lt;value&gt;' did not limit the number of saved files to &lt;value&gt;.
- Add 'rndc dnssec -status' command.
- Addressed a couple of situations where named could crash.
- Changed /var/lib/named to owner root:named and perms rwxrwxr-t
  so that named, being a/the only member of the 'named' group
  has full r/w access yet cannot change directories owned by root
  in the case of a compromized named.
  [bsc#1173307, bind-chrootenv.conf]
- Added '/etc/bind.keys' to NAMED_CONF_INCLUDE_FILES in /etc/sysconfig/named to suppress warning message re missing file (bsc#1173983).
- Removed '-r /dev/urandom' from all invocations of rndc-confgen
  (init/named system/lwresd.init system/named.init in vendor-files)
  as this option is deprecated and causes rndc-confgen to fail.
  (bsc#1173311, bsc#1176674, bsc#1170713)
- /usr/bin/genDDNSkey: Removing the use of the -r option in the call
  of /usr/sbin/dnssec-keygen as BIND now uses the random number
  functions provided by the crypto library (i.e., OpenSSL or a
  PKCS#11 provider) as a source of randomness rather than /dev/random.
  Therefore the -r command line option no longer has any effect on
  dnssec-keygen. Leaving the option in genDDNSkey as to not break
  compatibility. Patch provided by Stefan Eisenwiener.
  [bsc#1171313]
- Put libns into a separate subpackage to avoid file conflicts
  in the libisc subpackage due to different sonums (bsc#1176092).
- Require /sbin/start_daemon: both init scripts, the one used in
  systemd context as well as legacy sysv, make use of start_daemon.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1100369">SUSE bug 1100369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109160">SUSE bug 1109160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118367">SUSE bug 1118367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1118368">SUSE bug 1118368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128220">SUSE bug 1128220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156205">SUSE bug 1156205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157051">SUSE bug 1157051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161168">SUSE bug 1161168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170667">SUSE bug 1170667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170713">SUSE bug 1170713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171313">SUSE bug 1171313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171740">SUSE bug 1171740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172958">SUSE bug 1172958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173307">SUSE bug 1173307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173311">SUSE bug 1173311</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173983">SUSE bug 1173983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175443">SUSE bug 1175443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176092">SUSE bug 1176092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176674">SUSE bug 1176674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/906079">SUSE bug 906079</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2017-3136/">CVE-2017-3136</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-5741/">CVE-2018-5741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2019-6477/">CVE-2019-6477</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8616/">CVE-2020-8616</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8617/">CVE-2020-8617</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8618/">CVE-2020-8618</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8619/">CVE-2020-8619</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8620/">CVE-2020-8620</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8621/">CVE-2020-8621</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8622/">CVE-2020-8622</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8623/">CVE-2020-8623</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8624/">CVE-2020-8624</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499467" comment="bind-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499468" comment="bind-chrootenv-9.16.6-12.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499469" comment="bind-doc-9.16.6-12.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111132" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173157" ref_url="https://bugzilla.suse.com/1173157" source="BUGZILLA"/>
		<reference ref_id="1174139" ref_url="https://bugzilla.suse.com/1174139" source="BUGZILLA"/>
		<reference ref_id="1174955" ref_url="https://bugzilla.suse.com/1174955" source="BUGZILLA"/>
		<reference ref_id="1175465" ref_url="https://bugzilla.suse.com/1175465" source="BUGZILLA"/>
		<reference ref_id="1176430" ref_url="https://bugzilla.suse.com/1176430" source="BUGZILLA"/>
		<reference ref_id="1177155" ref_url="https://bugzilla.suse.com/1177155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15708" ref_url="https://www.suse.com/security/cve/CVE-2020-15708/" source="CVE"/>
		<reference ref_id="CVE-2020-25637" ref_url="https://www.suse.com/security/cve/CVE-2020-25637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007594.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2020-15708: Added a  note to libvirtd.conf about polkit auth in SUSE distros (bsc#1174955).
- CVE-2020-25637: Fixed a double free in qemuAgentGetInterfaces() (bsc#1177155).
- qemu: Avoid stale capabilities cache host CPU or kernel command line changes (bsc#1173157).
- virdevmapper: Handle kernel without device-mapper support (bsc#1175465).
- Xen: Added support for passing arbitrary commands to the qemu device model, similar to the xl.cfg(5) device_model_args setting (bsc#1174139).
- Xen: Don't add dom0 twice on driver reload (bsc#1176430).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-20"/>
	<updated date="2020-10-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173157">SUSE bug 1173157</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174139">SUSE bug 1174139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174955">SUSE bug 1174955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175465">SUSE bug 1175465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176430">SUSE bug 1176430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177155">SUSE bug 1177155</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15708/">CVE-2020-15708</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25637/">CVE-2020-25637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499742" comment="libvirt-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499743" comment="libvirt-admin-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499744" comment="libvirt-bash-completion-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499745" comment="libvirt-client-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499746" comment="libvirt-daemon-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499747" comment="libvirt-daemon-config-network-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499748" comment="libvirt-daemon-config-nwfilter-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499749" comment="libvirt-daemon-driver-interface-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499750" comment="libvirt-daemon-driver-libxl-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499751" comment="libvirt-daemon-driver-lxc-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499752" comment="libvirt-daemon-driver-network-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499753" comment="libvirt-daemon-driver-nodedev-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499754" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499755" comment="libvirt-daemon-driver-qemu-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499756" comment="libvirt-daemon-driver-secret-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499757" comment="libvirt-daemon-driver-storage-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499758" comment="libvirt-daemon-driver-storage-core-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499759" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499760" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499761" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499762" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499763" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499764" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499765" comment="libvirt-daemon-hooks-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499766" comment="libvirt-daemon-lxc-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499767" comment="libvirt-daemon-qemu-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499768" comment="libvirt-daemon-xen-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499769" comment="libvirt-devel-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499770" comment="libvirt-doc-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499771" comment="libvirt-lock-sanlock-6.0.0-13.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499772" comment="libvirt-nss-6.0.0-13.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111133" version="1" class="patch">
	<metadata>
		<title>Security update for rmt-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1165548" ref_url="https://bugzilla.suse.com/1165548" source="BUGZILLA"/>
		<reference ref_id="1168554" ref_url="https://bugzilla.suse.com/1168554" source="BUGZILLA"/>
		<reference ref_id="1172177" ref_url="https://bugzilla.suse.com/1172177" source="BUGZILLA"/>
		<reference ref_id="1172182" ref_url="https://bugzilla.suse.com/1172182" source="BUGZILLA"/>
		<reference ref_id="1172184" ref_url="https://bugzilla.suse.com/1172184" source="BUGZILLA"/>
		<reference ref_id="1172186" ref_url="https://bugzilla.suse.com/1172186" source="BUGZILLA"/>
		<reference ref_id="1173351" ref_url="https://bugzilla.suse.com/1173351" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-16770" ref_url="https://www.suse.com/security/cve/CVE-2019-16770/" source="CVE"/>
		<reference ref_id="CVE-2019-5418" ref_url="https://www.suse.com/security/cve/CVE-2019-5418/" source="CVE"/>
		<reference ref_id="CVE-2019-5419" ref_url="https://www.suse.com/security/cve/CVE-2019-5419/" source="CVE"/>
		<reference ref_id="CVE-2019-5420" ref_url="https://www.suse.com/security/cve/CVE-2019-5420/" source="CVE"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077/" source="CVE"/>
		<reference ref_id="CVE-2020-15169" ref_url="https://www.suse.com/security/cve/CVE-2020-15169/" source="CVE"/>
		<reference ref_id="CVE-2020-5247" ref_url="https://www.suse.com/security/cve/CVE-2020-5247/" source="CVE"/>
		<reference ref_id="CVE-2020-5249" ref_url="https://www.suse.com/security/cve/CVE-2020-5249/" source="CVE"/>
		<reference ref_id="CVE-2020-5267" ref_url="https://www.suse.com/security/cve/CVE-2020-5267/" source="CVE"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="CVE-2020-8166" ref_url="https://www.suse.com/security/cve/CVE-2020-8166/" source="CVE"/>
		<reference ref_id="CVE-2020-8167" ref_url="https://www.suse.com/security/cve/CVE-2020-8167/" source="CVE"/>
		<reference ref_id="CVE-2020-8184" ref_url="https://www.suse.com/security/cve/CVE-2020-8184/" source="CVE"/>
		<reference ref_id="CVE-2020-8185" ref_url="https://www.suse.com/security/cve/CVE-2020-8185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007625.html" source="SUSE-SU"/>
		<description>
This update for rmt-server fixes the following issues:

Update to version 2.6.5:
- Solved potential bug of SCC repository URLs changing over time. RMT
  now self heals by removing the previous invalid repository and
  creating the correct one.
- Add web server settings to /etc/rmt.conf:
  Now it's possible to configure the minimum and maximum threads count as well
  the number of web server workers to be booted through /etc/rmt.conf.
- Instead of using an MD5 of URLs for custom repository friendly_ids,
  RMT now builds an ID from the name.
- Fix RMT file caching based on timestamps:
  Previously, RMT sent GET requests with the header 'If-Modified-Since' to a
  repository server and if the response had a 304 (Not Modified), it would copy
  a file from the local cache instead of downloading. However, if the local file
  timestamp accidentally changed to a date newer than the one on the repository
  server, RMT would have an outdated file, which caused some errors.
  Now, RMT makes HEAD requests to the repositories servers and inspect the
  'Last-Modified' header to decide whether to download a file or copy it from
  cache, by comparing the equalness of timestamps.
- Fixed an issue where relative paths supplied to `rmt-cli import repos`
  caused the command to fail.
- Friendlier IDs for custom repositories:
  In an effort to simplify the handling of SCC and custom repositories,
  RMT now has friendly IDs. For SCC repositories, it's the same SCC ID
  as before. For custom repositories, it can either be user provided
  or RMT generated (MD5 of the provided URL).
  Benefits:
  * `rmt-cli mirror repositories` now works for custom repositories.
  * Custom repository IDs can be the same across RMT instances.
  * No more confusing 'SCC ID' vs 'ID' in `rmt-cli` output.
  Deprecation Warnings:
  * RMT now uses a different ID for custom repositories than before.
    RMT still supports that old ID, but it's recommended to start
    using the new ID to ensure future compatibility.
- Updated rails and puma dependencies for security fixes.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1165548">SUSE bug 1165548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168554">SUSE bug 1168554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172182">SUSE bug 1172182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172184">SUSE bug 1172184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173351">SUSE bug 1173351</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-16770/">CVE-2019-16770</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-5418/">CVE-2019-5418</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-5419/">CVE-2019-5419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2019-5420/">CVE-2019-5420</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15169/">CVE-2020-15169</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-5247/">CVE-2020-5247</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-5249/">CVE-2020-5249</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-5267/">CVE-2020-5267</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8166/">CVE-2020-8166</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8167/">CVE-2020-8167</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-8184/">CVE-2020-8184</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8185/">CVE-2020-8185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499773" comment="rmt-server-2.6.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499774" comment="rmt-server-config-2.6.5-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111134" version="1" class="patch">
	<metadata>
		<title>Security update for virt-bootstrap (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1140750" ref_url="https://bugzilla.suse.com/1140750" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-13314" ref_url="https://www.suse.com/security/cve/CVE-2019-13314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007629.html" source="SUSE-SU"/>
		<description>
This update for virt-bootstrap fixes the following issues:

Security issue fixed:

- CVE-2019-13314: Allow providing the container's root password using a file (bsc#1140750).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1140750">SUSE bug 1140750</bugzilla>
	<cve impact="low" cvss3="2.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2019-13314/">CVE-2019-13314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499501" comment="python3-virt-bootstrap-1.0.0-5.3.124 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111135" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27673" ref_url="https://www.suse.com/security/cve/CVE-2020-27673/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007633.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1177409 - VUL-0: CVE-2020-27673: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27673/">CVE-2020-27673</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499775" comment="xen-4.13.1_10-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499776" comment="xen-devel-4.13.1_10-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499777" comment="xen-tools-4.13.1_10-3.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499778" comment="xen-tools-xendomains-wait-disk-4.13.1_10-3.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111136" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007651.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499779" comment="libspice-server-devel-0.14.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499780" comment="libspice-server1-0.14.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111137" version="1" class="patch">
	<metadata>
		<title>Security update for spice-gtk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177158" ref_url="https://bugzilla.suse.com/1177158" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14355" ref_url="https://www.suse.com/security/cve/CVE-2020-14355/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007656.html" source="SUSE-SU"/>
		<description>
This update for spice-gtk fixes the following issues:
	  
- CVE-2020-14355: Fixed multiple buffer overflow vulnerabilities in QUIC image decoding (bsc#1177158).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177158">SUSE bug 1177158</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14355/">CVE-2020-14355</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499781" comment="spice-gtk-devel-0.37-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499782" comment="typelib-1_0-SpiceClientGlib-2_0-0.37-3.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499783" comment="typelib-1_0-SpiceClientGtk-3_0-0.37-3.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111138" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1159670" ref_url="https://bugzilla.suse.com/1159670" source="BUGZILLA"/>
		<reference ref_id="1175987" ref_url="https://bugzilla.suse.com/1175987" source="BUGZILLA"/>
		<reference ref_id="1176024" ref_url="https://bugzilla.suse.com/1176024" source="BUGZILLA"/>
		<reference ref_id="1176294" ref_url="https://bugzilla.suse.com/1176294" source="BUGZILLA"/>
		<reference ref_id="1176397" ref_url="https://bugzilla.suse.com/1176397" source="BUGZILLA"/>
		<reference ref_id="1177867" ref_url="https://bugzilla.suse.com/1177867" source="BUGZILLA"/>
		<reference ref_id="1178319" ref_url="https://bugzilla.suse.com/1178319" source="BUGZILLA"/>
		<reference ref_id="1178361" ref_url="https://bugzilla.suse.com/1178361" source="BUGZILLA"/>
		<reference ref_id="1178362" ref_url="https://bugzilla.suse.com/1178362" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16846" ref_url="https://www.suse.com/security/cve/CVE-2020-16846/" source="CVE"/>
		<reference ref_id="CVE-2020-17490" ref_url="https://www.suse.com/security/cve/CVE-2020-17490/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007693.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Properly validate eauth credentials and tokens on SSH calls made by Salt API 
  (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)
- Fix disk.blkid to avoid unexpected keyword argument '__pub_user'. (bsc#1177867)
- Ensure virt.update stop_on_reboot is updated with its default value.
- Do not break package building for systemd OSes.
- Drop wrong mock from chroot unit test.
- Support systemd versions with dot. (bsc#1176294)
- Fix for grains.test_core unit test.
- Fix file/directory user and group ownership containing UTF-8 characters. (bsc#1176024)
- Several changes to virtualization:
  * Fix virt update when cpu and memory are changed.
  * Memory Tuning GSoC.
  * Properly fix memory setting regression in virt.update.
  * Expose libvirt on_reboot in virt states.
- Support transactional systems (MicroOS).
- zypperpkg module ignores retcode 104 for search(). (bsc#1159670)
- Xen disk fixes. No longer generates volumes for Xen disks, but the corresponding
  file or block disk. (bsc#1175987)
- Invalidate file list cache when cache file modified time is in the future. (bsc#1176397)
- Prevent import errors when running test_btrfs unit tests.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-04"/>
	<updated date="2020-11-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1159670">SUSE bug 1159670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175987">SUSE bug 1175987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176024">SUSE bug 1176024</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176294">SUSE bug 1176294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176397">SUSE bug 1176397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177867">SUSE bug 1177867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178319">SUSE bug 1178319</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178361">SUSE bug 1178361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178362">SUSE bug 1178362</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16846/">CVE-2020-16846</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17490/">CVE-2020-17490</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499784" comment="salt-api-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499785" comment="salt-cloud-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499786" comment="salt-fish-completion-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499787" comment="salt-master-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499788" comment="salt-proxy-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499789" comment="salt-ssh-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499790" comment="salt-standalone-formulas-configuration-3000-4.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499791" comment="salt-syndic-3000-4.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111139" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178512" ref_url="https://bugzilla.suse.com/1178512" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28196" ref_url="https://www.suse.com/security/cve/CVE-2020-28196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007793.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following security issue:

- CVE-2020-28196: Fixed an unbounded recursion via an ASN.1-encoded Kerberos message (bsc#1178512).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178512">SUSE bug 1178512</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28196/">CVE-2020-28196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499521" comment="krb5-plugin-kdb-ldap-1.16.3-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499522" comment="krb5-server-1.16.3-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111140" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1177950" ref_url="https://bugzilla.suse.com/1177950" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007814.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Security issue fixed:

- CVE-2020-28368: Fixed the Intel RAPL sidechannel attack, aka PLATYPUS attack, aka XSA-351 (bsc#1178591).

Non-security issues fixed:

- Updated to Xen 4.13.2 bug fix release (bsc#1027519).
- Fixed a panic during MSI cleanup on AMD hardware (bsc#1027519).
- Adjusted help for --max_iters, default is 5 (bsc#1177950).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177950">SUSE bug 1177950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499792" comment="xen-4.13.2_02-3.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499793" comment="xen-devel-4.13.2_02-3.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499794" comment="xen-tools-4.13.2_02-3.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499795" comment="xen-tools-xendomains-wait-disk-4.13.2_02-3.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111141" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3463-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007830.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- Upgrade to version 12.5:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * Fix recently-added timetz test case so it works when the USA
    is not observing daylight savings time.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/12/release-12-5.html

- Stop building the mini and lib packages as they are now coming
  from postgresql13.
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499796" comment="libecpg6-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499797" comment="postgresql12-contrib-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499798" comment="postgresql12-devel-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499799" comment="postgresql12-docs-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499800" comment="postgresql12-plperl-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499801" comment="postgresql12-plpython-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499802" comment="postgresql12-pltcl-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499803" comment="postgresql12-server-12.5-8.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499804" comment="postgresql12-server-devel-12.5-8.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111142" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007832.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.15:
  * CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
    and firing of deferred triggers within index expressions and
    materialized view queries.
  * CVE-2020-25694, bsc#1178667:
    a) Fix usage of complex connection-string parameters in pg_dump,
    pg_restore, clusterdb, reindexdb, and vacuumdb.
    b) When psql's \connect command re-uses connection parameters,
    ensure that all non-overridden parameters from a previous
    connection string are re-used.
  * CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
    modifying specially-treated variables.
  * Fix recently-added timetz test case so it works when the USA
    is not observing daylight savings time.
  * https://www.postgresql.org/about/news/2111/
  * https://www.postgresql.org/docs/10/release-10-15.html
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-20"/>
	<updated date="2020-11-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499535" comment="postgresql10-contrib-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499536" comment="postgresql10-devel-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499537" comment="postgresql10-docs-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499538" comment="postgresql10-plperl-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499539" comment="postgresql10-plpython-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499540" comment="postgresql10-pltcl-10.15-8.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499541" comment="postgresql10-server-10.15-8.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111143" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175596" ref_url="https://bugzilla.suse.com/1175596" source="BUGZILLA"/>
		<reference ref_id="1177472" ref_url="https://bugzilla.suse.com/1177472" source="BUGZILLA"/>
		<reference ref_id="1178428" ref_url="https://bugzilla.suse.com/1178428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007844.html" source="SUSE-SU"/>
		<description>
This update for mariadb and mariadb-connector-c fixes the following issues:

- Update mariadb to 10.2.36 GA [bsc#1177472, bsc#1178428] fixing for the 
  following security vulnerabilities:
    CVE-2020-14812, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789 CVE-2020-15180

- Update mariadb-connector-c to 3.1.11 [bsc#1177472 and bsc#1178428]
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-24"/>
	<updated date="2020-11-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175596">SUSE bug 1175596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499544" comment="libmariadb-devel-3.1.11-3.22.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499545" comment="libmariadb_plugins-3.1.11-3.22.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111144" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177472" ref_url="https://bugzilla.suse.com/1177472" source="BUGZILLA"/>
		<reference ref_id="1178428" ref_url="https://bugzilla.suse.com/1178428" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14765" ref_url="https://www.suse.com/security/cve/CVE-2020-14765/" source="CVE"/>
		<reference ref_id="CVE-2020-14776" ref_url="https://www.suse.com/security/cve/CVE-2020-14776/" source="CVE"/>
		<reference ref_id="CVE-2020-14789" ref_url="https://www.suse.com/security/cve/CVE-2020-14789/" source="CVE"/>
		<reference ref_id="CVE-2020-14812" ref_url="https://www.suse.com/security/cve/CVE-2020-14812/" source="CVE"/>
		<reference ref_id="CVE-2020-15180" ref_url="https://www.suse.com/security/cve/CVE-2020-15180/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007893.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to 10.4.17 [bsc#1177472] and [bsc#1178428]

- fixing for the following security vulnerabilities:
  CVE-2020-14812, CVE-2020-14765, CVE-2020-14776, CVE-2020-14789, CVE-2020-15180
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-30"/>
	<updated date="2020-11-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177472">SUSE bug 1177472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178428">SUSE bug 1178428</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14765/">CVE-2020-14765</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14776/">CVE-2020-14776</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14789/">CVE-2020-14789</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14812/">CVE-2020-14812</cve>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15180/">CVE-2020-15180</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499805" comment="libmariadbd-devel-10.4.17-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499806" comment="libmariadbd19-10.4.17-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499807" comment="mariadb-10.4.17-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499808" comment="mariadb-client-10.4.17-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499809" comment="mariadb-errormessages-10.4.17-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499810" comment="mariadb-tools-10.4.17-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111145" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177409" ref_url="https://bugzilla.suse.com/1177409" source="BUGZILLA"/>
		<reference ref_id="1177412" ref_url="https://bugzilla.suse.com/1177412" source="BUGZILLA"/>
		<reference ref_id="1177413" ref_url="https://bugzilla.suse.com/1177413" source="BUGZILLA"/>
		<reference ref_id="1177414" ref_url="https://bugzilla.suse.com/1177414" source="BUGZILLA"/>
		<reference ref_id="1178591" ref_url="https://bugzilla.suse.com/1178591" source="BUGZILLA"/>
		<reference ref_id="1178963" ref_url="https://bugzilla.suse.com/1178963" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27670" ref_url="https://www.suse.com/security/cve/CVE-2020-27670/" source="CVE"/>
		<reference ref_id="CVE-2020-27671" ref_url="https://www.suse.com/security/cve/CVE-2020-27671/" source="CVE"/>
		<reference ref_id="CVE-2020-27672" ref_url="https://www.suse.com/security/cve/CVE-2020-27672/" source="CVE"/>
		<reference ref_id="CVE-2020-27674" ref_url="https://www.suse.com/security/cve/CVE-2020-27674/" source="CVE"/>
		<reference ref_id="CVE-2020-28368" ref_url="https://www.suse.com/security/cve/CVE-2020-28368/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007914.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change (XSA-355) 
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-03"/>
	<updated date="2020-12-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177409">SUSE bug 1177409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177412">SUSE bug 1177412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177413">SUSE bug 1177413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177414">SUSE bug 1177414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178591">SUSE bug 1178591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178963">SUSE bug 1178963</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27670/">CVE-2020-27670</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27671/">CVE-2020-27671</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27672/">CVE-2020-27672</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27674/">CVE-2020-27674</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-28368/">CVE-2020-28368</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499811" comment="xen-4.13.2_04-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499812" comment="xen-devel-4.13.2_04-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499813" comment="xen-tools-4.13.2_04-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499814" comment="xen-tools-xendomains-wait-disk-4.13.2_04-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111146" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173513" ref_url="https://bugzilla.suse.com/1173513" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14145" ref_url="https://www.suse.com/security/cve/CVE-2020-14145/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007952.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2020-14145: Fixed a potential information leak during host key exchange (bsc#1173513).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-09"/>
	<updated date="2020-12-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173513">SUSE bug 1173513</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14145/">CVE-2020-14145</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499815" comment="openssh-fips-8.1p1-5.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111147" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177789" ref_url="https://bugzilla.suse.com/1177789" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14584" ref_url="https://www.suse.com/security/cve/CVE-2019-14584/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008091.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2019-14584: Fixed a null dereference in AuthenticodeVerify() (bsc#1177789).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-18"/>
	<updated date="2020-12-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177789">SUSE bug 1177789</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-14584/">CVE-2019-14584</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499816" comment="ovmf-201911-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499817" comment="ovmf-tools-201911-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499818" comment="qemu-ovmf-x86_64-201911-7.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499819" comment="qemu-uefi-aarch64-201911-7.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111148" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1176782" ref_url="https://bugzilla.suse.com/1176782" source="BUGZILLA"/>
		<reference ref_id="1179496" ref_url="https://bugzilla.suse.com/1179496" source="BUGZILLA"/>
		<reference ref_id="1179498" ref_url="https://bugzilla.suse.com/1179498" source="BUGZILLA"/>
		<reference ref_id="1179501" ref_url="https://bugzilla.suse.com/1179501" source="BUGZILLA"/>
		<reference ref_id="1179502" ref_url="https://bugzilla.suse.com/1179502" source="BUGZILLA"/>
		<reference ref_id="1179506" ref_url="https://bugzilla.suse.com/1179506" source="BUGZILLA"/>
		<reference ref_id="1179514" ref_url="https://bugzilla.suse.com/1179514" source="BUGZILLA"/>
		<reference ref_id="1179516" ref_url="https://bugzilla.suse.com/1179516" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29480" ref_url="https://www.suse.com/security/cve/CVE-2020-29480/" source="CVE"/>
		<reference ref_id="CVE-2020-29481" ref_url="https://www.suse.com/security/cve/CVE-2020-29481/" source="CVE"/>
		<reference ref_id="CVE-2020-29483" ref_url="https://www.suse.com/security/cve/CVE-2020-29483/" source="CVE"/>
		<reference ref_id="CVE-2020-29484" ref_url="https://www.suse.com/security/cve/CVE-2020-29484/" source="CVE"/>
		<reference ref_id="CVE-2020-29566" ref_url="https://www.suse.com/security/cve/CVE-2020-29566/" source="CVE"/>
		<reference ref_id="CVE-2020-29570" ref_url="https://www.suse.com/security/cve/CVE-2020-29570/" source="CVE"/>
		<reference ref_id="CVE-2020-29571" ref_url="https://www.suse.com/security/cve/CVE-2020-29571/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008115.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). 
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). 
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782).
- Multiple other bugs (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176782">SUSE bug 1176782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179496">SUSE bug 1179496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179498">SUSE bug 1179498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179501">SUSE bug 1179501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179502">SUSE bug 1179502</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179506">SUSE bug 1179506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179514">SUSE bug 1179514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179516">SUSE bug 1179516</bugzilla>
	<cve impact="moderate" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29480/">CVE-2020-29480</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29481/">CVE-2020-29481</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29483/">CVE-2020-29483</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29484/">CVE-2020-29484</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29566/">CVE-2020-29566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29570/">CVE-2020-29570</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29571/">CVE-2020-29571</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499820" comment="xen-4.13.2_06-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499821" comment="xen-devel-4.13.2_06-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499822" comment="xen-tools-4.13.2_06-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499823" comment="xen-tools-xendomains-wait-disk-4.13.2_06-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111149" version="1" class="patch">
	<metadata>
		<title>Security update for icu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:0819-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007104.html" source="SUSE-SU"/>
		<description>
This update for icu fixes the following issues:

- CVE-2020-10531: Fixed a potential integer overflow in UnicodeString:doAppend (bsc#1166844).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009493068" comment="libicu60_2-60.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493069" comment="libicu60_2-bedata-60.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009493070" comment="libicu60_2-ledata-60.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111150" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1177204" ref_url="https://bugzilla.suse.com/1177204" source="BUGZILLA"/>
		<reference ref_id="1179148" ref_url="https://bugzilla.suse.com/1179148" source="BUGZILLA"/>
		<reference ref_id="1180690" ref_url="https://bugzilla.suse.com/1180690" source="BUGZILLA"/>
		<reference ref_id="1181254" ref_url="https://bugzilla.suse.com/1181254" source="BUGZILLA"/>
		<reference ref_id="1181989" ref_url="https://bugzilla.suse.com/1181989" source="BUGZILLA"/>
		<reference ref_id="1182576" ref_url="https://bugzilla.suse.com/1182576" source="BUGZILLA"/>
		<reference ref_id="1183072" ref_url="https://bugzilla.suse.com/1183072" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28687" ref_url="https://www.suse.com/security/cve/CVE-2021-28687/" source="CVE"/>
		<reference ref_id="CVE-2021-3308" ref_url="https://www.suse.com/security/cve/CVE-2021-3308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008586.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-3308: VUL-0: xen: IRQ vector leak on x86 (bsc#1181254, XSA-360)
- CVE-2021-28687: HVM soft-reset crashes toolstack (bsc#1183072, XSA-368)
- L3: conring size for XEN HV's with huge memory to small. Inital Xen logs cut (bsc#1177204)
- L3: XEN domU crashed on resume when using the xl unpause command (bsc#1182576)
- L3: xen: no needsreboot flag set (bsc#1180690)
- kdump of HVM fails, soft-reset not handled by libxl (bsc#1179148)
- openQA job causes libvirtd to dump core when running kdump inside domain (bsc#1181989)
- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-06"/>
	<updated date="2021-04-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177204">SUSE bug 1177204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179148">SUSE bug 1179148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180690">SUSE bug 1180690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181254">SUSE bug 1181254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181989">SUSE bug 1181989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182576">SUSE bug 1182576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183072">SUSE bug 1183072</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28687/">CVE-2021-28687</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3308/">CVE-2021-3308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499824" comment="xen-4.13.2_08-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499825" comment="xen-devel-4.13.2_08-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499826" comment="xen-tools-4.13.2_08-3.25.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499827" comment="xen-tools-xendomains-wait-disk-4.13.2_08-3.25.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111151" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172385" ref_url="https://bugzilla.suse.com/1172385" source="BUGZILLA"/>
		<reference ref_id="1173612" ref_url="https://bugzilla.suse.com/1173612" source="BUGZILLA"/>
		<reference ref_id="1176673" ref_url="https://bugzilla.suse.com/1176673" source="BUGZILLA"/>
		<reference ref_id="1176682" ref_url="https://bugzilla.suse.com/1176682" source="BUGZILLA"/>
		<reference ref_id="1176684" ref_url="https://bugzilla.suse.com/1176684" source="BUGZILLA"/>
		<reference ref_id="1178174" ref_url="https://bugzilla.suse.com/1178174" source="BUGZILLA"/>
		<reference ref_id="1178400" ref_url="https://bugzilla.suse.com/1178400" source="BUGZILLA"/>
		<reference ref_id="1178934" ref_url="https://bugzilla.suse.com/1178934" source="BUGZILLA"/>
		<reference ref_id="1179466" ref_url="https://bugzilla.suse.com/1179466" source="BUGZILLA"/>
		<reference ref_id="1179467" ref_url="https://bugzilla.suse.com/1179467" source="BUGZILLA"/>
		<reference ref_id="1179468" ref_url="https://bugzilla.suse.com/1179468" source="BUGZILLA"/>
		<reference ref_id="1179686" ref_url="https://bugzilla.suse.com/1179686" source="BUGZILLA"/>
		<reference ref_id="1181108" ref_url="https://bugzilla.suse.com/1181108" source="BUGZILLA"/>
		<reference ref_id="1182425" ref_url="https://bugzilla.suse.com/1182425" source="BUGZILLA"/>
		<reference ref_id="1182577" ref_url="https://bugzilla.suse.com/1182577" source="BUGZILLA"/>
		<reference ref_id="1182968" ref_url="https://bugzilla.suse.com/1182968" source="BUGZILLA"/>
		<reference ref_id="1184064" ref_url="https://bugzilla.suse.com/1184064" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12829" ref_url="https://www.suse.com/security/cve/CVE-2020-12829/" source="CVE"/>
		<reference ref_id="CVE-2020-15469" ref_url="https://www.suse.com/security/cve/CVE-2020-15469/" source="CVE"/>
		<reference ref_id="CVE-2020-25084" ref_url="https://www.suse.com/security/cve/CVE-2020-25084/" source="CVE"/>
		<reference ref_id="CVE-2020-25624" ref_url="https://www.suse.com/security/cve/CVE-2020-25624/" source="CVE"/>
		<reference ref_id="CVE-2020-25625" ref_url="https://www.suse.com/security/cve/CVE-2020-25625/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-27616" ref_url="https://www.suse.com/security/cve/CVE-2020-27616/" source="CVE"/>
		<reference ref_id="CVE-2020-27617" ref_url="https://www.suse.com/security/cve/CVE-2020-27617/" source="CVE"/>
		<reference ref_id="CVE-2020-27821" ref_url="https://www.suse.com/security/cve/CVE-2020-27821/" source="CVE"/>
		<reference ref_id="CVE-2020-28916" ref_url="https://www.suse.com/security/cve/CVE-2020-28916/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-29443" ref_url="https://www.suse.com/security/cve/CVE-2020-29443/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3416" ref_url="https://www.suse.com/security/cve/CVE-2021-3416/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008646.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-12829: Fix OOB access in sm501 device emulation (bsc#1172385)
- CVE-2020-25723: Fix use-after-free in usb xhci packet handling (bsc#1178934)
- CVE-2020-25084: Fix use-after-free in usb ehci packet handling (bsc#1176673)
- CVE-2020-25625: Fix infinite loop (DoS) in usb hcd-ohci emulation (bsc#1176684)
- CVE-2020-25624: Fix OOB access in usb hcd-ohci emulation (bsc#1176682)
- CVE-2020-27617: Fix guest triggerable assert in shared network handling code (bsc#1178174)
- CVE-2020-28916: Fix infinite loop (DoS) in e1000e device emulation (bsc#1179468)
- CVE-2020-29443: Fix OOB access in atapi emulation (bsc#1181108)
- CVE-2020-27821: Fix heap overflow in MSIx emulation (bsc#1179686)
- CVE-2020-15469: Fix null pointer deref. (DoS) in mmio ops (bsc#1173612)
- CVE-2021-20257: Fix infinite loop (DoS) in e1000 device emulation (bsc#1182577)
- CVE-2021-3416:  Fix OOB access (stack overflow) in rtl8139 NIC emulation (bsc#1182968)
- CVE-2021-3416:  Fix OOB access (stack overflow) in other NIC emulations (bsc#1182968)
- CVE-2020-27616: Fix OOB access in ati-vga emulation (bsc#1178400)
- CVE-2020-29129: Fix OOB access in SLIRP ARP/NCSI packet processing (bsc#1179466, CVE-2020-29130, bsc#1179467)
- Fix package scripts to not use hard coded paths for temporary working directories and log files (bsc#1182425)
- Add split-provides through forsplits/13 to cover updates of SLE15-SP2 to SLE15-SP3, and openSUSE equivalents (bsc#1184064)
- Added a few more usability improvements for our git packaging workflow
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172385">SUSE bug 1172385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173612">SUSE bug 1173612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176673">SUSE bug 1176673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176682">SUSE bug 1176682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176684">SUSE bug 1176684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178174">SUSE bug 1178174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178400">SUSE bug 1178400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178934">SUSE bug 1178934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179466">SUSE bug 1179466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179467">SUSE bug 1179467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179468">SUSE bug 1179468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179686">SUSE bug 1179686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181108">SUSE bug 1181108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182425">SUSE bug 1182425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182577">SUSE bug 1182577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182968">SUSE bug 1182968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184064">SUSE bug 1184064</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12829/">CVE-2020-12829</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15469/">CVE-2020-15469</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25084/">CVE-2020-25084</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25624/">CVE-2020-25624</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25625/">CVE-2020-25625</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="low" cvss3="2.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27616/">CVE-2020-27616</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27617/">CVE-2020-27617</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27821/">CVE-2020-27821</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28916/">CVE-2020-28916</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="moderate" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-29443/">CVE-2020-29443</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3416/">CVE-2021-3416</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499828" comment="qemu-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499829" comment="qemu-arm-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499830" comment="qemu-audio-alsa-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499831" comment="qemu-audio-pa-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499832" comment="qemu-block-curl-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499833" comment="qemu-block-iscsi-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499834" comment="qemu-block-rbd-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499835" comment="qemu-block-ssh-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499836" comment="qemu-guest-agent-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499837" comment="qemu-ipxe-1.0.0+-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499838" comment="qemu-kvm-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499839" comment="qemu-lang-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499840" comment="qemu-microvm-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499841" comment="qemu-ppc-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499842" comment="qemu-s390-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499843" comment="qemu-seabios-1.12.1+-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499844" comment="qemu-sgabios-8-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499845" comment="qemu-ui-curses-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499846" comment="qemu-ui-gtk-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499847" comment="qemu-ui-spice-app-4.2.1-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499848" comment="qemu-vgabios-1.12.1+-11.16.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499849" comment="qemu-x86-4.2.1-11.16.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111152" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183453" ref_url="https://bugzilla.suse.com/1183453" source="BUGZILLA"/>
		<reference ref_id="1185345" ref_url="https://bugzilla.suse.com/1185345" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25214" ref_url="https://www.suse.com/security/cve/CVE-2021-25214/" source="CVE"/>
		<reference ref_id="CVE-2021-25215" ref_url="https://www.suse.com/security/cve/CVE-2021-25215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008724.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25214: Fixed a broken inbound incremental zone update (IXFR) which could have caused named to terminate unexpectedly (bsc#1185345).
- CVE-2021-25215: Fixed an assertion check which could have failed while answering queries for DNAME records that required the DNAME to be processed to resolve itself (bsc#1185345).
- make /usr/bin/delv in bind-tools position independent (bsc#1183453).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183453">SUSE bug 1183453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185345">SUSE bug 1185345</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25214/">CVE-2021-25214</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25215/">CVE-2021-25215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499850" comment="bind-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499851" comment="bind-chrootenv-9.16.6-12.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499852" comment="bind-doc-9.16.6-12.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111153" version="1" class="patch">
	<metadata>
		<title>Security update for sca-patterns-sle11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1154824" ref_url="https://bugzilla.suse.com/1154824" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0543" ref_url="https://www.suse.com/security/cve/CVE-2020-0543/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008731.html" source="SUSE-SU"/>
		<description>
This update for sca-patterns-sle11 fixes the following issues:

- New regular patterns (1) for version 1.3.1
   * Special Register Buffer Data Sampling aka CrossTalk (CVE-2020-0543) (bsc#1154824)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-04"/>
	<updated date="2021-05-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154824">SUSE bug 1154824</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0543/">CVE-2020-0543</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499853" comment="sca-patterns-sle11-1.3.1-7.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111154" version="1" class="patch">
	<metadata>
		<title>Security update for ibutils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008773.html" source="SUSE-SU"/>
		<description>
This update for ibutils fixes the following issues:

- Hardening: Link ibis executable with -pie (bsc#1184123).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-13"/>
	<updated date="2021-05-13"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499854" comment="ibutils-1.5.7.0.2-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499855" comment="ibutils-devel-1.5.7.0.2-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499856" comment="ibutils-ui-1.5.7.0.2-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499857" comment="libibdm1-1.5.7.0.2-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111155" version="1" class="patch">
	<metadata>
		<title>Security update for ibsim (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008774.html" source="SUSE-SU"/>
		<description>
This update for ibsim fixes the following issues:

- Hardening: link as position independent executable (bsc#1184123).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-14"/>
	<updated date="2021-05-14"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499858" comment="ibsim-0.8-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111156" version="1" class="patch">
	<metadata>
		<title>Recommended update for grub2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185580" ref_url="https://bugzilla.suse.com/1185580" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008786.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

- Fixed error with the shim_lock protocol that is not found on aarch64 (bsc#1185580).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185580">SUSE bug 1185580</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499859" comment="grub2-x86_64-xen-2.04-9.45.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111157" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499860" comment="graphviz-tcl-2.40.1-6.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111158" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182657" ref_url="https://bugzilla.suse.com/1182657" source="BUGZILLA"/>
		<reference ref_id="1185729" ref_url="https://bugzilla.suse.com/1185729" source="BUGZILLA"/>
		<reference ref_id="1185730" ref_url="https://bugzilla.suse.com/1185730" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21309" ref_url="https://www.suse.com/security/cve/CVE-2021-21309/" source="CVE"/>
		<reference ref_id="CVE-2021-29477" ref_url="https://www.suse.com/security/cve/CVE-2021-29477/" source="CVE"/>
		<reference ref_id="CVE-2021-29478" ref_url="https://www.suse.com/security/cve/CVE-2021-29478/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1652-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

redis was updated to 6.0.13:

* CVE-2021-29477: Integer overflow in STRALGO LCS command (bsc#1185729)
* CVE-2021-29478: Integer overflow in COPY command for large intsets (bsc#1185730)
* Cluster: Skip unnecessary check which may prevent failure detection
* Fix performance regression in BRPOP on Redis 6.0
* Fix edge-case when a module client is unblocked

redis 6.0.12:

* Fix compilation error on non-glibc systems if jemalloc is not used

redis 6.0.11:

* CVE-2021-21309: Avoid 32-bit overflows when proto-max-bulk-len
  is set high (bsc#1182657)
* Fix handling of threaded IO and CLIENT PAUSE (failover), could
  lead to data loss or a crash
* Fix the selection of a random element from large hash tables
* Fix broken protocol in client tracking tracking-redir-broken message
* XINFO able to access expired keys on a replica
* Fix broken protocol in redis-benchmark when used with -a or
  --dbnum 
* Avoid assertions (on older kernels) when testing arm64 CoW bug
* CONFIG REWRITE should honor umask settings
* Fix firstkey,lastkey,step in COMMAND command for some commands
* RM_ZsetRem: Delete key if empty, the bug could leave empty
  zset keys 

- Switch systemd type of the sentinel service from notify to simple. This can
  be reverted when updating to 6.2 which fixes
  https://github.com/redis/redis/issues/7284 .
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182657">SUSE bug 1182657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185729">SUSE bug 1185729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185730">SUSE bug 1185730</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21309/">CVE-2021-21309</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29477/">CVE-2021-29477</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29478/">CVE-2021-29478</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499861" comment="redis-6.0.13-1.10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111159" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql, postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178666" ref_url="https://bugzilla.suse.com/1178666" source="BUGZILLA"/>
		<reference ref_id="1178667" ref_url="https://bugzilla.suse.com/1178667" source="BUGZILLA"/>
		<reference ref_id="1178668" ref_url="https://bugzilla.suse.com/1178668" source="BUGZILLA"/>
		<reference ref_id="1178961" ref_url="https://bugzilla.suse.com/1178961" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25694" ref_url="https://www.suse.com/security/cve/CVE-2020-25694/" source="CVE"/>
		<reference ref_id="CVE-2020-25695" ref_url="https://www.suse.com/security/cve/CVE-2020-25695/" source="CVE"/>
		<reference ref_id="CVE-2020-25696" ref_url="https://www.suse.com/security/cve/CVE-2020-25696/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008229.html" source="SUSE-SU"/>
		<description>
This update for postgresql, postgresql13 fixes the following issues:

This update ships postgresql13.

Upgrade to version 13.1:

* CVE-2020-25695, bsc#1178666: Block DECLARE CURSOR ... WITH HOLD
  and firing of deferred triggers within index expressions and
  materialized view queries.
* CVE-2020-25694, bsc#1178667:
  a) Fix usage of complex connection-string parameters in pg_dump,
  pg_restore, clusterdb, reindexdb, and vacuumdb.
  b) When psql's \connect command re-uses connection parameters,
  ensure that all non-overridden parameters from a previous
  connection string are re-used.
* CVE-2020-25696, bsc#1178668: Prevent psql's \gset command from
  modifying specially-treated variables.
* Fix recently-added timetz test case so it works when the USA
  is not observing daylight savings time.
  (obsoletes postgresql-timetz.patch)
* https://www.postgresql.org/about/news/2111/
* https://www.postgresql.org/docs/13/release-13-1.html

Initial packaging of PostgreSQL 13:

* https://www.postgresql.org/about/news/2077/
* https://www.postgresql.org/docs/13/release-13.html

- bsc#1178961: %ghost the symlinks to pg_config and ecpg.

Changes in postgresql wrapper package:

- Bump major version to 13.
- We also transfer PostgreSQL 9.4.26 to the new package layout in
  SLE12-SP2 and newer. Reflect this in the conflict with
  postgresql94.
- Also conflict with PostgreSQL versions before 9.
- Conflicting with older versions is not limited to SLE.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-20"/>
	<updated date="2021-01-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178666">SUSE bug 1178666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178667">SUSE bug 1178667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178668">SUSE bug 1178668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178961">SUSE bug 1178961</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25694/">CVE-2020-25694</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25695/">CVE-2020-25695</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25696/">CVE-2020-25696</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499862" comment="libecpg6-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499863" comment="postgresql-contrib-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499864" comment="postgresql-devel-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499865" comment="postgresql-docs-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499866" comment="postgresql-plperl-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499867" comment="postgresql-plpython-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499868" comment="postgresql-pltcl-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499869" comment="postgresql-server-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499870" comment="postgresql-server-devel-13-4.6.7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499871" comment="postgresql13-contrib-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499872" comment="postgresql13-devel-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499873" comment="postgresql13-docs-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499874" comment="postgresql13-plperl-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499875" comment="postgresql13-plpython-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499876" comment="postgresql13-pltcl-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499877" comment="postgresql13-server-13.1-5.3.15 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499878" comment="postgresql13-server-devel-13.1-5.3.15 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111160" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008875.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- Upgrade to version 13.3:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-27"/>
	<updated date="2021-05-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499879" comment="libecpg6-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499880" comment="postgresql13-contrib-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499881" comment="postgresql13-devel-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499882" comment="postgresql13-docs-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499883" comment="postgresql13-plperl-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499884" comment="postgresql13-plpython-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499885" comment="postgresql13-pltcl-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499886" comment="postgresql13-server-13.3-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499887" comment="postgresql13-server-devel-13.3-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111161" version="1" class="patch">
	<metadata>
		<title>Security update for nginx (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186126" ref_url="https://bugzilla.suse.com/1186126" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23017" ref_url="https://www.suse.com/security/cve/CVE-2021-23017/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008892.html" source="SUSE-SU"/>
		<description>
This update for nginx fixes the following issues:

- CVE-2021-23017: nginx DNS resolver off-by-one heap write (bsc#1186126)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-31"/>
	<updated date="2021-05-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186126">SUSE bug 1186126</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23017/">CVE-2021-23017</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499888" comment="nginx-1.16.1-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499889" comment="nginx-source-1.16.1-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111162" version="1" class="patch">
	<metadata>
		<title>Security update for dhcp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186382" ref_url="https://bugzilla.suse.com/1186382" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25217" ref_url="https://www.suse.com/security/cve/CVE-2021-25217/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008914.html" source="SUSE-SU"/>
		<description>
This update for dhcp fixes the following issues:

- CVE-2021-25217: A buffer overrun in lease file parsing code can be used to exploit a common vulnerability shared by dhcpd and dhclient (bsc#1186382)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-02"/>
	<updated date="2021-06-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186382">SUSE bug 1186382</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-25217/">CVE-2021-25217</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499890" comment="dhcp-relay-4.3.6.P1-6.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499891" comment="dhcp-server-4.3.6.P1-6.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111163" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185356" ref_url="https://bugzilla.suse.com/1185356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3514" ref_url="https://www.suse.com/security/cve/CVE-2021-3514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008944.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2021-3514: Fixed a sync_repl NULL pointer dereference in sync_create_state_control() (bsc#1185356)

389-ds was updated to version 1.4.3.23~git0.f53d0132b:

Bump version to 1.4.3.23:

* Issue 4725 - [RFE] DS - Update the password policy to support a Temporary Password Rules (#4727)
* Issue 4759 - Fix coverity issue (#4760)
* Issue 4656 - Fix cherry pick error around replication enabling
* Issue 4701 - RFE - Exclude attributes from retro changelog (#4723) (#4746)
* Issue 4742 - UI - should always use LDAPI path when calling CLI
* Issue 4667 - incorrect accounting of readers in vattr rwlock (#4732)
* Issue 4711 - SIGSEV with sync_repl (#4738)
* Issue 4649 - fix testcase importing ContentSyncPlugin
* Issue 2736 - Warnings from automatic shebang munging macro
* Issue 2736 - https://github.com/389ds/389-ds-base/issues/2736
* Issue 4706 - negative wtime in access log for CMP operations

Bump version to 1.4.3.22:

* Issue 4671 - UI - Fix browser crashes
* lib389 - Add ContentSyncPlugin class
* Issue 4656 - lib389 - fix cherry pick error
* Issue 4229 - Fix Rust linking
* Issue 4658 - monitor - connection start date is incorrect
* Issue 2621 - lib389 - backport ds_supports_new_changelog()
* Issue 4656 - Make replication CLI backwards compatible with role name change
* Issue 4656 - Remove problematic language from UI/CLI/lib389
* Issue 4459 - lib389 - Default paths should use dse.ldif if the server is down
* Issue 4663 - CLI - unable to add objectclass/attribute without x-origin

Bump version to 1.4.3.21:

* Issue 4169 - UI - updates on the tuning page are not reflected in the UI
* Issue 4588 - BUG - unable to compile without xcrypt (#4589)
* Issue 4513 - Fix replication CI test failures (#4557)
* Issue 4646 - CLI/UI - revise DNA plugin management
* Issue 4644 - Large updates can reset the CLcache to the beginning of the changelog (#4647)
* Issue 4649 - crash in sync_repl when a MODRDN create a cenotaph (#4652)
* Issue 4615 - log message when psearch first exceeds max threads per conn

Bump version to 1.4.3.20:

* Issue 4324 - Some architectures the cache line size file does not exist
* Issue 4593 - RFE - Print help when nsSSLPersonalitySSL is not found (#4614)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185356">SUSE bug 1185356</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3514/">CVE-2021-3514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499892" comment="389-ds-1.4.3.23~git0.f53d0132b-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499893" comment="389-ds-devel-1.4.3.23~git0.f53d0132b-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499894" comment="lib389-1.4.3.23~git0.f53d0132b-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499895" comment="libsvrcore0-1.4.3.23~git0.f53d0132b-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111164" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1176681" ref_url="https://bugzilla.suse.com/1176681" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179484" ref_url="https://bugzilla.suse.com/1179484" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="1183979" ref_url="https://bugzilla.suse.com/1183979" source="BUGZILLA"/>
		<reference ref_id="1186290" ref_url="https://bugzilla.suse.com/1186290" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25085" ref_url="https://www.suse.com/security/cve/CVE-2020-25085/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008949.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-25085: Fix out-of-bounds access issue while doing multi block SDMA (bsc#1176681)
- CVE-2020-10756: Fix out-of-bounds read information disclosure in icmp6_send_echoreply(bsc#1172380)
- Fix issue where s390 guest fails to find zipl boot menu index (bsc#1183979)
- QEMU BIOS fails to read stage2 loader on s390x (bsc#1186290)
- Host CPU microcode revision will be visible inside VMs when the proper CPU-model is used (jsc#SLE-17785):
- For the record, these issues are fixed in this package already.
  Most are alternate references to previously mentioned issues:
  (CVE-2019-15890, bsc#1149813, CVE-2020-8608, bsc#1163019,
  CVE-2020-14364, bsc#1175534, CVE-2020-25707, bsc#1178683,
  CVE-2020-25723, bsc#1178935, CVE-2020-29130, bsc#1179477,
  CVE-2020-29129, bsc#1179484, CVE-2021-20257, bsc#1182846,
  CVE-2021-3419, bsc#1182975)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176681">SUSE bug 1176681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183979">SUSE bug 1183979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186290">SUSE bug 1186290</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25085/">CVE-2020-25085</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499896" comment="qemu-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499897" comment="qemu-arm-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499898" comment="qemu-audio-alsa-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499899" comment="qemu-audio-pa-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499900" comment="qemu-block-curl-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499901" comment="qemu-block-iscsi-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499902" comment="qemu-block-rbd-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499903" comment="qemu-block-ssh-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499904" comment="qemu-guest-agent-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499905" comment="qemu-ipxe-1.0.0+-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499906" comment="qemu-kvm-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499907" comment="qemu-lang-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499908" comment="qemu-microvm-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499909" comment="qemu-ppc-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499910" comment="qemu-s390-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499911" comment="qemu-seabios-1.12.1+-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499912" comment="qemu-sgabios-8-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499913" comment="qemu-ui-curses-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499914" comment="qemu-ui-gtk-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499915" comment="qemu-ui-spice-app-4.2.1-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499916" comment="qemu-vgabios-1.12.1+-11.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499917" comment="qemu-x86-4.2.1-11.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111165" version="1" class="patch">
	<metadata>
		<title>Security update for pam_radius (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1163933" ref_url="https://bugzilla.suse.com/1163933" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-9542" ref_url="https://www.suse.com/security/cve/CVE-2015-9542/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008958.html" source="SUSE-SU"/>
		<description>
This update for pam_radius fixes the following issues:

- CVE-2015-9542: pam_radius: buffer overflow in password field (bsc#1163933)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163933">SUSE bug 1163933</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9542/">CVE-2015-9542</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499918" comment="pam_radius-1.4.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111166" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149813" ref_url="https://bugzilla.suse.com/1149813" source="BUGZILLA"/>
		<reference ref_id="1163019" ref_url="https://bugzilla.suse.com/1163019" source="BUGZILLA"/>
		<reference ref_id="1172380" ref_url="https://bugzilla.suse.com/1172380" source="BUGZILLA"/>
		<reference ref_id="1175534" ref_url="https://bugzilla.suse.com/1175534" source="BUGZILLA"/>
		<reference ref_id="1178683" ref_url="https://bugzilla.suse.com/1178683" source="BUGZILLA"/>
		<reference ref_id="1178935" ref_url="https://bugzilla.suse.com/1178935" source="BUGZILLA"/>
		<reference ref_id="1179477" ref_url="https://bugzilla.suse.com/1179477" source="BUGZILLA"/>
		<reference ref_id="1179484" ref_url="https://bugzilla.suse.com/1179484" source="BUGZILLA"/>
		<reference ref_id="1182846" ref_url="https://bugzilla.suse.com/1182846" source="BUGZILLA"/>
		<reference ref_id="1182975" ref_url="https://bugzilla.suse.com/1182975" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15890" ref_url="https://www.suse.com/security/cve/CVE-2019-15890/" source="CVE"/>
		<reference ref_id="CVE-2020-10756" ref_url="https://www.suse.com/security/cve/CVE-2020-10756/" source="CVE"/>
		<reference ref_id="CVE-2020-14364" ref_url="https://www.suse.com/security/cve/CVE-2020-14364/" source="CVE"/>
		<reference ref_id="CVE-2020-25707" ref_url="https://www.suse.com/security/cve/CVE-2020-25707/" source="CVE"/>
		<reference ref_id="CVE-2020-25723" ref_url="https://www.suse.com/security/cve/CVE-2020-25723/" source="CVE"/>
		<reference ref_id="CVE-2020-29129" ref_url="https://www.suse.com/security/cve/CVE-2020-29129/" source="CVE"/>
		<reference ref_id="CVE-2020-29130" ref_url="https://www.suse.com/security/cve/CVE-2020-29130/" source="CVE"/>
		<reference ref_id="CVE-2020-8608" ref_url="https://www.suse.com/security/cve/CVE-2020-8608/" source="CVE"/>
		<reference ref_id="CVE-2021-20257" ref_url="https://www.suse.com/security/cve/CVE-2021-20257/" source="CVE"/>
		<reference ref_id="CVE-2021-3419" ref_url="https://www.suse.com/security/cve/CVE-2021-3419/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008972.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-10756: Fix out-of-bounds read information disclosure in icmp6_send_echoreply (bsc#1172380)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-09"/>
	<updated date="2021-06-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149813">SUSE bug 1149813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163019">SUSE bug 1163019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172380">SUSE bug 1172380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175534">SUSE bug 1175534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178683">SUSE bug 1178683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178935">SUSE bug 1178935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179477">SUSE bug 1179477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179484">SUSE bug 1179484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182846">SUSE bug 1182846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182975">SUSE bug 1182975</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15890/">CVE-2019-15890</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10756/">CVE-2020-10756</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14364/">CVE-2020-14364</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25707/">CVE-2020-25707</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-25723/">CVE-2020-25723</cve>
	<cve impact="moderate" cvss3="2.7/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29129/">CVE-2020-29129</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29130/">CVE-2020-29130</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-8608/">CVE-2020-8608</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20257/">CVE-2021-20257</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3419/">CVE-2021-3419</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499919" comment="qemu-audio-oss-3.1.1.1-9.27.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111167" version="1" class="patch">
	<metadata>
		<title>Security update for spice (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181686" ref_url="https://bugzilla.suse.com/1181686" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20201" ref_url="https://www.suse.com/security/cve/CVE-2021-20201/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008979.html" source="SUSE-SU"/>
		<description>
This update for spice fixes the following issues:

- CVE-2021-20201: client initiated renegotiation causing denial of service (bsc#1181686)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-10"/>
	<updated date="2021-06-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181686">SUSE bug 1181686</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20201/">CVE-2021-20201</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499920" comment="libspice-server-devel-0.14.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499921" comment="libspice-server1-0.14.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111168" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177580" ref_url="https://bugzilla.suse.com/1177580" source="BUGZILLA"/>
		<reference ref_id="1178533" ref_url="https://bugzilla.suse.com/1178533" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008236.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Security issue fixed:

- The 'redirect' option was fixed to properly handle 'verifyChain = yes' (bsc#1177580).

Non-security issues fixed:

- Fix startup problem of the stunnel daemon (bsc#1178533)

- update to 5.57:
  * Security bugfixes
  * New features
    - New securityLevel configuration file option.
    - Support for modern PostgreSQL clients
    - TLS 1.3 configuration updated for better compatibility.
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed memory leaks on configuration reloading errors.
    - DH/ECDH initialization restored for client sections.
    - Delay startup with systemd until network is online.
    - A number of testing framework fixes and improvements.

- update to 5.56:
  - Various text files converted to Markdown format.
  - Support for realpath(3) implementations incompatible
    with POSIX.1-2008, such as 4.4BSD or Solaris.
  - Support for engines without PRNG seeding methods (thx to
    Petr Mikhalitsyn).
  - Retry unsuccessful port binding on configuration
    file reload.
  - Thread safety fixes in SSL_SESSION object handling.
  - Terminate clients on exit in the FORK threading model.

- Fixup stunnel.conf handling:
  * Remove old static openSUSE provided stunnel.conf.
  * Use upstream stunnel.conf and tailor it for openSUSE using sed.
  * Don't show README.openSUSE when installing.

- enable /etc/stunnel/conf.d
- re-enable openssl.cnf
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178533">SUSE bug 1178533</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499922" comment="stunnel-5.57-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111169" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171164" ref_url="https://bugzilla.suse.com/1171164" source="BUGZILLA"/>
		<reference ref_id="1171569" ref_url="https://bugzilla.suse.com/1171569" source="BUGZILLA"/>
		<reference ref_id="1183436" ref_url="https://bugzilla.suse.com/1183436" source="BUGZILLA"/>
		<reference ref_id="1185916" ref_url="https://bugzilla.suse.com/1185916" source="BUGZILLA"/>
		<reference ref_id="1185918" ref_url="https://bugzilla.suse.com/1185918" source="BUGZILLA"/>
		<reference ref_id="1185919" ref_url="https://bugzilla.suse.com/1185919" source="BUGZILLA"/>
		<reference ref_id="1185921" ref_url="https://bugzilla.suse.com/1185921" source="BUGZILLA"/>
		<reference ref_id="1185923" ref_url="https://bugzilla.suse.com/1185923" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25097" ref_url="https://www.suse.com/security/cve/CVE-2020-25097/" source="CVE"/>
		<reference ref_id="CVE-2021-28651" ref_url="https://www.suse.com/security/cve/CVE-2021-28651/" source="CVE"/>
		<reference ref_id="CVE-2021-28652" ref_url="https://www.suse.com/security/cve/CVE-2021-28652/" source="CVE"/>
		<reference ref_id="CVE-2021-28662" ref_url="https://www.suse.com/security/cve/CVE-2021-28662/" source="CVE"/>
		<reference ref_id="CVE-2021-31806" ref_url="https://www.suse.com/security/cve/CVE-2021-31806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009003.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

- update to 4.15:
- CVE-2021-28652: Broken cache manager URL parsing (bsc#1185918)
- CVE-2021-28651: Memory leak in RFC 2169 response parsing (bsc#1185921)
- CVE-2021-28662: Limit HeaderLookupTable_t::lookup() to BadHdr and specific IDs (bsc#1185919)
- CVE-2021-31806: Handle more Range requests (bsc#1185916)
- CVE-2020-25097: HTTP Request Smuggling vulnerability (bsc#1183436)
- Handle more partial responses (bsc#1185923)
- fix previous change to reinstante permissions macros, because the wrong path has been used (bsc#1171569).
- use libexecdir instead of libdir to conform to recent changes in Factory (bsc#1171164).
- Reinstate permissions macros for pinger binary, because the permissions
  package is also responsible for setting up the cap_net_raw capability,
  currently a fresh squid install doesn't get a capability bit at all (bsc#1171569).
- Change pinger and basic_pam_auth helper to use standard permissions. pinger uses cap_net_raw=ep instead (bsc#1171569)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-11"/>
	<updated date="2021-06-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171164">SUSE bug 1171164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171569">SUSE bug 1171569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183436">SUSE bug 1183436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185916">SUSE bug 1185916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185918">SUSE bug 1185918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185919">SUSE bug 1185919</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185921">SUSE bug 1185921</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185923">SUSE bug 1185923</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25097/">CVE-2020-25097</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28651/">CVE-2021-28651</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28652/">CVE-2021-28652</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28662/">CVE-2021-28662</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31806/">CVE-2021-31806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499923" comment="squid-4.15-5.26.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111170" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009010.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:

- Upgrade to version 10.17:
- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-14"/>
	<updated date="2021-06-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497146" comment="postgresql10-contrib-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497147" comment="postgresql10-devel-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499924" comment="postgresql10-docs-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497148" comment="postgresql10-plperl-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497149" comment="postgresql10-plpython-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497150" comment="postgresql10-pltcl-10.17-8.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497151" comment="postgresql10-server-10.17-8.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111171" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1183118" ref_url="https://bugzilla.suse.com/1183118" source="BUGZILLA"/>
		<reference ref_id="1183168" ref_url="https://bugzilla.suse.com/1183168" source="BUGZILLA"/>
		<reference ref_id="1185924" ref_url="https://bugzilla.suse.com/1185924" source="BUGZILLA"/>
		<reference ref_id="1185925" ref_url="https://bugzilla.suse.com/1185925" source="BUGZILLA"/>
		<reference ref_id="1185926" ref_url="https://bugzilla.suse.com/1185926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32027" ref_url="https://www.suse.com/security/cve/CVE-2021-32027/" source="CVE"/>
		<reference ref_id="CVE-2021-32028" ref_url="https://www.suse.com/security/cve/CVE-2021-32028/" source="CVE"/>
		<reference ref_id="CVE-2021-32029" ref_url="https://www.suse.com/security/cve/CVE-2021-32029/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009026.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.7:

- CVE-2021-32027: Fixed integer overflows in array subscripting calculations (bsc#1185924).
- CVE-2021-32028: Fixed mishandling of junk columns in INSERT ... ON CONFLICT ... UPDATE target lists (bsc#1185925).
- CVE-2021-32029: Fixed possibly-incorrect computation of UPDATE ... RETURNING outputs for joined cross-partition updates (bsc#1185926).

- Don't use %_stop_on_removal, because it was meant to be private and got removed from openSUSE. %_restart_on_update is also private, but still supported and needed for now (bsc#1183168).
- Re-enable build of the llvmjit subpackage on SLE, but it will only be delivered on PackageHub for now (bsc#1183118).
- Disable icu for PostgreSQL 10 (and older) on TW (bsc#1179945).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183118">SUSE bug 1183118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183168">SUSE bug 1183168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185924">SUSE bug 1185924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185925">SUSE bug 1185925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185926">SUSE bug 1185926</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32027/">CVE-2021-32027</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32028/">CVE-2021-32028</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32029/">CVE-2021-32029</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497153" comment="postgresql12-contrib-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497154" comment="postgresql12-devel-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497155" comment="postgresql12-docs-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497156" comment="postgresql12-plperl-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497157" comment="postgresql12-plpython-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497158" comment="postgresql12-pltcl-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497159" comment="postgresql12-server-12.7-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497160" comment="postgresql12-server-devel-12.7-8.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111172" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1171257" ref_url="https://bugzilla.suse.com/1171257" source="BUGZILLA"/>
		<reference ref_id="1176293" ref_url="https://bugzilla.suse.com/1176293" source="BUGZILLA"/>
		<reference ref_id="1179831" ref_url="https://bugzilla.suse.com/1179831" source="BUGZILLA"/>
		<reference ref_id="1181368" ref_url="https://bugzilla.suse.com/1181368" source="BUGZILLA"/>
		<reference ref_id="1182281" ref_url="https://bugzilla.suse.com/1182281" source="BUGZILLA"/>
		<reference ref_id="1182293" ref_url="https://bugzilla.suse.com/1182293" source="BUGZILLA"/>
		<reference ref_id="1182382" ref_url="https://bugzilla.suse.com/1182382" source="BUGZILLA"/>
		<reference ref_id="1185092" ref_url="https://bugzilla.suse.com/1185092" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028) 

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- virt module updates
  * network: handle missing ipv4 netmask attribute
  * more network support
  * PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in requirements/base.txt
- Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382)
- Always require `python3-distro` (bsc#1182293)
- Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing
- Fix pkg states when DEB package has 'all' arch
- Do not force beacons configuration to be a list.
- Remove msgpack &lt; 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version &gt;= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Improvements on 'ansiblegate' module (bsc#1185092):
  * New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171257">SUSE bug 1171257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176293">SUSE bug 1176293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179831">SUSE bug 1179831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181368">SUSE bug 1181368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182281">SUSE bug 1182281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182293">SUSE bug 1182293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185092">SUSE bug 1185092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499947" comment="salt-api-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499948" comment="salt-cloud-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499949" comment="salt-fish-completion-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499950" comment="salt-master-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499951" comment="salt-proxy-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499952" comment="salt-ssh-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499953" comment="salt-standalone-formulas-configuration-3002.2-37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499954" comment="salt-syndic-3002.2-37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111173" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187418" ref_url="https://bugzilla.suse.com/1187418" source="BUGZILLA"/>
		<reference ref_id="1187419" ref_url="https://bugzilla.suse.com/1187419" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="CVE-2021-33515" ref_url="https://www.suse.com/security/cve/CVE-2021-33515/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009072.html" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

- CVE-2021-29157: Local attacker can login as any user and access their emails (bsc#1187418)
- CVE-2021-33515: Attacker can potentially steal user credentials and mails (bsc#1187419)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187418">SUSE bug 1187418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187419">SUSE bug 1187419</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-33515/">CVE-2021-33515</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499955" comment="dovecot23-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499956" comment="dovecot23-backend-mysql-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499957" comment="dovecot23-backend-pgsql-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499958" comment="dovecot23-backend-sqlite-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499959" comment="dovecot23-devel-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499960" comment="dovecot23-fts-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499961" comment="dovecot23-fts-lucene-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499962" comment="dovecot23-fts-solr-2.3.11.3-55.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499963" comment="dovecot23-fts-squat-2.3.11.3-55.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111174" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186922" ref_url="https://bugzilla.suse.com/1186922" source="BUGZILLA"/>
		<reference ref_id="1186923" ref_url="https://bugzilla.suse.com/1186923" source="BUGZILLA"/>
		<reference ref_id="1186924" ref_url="https://bugzilla.suse.com/1186924" source="BUGZILLA"/>
		<reference ref_id="1187017" ref_url="https://bugzilla.suse.com/1187017" source="BUGZILLA"/>
		<reference ref_id="1187040" ref_url="https://bugzilla.suse.com/1187040" source="BUGZILLA"/>
		<reference ref_id="1187174" ref_url="https://bugzilla.suse.com/1187174" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13950" ref_url="https://www.suse.com/security/cve/CVE-2020-13950/" source="CVE"/>
		<reference ref_id="CVE-2020-35452" ref_url="https://www.suse.com/security/cve/CVE-2020-35452/" source="CVE"/>
		<reference ref_id="CVE-2021-26690" ref_url="https://www.suse.com/security/cve/CVE-2021-26690/" source="CVE"/>
		<reference ref_id="CVE-2021-26691" ref_url="https://www.suse.com/security/cve/CVE-2021-26691/" source="CVE"/>
		<reference ref_id="CVE-2021-30641" ref_url="https://www.suse.com/security/cve/CVE-2021-30641/" source="CVE"/>
		<reference ref_id="CVE-2021-31618" ref_url="https://www.suse.com/security/cve/CVE-2021-31618/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009074.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- fixed CVE-2021-30641 [bsc#1187174]: MergeSlashes regression
- fixed CVE-2021-31618 [bsc#1186924]: NULL pointer dereference on specially crafted HTTP/2 request
- fixed CVE-2020-13950 [bsc#1187040]: mod_proxy NULL pointer dereference
- fixed CVE-2020-35452 [bsc#1186922]: Single zero byte stack overflow in mod_auth_digest 
- fixed CVE-2021-26690 [bsc#1186923]: mod_session NULL pointer dereference in parser
- fixed CVE-2021-26691 [bsc#1187017]: Heap overflow in mod_session
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-22"/>
	<updated date="2021-06-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186922">SUSE bug 1186922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186923">SUSE bug 1186923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186924">SUSE bug 1186924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187017">SUSE bug 1187017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187040">SUSE bug 1187040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187174">SUSE bug 1187174</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-13950/">CVE-2020-13950</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35452/">CVE-2020-35452</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26690/">CVE-2021-26690</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26691/">CVE-2021-26691</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30641/">CVE-2021-30641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-31618/">CVE-2021-31618</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499964" comment="apache2-devel-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499965" comment="apache2-doc-2.4.43-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499966" comment="apache2-worker-2.4.43-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111175" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184016" ref_url="https://bugzilla.suse.com/1184016" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009078.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- Fixed plaintext password entries in logfiles (bsc#1184016).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-23"/>
	<updated date="2021-06-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184016">SUSE bug 1184016</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499967" comment="freeradius-server-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499968" comment="freeradius-server-devel-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499969" comment="freeradius-server-krb5-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499970" comment="freeradius-server-ldap-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499971" comment="freeradius-server-libs-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499972" comment="freeradius-server-mysql-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499973" comment="freeradius-server-perl-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499974" comment="freeradius-server-postgresql-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499975" comment="freeradius-server-python3-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499976" comment="freeradius-server-sqlite-3.0.21-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499977" comment="freeradius-server-utils-3.0.21-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111176" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186151" ref_url="https://bugzilla.suse.com/1186151" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009083.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- Fixed a possible  buffer overflow in IScsiDxe (bsc#1186151)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186151">SUSE bug 1186151</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499978" comment="ovmf-201911-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499979" comment="ovmf-tools-201911-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499980" comment="qemu-ovmf-x86_64-201911-7.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499981" comment="qemu-uefi-aarch64-201911-7.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111177" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184574" ref_url="https://bugzilla.suse.com/1184574" source="BUGZILLA"/>
		<reference ref_id="1185591" ref_url="https://bugzilla.suse.com/1185591" source="BUGZILLA"/>
		<reference ref_id="1185981" ref_url="https://bugzilla.suse.com/1185981" source="BUGZILLA"/>
		<reference ref_id="1185990" ref_url="https://bugzilla.suse.com/1185990" source="BUGZILLA"/>
		<reference ref_id="1186010" ref_url="https://bugzilla.suse.com/1186010" source="BUGZILLA"/>
		<reference ref_id="1187013" ref_url="https://bugzilla.suse.com/1187013" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3544" ref_url="https://www.suse.com/security/cve/CVE-2021-3544/" source="CVE"/>
		<reference ref_id="CVE-2021-3545" ref_url="https://www.suse.com/security/cve/CVE-2021-3545/" source="CVE"/>
		<reference ref_id="CVE-2021-3546" ref_url="https://www.suse.com/security/cve/CVE-2021-3546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009105.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3546: Fix out-of-bounds write in virgl_cmd_get_capset (bsc#1185981)
- CVE-2021-3544: Fix memory leaks found in the virtio vhost-user GPU device (bsc#1186010)
- CVE-2021-3545: Fix information disclosure due to uninitialized memory read (bsc#1185990)

Non-security issues fixed:

- Fix testsuite error (bsc#1184574)
- Fix qemu crash with iothread when block commit after snapshot (bsc#1187013)
- Fix qemu hang while cancelling migrating hugepage vm (bsc#1185591)
- Use RCU to avoid race during scsi hotplug/hotunplug (bsc#1184574)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-30"/>
	<updated date="2021-06-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184574">SUSE bug 1184574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185591">SUSE bug 1185591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185981">SUSE bug 1185981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185990">SUSE bug 1185990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186010">SUSE bug 1186010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187013">SUSE bug 1187013</bugzilla>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3544/">CVE-2021-3544</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3545/">CVE-2021-3545</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3546/">CVE-2021-3546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499925" comment="qemu-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499926" comment="qemu-arm-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499927" comment="qemu-audio-alsa-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499928" comment="qemu-audio-pa-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499929" comment="qemu-block-curl-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499930" comment="qemu-block-iscsi-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499931" comment="qemu-block-rbd-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499932" comment="qemu-block-ssh-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499933" comment="qemu-guest-agent-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499934" comment="qemu-ipxe-1.0.0+-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499935" comment="qemu-kvm-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499936" comment="qemu-lang-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499937" comment="qemu-microvm-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499938" comment="qemu-ppc-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499939" comment="qemu-s390-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499940" comment="qemu-seabios-1.12.1+-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499941" comment="qemu-sgabios-8-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499942" comment="qemu-ui-curses-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499943" comment="qemu-ui-gtk-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499944" comment="qemu-ui-spice-app-4.2.1-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499945" comment="qemu-vgabios-1.12.1+-11.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499946" comment="qemu-x86-4.2.1-11.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111178" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186722" ref_url="https://bugzilla.suse.com/1186722" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32625" ref_url="https://www.suse.com/security/cve/CVE-2021-32625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009124.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:

- Upgrade to 6.0.14
- CVE-2021-32625: An integer overflow bug could be exploited by using the STRALGO LCS command to cause remote remote code execution (bsc#1186722)
- Fix crash in UNLINK on a stream key with deleted consumer groups
- SINTERSTORE: Add missing keyspace del event when none of the sources exist
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186722">SUSE bug 1186722</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32625/">CVE-2021-32625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624065" comment="redis-6.0.14-6.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111179" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184253" ref_url="https://bugzilla.suse.com/1184253" source="BUGZILLA"/>
		<reference ref_id="1187871" ref_url="https://bugzilla.suse.com/1187871" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3631" ref_url="https://www.suse.com/security/cve/CVE-2021-3631/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009217.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-3631: fix SELinux label generation logic (bsc#1187871)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1184253">SUSE bug 1184253</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187871">SUSE bug 1187871</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3631/">CVE-2021-3631</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624889" comment="libvirt-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624890" comment="libvirt-admin-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624891" comment="libvirt-bash-completion-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624892" comment="libvirt-client-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624893" comment="libvirt-daemon-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624894" comment="libvirt-daemon-config-network-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624895" comment="libvirt-daemon-config-nwfilter-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624896" comment="libvirt-daemon-driver-interface-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624897" comment="libvirt-daemon-driver-libxl-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624898" comment="libvirt-daemon-driver-lxc-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624899" comment="libvirt-daemon-driver-network-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624900" comment="libvirt-daemon-driver-nodedev-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624901" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624902" comment="libvirt-daemon-driver-qemu-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624903" comment="libvirt-daemon-driver-secret-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624904" comment="libvirt-daemon-driver-storage-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624905" comment="libvirt-daemon-driver-storage-core-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624906" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624907" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624908" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624909" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624910" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624911" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624912" comment="libvirt-daemon-hooks-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624913" comment="libvirt-daemon-lxc-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624914" comment="libvirt-daemon-qemu-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624915" comment="libvirt-daemon-xen-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624916" comment="libvirt-devel-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624917" comment="libvirt-doc-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624918" comment="libvirt-lock-sanlock-6.0.0-13.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624919" comment="libvirt-nss-6.0.0-13.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111180" version="1" class="patch">
	<metadata>
		<title>Security update for linuxptp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187646" ref_url="https://bugzilla.suse.com/1187646" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3570" ref_url="https://www.suse.com/security/cve/CVE-2021-3570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009215.html" source="SUSE-SU"/>
		<description>
This update for linuxptp fixes the following issues:

- CVE-2021-3570: Validate the messageLength field of incoming messages. (bsc#1187646)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187646">SUSE bug 1187646</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3570/">CVE-2021-3570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625994" comment="linuxptp-1.8+git65.g303b08c-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111181" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187364" ref_url="https://bugzilla.suse.com/1187364" source="BUGZILLA"/>
		<reference ref_id="1187365" ref_url="https://bugzilla.suse.com/1187365" source="BUGZILLA"/>
		<reference ref_id="1187366" ref_url="https://bugzilla.suse.com/1187366" source="BUGZILLA"/>
		<reference ref_id="1187367" ref_url="https://bugzilla.suse.com/1187367" source="BUGZILLA"/>
		<reference ref_id="1187499" ref_url="https://bugzilla.suse.com/1187499" source="BUGZILLA"/>
		<reference ref_id="1187529" ref_url="https://bugzilla.suse.com/1187529" source="BUGZILLA"/>
		<reference ref_id="1187538" ref_url="https://bugzilla.suse.com/1187538" source="BUGZILLA"/>
		<reference ref_id="1187539" ref_url="https://bugzilla.suse.com/1187539" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3582" ref_url="https://www.suse.com/security/cve/CVE-2021-3582/" source="CVE"/>
		<reference ref_id="CVE-2021-3592" ref_url="https://www.suse.com/security/cve/CVE-2021-3592/" source="CVE"/>
		<reference ref_id="CVE-2021-3593" ref_url="https://www.suse.com/security/cve/CVE-2021-3593/" source="CVE"/>
		<reference ref_id="CVE-2021-3594" ref_url="https://www.suse.com/security/cve/CVE-2021-3594/" source="CVE"/>
		<reference ref_id="CVE-2021-3595" ref_url="https://www.suse.com/security/cve/CVE-2021-3595/" source="CVE"/>
		<reference ref_id="CVE-2021-3607" ref_url="https://www.suse.com/security/cve/CVE-2021-3607/" source="CVE"/>
		<reference ref_id="CVE-2021-3608" ref_url="https://www.suse.com/security/cve/CVE-2021-3608/" source="CVE"/>
		<reference ref_id="CVE-2021-3611" ref_url="https://www.suse.com/security/cve/CVE-2021-3611/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009213.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3595: Fixed slirp: invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187366)
- CVE-2021-3592: Fix for slirp: invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187364)
- CVE-2021-3594: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp) (bsc#1187367)
- CVE-2021-3593: Fix for slirp: invalid pointer initialization may lead to information disclosure (udp6) (bsc#1187365)
- CVE-2021-3582: Fix possible mremap overflow in the pvrdma (bsc#1187499)
- CVE-2021-3607: Ensure correct input on ring init (bsc#1187539)
- CVE-2021-3608: Fix the ring init error flow (bsc#1187538)
- CVE-2021-3611: Fix intel-hda segmentation fault due to stack overflow (bsc#1187529)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-27"/>
	<updated date="2021-07-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1187364">SUSE bug 1187364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187365">SUSE bug 1187365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187366">SUSE bug 1187366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187367">SUSE bug 1187367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187499">SUSE bug 1187499</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187529">SUSE bug 1187529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187538">SUSE bug 1187538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187539">SUSE bug 1187539</bugzilla>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3582/">CVE-2021-3582</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3592/">CVE-2021-3592</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3593/">CVE-2021-3593</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3594/">CVE-2021-3594</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3595/">CVE-2021-3595</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3607/">CVE-2021-3607</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3608/">CVE-2021-3608</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3611/">CVE-2021-3611</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626239" comment="qemu-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626240" comment="qemu-arm-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626241" comment="qemu-audio-alsa-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626242" comment="qemu-audio-pa-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626243" comment="qemu-block-curl-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626244" comment="qemu-block-iscsi-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626245" comment="qemu-block-rbd-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626246" comment="qemu-block-ssh-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626247" comment="qemu-guest-agent-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626248" comment="qemu-ipxe-1.0.0+-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626249" comment="qemu-kvm-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626250" comment="qemu-lang-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626251" comment="qemu-microvm-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626252" comment="qemu-ppc-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626253" comment="qemu-s390-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626254" comment="qemu-seabios-1.12.1+-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626255" comment="qemu-sgabios-8-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626256" comment="qemu-ui-curses-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626257" comment="qemu-ui-gtk-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626258" comment="qemu-ui-spice-app-4.2.1-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626259" comment="qemu-vgabios-1.12.1+-11.25.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626260" comment="qemu-x86-4.2.1-11.25.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111182" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1117483" ref_url="https://bugzilla.suse.com/1117483" source="BUGZILLA"/>
		<reference ref_id="1181345" ref_url="https://bugzilla.suse.com/1181345" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27827" ref_url="https://www.suse.com/security/cve/CVE-2020-27827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008262.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- openvswitch was updated to 2.13.2 
- CVE-2020-27827: Fixed a memory leak when parsing lldp packets (bsc#1181345)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1117483">SUSE bug 1117483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181345">SUSE bug 1181345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27827/">CVE-2020-27827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497914" comment="libopenvswitch-2_13-0-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499982" comment="libovn-20_03-0-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499983" comment="openvswitch-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499984" comment="openvswitch-devel-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499985" comment="openvswitch-ipsec-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499986" comment="openvswitch-pki-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499987" comment="openvswitch-test-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499988" comment="openvswitch-vtep-2.13.2-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499989" comment="ovn-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499990" comment="ovn-central-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499991" comment="ovn-devel-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499992" comment="ovn-docker-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499993" comment="ovn-host-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499994" comment="ovn-vtep-20.03.1-9.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497915" comment="python3-ovs-2.13.2-9.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111183" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182739" ref_url="https://bugzilla.suse.com/1182739" source="BUGZILLA"/>
		<reference ref_id="1183770" ref_url="https://bugzilla.suse.com/1183770" source="BUGZILLA"/>
		<reference ref_id="1185870" ref_url="https://bugzilla.suse.com/1185870" source="BUGZILLA"/>
		<reference ref_id="1185872" ref_url="https://bugzilla.suse.com/1185872" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2154" ref_url="https://www.suse.com/security/cve/CVE-2021-2154/" source="CVE"/>
		<reference ref_id="CVE-2021-2166" ref_url="https://www.suse.com/security/cve/CVE-2021-2166/" source="CVE"/>
		<reference ref_id="CVE-2021-27928" ref_url="https://www.suse.com/security/cve/CVE-2021-27928/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009258.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.2.39 (bsc#1182739)
- CVE-2021-2166: DML unspecified vulnerability lead to complete DOS. (bsc#1185870)
- CVE-2021-2154: DML unspecified vulnerability can lead to complete DOS. (bsc#1185872)
- CVE-2021-27928: Fixed a remote code execution issue. (bsc#1183770)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182739">SUSE bug 1182739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183770">SUSE bug 1183770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185870">SUSE bug 1185870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185872">SUSE bug 1185872</bugzilla>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2154/">CVE-2021-2154</cve>
	<cve impact="moderate" cvss3="4.9/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2166/">CVE-2021-2166</cve>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27928/">CVE-2021-27928</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626426" comment="libmariadbd-devel-10.4.20-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626427" comment="libmariadbd19-10.4.20-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626428" comment="mariadb-10.4.20-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626429" comment="mariadb-client-10.4.20-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626430" comment="mariadb-errormessages-10.4.20-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626431" comment="mariadb-tools-10.4.20-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111184" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180432" ref_url="https://bugzilla.suse.com/1180432" source="BUGZILLA"/>
		<reference ref_id="1180433" ref_url="https://bugzilla.suse.com/1180433" source="BUGZILLA"/>
		<reference ref_id="1180434" ref_url="https://bugzilla.suse.com/1180434" source="BUGZILLA"/>
		<reference ref_id="1180435" ref_url="https://bugzilla.suse.com/1180435" source="BUGZILLA"/>
		<reference ref_id="1182651" ref_url="https://bugzilla.suse.com/1182651" source="BUGZILLA"/>
		<reference ref_id="1186012" ref_url="https://bugzilla.suse.com/1186012" source="BUGZILLA"/>
		<reference ref_id="1189145" ref_url="https://bugzilla.suse.com/1189145" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35503" ref_url="https://www.suse.com/security/cve/CVE-2020-35503/" source="CVE"/>
		<reference ref_id="CVE-2020-35504" ref_url="https://www.suse.com/security/cve/CVE-2020-35504/" source="CVE"/>
		<reference ref_id="CVE-2020-35505" ref_url="https://www.suse.com/security/cve/CVE-2020-35505/" source="CVE"/>
		<reference ref_id="CVE-2020-35506" ref_url="https://www.suse.com/security/cve/CVE-2020-35506/" source="CVE"/>
		<reference ref_id="CVE-2021-20255" ref_url="https://www.suse.com/security/cve/CVE-2021-20255/" source="CVE"/>
		<reference ref_id="CVE-2021-3527" ref_url="https://www.suse.com/security/cve/CVE-2021-3527/" source="CVE"/>
		<reference ref_id="CVE-2021-3682" ref_url="https://www.suse.com/security/cve/CVE-2021-3682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019909.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- usbredir: free call on invalid pointer in bufp_alloc (bsc#1189145, CVE-2021-3682)
- NULL pointer dereference in ESP (bsc#1180433, CVE-2020-35504) (bsc#1180434, CVE-2020-35505) (bsc#1180435, CVE-2020-35506)
- NULL pointer dereference issue in megasas-gen2 host bus adapter (bsc#1180432, CVE-2020-35503)
- eepro100: stack overflow via infinite recursion (bsc#1182651, CVE-2021-20255)
- usb: unbounded stack allocation in usbredir (bsc#1186012, CVE-2021-3527)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180432">SUSE bug 1180432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180433">SUSE bug 1180433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180434">SUSE bug 1180434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180435">SUSE bug 1180435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182651">SUSE bug 1182651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186012">SUSE bug 1186012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189145">SUSE bug 1189145</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35503/">CVE-2020-35503</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35504/">CVE-2020-35504</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35505/">CVE-2020-35505</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-35506/">CVE-2020-35506</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20255/">CVE-2021-20255</cve>
	<cve impact="low" cvss3="3.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3527/">CVE-2021-3527</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-3682/">CVE-2021-3682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630344" comment="qemu-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630345" comment="qemu-arm-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630346" comment="qemu-audio-alsa-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630347" comment="qemu-audio-pa-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630348" comment="qemu-block-curl-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630349" comment="qemu-block-iscsi-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630350" comment="qemu-block-rbd-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630351" comment="qemu-block-ssh-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630352" comment="qemu-guest-agent-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630353" comment="qemu-ipxe-1.0.0+-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630354" comment="qemu-kvm-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630355" comment="qemu-lang-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630356" comment="qemu-microvm-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630357" comment="qemu-ppc-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630358" comment="qemu-s390-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630359" comment="qemu-seabios-1.12.1+-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630360" comment="qemu-sgabios-8-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630361" comment="qemu-ui-curses-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630362" comment="qemu-ui-gtk-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630363" comment="qemu-ui-spice-app-4.2.1-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630364" comment="qemu-vgabios-1.12.1+-11.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630365" comment="qemu-x86-4.2.1-11.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111185" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174920" ref_url="https://bugzilla.suse.com/1174920" source="BUGZILLA"/>
		<reference ref_id="1174922" ref_url="https://bugzilla.suse.com/1174922" source="BUGZILLA"/>
		<reference ref_id="1174923" ref_url="https://bugzilla.suse.com/1174923" source="BUGZILLA"/>
		<reference ref_id="1180405" ref_url="https://bugzilla.suse.com/1180405" source="BUGZILLA"/>
		<reference ref_id="1180406" ref_url="https://bugzilla.suse.com/1180406" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12100" ref_url="https://www.suse.com/security/cve/CVE-2020-12100/" source="CVE"/>
		<reference ref_id="CVE-2020-12673" ref_url="https://www.suse.com/security/cve/CVE-2020-12673/" source="CVE"/>
		<reference ref_id="CVE-2020-12674" ref_url="https://www.suse.com/security/cve/CVE-2020-12674/" source="CVE"/>
		<reference ref_id="CVE-2020-24386" ref_url="https://www.suse.com/security/cve/CVE-2020-24386/" source="CVE"/>
		<reference ref_id="CVE-2020-25275" ref_url="https://www.suse.com/security/cve/CVE-2020-25275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008152.html" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

Security issues fixed:

- CVE-2020-12100: Fixed a resource exhaustion caused by deeply nested MIME parts (bsc#1174920).
- CVE-2020-12673: Fixed an improper implementation of NTLM that did not check the message buffer size (bsc#1174922).
- CVE-2020-12674: Fixed an improper implementation of the RPA mechanism (bsc#1174923).
- CVE-2020-24386: Fixed an issue with IMAP hibernation that allowed users to access other users' emails (bsc#1180405).
- CVE-2020-25275: Fixed a crash when the 10000th MIME part was message/rfc822 (bsc#1180406).

Non-security issues fixed:

- Pigeonhole was updated to version 0.5.11.
- Dovecot was updated to version 2.3.11.3.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-05"/>
	<updated date="2021-01-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174920">SUSE bug 1174920</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174922">SUSE bug 1174922</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174923">SUSE bug 1174923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180405">SUSE bug 1180405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180406">SUSE bug 1180406</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12100/">CVE-2020-12100</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12673/">CVE-2020-12673</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12674/">CVE-2020-12674</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24386/">CVE-2020-24386</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25275/">CVE-2020-25275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009499995" comment="dovecot23-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499996" comment="dovecot23-backend-mysql-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499997" comment="dovecot23-backend-pgsql-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499998" comment="dovecot23-backend-sqlite-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009499999" comment="dovecot23-devel-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500000" comment="dovecot23-fts-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500001" comment="dovecot23-fts-lucene-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500002" comment="dovecot23-fts-solr-2.3.11.3-17.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500003" comment="dovecot23-fts-squat-2.3.11.3-17.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111186" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188571" ref_url="https://bugzilla.suse.com/1188571" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36222" ref_url="https://www.suse.com/security/cve/CVE-2021-36222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009316.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-36222: Fixed KDC null deref on bad encrypted challenge. (bsc#1188571)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-20"/>
	<updated date="2021-08-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188571">SUSE bug 1188571</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36222/">CVE-2021-36222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626716" comment="krb5-plugin-kdb-ldap-1.16.3-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626717" comment="krb5-server-1.16.3-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111187" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180014" ref_url="https://bugzilla.suse.com/1180014" source="BUGZILLA"/>
		<reference ref_id="1189320" ref_url="https://bugzilla.suse.com/1189320" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2372" ref_url="https://www.suse.com/security/cve/CVE-2021-2372/" source="CVE"/>
		<reference ref_id="CVE-2021-2389" ref_url="https://www.suse.com/security/cve/CVE-2021-2389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009353.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

Update to version 10.2.40 (bsc#1189320):

- fixes for the following security vulnerabilities: CVE-2021-2372 and CVE-2021-2389

In additon the follwing was changed:

- Increase NOFILE limit on service configuration (bsc#1180014)
  The default 'NOFILE' setting on mariadb service configuration is to low 
  and may cause instability on higher loads.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-25"/>
	<updated date="2021-08-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180014">SUSE bug 1180014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189320">SUSE bug 1189320</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2372/">CVE-2021-2372</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-2389/">CVE-2021-2389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630839" comment="libmariadbd-devel-10.4.21-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630840" comment="libmariadbd19-10.4.21-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630841" comment="mariadb-10.4.21-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630842" comment="mariadb-client-10.4.21-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630843" comment="mariadb-errormessages-10.4.21-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630844" comment="mariadb-tools-10.4.21-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111188" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188455" ref_url="https://bugzilla.suse.com/1188455" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3652" ref_url="https://www.suse.com/security/cve/CVE-2021-3652/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009364.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- Update to version 1.4.3.24
- CVE-2021-3652: Fixed crypt handling of locked accounts. (bsc#1188455)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-27"/>
	<updated date="2021-08-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188455">SUSE bug 1188455</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3652/">CVE-2021-3652</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626968" comment="389-ds-1.4.3.24~git13.7b705e743-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626969" comment="389-ds-devel-1.4.3.24~git13.7b705e743-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626970" comment="lib389-1.4.3.24~git13.7b705e743-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626971" comment="libsvrcore0-1.4.3.24~git13.7b705e743-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111189" version="1" class="patch">
	<metadata>
		<title>Security update for dovecot23 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1187418" ref_url="https://bugzilla.suse.com/1187418" source="BUGZILLA"/>
		<reference ref_id="1187419" ref_url="https://bugzilla.suse.com/1187419" source="BUGZILLA"/>
		<reference ref_id="1187420" ref_url="https://bugzilla.suse.com/1187420" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28200" ref_url="https://www.suse.com/security/cve/CVE-2020-28200/" source="CVE"/>
		<reference ref_id="CVE-2021-29157" ref_url="https://www.suse.com/security/cve/CVE-2021-29157/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009374.html" source="SUSE-SU"/>
		<description>
This update for dovecot23 fixes the following issues:

Update dovecot to version 2.3.15 (jsc#SLE-19970):

Security issues fixed:

- CVE-2021-29157: Dovecot does not correctly escape kid and azp fields in
  JWT tokens. This may be used to supply attacker controlled keys to
  validate tokens, if attacker has local access. (bsc#1187418)
  Local attacker can login as any user and access their emails
- CVE-2021-33515:  On-path attacker could have injected plaintext commands
  before STARTTLS negotiation that would be executed after STARTTLS
  finished with the client. (bsc#1187419)
  Attacker can potentially steal user credentials and mails

* Disconnection log messages are now more standardized across services.
  They also always now start with 'Disconnected' prefix.
* Dovecot now depends on libsystemd for systemd integration.
* Removed support for Lua 5.2. Use version 5.1 or 5.3 instead.
* config: Some settings are now marked as 'hidden'. It's discouraged to
  change these settings. They will no longer be visible in doveconf
  output, except if they have been changed or if doveconf -s parameter
  is used. See https://doc.dovecot.org/settings/advanced/ for details.
* imap-compress: Compression level is now algorithm specific.
  See https://doc.dovecot.org/settings/plugin/compress-plugin/
* indexer-worker: Convert 'Indexed' info logs to an event named
  'indexer_worker_indexing_finished'. See
  https://doc.dovecot.org/admin_manual/list_of_events/#indexer-worker-indexing-finished
+ Add TSLv1.3 support to min_protocols.
+ Allow configuring ssl_cipher_suites. (for TLSv1.3+)
+ acl: Add acl_ignore_namespace setting which allows to entirely ignore
  ACLs for the listed namespaces.
+ imap: Support official RFC8970 preview/snippet syntax. Old methods of
  retrieving preview information via IMAP commands ('SNIPPET and PREVIEW
  with explicit algorithm selection') have been deprecated.
+ imapc: Support INDEXPVT for imapc storage to enable private
  message flags for cluster wide shared mailboxes.
+ lib-storage: Add new events: mail_opened, mail_expunge_requested,
  mail_expunged, mail_cache_lookup_finished. See
  https://doc.dovecot.org/admin_manual/list_of_events/#mail
+ zlib, imap-compression, fs-compress: Support compression levels that
  the algorithm supports. Before, we would allow hardcoded value between
  1 to 9 and would default to 6. Now we allow using per-algorithm value
  range and default to whatever default the algorithm specifies.
- *-login: Commands pipelined together with and just after the authenticate
  command cause these commands to be executed twice. This applies to all
  protocols that involve user login, which currently comprises of imap,
  pop3, submisision and managesieve.
- *-login: Processes are supposed to disconnect the oldest non-logged in
  connection when process_limit was reached. This didn't actually happen
  with the default 'high-security mode' (with service_count=1) where each
  connection is handled by a separate process.
- *-login: When login process reaches client/process limits, oldest
  client connections are disconnected. If one of these was still doing
  anvil lookup, this caused a crash. This could happen only if the login
  process limits were very low or if the server was overloaded.
- Fixed building with link time optimizations (-flto).
- auth: Userdb iteration with passwd driver does not always return all
  users with some nss drivers.
- dsync: Shared INBOX not synced when 'mail_shared_explicit_inbox' was
  disabled. If a user has a shared mailbox which is another user's INBOX,
  dsync didn't include the mailbox in syncing unless explicit naming is
  enabled with 'mail_shared_explicit_inbox' set to 'yes'.
- dsync: Shared namespaces were not synced with '-n' flag.
- dsync: Syncing shared INBOX failed if mail_attribute_dict was not set.
  If a user has a shared mailbox that is another user's INBOX, dsync
  failed to export the mailbox if mail attributes are disabled.
- fts-solr, fts-tika: Using both Solr FTS and Tika may have caused HTTP
  requests to assert-crash: Panic: file http-client-request.c: line 1232
  (http_client_request_send_more): assertion failed: (req-&gt;payload_input != NULL)
- fts-tika: 5xx errors returned by Tika server as indexing failures.
  However, Tika can return 5xx for some attachments every time.
  So the 5xx error should be retried once, but treated as success if it
  happens on the retry as well. v2.3 regression.
- fts-tika: v2.3.11 regression: Indexing messages with fts-tika may have
  resulted in Panic: file message-parser.c: line 802 (message_parser_deinit_from_parts):
  assertion failed: (ctx-&gt;nested_parts_count == 0 || i_stream_have_bytes_left(ctx-&gt;input))
- imap: SETMETADATA could not be used to unset metadata values.
  Instead NIL was handled as a 'NIL' string. v2.3.14 regression.
- imap: IMAP BINARY FETCH crashes at least on empty base64 body:
  Panic: file index-mail-binary.c: line 358 (blocks_count_lines):
  assertion failed: (block_count == 0 || block_idx+1 == block_count)
- imap: If IMAP client using the NOTIFY command was disconnected while
  sending FETCH notifications to the client, imap could crash with
  Panic: Trying to close mailbox INBOX with open transactions.
- imap: Using IMAP COMPRESS extension can cause IMAP connection to hang
  when IMAP commands are &gt;8 kB long.
- imapc: If remote server sent BYE but didn't immediately disconnect, it
  could cause infinite busy-loop.
- lib-index: Corrupted cache record size in dovecot.index.cache file
  could have caused a crash (segfault) when accessing it.
- lib-oauth2: JWT token time validation now works correctly with
  32-bit systems.
- lib-ssl-iostream: Checking hostnames against an SSL certificate was
  case-sensitive.
- lib-storage: Corrupted mime.parts in dovecot.index.cache may have
  resulted in Panic: file imap-bodystructure.c: line 206 (part_write_body):
  assertion failed: (text == ((part-&gt;flags &amp; MESSAGE_PART_FLAG_TEXT) != 0))
- lib-storage: Index rebuilding (e.g. via doveadm force-resync) didn't
  preserve the 'hdr-pop3-uidl' header. Because of this, the next pop3
  session could have accessed all of the emails' metadata to read their
  POP3 UIDL (opening dbox files).
- listescape: When using the listescape plugin and a shared namespace
  the plugin didn't work properly anymore resulting in errors like:
  'Invalid mailbox name: Name must not have '/' character.'
- lmtp: Connection crashes if connection gets disconnected due to
  multiple bad commands and the last bad command is BDAT.
- lmtp: The Dovecot-specific LMTP parameter XRCPTFORWARD was blindly
  forwarded by LMTP proxy without checking that the backend has support.
  This caused a command parameter error from the backend if it was
  running an older Dovecot release. This could only occur in more complex
  setups where the message was proxied twice; when the proxy generated
  the XRCPTFORWARD parameter itself the problem did not occur, so this
  only happened when it was forwarded.
- lmtp: The LMTP proxy crashes with a panic when the remote server
  replies with an error while the mail is still being forwarded through
  a DATA/BDAT command.
- lmtp: Username may have been missing from lmtp log line prefixes when
  it was performing autoexpunging.
- master: Dovecot would incorrectly fail with haproxy 2.0.14 service
  checks.
- master: Systemd service: Dovecot announces readiness for accepting
  connections earlier than it should. The following environment variables
  are now imported automatically and can be omitted from
  import_environment setting: NOTIFY_SOCKET LISTEN_FDS LISTEN_PID.
- master: service { process_min_avail } was launching processes too
  slowly when master was forking a lot of processes.
- util: Make the health-check.sh example script POSIX shell compatible.
* Added new aliases for some variables. Usage of the old ones is possible,
  but discouraged. (These were partially added already to v2.3.13.)
  See https://doc.dovecot.org/configuration_manual/config_file/config_variables/
  for more information.
* Optimize imap/pop3/submission/managesieve proxies to use less CPU at
  the cost of extra memory usage.
* Remove autocreate, expire, snarf and mail-filter plugins.
* Remove cydir storage driver.
* Remove XZ/LZMA write support. Read support will be removed in future release.
* doveadm -D: Add timestamps to debug output even when LOG_STDERR_TIMESTAMP
  environment variable is not set. Timestamp format is taken from
  log_timestamp setting.
* If BROKENCHAR or listescape plugin is used, the escaped folder names
  may be slightly different from before in some situations. This is
  unlikely to cause issues, although caching clients may redownload the
  folders.
* imapc: It now enables BROKENCHAR=~ by default to escape remote folder
  names if necessary. This also means that if there are any '~'
  characters in the remote folder names, they will be visible as '~7e'.
* imapc: When using local index files folder names were escaped on
  filesystem a bit differently. This affects only if there are folder
  names that actually require escaping, which isn't so common. The old
  style folders will be automatically deleted from filesystem.
* stats: Update exported metrics to be compliant with OpenMetrics standard.
+ doveadm: Add an optional '-p' parameter to metadata list command. If
  enabled, '/private', and '/shared' metadata prefixes will be prepended
  to the keys in the list output.
+ doveconf: Support environment variables in config files. See
  https://doc.dovecot.org/configuration_manual/config_file/config_file_syntax/#environment-variables
  for more details.
+ indexer-worker: Change indexer to disconnect from indexer-worker
  after each request. This allows service indexer-worker's service_count &amp;
  idle_kill settings to work. These can be used to restart indexer-worker
  processes once in a while to reduce their memory usage.
- auth: 'nodelay' with various authentication mechanisms such as apop
  and digest-md5 crashed AUTH process if authentication failed.
- auth: Auth lua script generating an error triggered an assertion
  failure: Panic: file db-lua.c: line 630 (auth_lua_call_password_verify):
  assertion failed: (lua_gettop(script-&gt;L) == 0).
- configure: Fix libunwind detection to work on other than x86_64 systems.
- doveadm-server: Process could crash if logging was done outside command
  handling. For example http-client could have done debug logging
  afterwards, resulting in either segfault or Panic:
  file http-client.c: line 642 (http_client_context_close):
  assertion failed: (cctx-&gt;clients_list == NULL).
- dsync: Folder name escaping with BROKENCHAR didn't work completely
  correctly. This especially caused problems with dsync-migrations using
  imapc where some of the remote folder names may not have been accessible.
- dsync: doveadm sync + imapc doesn't always sync all mails when doing
  an incremental sync (-1), which could lead to mail loss when it's used
  for migration. This happens only when GUIDs aren't used (i.e.
  imapc without imapc_features=guid-forced).
- fts-tika: When tika server returns error, some mails cause Panic:
  file message-parser.c: line 802 (message_parser_deinit_from_parts):
  assertion failed: (ctx-&gt;nested_parts_count == 0 || i_stream_have_bytes_left(ctx-&gt;input))
- lib-imap: imapc parsing illegal BODYSTRUCTUREs with NILs could have
  resulted in crashes. This exposed that Dovecot was wrongly accepting
  atoms in 'nstring' handling. Changed the IMAP parsing to be more
  strict about this now.
- lib-index: If dovecot.index.cache has corrupted message size, fetching
  BODY/BODYSTRUCTURE may cause assert-crash:
  Panic: file index-mail.c: line 1140 (index_mail_parse_body_finish):
  assertion failed: (mail-&gt;data.parts != NULL).
- lib-index: Minor error handling and race condition fixes related to
  rotating dovecot.index.log. These didn't usually cause problems,
  unless the log files were rotated rapidly.
- lib-lua: Lua scripts using coroutines or lua libraries using coroutines
  (e.g., cqueues) panicked.
- Message PREVIEW handled whitespace wrong so first space would get
  eaten from between words.
- FTS and message PREVIEW (snippet) parsed HTML &amp;entities case-sensitively.
- lib-mail: When max nested MIME parts were reached, IMAP BODYSTRUCTURE
  was written in a way that may have caused confusion for IMAP clients
  and also Dovecot itself when parsing it. The truncated part is now
  written out using application/octet-stream MIME type.
- lib-oauth2: HS512 and HS384 JWT token algorithms crash when you try to
  use them: Panic: file hmac.c: line 26 (hmac_init): assertion failed:
  (meth-&gt;context_size &lt;= MAC_MAX_CONTEXT_SIZE).
- event filters: NOT keyword did not have the correct associativity.
- Ignore ECONNRESET when closing socket. This avoids logging useless
  errors on systems like FreeBSD.
- event filters: event filter syntax error may lead to Panic:
  file event-filter.c: line 137 (event_filter_parse): assertion failed:
  (state.output == NULL)
- lib: timeval_cmp_margin() was broken on 32-bit systems. This could
  potentially have caused HTTP timeouts to be handled incorrectly.
- log: instance_name wasn't used as syslog ident by the log process.
- master: After a service reached process_limit and client_limit, it
  could have taken up to 1 second to realize that more client connections
  became available. During this time client connections could have been
  unnecessarily rejected and a warning logged:
  Warning: service(...): process_limit (...) reached, client connections are being dropped
- stats: Crash would occur when generating openmetrics data for metrics
  using aggregating functions.
- stats: Event filters comparing against empty strings crash the stats
  process.
* CVE-2020-24386: Specially crafted command can cause IMAP hibernate to
  allow logged in user to access other people's emails and filesystem
  information.
* Metric filter and global event filter variable syntax changed to a
  SQL-like format. See https://doc.dovecot.org/configuration_manual/event_filter/
* auth: Added new aliases for %{variables}. Usage of the old ones is
  possible, but discouraged.
* auth: Removed RPA auth mechanism, SKEY auth mechanism, NTLM auth
  mechanism and related password schemes.
* auth: Removed passdb-sia, passdb-vpopmail and userdb-vpopmail.
* auth: Removed postfix postmap socket
+ auth: Added new fields for auth server events. These fields are now
  also available for all auth events. See
  https://doc.dovecot.org/admin_manual/list_of_events/#authentication-server
  for details.
+ imap-hibernate: Added imap_client_hibernated, imap_client_unhibernated
  and imap_client_unhibernate_retried events. See
  https://doc.dovecot.org/admin_manual/list_of_events/ for details.
+ lib-index: Added new mail_index_recreated event. See
  https://doc.dovecot.org/admin_manual/list_of_events/#mail-index-recreated
+ lib-sql: Support TLS options for cassandra driver. This requires
  cpp-driver v2.15 (or later) to work reliably.
+ lib-storage: Missing $HasAttachment / $HasNoAttachment flags are now
  added to existing mails if mail_attachment_detection_option=add-flags
  and it can be done inexpensively.
+ login proxy: Added login_proxy_max_reconnects setting (default 3) to
  control how many reconnections are attempted.
+ login proxy: imap/pop3/submission/managesieve proxying now supports
  reconnection retrying on more than just connect() failure. Any error
  except a non-temporary authentication failure will result in reconnect
  attempts.
- auth: Lua passdb/userdb leaks stack elements per call, eventually
  causing the stack to become too deep and crashing the auth or
  auth-worker process.
- auth: SASL authentication PLAIN mechanism could be used to trigger
  read buffer overflow. However, this doesn't seem to be exploitable in
  any way.
- auth: v2.3.11 regression: GSSAPI authentication fails because dovecot
  disallows NUL bytes for it.
- dict: Process used too much CPU when iterating keys, because each key
  used a separate write() syscall.
- doveadm-server: Crash could occur if logging was done outside command
  handling. For example http-client could have done debug logging
  afterwards, resulting in either segfault or
  Panic: file http-client.c: line 642 (http_client_context_close):
  assertion failed: (cctx-&gt;clients_list == NULL).
- doveadm-server: v2.3.11 regression: Trying to connect to doveadm server
  process via starttls assert-crashed if there were no ssl=yes listeners:
  Panic: file master-service-ssl.c: line 22 (master_service_ssl_init):
  assertion failed: (service-&gt;ssl_ctx_initialized).
- fts-solr: HTTP requests may have assert-crashed:
  Panic: file http-client-request.c: line 1232 (http_client_request_send_more):
  assertion failed: (req-&gt;payload_input != NULL)
- imap: IMAP NOTIFY could crash with a segmentation fault due to a bad
  configuration that causes errors. Sending the error responses to the
  client can cause the segmentation fault. This can for example happen
  when several namespaces use the same mail storage location.
- imap: IMAP NOTIFY used on a shared namespace that doesn't actually
  exist (e.g. public namespace for a nonexistent user) can crash with a panic:
  Panic: Leaked view for index /tmp/home/asdf/mdbox/dovecot.list.index: Opened in (null):0
- imap: IMAP session can crash with QRESYNC extension if many changes
  are done before asking for expunged mails since last sync.
- imap: Process might hang indefinitely if client disconnects after
  sending some long-running commands pipelined, for example FETCH+LOGOUT.
- lib-compress: Mitigate crashes when configuring a not compiled in
  compression. Errors with compression configuration now distinguish
  between not supported and unknown.
- lib-compression: Using xz/lzma compression in v2.3.11 could have
  written truncated output in some situations. This would result in
  'Broken pipe' read errors when trying to read it back.
- lib-compression: zstd compression could have crashed in some situations:
  Panic: file ostream.c: line 287 (o_stream_sendv_int): assertion failed: (!stream-&gt;blocking)
- lib-dict: dict client could have crashed in some rare situations when
  iterating keys.
- lib-http: Fix several assert-crashes in HTTP client.
- lib-index: v2.3.11 regression: When mails were expunged at the same
  time as lots of new content was being saved to the cache (e.g. cache
  file was lost and is being re-filled) a deadlock could occur with
  dovecot.index.cache / dovecot.index.log.
- lib-index: v2.3.11 regression: dovecot.index.cache file was being
  purged (rewritten) too often when it had a field that hadn't been
  accessed for over 1 month, but less than 2 months. Every cache file
  change caused a purging in this situation.
- lib-mail: MIME parts were not returned correctly by Dovecot MIME parser.
  Regression caused by fixing CVE-2020-12100.
- lib-mail: When max nested MIME parts were reached, IMAP BODYSTRUCTURE
  was written in a way that may have caused confusion for both IMAP
  clients and Dovecot itself when parsing it. The truncated part is now
  written out using application/octet-stream MIME type.
- lib-mail: v2.3.11 regression: Mail delivery / parsing crashed when the
  10000th MIME part was message/rfc822 (or if parent was multipart/digest):
  Panic: file message-parser.c: line 167 (message_part_append):
  assertion failed: (ctx-&gt;total_parts_count &lt;= ctx-&gt;max_total_mime_parts).
- lib-oauth2: Dovecot incorrectly required oauth2 server introspection
  reply to contain username with invalid token.
- lib-ssl-iostream, lib-dcrypt: Fix building with OpenSSL that has
  deprecated APIs disabled.
- lib-storage: When mail's size is different from the cached one (in
  dovecot.index.cache or Maildir S=size in the filename), this is
  handled by logging 'Cached message size smaller/larger than expected'
  error. However, in some situations this also ended up crashing with:
  Panic: file istream.c: line 315 (i_stream_read_memarea):
  assertion failed: (old_size &lt;= _stream-&gt;pos - _stream-&gt;skip).
- lib-storage: v2.3 regression: Copying/moving mails was taking much more
  memory than before. This was mainly visible when copying/moving
  thousands of mails in a single transaction.
- lib-storage: v2.3.11 regression: Searching messages assert-crashed
  (without FTS): Panic: file message-parser.c: line 174 (message_part_finish):
  assertion failed: (ctx-&gt;nested_parts_count &gt; 0).
- lib: Dovecot v2.3 moved signal handlers around in ioloops,
  causing more CPU usage than in v2.2.
- lib: Fixed JSON parsing: '\' escape sequence may have wrongly resulted
  in error if it happened to be at read boundary. Any NUL characters and
  '\u0000' will now result in parsing error instead of silently
  truncating the data.
- lmtp, submission: Server may hang if SSL client connection disconnects
  during the delivery. If this happened repeated, it could have ended
  up reaching process_limit and preventing any further lmtp/submission
  deliveries.
- lmtp: Proxy does not always properly log TLS connection problems as
  errors; in some cases, only a debug message is logged if enabled.
- lmtp: The LMTP service can hang when commands are pipelined. This can
  particularly occur when one command in the middle of the pipeline fails.
  One example of this occurs for proxied LMTP transactions in which the
  final DATA or BDAT command is pipelined after a failing RCPT command.
- login-proxy: The login_source_ips setting has no effect, and therefore
  the proxy source IPs are not cycled through as they should be.
- master: Process was using 100% CPU in some situations when a broken
  service was being throttled.
- pop3-login: POP3 login would fail with 'Input buffer full' if the
  initial response for SASL was too long.
- stats: Crash would occur when generating openmetrics data for metrics
  using aggregating functions.

Update pigeonhole to version 0.5.15

* CVE-2020-28200: Sieve interpreter is not protected against abusive
  scripts that claim excessive resource usage. Fixed by limiting the
  user CPU time per single script execution and cumulatively over
  several script runs within a configurable timeout period. Sufficiently
  large CPU time usage is summed in the Sieve script binary and execution
  is blocked when the sum exceeds the limit within that time. The block
  is lifted when the script is updated after the resource usage times out.
  (bsc#1187420) Attacker can DoS the mail delivery system
  (jsc#PM-2746) ECO: Dovecot 2.3.15 version upgrade
* Disconnection log messages are now more standardized across services.
  They also always now start with 'Disconnected' prefix.
* managesieve: Commands pipelined together with and just after the
  authenticate command cause these commands to be executed twice.
* duplicate: The test was handled badly in a multiscript (sieve_before,
  sieve_after) scenario in which an earlier script in the sequence with
  a duplicate test succeeded, while a later script caused a runtime
  failure. In that case, the message is recorded for duplicate tracking,
  while the message may not actually have been delivered in the end.
* editheader: Sieve interpreter entered infinite loop at startup when
  the 'editheader' configuration listed an invalid header name. This
  problem can only be triggered by the administrator.
* relational: The Sieve relational extension can cause a segfault at
  compile time. This is triggered by invalid script syntax. The segfault
  happens when this match type is the last argument of the test command.
  This situation is not possible in a valid script; positional arguments
  are normally present after that, which would prevent the segfault.
* sieve: For some Sieve commands the provided mailbox name is not
  properly checked for UTF-8 validity, which can cause assert crashes at
  runtime when an invalid mailbox name is encountered. This can be
  caused by the user by writing a bad Sieve script involving the
  affected commands ('mailboxexists', 'specialuse_exists').
  This can be triggered by the remote sender only when the user has
  written a Sieve script that passes message content to one of the
  affected commands.
* sieve: Large sequences of 8-bit octets passed to certain Sieve
  commands that create or modify message headers that allow UTF-8 text
  (vacation, notify and addheader) can cause the delivery or IMAP
  process (when IMAPSieve is used) to enter a memory-consuming
  semi-infinite loop that ends when the process exceeds its memory
  limits. Logged in users can cause these hangs only for their own
  processes.

		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-31"/>
	<updated date="2021-08-31"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1187418">SUSE bug 1187418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187419">SUSE bug 1187419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187420">SUSE bug 1187420</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28200/">CVE-2020-28200</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29157/">CVE-2021-29157</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632141" comment="dovecot23-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632142" comment="dovecot23-backend-mysql-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632143" comment="dovecot23-backend-pgsql-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632144" comment="dovecot23-backend-sqlite-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632145" comment="dovecot23-devel-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632146" comment="dovecot23-fts-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632147" comment="dovecot23-fts-lucene-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632148" comment="dovecot23-fts-solr-2.3.15-58.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632149" comment="dovecot23-fts-squat-2.3.15-58.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111190" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1137251" ref_url="https://bugzilla.suse.com/1137251" source="BUGZILLA"/>
		<reference ref_id="1176189" ref_url="https://bugzilla.suse.com/1176189" source="BUGZILLA"/>
		<reference ref_id="1179148" ref_url="https://bugzilla.suse.com/1179148" source="BUGZILLA"/>
		<reference ref_id="1179246" ref_url="https://bugzilla.suse.com/1179246" source="BUGZILLA"/>
		<reference ref_id="1180491" ref_url="https://bugzilla.suse.com/1180491" source="BUGZILLA"/>
		<reference ref_id="1181989" ref_url="https://bugzilla.suse.com/1181989" source="BUGZILLA"/>
		<reference ref_id="1183877" ref_url="https://bugzilla.suse.com/1183877" source="BUGZILLA"/>
		<reference ref_id="1185682" ref_url="https://bugzilla.suse.com/1185682" source="BUGZILLA"/>
		<reference ref_id="1186428" ref_url="https://bugzilla.suse.com/1186428" source="BUGZILLA"/>
		<reference ref_id="1186429" ref_url="https://bugzilla.suse.com/1186429" source="BUGZILLA"/>
		<reference ref_id="1186433" ref_url="https://bugzilla.suse.com/1186433" source="BUGZILLA"/>
		<reference ref_id="1186434" ref_url="https://bugzilla.suse.com/1186434" source="BUGZILLA"/>
		<reference ref_id="1188050" ref_url="https://bugzilla.suse.com/1188050" source="BUGZILLA"/>
		<reference ref_id="1189373" ref_url="https://bugzilla.suse.com/1189373" source="BUGZILLA"/>
		<reference ref_id="1189376" ref_url="https://bugzilla.suse.com/1189376" source="BUGZILLA"/>
		<reference ref_id="1189378" ref_url="https://bugzilla.suse.com/1189378" source="BUGZILLA"/>
		<reference ref_id="1189380" ref_url="https://bugzilla.suse.com/1189380" source="BUGZILLA"/>
		<reference ref_id="1189381" ref_url="https://bugzilla.suse.com/1189381" source="BUGZILLA"/>
		<reference ref_id="1189882" ref_url="https://bugzilla.suse.com/1189882" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0089" ref_url="https://www.suse.com/security/cve/CVE-2021-0089/" source="CVE"/>
		<reference ref_id="CVE-2021-28690" ref_url="https://www.suse.com/security/cve/CVE-2021-28690/" source="CVE"/>
		<reference ref_id="CVE-2021-28692" ref_url="https://www.suse.com/security/cve/CVE-2021-28692/" source="CVE"/>
		<reference ref_id="CVE-2021-28693" ref_url="https://www.suse.com/security/cve/CVE-2021-28693/" source="CVE"/>
		<reference ref_id="CVE-2021-28694" ref_url="https://www.suse.com/security/cve/CVE-2021-28694/" source="CVE"/>
		<reference ref_id="CVE-2021-28695" ref_url="https://www.suse.com/security/cve/CVE-2021-28695/" source="CVE"/>
		<reference ref_id="CVE-2021-28696" ref_url="https://www.suse.com/security/cve/CVE-2021-28696/" source="CVE"/>
		<reference ref_id="CVE-2021-28697" ref_url="https://www.suse.com/security/cve/CVE-2021-28697/" source="CVE"/>
		<reference ref_id="CVE-2021-28698" ref_url="https://www.suse.com/security/cve/CVE-2021-28698/" source="CVE"/>
		<reference ref_id="CVE-2021-28699" ref_url="https://www.suse.com/security/cve/CVE-2021-28699/" source="CVE"/>
		<reference ref_id="CVE-2021-28700" ref_url="https://www.suse.com/security/cve/CVE-2021-28700/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009389.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

Update to Xen 4.13.3 general bug fix release (bsc#1027519).

Security issues fixed:

- CVE-2021-28693: xen/arm: Boot modules are not scrubbed (bsc#1186428)
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-28700: No memory limit for dom0less domUs (XSA-383)(bsc#1189381).

Other issues fixed:

- Fixed 'Panic on CPU 0: IO-APIC + timer doesn't work!' (bsc#1180491)
- Fixed an issue with xencommons, where file format expecations by fillup did not allign (bsc#1185682)
- Fixed shell macro expansion in the spec file, so that ExecStart=
  in xendomains-wait-disks.service is created correctly (bsc#1183877)
- Upstream bug fixes (bsc#1027519)
- Fixed Xen SLES11SP4 guest hangs on cluster (bsc#1188050).
- xl monitoring process exits during xl save -p|-c keep the monitoring process running to cleanup the domU during shutdown (bsc#1176189).
- Dom0 hangs when pinning CPUs for dom0 with HVM guest (bsc#1179246).
- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1137251">SUSE bug 1137251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176189">SUSE bug 1176189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179148">SUSE bug 1179148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179246">SUSE bug 1179246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180491">SUSE bug 1180491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181989">SUSE bug 1181989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183877">SUSE bug 1183877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185682">SUSE bug 1185682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186428">SUSE bug 1186428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186429">SUSE bug 1186429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186433">SUSE bug 1186433</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186434">SUSE bug 1186434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188050">SUSE bug 1188050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189373">SUSE bug 1189373</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189376">SUSE bug 1189376</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189378">SUSE bug 1189378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189380">SUSE bug 1189380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189381">SUSE bug 1189381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189882">SUSE bug 1189882</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0089/">CVE-2021-0089</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28690/">CVE-2021-28690</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-28692/">CVE-2021-28692</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28693/">CVE-2021-28693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28694/">CVE-2021-28694</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28695/">CVE-2021-28695</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28696/">CVE-2021-28696</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28697/">CVE-2021-28697</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28698/">CVE-2021-28698</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28699/">CVE-2021-28699</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28700/">CVE-2021-28700</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632247" comment="xen-4.13.3_02-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632248" comment="xen-devel-4.13.3_02-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632249" comment="xen-tools-4.13.3_02-3.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632250" comment="xen-tools-xendomains-wait-disk-4.13.3_02-3.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111191" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189387" ref_url="https://bugzilla.suse.com/1189387" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33193" ref_url="https://www.suse.com/security/cve/CVE-2021-33193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009405.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-33193: Fixed request splitting via HTTP/2 method injection and mod_proxy (bsc#1189387).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189387">SUSE bug 1189387</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-33193/">CVE-2021-33193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631152" comment="apache2-devel-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631153" comment="apache2-doc-2.4.43-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631154" comment="apache2-worker-2.4.43-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111192" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_openidc (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188638" ref_url="https://bugzilla.suse.com/1188638" source="BUGZILLA"/>
		<reference ref_id="1188639" ref_url="https://bugzilla.suse.com/1188639" source="BUGZILLA"/>
		<reference ref_id="1188848" ref_url="https://bugzilla.suse.com/1188848" source="BUGZILLA"/>
		<reference ref_id="1188849" ref_url="https://bugzilla.suse.com/1188849" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32785" ref_url="https://www.suse.com/security/cve/CVE-2021-32785/" source="CVE"/>
		<reference ref_id="CVE-2021-32786" ref_url="https://www.suse.com/security/cve/CVE-2021-32786/" source="CVE"/>
		<reference ref_id="CVE-2021-32791" ref_url="https://www.suse.com/security/cve/CVE-2021-32791/" source="CVE"/>
		<reference ref_id="CVE-2021-32792" ref_url="https://www.suse.com/security/cve/CVE-2021-32792/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009431.html" source="SUSE-SU"/>
		<description>
This update for apache2-mod_auth_openidc fixes the following issues:

- CVE-2021-32785: format string bug via hiredis (bsc#1188638)
- CVE-2021-32786: open redirect in logout functionality (bsc#1188639)
- CVE-2021-32791: Hardcoded static IV and AAD with a reused key in AES GCM encryption (bsc#1188849)
- CVE-2021-32792: XSS when using OIDCPreservePost On (bsc#1188848)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188638">SUSE bug 1188638</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188639">SUSE bug 1188639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188848">SUSE bug 1188848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188849">SUSE bug 1188849</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-32785/">CVE-2021-32785</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32786/">CVE-2021-32786</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32791/">CVE-2021-32791</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32792/">CVE-2021-32792</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626967" comment="apache2-mod_auth_openidc-2.3.8-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111193" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1189632" ref_url="https://bugzilla.suse.com/1189632" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28701" ref_url="https://www.suse.com/security/cve/CVE-2021-28701/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009463.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).

- Upstream bug fixes (bsc#1027519)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-18"/>
	<updated date="2021-09-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189632">SUSE bug 1189632</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28701/">CVE-2021-28701</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633432" comment="xen-4.13.3_04-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633433" comment="xen-devel-4.13.3_04-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633434" comment="xen-tools-4.13.3_04-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633435" comment="xen-tools-xendomains-wait-disk-4.13.3_04-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111194" version="1" class="patch">
	<metadata>
		<title>Security update for rabbitmq-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185075" ref_url="https://bugzilla.suse.com/1185075" source="BUGZILLA"/>
		<reference ref_id="1186203" ref_url="https://bugzilla.suse.com/1186203" source="BUGZILLA"/>
		<reference ref_id="1187818" ref_url="https://bugzilla.suse.com/1187818" source="BUGZILLA"/>
		<reference ref_id="1187819" ref_url="https://bugzilla.suse.com/1187819" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22116" ref_url="https://www.suse.com/security/cve/CVE-2021-22116/" source="CVE"/>
		<reference ref_id="CVE-2021-32718" ref_url="https://www.suse.com/security/cve/CVE-2021-32718/" source="CVE"/>
		<reference ref_id="CVE-2021-32719" ref_url="https://www.suse.com/security/cve/CVE-2021-32719/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009519.html" source="SUSE-SU"/>
		<description>
This update for rabbitmq-server fixes the following issues:

- CVE-2021-32718: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in management UI (bsc#1187818).
- CVE-2021-32719: Fixed improper neutralization of script-related HTML tags in a web page (basic XSS) in federation management plugin (bsc#1187819).
- CVE-2021-22116: Fixed improper input validation may lead to DoS (bsc#1186203).

- Use /run instead of /var/run in tmpfiles.d configuration (bsc#1185075).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185075">SUSE bug 1185075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186203">SUSE bug 1186203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187818">SUSE bug 1187818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187819">SUSE bug 1187819</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22116/">CVE-2021-22116</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32718/">CVE-2021-32718</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-32719/">CVE-2021-32719</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632234" comment="erlang-rabbitmq-client-3.8.3-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632235" comment="rabbitmq-server-3.8.3-3.3.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632236" comment="rabbitmq-server-plugins-3.8.3-3.3.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111195" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009522.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632667" comment="libecpg6-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632668" comment="postgresql13-contrib-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632669" comment="postgresql13-devel-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632670" comment="postgresql13-docs-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632671" comment="postgresql13-plperl-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632672" comment="postgresql13-plpython-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632673" comment="postgresql13-pltcl-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632674" comment="postgresql13-server-13.4-5.16.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632675" comment="postgresql13-server-devel-13.4-5.16.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111196" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179945" ref_url="https://bugzilla.suse.com/1179945" source="BUGZILLA"/>
		<reference ref_id="1185952" ref_url="https://bugzilla.suse.com/1185952" source="BUGZILLA"/>
		<reference ref_id="1187751" ref_url="https://bugzilla.suse.com/1187751" source="BUGZILLA"/>
		<reference ref_id="1189748" ref_url="https://bugzilla.suse.com/1189748" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3677" ref_url="https://www.suse.com/security/cve/CVE-2021-3677/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009520.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

- CVE-2021-3677: Fixed memory disclosure in certain queries (bsc#1189748).

- Fixed build with llvm12 on s390x (bsc#1185952).
- Re-enabled icu for PostgreSQL 10 (bsc#1179945).
- Made the dependency of postgresqlXX-server-devel on llvm and clang optional (bsc#1187751).
- llvm12 breaks PostgreSQL 11 and 12 on s390x. Use llvm11 as a workaround (bsc#1185952).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-29"/>
	<updated date="2021-09-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179945">SUSE bug 1179945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185952">SUSE bug 1185952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187751">SUSE bug 1187751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189748">SUSE bug 1189748</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3677/">CVE-2021-3677</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632658" comment="postgresql12-contrib-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632659" comment="postgresql12-devel-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632660" comment="postgresql12-docs-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632661" comment="postgresql12-plperl-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632662" comment="postgresql12-plpython-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632663" comment="postgresql12-pltcl-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632664" comment="postgresql12-server-12.8-8.23.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632665" comment="postgresql12-server-devel-12.8-8.23.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111197" version="1" class="patch">
	<metadata>
		<title>Security update for krb5 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189929" ref_url="https://bugzilla.suse.com/1189929" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37750" ref_url="https://www.suse.com/security/cve/CVE-2021-37750/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009605.html" source="SUSE-SU"/>
		<description>
This update for krb5 fixes the following issues:

- CVE-2021-37750: Fixed KDC null pointer dereference via a FAST inner body that lacks a server field (bsc#1189929).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-18"/>
	<updated date="2021-10-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189929">SUSE bug 1189929</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37750/">CVE-2021-37750</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632232" comment="krb5-plugin-kdb-ldap-1.16.3-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632233" comment="krb5-server-1.16.3-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111198" version="1" class="patch">
	<metadata>
		<title>Security update for squid (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189403" ref_url="https://bugzilla.suse.com/1189403" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28116" ref_url="https://www.suse.com/security/cve/CVE-2021-28116/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009623.html" source="SUSE-SU"/>
		<description>
This update for squid fixes the following issues:

Update to version 4.17:

- CVE-2021-28116: Fixed a out-of-bounds read in the WCCP protocol (bsc#1189403).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-20"/>
	<updated date="2021-10-20"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189403">SUSE bug 1189403</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28116/">CVE-2021-28116</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651418" comment="squid-4.17-5.29.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111199" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190666" ref_url="https://bugzilla.suse.com/1190666" source="BUGZILLA"/>
		<reference ref_id="1190669" ref_url="https://bugzilla.suse.com/1190669" source="BUGZILLA"/>
		<reference ref_id="1190702" ref_url="https://bugzilla.suse.com/1190702" source="BUGZILLA"/>
		<reference ref_id="1190703" ref_url="https://bugzilla.suse.com/1190703" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34798" ref_url="https://www.suse.com/security/cve/CVE-2021-34798/" source="CVE"/>
		<reference ref_id="CVE-2021-36160" ref_url="https://www.suse.com/security/cve/CVE-2021-36160/" source="CVE"/>
		<reference ref_id="CVE-2021-39275" ref_url="https://www.suse.com/security/cve/CVE-2021-39275/" source="CVE"/>
		<reference ref_id="CVE-2021-40438" ref_url="https://www.suse.com/security/cve/CVE-2021-40438/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009646.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190666">SUSE bug 1190666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190669">SUSE bug 1190669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190702">SUSE bug 1190702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190703">SUSE bug 1190703</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-34798/">CVE-2021-34798</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36160/">CVE-2021-36160</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-39275/">CVE-2021-39275</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-40438/">CVE-2021-40438</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652765" comment="apache2-devel-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652766" comment="apache2-doc-2.4.43-3.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652767" comment="apache2-worker-2.4.43-3.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111200" version="1" class="patch">
	<metadata>
		<title>Security update for util-linux (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1122417" ref_url="https://bugzilla.suse.com/1122417" source="BUGZILLA"/>
		<reference ref_id="1125886" ref_url="https://bugzilla.suse.com/1125886" source="BUGZILLA"/>
		<reference ref_id="1178236" ref_url="https://bugzilla.suse.com/1178236" source="BUGZILLA"/>
		<reference ref_id="1188921" ref_url="https://bugzilla.suse.com/1188921" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37600" ref_url="https://www.suse.com/security/cve/CVE-2021-37600/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009648.html" source="SUSE-SU"/>
		<description>
This update for util-linux fixes the following issues:

Update to version 2.33.2 to provide seamless update from SLE12 SP5 to SLE15 SP2:

- CVE-2021-37600: Fixed an integer overflow which could lead to a buffer overflow in get_sem_elements() in sys-utils/ipcutils.c (bsc#1188921).
- agetty: Fix 8-bit processing in get_logname() (bsc#1125886).
- mount: Fix 'mount' output for net file systems (bsc#1122417).
- ipcs: Avoid overflows (bsc#1178236)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1122417">SUSE bug 1122417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1125886">SUSE bug 1125886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178236">SUSE bug 1178236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188921">SUSE bug 1188921</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37600/">CVE-2021-37600</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009651419" comment="uuidd-2.33.2-4.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111201" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009673.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Support querying for JSON data in external sql pillar.
- Exclude the full path of a download URL to prevent injection of malicious code.
  (bsc#1190265, CVE-2021-21996)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652141" comment="salt-api-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652142" comment="salt-cloud-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652143" comment="salt-fish-completion-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652144" comment="salt-master-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652145" comment="salt-proxy-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652146" comment="salt-ssh-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652147" comment="salt-standalone-formulas-configuration-3002.2-49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652148" comment="salt-syndic-3002.2-49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111202" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177902" ref_url="https://bugzilla.suse.com/1177902" source="BUGZILLA"/>
		<reference ref_id="1186398" ref_url="https://bugzilla.suse.com/1186398" source="BUGZILLA"/>
		<reference ref_id="1188232" ref_url="https://bugzilla.suse.com/1188232" source="BUGZILLA"/>
		<reference ref_id="1188843" ref_url="https://bugzilla.suse.com/1188843" source="BUGZILLA"/>
		<reference ref_id="1190420" ref_url="https://bugzilla.suse.com/1190420" source="BUGZILLA"/>
		<reference ref_id="1190693" ref_url="https://bugzilla.suse.com/1190693" source="BUGZILLA"/>
		<reference ref_id="1190695" ref_url="https://bugzilla.suse.com/1190695" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3667" ref_url="https://www.suse.com/security/cve/CVE-2021-3667/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009684.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-3667: Fixed a DoS vulnerability in the libvirt virStoragePoolLookupByTargetPath API. (bsc#1188843)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177902">SUSE bug 1177902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186398">SUSE bug 1186398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188232">SUSE bug 1188232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188843">SUSE bug 1188843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190420">SUSE bug 1190420</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190693">SUSE bug 1190693</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190695">SUSE bug 1190695</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3667/">CVE-2021-3667</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652305" comment="libvirt-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652306" comment="libvirt-admin-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652307" comment="libvirt-bash-completion-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652308" comment="libvirt-client-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652309" comment="libvirt-daemon-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652310" comment="libvirt-daemon-config-network-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652311" comment="libvirt-daemon-config-nwfilter-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652312" comment="libvirt-daemon-driver-interface-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652313" comment="libvirt-daemon-driver-libxl-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652314" comment="libvirt-daemon-driver-lxc-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652315" comment="libvirt-daemon-driver-network-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652316" comment="libvirt-daemon-driver-nodedev-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652317" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652318" comment="libvirt-daemon-driver-qemu-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652319" comment="libvirt-daemon-driver-secret-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652320" comment="libvirt-daemon-driver-storage-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652321" comment="libvirt-daemon-driver-storage-core-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652322" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652323" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652324" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652325" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652326" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652327" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652328" comment="libvirt-daemon-hooks-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652329" comment="libvirt-daemon-lxc-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652330" comment="libvirt-daemon-qemu-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652331" comment="libvirt-daemon-xen-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652332" comment="libvirt-devel-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652333" comment="libvirt-doc-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652334" comment="libvirt-lock-sanlock-6.0.0-13.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652335" comment="libvirt-nss-6.0.0-13.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111203" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189234" ref_url="https://bugzilla.suse.com/1189234" source="BUGZILLA"/>
		<reference ref_id="1189702" ref_url="https://bugzilla.suse.com/1189702" source="BUGZILLA"/>
		<reference ref_id="1189938" ref_url="https://bugzilla.suse.com/1189938" source="BUGZILLA"/>
		<reference ref_id="1190425" ref_url="https://bugzilla.suse.com/1190425" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3713" ref_url="https://www.suse.com/security/cve/CVE-2021-3713/" source="CVE"/>
		<reference ref_id="CVE-2021-3748" ref_url="https://www.suse.com/security/cve/CVE-2021-3748/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009694.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

Security issues fixed:

- CVE-2021-3713: Fix out-of-bounds write in UAS (USB Attached SCSI) device emulation (bsc#1189702)
- CVE-2021-3748: Fix heap use-after-free in virtio_net_receive_rcu (bsc#1189938)

Non-security issues fixed:

- Add transfer length item in block limits page of scsi vpd (bsc#1190425)
- Fix qemu crash while deleting xen-block (bsc#1189234)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-03"/>
	<updated date="2021-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189234">SUSE bug 1189234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189702">SUSE bug 1189702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189938">SUSE bug 1189938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190425">SUSE bug 1190425</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3713/">CVE-2021-3713</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3748/">CVE-2021-3748</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652932" comment="qemu-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652933" comment="qemu-arm-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652934" comment="qemu-audio-alsa-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652935" comment="qemu-audio-pa-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652936" comment="qemu-block-curl-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652937" comment="qemu-block-iscsi-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652938" comment="qemu-block-rbd-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652939" comment="qemu-block-ssh-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652940" comment="qemu-guest-agent-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652941" comment="qemu-ipxe-1.0.0+-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652942" comment="qemu-kvm-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652943" comment="qemu-lang-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652944" comment="qemu-microvm-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652945" comment="qemu-ppc-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652946" comment="qemu-s390-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652947" comment="qemu-seabios-1.12.1+-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652948" comment="qemu-sgabios-8-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652949" comment="qemu-ui-curses-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652950" comment="qemu-ui-gtk-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652951" comment="qemu-ui-spice-app-4.2.1-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652952" comment="qemu-vgabios-1.12.1+-11.31.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652953" comment="qemu-x86-4.2.1-11.31.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111204" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009765.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656740" comment="postgresql12-contrib-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656741" comment="postgresql12-devel-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656742" comment="postgresql12-docs-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656743" comment="postgresql12-plperl-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656744" comment="postgresql12-plpython-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656745" comment="postgresql12-pltcl-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656746" comment="postgresql12-server-12.9-8.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656747" comment="postgresql12-server-devel-12.9-8.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111205" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191782" ref_url="https://bugzilla.suse.com/1191782" source="BUGZILLA"/>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009766.html" source="SUSE-SU"/>
		<description>
This update for postgresql14 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).

- Let rpmlint ignore shlib-policy-name-error (boo#1191782).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191782">SUSE bug 1191782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656466" comment="libecpg6-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656467" comment="postgresql14-contrib-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656468" comment="postgresql14-devel-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656469" comment="postgresql14-docs-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656470" comment="postgresql14-plperl-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656471" comment="postgresql14-plpython-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656472" comment="postgresql14-pltcl-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656473" comment="postgresql14-server-14.1-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656474" comment="postgresql14-server-devel-14.1-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111206" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009762.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-22"/>
	<updated date="2021-11-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655905" comment="postgresql13-contrib-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655906" comment="postgresql13-devel-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655907" comment="postgresql13-docs-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655908" comment="postgresql13-plperl-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655909" comment="postgresql13-plpython-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655910" comment="postgresql13-pltcl-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655911" comment="postgresql13-server-13.5-5.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655912" comment="postgresql13-server-devel-13.5-5.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111207" version="1" class="patch">
	<metadata>
		<title>Security update for redis (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1191299" ref_url="https://bugzilla.suse.com/1191299" source="BUGZILLA"/>
		<reference ref_id="1191300" ref_url="https://bugzilla.suse.com/1191300" source="BUGZILLA"/>
		<reference ref_id="1191302" ref_url="https://bugzilla.suse.com/1191302" source="BUGZILLA"/>
		<reference ref_id="1191303" ref_url="https://bugzilla.suse.com/1191303" source="BUGZILLA"/>
		<reference ref_id="1191304" ref_url="https://bugzilla.suse.com/1191304" source="BUGZILLA"/>
		<reference ref_id="1191305" ref_url="https://bugzilla.suse.com/1191305" source="BUGZILLA"/>
		<reference ref_id="1191306" ref_url="https://bugzilla.suse.com/1191306" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-32626" ref_url="https://www.suse.com/security/cve/CVE-2021-32626/" source="CVE"/>
		<reference ref_id="CVE-2021-32627" ref_url="https://www.suse.com/security/cve/CVE-2021-32627/" source="CVE"/>
		<reference ref_id="CVE-2021-32628" ref_url="https://www.suse.com/security/cve/CVE-2021-32628/" source="CVE"/>
		<reference ref_id="CVE-2021-32672" ref_url="https://www.suse.com/security/cve/CVE-2021-32672/" source="CVE"/>
		<reference ref_id="CVE-2021-32675" ref_url="https://www.suse.com/security/cve/CVE-2021-32675/" source="CVE"/>
		<reference ref_id="CVE-2021-32687" ref_url="https://www.suse.com/security/cve/CVE-2021-32687/" source="CVE"/>
		<reference ref_id="CVE-2021-32762" ref_url="https://www.suse.com/security/cve/CVE-2021-32762/" source="CVE"/>
		<reference ref_id="CVE-2021-41099" ref_url="https://www.suse.com/security/cve/CVE-2021-41099/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009767.html" source="SUSE-SU"/>
		<description>
This update for redis fixes the following issues:
	  
- CVE-2021-32627: Fixed integer to heap buffer overflows with streams (bsc#1191305).
- CVE-2021-32628: Fixed integer to heap buffer overflows handling ziplist-encoded data types (bsc#1191305).
- CVE-2021-32687: Fixed integer to heap buffer overflow with intsets (bsc#1191302).
- CVE-2021-32762: Fixed integer to heap buffer overflow issue in redis-cli and redis-sentinel (bsc#1191300).
- CVE-2021-32626: Fixed heap buffer overflow caused by specially crafted Lua scripts (bsc#1191306).
- CVE-2021-32672: Fixed random heap reading issue with Lua Debugger (bsc#1191304).
- CVE-2021-32675: Fixed Denial Of Service when processing RESP request payloads with a large number of elements on many connections (bsc#1191303).
- CVE-2021-41099: Fixed integer to heap buffer overflow handling certain string commands and network payloads (bsc#1191299).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191299">SUSE bug 1191299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191300">SUSE bug 1191300</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191302">SUSE bug 1191302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191303">SUSE bug 1191303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191304">SUSE bug 1191304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191305">SUSE bug 1191305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191306">SUSE bug 1191306</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32626/">CVE-2021-32626</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32627/">CVE-2021-32627</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32628/">CVE-2021-32628</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-32672/">CVE-2021-32672</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32675/">CVE-2021-32675</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32687/">CVE-2021-32687</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32762/">CVE-2021-32762</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41099/">CVE-2021-41099</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655898" comment="redis-6.0.14-6.8.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111208" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192146" ref_url="https://bugzilla.suse.com/1192146" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25219" ref_url="https://www.suse.com/security/cve/CVE-2021-25219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009771.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25219: Fixed lame cache that could have been abused to severely degrade resolver performance (bsc#1192146).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-23"/>
	<updated date="2021-11-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192146">SUSE bug 1192146</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-25219/">CVE-2021-25219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009654095" comment="bind-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654096" comment="bind-chrootenv-9.16.6-12.57.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654097" comment="bind-doc-9.16.6-12.57.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111209" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1186031" ref_url="https://bugzilla.suse.com/1186031" source="BUGZILLA"/>
		<reference ref_id="1192497" ref_url="https://bugzilla.suse.com/1192497" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-35604" ref_url="https://www.suse.com/security/cve/CVE-2021-35604/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009809.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.22:
- CVE-2021-35604: Fixed InnoDB vulnerability that allowed an high privileged attacker with network access via multiple protocols to compromise MySQL (bsc#1192497).
    
- Add missing dependency to liblz4 to enable lz4 compression for INNODB (bsc#1186031).    
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186031">SUSE bug 1186031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192497">SUSE bug 1192497</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-35604/">CVE-2021-35604</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657274" comment="libmariadbd-devel-10.4.22-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657275" comment="libmariadbd19-10.4.22-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657276" comment="mariadb-10.4.22-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657277" comment="mariadb-client-10.4.22-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657278" comment="mariadb-errormessages-10.4.22-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657279" comment="mariadb-tools-10.4.22-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111210" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1027519" ref_url="https://bugzilla.suse.com/1027519" source="BUGZILLA"/>
		<reference ref_id="1191363" ref_url="https://bugzilla.suse.com/1191363" source="BUGZILLA"/>
		<reference ref_id="1192554" ref_url="https://bugzilla.suse.com/1192554" source="BUGZILLA"/>
		<reference ref_id="1192557" ref_url="https://bugzilla.suse.com/1192557" source="BUGZILLA"/>
		<reference ref_id="1192559" ref_url="https://bugzilla.suse.com/1192559" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28702" ref_url="https://www.suse.com/security/cve/CVE-2021-28702/" source="CVE"/>
		<reference ref_id="CVE-2021-28704" ref_url="https://www.suse.com/security/cve/CVE-2021-28704/" source="CVE"/>
		<reference ref_id="CVE-2021-28705" ref_url="https://www.suse.com/security/cve/CVE-2021-28705/" source="CVE"/>
		<reference ref_id="CVE-2021-28706" ref_url="https://www.suse.com/security/cve/CVE-2021-28706/" source="CVE"/>
		<reference ref_id="CVE-2021-28707" ref_url="https://www.suse.com/security/cve/CVE-2021-28707/" source="CVE"/>
		<reference ref_id="CVE-2021-28708" ref_url="https://www.suse.com/security/cve/CVE-2021-28708/" source="CVE"/>
		<reference ref_id="CVE-2021-28709" ref_url="https://www.suse.com/security/cve/CVE-2021-28709/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009826.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2021-28702: Fixed PCI devices with RMRRs not deassigned correctly (XSA-386) (bsc#1191363).
- CVE-2021-28704, CVE-2021-28707, CVE-2021-28708: Fixed PoD operations on misaligned GFNs (XSA-388) (bsc#1192557).
- CVE-2021-28705, CVE-2021-28709: Fixed issues with partially successful P2M updates on x86 (XSA-389) (bsc#1192559).
- CVE-2021-28706: Fixed guests may exceed their designated memory limit (XSA-385) (bsc#1192554).

- Update to Xen 4.13.4 bug fix release (bsc#1027519).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-03"/>
	<updated date="2021-12-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1027519">SUSE bug 1027519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191363">SUSE bug 1191363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192554">SUSE bug 1192554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192557">SUSE bug 1192557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192559">SUSE bug 1192559</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28702/">CVE-2021-28702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28704/">CVE-2021-28704</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28705/">CVE-2021-28705</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28706/">CVE-2021-28706</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28707/">CVE-2021-28707</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28708/">CVE-2021-28708</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28709/">CVE-2021-28709</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658539" comment="xen-4.13.4_02-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658540" comment="xen-devel-4.13.4_02-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658541" comment="xen-tools-4.13.4_02-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658542" comment="xen-tools-xendomains-wait-disk-4.13.4_02-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111211" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193170" ref_url="https://bugzilla.suse.com/1193170" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43527" ref_url="https://www.suse.com/security/cve/CVE-2021-43527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-December/020999.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Update to version 3.68.1:

- CVE-2021-43527: Fixed a Heap overflow in NSS when verifying DER-encoded DSA or RSA-PSS signatures (bsc#1193170).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193170">SUSE bug 1193170</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43527/">CVE-2021-43527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659028" comment="libfreebl3-hmac-3.68.1-3.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659032" comment="libsoftokn3-hmac-3.68.1-3.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111212" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1192516" ref_url="https://bugzilla.suse.com/1192516" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23214" ref_url="https://www.suse.com/security/cve/CVE-2021-23214/" source="CVE"/>
		<reference ref_id="CVE-2021-23222" ref_url="https://www.suse.com/security/cve/CVE-2021-23222/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009898.html" source="SUSE-SU"/>
		<description>
This update for postgresql10 fixes the following issues:
          
- CVE-2021-23214: Make the server reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
- CVE-2021-23222: Make libpq reject extraneous data after an SSL or GSS encryption handshake (bsc#1192516).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192516">SUSE bug 1192516</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23214/">CVE-2021-23214</cve>
	<cve impact="important" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23222/">CVE-2021-23222</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009656420" comment="postgresql10-contrib-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656421" comment="postgresql10-devel-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656465" comment="postgresql10-docs-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656422" comment="postgresql10-plperl-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656423" comment="postgresql10-plpython-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656424" comment="postgresql10-pltcl-10.19-8.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009656425" comment="postgresql10-server-10.19-8.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111213" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181687" ref_url="https://bugzilla.suse.com/1181687" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17525" ref_url="https://www.suse.com/security/cve/CVE-2020-17525/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008302.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2020-17525: A null-pointer-dereference has been found in mod_authz_svn that results in
    a remote unauthenticated Denial-of-Service in some server configurations (bsc#1181687).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-10"/>
	<updated date="2021-02-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181687">SUSE bug 1181687</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-17525/">CVE-2020-17525</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500004" comment="subversion-server-1.10.6-3.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111214" version="1" class="patch">
	<metadata>
		<title>Security update for openvswitch (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181742" ref_url="https://bugzilla.suse.com/1181742" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35498" ref_url="https://www.suse.com/security/cve/CVE-2020-35498/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008315.html" source="SUSE-SU"/>
		<description>
This update for openvswitch fixes the following issues:

- CVE-2020-35498: Fixed a denial of service related to the handling of Ethernet padding (bsc#1181742).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-11"/>
	<updated date="2021-02-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181742">SUSE bug 1181742</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35498/">CVE-2020-35498</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009497918" comment="libopenvswitch-2_13-0-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500005" comment="libovn-20_03-0-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500006" comment="openvswitch-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500007" comment="openvswitch-devel-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500008" comment="openvswitch-ipsec-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500009" comment="openvswitch-pki-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500010" comment="openvswitch-test-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500011" comment="openvswitch-vtep-2.13.2-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500012" comment="ovn-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500013" comment="ovn-central-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500014" comment="ovn-devel-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500015" comment="ovn-docker-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500016" comment="ovn-host-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500017" comment="ovn-vtep-20.03.1-9.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009497919" comment="python3-ovs-2.13.2-9.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111215" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182246" ref_url="https://bugzilla.suse.com/1182246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8625" ref_url="https://www.suse.com/security/cve/CVE-2020-8625/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008340.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2020-8625: A vulnerability in BIND's GSSAPI security policy
  negotiation can be targeted by a buffer overflow attack [bsc#1182246]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-18"/>
	<updated date="2021-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182246">SUSE bug 1182246</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8625/">CVE-2020-8625</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500018" comment="bind-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500019" comment="bind-chrootenv-9.16.6-12.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500020" comment="bind-doc-9.16.6-12.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111216" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178565" ref_url="https://bugzilla.suse.com/1178565" source="BUGZILLA"/>
		<reference ref_id="1179717" ref_url="https://bugzilla.suse.com/1179717" source="BUGZILLA"/>
		<reference ref_id="1179719" ref_url="https://bugzilla.suse.com/1179719" source="BUGZILLA"/>
		<reference ref_id="1180523" ref_url="https://bugzilla.suse.com/1180523" source="BUGZILLA"/>
		<reference ref_id="1181639" ref_url="https://bugzilla.suse.com/1181639" source="BUGZILLA"/>
		<reference ref_id="1181933" ref_url="https://bugzilla.suse.com/1181933" source="BUGZILLA"/>
		<reference ref_id="1182137" ref_url="https://bugzilla.suse.com/1182137" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11947" ref_url="https://www.suse.com/security/cve/CVE-2020-11947/" source="CVE"/>
		<reference ref_id="CVE-2021-20181" ref_url="https://www.suse.com/security/cve/CVE-2021-20181/" source="CVE"/>
		<reference ref_id="CVE-2021-20203" ref_url="https://www.suse.com/security/cve/CVE-2021-20203/" source="CVE"/>
		<reference ref_id="CVE-2021-20221" ref_url="https://www.suse.com/security/cve/CVE-2021-20221/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008346.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- Fixed potential privilege escalation in virtfs (CVE-2021-20181 bsc#1182137)
- Fixed out-of-bound access in iscsi (CVE-2020-11947 bsc#1180523)
- Fixed out-of-bound access in vmxnet3 emulation (CVE-2021-20203 bsc#1181639)
- Fixed out-of-bound access in ARM interrupt handling (CVE-2021-20221 bsc#1181933)
- Fixed vfio-pci device on s390 enters error state (bsc#1179717 bsc#1179719)
- Fixed 'Failed to try-restart qemu-ga@.service' error while updating the
  qemu-guest-agent. (bsc#1178565)
- Apply fixes to qemu scsi passthrough with respect to timeout and
  error conditions, including using more correct status codes. Add
  more qemu tracing which helped track down these issues
  (bsc#1178049)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178565">SUSE bug 1178565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179717">SUSE bug 1179717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179719">SUSE bug 1179719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180523">SUSE bug 1180523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181639">SUSE bug 1181639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181933">SUSE bug 1181933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182137">SUSE bug 1182137</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-11947/">CVE-2020-11947</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20181/">CVE-2021-20181</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20203/">CVE-2021-20203</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-20221/">CVE-2021-20221</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500021" comment="qemu-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500022" comment="qemu-arm-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500023" comment="qemu-audio-alsa-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500024" comment="qemu-audio-pa-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500025" comment="qemu-block-curl-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500026" comment="qemu-block-iscsi-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500027" comment="qemu-block-rbd-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500028" comment="qemu-block-ssh-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500029" comment="qemu-guest-agent-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500030" comment="qemu-ipxe-1.0.0+-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500031" comment="qemu-kvm-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500032" comment="qemu-lang-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500033" comment="qemu-microvm-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500034" comment="qemu-ppc-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500035" comment="qemu-s390-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500036" comment="qemu-seabios-1.12.1+-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500037" comment="qemu-sgabios-8-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500038" comment="qemu-ui-curses-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500039" comment="qemu-ui-gtk-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500040" comment="qemu-ui-spice-app-4.2.1-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500041" comment="qemu-vgabios-1.12.1+-11.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500042" comment="qemu-x86-4.2.1-11.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111217" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql13 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1182039" ref_url="https://bugzilla.suse.com/1182039" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20229" ref_url="https://www.suse.com/security/cve/CVE-2021-20229/" source="CVE"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008357.html" source="SUSE-SU"/>
		<description>
This update for postgresql13 fixes the following issues:

Upgrade to version 13.2:

  * Updating stored views and reindexing might be needed after applying this update.
  * CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
  * CVE-2021-20229, bsc#1182039: Fix failure to check per-column SELECT privileges in some join queries.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182039">SUSE bug 1182039</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20229/">CVE-2021-20229</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500043" comment="libecpg6-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500044" comment="postgresql13-contrib-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500045" comment="postgresql13-devel-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500046" comment="postgresql13-docs-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500047" comment="postgresql13-plperl-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500048" comment="postgresql13-plpython-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500049" comment="postgresql13-pltcl-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500050" comment="postgresql13-server-13.2-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500051" comment="postgresql13-server-devel-13.2-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111218" version="1" class="patch">
	<metadata>
		<title>Security update for postgresql12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179765" ref_url="https://bugzilla.suse.com/1179765" source="BUGZILLA"/>
		<reference ref_id="1182040" ref_url="https://bugzilla.suse.com/1182040" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3393" ref_url="https://www.suse.com/security/cve/CVE-2021-3393/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008359.html" source="SUSE-SU"/>
		<description>
This update for postgresql12 fixes the following issues:

Upgrade to version 12.6:

- Reindexing might be needed after applying this update.
- CVE-2021-3393, bsc#1182040: Fix information leakage in constraint-violation error messages.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-22"/>
	<updated date="2021-02-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179765">SUSE bug 1179765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182040">SUSE bug 1182040</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3393/">CVE-2021-3393</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500052" comment="postgresql12-contrib-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500053" comment="postgresql12-devel-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500054" comment="postgresql12-docs-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500055" comment="postgresql12-plperl-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500056" comment="postgresql12-plpython-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500057" comment="postgresql12-pltcl-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500058" comment="postgresql12-server-12.6-8.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500059" comment="postgresql12-server-devel-12.6-8.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111219" version="1" class="patch">
	<metadata>
		<title>Security update for gnuplot (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176689" ref_url="https://bugzilla.suse.com/1176689" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25559" ref_url="https://www.suse.com/security/cve/CVE-2020-25559/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0549-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008361.html" source="SUSE-SU"/>
		<description>
This update for gnuplot fixes the following issues:

- CVE-2020-25559: Fixed double free when executing print_set_output() (bsc#1176689).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-23"/>
	<updated date="2021-02-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176689">SUSE bug 1176689</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25559/">CVE-2020-25559</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500060" comment="gnuplot-5.2.2-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500061" comment="gnuplot-doc-5.2.2-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111220" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181550" ref_url="https://bugzilla.suse.com/1181550" source="BUGZILLA"/>
		<reference ref_id="1181556" ref_url="https://bugzilla.suse.com/1181556" source="BUGZILLA"/>
		<reference ref_id="1181557" ref_url="https://bugzilla.suse.com/1181557" source="BUGZILLA"/>
		<reference ref_id="1181558" ref_url="https://bugzilla.suse.com/1181558" source="BUGZILLA"/>
		<reference ref_id="1181559" ref_url="https://bugzilla.suse.com/1181559" source="BUGZILLA"/>
		<reference ref_id="1181560" ref_url="https://bugzilla.suse.com/1181560" source="BUGZILLA"/>
		<reference ref_id="1181561" ref_url="https://bugzilla.suse.com/1181561" source="BUGZILLA"/>
		<reference ref_id="1181562" ref_url="https://bugzilla.suse.com/1181562" source="BUGZILLA"/>
		<reference ref_id="1181563" ref_url="https://bugzilla.suse.com/1181563" source="BUGZILLA"/>
		<reference ref_id="1181564" ref_url="https://bugzilla.suse.com/1181564" source="BUGZILLA"/>
		<reference ref_id="1181565" ref_url="https://bugzilla.suse.com/1181565" source="BUGZILLA"/>
		<reference ref_id="1182740" ref_url="https://bugzilla.suse.com/1182740" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-28243" ref_url="https://www.suse.com/security/cve/CVE-2020-28243/" source="CVE"/>
		<reference ref_id="CVE-2020-28972" ref_url="https://www.suse.com/security/cve/CVE-2020-28972/" source="CVE"/>
		<reference ref_id="CVE-2020-35662" ref_url="https://www.suse.com/security/cve/CVE-2020-35662/" source="CVE"/>
		<reference ref_id="CVE-2021-25281" ref_url="https://www.suse.com/security/cve/CVE-2021-25281/" source="CVE"/>
		<reference ref_id="CVE-2021-25282" ref_url="https://www.suse.com/security/cve/CVE-2021-25282/" source="CVE"/>
		<reference ref_id="CVE-2021-25283" ref_url="https://www.suse.com/security/cve/CVE-2021-25283/" source="CVE"/>
		<reference ref_id="CVE-2021-25284" ref_url="https://www.suse.com/security/cve/CVE-2021-25284/" source="CVE"/>
		<reference ref_id="CVE-2021-3144" ref_url="https://www.suse.com/security/cve/CVE-2021-3144/" source="CVE"/>
		<reference ref_id="CVE-2021-3148" ref_url="https://www.suse.com/security/cve/CVE-2021-3148/" source="CVE"/>
		<reference ref_id="CVE-2021-3197" ref_url="https://www.suse.com/security/cve/CVE-2021-3197/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008385.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Fix regression on cmd.run when passing tuples as cmd (bsc#1182740)
- Allow `extra_filerefs` as sanitized `kwargs` for SSH client
- Fix errors with virt.update
- Fix for multiple for security issues
  (CVE-2020-28243) (CVE-2020-28972) (CVE-2020-35662) (CVE-2021-3148) (CVE-2021-3144)
  (CVE-2021-25281) (CVE-2021-25282) (CVE-2021-25283) (CVE-2021-25284) (CVE-2021-3197)
  (bsc#1181550) (bsc#1181556) (bsc#1181557) (bsc#1181558) (bsc#1181559) (bsc#1181560)
  (bsc#1181561) (bsc#1181562) (bsc#1181563) (bsc#1181564) (bsc#1181565)
- virt: search for `grub.xen` path
- Xen spicevmc, DNS SRV records backports:
  - Fix virtual network generated DNS XML for SRV records
  - Don't add spicevmc channel to xen VMs
- virt UEFI fix: virt.update when `efi=True` 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1181550">SUSE bug 1181550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181556">SUSE bug 1181556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181557">SUSE bug 1181557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181558">SUSE bug 1181558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181559">SUSE bug 1181559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181560">SUSE bug 1181560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181561">SUSE bug 1181561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181562">SUSE bug 1181562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181563">SUSE bug 1181563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181564">SUSE bug 1181564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181565">SUSE bug 1181565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182740">SUSE bug 1182740</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-28243/">CVE-2020-28243</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28972/">CVE-2020-28972</cve>
	<cve impact="important" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2020-35662/">CVE-2020-35662</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25281/">CVE-2021-25281</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25282/">CVE-2021-25282</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25283/">CVE-2021-25283</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25284/">CVE-2021-25284</cve>
	<cve impact="important" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3144/">CVE-2021-3144</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3148/">CVE-2021-3148</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3197/">CVE-2021-3197</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500062" comment="salt-api-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500063" comment="salt-cloud-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500064" comment="salt-fish-completion-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500065" comment="salt-master-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500066" comment="salt-proxy-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500067" comment="salt-ssh-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500068" comment="salt-standalone-formulas-configuration-3000-24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500069" comment="salt-syndic-3000-24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111221" version="1" class="patch">
	<metadata>
		<title>Security update for grub2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175970" ref_url="https://bugzilla.suse.com/1175970" source="BUGZILLA"/>
		<reference ref_id="1176711" ref_url="https://bugzilla.suse.com/1176711" source="BUGZILLA"/>
		<reference ref_id="1177883" ref_url="https://bugzilla.suse.com/1177883" source="BUGZILLA"/>
		<reference ref_id="1179264" ref_url="https://bugzilla.suse.com/1179264" source="BUGZILLA"/>
		<reference ref_id="1179265" ref_url="https://bugzilla.suse.com/1179265" source="BUGZILLA"/>
		<reference ref_id="1182057" ref_url="https://bugzilla.suse.com/1182057" source="BUGZILLA"/>
		<reference ref_id="1182262" ref_url="https://bugzilla.suse.com/1182262" source="BUGZILLA"/>
		<reference ref_id="1182263" ref_url="https://bugzilla.suse.com/1182263" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14372" ref_url="https://www.suse.com/security/cve/CVE-2020-14372/" source="CVE"/>
		<reference ref_id="CVE-2020-25632" ref_url="https://www.suse.com/security/cve/CVE-2020-25632/" source="CVE"/>
		<reference ref_id="CVE-2020-25647" ref_url="https://www.suse.com/security/cve/CVE-2020-25647/" source="CVE"/>
		<reference ref_id="CVE-2020-27749" ref_url="https://www.suse.com/security/cve/CVE-2020-27749/" source="CVE"/>
		<reference ref_id="CVE-2020-27779" ref_url="https://www.suse.com/security/cve/CVE-2020-27779/" source="CVE"/>
		<reference ref_id="CVE-2021-20225" ref_url="https://www.suse.com/security/cve/CVE-2021-20225/" source="CVE"/>
		<reference ref_id="CVE-2021-20233" ref_url="https://www.suse.com/security/cve/CVE-2021-20233/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008423.html" source="SUSE-SU"/>
		<description>
This update for grub2 fixes the following issues:

grub2 implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)
- CVE-2020-27749: Fixed a stack buffer overflow in grub_parser_split_cmdline (bsc#1179264)
- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175970">SUSE bug 1175970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176711">SUSE bug 1176711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177883">SUSE bug 1177883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179264">SUSE bug 1179264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179265">SUSE bug 1179265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182057">SUSE bug 1182057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182262">SUSE bug 1182262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182263">SUSE bug 1182263</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14372/">CVE-2020-14372</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25632/">CVE-2020-25632</cve>
	<cve impact="important" cvss3="7.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25647/">CVE-2020-25647</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27749/">CVE-2020-27749</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27779/">CVE-2020-27779</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20225/">CVE-2021-20225</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-20233/">CVE-2021-20233</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500070" comment="grub2-x86_64-xen-2.04-9.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111222" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180933" ref_url="https://bugzilla.suse.com/1180933" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008421.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- dnssec-keygen can no longer generate HMAC keys. Use tsig-keygen instead. [bsc#1180933]
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180933">SUSE bug 1180933</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500071" comment="bind-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500072" comment="bind-chrootenv-9.16.6-12.44.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500073" comment="bind-doc-9.16.6-12.44.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111223" version="1" class="patch">
	<metadata>
		<title>Security update for freeradius-server (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180525" ref_url="https://bugzilla.suse.com/1180525" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:0714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008435.html" source="SUSE-SU"/>
		<description>
This update for freeradius-server fixes the following issues:

- move logrotate options into specific parts for each log as 'global' options
  will persist past and clobber global options in the main logrotate config (bsc#1180525)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-04"/>
	<updated date="2021-03-04"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1180525">SUSE bug 1180525</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500074" comment="freeradius-server-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500075" comment="freeradius-server-devel-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500076" comment="freeradius-server-krb5-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500077" comment="freeradius-server-ldap-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500078" comment="freeradius-server-libs-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500079" comment="freeradius-server-mysql-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500080" comment="freeradius-server-perl-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500081" comment="freeradius-server-postgresql-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500082" comment="freeradius-server-python3-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500083" comment="freeradius-server-sqlite-3.0.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500084" comment="freeradius-server-utils-3.0.21-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111224" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1181159" ref_url="https://bugzilla.suse.com/1181159" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35518" ref_url="https://www.suse.com/security/cve/CVE-2020-35518/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008440.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- 389-ds was updated to version 1.4.3.19 
   - CVE-2020-35518: Fixed an information disclosure during the binding of a DN (bsc#1181159).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-08"/>
	<updated date="2021-03-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1181159">SUSE bug 1181159</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35518/">CVE-2020-35518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500085" comment="389-ds-1.4.3.19~git0.bef0b5bed-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500086" comment="389-ds-devel-1.4.3.19~git0.bef0b5bed-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500087" comment="lib389-1.4.3.19~git0.bef0b5bed-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500088" comment="libsvrcore0-1.4.3.19~git0.bef0b5bed-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111225" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177580" ref_url="https://bugzilla.suse.com/1177580" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-20230" ref_url="https://www.suse.com/security/cve/CVE-2021-20230/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008483.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

- Security fix: [bsc#1177580, bsc#1182529, CVE-2021-20230]
  * 'redirect' option does not properly handle 'verifyChain = yes'
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177580">SUSE bug 1177580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-20230/">CVE-2021-20230</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500089" comment="stunnel-5.57-3.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111226" version="1" class="patch">
	<metadata>
		<title>Security update for tcmu-runner (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180676" ref_url="https://bugzilla.suse.com/1180676" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3139" ref_url="https://www.suse.com/security/cve/CVE-2021-3139/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-January/017662.html" source="SUSE-SU"/>
		<description>
This update for tcmu-runner fixes the following issues:

- CVE-2021-3139: Fixed a LIO security issue (bsc#1180676).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-13"/>
	<updated date="2021-01-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180676">SUSE bug 1180676</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-3139/">CVE-2021-3139</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500090" comment="libtcmu2-1.5.2-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500091" comment="tcmu-runner-1.5.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111227" version="1" class="patch">
	<metadata>
		<title>Security update for ovmf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183578" ref_url="https://bugzilla.suse.com/1183578" source="BUGZILLA"/>
		<reference ref_id="1183579" ref_url="https://bugzilla.suse.com/1183579" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28210" ref_url="https://www.suse.com/security/cve/CVE-2021-28210/" source="CVE"/>
		<reference ref_id="CVE-2021-28211" ref_url="https://www.suse.com/security/cve/CVE-2021-28211/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008562.html" source="SUSE-SU"/>
		<description>
This update for ovmf fixes the following issues:

- CVE-2021-28211: ovmf: edk2: possible heap corruption with LzmaUefiDecompressGetInfo (bsc#1183578)
- CVE-2021-28210: ovmf: unlimited FV recursion, round 2 (bsc#1183579)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-29"/>
	<updated date="2021-03-29"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1183578">SUSE bug 1183578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183579">SUSE bug 1183579</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-28210/">CVE-2021-28210</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28211/">CVE-2021-28211</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500092" comment="ovmf-201911-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500093" comment="ovmf-tools-201911-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500094" comment="qemu-ovmf-x86_64-201911-7.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500095" comment="qemu-uefi-aarch64-201911-7.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111228" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Server Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1193942" ref_url="https://bugzilla.suse.com/1193942" source="BUGZILLA"/>
		<reference ref_id="1193943" ref_url="https://bugzilla.suse.com/1193943" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44224" ref_url="https://www.suse.com/security/cve/CVE-2021-44224/" source="CVE"/>
		<reference ref_id="CVE-2021-44790" ref_url="https://www.suse.com/security/cve/CVE-2021-44790/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010009.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

Apache2 was updated to the current stable version 2.4.51 (jsc#SLE-22733 jsc#SLE-22849)

It fixes all CVEs and selected bugs represented by patches found between 2.4.23 and 2.4.51.

See https://downloads.apache.org/httpd/CHANGES_2.4 for a complete change log.

Also fixed:

- CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations (bsc#1193943)
- CVE-2021-44790: Fixed buffer overflow when parsing multipart content in mod_lua (bsc#1193942)

		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-17"/>
	<updated date="2022-01-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193942">SUSE bug 1193942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193943">SUSE bug 1193943</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44224/">CVE-2021-44224</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44790/">CVE-2021-44790</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-server-applications:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282369" comment="SUSE Linux Enterprise Module for Server Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662953" comment="apache2-devel-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662954" comment="apache2-doc-2.4.51-3.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662955" comment="apache2-worker-2.4.51-3.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111229" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Transactional Server 15 SP2</platform>
		</affected>
		<reference ref_id="1171257" ref_url="https://bugzilla.suse.com/1171257" source="BUGZILLA"/>
		<reference ref_id="1176293" ref_url="https://bugzilla.suse.com/1176293" source="BUGZILLA"/>
		<reference ref_id="1179831" ref_url="https://bugzilla.suse.com/1179831" source="BUGZILLA"/>
		<reference ref_id="1181368" ref_url="https://bugzilla.suse.com/1181368" source="BUGZILLA"/>
		<reference ref_id="1182281" ref_url="https://bugzilla.suse.com/1182281" source="BUGZILLA"/>
		<reference ref_id="1182293" ref_url="https://bugzilla.suse.com/1182293" source="BUGZILLA"/>
		<reference ref_id="1182382" ref_url="https://bugzilla.suse.com/1182382" source="BUGZILLA"/>
		<reference ref_id="1185092" ref_url="https://bugzilla.suse.com/1185092" source="BUGZILLA"/>
		<reference ref_id="1185281" ref_url="https://bugzilla.suse.com/1185281" source="BUGZILLA"/>
		<reference ref_id="1186674" ref_url="https://bugzilla.suse.com/1186674" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-15750" ref_url="https://www.suse.com/security/cve/CVE-2018-15750/" source="CVE"/>
		<reference ref_id="CVE-2018-15751" ref_url="https://www.suse.com/security/cve/CVE-2018-15751/" source="CVE"/>
		<reference ref_id="CVE-2020-11651" ref_url="https://www.suse.com/security/cve/CVE-2020-11651/" source="CVE"/>
		<reference ref_id="CVE-2020-11652" ref_url="https://www.suse.com/security/cve/CVE-2020-11652/" source="CVE"/>
		<reference ref_id="CVE-2020-25592" ref_url="https://www.suse.com/security/cve/CVE-2020-25592/" source="CVE"/>
		<reference ref_id="CVE-2021-25315" ref_url="https://www.suse.com/security/cve/CVE-2021-25315/" source="CVE"/>
		<reference ref_id="CVE-2021-31607" ref_url="https://www.suse.com/security/cve/CVE-2021-31607/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2106-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009063.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

Update to Salt release version 3002.2 (jsc#ECO-3212, jsc#SLE-18033, jsc#SLE-18028) 

- Check if dpkgnotify is executable (bsc#1186674)
- Drop support for Python2. Obsoletes `python2-salt` package (jsc#SLE-18028)
- virt module updates
  * network: handle missing ipv4 netmask attribute
  * more network support
  * PCI/USB host devices passthrough support
- Set distro requirement to oldest supported version in requirements/base.txt
- Bring missing part of async batch implementation back (CVE-2021-25315, bsc#1182382)
- Always require `python3-distro` (bsc#1182293)
- Remove deprecated warning that breaks minion execution when 'server_id_use_crc' opts is missing
- Fix pkg states when DEB package has 'all' arch
- Do not force beacons configuration to be a list.
- Remove msgpack &lt; 1.0.0 from base requirements (bsc#1176293)
- msgpack support for version &gt;= 1.0.0 (bsc#1171257)
- Fix issue parsing errors in ansiblegate state module
- Prevent command injection in the snapper module (bsc#1185281, CVE-2021-31607)
- transactional_update: detect recursion in the executor
- Add subpackage salt-transactional-update (jsc#SLE-18033)
- Improvements on 'ansiblegate' module (bsc#1185092):
  * New methods: ansible.targets / ansible.discover_playbooks
- Add support for Alibaba Cloud Linux 2 (Aliyun Linux)
- Regression fix of salt-ssh on processing targets
- Update target fix for salt-ssh and avoiding race condition on salt-ssh event processing (bsc#1179831, bsc#1182281)
- Add notify beacon for Debian/Ubuntu systems
- Fix zmq bug that causes salt-call to freeze (bsc#1181368)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-21"/>
	<updated date="2021-06-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1171257">SUSE bug 1171257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176293">SUSE bug 1176293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179831">SUSE bug 1179831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181368">SUSE bug 1181368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182281">SUSE bug 1182281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182293">SUSE bug 1182293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182382">SUSE bug 1182382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185092">SUSE bug 1185092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185281">SUSE bug 1185281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186674">SUSE bug 1186674</bugzilla>
	<cve impact="important" cvss3="8.7/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-15750/">CVE-2018-15750</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-15751/">CVE-2018-15751</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11651/">CVE-2020-11651</cve>
	<cve impact="critical" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11652/">CVE-2020-11652</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25592/">CVE-2020-25592</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25315/">CVE-2021-25315</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31607/">CVE-2021-31607</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-transactional-server:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009475291" comment="SUSE Linux Enterprise Module for Transactional Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500181" comment="salt-transactional-update-3002.2-37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111230" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Module for Transactional Server 15 SP2</platform>
		</affected>
		<reference ref_id="1190265" ref_url="https://bugzilla.suse.com/1190265" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21996" ref_url="https://www.suse.com/security/cve/CVE-2021-21996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009673.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- Support querying for JSON data in external sql pillar.
- Exclude the full path of a download URL to prevent injection of malicious code.
  (bsc#1190265, CVE-2021-21996)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-27"/>
	<updated date="2021-10-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190265">SUSE bug 1190265</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-21996/">CVE-2021-21996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-module-transactional-server:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009475291" comment="SUSE Linux Enterprise Module for Transactional Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652149" comment="salt-transactional-update-3002.2-49.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111231" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1162117" ref_url="https://bugzilla.suse.com/1162117" source="BUGZILLA"/>
		<reference ref_id="1166844" ref_url="https://bugzilla.suse.com/1166844" source="BUGZILLA"/>
		<reference ref_id="1166916" ref_url="https://bugzilla.suse.com/1166916" source="BUGZILLA"/>
		<reference ref_id="1172442" ref_url="https://bugzilla.suse.com/1172442" source="BUGZILLA"/>
		<reference ref_id="1172443" ref_url="https://bugzilla.suse.com/1172443" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10531" ref_url="https://www.suse.com/security/cve/CVE-2020-10531/" source="CVE"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-June/006903.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

nodejs10 was updated to version 10.21.0 	  

- CVE-2020-8174: Fixed multiple memory corruption in napi_get_value_string_*() (bsc#1172443).
- CVE-2020-11080: Fixed a potential denial of service when receiving unreasonably large HTTP/2 SETTINGS frames (bsc#1172442). 
- CVE-2020-10531: Fixed an integer overflow in UnicodeString:doAppend() (bsc#1166844).
- Fixed an issue with openssl by adding getrandom syscall definition for all Linux platforms (bsc#1162117).

npm was updated to 6.14.3 

- CVE-2020-7598: Fixed an issue which could have tricked minimist into adding or modifying 
  properties of Object.prototype (bsc#1166916).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-06-09"/>
	<updated date="2020-06-09"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1162117">SUSE bug 1162117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166844">SUSE bug 1166844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-10531/">CVE-2020-10531</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500804" comment="nodejs10-10.21.0-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500805" comment="nodejs10-devel-10.21.0-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500806" comment="nodejs10-docs-10.21.0-1.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500807" comment="npm10-10.21.0-1.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111232" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173389" ref_url="https://bugzilla.suse.com/1173389" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11996" ref_url="https://www.suse.com/security/cve/CVE-2020-11996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007165.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:
	  
Tomcat was updated to 9.0.36 See changelog at

- CVE-2020-11996: Fixed an issue which by sending a specially crafted sequence of HTTP/2 requests could have triggered high CPU
  usage for several seconds making potentially the server unresponsive (bsc#1173389).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-21"/>
	<updated date="2020-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173389">SUSE bug 1173389</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11996/">CVE-2020-11996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501087" comment="tomcat-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501088" comment="tomcat-admin-webapps-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501089" comment="tomcat-el-3_0-api-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501090" comment="tomcat-jsp-2_3-api-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501091" comment="tomcat-lib-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501092" comment="tomcat-servlet-4_0-api-9.0.36-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501093" comment="tomcat-webapps-9.0.36-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111233" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1174117" ref_url="https://bugzilla.suse.com/1174117" source="BUGZILLA"/>
		<reference ref_id="1174121" ref_url="https://bugzilla.suse.com/1174121" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13934" ref_url="https://www.suse.com/security/cve/CVE-2020-13934/" source="CVE"/>
		<reference ref_id="CVE-2020-13935" ref_url="https://www.suse.com/security/cve/CVE-2020-13935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007182.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- Fixed CVEs:
  * CVE-2020-13934 (bsc#1174121)
  * CVE-2020-13935 (bsc#1174117)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-24"/>
	<updated date="2020-07-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174117">SUSE bug 1174117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174121">SUSE bug 1174121</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13934/">CVE-2020-13934</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13935/">CVE-2020-13935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501094" comment="tomcat-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501095" comment="tomcat-admin-webapps-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501096" comment="tomcat-el-3_0-api-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501097" comment="tomcat-jsp-2_3-api-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501098" comment="tomcat-lib-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501099" comment="tomcat-servlet-4_0-api-9.0.36-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501100" comment="tomcat-webapps-9.0.36-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111234" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175223" ref_url="https://bugzilla.suse.com/1175223" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7068" ref_url="https://www.suse.com/security/cve/CVE-2020-7068/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2456-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007334.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7068: Use of freed hash key in the phar_parse_zipfile function (bsc#1175223).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175223">SUSE bug 1175223</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-7068/">CVE-2020-7068</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501101" comment="apache2-mod_php7-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501102" comment="php7-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501103" comment="php7-bcmath-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501104" comment="php7-bz2-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501105" comment="php7-calendar-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501106" comment="php7-ctype-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501107" comment="php7-curl-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501108" comment="php7-dba-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501109" comment="php7-devel-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501110" comment="php7-dom-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501111" comment="php7-enchant-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501112" comment="php7-exif-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501113" comment="php7-fastcgi-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501114" comment="php7-fileinfo-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501115" comment="php7-fpm-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501116" comment="php7-ftp-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501117" comment="php7-gd-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501118" comment="php7-gettext-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501119" comment="php7-gmp-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501120" comment="php7-iconv-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501121" comment="php7-intl-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501122" comment="php7-json-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501123" comment="php7-ldap-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501124" comment="php7-mbstring-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501125" comment="php7-mysql-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501126" comment="php7-odbc-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501127" comment="php7-opcache-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501128" comment="php7-openssl-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501129" comment="php7-pcntl-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501130" comment="php7-pdo-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501131" comment="php7-pgsql-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501132" comment="php7-phar-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501133" comment="php7-posix-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501134" comment="php7-readline-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501135" comment="php7-shmop-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501136" comment="php7-snmp-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501137" comment="php7-soap-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501138" comment="php7-sockets-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501139" comment="php7-sodium-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501140" comment="php7-sqlite-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501141" comment="php7-sysvmsg-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501142" comment="php7-sysvsem-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501143" comment="php7-sysvshm-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501144" comment="php7-tidy-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501145" comment="php7-tokenizer-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501146" comment="php7-xmlreader-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501147" comment="php7-xmlrpc-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501148" comment="php7-xmlwriter-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501149" comment="php7-xsl-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501150" comment="php7-zip-7.4.6-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501151" comment="php7-zlib-7.4.6-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111235" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1166916" ref_url="https://bugzilla.suse.com/1166916" source="BUGZILLA"/>
		<reference ref_id="1172442" ref_url="https://bugzilla.suse.com/1172442" source="BUGZILLA"/>
		<reference ref_id="1172443" ref_url="https://bugzilla.suse.com/1172443" source="BUGZILLA"/>
		<reference ref_id="1172686" ref_url="https://bugzilla.suse.com/1172686" source="BUGZILLA"/>
		<reference ref_id="1172728" ref_url="https://bugzilla.suse.com/1172728" source="BUGZILLA"/>
		<reference ref_id="1173937" ref_url="https://bugzilla.suse.com/1173937" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11080" ref_url="https://www.suse.com/security/cve/CVE-2020-11080/" source="CVE"/>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-7598" ref_url="https://www.suse.com/security/cve/CVE-2020-7598/" source="CVE"/>
		<reference ref_id="CVE-2020-8174" ref_url="https://www.suse.com/security/cve/CVE-2020-8174/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007505.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2020-8174: Fixed multiple memory corruption in napi_get_value_string_*() (bsc#1172443).
- CVE-2020-11080: Fixed a potential denial of service when receiving unreasonably large HTTP/2 SETTINGS frames (bsc#1172442). 
- CVE-2020-7598: Fixed an issue which could have tricked minimist into adding or modifying 
  properties of Object.prototype (bsc#1166916)
- CVE-2020-15095: Fixed information leak through log files (bsc#1173937).
- Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation on Aarch64 with gcc10 (bsc#1172686).
- Add Require for nodejs8 when intalling npm8 (bsc#1172728)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-30"/>
	<updated date="2020-09-30"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1166916">SUSE bug 1166916</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172442">SUSE bug 1172442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172443">SUSE bug 1172443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172686">SUSE bug 1172686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172728">SUSE bug 1172728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11080/">CVE-2020-11080</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-7598/">CVE-2020-7598</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8174/">CVE-2020-8174</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501152" comment="nodejs8-8.17.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501153" comment="nodejs8-devel-8.17.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501154" comment="nodejs8-docs-8.17.0-10.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501155" comment="npm8-8.17.0-10.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111236" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172686" ref_url="https://bugzilla.suse.com/1172686" source="BUGZILLA"/>
		<reference ref_id="1173937" ref_url="https://bugzilla.suse.com/1173937" source="BUGZILLA"/>
		<reference ref_id="1176589" ref_url="https://bugzilla.suse.com/1176589" source="BUGZILLA"/>
		<reference ref_id="1176605" ref_url="https://bugzilla.suse.com/1176605" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-8201" ref_url="https://www.suse.com/security/cve/CVE-2020-8201/" source="CVE"/>
		<reference ref_id="CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007508.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- nodejs12 was updated to 12.18.4 LTS:
   - CVE-2020-8201: Fixed an HTTP Request Smuggling due to CR-to-Hyphen conversion (bsc#1176605).
   - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589).
   - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937).
- Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation
  on Aarch64 with gcc10 (bsc#1172686)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-01"/>
	<updated date="2020-10-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172686">SUSE bug 1172686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176589">SUSE bug 1176589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176605">SUSE bug 1176605</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8201/">CVE-2020-8201</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501156" comment="nodejs12-12.18.4-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501157" comment="nodejs12-devel-12.18.4-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501158" comment="nodejs12-docs-12.18.4-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501159" comment="npm12-12.18.4-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111237" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172686" ref_url="https://bugzilla.suse.com/1172686" source="BUGZILLA"/>
		<reference ref_id="1173937" ref_url="https://bugzilla.suse.com/1173937" source="BUGZILLA"/>
		<reference ref_id="1176589" ref_url="https://bugzilla.suse.com/1176589" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15095" ref_url="https://www.suse.com/security/cve/CVE-2020-15095/" source="CVE"/>
		<reference ref_id="CVE-2020-8252" ref_url="https://www.suse.com/security/cve/CVE-2020-8252/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007514.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- nodejs10 was updated to 10.22.1 LTS:
   - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589).
   - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937).
- Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation
  on Aarch64 with gcc10 (bsc#1172686)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-02"/>
	<updated date="2020-10-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172686">SUSE bug 1172686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173937">SUSE bug 1173937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176589">SUSE bug 1176589</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-15095/">CVE-2020-15095</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8252/">CVE-2020-8252</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009500941" comment="nodejs10-10.22.1-1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500942" comment="nodejs10-devel-10.22.1-1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500943" comment="nodejs10-docs-10.22.1-1.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009500944" comment="npm10-10.22.1-1.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111238" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177351" ref_url="https://bugzilla.suse.com/1177351" source="BUGZILLA"/>
		<reference ref_id="1177352" ref_url="https://bugzilla.suse.com/1177352" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7069" ref_url="https://www.suse.com/security/cve/CVE-2020-7069/" source="CVE"/>
		<reference ref_id="CVE-2020-7070" ref_url="https://www.suse.com/security/cve/CVE-2020-7070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007580.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2020-7069: Fixed an issue when AES-CCM mode was used with openssl_encrypt() function with 12 bytes IV, 
  only first 7 bytes of the IV was used (bsc#1177351). 
- CVE-2020-7070: Fixed an issue where percent-encoded cookies could have been used to overwrite existing prefixed cookie names (bsc#1177352).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177351">SUSE bug 1177351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177352">SUSE bug 1177352</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7069/">CVE-2020-7069</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-7070/">CVE-2020-7070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501160" comment="apache2-mod_php7-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501161" comment="php7-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501162" comment="php7-bcmath-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501163" comment="php7-bz2-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501164" comment="php7-calendar-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501165" comment="php7-ctype-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501166" comment="php7-curl-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501167" comment="php7-dba-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501168" comment="php7-devel-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501169" comment="php7-dom-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501170" comment="php7-enchant-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501171" comment="php7-exif-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501172" comment="php7-fastcgi-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501173" comment="php7-fileinfo-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501174" comment="php7-fpm-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501175" comment="php7-ftp-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501176" comment="php7-gd-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501177" comment="php7-gettext-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501178" comment="php7-gmp-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501179" comment="php7-iconv-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501180" comment="php7-intl-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501181" comment="php7-json-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501182" comment="php7-ldap-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501183" comment="php7-mbstring-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501184" comment="php7-mysql-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501185" comment="php7-odbc-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501186" comment="php7-opcache-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501187" comment="php7-openssl-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501188" comment="php7-pcntl-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501189" comment="php7-pdo-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501190" comment="php7-pgsql-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501191" comment="php7-phar-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501192" comment="php7-posix-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501193" comment="php7-readline-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501194" comment="php7-shmop-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501195" comment="php7-snmp-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501196" comment="php7-soap-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501197" comment="php7-sockets-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501198" comment="php7-sodium-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501199" comment="php7-sqlite-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501200" comment="php7-sysvmsg-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501201" comment="php7-sysvsem-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501202" comment="php7-sysvshm-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501203" comment="php7-tidy-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501204" comment="php7-tokenizer-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501205" comment="php7-xmlreader-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501206" comment="php7-xmlrpc-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501207" comment="php7-xmlwriter-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501208" comment="php7-xsl-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501209" comment="php7-zip-7.4.6-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501210" comment="php7-zlib-7.4.6-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111239" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177582" ref_url="https://bugzilla.suse.com/1177582" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13943" ref_url="https://www.suse.com/security/cve/CVE-2020-13943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007653.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2020-13943: Fixed HTTP/2 Request mix-up (bsc#1177582)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-28"/>
	<updated date="2020-10-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1177582">SUSE bug 1177582</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-13943/">CVE-2020-13943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501211" comment="tomcat-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501212" comment="tomcat-admin-webapps-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501213" comment="tomcat-el-3_0-api-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501214" comment="tomcat-jsp-2_3-api-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501215" comment="tomcat-lib-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501216" comment="tomcat-servlet-4_0-api-9.0.36-3.12.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501217" comment="tomcat-webapps-9.0.36-3.12.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111240" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182909" ref_url="https://bugzilla.suse.com/1182909" source="BUGZILLA"/>
		<reference ref_id="1182912" ref_url="https://bugzilla.suse.com/1182912" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25122" ref_url="https://www.suse.com/security/cve/CVE-2021-25122/" source="CVE"/>
		<reference ref_id="CVE-2021-25329" ref_url="https://www.suse.com/security/cve/CVE-2021-25329/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008576.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

CVE-2021-25122: Apache Tomcat h2c request mix-up (bsc#1182912)
CVE-2021-25329: Complete fix for CVE-2020-9484 (bsc#1182909)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-01"/>
	<updated date="2021-04-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182909">SUSE bug 1182909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182912">SUSE bug 1182912</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-25122/">CVE-2021-25122</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25329/">CVE-2021-25329</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501218" comment="tomcat-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501219" comment="tomcat-admin-webapps-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501220" comment="tomcat-el-3_0-api-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501221" comment="tomcat-jsp-2_3-api-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501222" comment="tomcat-lib-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501223" comment="tomcat-servlet-4_0-api-9.0.36-3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501224" comment="tomcat-webapps-9.0.36-3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111241" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180554" ref_url="https://bugzilla.suse.com/1180554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008198.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issue:

- CVE-2020-8287: Fixed an HTTP request smuggling vulnerability (bsc#1180554).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501225" comment="nodejs8-8.17.0-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501226" comment="nodejs8-devel-8.17.0-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501227" comment="nodejs8-docs-8.17.0-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501228" comment="npm8-8.17.0-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111242" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180706" ref_url="https://bugzilla.suse.com/1180706" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7071" ref_url="https://www.suse.com/security/cve/CVE-2020-7071/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008202.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issue:

- CVE-2020-7071: Fixed an insufficient filter in parse_url() that accepted URLs with invalid userinfo (bsc#1180706).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180706">SUSE bug 1180706</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-7071/">CVE-2020-7071</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501229" comment="apache2-mod_php7-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501230" comment="php7-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501231" comment="php7-bcmath-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501232" comment="php7-bz2-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501233" comment="php7-calendar-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501234" comment="php7-ctype-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501235" comment="php7-curl-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501236" comment="php7-dba-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501237" comment="php7-devel-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501238" comment="php7-dom-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501239" comment="php7-enchant-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501240" comment="php7-exif-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501241" comment="php7-fastcgi-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501242" comment="php7-fileinfo-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501243" comment="php7-fpm-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501244" comment="php7-ftp-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501245" comment="php7-gd-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501246" comment="php7-gettext-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501247" comment="php7-gmp-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501248" comment="php7-iconv-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501249" comment="php7-intl-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501250" comment="php7-json-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501251" comment="php7-ldap-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501252" comment="php7-mbstring-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501253" comment="php7-mysql-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501254" comment="php7-odbc-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501255" comment="php7-opcache-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501256" comment="php7-openssl-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501257" comment="php7-pcntl-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501258" comment="php7-pdo-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501259" comment="php7-pgsql-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501260" comment="php7-phar-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501261" comment="php7-posix-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501262" comment="php7-readline-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501263" comment="php7-shmop-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501264" comment="php7-snmp-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501265" comment="php7-soap-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501266" comment="php7-sockets-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501267" comment="php7-sodium-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501268" comment="php7-sqlite-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501269" comment="php7-sysvmsg-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501270" comment="php7-sysvsem-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501271" comment="php7-sysvshm-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501272" comment="php7-tidy-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501273" comment="php7-tokenizer-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501274" comment="php7-xmlreader-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501275" comment="php7-xmlrpc-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501276" comment="php7-xmlwriter-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501277" comment="php7-xsl-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501278" comment="php7-zip-7.4.6-3.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501279" comment="php7-zlib-7.4.6-3.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111243" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183851" ref_url="https://bugzilla.suse.com/1183851" source="BUGZILLA"/>
		<reference ref_id="1183852" ref_url="https://bugzilla.suse.com/1183852" source="BUGZILLA"/>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009139.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- update to 12.22.2:
- CVE-2021-22918: Out of bounds read (bsc#1187973)
- CVE-2021-23362: ssri Regular Expression Denial of Service and hosted-git-info (bsc#1187977)
- CVE-2021-27290: Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)
- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)
- CVE-2020-7774: npm - Update y18n to fix Prototype-Pollution (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624229" comment="nodejs12-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624230" comment="nodejs12-devel-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624231" comment="nodejs12-docs-12.22.2-4.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624232" comment="npm12-12.22.2-4.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111244" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1183155" ref_url="https://bugzilla.suse.com/1183155" source="BUGZILLA"/>
		<reference ref_id="1183851" ref_url="https://bugzilla.suse.com/1183851" source="BUGZILLA"/>
		<reference ref_id="1183852" ref_url="https://bugzilla.suse.com/1183852" source="BUGZILLA"/>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="CVE-2021-3449" ref_url="https://www.suse.com/security/cve/CVE-2021-3449/" source="CVE"/>
		<reference ref_id="CVE-2021-3450" ref_url="https://www.suse.com/security/cve/CVE-2021-3450/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009145.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

Update nodejs10 to 10.24.1.

Including fixes for 

- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)
- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)
- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)
- CVE-2021-3450: OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (bsc#1183851)
- CVE-2021-3449: OpenSSL - NULL pointer deref in signature_algorithms processing (bsc#1183852)
- reduce memory footprint of test-worker-stdio (bsc#1183155)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183155">SUSE bug 1183155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183851">SUSE bug 1183851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183852">SUSE bug 1183852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3449/">CVE-2021-3449</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3450/">CVE-2021-3450</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624544" comment="nodejs10-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624545" comment="nodejs10-devel-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624546" comment="nodejs10-docs-10.24.1-1.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624547" comment="npm10-10.24.1-1.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111245" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187973" ref_url="https://bugzilla.suse.com/1187973" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22918" ref_url="https://www.suse.com/security/cve/CVE-2021-22918/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019612.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

Update nodejs14 to 14.17.2.

Including fixes for:

- CVE-2021-22918: libuv upgrade - Out of bounds read (bsc#1187973)
- CVE-2021-27290: ssri Regular Expression Denial of Service (bsc#1187976)
- CVE-2021-23362: hosted-git-info Regular Expression Denial of Service (bsc#1187977)
- CVE-2020-7774: y18n Prototype Pollution (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-15"/>
	<updated date="2021-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187973">SUSE bug 1187973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-22918/">CVE-2021-22918</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624540" comment="nodejs14-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624541" comment="nodejs14-devel-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624542" comment="nodejs14-docs-14.17.2-5.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624543" comment="npm14-14.17.2-5.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111246" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009257.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- update to npm 6.14.13
- CVE-2021-27290: Fixed ssri Regular Expression Denial of Service. (bsc#1187976)
- CVE-2021-23362: Fixed hosted-git-info Regular Expression Denial of Service. (bsc#1187977)
- CVE-2020-7774: fixes y18n Prototype Pollution. (bsc#1184450)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626297" comment="nodejs8-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626298" comment="nodejs8-devel-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626299" comment="nodejs8-docs-8.17.0-10.12.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626300" comment="npm8-8.17.0-10.12.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111247" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182620" ref_url="https://bugzilla.suse.com/1182620" source="BUGZILLA"/>
		<reference ref_id="1184450" ref_url="https://bugzilla.suse.com/1184450" source="BUGZILLA"/>
		<reference ref_id="1187976" ref_url="https://bugzilla.suse.com/1187976" source="BUGZILLA"/>
		<reference ref_id="1187977" ref_url="https://bugzilla.suse.com/1187977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-7774" ref_url="https://www.suse.com/security/cve/CVE-2020-7774/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="CVE-2021-23362" ref_url="https://www.suse.com/security/cve/CVE-2021-23362/" source="CVE"/>
		<reference ref_id="CVE-2021-27290" ref_url="https://www.suse.com/security/cve/CVE-2021-27290/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009256.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- update to npm 6.14.13
- CVE-2021-27290: Fixed ssri Regular Expression Denial of Service. (bsc#1187976)
- CVE-2021-23362: Fixed hosted-git-info Regular Expression Denial of Service (bsc#1187977)
- CVE-2021-22884: DNS rebinding in --inspect (bsc#1182620)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-05"/>
	<updated date="2021-08-05"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184450">SUSE bug 1184450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187976">SUSE bug 1187976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187977">SUSE bug 1187977</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-7774/">CVE-2020-7774</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23362/">CVE-2021-23362</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27290/">CVE-2021-27290</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626438" comment="nodejs-common-2.0-3.2.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111248" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188035" ref_url="https://bugzilla.suse.com/1188035" source="BUGZILLA"/>
		<reference ref_id="1188037" ref_url="https://bugzilla.suse.com/1188037" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21704" ref_url="https://www.suse.com/security/cve/CVE-2021-21704/" source="CVE"/>
		<reference ref_id="CVE-2021-21705" ref_url="https://www.suse.com/security/cve/CVE-2021-21705/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009261.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21704: Fixed security issues in pdo_firebase module (bsc#1188035).
- CVE-2021-21705: Fixed SSRF bypass in FILTER_VALIDATE_URL (bsc#1188037).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-06"/>
	<updated date="2021-08-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188035">SUSE bug 1188035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188037">SUSE bug 1188037</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21704/">CVE-2021-21704</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21705/">CVE-2021-21705</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627355" comment="apache2-mod_php7-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627356" comment="php7-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627357" comment="php7-bcmath-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627358" comment="php7-bz2-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627359" comment="php7-calendar-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627360" comment="php7-ctype-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627361" comment="php7-curl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627362" comment="php7-dba-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627363" comment="php7-devel-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627364" comment="php7-dom-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627365" comment="php7-enchant-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627366" comment="php7-exif-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627367" comment="php7-fastcgi-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627368" comment="php7-fileinfo-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627369" comment="php7-fpm-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627370" comment="php7-ftp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627371" comment="php7-gd-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627372" comment="php7-gettext-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627373" comment="php7-gmp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627374" comment="php7-iconv-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627375" comment="php7-intl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627376" comment="php7-json-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627377" comment="php7-ldap-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627378" comment="php7-mbstring-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627379" comment="php7-mysql-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627380" comment="php7-odbc-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627381" comment="php7-opcache-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627382" comment="php7-openssl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627383" comment="php7-pcntl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627384" comment="php7-pdo-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627385" comment="php7-pgsql-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627386" comment="php7-phar-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627387" comment="php7-posix-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627388" comment="php7-readline-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627389" comment="php7-shmop-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627390" comment="php7-snmp-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627391" comment="php7-soap-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627392" comment="php7-sockets-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627393" comment="php7-sodium-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627394" comment="php7-sqlite-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627395" comment="php7-sysvmsg-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627396" comment="php7-sysvsem-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627397" comment="php7-sysvshm-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627398" comment="php7-tidy-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627399" comment="php7-tokenizer-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627400" comment="php7-xmlreader-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627401" comment="php7-xmlrpc-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627402" comment="php7-xmlwriter-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627403" comment="php7-xsl-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627404" comment="php7-zip-7.4.6-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627405" comment="php7-zlib-7.4.6-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111249" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189368" ref_url="https://bugzilla.suse.com/1189368" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009369.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

Update to 12.22.5:

- CVE-2021-3672/CVE-2021-22931: Improper handling of untypical characters in domain names (bsc#1189370, bsc#1188881)
- CVE-2021-22940: Use after free on close http2 on stream canceling (bsc#1189368)
- CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (bsc#1189369)
- CVE-2021-22930: http2: fixes use after free on close http2 on stream canceling (bsc#1188917)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630851" comment="nodejs12-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630852" comment="nodejs12-devel-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630853" comment="nodejs12-docs-12.22.5-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630854" comment="npm12-12.22.5-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111250" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009403.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- CVE-2021-3672: Fixed missing input validation on hostnames (bsc#1188881).
- CVE-2021-22930: Fixed use after free on close http2 on stream canceling (bsc#1188917).
- CVE-2021-22939: Fixed incomplete validation of rejectUnauthorized parameter (bsc#1189369).
- CVE-2021-22931: Fixed improper handling of untypical characters in domain names (bsc#1189370).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-03"/>
	<updated date="2021-09-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631155" comment="nodejs10-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631156" comment="nodejs10-devel-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631157" comment="nodejs10-docs-10.24.1-1.39.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631158" comment="npm10-10.24.1-1.39.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111251" version="1" class="patch">
	<metadata>
		<title>Security update for php7-pear (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189591" ref_url="https://bugzilla.suse.com/1189591" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-36193" ref_url="https://www.suse.com/security/cve/CVE-2020-36193/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009434.html" source="SUSE-SU"/>
		<description>
This update for php7-pear fixes the following issues:

- CVE-2020-36193: Fixed Archive_Tar directory traversal due to inadequate checking of symbolic links (bsc#1189591).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-13"/>
	<updated date="2021-09-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189591">SUSE bug 1189591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-36193/">CVE-2020-36193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632020" comment="php7-pear-1.10.21-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632021" comment="php7-pecl-1.10.21-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111252" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188881" ref_url="https://bugzilla.suse.com/1188881" source="BUGZILLA"/>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="1189368" ref_url="https://bugzilla.suse.com/1189368" source="BUGZILLA"/>
		<reference ref_id="1189369" ref_url="https://bugzilla.suse.com/1189369" source="BUGZILLA"/>
		<reference ref_id="1189370" ref_url="https://bugzilla.suse.com/1189370" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="CVE-2021-22931" ref_url="https://www.suse.com/security/cve/CVE-2021-22931/" source="CVE"/>
		<reference ref_id="CVE-2021-22939" ref_url="https://www.suse.com/security/cve/CVE-2021-22939/" source="CVE"/>
		<reference ref_id="CVE-2021-22940" ref_url="https://www.suse.com/security/cve/CVE-2021-22940/" source="CVE"/>
		<reference ref_id="CVE-2021-3672" ref_url="https://www.suse.com/security/cve/CVE-2021-3672/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009498.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-3672: Fixed missing input validation on hostnames (bsc#1188881).
- CVE-2021-22931: Fixed improper handling of untypical characters in domain names (bsc#1189370).
- CVE-2021-22940: Use after free on close http2 on stream canceling (bsc#1189368)
- CVE-2021-22939: Incomplete validation of rejectUnauthorized parameter (bsc#1189369)
- CVE-2021-22930: Fixed use after free on close http2 on stream canceling (bsc#1188917). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188881">SUSE bug 1188881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189368">SUSE bug 1189368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189369">SUSE bug 1189369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189370">SUSE bug 1189370</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22931/">CVE-2021-22931</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22939/">CVE-2021-22939</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22940/">CVE-2021-22940</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3672/">CVE-2021-3672</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633327" comment="nodejs14-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633328" comment="nodejs14-devel-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633329" comment="nodejs14-docs-14.17.5-5.15.5 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633330" comment="npm14-14.17.5-5.15.5 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111253" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188917" ref_url="https://bugzilla.suse.com/1188917" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22930" ref_url="https://www.suse.com/security/cve/CVE-2021-22930/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009535.html" source="SUSE-SU"/>
		<description>

nodejs8 was updated to fix the following security issues:

- CVE-2021-22930: http2: fixes use after free on close in stream canceling (bsc#1188917)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188917">SUSE bug 1188917</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-22930/">CVE-2021-22930</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634437" comment="nodejs8-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634438" comment="nodejs8-devel-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634439" comment="nodejs8-docs-8.17.0-10.15.11 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634440" comment="npm8-8.17.0-10.15.11 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111254" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188278" ref_url="https://bugzilla.suse.com/1188278" source="BUGZILLA"/>
		<reference ref_id="1188279" ref_url="https://bugzilla.suse.com/1188279" source="BUGZILLA"/>
		<reference ref_id="1190558" ref_url="https://bugzilla.suse.com/1190558" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30640" ref_url="https://www.suse.com/security/cve/CVE-2021-30640/" source="CVE"/>
		<reference ref_id="CVE-2021-33037" ref_url="https://www.suse.com/security/cve/CVE-2021-33037/" source="CVE"/>
		<reference ref_id="CVE-2021-41079" ref_url="https://www.suse.com/security/cve/CVE-2021-41079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009732.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-30640: Escape parameters in JNDI Realm queries (bsc#1188279).
- CVE-2021-33037: Process T-E header from both HTTP 1.0 and HTTP 1.1. clients (bsc#1188278).
- CVE-2021-41079: Fixed a denial of service caused by an unexpected TLS packet (bsc#1190558).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-16"/>
	<updated date="2021-11-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188278">SUSE bug 1188278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188279">SUSE bug 1188279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190558">SUSE bug 1190558</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30640/">CVE-2021-30640</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33037/">CVE-2021-33037</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41079/">CVE-2021-41079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009653657" comment="tomcat-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653658" comment="tomcat-admin-webapps-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653659" comment="tomcat-el-3_0-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653660" comment="tomcat-jsp-2_3-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653661" comment="tomcat-lib-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653662" comment="tomcat-servlet-4_0-api-9.0.36-13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653663" comment="tomcat-webapps-9.0.36-13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111255" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190053" ref_url="https://bugzilla.suse.com/1190053" source="BUGZILLA"/>
		<reference ref_id="1190054" ref_url="https://bugzilla.suse.com/1190054" source="BUGZILLA"/>
		<reference ref_id="1190055" ref_url="https://bugzilla.suse.com/1190055" source="BUGZILLA"/>
		<reference ref_id="1190056" ref_url="https://bugzilla.suse.com/1190056" source="BUGZILLA"/>
		<reference ref_id="1190057" ref_url="https://bugzilla.suse.com/1190057" source="BUGZILLA"/>
		<reference ref_id="1191601" ref_url="https://bugzilla.suse.com/1191601" source="BUGZILLA"/>
		<reference ref_id="1191602" ref_url="https://bugzilla.suse.com/1191602" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713/" source="CVE"/>
		<reference ref_id="CVE-2021-39134" ref_url="https://www.suse.com/security/cve/CVE-2021-39134/" source="CVE"/>
		<reference ref_id="CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009853.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- CVE-2021-22959: Fixed HTTP Request Smuggling due to spaced in headers (bsc#1191601).
- CVE-2021-22960: Fixed HTTP Request Smuggling when parsing the body (bsc#1191602).
- CVE-2021-37701: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190057). 
- CVE-2021-37712: Fixed arbitrary file creation and overwrite in nodejs-tar (bsc#1190056). 
- CVE-2021-37713: Fixed arbitrary code execution and file creation and overwrite in nodejs-tar (bsc#1190055). 
- CVE-2021-39134: Fixed symling following vulnerability in nodejs-arborist (bsc#1190054). 
- CVE-2021-39135: Fixed symling following vulnerability in nodejs-arborist (bsc#1190053). 
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190053">SUSE bug 1190053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190054">SUSE bug 1190054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190055">SUSE bug 1190055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190056">SUSE bug 1190056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190057">SUSE bug 1190057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39134/">CVE-2021-39134</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658598" comment="nodejs12-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658599" comment="nodejs12-devel-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658600" comment="nodejs12-docs-12.22.7-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658601" comment="npm12-12.22.7-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111256" version="1" class="patch">
	<metadata>
		<title>Recommended update for php7 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1175508" ref_url="https://bugzilla.suse.com/1175508" source="BUGZILLA"/>
		<reference ref_id="1192050" ref_url="https://bugzilla.suse.com/1192050" source="BUGZILLA"/>
		<reference ref_id="1193041" ref_url="https://bugzilla.suse.com/1193041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21703" ref_url="https://www.suse.com/security/cve/CVE-2021-21703/" source="CVE"/>
		<reference ref_id="CVE-2021-21707" ref_url="https://www.suse.com/security/cve/CVE-2021-21707/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009845.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21703: Fixed local privilege escalation via PHP-FPM (bsc#1192050).
- CVE-2021-21707: Fixed special character breaks path in xml parsing (bsc#1193041).

- Added patch to prevent memory access violation in php7 when running test suite (bsc#1175508)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175508">SUSE bug 1175508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192050">SUSE bug 1192050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193041">SUSE bug 1193041</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-21703/">CVE-2021-21703</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-21707/">CVE-2021-21707</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658547" comment="apache2-mod_php7-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658548" comment="php7-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658549" comment="php7-bcmath-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658550" comment="php7-bz2-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658551" comment="php7-calendar-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658552" comment="php7-ctype-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658553" comment="php7-curl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658554" comment="php7-dba-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658555" comment="php7-devel-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658556" comment="php7-dom-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658557" comment="php7-enchant-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658558" comment="php7-exif-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658559" comment="php7-fastcgi-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658560" comment="php7-fileinfo-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658561" comment="php7-fpm-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658562" comment="php7-ftp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658563" comment="php7-gd-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658564" comment="php7-gettext-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658565" comment="php7-gmp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658566" comment="php7-iconv-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658567" comment="php7-intl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658568" comment="php7-json-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658569" comment="php7-ldap-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658570" comment="php7-mbstring-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658571" comment="php7-mysql-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658572" comment="php7-odbc-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658573" comment="php7-opcache-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658574" comment="php7-openssl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658575" comment="php7-pcntl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658576" comment="php7-pdo-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658577" comment="php7-pgsql-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658578" comment="php7-phar-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658579" comment="php7-posix-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658580" comment="php7-readline-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658581" comment="php7-shmop-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658582" comment="php7-snmp-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658583" comment="php7-soap-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658584" comment="php7-sockets-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658585" comment="php7-sodium-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658586" comment="php7-sqlite-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658587" comment="php7-sysvmsg-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658588" comment="php7-sysvsem-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658589" comment="php7-sysvshm-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658590" comment="php7-tidy-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658591" comment="php7-tokenizer-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658592" comment="php7-xmlreader-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658593" comment="php7-xmlrpc-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658594" comment="php7-xmlwriter-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658595" comment="php7-xsl-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658596" comment="php7-zip-7.4.6-3.29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658597" comment="php7-zlib-7.4.6-3.29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111257" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1190053" ref_url="https://bugzilla.suse.com/1190053" source="BUGZILLA"/>
		<reference ref_id="1190054" ref_url="https://bugzilla.suse.com/1190054" source="BUGZILLA"/>
		<reference ref_id="1190055" ref_url="https://bugzilla.suse.com/1190055" source="BUGZILLA"/>
		<reference ref_id="1190056" ref_url="https://bugzilla.suse.com/1190056" source="BUGZILLA"/>
		<reference ref_id="1190057" ref_url="https://bugzilla.suse.com/1190057" source="BUGZILLA"/>
		<reference ref_id="1191601" ref_url="https://bugzilla.suse.com/1191601" source="BUGZILLA"/>
		<reference ref_id="1191602" ref_url="https://bugzilla.suse.com/1191602" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22959" ref_url="https://www.suse.com/security/cve/CVE-2021-22959/" source="CVE"/>
		<reference ref_id="CVE-2021-22960" ref_url="https://www.suse.com/security/cve/CVE-2021-22960/" source="CVE"/>
		<reference ref_id="CVE-2021-37701" ref_url="https://www.suse.com/security/cve/CVE-2021-37701/" source="CVE"/>
		<reference ref_id="CVE-2021-37712" ref_url="https://www.suse.com/security/cve/CVE-2021-37712/" source="CVE"/>
		<reference ref_id="CVE-2021-37713" ref_url="https://www.suse.com/security/cve/CVE-2021-37713/" source="CVE"/>
		<reference ref_id="CVE-2021-39134" ref_url="https://www.suse.com/security/cve/CVE-2021-39134/" source="CVE"/>
		<reference ref_id="CVE-2021-39135" ref_url="https://www.suse.com/security/cve/CVE-2021-39135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009869.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

nodejs14 was updated to 14.18.1:

* deps: update llhttp to 2.1.4

  - HTTP Request Smuggling due to spaced in headers (bsc#1191601, CVE-2021-22959)
  - HTTP Request Smuggling when parsing the body (bsc#1191602, CVE-2021-22960)

Changes in 14.18.0:

  * buffer:

    + introduce Blob
    + add base64url encoding option

  * child_process:

    + allow options.cwd receive a URL
    + add timeout to spawn and fork
    + allow promisified exec to be cancel
    + add 'overlapped' stdio flag

  * dns: add 'tries' option to Resolve options
  * fs:

    + allow empty string for temp directory prefix
    + allow no-params fsPromises fileHandle read
    + add support for async iterators to fsPromises.writeFile

  * http2: add support for sensitive headers
  * process: add 'worker' event
  * tls: allow reading data into a static buffer
  * worker: add setEnvironmentData/getEnvironmentData

Changes in 14.17.6

  * deps: upgrade npm to 6.14.15 which fixes a number of
    security issues
    (bsc#1190057, CVE-2021-37701, bsc#1190056, CVE-2021-37712,
     bsc#1190055, CVE-2021-37713, bsc#1190054, CVE-2021-39134,
     bsc#1190053, CVE-2021-39135)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-07"/>
	<updated date="2021-12-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190053">SUSE bug 1190053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190054">SUSE bug 1190054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190055">SUSE bug 1190055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190056">SUSE bug 1190056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190057">SUSE bug 1190057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191601">SUSE bug 1191601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191602">SUSE bug 1191602</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22959/">CVE-2021-22959</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-22960/">CVE-2021-22960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37701/">CVE-2021-37701</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37712/">CVE-2021-37712</cve>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-37713/">CVE-2021-37713</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39134/">CVE-2021-39134</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39135/">CVE-2021-39135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009658791" comment="nodejs14-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658792" comment="nodejs14-devel-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658793" comment="nodejs14-docs-14.18.1-15.21.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658794" comment="npm14-14.18.1-15.21.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111258" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179602" ref_url="https://bugzilla.suse.com/1179602" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17527" ref_url="https://www.suse.com/security/cve/CVE-2020-17527/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008159.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issue:

- CVE-2020-17527: Fixed a HTTP/2 request header mix-up (bsc#1179602).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-07"/>
	<updated date="2021-01-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179602">SUSE bug 1179602</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17527/">CVE-2020-17527</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501280" comment="tomcat-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501281" comment="tomcat-admin-webapps-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501282" comment="tomcat-el-3_0-api-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501283" comment="tomcat-jsp-2_3-api-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501284" comment="tomcat-lib-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501285" comment="tomcat-servlet-4_0-api-9.0.36-3.18.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501286" comment="tomcat-webapps-9.0.36-3.18.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111259" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182049" ref_url="https://bugzilla.suse.com/1182049" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21702" ref_url="https://www.suse.com/security/cve/CVE-2021-21702/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008338.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21702 [bsc#1182049]: NULL pointer dereference in SoapClient
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-17"/>
	<updated date="2021-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182049">SUSE bug 1182049</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-21702/">CVE-2021-21702</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501287" comment="apache2-mod_php7-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501288" comment="php7-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501289" comment="php7-bcmath-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501290" comment="php7-bz2-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501291" comment="php7-calendar-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501292" comment="php7-ctype-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501293" comment="php7-curl-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501294" comment="php7-dba-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501295" comment="php7-devel-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501296" comment="php7-dom-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501297" comment="php7-enchant-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501298" comment="php7-exif-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501299" comment="php7-fastcgi-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501300" comment="php7-fileinfo-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501301" comment="php7-fpm-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501302" comment="php7-ftp-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501303" comment="php7-gd-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501304" comment="php7-gettext-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501305" comment="php7-gmp-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501306" comment="php7-iconv-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501307" comment="php7-intl-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501308" comment="php7-json-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501309" comment="php7-ldap-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501310" comment="php7-mbstring-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501311" comment="php7-mysql-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501312" comment="php7-odbc-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501313" comment="php7-opcache-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501314" comment="php7-openssl-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501315" comment="php7-pcntl-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501316" comment="php7-pdo-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501317" comment="php7-pgsql-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501318" comment="php7-phar-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501319" comment="php7-posix-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501320" comment="php7-readline-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501321" comment="php7-shmop-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501322" comment="php7-snmp-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501323" comment="php7-soap-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501324" comment="php7-sockets-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501325" comment="php7-sodium-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501326" comment="php7-sqlite-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501327" comment="php7-sysvmsg-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501328" comment="php7-sysvsem-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501329" comment="php7-sysvshm-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501330" comment="php7-tidy-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501331" comment="php7-tokenizer-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501332" comment="php7-xmlreader-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501333" comment="php7-xmlrpc-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501334" comment="php7-xmlwriter-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501335" comment="php7-xsl-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501336" comment="php7-zip-7.4.6-3.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501337" comment="php7-zlib-7.4.6-3.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111260" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1180947" ref_url="https://bugzilla.suse.com/1180947" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-24122" ref_url="https://www.suse.com/security/cve/CVE-2021-24122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0531-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008349.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

- CVE-2021-24122: Fixed an information disclosure if resources are served from the NTFS file system (bsc#1180947).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-19"/>
	<updated date="2021-02-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1180947">SUSE bug 1180947</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-24122/">CVE-2021-24122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501338" comment="tomcat-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501339" comment="tomcat-admin-webapps-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501340" comment="tomcat-el-3_0-api-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501341" comment="tomcat-jsp-2_3-api-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501342" comment="tomcat-lib-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501343" comment="tomcat-servlet-4_0-api-9.0.36-3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501344" comment="tomcat-webapps-9.0.36-3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111261" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="1180553" ref_url="https://bugzilla.suse.com/1180553" source="BUGZILLA"/>
		<reference ref_id="1180554" ref_url="https://bugzilla.suse.com/1180554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008169.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

- New upstream LTS version 10.23.1:
  * CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS
    implementation. When writing to a TLS enabled socket,
    node::StreamBase::Write calls node::TLSWrap::DoWrite with
    a freshly allocated WriteWrap object as first argument.
    If the DoWrite method does not return an error, this object is
    passed back to the caller as part of a StreamWriteResult structure.
    This may be exploited to corrupt memory leading to a
    Denial of Service or potentially other exploits (bsc#1180553)
  * CVE-2020-8287: HTTP Request Smuggling allow two copies of a
    header field in a http request. For example, two Transfer-Encoding
    header fields. In this case Node.js identifies the first header
    field and ignores the second. This can lead to HTTP Request
    Smuggling (https://cwe.mitre.org/data/definitions/444.html).
    (bsc#1180554)
  * CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference
    (High) This is a vulnerability in OpenSSL which may be exploited
    through Node.js. (bsc#1179491)

- New upstream LTS version 10.23.0:
  * deps: upgrade npm to 6.14.8
  * n-api:
    + create N-API version 7
    + expose napi_build_version variable
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-11"/>
	<updated date="2021-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501083" comment="nodejs10-10.23.1-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501084" comment="nodejs10-devel-10.23.1-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501085" comment="nodejs10-docs-10.23.1-1.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501086" comment="npm10-10.23.1-1.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111262" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178882" ref_url="https://bugzilla.suse.com/1178882" source="BUGZILLA"/>
		<reference ref_id="1180553" ref_url="https://bugzilla.suse.com/1180553" source="BUGZILLA"/>
		<reference ref_id="1180554" ref_url="https://bugzilla.suse.com/1180554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008166.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- New upstream LTS version 14.15.4:
  * CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS
    implementation. When writing to a TLS enabled socket,
    node::StreamBase::Write calls node::TLSWrap::DoWrite with
    a freshly allocated WriteWrap object as first argument.
    If the DoWrite method does not return an error, this object is
    passed back to the caller as part of a StreamWriteResult structure.
    This may be exploited to corrupt memory leading to a
    Denial of Service or potentially other exploits (bsc#1180553)
  * CVE-2020-8287: HTTP Request Smuggling allow two copies of a
    header field in a http request. For example, two Transfer-Encoding
    header fields. In this case Node.js identifies the first header
    field and ignores the second. This can lead to HTTP Request
    Smuggling (https://cwe.mitre.org/data/definitions/444.html).
    (bsc#1180554)

- New upstream LTS version 14.15.3:
  * deps:
    + upgrade npm to 6.14.9
    + update acorn to v8.0.4
  * http2: check write not scheduled in scope destructor
  * stream: fix regression on duplex end

- New upstream LTS version 14.15.1:
  * deps: Denial of Service through DNS request (High).
  A Node.js application that allows an attacker to trigger a DNS
  request for a host of their choice could trigger a Denial of Service
  by getting the application to resolve a DNS record with
  a larger number of responses (bsc#1178882, CVE-2020-8277)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-11"/>
	<updated date="2021-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501345" comment="nodejs14-14.15.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501346" comment="nodejs14-devel-14.15.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501347" comment="nodejs14-docs-14.15.4-5.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501348" comment="npm14-14.15.4-5.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111263" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178882" ref_url="https://bugzilla.suse.com/1178882" source="BUGZILLA"/>
		<reference ref_id="1179491" ref_url="https://bugzilla.suse.com/1179491" source="BUGZILLA"/>
		<reference ref_id="1180553" ref_url="https://bugzilla.suse.com/1180553" source="BUGZILLA"/>
		<reference ref_id="1180554" ref_url="https://bugzilla.suse.com/1180554" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1971" ref_url="https://www.suse.com/security/cve/CVE-2020-1971/" source="CVE"/>
		<reference ref_id="CVE-2020-8265" ref_url="https://www.suse.com/security/cve/CVE-2020-8265/" source="CVE"/>
		<reference ref_id="CVE-2020-8277" ref_url="https://www.suse.com/security/cve/CVE-2020-8277/" source="CVE"/>
		<reference ref_id="CVE-2020-8287" ref_url="https://www.suse.com/security/cve/CVE-2020-8287/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008168.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

- New upstream LTS version 12.20.1:
  * CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS
    implementation. When writing to a TLS enabled socket,
    node::StreamBase::Write calls node::TLSWrap::DoWrite with
    a freshly allocated WriteWrap object as first argument.
    If the DoWrite method does not return an error, this object is
    passed back to the caller as part of a StreamWriteResult structure.
    This may be exploited to corrupt memory leading to a
    Denial of Service or potentially other exploits (bsc#1180553)
  * CVE-2020-8287: HTTP Request Smuggling allow two copies of a
    header field in a http request. For example, two Transfer-Encoding
    header fields. In this case Node.js identifies the first header
    field and ignores the second. This can lead to HTTP Request
    Smuggling (https://cwe.mitre.org/data/definitions/444.html).
    (bsc#1180554)
  * CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference
    (High) This is a vulnerability in OpenSSL which may be exploited
    through Node.js. (bsc#1179491)

- New upstream LTS version 12.20.0:
  * deps:
    + update llhttp '2.1.2' -&gt; '2.1.3'
    + update uv '1.39.0' -&gt; '1.40.0'
    + update uvwasi '0.0.10' -&gt; '0.0.11'
  * fs: add .ref() and .unref() methods to watcher classes
  * http: added scheduling option to http agent
  * module:
    + exports pattern support
    + named exports for CJS via static analysis
  * n-api: add more property defaults (gh#35214)

- New upstream LTS version 12.19.1:
  * deps: Denial of Service through DNS request (High).
  A Node.js application that allows an attacker to trigger a DNS
  request for a host of their choice could trigger a Denial of Service
  by getting the application to resolve a DNS record with
  a larger number of responses (bsc#1178882, CVE-2020-8277)

- New upstream LTS version 12.19.0:
  * crypto: add randomInt function
  * deps:
    + upgrade to libuv 1.39.0
    + deps: upgrade npm to 6.14.7
    + deps: upgrade to libuv 1.38.1
  * doc: deprecate process.umask() with no arguments
  * module:
    + package 'imports' field
    + module: deprecate module.parent
  * n-api: create N-API version 7
  * zlib: switch to lazy init for zlib streams
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-11"/>
	<updated date="2021-01-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178882">SUSE bug 1178882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179491">SUSE bug 1179491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180553">SUSE bug 1180553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180554">SUSE bug 1180554</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-1971/">CVE-2020-1971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8265/">CVE-2020-8265</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-8277/">CVE-2020-8277</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-8287/">CVE-2020-8287</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501349" comment="nodejs12-12.20.1-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501350" comment="nodejs12-devel-12.20.1-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501351" comment="nodejs12-docs-12.20.1-4.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501352" comment="npm12-12.20.1-4.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111264" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182619" ref_url="https://bugzilla.suse.com/1182619" source="BUGZILLA"/>
		<reference ref_id="1182620" ref_url="https://bugzilla.suse.com/1182620" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008395.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- New upstream LTS version 14.16.0:
  * CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion (bsc#1182619)
  * CVE-2021-22884: DNS rebinding in --inspect (bsc#1182620)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182619">SUSE bug 1182619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501353" comment="nodejs14-14.16.0-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501354" comment="nodejs14-devel-14.16.0-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501355" comment="nodejs14-docs-14.16.0-5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501356" comment="npm14-14.16.0-5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111265" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="1182619" ref_url="https://bugzilla.suse.com/1182619" source="BUGZILLA"/>
		<reference ref_id="1182620" ref_url="https://bugzilla.suse.com/1182620" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0651-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008392.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:

New upstream LTS version 12.21.0:

- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion (bsc#1182619)
- CVE-2021-22884: DNS rebinding in --inspect (bsc#1182620)
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate (bsc#1182333)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-26"/>
	<updated date="2021-02-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182619">SUSE bug 1182619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501357" comment="nodejs12-12.21.0-4.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501358" comment="nodejs12-devel-12.21.0-4.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501359" comment="nodejs12-docs-12.21.0-4.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501360" comment="npm12-12.21.0-4.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111266" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs10 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182333" ref_url="https://bugzilla.suse.com/1182333" source="BUGZILLA"/>
		<reference ref_id="1182619" ref_url="https://bugzilla.suse.com/1182619" source="BUGZILLA"/>
		<reference ref_id="1182620" ref_url="https://bugzilla.suse.com/1182620" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22883" ref_url="https://www.suse.com/security/cve/CVE-2021-22883/" source="CVE"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="CVE-2021-23840" ref_url="https://www.suse.com/security/cve/CVE-2021-23840/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008416.html" source="SUSE-SU"/>
		<description>
This update for nodejs10 fixes the following issues:

New upstream LTS version 10.24.0:

- CVE-2021-22883: HTTP2 'unknownProtocol' cause Denial of Service by resource exhaustion (bsc#1182619)
- CVE-2021-22884: DNS rebinding in --inspect (bsc#1182620)
- CVE-2021-23840: OpenSSL - Integer overflow in CipherUpdate (bsc#1182333)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182333">SUSE bug 1182333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182619">SUSE bug 1182619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22883/">CVE-2021-22883</cve>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-23840/">CVE-2021-23840</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501361" comment="nodejs10-10.24.0-1.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501362" comment="nodejs10-devel-10.24.0-1.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501363" comment="nodejs10-docs-10.24.0-1.33.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501364" comment="npm10-10.24.0-1.33.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111267" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Module for Web Scripting 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Storage 7</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182620" ref_url="https://bugzilla.suse.com/1182620" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22884" ref_url="https://www.suse.com/security/cve/CVE-2021-22884/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008419.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-22884: DNS rebinding in --inspect (bsc#1182620)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-02"/>
	<updated date="2021-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182620">SUSE bug 1182620</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-22884/">CVE-2021-22884</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:ses:7</cpe>
		<cpe>cpe:/o:suse:sle-module-web-scripting:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009285093" comment="SUSE Linux Enterprise Module for Web Scripting 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302786" comment="SUSE Linux Enterprise Storage 7 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501365" comment="nodejs8-8.17.0-10.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501366" comment="nodejs8-devel-8.17.0-10.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501367" comment="nodejs8-docs-8.17.0-10.9.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501368" comment="npm8-8.17.0-10.9.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111268" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1132091" ref_url="https://bugzilla.suse.com/1132091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-11023" ref_url="https://www.suse.com/security/cve/CVE-2019-11023/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:1267-3" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007119.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

Security issue fixed:

- CVE-2019-11023: Fixed a denial of service vulnerability, which was caused by a NULL pointer dereference in agroot() (bsc#1132091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1132091">SUSE bug 1132091</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-11023/">CVE-2019-11023</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501417" comment="graphviz-gd-2.40.1-6.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501418" comment="graphviz-python-2.40.1-6.3.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111269" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172175" ref_url="https://bugzilla.suse.com/1172175" source="BUGZILLA"/>
		<reference ref_id="1172176" ref_url="https://bugzilla.suse.com/1172176" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11076" ref_url="https://www.suse.com/security/cve/CVE-2020-11076/" source="CVE"/>
		<reference ref_id="CVE-2020-11077" ref_url="https://www.suse.com/security/cve/CVE-2020-11077/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007132.html" source="SUSE-SU"/>
		<description>
This update for rubygem-puma to version 4.3.5 fixes the following issues:

- CVE-2020-11077: Fixed a HTTP smuggling issue related to proxy usage (bsc#1172175).
- CVE-2020-11076: Fixed a HTTP smuggling issue when using an invalid transfer-encoding header (bsc#1172176).
- Disabled TLSv1.0 and TLSv1.1 (jsc#SLE-6965).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172175">SUSE bug 1172175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172176">SUSE bug 1172176</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11076/">CVE-2020-11076</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-11077/">CVE-2020-11077</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501474" comment="ruby2.5-rubygem-puma-4.3.5-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111270" version="1" class="patch">
	<metadata>
		<title>Security update for ldb, samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1141320" ref_url="https://bugzilla.suse.com/1141320" source="BUGZILLA"/>
		<reference ref_id="1162680" ref_url="https://bugzilla.suse.com/1162680" source="BUGZILLA"/>
		<reference ref_id="1169095" ref_url="https://bugzilla.suse.com/1169095" source="BUGZILLA"/>
		<reference ref_id="1169521" ref_url="https://bugzilla.suse.com/1169521" source="BUGZILLA"/>
		<reference ref_id="1169850" ref_url="https://bugzilla.suse.com/1169850" source="BUGZILLA"/>
		<reference ref_id="1169851" ref_url="https://bugzilla.suse.com/1169851" source="BUGZILLA"/>
		<reference ref_id="1171437" ref_url="https://bugzilla.suse.com/1171437" source="BUGZILLA"/>
		<reference ref_id="1172307" ref_url="https://bugzilla.suse.com/1172307" source="BUGZILLA"/>
		<reference ref_id="1173159" ref_url="https://bugzilla.suse.com/1173159" source="BUGZILLA"/>
		<reference ref_id="1173160" ref_url="https://bugzilla.suse.com/1173160" source="BUGZILLA"/>
		<reference ref_id="1173161" ref_url="https://bugzilla.suse.com/1173161" source="BUGZILLA"/>
		<reference ref_id="1173359" ref_url="https://bugzilla.suse.com/1173359" source="BUGZILLA"/>
		<reference ref_id="1174120" ref_url="https://bugzilla.suse.com/1174120" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-10700" ref_url="https://www.suse.com/security/cve/CVE-2020-10700/" source="CVE"/>
		<reference ref_id="CVE-2020-10704" ref_url="https://www.suse.com/security/cve/CVE-2020-10704/" source="CVE"/>
		<reference ref_id="CVE-2020-10730" ref_url="https://www.suse.com/security/cve/CVE-2020-10730/" source="CVE"/>
		<reference ref_id="CVE-2020-10745" ref_url="https://www.suse.com/security/cve/CVE-2020-10745/" source="CVE"/>
		<reference ref_id="CVE-2020-10760" ref_url="https://www.suse.com/security/cve/CVE-2020-10760/" source="CVE"/>
		<reference ref_id="CVE-2020-14303" ref_url="https://www.suse.com/security/cve/CVE-2020-14303/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007145.html" source="SUSE-SU"/>
		<description>
This update for ldb, samba fixes the following issues:

Changes in samba:
- Update to samba 4.11.11
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ
    and VLV combined; (bso#14364); (bsc#1173159]
  + CVE-2020-10745: invalid DNS or NBT queries containing dots use
    several seconds of CPU each; (bso#14378); (bsc#1173160).
  + CVE-2020-10760: Use-after-free in AD DC Global Catalog LDAP
    server with paged_result or VLV; (bso#14402); (bsc#1173161)
  + CVE-2020-14303: Endless loop from empty UDP packet sent to
    AD DC nbt_server; (bso#14417); (bsc#1173359).
- Update to samba 4.11.10
  + Fix segfault when using SMBC_opendir_ctx() routine for share
    folder that contains incorrect symbols in any file name;
    (bso#14374).
  + vfs_shadow_copy2 doesn't fail case looking in
    snapdirseverywhere mode; (bso#14350)
  + ldb_ldap: Fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + Malicous SMB1 server can crash libsmbclient; (bso#14366)
  + winbindd: Fix a use-after-free when winbind clients exit;
    (bso#14382)
  + ldb: Bump version to 2.0.11, LMDB databases can grow without
    bounds. (bso#14330)
- Update to samba 4.11.9
  + nmblib: Avoid undefined behaviour in handle_name_ptrs();
    (bso#14242).
  + 'samba-tool group' commands do not handle group names with
    special chars correctly; (bso#14296).
  + smbd: avoid calling vfs_file_id_from_sbuf() if statinfo
    is not valid; (bso#14237).
  + Missing check for DMAPI offline status in async DOS
    attributes; (bso#14293).
  + smbd: Ignore set NTACL requests which contain
    S-1-5-88 NFS ACEs; (bso#14307).
  + vfs_recycle: Prevent flooding the log if we're called on
    non-existant paths; (bso#14316)
  + smbd mistakenly updates a file's write-time on close;
    (bso#14320).
  + RPC handles cannot be differentiated in source3 RPC server;
    (bso#14359).
  + librpc: Fix IDL for svcctl_ChangeServiceConfigW; (bso#14313).
  + nsswitch: Fix use-after-free causing segfault in
    _pam_delete_cred; (bso#14327).
  + Fix fruit:time machine max size on arm; (bso#13622)
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294).
  + ctdb: Fix a memleak; (bso#14348).
  + libsmb: Don't try to find posix stat info in SMBC_getatr().
  + ctdb-tcp: Move free of inbound queue to TCP restart;
    (bso#14295); (bsc#1162680).
  + s3/librpc/crypto: Fix double free with unresolved
    credential cache; (bso#14344); (bsc#1169095)
  + s3:libads: Fix ads_get_upn(); (bso#14336).
  + CTDB recovery corner cases can cause record resurrection
    and node banning; (bso#14294)
  + Starting ctdb node that was powered off hard before
    results in recovery loop; (bso#14295); (bsc#1162680).
  + ctdb-recoverd: Avoid dereferencing NULL rec-&gt;nodemap;
    (bso#14324)
- Update to samba 4.11.8
  + CVE-2020-10700: Use-after-free in Samba AD DC LDAP
    Server with ASQ; (bso#14331); (bsc#1169850);
  + CVE-2020-10704: LDAP Denial of Service (stack overflow)
    in Samba AD DC; (bso#14334); (bsc#1169851);
- Update to samba 4.11.7
  + s3: lib: nmblib. Clean up and harden nmb packet
    processing; (bso#14239).
  + s3: VFS: full_audit. Use system session_info if called
    from a temporary share definition; (bso#14283)
  + dsdb: Correctly handle memory in objectclass_attrs;
    (bso#14258).
  + ldb: version 2.0.9, Samba 4.11 and later give incorrect
    results for SCOPE_ONE searches; (bso#14270)
  + auth: Fix CIDs 1458418 and 1458420 Null pointer
    dereferences; (bso#14247).
  + smbd: Handle EINTR from open(2) properly; (bso#14285)
  + winbind member (source3) fails local SAM auth with empty
    domain name; (bso#14247)
  + winbindd: Handling missing idmap in getgrgid(); (bso#14265).
  + lib:util: Log mkdir error on correct debug levels;
    (bso#14253).
  + wafsamba: Do not use 'rU' as the 'U' is deprecated in
    Python 3.9; (bso#14266).
  + ctdb-tcp: Make error handling for outbound connection
    consistent; (bso#14274).
- Update to samba 4.11.6
  + pygpo: Use correct method flags; (bso#14209).
  + vfs_ceph_snapshots: Fix root relative path handling;
    (bso#14216); (bsc#1141320).
  + Avoiding bad call flags with python 3.8, using METH_NOARGS
    instead of zero; (bso#14209).
  + source4/utils/oLschema2ldif: Include stdint.h before
    cmocka.h; (bso#14218).
  + docs-xml/winbindnssinfo: Clarify interaction with
    idmap_ad etc; (bso#14122).
  + smbd: Fix the build with clang; (bso#14251).
  + upgradedns: Ensure lmdb lock files linked; (bso#14199).
  + s3: VFS: glusterfs: Reset nlinks for symlink entries during
    readdir; (bso#14182).
  + smbc_stat() doesn't return the correct st_mode and also
    the uid/gid is not filled (SMBv1) file; (bso#14101).
  + librpc: Fix string length checking in
    ndr_pull_charset_to_null(); (bso#14219).
  + ctdb-scripts: Strip square brackets when gathering
    connection info; (bso#14227).

- Add libnetapi-devel to baselibs conf, for wine usage; (bsc#1172307);

- Installing: samba - samba-ad-dc.service does not exist and unit
  not found; (bsc#1171437);

- Fix samba_winbind package is installing python3-base without
  python3 package; (bsc#1169521);

Changes in ldb:
- Update to version 2.0.12
  + CVE-2020-10730: NULL de-reference in AD DC LDAP server
    when ASQ and VLV combined; (bso#14364); (bsc#1173159).
  + ldb_ldap: fix off-by-one increment in lldb_add_msg_attr;
    (bso#14413).
  + lib/ldb: add unit test for ldb_ldap internal code.
- Update to version 2.0.11
  + lib ldb: lmdb init var before calling mdb_reader_check.
  + lib ldb: lmdb clear stale readers on write txn start;
    (bso#14330).
  + ldb tests: Confirm lmdb free list handling
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-17"/>
	<updated date="2020-07-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1141320">SUSE bug 1141320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162680">SUSE bug 1162680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169095">SUSE bug 1169095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169521">SUSE bug 1169521</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169850">SUSE bug 1169850</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169851">SUSE bug 1169851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171437">SUSE bug 1171437</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172307">SUSE bug 1172307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173159">SUSE bug 1173159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173160">SUSE bug 1173160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173161">SUSE bug 1173161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173359">SUSE bug 1173359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174120">SUSE bug 1174120</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10700/">CVE-2020-10700</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10704/">CVE-2020-10704</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10730/">CVE-2020-10730</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10745/">CVE-2020-10745</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10760/">CVE-2020-10760</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14303/">CVE-2020-14303</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501667" comment="ctdb-4.11.11+git.180.2cf3b203f07-4.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111271" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501668" comment="cluster-md-kmp-default-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501669" comment="dlm-kmp-default-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501670" comment="gfs2-kmp-default-5.3.18-24.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501671" comment="ocfs2-kmp-default-5.3.18-24.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111272" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501672" comment="cluster-md-kmp-default-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501673" comment="dlm-kmp-default-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501674" comment="gfs2-kmp-default-5.3.18-24.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501675" comment="ocfs2-kmp-default-5.3.18-24.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111273" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501676" comment="cluster-md-kmp-default-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501677" comment="dlm-kmp-default-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501678" comment="gfs2-kmp-default-5.3.18-24.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501679" comment="ocfs2-kmp-default-5.3.18-24.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111274" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172177" ref_url="https://bugzilla.suse.com/1172177" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8164" ref_url="https://www.suse.com/security/cve/CVE-2020-8164/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007453.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

- CVE-2020-8164: Possible Strong Parameters Bypass in ActionPack.
  There is a strong parameters bypass vector in ActionPack.
  (bsc#1172177)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-22"/>
	<updated date="2020-09-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172177">SUSE bug 1172177</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8164/">CVE-2020-8164</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501487" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111275" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1176579" ref_url="https://bugzilla.suse.com/1176579" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-1472" ref_url="https://www.suse.com/security/cve/CVE-2020-1472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2730-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007469.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- ZeroLogon: An elevation of privilege was possible with some non default configurations when an attacker established
 a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC) 
 (CVE-2020-1472, bsc#1176579).

- Update to samba 4.11.13
  + s3: libsmb: Fix SMB2 client rename bug to a Windows server; (bso#14403);
  + dsdb: Allow 'password hash userPassword schemes = CryptSHA256' to work
    on RHEL7; (bso#14424);
  + dbcheck: Allow a dangling forward link outside our known NCs; (bso#14450);
  + lib/debug: Set the correct default backend loglevel to MAX_DEBUG_LEVEL;
    (bso#14426);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + lib/util: do not install 'test_util_paths'; (bso#14370);
  + lib:util: Fix smbclient -l basename dir; (bso#14345);
  + s3:smbd: PANIC: assert failed in get_lease_type(); (bso#14428);
  + util: Allow symlinks in directory_create_or_exist; (bso#14166);
  + docs: Fix documentation for require_membership_of of pam_winbind;
    (bso#14358);
  + s3:winbind:idmap_ad: Make failure to get attrnames for schema mode fatal;
    (bso#14425);
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-23"/>
	<updated date="2020-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176579">SUSE bug 1176579</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-1472/">CVE-2020-1472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501680" comment="ctdb-4.11.13+git.189.e9bd318cd13-4.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111276" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501681" comment="cluster-md-kmp-default-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501682" comment="dlm-kmp-default-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501683" comment="gfs2-kmp-default-5.3.18-24.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501684" comment="ocfs2-kmp-default-5.3.18-24.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111277" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activesupport-5_1 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1172186" ref_url="https://bugzilla.suse.com/1172186" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-8165" ref_url="https://www.suse.com/security/cve/CVE-2020-8165/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007539.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activesupport-5_1 fixes the following issues:

- CVE-2020-8165: Fixed deserialization of untrusted data in MemCacheStore potentially resulting in remote code execution (bsc#1172186)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1172186">SUSE bug 1172186</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-8165/">CVE-2020-8165</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501489" comment="ruby2.5-rubygem-activesupport-5_1-5.1.4-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111278" version="1" class="patch">
	<metadata>
		<title>Security update for crmsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1163581" ref_url="https://bugzilla.suse.com/1163581" source="BUGZILLA"/>
		<reference ref_id="1176569" ref_url="https://bugzilla.suse.com/1176569" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2020:2913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007549.html" source="SUSE-SU"/>
		<description>
This update for crmsh fixes the following issues:

- Fixed start_delay with start-delay(bsc#1176569)
- fix on_fail should be on-fail(bsc#1176569)
- config: Try to handle configparser.MissingSectionHeaderError while reading config file
- ui_configure: Obscure sensitive data by default(bsc#1163581)	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163581">SUSE bug 1163581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176569">SUSE bug 1176569</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501685" comment="crmsh-4.2.0+git.1602225426.5f84efb5-5.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501686" comment="crmsh-scripts-4.2.0+git.1602225426.5f84efb5-5.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111279" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501687" comment="cluster-md-kmp-default-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501688" comment="dlm-kmp-default-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501689" comment="gfs2-kmp-default-5.3.18-24.29.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501690" comment="ocfs2-kmp-default-5.3.18-24.29.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111280" version="1" class="patch">
	<metadata>
		<title>Security update for pacemaker (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1167171" ref_url="https://bugzilla.suse.com/1167171" source="BUGZILLA"/>
		<reference ref_id="1173668" ref_url="https://bugzilla.suse.com/1173668" source="BUGZILLA"/>
		<reference ref_id="1175557" ref_url="https://bugzilla.suse.com/1175557" source="BUGZILLA"/>
		<reference ref_id="1177916" ref_url="https://bugzilla.suse.com/1177916" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25654" ref_url="https://www.suse.com/security/cve/CVE-2020-25654/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007630.html" source="SUSE-SU"/>
		<description>
This update for pacemaker fixes the following issues:

Update to 2.0.4:

- based: use crm_exit to free qb-logging
- cibsecret: don't use pssh -q option unless supported
- crm_error: use g_free for a proper match
- crm_mon: NULL output-pointer when buffer is freed
- crm_resource: avoid unnecessary issus with dynamic allocation
- crm_ticket: avoid unnecessary issues with dynamic allocation
- executor: restrict certain IPC requests to Pacemaker daemons (CVE-2020-25654, bsc#1177916)
- fencer: avoid infinite loop if device is removed during operation
- fencer: restrict certain IPC requests to privileged users (CVE-2020-25654, bsc#1177916)
- libcrmcommon: free basename after setting prgname
- libcrmcommon: return ENOMEM directly instead of errno
- libpe_status: Modify filtering of inactive resources.
- libreplace: closedir when bailing out dir traversal
- move bcond_with/without up front for e.g. pcmk_release
- pacemakerd: ignore shutdown requests from unprivileged users (CVE-2020-25654, bsc#1177916)
- resources: attribute name parameter doesn't have to be unique
- rpm: add spec option for enabling CIB secrets
- rpm: put user-configurable items at top of spec
- rpm: use the user/group ID 90 for haclient/hacluster to be consistent with cluster-glue (bsc#1167171)
- scheduler: Add the node name back to bundle instances.
- silence some false positives static analysis stumbled over
- tools: check resource separately from managing parameter in cibsecret
- tools: free IPC memory after closing connection
- tools: improve cibsecret help
- tools: verify newly created CIB connection is not NULL
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-27"/>
	<updated date="2020-10-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1167171">SUSE bug 1167171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173668">SUSE bug 1173668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175557">SUSE bug 1175557</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177916">SUSE bug 1177916</bugzilla>
	<cve impact="important" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25654/">CVE-2020-25654</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501691" comment="libpacemaker-devel-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501692" comment="libpacemaker3-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501693" comment="pacemaker-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501694" comment="pacemaker-cli-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501695" comment="pacemaker-cts-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501696" comment="pacemaker-remote-2.0.4+20200616.2deceaa3a-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111281" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1173902" ref_url="https://bugzilla.suse.com/1173902" source="BUGZILLA"/>
		<reference ref_id="1173994" ref_url="https://bugzilla.suse.com/1173994" source="BUGZILLA"/>
		<reference ref_id="1177613" ref_url="https://bugzilla.suse.com/1177613" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14318" ref_url="https://www.suse.com/security/cve/CVE-2020-14318/" source="CVE"/>
		<reference ref_id="CVE-2020-14323" ref_url="https://www.suse.com/security/cve/CVE-2020-14323/" source="CVE"/>
		<reference ref_id="CVE-2020-14383" ref_url="https://www.suse.com/security/cve/CVE-2020-14383/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007659.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

Update to samba 4.11.14

- CVE-2020-14383: An authenticated user can crash the DCE/RPC DNS with easily crafted records (bsc#1177613).
- CVE-2020-14323: Unprivileged user can crash winbind (bsc#1173994).
- CVE-2020-14318: Missing permissions check in SMB1/2/3 ChangeNotify (bsc#1173902).
- lib/util: Do not install /usr/bin/test_util
- smbd: don't log success as error
- idmap_ad does not deal properly with a RFC4511 section 4.4.1 response;
- winbind: Fix a memleak
- idmap_ad: Pass tldap debug messages on to DEBUG()
- lib/replace: Move lib/replace/closefrom.c from ROKEN_HOSTCC_SOURCE to REPLACE_HOSTCC_SOURCE
- ctdb disable/enable can fail due to race condition
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173902">SUSE bug 1173902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173994">SUSE bug 1173994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177613">SUSE bug 1177613</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14318/">CVE-2020-14318</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14323/">CVE-2020-14323</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14383/">CVE-2020-14383</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501697" comment="ctdb-4.11.14+git.202.344b137b75d-4.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111282" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501698" comment="cluster-md-kmp-default-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501699" comment="dlm-kmp-default-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501700" comment="gfs2-kmp-default-5.3.18-24.34.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501701" comment="ocfs2-kmp-default-5.3.18-24.34.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111283" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501702" comment="cluster-md-kmp-default-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501703" comment="dlm-kmp-default-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501704" comment="gfs2-kmp-default-5.3.18-24.37.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501705" comment="ocfs2-kmp-default-5.3.18-24.37.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111284" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501706" comment="cluster-md-kmp-default-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501707" comment="dlm-kmp-default-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501708" comment="gfs2-kmp-default-5.3.18-24.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501709" comment="ocfs2-kmp-default-5.3.18-24.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111285" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501710" comment="cluster-md-kmp-default-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501711" comment="dlm-kmp-default-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501712" comment="gfs2-kmp-default-5.3.18-24.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501713" comment="ocfs2-kmp-default-5.3.18-24.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111286" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501714" comment="cluster-md-kmp-default-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501715" comment="dlm-kmp-default-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501716" comment="gfs2-kmp-default-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501717" comment="ocfs2-kmp-default-5.3.18-24.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111287" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1178469" ref_url="https://bugzilla.suse.com/1178469" source="BUGZILLA"/>
		<reference ref_id="1179156" ref_url="https://bugzilla.suse.com/1179156" source="BUGZILLA"/>
		<reference ref_id="1183572" ref_url="https://bugzilla.suse.com/1183572" source="BUGZILLA"/>
		<reference ref_id="1183574" ref_url="https://bugzilla.suse.com/1183574" source="BUGZILLA"/>
		<reference ref_id="1184310" ref_url="https://bugzilla.suse.com/1184310" source="BUGZILLA"/>
		<reference ref_id="1184677" ref_url="https://bugzilla.suse.com/1184677" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27840" ref_url="https://www.suse.com/security/cve/CVE-2020-27840/" source="CVE"/>
		<reference ref_id="CVE-2021-20254" ref_url="https://www.suse.com/security/cve/CVE-2021-20254/" source="CVE"/>
		<reference ref_id="CVE-2021-20277" ref_url="https://www.suse.com/security/cve/CVE-2021-20277/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008709.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-20277: Fixed an out of bounds read in ldb_handler_fold (bsc#1183574).
- CVE-2021-20254: Fixed a buffer overrun in sids_to_unixids() (bsc#1184677).
- CVE-2020-27840: Fixed an unauthenticated remote heap corruption via bad DNs (bsc#1183572).
- Avoid free'ing our own pointer in memcache when memcache_trim attempts to reduce cache size (bsc#1179156).
- s3-libads: use dns name to open a ldap session (bsc#1184310).
- Adjust smbcacls '--propagate-inheritance' feature to align with upstream (bsc#1178469).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178469">SUSE bug 1178469</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179156">SUSE bug 1179156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183572">SUSE bug 1183572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183574">SUSE bug 1183574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184310">SUSE bug 1184310</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184677">SUSE bug 1184677</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27840/">CVE-2020-27840</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-20254/">CVE-2021-20254</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20277/">CVE-2021-20277</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501718" comment="ctdb-4.11.14+git.247.8c858f7ee14-4.19.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111288" version="1" class="patch">
	<metadata>
		<title>Security update for drbd-utils (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185132" ref_url="https://bugzilla.suse.com/1185132" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:1561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008755.html" source="SUSE-SU"/>
		<description>
This update for drbd-utils fixes the following issues:

- make all binaries in position independent (bsc#1185132).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-11"/>
	<updated date="2021-05-11"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1185132">SUSE bug 1185132</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501719" comment="drbd-utils-9.13.0-3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111289" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501720" comment="cluster-md-kmp-default-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501721" comment="dlm-kmp-default-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501722" comment="gfs2-kmp-default-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501723" comment="ocfs2-kmp-default-5.3.18-24.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111290" version="1" class="patch">
	<metadata>
		<title>Security update for graphviz (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185833" ref_url="https://bugzilla.suse.com/1185833" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-18032" ref_url="https://www.suse.com/security/cve/CVE-2020-18032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-May/018980.html" source="SUSE-SU"/>
		<description>
This update for graphviz fixes the following issues:

- CVE-2020-18032: Fixed possible remote code execution via buffer overflow (bsc#1185833).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-19"/>
	<updated date="2021-05-19"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185833">SUSE bug 1185833</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-18032/">CVE-2020-18032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501511" comment="graphviz-gd-2.40.1-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501512" comment="graphviz-python-2.40.1-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111291" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-actionpack-5_1 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1185715" ref_url="https://bugzilla.suse.com/1185715" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22885" ref_url="https://www.suse.com/security/cve/CVE-2021-22885/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008839.html" source="SUSE-SU"/>
		<description>
This update for rubygem-actionpack-5_1 fixes the following issues:

- CVE-2021-22885: Fixed possible information disclosure / unintended method execution in Action Pack (bsc#1185715).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-26"/>
	<updated date="2021-05-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185715">SUSE bug 1185715</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-22885/">CVE-2021-22885</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501513" comment="ruby2.5-rubygem-actionpack-5_1-5.1.4-3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111292" version="1" class="patch">
	<metadata>
		<title>Security update for csync2 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1147137" ref_url="https://bugzilla.suse.com/1147137" source="BUGZILLA"/>
		<reference ref_id="1147139" ref_url="https://bugzilla.suse.com/1147139" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-15522" ref_url="https://www.suse.com/security/cve/CVE-2019-15522/" source="CVE"/>
		<reference ref_id="CVE-2019-15523" ref_url="https://www.suse.com/security/cve/CVE-2019-15523/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008934.html" source="SUSE-SU"/>
		<description>
This update for csync2 fixes the following issues:

- CVE-2019-15522: Fixed an issue where daemon fails to enforce TLS (bsc#1147137)
- CVE-2019-15523: Fixed an incorrect TLS handshake error handling (bsc#1147139)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1147137">SUSE bug 1147137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1147139">SUSE bug 1147139</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-15522/">CVE-2019-15522</cve>
	<cve impact="moderate" cvss3="2.6/CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2019-15523/">CVE-2019-15523</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501514" comment="csync2-2.0+git.1461714863.10636a4-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111293" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501724" comment="cluster-md-kmp-default-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501725" comment="dlm-kmp-default-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501726" comment="gfs2-kmp-default-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501727" comment="ocfs2-kmp-default-5.3.18-24.67.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111294" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179998" ref_url="https://bugzilla.suse.com/1179998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35458" ref_url="https://www.suse.com/security/cve/CVE-2020-35458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008242.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following issues:

hawk2 was updated to version 2.4.0+git.1611141202.2fe6369e.

Security issue fixed:

- Fixed another possible code execution vulnerability in the controller code (bsc#1179998).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-22"/>
	<updated date="2021-01-22"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1179998">SUSE bug 1179998</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35458/">CVE-2020-35458</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501515" comment="hawk2-2.4.0+git.1611141202.2fe6369e-3.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111295" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624288" comment="cluster-md-kmp-default-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624289" comment="dlm-kmp-default-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624290" comment="gfs2-kmp-default-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624291" comment="ocfs2-kmp-default-5.3.18-24.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111296" version="1" class="patch">
	<metadata>
		<title>Security update for crmsh (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1163460" ref_url="https://bugzilla.suse.com/1163460" source="BUGZILLA"/>
		<reference ref_id="1175982" ref_url="https://bugzilla.suse.com/1175982" source="BUGZILLA"/>
		<reference ref_id="1179999" ref_url="https://bugzilla.suse.com/1179999" source="BUGZILLA"/>
		<reference ref_id="1184465" ref_url="https://bugzilla.suse.com/1184465" source="BUGZILLA"/>
		<reference ref_id="1185423" ref_url="https://bugzilla.suse.com/1185423" source="BUGZILLA"/>
		<reference ref_id="1187553" ref_url="https://bugzilla.suse.com/1187553" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-July/019664.html" source="SUSE-SU"/>
		<description>
This update for crmsh fixes the following issues:

Update to version 4.3.1+20210624.67223df2:

- Fix: ocfs2: Skip verifying UUID for ocfs2 device on top of raid or lvm on the join node (bsc#1187553)
- Fix: history: use Path.mkdir instead of mkdir command(bsc#1179999, CVE-2020-35459)
- Dev: crash_test: Add big warnings to have users' attention to potential failover(jsc#SLE-17979)
- Dev: crash_test: rename preflight_check as crash_test(jsc#SLE-17979)
- Fix: bootstrap: update sbd watchdog timeout when using diskless SBD with qdevice(bsc#1184465)
- Dev: utils: allow configure link-local ipv6 address(bsc#1163460)
- Fix: parse: shouldn't allow property setting with an empty value(bsc#1185423)
- Fix: help: show help message from argparse(bsc#1175982)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1163460">SUSE bug 1163460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175982">SUSE bug 1175982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184465">SUSE bug 1184465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185423">SUSE bug 1185423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187553">SUSE bug 1187553</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624130" comment="crmsh-4.3.1+20210702.4e0ee8fb-5.59.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624131" comment="crmsh-scripts-4.3.1+20210702.4e0ee8fb-5.59.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111297" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625999" comment="cluster-md-kmp-default-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626000" comment="dlm-kmp-default-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626001" comment="gfs2-kmp-default-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626002" comment="ocfs2-kmp-default-5.3.18-24.75.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111298" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-nokogiri (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1146578" ref_url="https://bugzilla.suse.com/1146578" source="BUGZILLA"/>
		<reference ref_id="1156722" ref_url="https://bugzilla.suse.com/1156722" source="BUGZILLA"/>
		<reference ref_id="1180507" ref_url="https://bugzilla.suse.com/1180507" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-5477" ref_url="https://www.suse.com/security/cve/CVE-2019-5477/" source="CVE"/>
		<reference ref_id="CVE-2020-26247" ref_url="https://www.suse.com/security/cve/CVE-2020-26247/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008258.html" source="SUSE-SU"/>
		<description>
This update for rubygem-nokogiri fixes the following issues:
  
rubygem-nokogiri was updated to 1.8.5 (bsc#1156722).

Security issues fixed:

- CVE-2019-5477: Fixed a command injection vulnerability (bsc#1146578).
- CVE-2020-26247: Fixed an XXE vulnerability in Nokogiri::XML::Schema (bsc#1180507).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1146578">SUSE bug 1146578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156722">SUSE bug 1156722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180507">SUSE bug 1180507</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-5477/">CVE-2019-5477</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26247/">CVE-2020-26247</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501518" comment="ruby2.5-rubygem-nokogiri-1.8.5-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111299" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627896" comment="cluster-md-kmp-default-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627897" comment="dlm-kmp-default-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627898" comment="gfs2-kmp-default-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627899" comment="ocfs2-kmp-default-5.3.18-24.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111300" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189366" ref_url="https://bugzilla.suse.com/1189366" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2021:2773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009309.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- Fixes HAProxy vulnerabilities on H2 (bsc#1189366).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-18"/>
	<updated date="2021-08-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189366">SUSE bug 1189366</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630857" comment="haproxy-2.0.14-11.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111301" version="1" class="patch">
	<metadata>
		<title>Security update for haproxy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189877" ref_url="https://bugzilla.suse.com/1189877" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-40346" ref_url="https://www.suse.com/security/cve/CVE-2021-40346/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009421.html" source="SUSE-SU"/>
		<description>
This update for haproxy fixes the following issues:

- CVE-2021-40346: Fixed request smuggling vulnerability in HTX (bsc#1189877).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1189877">SUSE bug 1189877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-40346/">CVE-2021-40346</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632571" comment="haproxy-2.0.14-11.11.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111302" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633331" comment="cluster-md-kmp-default-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633332" comment="dlm-kmp-default-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633333" comment="gfs2-kmp-default-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633334" comment="ocfs2-kmp-default-5.3.18-24.83.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111303" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652150" comment="cluster-md-kmp-default-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652151" comment="dlm-kmp-default-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652152" comment="gfs2-kmp-default-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652153" comment="ocfs2-kmp-default-5.3.18-24.86.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111304" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501730" comment="cluster-md-kmp-default-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501731" comment="dlm-kmp-default-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501732" comment="gfs2-kmp-default-5.3.18-24.49.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501733" comment="ocfs2-kmp-default-5.3.18-24.49.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111305" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-activerecord-5_1 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1182169" ref_url="https://bugzilla.suse.com/1182169" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22880" ref_url="https://www.suse.com/security/cve/CVE-2021-22880/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009706.html" source="SUSE-SU"/>
		<description>
This update for rubygem-activerecord-5_1 fixes the following issues:

- CVE-2021-22880: Fixed possible DoS vector in PostgreSQL money type (bsc#1182169).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-09"/>
	<updated date="2021-11-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182169">SUSE bug 1182169</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-22880/">CVE-2021-22880</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652336" comment="ruby2.5-rubygem-activerecord-5_1-5.1.4-5.3.3 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111306" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1014440" ref_url="https://bugzilla.suse.com/1014440" source="BUGZILLA"/>
		<reference ref_id="1192214" ref_url="https://bugzilla.suse.com/1192214" source="BUGZILLA"/>
		<reference ref_id="1192284" ref_url="https://bugzilla.suse.com/1192284" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-2124" ref_url="https://www.suse.com/security/cve/CVE-2016-2124/" source="CVE"/>
		<reference ref_id="CVE-2020-25717" ref_url="https://www.suse.com/security/cve/CVE-2020-25717/" source="CVE"/>
		<reference ref_id="CVE-2021-23192" ref_url="https://www.suse.com/security/cve/CVE-2021-23192/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3650-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009714.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2016-2124: Fixed not to fallback to non spnego authentication if we require kerberos (bsc#1014440).
- CVE-2020-25717: Fixed privilege escalation inside an AD Domain where a user could become root on domain members (bsc#1192284).
- CVE-2021-23192: Fixed dcerpc requests to don't check all fragments against the first auth_state (bsc#1192214).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-10"/>
	<updated date="2021-11-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1014440">SUSE bug 1014440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192214">SUSE bug 1192214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192284">SUSE bug 1192284</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2124/">CVE-2016-2124</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25717/">CVE-2020-25717</cve>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23192/">CVE-2021-23192</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009654903" comment="ctdb-4.11.14+git.308.666c63d4eea-4.28.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111307" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655919" comment="cluster-md-kmp-default-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655920" comment="dlm-kmp-default-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655921" comment="gfs2-kmp-default-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655922" comment="ocfs2-kmp-default-5.3.18-24.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111308" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657499" comment="cluster-md-kmp-default-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657500" comment="dlm-kmp-default-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657501" comment="gfs2-kmp-default-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657502" comment="ocfs2-kmp-default-5.3.18-24.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111309" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501734" comment="cluster-md-kmp-default-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501735" comment="dlm-kmp-default-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501736" comment="gfs2-kmp-default-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501737" comment="ocfs2-kmp-default-5.3.18-24.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111310" version="1" class="patch">
	<metadata>
		<title>Security update for crmsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1154927" ref_url="https://bugzilla.suse.com/1154927" source="BUGZILLA"/>
		<reference ref_id="1178454" ref_url="https://bugzilla.suse.com/1178454" source="BUGZILLA"/>
		<reference ref_id="1178869" ref_url="https://bugzilla.suse.com/1178869" source="BUGZILLA"/>
		<reference ref_id="1179999" ref_url="https://bugzilla.suse.com/1179999" source="BUGZILLA"/>
		<reference ref_id="1180126" ref_url="https://bugzilla.suse.com/1180126" source="BUGZILLA"/>
		<reference ref_id="1180137" ref_url="https://bugzilla.suse.com/1180137" source="BUGZILLA"/>
		<reference ref_id="1180571" ref_url="https://bugzilla.suse.com/1180571" source="BUGZILLA"/>
		<reference ref_id="1180688" ref_url="https://bugzilla.suse.com/1180688" source="BUGZILLA"/>
		<reference ref_id="1181415" ref_url="https://bugzilla.suse.com/1181415" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="CVE-2021-3020" ref_url="https://www.suse.com/security/cve/CVE-2021-3020/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008489.html" source="SUSE-SU"/>
		<description>
This update for crmsh fixes the following issues:

- Update to version 4.3.0+20210305.9db5c9a8:
  * Fix: bootstrap: Adjust qdevice configure/remove process to avoid race condition due to quorum lost(bsc#1181415)
  * Dev: cibconfig: remove related code about detecting crm_diff support --no-verion
  * Fix: ui_configure: raise error when params not exist(bsc#1180126)
  * Dev: doc: remove doc for crm node status
  * Dev: ui_node: remove status subcommand

- Update to version 4.3.0+20210219.5d1bf034:
  * Fix: hb_report: walk through hb_report process under hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Fix: bootstrap: setup authorized ssh access for hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Dev: analyze: Add analyze sublevel and put preflight_check in it(jsc#ECO-1658)
  * Dev: utils: change default file mod as 644 for str2file function
  * Dev: hb_report: Detect if any ocfs2 partitions exist
  * Dev: lock: give more specific error message when raise ClaimLockError
  * Fix: Replace mktemp() to mkstemp() for security
  * Fix: Remove the duplicate --cov-report html in tox.
  * Fix: fix some lint issues.
  * Fix: Replace utils.msg_info to task.info
  * Fix: Solve a circular import error of utils.py
  * Fix: hb_report: run lsof with specific ocfs2 device(bsc#1180688)
  * Dev: corosync: change the permission of corosync.conf to 644
  * Fix: preflight_check: task: raise error when report_path isn't a directory
  * Fix: bootstrap: Use class Watchdog to simplify watchdog config(bsc#1154927, bsc#1178869)
  * Dev: Polish the sbd feature.
  * Dev: Replace -f with -c and run check when no parameter provide.
  * Fix: Fix the yes option not working
  * Fix: Remove useless import and show help when no input.
  * Dev: Correct SBD device id inconsistenc during ASR
  * Fix: completers: return complete start/stop resource id list correctly(bsc#1180137)
  * Dev: Makefile.am: change makefile to integrate preflight_check
  * Medium: integrate preflight_check into crmsh(jsc#ECO-1658)
  * Fix: bootstrap: make sure sbd device UUID was the same between nodes(bsc#1178454)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-12"/>
	<updated date="2021-03-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1154927">SUSE bug 1154927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178454">SUSE bug 1178454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178869">SUSE bug 1178869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180126">SUSE bug 1180126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180137">SUSE bug 1180137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180571">SUSE bug 1180571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180688">SUSE bug 1180688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181415">SUSE bug 1181415</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3020/">CVE-2021-3020</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501738" comment="crmsh-4.3.0+20210305.9db5c9a8-5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501739" comment="crmsh-scripts-4.3.0+20210305.9db5c9a8-5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111311" version="1" class="patch">
	<metadata>
		<title>Security update for crmsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179999" ref_url="https://bugzilla.suse.com/1179999" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008178.html" source="SUSE-SU"/>
		<description>
This update for crmsh fixes the following issue:

- CVE-2020-35459: Fixed a privilege escalation in hawk_invoke (bsc#1179999).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009501740" comment="crmsh-4.2.0+git.1607075079.a25648d8-5.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501741" comment="crmsh-scripts-4.2.0+git.1607075079.a25648d8-5.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111312" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179998" ref_url="https://bugzilla.suse.com/1179998" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35458" ref_url="https://www.suse.com/security/cve/CVE-2020-35458/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008179.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following security issue:

- CVE-2020-35458: Fixed an insufficient input handler that could have led to remote code execution (bsc#1179998).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-12"/>
	<updated date="2021-01-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179998">SUSE bug 1179998</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35458/">CVE-2020-35458</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501531" comment="hawk2-2.3.0+git.1603969748.10468582-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111313" version="1" class="patch">
	<metadata>
		<title>Security update for hawk2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179999" ref_url="https://bugzilla.suse.com/1179999" source="BUGZILLA"/>
		<reference ref_id="1182165" ref_url="https://bugzilla.suse.com/1182165" source="BUGZILLA"/>
		<reference ref_id="1182166" ref_url="https://bugzilla.suse.com/1182166" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-35459" ref_url="https://www.suse.com/security/cve/CVE-2020-35459/" source="CVE"/>
		<reference ref_id="CVE-2021-25314" ref_url="https://www.suse.com/security/cve/CVE-2021-25314/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008543.html" source="SUSE-SU"/>
		<description>
This update for hawk2 fixes the following issues:

- Update to version 2.6.3:
  * Remove hawk_invoke and use capture3 instead of runas (bsc#1179999)(CVE-2020-35459)
  * Remove unnecessary chmod (bsc#1182166)(CVE-2021-25314) 
  * Sanitize filename to contains whitelist of alphanumeric (bsc#1182165)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179999">SUSE bug 1179999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182165">SUSE bug 1182165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182166">SUSE bug 1182166</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35459/">CVE-2020-35459</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25314/">CVE-2021-25314</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009501532" comment="hawk2-2.6.3+git.1614684118.af555ad9-3.27.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111314" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679173" comment="cluster-md-kmp-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679174" comment="dlm-kmp-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679175" comment="gfs2-kmp-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679176" comment="ocfs2-kmp-default-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111315" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664527" comment="cluster-md-kmp-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664528" comment="dlm-kmp-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664529" comment="gfs2-kmp-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664530" comment="ocfs2-kmp-default-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111316" version="1" class="patch">
	<metadata>
		<title>Security update for rubygem-puma (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1188527" ref_url="https://bugzilla.suse.com/1188527" source="BUGZILLA"/>
		<reference ref_id="1191681" ref_url="https://bugzilla.suse.com/1191681" source="BUGZILLA"/>
		<reference ref_id="1196222" ref_url="https://bugzilla.suse.com/1196222" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29509" ref_url="https://www.suse.com/security/cve/CVE-2021-29509/" source="CVE"/>
		<reference ref_id="CVE-2021-41136" ref_url="https://www.suse.com/security/cve/CVE-2021-41136/" source="CVE"/>
		<reference ref_id="CVE-2022-23634" ref_url="https://www.suse.com/security/cve/CVE-2022-23634/" source="CVE"/>
		<description>
This update for rubygem-puma fixes the following issues:

rubygem-puma was updated to version 4.3.11:

* CVE-2021-29509: Adjusted an incomplete fix for  allows Denial of Service (DoS) (bsc#1188527)
* CVE-2021-41136: Fixed request smuggling if HTTP header value contains the LF character (bsc#1191681)
* CVE-2022-23634: Fixed information leak between requests (bsc#1196222)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188527">SUSE bug 1188527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191681">SUSE bug 1191681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196222">SUSE bug 1196222</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29509/">CVE-2021-29509</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-41136/">CVE-2021-41136</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23634/">CVE-2022-23634</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680815" comment="ruby2.5-rubygem-puma-4.3.11-150000.3.6.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111317" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665451" comment="ctdb-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111318" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667476" comment="cluster-md-kmp-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667477" comment="dlm-kmp-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667478" comment="gfs2-kmp-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667479" comment="ocfs2-kmp-default-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111319" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Availability 15 SP2</platform>
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Manager Proxy 4.1</platform>
			<platform>SUSE Manager Retail Branch Server 4.1</platform>
			<platform>SUSE Manager Server 4.1</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-ha:15:sp2</cpe>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
		<cpe>cpe:/o:suse:suse-manager-proxy:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-retail-branch-server:4.1</cpe>
		<cpe>cpe:/o:suse:suse-manager-server:4.1</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009287170" comment="SUSE Linux Enterprise High Availability 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302537" comment="SUSE Manager Proxy 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009346072" comment="SUSE Manager Retail Branch Server 4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009302605" comment="SUSE Manager Server 4.1 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671442" comment="cluster-md-kmp-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671443" comment="dlm-kmp-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671444" comment="gfs2-kmp-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671445" comment="ocfs2-kmp-default-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111320" version="1" class="patch">
	<metadata>
		<title>Security update for slurm_20_11 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2</platform>
		</affected>
		<reference ref_id="1180700" ref_url="https://bugzilla.suse.com/1180700" source="BUGZILLA"/>
		<reference ref_id="1185603" ref_url="https://bugzilla.suse.com/1185603" source="BUGZILLA"/>
		<reference ref_id="1186024" ref_url="https://bugzilla.suse.com/1186024" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31215" ref_url="https://www.suse.com/security/cve/CVE-2021-31215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009122.html" source="SUSE-SU"/>
		<description>
This update for slurm_20_11 fixes the following issues:

Updated to 20.11.7 

Summary of new features:

* CVE-2021-31215: Fixed a remote code execution as SlurmUser (bsc#1186024).
* slurmd - handle configless failures gracefully instead of hanging indefinitely.
* select/cons_tres - fix Dragonfly topology not selecting nodes in the same
  leaf switch when it should as well as requests with *-switches option.
* Fix issue where certain step requests wouldn't run if the first node in the
  job allocation was full and there were idle resources on other nodes in
  the job allocation.
* Fix deadlock issue with &lt;Prolog|Epilog&gt;Slurmctld.
* torque/qstat - fix printf error message in output.
* When adding associations or wckeys avoid checking multiple times a user or cluster name.
* Fix wrong jobacctgather information on a step on multiple nodes
  due to timeouts sending its the information gathered on its node.
* Fix missing xstrdup which could result in slurmctld segfault on array jobs.
* Fix security issue in PrologSlurmctld and EpilogSlurmctld by always
  prepending SPANK_ to all user-set environment variables. CVE-2021-31215.
* Fix sacct assert with the --qos option.
* Use pkg-config --atleast-version instead of --modversion for systemd.
* common/fd - fix getsockopt() call in fd_get_socket_error().
* Properly handle the return from fd_get_socket_error() in _conn_readable().
* cons_res - Fix issue where running jobs were not taken into consideration
  when creating a reservation.
* Avoid a deadlock between job_list for_each and assoc QOS_LOCK.
* Fix TRESRunMins usage for partition qos on restart/reconfig.
* Fix printing of number of tasks on a completed job that didn't request tasks.
* Fix updating GrpTRESRunMins when decrementing job time is bigger than it.
* Make it so we handle multithreaded allocations correctly when doing
  --exclusive or --core-spec allocations.
* Fix incorrect round-up division in _pick_step_cores
* Use appropriate math to adjust cpu counts when --ntasks-per-core=1.
* cons_tres - Fix consideration of power downed nodes.
* cons_tres - Fix DefCpuPerGPU, increase cpus-per-task to match with
  gpus-per-task * cpus-per-gpu.
* Fix under-cpu memory auto-adjustment when MaxMemPerCPU is set.
* Make it possible to override CR_CORE_DEFAULT_DIST_BLOCK.
* Perl API - fix retrieving/storing of slurm_step_id_t in job_step_info_t.
* Recover state of burst buffers when slurmctld is restarted to avoid skipping
  burst buffer stages.
* Fix race condition in burst buffer plugin which caused a burst buffer
  in stage-in to not get state saved if slurmctld stopped.
* auth/jwt - print an error if jwt_file= has not been set in slurmdbd.
* Fix RESV_DEL_HOLD not being a valid state when using squeue --states.
* Add missing squeue selectable states in valid states error message.
* Fix scheduling last array task multiple times on error, causing segfault.
* Fix issue where a step could be allocated more memory than the job when
  dealing with --mem-per-cpu and --threads-per-core.
* Fix removing qos from assoc with -= can lead to assoc with no qos
* auth/jwt - fix segfault on invalid credential in slurmdbd due to
  missing validate_slurm_user() function in context.
* Fix single Port= not being applied to range of nodes in slurm.conf
* Fix Jobs not requesting a tres are not starting because of that tres limit.
* acct_gather_energy/rapl - fix AveWatts calculation.
* job_container/tmpfs - Fix issues with cleanup and slurmd restarting on
  running jobs.
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-12"/>
	<updated date="2021-07-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180700">SUSE bug 1180700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185603">SUSE bug 1185603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186024">SUSE bug 1186024</bugzilla>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-31215/">CVE-2021-31215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009479728" comment="SUSE Linux Enterprise High Performance Computing 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009496914" comment="libnss_slurm2_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496915" comment="libpmi0_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496916" comment="libslurm36-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496917" comment="perl-slurm_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496918" comment="slurm_20_11-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496919" comment="slurm_20_11-auth-none-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496920" comment="slurm_20_11-config-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496921" comment="slurm_20_11-config-man-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496922" comment="slurm_20_11-devel-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496923" comment="slurm_20_11-doc-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496924" comment="slurm_20_11-lua-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496925" comment="slurm_20_11-munge-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496926" comment="slurm_20_11-node-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496927" comment="slurm_20_11-pam_slurm-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496928" comment="slurm_20_11-plugins-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496929" comment="slurm_20_11-slurmdbd-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496930" comment="slurm_20_11-sql-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496931" comment="slurm_20_11-sview-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496932" comment="slurm_20_11-torque-20.11.7-6.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009496933" comment="slurm_20_11-webdoc-20.11.7-6.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111321" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661010" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661011" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661012" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111322" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659809" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659810" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659811" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659812" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659813" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111323" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661008" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661009" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111324" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661006" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661007" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111325" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676860" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676861" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676862" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111326" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674246" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674247" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674248" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674249" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674250" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111327" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010015.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663320" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663321" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111328" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677322" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677323" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677324" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677326" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677327" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677329" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677330" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677331" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677332" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677333" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677334" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111329" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676997" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676998" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676999" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677000" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677001" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111330" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677336" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677337" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677338" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677339" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111331" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678651" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678652" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678653" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678654" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111332" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677295" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677296" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111333" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678060" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678061" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678062" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678063" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678064" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678065" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678066" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678067" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678068" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111334" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677340" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677341" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677342" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677343" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677344" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677345" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677346" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677347" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111335" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679181" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679182" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679183" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679184" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111336" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679185" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679187" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679188" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679189" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679190" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679191" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111337" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678467" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678468" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678461" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111338" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678655" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678656" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678639" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111339" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679194" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679198" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679199" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679200" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679202" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111340" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678657" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678658" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111341" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677921" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677922" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677923" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111342" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679850" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679851" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679852" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679853" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679854" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679856" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679857" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679858" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679859" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679860" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111343" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111344" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679483" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679484" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111345" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679723" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679724" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111346" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111347" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111348" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111349" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680285" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680286" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680287" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680288" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111350" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679488" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111351" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663736" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663741" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111352" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663742" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663743" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663744" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663745" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111353" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681178" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681179" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111354" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680346" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680347" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680348" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680349" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680350" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680351" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680352" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111355" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681183" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681184" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681185" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111356" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681180" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681181" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681182" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111357" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664168" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111358" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664308" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664309" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664310" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111359" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664060" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664061" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111360" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664311" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664312" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664313" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664314" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664315" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664316" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664317" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111361" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664166" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664167" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111362" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664559" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664560" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664561" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664562" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111363" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664565" comment="kernel-default-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664566" comment="kernel-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664567" comment="kernel-docs-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664568" comment="kernel-macros-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664569" comment="kernel-obs-build-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664570" comment="kernel-preempt-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664571" comment="kernel-preempt-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664572" comment="kernel-source-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664573" comment="kernel-syms-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111364" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111365" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678578" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111366" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111367" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680331" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680332" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111368" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680334" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680335" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680336" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680337" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111369" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665610" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665612" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665613" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665614" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665615" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665617" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665618" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665619" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665621" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665622" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665624" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665625" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665627" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665629" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665630" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665632" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665633" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665635" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665636" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665638" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665639" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665641" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665642" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665644" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665645" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665646" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665647" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665648" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665650" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665651" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665653" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665654" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665655" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665656" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665658" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665659" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665661" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665662" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665664" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665665" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665667" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665668" comment="samba-ad-dc-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665669" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665670" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665671" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665672" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665673" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665675" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665676" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665677" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111370" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667500" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667504" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667505" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667506" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667508" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111371" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010221.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663932" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663933" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663934" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663935" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663936" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663937" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111372" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662005" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662006" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662008" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662009" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662010" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662011" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662012" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662014" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662015" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662016" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662017" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662018" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662019" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662020" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662021" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662022" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662023" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662024" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662025" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662027" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662028" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662029" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662030" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662032" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662034" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662035" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662036" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111373" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111374" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667314" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667315" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111375" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665458" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665459" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111376" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664554" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664555" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664556" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664557" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111377" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664864" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664865" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664866" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664867" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111378" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664539" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664540" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664541" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664542" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111379" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665460" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665461" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665462" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111380" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667819" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111381" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661269" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661270" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661271" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661272" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661273" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111382" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111383" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662464" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662465" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111384" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111385" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668587" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668588" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668589" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111386" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668204" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668205" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668206" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668207" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111387" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669200" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669202" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669204" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669205" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669207" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669209" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669210" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669212" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669213" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669214" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111388" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669756" comment="nodejs-common-2.0-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669766" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669767" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669769" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111389" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670700" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670701" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670702" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670703" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670704" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670705" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670706" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111390" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669995" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669996" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669997" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669998" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669999" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670000" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111391" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669763" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669764" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111392" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669216" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669217" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669218" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111393" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111394" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111395" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669985" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669986" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669987" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669988" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669989" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669990" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111396" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669583" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669584" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669572" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111397" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669581" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669582" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669569" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111398" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669770" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669771" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669772" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669773" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669775" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111399" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670478" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111400" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669991" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669992" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111401" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671507" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671511" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671512" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671513" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671515" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111402" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670697" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670698" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670699" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111403" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668002" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111404" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671501" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671502" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671503" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671504" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111405" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670476" comment="python2-libxml2-python-2.9.7-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670477" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111406" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667494" comment="python2-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667495" comment="python2-lxml-devel-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667496" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667497" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111407" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671497" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671498" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671499" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671500" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111408" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010428.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111409" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672163" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672164" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672165" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672166" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111410" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669026" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669028" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669029" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669035" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669036" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669037" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111411" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672079" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672080" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672081" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672082" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672083" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672084" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672085" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672086" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672087" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672088" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672089" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672090" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672091" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672092" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672093" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672094" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672095" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672096" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672097" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672098" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672099" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672100" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672101" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672102" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672103" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672104" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672105" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672106" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672107" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672108" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672109" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672110" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672111" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111412" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671236" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671237" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671238" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111413" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672112" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672113" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672114" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672115" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672116" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672117" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672118" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672119" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672120" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672121" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672122" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672123" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672124" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672125" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672126" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672127" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672128" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672129" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672130" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672131" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672132" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672133" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672134" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672135" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672136" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672137" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672138" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672139" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672140" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672141" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672142" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672143" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672144" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672145" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672146" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672147" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672148" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672149" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672150" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672151" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672152" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672153" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672154" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672155" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672156" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672157" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672158" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672159" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672160" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672161" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672162" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111414" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673262" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673278" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673279" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673280" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673263" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673281" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673264" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673282" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673265" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673266" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111415" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672635" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111416" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-espos:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661005" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673904" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673905" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673906" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673908" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673909" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673910" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673911" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673912" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673913" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673914" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673915" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673916" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111417" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661010" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661011" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661012" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111418" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659809" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659810" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659811" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659812" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659813" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111419" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661008" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661009" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111420" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661006" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661007" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111421" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676860" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676861" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676862" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111422" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009674246" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674247" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674248" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674249" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009674250" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111423" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010015.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663320" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663321" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111424" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677322" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677323" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677324" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677326" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677327" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677329" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677330" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677331" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677332" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677333" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677334" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111425" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676997" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676998" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676999" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677000" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677001" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111426" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677336" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677337" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677338" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677339" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111427" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678651" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678652" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678653" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678654" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111428" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677295" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677296" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111429" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678060" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678061" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678062" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678063" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678064" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678065" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678066" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678067" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678068" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111430" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677340" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677341" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677342" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677343" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677344" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677345" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677346" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677347" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111431" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679181" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679182" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679183" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679184" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111432" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679185" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679187" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679188" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679189" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679190" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679191" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111433" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678467" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678468" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678461" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111434" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678655" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678656" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678639" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111435" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679192" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679193" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679194" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679198" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679199" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679200" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679202" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111436" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678657" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678658" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111437" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677921" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677922" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677923" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111438" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679850" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679851" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679852" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679853" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679854" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679856" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679857" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679858" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679859" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679860" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111439" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111440" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679483" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679484" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111441" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679723" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679724" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111442" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111443" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111444" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111445" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680285" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680286" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680287" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680288" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111446" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679488" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111447" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663736" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663741" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111448" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663742" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663743" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663744" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663745" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111449" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681178" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681179" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111450" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680346" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680347" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680348" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680349" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680350" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680351" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680352" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111451" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681183" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681184" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681185" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111452" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681180" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681181" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681182" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111453" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664168" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111454" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664308" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664309" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664310" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111455" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664060" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664061" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664062" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111456" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664311" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664312" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664313" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664314" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664315" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664316" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664317" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111457" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664166" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664167" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111458" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664559" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664560" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664561" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664562" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111459" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664563" comment="kernel-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664564" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664565" comment="kernel-default-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664566" comment="kernel-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664567" comment="kernel-docs-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664568" comment="kernel-macros-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664569" comment="kernel-obs-build-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664570" comment="kernel-preempt-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664571" comment="kernel-preempt-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664572" comment="kernel-source-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664573" comment="kernel-syms-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111460" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111461" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678578" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111462" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111463" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680329" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680330" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680331" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680332" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680333" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111464" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680334" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680335" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680336" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680337" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111465" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665610" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665612" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665613" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665614" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665615" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665617" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665618" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665619" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665621" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665622" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665624" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665625" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665627" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665629" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665630" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665632" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665633" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665635" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665636" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665638" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665639" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665641" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665642" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665644" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665645" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665646" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665647" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665648" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665650" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665651" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665653" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665654" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665655" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665656" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665658" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665659" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665661" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665662" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665664" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665665" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665667" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665668" comment="samba-ad-dc-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665669" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665670" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665671" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665672" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665673" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665675" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665676" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665677" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111466" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667498" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667499" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667500" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667504" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667505" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667506" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667508" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111467" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010221.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663932" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663933" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663934" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663935" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663936" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663937" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111468" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662005" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662006" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662008" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662009" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662010" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662011" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662012" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662014" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662015" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662016" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662017" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662018" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662019" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662020" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662021" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662022" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662023" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662024" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662025" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662027" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662028" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662029" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662030" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662032" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662034" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662035" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662036" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111469" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111470" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667314" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667315" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111471" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665458" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665459" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111472" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664554" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664555" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664556" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664557" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111473" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664864" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664865" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664866" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664867" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111474" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664539" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664540" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664541" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664542" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111475" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665460" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665461" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665462" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111476" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667819" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111477" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661269" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661270" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661271" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661272" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661273" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111478" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111479" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662464" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662465" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111480" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111481" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668587" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668588" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668589" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111482" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668204" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668205" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668206" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668207" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111483" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669200" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669202" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669204" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669205" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669207" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669209" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669210" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669212" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669213" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669214" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111484" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669756" comment="nodejs-common-2.0-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669766" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669767" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669769" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111485" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670700" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670701" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670702" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670703" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670704" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670705" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670706" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111486" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669995" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669996" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669997" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669998" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669999" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670000" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111487" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669763" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669764" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669765" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111488" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669216" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669217" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669218" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111489" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669199" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111490" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111491" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669985" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669986" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669987" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669988" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669989" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669990" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111492" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669583" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669584" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669572" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111493" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669581" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669582" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669569" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111494" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669770" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669771" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669772" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669773" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669775" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111495" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670478" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111496" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669991" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669992" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111497" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671505" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671506" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671507" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671511" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671512" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671513" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671515" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111498" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670697" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670698" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670699" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111499" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668002" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111500" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671501" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671502" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671503" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671504" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111501" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670476" comment="python2-libxml2-python-2.9.7-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670477" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111502" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667494" comment="python2-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667495" comment="python2-lxml-devel-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667496" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667497" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111503" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671497" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671498" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671499" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671500" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111504" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010428.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111505" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672163" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672164" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672165" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672166" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111506" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669024" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669026" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669028" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669029" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669032" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669033" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669035" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669036" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669037" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111507" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672079" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672080" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672081" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672082" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672083" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672084" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672085" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672086" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672087" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672088" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672089" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672090" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672091" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672092" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672093" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672094" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672095" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672096" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672097" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672098" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672099" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672100" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672101" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672102" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672103" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672104" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672105" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672106" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672107" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672108" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672109" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672110" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672111" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111508" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671236" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671237" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671238" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111509" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672112" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672113" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672114" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672115" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672116" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672117" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672118" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672119" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672120" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672121" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672122" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672123" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672124" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672125" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672126" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672127" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672128" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672129" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672130" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672131" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672132" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672133" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672134" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672135" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672136" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672137" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672138" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672139" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672140" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672141" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672142" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672143" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672144" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672145" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672146" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672147" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672148" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672149" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672150" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672151" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672152" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672153" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672154" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672155" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672156" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672157" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672158" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672159" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672160" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672161" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672162" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111510" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673262" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673278" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673279" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673280" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673263" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673281" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673264" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673282" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673265" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673266" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111511" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672635" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111512" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_hpc-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009661013" comment="SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673904" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673905" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673906" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673908" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673909" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673910" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673911" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673912" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673913" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673914" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673915" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673916" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111513" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676863" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676864" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676865" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111514" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673683" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673684" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673685" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673686" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673687" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111515" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010224.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663377" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663378" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111516" version="1" class="patch">
	<metadata>
		<title>Security update for protobuf (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195258" ref_url="https://bugzilla.suse.com/1195258" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22570" ref_url="https://www.suse.com/security/cve/CVE-2021-22570/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010568.html" source="SUSE-SU"/>
		<description>
This update for protobuf fixes the following issues:

- CVE-2021-22570: Fix incorrect parsing of nullchar in the proto symbol (bsc#1195258).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195258">SUSE bug 1195258</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-22570/">CVE-2021-22570</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672752" comment="libprotobuf-lite20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672753" comment="libprotobuf20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672754" comment="libprotoc20-3.9.2-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672755" comment="protobuf-devel-3.9.2-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111517" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677348" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677349" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677350" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677351" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677352" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677353" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677354" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677355" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677356" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677357" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677358" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111518" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677002" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677003" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677004" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677005" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677006" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111519" version="1" class="patch">
	<metadata>
		<title>Security update for yaml-cpp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1121227" ref_url="https://bugzilla.suse.com/1121227" source="BUGZILLA"/>
		<reference ref_id="1121230" ref_url="https://bugzilla.suse.com/1121230" source="BUGZILLA"/>
		<reference ref_id="1122004" ref_url="https://bugzilla.suse.com/1122004" source="BUGZILLA"/>
		<reference ref_id="1122021" ref_url="https://bugzilla.suse.com/1122021" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20573" ref_url="https://www.suse.com/security/cve/CVE-2018-20573/" source="CVE"/>
		<reference ref_id="CVE-2018-20574" ref_url="https://www.suse.com/security/cve/CVE-2018-20574/" source="CVE"/>
		<reference ref_id="CVE-2019-6285" ref_url="https://www.suse.com/security/cve/CVE-2019-6285/" source="CVE"/>
		<reference ref_id="CVE-2019-6292" ref_url="https://www.suse.com/security/cve/CVE-2019-6292/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010618.html" source="SUSE-SU"/>
		<description>
This update for yaml-cpp fixes the following issues:

- CVE-2018-20573: Fixed remote DOS via a crafted YAML file in function Scanner:EnsureTokensInQueue (bsc#1121227).
- CVE-2018-20574: Fixed remote DOS via a crafted YAML file in function SingleDocParser:HandleFlowMap (bsc#1121230).
- CVE-2019-6285: Fixed remote DOS via a crafted YAML file in function SingleDocParser::HandleFlowSequence (bsc#1122004).
- CVE-2019-6292: Fixed DOS by stack consumption in singledocparser.cpp (bsc#1122021).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1121227">SUSE bug 1121227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121230">SUSE bug 1121230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122004">SUSE bug 1122004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1122021">SUSE bug 1122021</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20573/">CVE-2018-20573</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20574/">CVE-2018-20574</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6285/">CVE-2019-6285</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-6292/">CVE-2019-6292</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671516" comment="libyaml-cpp0_6-0.6.1-4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671517" comment="yaml-cpp-devel-0.6.1-4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111520" version="1" class="patch">
	<metadata>
		<title>Security update for python (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1175619" ref_url="https://bugzilla.suse.com/1175619" source="BUGZILLA"/>
		<reference ref_id="1186819" ref_url="https://bugzilla.suse.com/1186819" source="BUGZILLA"/>
		<reference ref_id="1194146" ref_url="https://bugzilla.suse.com/1194146" source="BUGZILLA"/>
		<reference ref_id="1195396" ref_url="https://bugzilla.suse.com/1195396" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3572" ref_url="https://www.suse.com/security/cve/CVE-2021-3572/" source="CVE"/>
		<reference ref_id="CVE-2021-4189" ref_url="https://www.suse.com/security/cve/CVE-2021-4189/" source="CVE"/>
		<reference ref_id="CVE-2022-0391" ref_url="https://www.suse.com/security/cve/CVE-2022-0391/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010619.html" source="SUSE-SU"/>
		<description>
This update for python fixes the following issues:

- CVE-2022-0391: Fixed URL sanitization containing ASCII newline and tabs in urlparse (bsc#1195396).
- CVE-2021-4189: Fixed ftplib not to trust the PASV response (bsc#1194146).
- CVE-2021-3572: Fixed an improper handling of unicode characters in pip (bsc#1186819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-01"/>
	<updated date="2022-04-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1175619">SUSE bug 1175619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186819">SUSE bug 1186819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194146">SUSE bug 1194146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195396">SUSE bug 1195396</bugzilla>
	<cve impact="moderate" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-3572/">CVE-2021-3572</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4189/">CVE-2021-4189</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-0391/">CVE-2022-0391</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677094" comment="libpython2_7-1_0-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677095" comment="python-2.7.18-150000.38.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677096" comment="python-base-2.7.18-150000.38.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677097" comment="python-tk-2.7.18-150000.38.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111521" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677359" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677360" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677361" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677362" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111522" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678659" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678660" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678661" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678662" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111523" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677371" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677372" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111524" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678098" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678099" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678100" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678101" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678102" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678103" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678104" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678105" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678106" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111525" version="1" class="patch">
	<metadata>
		<title>Security update for opensc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1114649" ref_url="https://bugzilla.suse.com/1114649" source="BUGZILLA"/>
		<reference ref_id="1191957" ref_url="https://bugzilla.suse.com/1191957" source="BUGZILLA"/>
		<reference ref_id="1191992" ref_url="https://bugzilla.suse.com/1191992" source="BUGZILLA"/>
		<reference ref_id="1192000" ref_url="https://bugzilla.suse.com/1192000" source="BUGZILLA"/>
		<reference ref_id="1192005" ref_url="https://bugzilla.suse.com/1192005" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-42779" ref_url="https://www.suse.com/security/cve/CVE-2021-42779/" source="CVE"/>
		<reference ref_id="CVE-2021-42780" ref_url="https://www.suse.com/security/cve/CVE-2021-42780/" source="CVE"/>
		<reference ref_id="CVE-2021-42781" ref_url="https://www.suse.com/security/cve/CVE-2021-42781/" source="CVE"/>
		<reference ref_id="CVE-2021-42782" ref_url="https://www.suse.com/security/cve/CVE-2021-42782/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010682.html" source="SUSE-SU"/>
		<description>
This update for opensc fixes the following issues:

Security issues fixed:

- CVE-2021-42782: Stack buffer overflow issues in various places (bsc#1191957).
- CVE-2021-42781: Fixed multiple heap buffer overflows in pkcs15-oberthur.c (bsc#1192000).
- CVE-2021-42780: Fixed use after return in insert_pin() (bsc#1192005).
- CVE-2021-42779: Fixed use after free in sc_file_valid() (bsc#1191992).

Non-security issues fixed: 

- Fixes segmentation fault in 'pkcs11-tool.c'. (bsc#1114649)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1114649">SUSE bug 1114649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191957">SUSE bug 1191957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191992">SUSE bug 1191992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192000">SUSE bug 1192000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192005">SUSE bug 1192005</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42779/">CVE-2021-42779</cve>
	<cve impact="low" cvss3="2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-42780/">CVE-2021-42780</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-42781/">CVE-2021-42781</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42782/">CVE-2021-42782</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677093" comment="opensc-0.19.0-150100.3.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111526" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677363" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677364" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677365" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677366" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677367" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677368" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677369" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677370" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111527" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679203" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679204" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679205" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679206" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111528" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679207" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679208" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679209" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679210" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679211" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679212" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111529" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678472" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678473" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678474" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111530" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678663" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678664" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678665" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111531" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679213" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679214" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679215" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679216" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679217" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679218" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679219" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111532" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678666" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678667" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111533" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677924" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677925" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677926" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111534" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679873" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679874" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679875" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679876" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679877" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679878" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679879" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679880" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679881" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679882" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111535" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111536" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679489" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679490" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111537" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679725" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679726" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111538" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111539" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680353" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680354" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680355" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680356" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111540" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679493" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111541" version="1" class="patch">
	<metadata>
		<title>Security update for python-numpy (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1193907" ref_url="https://bugzilla.suse.com/1193907" source="BUGZILLA"/>
		<reference ref_id="1193913" ref_url="https://bugzilla.suse.com/1193913" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33430" ref_url="https://www.suse.com/security/cve/CVE-2021-33430/" source="CVE"/>
		<reference ref_id="CVE-2021-41496" ref_url="https://www.suse.com/security/cve/CVE-2021-41496/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0134-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010254.html" source="SUSE-SU"/>
		<description>
This update for python-numpy fixes the following issues:

- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).
- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193907">SUSE bug 1193907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193913">SUSE bug 1193913</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33430/">CVE-2021-33430</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41496/">CVE-2021-41496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667519" comment="python3-numpy-1.17.3-10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667520" comment="python3-numpy-devel-1.17.3-10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111542" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010220.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663750" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663751" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111543" version="1" class="patch">
	<metadata>
		<title>Security update for mutt (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198518" ref_url="https://bugzilla.suse.com/1198518" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1328" ref_url="https://www.suse.com/security/cve/CVE-2022-1328/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010823.html" source="SUSE-SU"/>
		<description>
This update for mutt fixes the following issues:

- CVE-2022-1328: Fixed an invalid memory access when reading untrusted uuencoded
  data. This could result in including private memory in replies (bsc#1198518).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-25"/>
	<updated date="2022-04-25"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198518">SUSE bug 1198518</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1328/">CVE-2022-1328</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679891" comment="mutt-1.10.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679817" comment="mutt-doc-1.10.1-150000.3.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679818" comment="mutt-lang-1.10.1-150000.3.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111544" version="1" class="patch">
	<metadata>
		<title>Security update for permissions (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1169614" ref_url="https://bugzilla.suse.com/1169614" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0141-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010222.html" source="SUSE-SU"/>
		<description>
This update for permissions fixes the following issues:

- Update to version 20181225: setuid bit for cockpit session binary (bsc#1169614).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1169614">SUSE bug 1169614</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667517" comment="permissions-20181225-23.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663723" comment="permissions-zypp-plugin-20181225-23.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667518" comment="rpmlint-mini-1.10-13.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111545" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1198423" ref_url="https://bugzilla.suse.com/1198423" source="BUGZILLA"/>
		<reference ref_id="1198424" ref_url="https://bugzilla.suse.com/1198424" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24675" ref_url="https://www.suse.com/security/cve/CVE-2022-24675/" source="CVE"/>
		<reference ref_id="CVE-2022-28327" ref_url="https://www.suse.com/security/cve/CVE-2022-28327/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010839.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- Updated to version 1.17.9 (bsc#1190649):
  - CVE-2022-24675: Fixed a stack overflow via crafted PEM file (bsc#1198423).
  - CVE-2022-28327: Fixed a potential panic when using big P-256 scalars in the
    crypto/elliptic module (bsc#1198424).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-26"/>
	<updated date="2022-04-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198423">SUSE bug 1198423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198424">SUSE bug 1198424</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24675/">CVE-2022-24675</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-28327/">CVE-2022-28327</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679655" comment="go1.17-1.17.9-150000.1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679656" comment="go1.17-doc-1.17.9-150000.1.28.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679657" comment="go1.17-race-1.17.9-150000.1.28.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111546" version="1" class="patch">
	<metadata>
		<title>Security update for ant (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1188468" ref_url="https://bugzilla.suse.com/1188468" source="BUGZILLA"/>
		<reference ref_id="1188469" ref_url="https://bugzilla.suse.com/1188469" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-36373" ref_url="https://www.suse.com/security/cve/CVE-2021-36373/" source="CVE"/>
		<reference ref_id="CVE-2021-36374" ref_url="https://www.suse.com/security/cve/CVE-2021-36374/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010843.html" source="SUSE-SU"/>
		<description>
This update for ant fixes the following issues:

- CVE-2021-36373: Fixed an excessive memory allocation when reading a specially
  crafted TAR archive (bsc#1188468).
- CVE-2021-36374: Fixed an excessive memory allocation when reading a specially
  crafted ZIP archive (bsc#1188469).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188468">SUSE bug 1188468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188469">SUSE bug 1188469</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36373/">CVE-2021-36373</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36374/">CVE-2021-36374</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677230" comment="ant-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677231" comment="ant-antlr-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677232" comment="ant-apache-bcel-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677233" comment="ant-apache-bsf-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677234" comment="ant-apache-log4j-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677235" comment="ant-apache-oro-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677236" comment="ant-apache-regexp-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677237" comment="ant-apache-resolver-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677238" comment="ant-commons-logging-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677239" comment="ant-javamail-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677240" comment="ant-jdepend-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677241" comment="ant-jmf-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677242" comment="ant-junit-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677243" comment="ant-manual-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677244" comment="ant-scripts-1.10.7-150200.4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677245" comment="ant-swing-1.10.7-150200.4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111547" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681186" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681187" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111548" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680357" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680358" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680359" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680360" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680361" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680362" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680363" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111549" version="1" class="patch">
	<metadata>
		<title>Security update for libaom (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1185778" ref_url="https://bugzilla.suse.com/1185778" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30473" ref_url="https://www.suse.com/security/cve/CVE-2021-30473/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010852.html" source="SUSE-SU"/>
		<description>
This update for libaom fixes the following issues:

- CVE-2021-30473: AOMedia in aom_image.c frees memory that is not located on the heap (bsc#1185778).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185778">SUSE bug 1185778</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30473/">CVE-2021-30473</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677373" comment="libaom0-1.0.0-150200.3.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111550" version="1" class="patch">
	<metadata>
		<title>Security update for python-paramiko (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197279" ref_url="https://bugzilla.suse.com/1197279" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24302" ref_url="https://www.suse.com/security/cve/CVE-2022-24302/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010860.html" source="SUSE-SU"/>
		<description>
This update for python-paramiko fixes the following issues:

- CVE-2022-24302: Fixed a race condition between creation and chmod when writing private keys. (bsc#1197279) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197279">SUSE bug 1197279</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24302/">CVE-2022-24302</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680181" comment="python3-paramiko-2.4.2-150100.6.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111551" version="1" class="patch">
	<metadata>
		<title>Security update for python-pip (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1176262" ref_url="https://bugzilla.suse.com/1176262" source="BUGZILLA"/>
		<reference ref_id="1195831" ref_url="https://bugzilla.suse.com/1195831" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20916" ref_url="https://www.suse.com/security/cve/CVE-2019-20916/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010862.html" source="SUSE-SU"/>
		<description>
This update for python-pip fixes the following issues:

- Add wheel subpackage with the generated wheel for this package
  (bsc#1176262, CVE-2019-20916).

- Make wheel a separate build run to avoid the setuptools/wheel build
  cycle.

- Switch this package to use update-alternatives for all files
  in %{_bindir} so it doesn't collide with the versions on
  'the latest' versions of Python interpreter (jsc#SLE-18038,
  bsc#1195831).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1176262">SUSE bug 1176262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195831">SUSE bug 1195831</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-20916/">CVE-2019-20916</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680168" comment="python3-pip-20.0.2-150100.6.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111552" version="1" class="patch">
	<metadata>
		<title>Security update for glib2 (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1183533" ref_url="https://bugzilla.suse.com/1183533" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28153" ref_url="https://www.suse.com/security/cve/CVE-2021-28153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1455-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010857.html" source="SUSE-SU"/>
		<description>
This update for glib2 fixes the following issues:

- CVE-2021-28153: Fixed an issue where symlink targets would be incorrectly created as empty files (bsc#1183533).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1183533">SUSE bug 1183533</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28153/">CVE-2021-28153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679884" comment="glib2-devel-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679805" comment="glib2-lang-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679885" comment="glib2-tools-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679886" comment="libgio-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679808" comment="libgio-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679887" comment="libglib-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679810" comment="libglib-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679888" comment="libgmodule-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679812" comment="libgmodule-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679889" comment="libgobject-2_0-0-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679814" comment="libgobject-2_0-0-32bit-2.62.6-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679890" comment="libgthread-2_0-0-2.62.6-150200.3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111553" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010247.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664186" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111554" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010225.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-15"/>
	<updated date="2022-02-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664318" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664319" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664320" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111555" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010234.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664324" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664325" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664326" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664327" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664328" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664329" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664330" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111556" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010235.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664184" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664185" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111557" version="1" class="patch">
	<metadata>
		<title>Security update for qemu (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1172033" ref_url="https://bugzilla.suse.com/1172033" source="BUGZILLA"/>
		<reference ref_id="1181361" ref_url="https://bugzilla.suse.com/1181361" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-13253" ref_url="https://www.suse.com/security/cve/CVE-2020-13253/" source="CVE"/>
		<reference ref_id="CVE-2021-20196" ref_url="https://www.suse.com/security/cve/CVE-2021-20196/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0210-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010251.html" source="SUSE-SU"/>
		<description>
This update for qemu fixes the following issues:

- CVE-2020-13253: Fixed an OOB access that could crash the guest resulting in DoS (bsc#1172033)
- CVE-2021-20196: Fixed null pointer dereference that may lead to guest crash (bsc#1181361).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1172033">SUSE bug 1172033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181361">SUSE bug 1181361</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13253/">CVE-2020-13253</cve>
	<cve impact="low" cvss3="3.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20196/">CVE-2021-20196</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667521" comment="qemu-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667522" comment="qemu-audio-alsa-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667523" comment="qemu-audio-pa-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667524" comment="qemu-block-curl-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667525" comment="qemu-block-iscsi-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667526" comment="qemu-block-rbd-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667527" comment="qemu-block-ssh-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667528" comment="qemu-guest-agent-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667529" comment="qemu-ipxe-1.0.0+-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667530" comment="qemu-kvm-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667531" comment="qemu-lang-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667532" comment="qemu-microvm-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667533" comment="qemu-seabios-1.12.1+-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667534" comment="qemu-sgabios-8-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667535" comment="qemu-tools-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667536" comment="qemu-ui-curses-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667537" comment="qemu-ui-gtk-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667538" comment="qemu-ui-spice-app-4.2.1-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667539" comment="qemu-vgabios-1.12.1+-11.34.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667540" comment="qemu-x86-4.2.1-11.34.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111558" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111559" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678579" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111560" version="1" class="patch">
	<metadata>
		<title>Security update for netty3 (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1193672" ref_url="https://bugzilla.suse.com/1193672" source="BUGZILLA"/>
		<reference ref_id="1197787" ref_url="https://bugzilla.suse.com/1197787" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43797" ref_url="https://www.suse.com/security/cve/CVE-2021-43797/" source="CVE"/>
		<description>
This update for netty3 fixes the following issues:

- CVE-2021-43797: Fixed a potential HTTP request smuggling issue due to
  insufficient validation against control characters (bsc#1193672).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193672">SUSE bug 1193672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197787">SUSE bug 1197787</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43797/">CVE-2021-43797</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679149" comment="netty3-3.10.6-150200.3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111561" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111562" version="1" class="patch">
	<metadata>
		<title>Security update for tar (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1029961" ref_url="https://bugzilla.suse.com/1029961" source="BUGZILLA"/>
		<reference ref_id="1120610" ref_url="https://bugzilla.suse.com/1120610" source="BUGZILLA"/>
		<reference ref_id="1130496" ref_url="https://bugzilla.suse.com/1130496" source="BUGZILLA"/>
		<reference ref_id="1181131" ref_url="https://bugzilla.suse.com/1181131" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-20482" ref_url="https://www.suse.com/security/cve/CVE-2018-20482/" source="CVE"/>
		<reference ref_id="CVE-2019-9923" ref_url="https://www.suse.com/security/cve/CVE-2019-9923/" source="CVE"/>
		<reference ref_id="CVE-2021-20193" ref_url="https://www.suse.com/security/cve/CVE-2021-20193/" source="CVE"/>
		<description>
This update for tar fixes the following issues:

- CVE-2021-20193: Fixed a memory leak in read_header() in list.c (bsc#1181131).
- CVE-2019-9923: Fixed a null-pointer dereference in pax_decode_header in sparse.c (bsc#1130496).
- CVE-2018-20482: Fixed infinite read loop in sparse_dump_region in sparse.c (bsc#1120610).

- Update to GNU tar 1.34:
  * Fix extraction over pipe
  * Fix memory leak in read_header (CVE-2021-20193) (bsc#1181131)
  * Fix extraction when . and .. are unreadable
  * Gracefully handle duplicate symlinks when extracting
  * Re-initialize supplementary groups when switching to user
    privileges

- Update to GNU tar 1.33:
  * POSIX extended format headers do not include PID by default
  * --delay-directory-restore works for archives with reversed
    member ordering
  * Fix extraction of a symbolic link hardlinked to another
    symbolic link
  * Wildcards in exclude-vcs-ignore mode don't match slash
  * Fix the --no-overwrite-dir option
  * Fix handling of chained renames in incremental backups
  * Link counting works for file names supplied with -T
  * Accept only position-sensitive (file-selection) options in file
    list files

- prepare usrmerge (bsc#1029961)

- Update to GNU 1.32
  * Fix the use of --checkpoint without explicit --checkpoint-action
  * Fix extraction with the -U option
  * Fix iconv usage on BSD-based systems
  * Fix possible NULL dereference (savannah bug #55369)
    [bsc#1130496] [CVE-2019-9923]
  * Improve the testsuite

- Update to GNU 1.31
  * Fix heap-buffer-overrun with --one-top-level, bug introduced
    with the addition of that option in 1.28
  * Support for zstd compression
  * New option '--zstd' instructs tar to use zstd as compression
    program. When listing, extractng and comparing, zstd compressed
    archives are recognized automatically. When '-a' option is in
    effect, zstd compression is selected if the destination archive
    name ends in '.zst' or '.tzst'.
  * The -K option interacts properly with member names given in the
    command line. Names of members to extract can be specified along
    with the '-K NAME' option. In this case, tar will extract NAME
    and those of named members that appear in the archive after it,
    which is consistent with the semantics of the option. Previous
    versions of tar extracted NAME, those of named members that
    appeared before it, and everything after it.
  * Fix CVE-2018-20482 - When creating archives with the --sparse
    option, previous versions of tar would loop endlessly if a
    sparse file had been truncated while being archived.

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1029961">SUSE bug 1029961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120610">SUSE bug 1120610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130496">SUSE bug 1130496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181131">SUSE bug 1181131</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-20482/">CVE-2018-20482</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9923/">CVE-2019-9923</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-20193/">CVE-2021-20193</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679491" comment="tar-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679458" comment="tar-lang-1.34-150000.3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679492" comment="tar-rmt-1.34-150000.3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111563" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_openidc (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190223" ref_url="https://bugzilla.suse.com/1190223" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39191" ref_url="https://www.suse.com/security/cve/CVE-2021-39191/" source="CVE"/>
		<description>
This update for apache2-mod_auth_openidc fixes the following issues:

- CVE-2021-39191: Fixed open redirect issue in target_link_uri parameter (bsc#1190223).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190223">SUSE bug 1190223</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-39191/">CVE-2021-39191</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679658" comment="apache2-mod_auth_openidc-2.3.8-150100.3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111564" version="1" class="patch">
	<metadata>
		<title>Security update for giflib (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1094832" ref_url="https://bugzilla.suse.com/1094832" source="BUGZILLA"/>
		<reference ref_id="1146299" ref_url="https://bugzilla.suse.com/1146299" source="BUGZILLA"/>
		<reference ref_id="1184123" ref_url="https://bugzilla.suse.com/1184123" source="BUGZILLA"/>
		<reference ref_id="974847" ref_url="https://bugzilla.suse.com/974847" source="BUGZILLA"/>
		<reference ref_id="CVE-2016-3977" ref_url="https://www.suse.com/security/cve/CVE-2016-3977/" source="CVE"/>
		<reference ref_id="CVE-2018-11490" ref_url="https://www.suse.com/security/cve/CVE-2018-11490/" source="CVE"/>
		<reference ref_id="CVE-2019-15133" ref_url="https://www.suse.com/security/cve/CVE-2019-15133/" source="CVE"/>
		<description>
This update for giflib fixes the following issues:

- CVE-2019-15133: Fixed a divide-by-zero exception in the decoder function DGifSlurp in dgif_lib.c if the height field of the ImageSize data structure is equal to zero (bsc#1146299).
- CVE-2018-11490: Fixed a heap-based buffer overflow in DGifDecompressLine function in dgif_lib.c (bsc#1094832).
- CVE-2016-3977: Fixed a heap buffer overflow in gif2rgb (bsc#974847). 
     
Update to version 5.2.1
  * In gifbuild.c, avoid a core dump on no color map.
  * Restore inadvertently removed library version numbers in Makefile.
   
Changes in version 5.2.0
  * The undocumented and deprecated GifQuantizeBuffer() entry point
    has been moved to the util library to reduce libgif size and attack
    surface. Applications needing this function are couraged to link the
    util library or make their own copy.
  * The following obsolete utility programs are no longer installed:
    gifecho, giffilter, gifinto, gifsponge. These were either installed in
    error or have been obsolesced by modern image-transformmation tools
    like ImageMagick convert. They may be removed entirely in a future
    release.
  * Address SourceForge issue #136: Stack-buffer-overflow in gifcolor.c:84
  * Address SF bug #134: Giflib fails to slurp significant number of gifs
  * Apply SPDX convention for license tagging.
   
Changes in version 5.1.9
  * The documentation directory now includes an HTMlified version of the
    GIF89 standard, and a more detailed description of how LZW compression
    is applied to GIFs.
  * Address SF bug #129: The latest version of giflib cannot be build on windows.
  * Address SF bug #126: Cannot compile giflib using c89
   
Changes in version 5.1.8
  * Address SF bug #119: MemorySanitizer: FPE on unknown address (CVE-2019-15133 bsc#1146299)
  * Address SF bug #125: 5.1.7: xmlto is still required for tarball
  * Address SF bug #124: 5.1.7: ar invocation is not crosscompile compatible
  * Address SF bug #122: 5.1.7 installs manpages to wrong directory
  * Address SF bug #121: make: getversion: Command not found
  * Address SF bug #120: 5.1.7 does not build a proper library - no 
   
Changes in version 5.1.7
  * Correct a minor packaging error (superfluous symlinks) in the 5.1.6 tarballs.
   
Changes in version 5.1.6
  * Fix library installation in the Makefile.
   
Changes in version 5.1.5
  * Fix SF bug #114: Null dereferences in main() of gifclrmp
  * Fix SF bug #113: Heap Buffer Overflow-2 in function DGifDecompressLine()
    in cgif.c.  This had been assigned (CVE-2018-11490 bsc#1094832).
  * Fix SF bug #111: segmentation fault in PrintCodeBlock
  * Fix SF bug #109: Segmentation fault of giftool reading a crafted file
  * Fix SF bug #107: Floating point exception in giftext utility
  * Fix SF bug #105: heap buffer overflow in DumpScreen2RGB in gif2rgb.c:317
  * Fix SF bug #104: Ineffective bounds check in DGifSlurp
  * Fix SF bug #103: GIFLIB 5.1.4: DGifSlurp fails on empty comment
  * Fix SF bug #87: Heap buffer overflow in 5.1.2 (gif2rgb). (CVE-2016-3977 bsc#974847)
  * The horrible old autoconf build system has been removed with extreme prejudice. 
    You now build this simply by running 'make' from the top-level directory.

The following non-security bugs were fixed:

- build path independent objects and inherit CFLAGS from the build system (bsc#1184123)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-15"/>
	<updated date="2022-04-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1094832">SUSE bug 1094832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146299">SUSE bug 1146299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184123">SUSE bug 1184123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/974847">SUSE bug 974847</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-3977/">CVE-2016-3977</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-11490/">CVE-2018-11490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-15133/">CVE-2019-15133</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679727" comment="giflib-devel-5.2.1-150000.4.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679728" comment="libgif7-5.2.1-150000.4.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111565" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680364" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680365" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680366" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680367" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680368" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111566" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680369" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680370" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680371" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680372" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111567" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1182104" ref_url="https://bugzilla.suse.com/1182104" source="BUGZILLA"/>
		<reference ref_id="1182105" ref_url="https://bugzilla.suse.com/1182105" source="BUGZILLA"/>
		<reference ref_id="1184757" ref_url="https://bugzilla.suse.com/1184757" source="BUGZILLA"/>
		<reference ref_id="1184798" ref_url="https://bugzilla.suse.com/1184798" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26926" ref_url="https://www.suse.com/security/cve/CVE-2021-26926/" source="CVE"/>
		<reference ref_id="CVE-2021-26927" ref_url="https://www.suse.com/security/cve/CVE-2021-26927/" source="CVE"/>
		<reference ref_id="CVE-2021-3443" ref_url="https://www.suse.com/security/cve/CVE-2021-3443/" source="CVE"/>
		<reference ref_id="CVE-2021-3467" ref_url="https://www.suse.com/security/cve/CVE-2021-3467/" source="CVE"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-3467: Fixed NULL pointer deref in jp2_decode() (bsc#1184757). 
- CVE-2021-3443: Fixed NULL pointer deref in jp2_decode() (bsc#1184798).
- CVE-2021-26927: Fixed NULL pointer deref in jp2_decode() (bsc#1182104).
- CVE-2021-26926: Fixed an out of bounds read in jp2_decode() (bsc#1182105).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182104">SUSE bug 1182104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182105">SUSE bug 1182105</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184757">SUSE bug 1184757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184798">SUSE bug 1184798</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26926/">CVE-2021-26926</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-26927/">CVE-2021-26927</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3443/">CVE-2021-3443</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3467/">CVE-2021-3467</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680373" comment="libjasper-devel-2.0.14-150000.3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680374" comment="libjasper4-2.0.14-150000.3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111568" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1198086" ref_url="https://bugzilla.suse.com/1198086" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24801" ref_url="https://www.suse.com/security/cve/CVE-2022-24801/" source="CVE"/>
		<description>
This update for python-Twisted fixes the following issues:
    
- CVE-2022-24801: Fixed to not be as lenient as earlier HTTP/1.1 RFCs to prevent HTTP request smuggling. (bsc#1198086)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1198086">SUSE bug 1198086</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24801/">CVE-2022-24801</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680817" comment="python3-Twisted-19.10.0-150200.3.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111569" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197028" ref_url="https://bugzilla.suse.com/1197028" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0856" ref_url="https://www.suse.com/security/cve/CVE-2022-0856/" source="CVE"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2022-0856: Fixed a divide by zero issue which could be exploited to cause
  an application crash (bsc#1197028).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197028">SUSE bug 1197028</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0856/">CVE-2022-0856</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681188" comment="libcaca-devel-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681189" comment="libcaca0-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681190" comment="libcaca0-plugins-0.99.beta19.git20171003-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111570" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665679" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665680" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665681" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665682" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665683" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665684" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665685" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665686" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665687" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665688" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665689" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665690" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665691" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665692" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665693" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665694" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665695" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665696" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665697" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665698" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665699" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665700" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665701" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665702" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665703" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665704" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665705" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665706" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665707" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665708" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665709" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665710" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665711" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665712" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665713" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665714" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665715" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665716" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665717" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665718" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665719" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665720" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665721" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665722" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665723" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665724" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665725" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665726" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665727" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111571" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667559" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667560" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667561" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667562" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667563" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667564" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667565" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111572" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010236.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662065" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662066" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662067" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662068" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662069" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662070" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662071" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662072" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662073" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662074" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662075" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662076" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662077" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662078" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662079" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662080" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662081" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662082" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662083" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662084" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662085" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662086" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662087" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662088" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662089" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662090" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662091" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662092" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111573" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010237.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660305" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660306" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660307" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111574" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111575" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667316" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667317" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111576" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665728" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665729" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111577" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664579" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664580" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664581" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664582" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111578" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664868" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664869" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664870" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664871" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111579" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664574" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664575" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664576" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664577" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111580" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665730" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665731" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665732" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111581" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667820" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111582" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661279" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661280" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661281" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661282" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661283" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111583" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111584" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010248.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662466" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662467" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111585" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195542" ref_url="https://bugzilla.suse.com/1195542" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4115" ref_url="https://www.suse.com/security/cve/CVE-2021-4115/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010276.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4115: Fixed a denial of service via file descriptor leak (bsc#1195542).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195542">SUSE bug 1195542</bugzilla>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4115/">CVE-2021-4115</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668309" comment="libpolkit0-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668310" comment="polkit-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668311" comment="polkit-devel-0.116-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668312" comment="typelib-1_0-Polkit-1_0-0.116-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111586" version="1" class="patch">
	<metadata>
		<title>Security update for ImageMagick (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195563" ref_url="https://bugzilla.suse.com/1195563" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0284" ref_url="https://www.suse.com/security/cve/CVE-2022-0284/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010283.html" source="SUSE-SU"/>
		<description>
This update for ImageMagick fixes the following issues:

- CVE-2022-0284: Fixed heap buffer overread in GetPixelAlpha() in MagickCore/pixel-accessor.h (bsc#1195563).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-21"/>
	<updated date="2022-02-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195563">SUSE bug 1195563</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0284/">CVE-2022-0284</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667550" comment="ImageMagick-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667551" comment="ImageMagick-config-7-SUSE-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667552" comment="ImageMagick-config-7-upstream-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667553" comment="ImageMagick-devel-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667554" comment="libMagick++-7_Q16HDRI4-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667555" comment="libMagick++-devel-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667556" comment="libMagickCore-7_Q16HDRI6-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667557" comment="libMagickWand-7_Q16HDRI6-7.0.7.34-10.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667558" comment="perl-PerlMagick-7.0.7.34-10.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111587" version="1" class="patch">
	<metadata>
		<title>Security update for jasper (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1188437" ref_url="https://bugzilla.suse.com/1188437" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-27845" ref_url="https://www.suse.com/security/cve/CVE-2021-27845/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010303.html" source="SUSE-SU"/>
		<description>
This update for jasper fixes the following issues:

- CVE-2021-27845: Fixed divide-by-zery issue in cp_create() (bsc#1188437).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-24"/>
	<updated date="2022-02-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188437">SUSE bug 1188437</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-27845/">CVE-2021-27845</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668307" comment="libjasper-devel-2.0.14-3.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668308" comment="libjasper4-2.0.14-3.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111588" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111589" version="1" class="patch">
	<metadata>
		<title>Security update for openexr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194333" ref_url="https://bugzilla.suse.com/1194333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45942" ref_url="https://www.suse.com/security/cve/CVE-2021-45942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0062-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010223.html" source="SUSE-SU"/>
		<description>
This update for openexr fixes the following issues:

- CVE-2021-45942: Fixed heap-based buffer overflow in Imf_3_1:LineCompositeTask:execute. (bsc#1194333)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194333">SUSE bug 1194333</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45942/">CVE-2021-45942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667511" comment="libIlmImf-2_2-23-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667512" comment="libIlmImfUtil-2_2-23-2.2.1-3.41.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667513" comment="openexr-devel-2.2.1-3.41.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111590" version="1" class="patch">
	<metadata>
		<title>Security update for ldns (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195057" ref_url="https://bugzilla.suse.com/1195057" source="BUGZILLA"/>
		<reference ref_id="1195058" ref_url="https://bugzilla.suse.com/1195058" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-19860" ref_url="https://www.suse.com/security/cve/CVE-2020-19860/" source="CVE"/>
		<reference ref_id="CVE-2020-19861" ref_url="https://www.suse.com/security/cve/CVE-2020-19861/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0675-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010330.html" source="SUSE-SU"/>
		<description>
This update for ldns fixes the following issues:

- CVE-2020-19860: Fixed heap-based out of bounds read when verifying a zone file (bsc#1195057).
- CVE-2020-19861: Fixed heap-based out of bounds read in ldns_nsec3_salt_data() (bsc#1195058).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195057">SUSE bug 1195057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195058">SUSE bug 1195058</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-19860/">CVE-2020-19860</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-19861/">CVE-2020-19861</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667547" comment="ldns-devel-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667548" comment="libldns2-1.7.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667549" comment="perl-DNS-LDNS-1.7.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111591" version="1" class="patch">
	<metadata>
		<title>Security update for libmspack (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1113040" ref_url="https://bugzilla.suse.com/1113040" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18586" ref_url="https://www.suse.com/security/cve/CVE-2018-18586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0069-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010258.html" source="SUSE-SU"/>
		<description>
This update for libmspack fixes the following issues:

- CVE-2018-18586: Fixed directory traversal in chmextract by adding anti '../' and leading slash protection (bsc#1113040).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1113040">SUSE bug 1113040</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-18586/">CVE-2018-18586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667509" comment="libmspack-devel-0.6-3.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667510" comment="libmspack0-0.6-3.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111592" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668197" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668198" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668199" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668200" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111593" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669223" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669224" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669225" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669226" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669227" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669228" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669229" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669230" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669231" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669232" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111594" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670710" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670711" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670712" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670713" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670714" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670715" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670716" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111595" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670036" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670037" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670038" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670039" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670040" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670041" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111596" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669220" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669221" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669222" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111597" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669219" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111598" version="1" class="patch">
	<metadata>
		<title>Security update for gnutls (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196167" ref_url="https://bugzilla.suse.com/1196167" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4209" ref_url="https://www.suse.com/security/cve/CVE-2021-4209/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010350.html" source="SUSE-SU"/>
		<description>
This update for gnutls fixes the following issues:

- CVE-2021-4209: Fixed null pointer dereference in MD_UPDATE (bsc#1196167).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196167">SUSE bug 1196167</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4209/">CVE-2021-4209</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669041" comment="gnutls-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669042" comment="libgnutls-devel-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669043" comment="libgnutls30-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669017" comment="libgnutls30-32bit-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669044" comment="libgnutls30-hmac-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669019" comment="libgnutls30-hmac-32bit-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669045" comment="libgnutlsxx-devel-3.6.7-14.16.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669046" comment="libgnutlsxx28-3.6.7-14.16.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111599" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111600" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669038" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669039" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669040" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111601" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669588" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669589" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669590" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111602" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669585" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669586" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669587" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111603" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669776" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669777" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669778" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669779" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669780" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111604" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670479" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111605" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670034" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670035" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111606" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671526" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671527" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671528" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671529" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671530" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671531" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671532" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111607" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670707" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670708" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670709" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111608" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668003" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111609" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671522" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671523" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671524" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671525" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111610" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670489" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111611" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667545" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667546" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111612" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671518" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671519" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671520" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671521" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111613" version="1" class="patch">
	<metadata>
		<title>Security update for flac (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196660" ref_url="https://bugzilla.suse.com/1196660" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0561" ref_url="https://www.suse.com/security/cve/CVE-2021-0561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010423.html" source="SUSE-SU"/>
		<description>
This update for flac fixes the following issues:

- CVE-2021-0561: Fixed out of bound write in append_to_verify_fifo_interleaved_ (bsc#1196660).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1196660">SUSE bug 1196660</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0561/">CVE-2021-0561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671013" comment="flac-devel-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671014" comment="libFLAC++6-1.3.2-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671015" comment="libFLAC8-1.3.2-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111614" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010427.html" source="SUSE-SU"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21248: Fixed incomplete deserialization class filtering in ObjectInputStream. (bnc#1194926)
- CVE-2022-21277: Fixed incorrect reading of TIFF files in TIFFNullDecompressor. (bnc#1194930)
- CVE-2022-21282: Fixed Insufficient URI checks in the XSLT TransformerImpl. (bnc#1194933)
- CVE-2022-21283: Fixed unexpected exception thrown in regex Pattern. (bnc#1194937)
- CVE-2022-21291: Fixed Incorrect marking of writeable fields. (bnc#1194925)
- CVE-2022-21293: Fixed Incomplete checks of StringBuffer and StringBuilder during deserialization. (bnc#1194935)
- CVE-2022-21294: Fixed Incorrect IdentityHashMap size checks during deserialization. (bnc#1194934)
- CVE-2022-21296: Fixed Incorrect access checks in XMLEntityManager. (bnc#1194932)
- CVE-2022-21299: Fixed Infinite loop related to incorrect handling of newlines in XMLEntityScanner. (bnc#1194931)
- CVE-2022-21305: Fixed Array indexing issues in LIRGenerator. (bnc#1194939)
- CVE-2022-21340: Fixed Excessive resource use when reading JAR manifest attributes. (bnc#1194940)
- CVE-2022-21341: Fixed OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream. (bnc#1194941)
- CVE-2022-21360: Fixed Excessive memory allocation in BMPImageReader. (bnc#1194929)
- CVE-2022-21365: Fixed Integer overflow in BMPImageReader. (bnc#1194928)
- CVE-2022-21366: Fixed Excessive memory allocation in TIFF*Decompressor. (bnc#1194927)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667541" comment="java-11-openjdk-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667542" comment="java-11-openjdk-demo-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667543" comment="java-11-openjdk-devel-11.0.14.0-3.74.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667544" comment="java-11-openjdk-headless-11.0.14.0-3.74.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111615" version="1" class="patch">
	<metadata>
		<title>Security update for xstream (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195458" ref_url="https://bugzilla.suse.com/1195458" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43859" ref_url="https://www.suse.com/security/cve/CVE-2021-43859/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010425.html" source="SUSE-SU"/>
		<description>
This update for xstream fixes the following issues:
 
- CVE-2021-43859: Fixed a denial of service when unmarshalling highly recursive collections or maps (bsc#1195458).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195458">SUSE bug 1195458</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43859/">CVE-2021-43859</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667358" comment="xstream-1.4.19-3.18.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111616" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672204" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672205" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672206" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672207" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111617" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669047" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669048" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669049" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669050" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669051" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669052" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669053" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669054" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669055" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111618" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672167" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672168" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672169" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672170" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672171" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672172" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672173" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672174" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672175" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672176" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672177" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672178" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672179" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672180" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672181" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672182" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672183" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672184" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672185" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672186" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672187" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672188" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672189" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672190" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672191" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672192" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672193" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672194" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672195" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672196" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672197" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672198" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672199" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111619" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671239" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671240" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671241" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111620" version="1" class="patch">
	<metadata>
		<title>Security update for chrony (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1099272" ref_url="https://bugzilla.suse.com/1099272" source="BUGZILLA"/>
		<reference ref_id="1115529" ref_url="https://bugzilla.suse.com/1115529" source="BUGZILLA"/>
		<reference ref_id="1128846" ref_url="https://bugzilla.suse.com/1128846" source="BUGZILLA"/>
		<reference ref_id="1162964" ref_url="https://bugzilla.suse.com/1162964" source="BUGZILLA"/>
		<reference ref_id="1172113" ref_url="https://bugzilla.suse.com/1172113" source="BUGZILLA"/>
		<reference ref_id="1173277" ref_url="https://bugzilla.suse.com/1173277" source="BUGZILLA"/>
		<reference ref_id="1174075" ref_url="https://bugzilla.suse.com/1174075" source="BUGZILLA"/>
		<reference ref_id="1174911" ref_url="https://bugzilla.suse.com/1174911" source="BUGZILLA"/>
		<reference ref_id="1180689" ref_url="https://bugzilla.suse.com/1180689" source="BUGZILLA"/>
		<reference ref_id="1181826" ref_url="https://bugzilla.suse.com/1181826" source="BUGZILLA"/>
		<reference ref_id="1187906" ref_url="https://bugzilla.suse.com/1187906" source="BUGZILLA"/>
		<reference ref_id="1190926" ref_url="https://bugzilla.suse.com/1190926" source="BUGZILLA"/>
		<reference ref_id="1194229" ref_url="https://bugzilla.suse.com/1194229" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14367" ref_url="https://www.suse.com/security/cve/CVE-2020-14367/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010440.html" source="SUSE-SU"/>
		<description>
This update for chrony fixes the following issues:

Chrony was updated to 4.1, bringing features and bugfixes.

Update to 4.1

  * Add support for NTS servers specified by IP address (matching
    Subject Alternative Name in server certificate)
  * Add source-specific configuration of trusted certificates
  * Allow multiple files and directories with trusted certificates
  * Allow multiple pairs of server keys and certificates
  * Add copy option to server/pool directive
  * Increase PPS lock limit to 40% of pulse interval
  * Perform source selection immediately after loading dump files
  * Reload dump files for addresses negotiated by NTS-KE server
  * Update seccomp filter and add less restrictive level
  * Restart ongoing name resolution on online command
  * Fix dump files to not include uncorrected offset
  * Fix initstepslew to accept time from own NTP clients
  * Reset NTP address and port when no longer negotiated by NTS-KE
    server

- Ensure the correct pool packages are installed for openSUSE
  and SLE (bsc#1180689).
- Fix pool package dependencies, so that SLE prefers chrony-pool-suse
  over chrony-pool-empty. (bsc#1194229)

- Enable syscallfilter unconditionally [bsc#1181826].

Update to 4.0

  - Enhancements

    - Add support for Network Time Security (NTS) authentication
    - Add support for AES-CMAC keys (AES128, AES256) with Nettle
    - Add authselectmode directive to control selection of
      unauthenticated sources
    - Add binddevice, bindacqdevice, bindcmddevice directives
    - Add confdir directive to better support fragmented
      configuration
    - Add sourcedir directive and 'reload sources' command to
      support dynamic NTP sources specified in files
    - Add clockprecision directive
    - Add dscp directive to set Differentiated Services Code Point
      (DSCP)
    - Add -L option to limit log messages by severity
    - Add -p option to print whole configuration with included
      files
    - Add -U option to allow start under non-root user
    - Allow maxsamples to be set to 1 for faster update with -q/-Q
      option
    - Avoid replacing NTP sources with sources that have
      unreachable address
    - Improve pools to repeat name resolution to get 'maxsources'
      sources
    - Improve source selection with trusted sources
    - Improve NTP loop test to prevent synchronisation to itself
    - Repeat iburst when NTP source is switched from offline state
      to online
    - Update clock synchronisation status and leap status more
      frequently
    - Update seccomp filter
    - Add 'add pool' command
    - Add 'reset sources' command to drop all measurements
    - Add authdata command to print details about NTP
      authentication
    - Add selectdata command to print details about source
      selection
    - Add -N option and sourcename command to print original names
      of sources
    - Add -a option to some commands to print also unresolved
      sources
    - Add -k, -p, -r options to clients command to select, limit,
      reset data

  - Bug fixes

    - Don’t set interface for NTP responses to allow asymmetric
      routing
    - Handle RTCs that don’t support interrupts
    - Respond to command requests with correct address on
      multihomed hosts
  - Removed features
    - Drop support for RIPEMD keys (RMD128, RMD160, RMD256, RMD320)
    - Drop support for long (non-standard) MACs in NTPv4 packets
      (chrony 2.x clients using non-MD5/SHA1 keys need to use
      option 'version 3')
    - Drop support for line editing with GNU Readline

- By default we don't write log files but log to journald, so
  only recommend logrotate.

- Adjust and rename the sysconfig file, so that it matches the
  expectations of chronyd.service (bsc#1173277).

Update to 3.5.1:

  * Create new file when writing pidfile (CVE-2020-14367, bsc#1174911)

- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)

- Use iburst in the default pool statements to speed up initial
  synchronisation (bsc#1172113).




Update to 3.5:

+ Add support for more accurate reading of PHC on Linux 5.0
+ Add support for hardware timestamping on interfaces with read-only timestamping configuration
+ Add support for memory locking and real-time priority on FreeBSD, NetBSD, Solaris
+ Update seccomp filter to work on more architectures
+ Validate refclock driver options
+ Fix bindaddress directive on FreeBSD
+ Fix transposition of hardware RX timestamp on Linux 4.13 and later
+ Fix building on non-glibc systems

- Fix location of helper script in chrony-dnssrv@.service
  (bsc#1128846).


- Read runtime servers from /var/run/netconfig/chrony.servers to
  fix bsc#1099272.
- Move chrony-helper to /usr/lib/chrony/helper, because there
  should be no executables in /usr/share.

Update to version 3.4

  * Enhancements

    + Add filter option to server/pool/peer directive
    + Add minsamples and maxsamples options to hwtimestamp directive
    + Add support for faster frequency adjustments in Linux 4.19
    + Change default pidfile to /var/run/chrony/chronyd.pid to allow chronyd 
      without root privileges to remove it on exit
    + Disable sub-second polling intervals for distant NTP sources
    + Extend range of supported sub-second polling intervals
    + Get/set IPv4 destination/source address of NTP packets on FreeBSD
    + Make burst options and command useful with short polling intervals
    + Modify auto_offline option to activate when sending request failed
    + Respond from interface that received NTP request if possible
    + Add onoffline command to switch between online and offline state 
      according to current system network configuration
    + Improve example NetworkManager dispatcher script

  * Bug fixes

    + Avoid waiting in Linux getrandom system call
    + Fix PPS support on FreeBSD and NetBSD

Update to version 3.3

  * Enhancements:

    + Add burst option to server/pool directive
    + Add stratum and tai options to refclock directive
    + Add support for Nettle crypto library
    + Add workaround for missing kernel receive timestamps on Linux
    + Wait for late hardware transmit timestamps
    + Improve source selection with unreachable sources
    + Improve protection against replay attacks on symmetric mode
    + Allow PHC refclock to use socket in /var/run/chrony
    + Add shutdown command to stop chronyd
    + Simplify format of response to manual list command
    + Improve handling of unknown responses in chronyc

  * Bug fixes:

    + Respond to NTPv1 client requests with zero mode
    + Fix -x option to not require CAP_SYS_TIME under non-root user
    + Fix acquisitionport directive to work with privilege separation
    + Fix handling of socket errors on Linux to avoid high CPU usage
    + Fix chronyc to not get stuck in infinite loop after clock step		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1099272">SUSE bug 1099272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115529">SUSE bug 1115529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1128846">SUSE bug 1128846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162964">SUSE bug 1162964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172113">SUSE bug 1172113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173277">SUSE bug 1173277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174075">SUSE bug 1174075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174911">SUSE bug 1174911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180689">SUSE bug 1180689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181826">SUSE bug 1181826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187906">SUSE bug 1187906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190926">SUSE bug 1190926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194229">SUSE bug 1194229</bugzilla>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14367/">CVE-2020-14367</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672200" comment="augeas-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672201" comment="augeas-devel-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672202" comment="augeas-lenses-1.10.1-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672203" comment="libaugeas0-1.10.1-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111621" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673286" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673287" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673288" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673289" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673290" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673291" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673292" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673293" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673294" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673295" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111622" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672636" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111623" version="1" class="patch">
	<metadata>
		<title>Security update for ghostscript (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1194303" ref_url="https://bugzilla.suse.com/1194303" source="BUGZILLA"/>
		<reference ref_id="1194304" ref_url="https://bugzilla.suse.com/1194304" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45944" ref_url="https://www.suse.com/security/cve/CVE-2021-45944/" source="CVE"/>
		<reference ref_id="CVE-2021-45949" ref_url="https://www.suse.com/security/cve/CVE-2021-45949/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0088-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010219.html" source="SUSE-SU"/>
		<description>
This update for ghostscript fixes the following issues:

- CVE-2021-45944: Fixed use-after-free in sampled_data_sample (bsc#1194303)
- CVE-2021-45949: Fixed heap-based buffer overflow in sampled_data_finish (bsc#1194304)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194303">SUSE bug 1194303</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194304">SUSE bug 1194304</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45944/">CVE-2021-45944</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45949/">CVE-2021-45949</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667514" comment="ghostscript-9.52-161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667515" comment="ghostscript-devel-9.52-161.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667516" comment="ghostscript-x11-9.52-161.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111624" version="1" class="patch">
	<metadata>
		<title>Security update for lapack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1193562" ref_url="https://bugzilla.suse.com/1193562" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4048" ref_url="https://www.suse.com/security/cve/CVE-2021-4048/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010492.html" source="SUSE-SU"/>
		<description>
This update for lapack fixes the following issues:

- CVE-2021-4048: Fixed an out of bounds read when user input was not validated properly (bsc#1193562).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1193562">SUSE bug 1193562</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4048/">CVE-2021-4048</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670480" comment="blas-devel-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670481" comment="lapack-devel-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670482" comment="libblas3-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670483" comment="liblapack3-3.5.0-4.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670484" comment="liblapacke3-3.5.0-4.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111625" version="1" class="patch">
	<metadata>
		<title>Security update for libarchive (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1022528" ref_url="https://bugzilla.suse.com/1022528" source="BUGZILLA"/>
		<reference ref_id="1188572" ref_url="https://bugzilla.suse.com/1188572" source="BUGZILLA"/>
		<reference ref_id="1189528" ref_url="https://bugzilla.suse.com/1189528" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-5601" ref_url="https://www.suse.com/security/cve/CVE-2017-5601/" source="CVE"/>
		<reference ref_id="CVE-2021-36976" ref_url="https://www.suse.com/security/cve/CVE-2021-36976/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010509.html" source="SUSE-SU"/>
		<description>
This update for libarchive fixes the following issues:

- CVE-2021-36976: Fixed an invalid memory access that could cause data
  corruption (bsc#1188572).

Non-security updates:

- Updated references for CVE-2017-5601, which was already fixed in a previous
  version (bsc#1022528 bsc#1189528).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1022528">SUSE bug 1022528</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188572">SUSE bug 1188572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189528">SUSE bug 1189528</bugzilla>
	<cve impact="moderate" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-5601/">CVE-2017-5601</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-36976/">CVE-2021-36976</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673552" comment="bsdtar-3.4.2-150200.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673553" comment="libarchive-devel-3.4.2-150200.4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673554" comment="libarchive13-3.4.2-150200.4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111626" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673918" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673919" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673920" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673921" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673922" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673923" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673924" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673925" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673926" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673927" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673928" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673929" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111627" version="1" class="patch">
	<metadata>
		<title>Security update for wavpack (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Real Time 15 SP2</platform>
		</affected>
		<reference ref_id="1197020" ref_url="https://bugzilla.suse.com/1197020" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44269" ref_url="https://www.suse.com/security/cve/CVE-2021-44269/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010546.html" source="SUSE-SU"/>
		<description>
This update for wavpack fixes the following issues:

- CVE-2021-44269: Fixed out of bounds read in processing .wav files (bsc#1197020).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-28"/>
	<updated date="2022-03-28"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1197020">SUSE bug 1197020</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-44269/">CVE-2021-44269</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle_rt:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009664578" comment="SUSE Linux Enterprise Real Time 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673283" comment="libwavpack1-5.4.0-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673284" comment="wavpack-5.4.0-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673285" comment="wavpack-devel-5.4.0-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111628" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660305" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660306" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660307" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111629" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659823" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659824" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659825" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659826" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659827" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111630" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659853" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659854" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659855" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111631" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659850" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659851" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659852" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111632" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676863" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676864" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676865" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111633" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673683" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673684" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673685" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673686" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673687" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111634" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010015.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663377" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663378" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111635" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677348" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677349" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677350" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677351" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677352" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677353" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677354" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677355" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677356" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677357" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677358" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677440" comment="salt-transactional-update-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111636" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677002" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677003" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677004" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677005" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677006" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111637" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677359" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677360" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677361" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677362" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111638" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678659" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678660" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678661" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678662" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111639" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677371" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677372" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111640" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678098" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678099" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678100" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678101" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678102" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678103" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678104" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678105" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678106" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111641" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677363" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677364" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677365" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677366" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677367" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677368" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677369" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677370" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111642" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679203" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679204" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679205" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679206" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111643" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679207" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679208" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679209" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679210" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679211" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679212" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111644" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678472" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678473" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678474" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111645" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678663" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678664" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678665" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111646" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679213" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679214" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679215" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679216" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679217" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679218" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679219" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111647" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678666" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678667" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111648" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677924" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677925" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677926" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111649" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679873" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679874" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679875" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679876" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679877" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679878" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679879" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679880" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679881" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679882" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111650" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111651" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679489" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679490" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111652" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679725" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679726" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111653" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111654" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111655" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111656" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680353" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680354" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680355" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680356" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111657" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679493" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111658" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663750" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663751" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111659" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663762" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663763" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663764" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663765" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111660" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681186" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681187" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111661" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680357" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680358" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680359" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680360" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680361" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680362" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680363" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111662" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681196" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681197" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681198" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111663" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681193" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681194" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681195" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111664" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664186" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111665" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664318" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664319" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664320" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111666" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664091" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664092" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664093" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111667" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664324" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664325" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664326" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664327" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664328" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664329" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664330" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111668" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664184" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664185" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111669" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664603" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664604" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664605" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664606" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111670" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664607" comment="kernel-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664608" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664609" comment="kernel-default-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664566" comment="kernel-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664567" comment="kernel-docs-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664568" comment="kernel-macros-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664610" comment="kernel-obs-build-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664611" comment="kernel-preempt-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664612" comment="kernel-preempt-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664572" comment="kernel-source-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664613" comment="kernel-syms-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111671" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111672" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678579" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111673" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111674" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680364" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680365" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680366" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680367" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680368" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111675" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680369" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680370" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680371" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680372" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111676" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665679" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665680" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665681" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665682" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665683" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665684" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665685" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665686" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665687" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665688" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665689" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665690" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665691" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665692" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665693" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665694" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665695" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665696" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665697" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665698" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665699" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665700" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665701" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665702" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665703" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665704" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665705" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665706" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665707" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665708" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665709" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665710" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665711" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665712" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665713" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665714" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665715" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665716" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665717" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665718" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665719" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665720" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665721" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665722" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665723" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665724" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665725" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665726" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665727" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111677" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667559" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667560" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667561" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667562" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667563" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667564" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667565" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111678" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010221.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663938" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663939" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663940" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663941" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663942" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663943" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111679" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662065" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662066" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662067" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662068" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662069" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662070" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662071" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662072" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662073" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662074" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662075" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662076" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662077" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662078" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662079" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662080" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662081" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662082" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662083" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662084" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662085" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662086" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662087" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662088" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662089" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662090" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662091" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662092" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111680" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111681" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667316" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667317" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111682" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665728" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665729" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111683" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664579" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664580" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664581" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664582" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111684" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664868" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664869" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664870" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664871" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111685" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664574" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664575" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664576" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664577" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111686" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665730" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665731" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665732" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111687" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667820" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111688" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661279" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661280" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661281" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661282" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661283" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111689" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111690" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662466" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662467" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111691" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111692" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668752" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668753" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668754" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111693" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668197" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668198" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668199" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668200" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111694" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669223" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669224" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669225" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669226" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669227" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669228" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669229" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669230" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669231" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669232" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111695" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669756" comment="nodejs-common-2.0-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669799" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669800" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669801" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111696" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670710" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670711" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670712" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670713" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670714" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670715" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670716" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111697" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670036" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670037" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670038" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670039" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670040" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670041" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111698" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669220" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669221" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669222" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111699" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669254" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669255" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669256" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111700" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669219" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111701" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111702" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670075" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670076" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670077" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669038" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669039" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669040" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111703" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669588" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669589" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669590" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111704" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669585" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669586" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669587" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111705" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669776" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669777" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669778" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669779" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669780" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111706" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670479" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111707" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670034" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670035" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111708" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671526" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671527" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671528" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671529" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671530" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671531" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671532" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111709" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670707" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670708" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670709" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111710" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668003" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111711" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671522" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671523" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671524" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671525" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111712" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670489" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111713" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667545" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667546" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111714" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671518" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671519" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671520" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671521" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111715" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010428.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111716" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672204" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672205" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672206" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672207" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111717" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669047" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669048" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669049" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669050" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669051" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669052" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669053" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669054" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669055" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111718" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672167" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672168" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672169" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672170" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672171" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672172" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672173" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672174" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672175" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672176" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672177" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672178" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672179" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672180" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672181" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672182" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672183" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672184" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672185" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672186" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672187" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672188" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672189" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672190" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672191" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672192" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672193" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672194" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672195" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672196" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672197" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672198" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672199" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111719" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671239" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671240" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671241" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111720" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672208" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672209" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672210" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672211" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672212" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672213" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672214" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672215" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672216" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672217" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672218" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672219" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672220" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672221" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672222" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672223" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672224" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672225" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672226" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672227" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672228" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672229" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672230" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672231" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672232" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672233" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672234" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672235" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672236" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672237" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672238" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672239" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672240" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672241" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672242" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672243" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672244" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672245" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672246" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672247" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672248" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672249" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672250" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672251" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672252" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672253" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672254" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672255" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672256" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672257" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672258" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111721" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673286" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673287" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673288" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673289" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673290" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673291" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673292" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673293" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673294" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673295" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111722" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672636" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111723" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-BCL</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_bcl:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2-BCL is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673918" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673919" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673920" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673921" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673922" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673923" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673924" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673925" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673926" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673927" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673928" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673929" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111724" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660281" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660282" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660283" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111725" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659793" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659795" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659796" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659797" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659798" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111726" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659804" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659805" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111727" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659801" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659802" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111728" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673897" comment="java-1_8_0-ibm-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673898" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673899" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673900" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-150000.3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111729" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676844" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676845" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676846" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111730" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673667" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673674" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673668" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673669" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673676" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111731" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010015.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663285" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663286" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111732" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677441" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677442" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677443" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677444" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677445" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677446" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677447" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677448" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677449" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677450" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677451" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677452" comment="salt-transactional-update-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111733" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676990" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676991" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676993" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676994" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676995" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111734" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662459" comment="java-1_8_0-ibm-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662460" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662461" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662462" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111735" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678152" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678153" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678154" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678155" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111736" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678631" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678688" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678633" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678634" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111737" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677226" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677227" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111738" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678029" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678031" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678033" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678035" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678037" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678039" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678041" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678042" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678043" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111739" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677217" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677218" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677219" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677220" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677229" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677221" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677222" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677223" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111740" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679123" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679125" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679126" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679128" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111741" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679220" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679221" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679222" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679223" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679224" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679225" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111742" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678459" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678460" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678461" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111743" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678637" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678638" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678639" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111744" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679659" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679660" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679661" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679662" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679199" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679200" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679663" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679664" comment="reiserfs-kmp-default-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111745" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678635" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678636" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111746" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677917" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677918" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677919" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111747" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679900" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679901" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679902" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679903" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679904" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679905" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679906" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679907" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679908" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679909" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111748" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111749" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679467" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679468" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111750" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679714" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679715" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111751" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111752" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111753" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111754" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680157" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680158" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680159" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680160" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111755" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679466" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111756" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663720" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663721" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111757" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663724" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663827" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663726" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663727" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111758" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681162" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681163" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111759" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680164" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680165" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680186" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680187" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680188" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680167" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680189" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111760" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681172" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681173" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681175" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111761" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681168" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681169" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681171" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111762" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664151" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111763" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664287" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664288" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664289" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111764" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664152" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664153" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664154" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111765" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664283" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664284" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664296" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664297" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664298" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664286" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664299" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111766" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664148" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664149" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111767" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664492" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664493" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664494" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664495" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111768" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664884" comment="kernel-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664885" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664886" comment="kernel-default-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664566" comment="kernel-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664567" comment="kernel-docs-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664568" comment="kernel-macros-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664887" comment="kernel-obs-build-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664570" comment="kernel-preempt-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664571" comment="kernel-preempt-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664572" comment="kernel-source-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664888" comment="kernel-syms-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664889" comment="reiserfs-kmp-default-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111769" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111770" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666586" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666587" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666588" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666589" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666590" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666591" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666592" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666593" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666594" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666595" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666596" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666597" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666598" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666599" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666600" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666601" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666602" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666603" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666604" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666605" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666606" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666607" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666608" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666609" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666610" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666611" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666612" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666613" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666614" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666615" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666616" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666617" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666618" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666619" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666620" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666621" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666622" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666623" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666624" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666625" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666626" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666627" comment="samba-ad-dc-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665669" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666628" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666629" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666630" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666631" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666632" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666633" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666634" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111771" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667580" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667581" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667582" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667583" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667505" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667506" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667584" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667585" comment="reiserfs-kmp-default-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111772" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010221.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663839" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663840" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663841" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663842" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663857" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663858" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111773" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662981" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662982" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662983" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662984" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662985" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662986" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662987" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662988" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662989" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662990" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662991" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662992" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662993" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662994" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662995" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662996" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662997" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662998" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662999" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663000" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663001" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663002" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663003" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663004" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663005" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663006" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663007" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111774" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111775" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667312" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667313" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111776" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665431" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665432" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111777" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668322" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664555" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668323" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664557" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111778" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664852" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664854" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664855" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664856" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111779" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664496" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664497" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664498" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664499" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111780" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665433" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665434" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665435" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111781" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667814" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111782" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661027" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661028" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661029" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661030" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661031" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111783" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111784" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662457" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662458" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111785" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111786" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668508" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668509" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668511" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111787" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668193" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668251" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668195" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668196" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111788" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669233" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669234" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669235" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669236" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669237" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669238" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669239" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669240" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669241" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669242" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111789" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669756" comment="nodejs-common-2.0-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669854" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669855" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669856" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111790" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670663" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670664" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670668" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670669" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670670" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670666" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670671" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111791" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669930" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669931" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669932" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669933" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669934" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669935" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111792" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669162" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669163" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669164" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111793" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669194" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669195" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669197" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111794" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669161" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111795" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111796" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669010" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669011" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669012" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669013" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669022" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669023" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111797" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669570" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669571" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669572" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111798" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669567" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669568" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669569" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111799" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670737" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670738" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670739" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670740" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670741" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111800" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670453" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111801" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669929" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669881" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111802" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671634" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671635" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671636" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671637" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671512" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671513" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671638" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671639" comment="reiserfs-kmp-default-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111803" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670660" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670661" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670662" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111804" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667949" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111805" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671381" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671898" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671383" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671384" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111806" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670467" comment="python2-libxml2-python-2.9.7-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670465" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111807" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667470" comment="python2-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667471" comment="python2-lxml-devel-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667411" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667412" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111808" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672538" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672539" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672540" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672541" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111809" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010428.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111810" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672020" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672510" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672022" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672023" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111811" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669056" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669057" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669058" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669059" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669060" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669061" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669062" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669063" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669064" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111812" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671971" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671972" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671973" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671975" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671976" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671978" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671979" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671981" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671982" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671984" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671986" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671987" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671989" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672015" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671990" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671991" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671993" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671995" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671996" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671998" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672016" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672017" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671999" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672018" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672000" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672002" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672003" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672005" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672006" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672007" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672008" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672009" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672019" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111813" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671081" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671082" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671083" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111814" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672028" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672029" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672030" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672031" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672032" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672033" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672034" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672035" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672036" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672037" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672038" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672039" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672040" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672041" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672042" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672043" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672044" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672045" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672046" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672047" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672048" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672049" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672050" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672051" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672052" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672053" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672054" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672055" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672056" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672057" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672058" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672059" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672060" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672061" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672062" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672063" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672064" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672065" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672066" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672067" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672068" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672069" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672070" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672071" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672072" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672073" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672074" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672075" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672076" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672077" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672078" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111815" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672865" comment="libopenssl-1_0_0-devel-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672867" comment="libopenssl1_0_0-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672868" comment="openssl-1_0_0-1.0.2p-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111816" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673200" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673201" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673202" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673204" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673207" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673209" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673210" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673212" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673213" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673214" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111817" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672634" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111818" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672630" comment="java-1_8_0-openjdk-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672631" comment="java-1_8_0-openjdk-demo-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672632" comment="java-1_8_0-openjdk-devel-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672633" comment="java-1_8_0-openjdk-headless-1.8.0.322-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111819" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673930" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673931" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673932" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673933" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673934" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673935" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673936" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673937" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673938" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673939" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673940" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673941" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111820" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009925.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661014" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661015" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661016" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111821" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009932.html" source="SUSE-SU"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659842" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659843" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659844" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659845" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659846" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111822" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009938.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661298" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661299" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659855" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111823" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009942.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661300" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661301" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659852" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111824" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194925" ref_url="https://bugzilla.suse.com/1194925" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194927" ref_url="https://bugzilla.suse.com/1194927" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194930" ref_url="https://bugzilla.suse.com/1194930" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195146" ref_url="https://bugzilla.suse.com/1195146" source="BUGZILLA"/>
		<reference ref_id="1196500" ref_url="https://bugzilla.suse.com/1196500" source="BUGZILLA"/>
		<reference ref_id="1197126" ref_url="https://bugzilla.suse.com/1197126" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21271" ref_url="https://www.suse.com/security/cve/CVE-2022-21271/" source="CVE"/>
		<reference ref_id="CVE-2022-21277" ref_url="https://www.suse.com/security/cve/CVE-2022-21277/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21291" ref_url="https://www.suse.com/security/cve/CVE-2022-21291/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="CVE-2022-21366" ref_url="https://www.suse.com/security/cve/CVE-2022-21366/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010559.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

Update Java 8.0 to Service Refresh 7 Fix Pack 5 (bsc#1197126).

Including fixes for the following vulnerabilities: 

  CVE-2022-21366, CVE-2022-21365, CVE-2022-21360, CVE-2022-21349,
  CVE-2022-21341, CVE-2022-21340, CVE-2022-21305, CVE-2022-21277,
  CVE-2022-21299, CVE-2022-21296, CVE-2022-21282, CVE-2022-21294,
  CVE-2022-21293, CVE-2022-21291, CVE-2022-21283, CVE-2022-21248,
  CVE-2022-21271.

Non-securtiy fix:

- Fixed a broken symlink for javaws (bsc#1195146).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194925">SUSE bug 1194925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194927">SUSE bug 1194927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194930">SUSE bug 1194930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195146">SUSE bug 1195146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196500">SUSE bug 1196500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197126">SUSE bug 1197126</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21271/">CVE-2022-21271</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21277/">CVE-2022-21277</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21291/">CVE-2022-21291</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21366/">CVE-2022-21366</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673970" comment="java-1_8_0-ibm-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673898" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673971" comment="java-1_8_0-ibm-devel-1.8.0_sr7.5-150000.3.56.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673900" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.5-150000.3.56.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111825" version="1" class="patch">
	<metadata>
		<title>Security update for openvpn (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197341" ref_url="https://bugzilla.suse.com/1197341" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0547" ref_url="https://www.suse.com/security/cve/CVE-2022-0547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010558.html" source="SUSE-SU"/>
		<description>
This update for openvpn fixes the following issues:

- CVE-2022-0547: Fixed possible authentication bypass in external authentication plug-in (bsc#1197341).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197341">SUSE bug 1197341</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-0547/">CVE-2022-0547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009676869" comment="openvpn-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676870" comment="openvpn-auth-pam-plugin-2.4.3-150000.5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676871" comment="openvpn-devel-2.4.3-150000.5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111826" version="1" class="patch">
	<metadata>
		<title>Security update for apache2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197091" ref_url="https://bugzilla.suse.com/1197091" source="BUGZILLA"/>
		<reference ref_id="1197095" ref_url="https://bugzilla.suse.com/1197095" source="BUGZILLA"/>
		<reference ref_id="1197096" ref_url="https://bugzilla.suse.com/1197096" source="BUGZILLA"/>
		<reference ref_id="1197098" ref_url="https://bugzilla.suse.com/1197098" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22719" ref_url="https://www.suse.com/security/cve/CVE-2022-22719/" source="CVE"/>
		<reference ref_id="CVE-2022-22720" ref_url="https://www.suse.com/security/cve/CVE-2022-22720/" source="CVE"/>
		<reference ref_id="CVE-2022-22721" ref_url="https://www.suse.com/security/cve/CVE-2022-22721/" source="CVE"/>
		<reference ref_id="CVE-2022-23943" ref_url="https://www.suse.com/security/cve/CVE-2022-23943/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010563.html" source="SUSE-SU"/>
		<description>
This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-29"/>
	<updated date="2022-03-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197091">SUSE bug 1197091</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197095">SUSE bug 1197095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197096">SUSE bug 1197096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197098">SUSE bug 1197098</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22719/">CVE-2022-22719</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-22720/">CVE-2022-22720</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22721/">CVE-2022-22721</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23943/">CVE-2022-23943</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677101" comment="apache2-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677102" comment="apache2-devel-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673675" comment="apache2-doc-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677103" comment="apache2-prefork-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677104" comment="apache2-utils-2.4.51-150200.3.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677105" comment="apache2-worker-2.4.51-150200.3.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111827" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010015.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2020-14409: Fixed Integer Overflow resulting in heap corruption in SDL_BlitCopy in video/SDL_blit_copy.c via a crafted .BMP (bsc#1181202).
- CVE-2020-14410: Fixed heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c via a crafted .BMP (bsc#1181201).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663956" comment="libSDL2-2_0-0-2.0.8-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663957" comment="libSDL2-devel-2.0.8-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111828" version="1" class="patch">
	<metadata>
		<title>Security update for salt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197417" ref_url="https://bugzilla.suse.com/1197417" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22934" ref_url="https://www.suse.com/security/cve/CVE-2022-22934/" source="CVE"/>
		<reference ref_id="CVE-2022-22935" ref_url="https://www.suse.com/security/cve/CVE-2022-22935/" source="CVE"/>
		<reference ref_id="CVE-2022-22936" ref_url="https://www.suse.com/security/cve/CVE-2022-22936/" source="CVE"/>
		<reference ref_id="CVE-2022-22941" ref_url="https://www.suse.com/security/cve/CVE-2022-22941/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010571.html" source="SUSE-SU"/>
		<description>
This update for salt fixes the following issues:

- CVE-2022-22935: Sign authentication replies to prevent MiTM (bsc#1197417)
- CVE-2022-22934: Sign pillar data to prevent MiTM attacks. (bsc#1197417)
- CVE-2022-22936: Prevent job and fileserver replays (bsc#1197417)
- CVE-2022-22941: Fixed targeting bug, especially visible when using syndic and user auth. (bsc#1197417)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197417">SUSE bug 1197417</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22934/">CVE-2022-22934</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22935/">CVE-2022-22935</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-22936/">CVE-2022-22936</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22941/">CVE-2022-22941</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677488" comment="python3-salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677489" comment="salt-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677490" comment="salt-api-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677325" comment="salt-bash-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677491" comment="salt-cloud-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677492" comment="salt-doc-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677328" comment="salt-fish-completion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677493" comment="salt-master-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677494" comment="salt-minion-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677495" comment="salt-proxy-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677496" comment="salt-ssh-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677497" comment="salt-standalone-formulas-configuration-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677498" comment="salt-syndic-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677499" comment="salt-transactional-update-3002.2-150200.58.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677335" comment="salt-zsh-completion-3002.2-150200.58.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111829" version="1" class="patch">
	<metadata>
		<title>Security update for zlib (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197459" ref_url="https://bugzilla.suse.com/1197459" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25032" ref_url="https://www.suse.com/security/cve/CVE-2018-25032/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010582.html" source="SUSE-SU"/>
		<description>
This update for zlib fixes the following issues:

- CVE-2018-25032: Fixed memory corruption on deflate (bsc#1197459).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-30"/>
	<updated date="2022-03-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197459">SUSE bug 1197459</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25032/">CVE-2018-25032</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677012" comment="libminizip1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677013" comment="libz1-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676992" comment="libz1-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677014" comment="minizip-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677015" comment="zlib-devel-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009676996" comment="zlib-devel-32bit-1.2.11-150000.3.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677016" comment="zlib-devel-static-1.2.11-150000.3.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111830" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010012.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662476" comment="java-1_8_0-ibm-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662460" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662477" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662462" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111831" version="1" class="patch">
	<metadata>
		<title>Security update for 389-ds (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197275" ref_url="https://bugzilla.suse.com/1197275" source="BUGZILLA"/>
		<reference ref_id="1197345" ref_url="https://bugzilla.suse.com/1197345" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0918" ref_url="https://www.suse.com/security/cve/CVE-2022-0918/" source="CVE"/>
		<reference ref_id="CVE-2022-0996" ref_url="https://www.suse.com/security/cve/CVE-2022-0996/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010650.html" source="SUSE-SU"/>
		<description>
This update for 389-ds fixes the following issues:

- CVE-2022-0918: Fixed a potential denial of service via crafted packet (bsc#1197275).
- CVE-2022-0996: Fixed a mishandling of password expiry (bsc#1197345).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-04"/>
	<updated date="2022-04-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197275">SUSE bug 1197275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197345">SUSE bug 1197345</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0918/">CVE-2022-0918</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0996/">CVE-2022-0996</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678192" comment="389-ds-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678193" comment="389-ds-devel-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678194" comment="lib389-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678195" comment="libsvrcore0-1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111832" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197698" ref_url="https://bugzilla.suse.com/1197698" source="BUGZILLA"/>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="CVE-2022-1196" ref_url="https://www.suse.com/security/cve/CVE-2022-1196/" source="CVE"/>
		<reference ref_id="CVE-2022-24713" ref_url="https://www.suse.com/security/cve/CVE-2022-24713/" source="CVE"/>
		<reference ref_id="CVE-2022-28281" ref_url="https://www.suse.com/security/cve/CVE-2022-28281/" source="CVE"/>
		<reference ref_id="CVE-2022-28282" ref_url="https://www.suse.com/security/cve/CVE-2022-28282/" source="CVE"/>
		<reference ref_id="CVE-2022-28285" ref_url="https://www.suse.com/security/cve/CVE-2022-28285/" source="CVE"/>
		<reference ref_id="CVE-2022-28286" ref_url="https://www.suse.com/security/cve/CVE-2022-28286/" source="CVE"/>
		<reference ref_id="CVE-2022-28289" ref_url="https://www.suse.com/security/cve/CVE-2022-28289/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010667.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.8.0 ESR (bsc#1197903):

MFSA 2022-14 (bsc#1197903)

* CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11 tokens are removed while in use
* CVE-2022-28281: Fixed an out of bounds write due to unexpected WebAuthN Extensions
* CVE-2022-1196: Fixed a use-after-free after VR Process destruction
* CVE-2022-28282: Fixed a use-after-free in DocumentL10n::TranslateDocument
* CVE-2022-28285: Fixed incorrect AliasSet used in JIT Codegen
* CVE-2022-28286: Fixed that iframe contents could be rendered outside the border
* CVE-2022-24713: Fixed a denial of service via complex regular expressions
* CVE-2022-28289: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8

The following non-security bugs were fixed:

- Adjust rust dependency for SP3 and later. TW uses always the
  newest version of rust, but we don't, so we can't use the
  rust+cargo notation, which would need both &lt; and &gt;= requirements.
  (bsc#1197698)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-07"/>
	<updated date="2022-04-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197698">SUSE bug 1197698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-1196/">CVE-2022-1196</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-24713/">CVE-2022-24713</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28281/">CVE-2022-28281</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28282/">CVE-2022-28282</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-28285/">CVE-2022-28285</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-28286/">CVE-2022-28286</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-28289/">CVE-2022-28289</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678705" comment="MozillaFirefox-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678706" comment="MozillaFirefox-devel-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678707" comment="MozillaFirefox-translations-common-91.8.0-150200.152.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678708" comment="MozillaFirefox-translations-other-91.8.0-150200.152.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111833" version="1" class="patch">
	<metadata>
		<title>Security update for libexif (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1172768" ref_url="https://bugzilla.suse.com/1172768" source="BUGZILLA"/>
		<reference ref_id="1172802" ref_url="https://bugzilla.suse.com/1172802" source="BUGZILLA"/>
		<reference ref_id="1178479" ref_url="https://bugzilla.suse.com/1178479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0181" ref_url="https://www.suse.com/security/cve/CVE-2020-0181/" source="CVE"/>
		<reference ref_id="CVE-2020-0198" ref_url="https://www.suse.com/security/cve/CVE-2020-0198/" source="CVE"/>
		<reference ref_id="CVE-2020-0452" ref_url="https://www.suse.com/security/cve/CVE-2020-0452/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010678.html" source="SUSE-SU"/>
		<description>
This update for libexif fixes the following issues:

- CVE-2020-0181: Fixed an integer overflow that could lead to denial of service
  (bsc#1172802).
- CVE-2020-0198: Fixed and unsigned integer overflow that could lead to denial
  of service (bsc#1172768).
- CVE-2020-0452: Fixed a buffer overflow check that could be optimized away
  by the compiler (bsc#1178479).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172768">SUSE bug 1172768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172802">SUSE bug 1172802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178479">SUSE bug 1178479</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0181/">CVE-2020-0181</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-0198/">CVE-2020-0198</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0452/">CVE-2020-0452</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677486" comment="libexif-devel-0.6.22-150000.5.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677487" comment="libexif12-0.6.22-150000.5.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111834" version="1" class="patch">
	<metadata>
		<title>Security update for mozilla-nss (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197903" ref_url="https://bugzilla.suse.com/1197903" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1097" ref_url="https://www.suse.com/security/cve/CVE-2022-1097/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010677.html" source="SUSE-SU"/>
		<description>
This update for mozilla-nss fixes the following issues:

Mozilla NSS 3.68.3 (bsc#1197903):
  - CVE-2022-1097: Fixed memory safety violations that could occur when PKCS#11
    tokens are removed while in use.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-11"/>
	<updated date="2022-04-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197903">SUSE bug 1197903</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1097/">CVE-2022-1097</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678171" comment="libfreebl3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678030" comment="libfreebl3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678172" comment="libfreebl3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678032" comment="libfreebl3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678173" comment="libsoftokn3-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678034" comment="libsoftokn3-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678174" comment="libsoftokn3-hmac-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678036" comment="libsoftokn3-hmac-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678175" comment="mozilla-nss-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678038" comment="mozilla-nss-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678176" comment="mozilla-nss-certs-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678040" comment="mozilla-nss-certs-32bit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678177" comment="mozilla-nss-devel-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678178" comment="mozilla-nss-sysinit-3.68.3-150000.3.67.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678179" comment="mozilla-nss-tools-3.68.3-150000.3.67.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111835" version="1" class="patch">
	<metadata>
		<title>Security update for libsolv, libzypp, zypper (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184501" ref_url="https://bugzilla.suse.com/1184501" source="BUGZILLA"/>
		<reference ref_id="1194848" ref_url="https://bugzilla.suse.com/1194848" source="BUGZILLA"/>
		<reference ref_id="1195999" ref_url="https://bugzilla.suse.com/1195999" source="BUGZILLA"/>
		<reference ref_id="1196061" ref_url="https://bugzilla.suse.com/1196061" source="BUGZILLA"/>
		<reference ref_id="1196317" ref_url="https://bugzilla.suse.com/1196317" source="BUGZILLA"/>
		<reference ref_id="1196368" ref_url="https://bugzilla.suse.com/1196368" source="BUGZILLA"/>
		<reference ref_id="1196514" ref_url="https://bugzilla.suse.com/1196514" source="BUGZILLA"/>
		<reference ref_id="1196925" ref_url="https://bugzilla.suse.com/1196925" source="BUGZILLA"/>
		<reference ref_id="1197134" ref_url="https://bugzilla.suse.com/1197134" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010688.html" source="SUSE-SU"/>
		<description>
This update for libsolv, libzypp, zypper fixes the following issues:

Security relevant fix:

- Harden package signature checks (bsc#1184501).

libsolv update to 0.7.22:

- reworked choice rule generation to cover more usecases
- support SOLVABLE_PREREQ_IGNOREINST in the ordering code (bsc#1196514)
- support parsing of Debian's Multi-Arch indicator
- fix segfault on conflict resolution when using bindings
- fix split provides not working if the update includes a forbidden vendor change
- support strict repository priorities
  new solver flag: SOLVER_FLAG_STRICT_REPO_PRIORITY
- support zstd compressed control files in debian packages
- add an ifdef allowing to rename Solvable dependency members ('requires' is a keyword in C++20)
- support setting/reading userdata in solv files
  new functions: repowriter_set_userdata, solv_read_userdata
- support queying of the custom vendor check function
  new function: pool_get_custom_vendorcheck
- support solv files with an idarray block
- allow accessing the toolversion at runtime

libzypp update to 17.30.0:

- ZConfig: Update solver settings if target changes (bsc#1196368)
- Fix possible hang in singletrans mode (bsc#1197134)
- Do 2 retries if mount is still busy.
- Fix package signature check (bsc#1184501)
  Pay attention that header and payload are secured by a valid
  signature and report more detailed which signature is missing.
- Retry umount if device is busy (bsc#1196061, closes #381)
  A previously released ISO image may need a bit more time to
  release it's loop device. So we wait a bit and retry.
- Fix serializing/deserializing type mismatch in zypp-rpm protocol (bsc#1196925)
- Fix handling of ISO media in releaseAll (bsc#1196061)
- Hint on common ptf resolver conflicts (bsc#1194848)
- Hint on ptf&lt;&gt;patch resolver conflicts (bsc#1194848)

zypper update to 1.14.52:

- info: print the packages upstream URL if available (fixes #426)
- info: Fix SEGV with not installed PTFs (bsc#1196317)
- Don't prevent less restrictive umasks (bsc#1195999)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184501">SUSE bug 1184501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194848">SUSE bug 1194848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195999">SUSE bug 1195999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196061">SUSE bug 1196061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196317">SUSE bug 1196317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196368">SUSE bug 1196368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196514">SUSE bug 1196514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196925">SUSE bug 1196925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197134">SUSE bug 1197134</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679236" comment="libsolv-devel-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679237" comment="libsolv-tools-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679238" comment="libzypp-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679239" comment="libzypp-devel-17.30.0-150200.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679240" comment="perl-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679241" comment="python3-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679242" comment="ruby-solv-0.7.22-150200.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679243" comment="zypper-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677224" comment="zypper-log-1.14.52-150200.30.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677225" comment="zypper-needs-restarting-1.14.52-150200.30.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111836" version="1" class="patch">
	<metadata>
		<title>Security update for xz (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198062" ref_url="https://bugzilla.suse.com/1198062" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1271" ref_url="https://www.suse.com/security/cve/CVE-2022-1271/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010686.html" source="SUSE-SU"/>
		<description>
This update for xz fixes the following issues:

- CVE-2022-1271: Fixed an incorrect escaping of malicious filenames (ZDI-CAN-16587). (bsc#1198062)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198062">SUSE bug 1198062</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1271/">CVE-2022-1271</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679226" comment="liblzma5-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679124" comment="liblzma5-32bit-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679227" comment="xz-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679228" comment="xz-devel-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679127" comment="xz-lang-5.2.3-150000.4.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679229" comment="xz-static-devel-5.2.3-150000.4.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111837" version="1" class="patch">
	<metadata>
		<title>Security update for subversion (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197939" ref_url="https://bugzilla.suse.com/1197939" source="BUGZILLA"/>
		<reference ref_id="1197940" ref_url="https://bugzilla.suse.com/1197940" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-28544" ref_url="https://www.suse.com/security/cve/CVE-2021-28544/" source="CVE"/>
		<reference ref_id="CVE-2022-24070" ref_url="https://www.suse.com/security/cve/CVE-2022-24070/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010683.html" source="SUSE-SU"/>
		<description>
This update for subversion fixes the following issues:

- CVE-2022-24070: Fixed a memory corruption issue in mod_dav_svn as used by Apache
  HTTP server. This could be exploited by a remote attacker to cause a denegation
  of service (bsc#1197940).
- CVE-2021-28544: Fixed an information leak issue where Subversion servers may
  reveal the original path of files protected by path-based authorization
  (bsc#1197939).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197939">SUSE bug 1197939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197940">SUSE bug 1197940</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-28544/">CVE-2021-28544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24070/">CVE-2022-24070</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679230" comment="subversion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679186" comment="subversion-bash-completion-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679231" comment="subversion-devel-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679232" comment="subversion-perl-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679233" comment="subversion-python-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679234" comment="subversion-server-1.10.6-150000.3.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679235" comment="subversion-tools-1.10.6-150000.3.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111838" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010690.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

Update to version 1.16.15 (bsc#1182345):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51331).
  - Fixed an issue when building source in riscv64 (go#51198).
  - Increased compatibility for the DNS protocol in the net module (go#51161).
  - Fixed an issue with histograms in the runtime/metrics module (go#50733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679244" comment="go1.16-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679245" comment="go1.16-doc-1.16.15-150000.1.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678474" comment="go1.16-race-1.16.15-150000.1.46.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111839" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1183043" ref_url="https://bugzilla.suse.com/1183043" source="BUGZILLA"/>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1196732" ref_url="https://bugzilla.suse.com/1196732" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24921" ref_url="https://www.suse.com/security/cve/CVE-2022-24921/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010692.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

Update to version 1.17.8 (bsc#1190649):
  - CVE-2022-24921: Fixed a potential denial of service via large regular
    expressions (bsc#1196732).

Non-security fixes:
  - Fixed an issue with v2 modules (go#51332).
  - Fixed an issue when building source in riscv64 (go#51199).
  - Increased compatibility for the DNS protocol in the net module (go#51162).
  - Fixed an issue with histograms in the runtime/metrics module (go#50734).
  - Fixed an issue when parsing x509 certificates (go#51000).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-12"/>
	<updated date="2022-04-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183043">SUSE bug 1183043</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196732">SUSE bug 1196732</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24921/">CVE-2022-24921</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679246" comment="go1.17-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679247" comment="go1.17-doc-1.17.8-150000.1.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678665" comment="go1.17-race-1.17.8-150000.1.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111840" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1193731" ref_url="https://bugzilla.suse.com/1193731" source="BUGZILLA"/>
		<reference ref_id="1194943" ref_url="https://bugzilla.suse.com/1194943" source="BUGZILLA"/>
		<reference ref_id="1195051" ref_url="https://bugzilla.suse.com/1195051" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195353" ref_url="https://bugzilla.suse.com/1195353" source="BUGZILLA"/>
		<reference ref_id="1195403" ref_url="https://bugzilla.suse.com/1195403" source="BUGZILLA"/>
		<reference ref_id="1195939" ref_url="https://bugzilla.suse.com/1195939" source="BUGZILLA"/>
		<reference ref_id="1196018" ref_url="https://bugzilla.suse.com/1196018" source="BUGZILLA"/>
		<reference ref_id="1196196" ref_url="https://bugzilla.suse.com/1196196" source="BUGZILLA"/>
		<reference ref_id="1196468" ref_url="https://bugzilla.suse.com/1196468" source="BUGZILLA"/>
		<reference ref_id="1196488" ref_url="https://bugzilla.suse.com/1196488" source="BUGZILLA"/>
		<reference ref_id="1196761" ref_url="https://bugzilla.suse.com/1196761" source="BUGZILLA"/>
		<reference ref_id="1196823" ref_url="https://bugzilla.suse.com/1196823" source="BUGZILLA"/>
		<reference ref_id="1196830" ref_url="https://bugzilla.suse.com/1196830" source="BUGZILLA"/>
		<reference ref_id="1196836" ref_url="https://bugzilla.suse.com/1196836" source="BUGZILLA"/>
		<reference ref_id="1196956" ref_url="https://bugzilla.suse.com/1196956" source="BUGZILLA"/>
		<reference ref_id="1197227" ref_url="https://bugzilla.suse.com/1197227" source="BUGZILLA"/>
		<reference ref_id="1197331" ref_url="https://bugzilla.suse.com/1197331" source="BUGZILLA"/>
		<reference ref_id="1197366" ref_url="https://bugzilla.suse.com/1197366" source="BUGZILLA"/>
		<reference ref_id="1197389" ref_url="https://bugzilla.suse.com/1197389" source="BUGZILLA"/>
		<reference ref_id="1197462" ref_url="https://bugzilla.suse.com/1197462" source="BUGZILLA"/>
		<reference ref_id="1197702" ref_url="https://bugzilla.suse.com/1197702" source="BUGZILLA"/>
		<reference ref_id="1197914" ref_url="https://bugzilla.suse.com/1197914" source="BUGZILLA"/>
		<reference ref_id="1198031" ref_url="https://bugzilla.suse.com/1198031" source="BUGZILLA"/>
		<reference ref_id="1198032" ref_url="https://bugzilla.suse.com/1198032" source="BUGZILLA"/>
		<reference ref_id="1198033" ref_url="https://bugzilla.suse.com/1198033" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0920" ref_url="https://www.suse.com/security/cve/CVE-2021-0920/" source="CVE"/>
		<reference ref_id="CVE-2021-39698" ref_url="https://www.suse.com/security/cve/CVE-2021-39698/" source="CVE"/>
		<reference ref_id="CVE-2021-45868" ref_url="https://www.suse.com/security/cve/CVE-2021-45868/" source="CVE"/>
		<reference ref_id="CVE-2022-0850" ref_url="https://www.suse.com/security/cve/CVE-2022-0850/" source="CVE"/>
		<reference ref_id="CVE-2022-0854" ref_url="https://www.suse.com/security/cve/CVE-2022-0854/" source="CVE"/>
		<reference ref_id="CVE-2022-1016" ref_url="https://www.suse.com/security/cve/CVE-2022-1016/" source="CVE"/>
		<reference ref_id="CVE-2022-1048" ref_url="https://www.suse.com/security/cve/CVE-2022-1048/" source="CVE"/>
		<reference ref_id="CVE-2022-1055" ref_url="https://www.suse.com/security/cve/CVE-2022-1055/" source="CVE"/>
		<reference ref_id="CVE-2022-23036" ref_url="https://www.suse.com/security/cve/CVE-2022-23036/" source="CVE"/>
		<reference ref_id="CVE-2022-23037" ref_url="https://www.suse.com/security/cve/CVE-2022-23037/" source="CVE"/>
		<reference ref_id="CVE-2022-23038" ref_url="https://www.suse.com/security/cve/CVE-2022-23038/" source="CVE"/>
		<reference ref_id="CVE-2022-23039" ref_url="https://www.suse.com/security/cve/CVE-2022-23039/" source="CVE"/>
		<reference ref_id="CVE-2022-23040" ref_url="https://www.suse.com/security/cve/CVE-2022-23040/" source="CVE"/>
		<reference ref_id="CVE-2022-23041" ref_url="https://www.suse.com/security/cve/CVE-2022-23041/" source="CVE"/>
		<reference ref_id="CVE-2022-23042" ref_url="https://www.suse.com/security/cve/CVE-2022-23042/" source="CVE"/>
		<reference ref_id="CVE-2022-26490" ref_url="https://www.suse.com/security/cve/CVE-2022-26490/" source="CVE"/>
		<reference ref_id="CVE-2022-26966" ref_url="https://www.suse.com/security/cve/CVE-2022-26966/" source="CVE"/>
		<reference ref_id="CVE-2022-27666" ref_url="https://www.suse.com/security/cve/CVE-2022-27666/" source="CVE"/>
		<reference ref_id="CVE-2022-28388" ref_url="https://www.suse.com/security/cve/CVE-2022-28388/" source="CVE"/>
		<reference ref_id="CVE-2022-28389" ref_url="https://www.suse.com/security/cve/CVE-2022-28389/" source="CVE"/>
		<reference ref_id="CVE-2022-28390" ref_url="https://www.suse.com/security/cve/CVE-2022-28390/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010731.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated.

The following security bugs were fixed:

- CVE-2021-45868: Fixed a wrong validation check in fs/quota/quota_tree.c which could lead to an use-after-free if there is a corrupted quota file. (bnc#1197366)
- CVE-2022-27666: Fixed a buffer overflow vulnerability in IPsec ESP transformation code. This flaw allowed a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation. (bnc#1197462)
- CVE-2022-0850: Fixed a kernel information leak vulnerability in iov_iter.c. (bsc#1196761)
- CVE-2022-1055: Fixed a use-after-free in tc_new_tfilter that could allow a local attacker to gain privilege escalation. (bnc#1197702)
- CVE-2022-1048: Fixed a race Condition in snd_pcm_hw_free leading to use-after-free due to the AB/BA lock with buffer_mutex and mmap_lock. (bsc#1197331)
- CVE-2022-28390: Fixed a double free in drivers/net/can/usb/ems_usb.c vulnerability in the Linux kernel. (bnc#1198031)
- CVE-2022-28388: Fixed a double free in drivers/net/can/usb/usb_8dev.c vulnerability in the Linux kernel. (bnc#1198032)
- CVE-2022-28389: Fixed a double free in drivers/net/can/usb/mcba_usb.c vulnerability in the Linux kernel. (bnc#1198033)
- CVE-2022-1016: Fixed a vulnerability in the nf_tables component of the netfilter subsystem. This vulnerability gives an attacker a powerful primitive that can be used to both read from and write to relative stack data, which can lead to arbitrary code execution. (bsc#1197227)
- CVE-2022-0854: Fixed a memory leak flaw was found in the Linux kernels DMA subsystem. This flaw allowed a local user to read random memory from the kernel space. (bnc#1196823)
- CVE-2022-26966: Fixed an issue in drivers/net/usb/sr9700.c, which allowed attackers to obtain sensitive information from the memory via crafted frame lengths from a USB device. (bsc#1196836)
- CVE-2021-39698: Fixed a possible memory corruption due to a use after free in aio_poll_complete_work. This could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1196956)
- CVE-2021-0920: Fixed a race condition during UNIX socket garbage collection that could lead to local privilege escalation. (bsc#119373)
- CVE-2022-23036,CVE-2022-23037,CVE-2022-23038,CVE-2022-23039,CVE-2022-23040,CVE-2022-23041,CVE-2022-23042: Fixed multiple issues which could have lead to read/write access to memory pages or denial of service. These issues are related to the Xen PV device frontend drivers. (bsc#1196488)
- CVE-2022-26490: Fixed a buffer overflow in the st21nfca driver. An attacker with adjacent NFC access could crash the system or corrupt the system memory. (bsc#1196830)

The following non-security bugs were fixed:

- ax88179_178a: Merge memcpy + le32_to_cpus to get_unaligned_le32 (bsc#1196018).
- cifs: use the correct max-length for dentry_path_raw() (bsc1196196).
- drm: add a locked version of drm_is_current_master (bsc#1197914).
- drm: drm_file struct kABI compatibility workaround (bsc#1197914).
- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).
- drm: serialize drm_file.master with a new spinlock (bsc#1197914).
- drm: use the lookup lock in drm_is_current_master (bsc#1197914).
- net: tipc: validate domain record count on input (bsc#1195254).
- llc: fix netdevice reference leaks in llc_ui_bind() (git-fixes).
- net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup (bsc#1196018).
- net/mlx5e: Fix page DMA map/unmap attributes (bsc#1196468).
- netfilter: conntrack: do not refresh sctp entries in closed state (bsc#1197389).
- powerpc/mm/numa: skip NUMA_NO_NODE onlining in parse_numa_properties() (bsc#1179639 ltc#189002 git-fixes).
- SUNRPC: avoid race between mod_timer() and del_timer_sync() (bnc#1195403).
- usb: host: xen-hcd: add missing unlock in error path (git-fixes).
- xen/usb: do not use gnttab_end_foreign_access() in xenhcd_gnttab_done() (bsc#1196488, XSA-396).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193731">SUSE bug 1193731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194943">SUSE bug 1194943</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195051">SUSE bug 1195051</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195353">SUSE bug 1195353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195403">SUSE bug 1195403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195939">SUSE bug 1195939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196018">SUSE bug 1196018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196196">SUSE bug 1196196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196468">SUSE bug 1196468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196488">SUSE bug 1196488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196761">SUSE bug 1196761</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196823">SUSE bug 1196823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196830">SUSE bug 1196830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196836">SUSE bug 1196836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196956">SUSE bug 1196956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197227">SUSE bug 1197227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197331">SUSE bug 1197331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197366">SUSE bug 1197366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197389">SUSE bug 1197389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197462">SUSE bug 1197462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197702">SUSE bug 1197702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197914">SUSE bug 1197914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198031">SUSE bug 1198031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198032">SUSE bug 1198032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198033">SUSE bug 1198033</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0920/">CVE-2021-0920</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-39698/">CVE-2021-39698</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-45868/">CVE-2021-45868</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0850/">CVE-2022-0850</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0854/">CVE-2022-0854</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-1016/">CVE-2022-1016</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1048/">CVE-2022-1048</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1055/">CVE-2022-1055</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23036/">CVE-2022-23036</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23037/">CVE-2022-23037</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23038/">CVE-2022-23038</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23039/">CVE-2022-23039</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23040/">CVE-2022-23040</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23041/">CVE-2022-23041</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23042/">CVE-2022-23042</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26490/">CVE-2022-26490</cve>
	<cve impact="moderate" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-26966/">CVE-2022-26966</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27666/">CVE-2022-27666</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28388/">CVE-2022-28388</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28389/">CVE-2022-28389</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-28390/">CVE-2022-28390</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679665" comment="kernel-default-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679666" comment="kernel-default-base-5.3.18-150200.24.112.1.150200.9.52.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679667" comment="kernel-default-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679195" comment="kernel-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679196" comment="kernel-docs-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679197" comment="kernel-macros-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679668" comment="kernel-obs-build-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679217" comment="kernel-preempt-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679218" comment="kernel-preempt-devel-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679201" comment="kernel-source-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679669" comment="kernel-syms-5.3.18-150200.24.112.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679670" comment="reiserfs-kmp-default-5.3.18-150200.24.112.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111841" version="1" class="patch">
	<metadata>
		<title>Security update for SDL2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010735.html" source="SUSE-SU"/>
		<description>
This update for SDL2 fixes the following issues:

- CVE-2021-33657: Fix a buffer overflow when parsing a crafted BMP image (bsc#1198001).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-14"/>
	<updated date="2022-04-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679671" comment="libSDL2-2_0-0-2.0.8-150200.11.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679672" comment="libSDL2-devel-2.0.8-150200.11.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111842" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1076314" ref_url="https://bugzilla.suse.com/1076314" source="BUGZILLA"/>
		<reference ref_id="1076967" ref_url="https://bugzilla.suse.com/1076967" source="BUGZILLA"/>
		<reference ref_id="1079845" ref_url="https://bugzilla.suse.com/1079845" source="BUGZILLA"/>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1106882" ref_url="https://bugzilla.suse.com/1106882" source="BUGZILLA"/>
		<reference ref_id="1140130" ref_url="https://bugzilla.suse.com/1140130" source="BUGZILLA"/>
		<reference ref_id="1160782" ref_url="https://bugzilla.suse.com/1160782" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="1197738" ref_url="https://bugzilla.suse.com/1197738" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16375" ref_url="https://www.suse.com/security/cve/CVE-2018-16375/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2018-20845" ref_url="https://www.suse.com/security/cve/CVE-2018-20845/" source="CVE"/>
		<reference ref_id="CVE-2018-5727" ref_url="https://www.suse.com/security/cve/CVE-2018-5727/" source="CVE"/>
		<reference ref_id="CVE-2018-5785" ref_url="https://www.suse.com/security/cve/CVE-2018-5785/" source="CVE"/>
		<reference ref_id="CVE-2018-6616" ref_url="https://www.suse.com/security/cve/CVE-2018-6616/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-6851" ref_url="https://www.suse.com/security/cve/CVE-2020-6851/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="CVE-2022-1122" ref_url="https://www.suse.com/security/cve/CVE-2022-1122/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010745.html" source="SUSE-SU"/>
		<description>
This update for openjpeg2 fixes the following issues:

- CVE-2018-5727: Fixed integer overflow vulnerability in theopj_t1_encode_cblks function (bsc#1076314).
- CVE-2018-5785: Fixed integer overflow caused by an out-of-bounds leftshift in the opj_j2k_setup_encoder function (bsc#1076967).
- CVE-2018-6616: Fixed excessive iteration in the opj_t1_encode_cblks function of openjp2/t1.c (bsc#1079845).
- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16375: Fixed missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c (bsc#1106882).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2018-20845: Fixed division-by-zero in the functions pi_next_pcrl, pi_next_cprl, and pi_next_rpcl in openmj2/pi.ci (bsc#1140130).
- CVE-2020-6851: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor (bsc#1160782).
- CVE-2020-8112: Fixed heap-based buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed use-after-free if t a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457).
- CVE-2021-29338: Fixed integer overflow that allows remote attackers to crash the application (bsc#1184774).
- CVE-2022-1122: Fixed segmentation fault in opj2_decompress due to uninitialized pointer (bsc#1197738).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076314">SUSE bug 1076314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1076967">SUSE bug 1076967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1079845">SUSE bug 1079845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106882">SUSE bug 1106882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140130">SUSE bug 1140130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160782">SUSE bug 1160782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197738">SUSE bug 1197738</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16375/">CVE-2018-16375</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20845/">CVE-2018-20845</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-5727/">CVE-2018-5727</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-5785/">CVE-2018-5785</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-6616/">CVE-2018-6616</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6851/">CVE-2020-6851</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-1122/">CVE-2022-1122</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009677930" comment="libopenjp2-7-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677931" comment="openjpeg2-2.3.0-150000.3.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009677932" comment="openjpeg2-devel-2.3.0-150000.3.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111843" version="1" class="patch">
	<metadata>
		<title>Security update for git (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198234" ref_url="https://bugzilla.suse.com/1198234" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24765" ref_url="https://www.suse.com/security/cve/CVE-2022-24765/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010750.html" source="SUSE-SU"/>
		<description>
This update for git fixes the following issues:

- CVE-2022-24765: Fixed a potential command injection via git worktree (bsc#1198234).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198234">SUSE bug 1198234</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24765/">CVE-2022-24765</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679931" comment="git-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679932" comment="git-arch-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679933" comment="git-core-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679934" comment="git-cvs-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679935" comment="git-daemon-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679855" comment="git-doc-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679936" comment="git-email-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679937" comment="git-gui-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679938" comment="git-svn-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679939" comment="git-web-2.26.2-150000.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679940" comment="gitk-2.26.2-150000.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111844" version="1" class="patch">
	<metadata>
		<title>Security update for jsoup, jsr-305 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189749" ref_url="https://bugzilla.suse.com/1189749" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-37714" ref_url="https://www.suse.com/security/cve/CVE-2021-37714/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010753.html" source="SUSE-SU"/>
		<description>
This update for jsoup, jsr-305 fixes the following issues:

- CVE-2021-37714: Fixed infinite in untrusted HTML or XML data parsing (bsc#1189749).

Changes in jsr-305:
- Build with java source and target levels 8 
- Upgrade to upstream version 3.0.2

Changes in jsoup:
- Upgrade to upstream version 1.14.2
- Generate tarball using source service instead of a script
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189749">SUSE bug 1189749</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37714/">CVE-2021-37714</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009678640" comment="jsoup-1.14.2-150200.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678641" comment="jsr-305-3.0.2-150200.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111845" version="1" class="patch">
	<metadata>
		<title>Security update for SDL (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1181201" ref_url="https://bugzilla.suse.com/1181201" source="BUGZILLA"/>
		<reference ref_id="1181202" ref_url="https://bugzilla.suse.com/1181202" source="BUGZILLA"/>
		<reference ref_id="1198001" ref_url="https://bugzilla.suse.com/1198001" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14409" ref_url="https://www.suse.com/security/cve/CVE-2020-14409/" source="CVE"/>
		<reference ref_id="CVE-2020-14410" ref_url="https://www.suse.com/security/cve/CVE-2020-14410/" source="CVE"/>
		<reference ref_id="CVE-2021-33657" ref_url="https://www.suse.com/security/cve/CVE-2021-33657/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010769.html" source="SUSE-SU"/>
		<description>
This update for SDL fixes the following issues:

- CVE-2020-14409: Fixed an integer overflow (and resultant SDL_memcpy heap corruption) in SDL_BlitCopy in video/SDL_blit_copy.c. (bsc#1181202)
- CVE-2020-14410: Fixed a heap-based buffer over-read in Blit_3or4_to_3or4__inversed_rgb in video/SDL_blit_N.c. (bsc#1181201)
- CVE-2021-33657: Fixed a Heap overflow problem in video/SDL_pixels.c. (bsc#1198001)
  		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-20"/>
	<updated date="2022-04-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181201">SUSE bug 1181201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181202">SUSE bug 1181202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198001">SUSE bug 1198001</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14409/">CVE-2020-14409</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14410/">CVE-2020-14410</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33657/">CVE-2021-33657</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679508" comment="libSDL-1_2-0-1.2.15-150000.3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679509" comment="libSDL-devel-1.2.15-150000.3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111846" version="1" class="patch">
	<metadata>
		<title>Security update for openjpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1102016" ref_url="https://bugzilla.suse.com/1102016" source="BUGZILLA"/>
		<reference ref_id="1106881" ref_url="https://bugzilla.suse.com/1106881" source="BUGZILLA"/>
		<reference ref_id="1162090" ref_url="https://bugzilla.suse.com/1162090" source="BUGZILLA"/>
		<reference ref_id="1173578" ref_url="https://bugzilla.suse.com/1173578" source="BUGZILLA"/>
		<reference ref_id="1180457" ref_url="https://bugzilla.suse.com/1180457" source="BUGZILLA"/>
		<reference ref_id="1184774" ref_url="https://bugzilla.suse.com/1184774" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-14423" ref_url="https://www.suse.com/security/cve/CVE-2018-14423/" source="CVE"/>
		<reference ref_id="CVE-2018-16376" ref_url="https://www.suse.com/security/cve/CVE-2018-16376/" source="CVE"/>
		<reference ref_id="CVE-2020-15389" ref_url="https://www.suse.com/security/cve/CVE-2020-15389/" source="CVE"/>
		<reference ref_id="CVE-2020-27823" ref_url="https://www.suse.com/security/cve/CVE-2020-27823/" source="CVE"/>
		<reference ref_id="CVE-2020-8112" ref_url="https://www.suse.com/security/cve/CVE-2020-8112/" source="CVE"/>
		<reference ref_id="CVE-2021-29338" ref_url="https://www.suse.com/security/cve/CVE-2021-29338/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010791.html" source="SUSE-SU"/>
		<description>
This update for openjpeg fixes the following issues:

- CVE-2018-14423: Fixed division-by-zero vulnerabilities in the functions pi_next_pcrl, pi_next_cprl,and pi_next_rpcl in lib/openjp3d/pi.c (bsc#1102016).
- CVE-2018-16376: Fixed heap-based buffer overflow function t2_encode_packet in lib/openmj2/t2.c (bsc#1106881).
- CVE-2020-8112: Fixed a heap buffer overflow in opj_t1_clbl_decode_processor in openjp2/t1.c (bsc#1162090).
- CVE-2020-15389: Fixed a use-after-free if a mix of valid and invalid files in a directory operated on by the decompressor (bsc#1173578).
- CVE-2020-27823: Fixed a heap buffer over-write in opj_tcd_dc_level_shift_encode() (bsc#1180457),
- CVE-2021-29338: Fixed an integer Overflow allows remote attackers to crash the application (bsc#1184774).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1102016">SUSE bug 1102016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1106881">SUSE bug 1106881</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162090">SUSE bug 1162090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173578">SUSE bug 1173578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180457">SUSE bug 1180457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184774">SUSE bug 1184774</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-14423/">CVE-2018-14423</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-16376/">CVE-2018-16376</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15389/">CVE-2020-15389</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27823/">CVE-2020-27823</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-8112/">CVE-2020-8112</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29338/">CVE-2021-29338</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679731" comment="libopenjpeg1-1.5.2-150000.4.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679732" comment="openjpeg-devel-1.5.2-150000.4.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111847" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010030.html" source="SUSE-SU"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111848" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194267" ref_url="https://bugzilla.suse.com/1194267" source="BUGZILLA"/>
		<reference ref_id="1196915" ref_url="https://bugzilla.suse.com/1196915" source="BUGZILLA"/>
		<reference ref_id="1197423" ref_url="https://bugzilla.suse.com/1197423" source="BUGZILLA"/>
		<reference ref_id="1197425" ref_url="https://bugzilla.suse.com/1197425" source="BUGZILLA"/>
		<reference ref_id="1197426" ref_url="https://bugzilla.suse.com/1197426" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-26401" ref_url="https://www.suse.com/security/cve/CVE-2021-26401/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-26356" ref_url="https://www.suse.com/security/cve/CVE-2022-26356/" source="CVE"/>
		<reference ref_id="CVE-2022-26357" ref_url="https://www.suse.com/security/cve/CVE-2022-26357/" source="CVE"/>
		<reference ref_id="CVE-2022-26358" ref_url="https://www.suse.com/security/cve/CVE-2022-26358/" source="CVE"/>
		<reference ref_id="CVE-2022-26359" ref_url="https://www.suse.com/security/cve/CVE-2022-26359/" source="CVE"/>
		<reference ref_id="CVE-2022-26360" ref_url="https://www.suse.com/security/cve/CVE-2022-26360/" source="CVE"/>
		<reference ref_id="CVE-2022-26361" ref_url="https://www.suse.com/security/cve/CVE-2022-26361/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010792.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-26356: Fixed potential race conditions in dirty memory tracking that
  could cause a denial of service in the host (bsc#1197423).
- CVE-2022-26357: Fixed a potential race condition in memory cleanup for hosts
  using VT-d IOMMU hardware, which could lead to a denial of service in the host
  (bsc#1197425).
- CVE-2022-26358,CVE-2022-26359,CVE-2022-26360,CVE-2022-26361: Fixed various memory
  corruption issues for hosts using VT-d or AMD-Vi IOMMU hardware. These could be
  leveraged by an attacker to cause a denial of service in the host (bsc#1197426).
- CVE-2022-0001, CVE-2022-0002, CVE-2021-26401: Added BHB speculation issue
  mitigations (bsc#1196915).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194267">SUSE bug 1194267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196915">SUSE bug 1196915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197423">SUSE bug 1197423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197425">SUSE bug 1197425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197426">SUSE bug 1197426</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-26401/">CVE-2021-26401</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26356/">CVE-2022-26356</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26357/">CVE-2022-26357</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26358/">CVE-2022-26358</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26359/">CVE-2022-26359</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26360/">CVE-2022-26360</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-26361/">CVE-2022-26361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680340" comment="xen-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680341" comment="xen-devel-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680342" comment="xen-libs-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680343" comment="xen-tools-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680344" comment="xen-tools-domU-4.13.4_08-150200.3.50.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680345" comment="xen-tools-xendomains-wait-disk-4.13.4_08-150200.3.50.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111849" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198136" ref_url="https://bugzilla.suse.com/1198136" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:1304-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010796.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security hardening, related to Spring Framework vulnerabilities:
    
- Deprecate getResources() and always return null (bsc#1198136).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198136">SUSE bug 1198136</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679716" comment="tomcat-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679717" comment="tomcat-admin-webapps-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679718" comment="tomcat-el-3_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679719" comment="tomcat-jsp-2_3-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679720" comment="tomcat-lib-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679721" comment="tomcat-servlet-4_0-api-9.0.36-150200.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679722" comment="tomcat-webapps-9.0.36-150200.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111850" version="1" class="patch">
	<metadata>
		<title>Security update for libinput (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198111" ref_url="https://bugzilla.suse.com/1198111" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-1215" ref_url="https://www.suse.com/security/cve/CVE-2022-1215/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010797.html" source="SUSE-SU"/>
		<description>
This update for libinput fixes the following issues:

- CVE-2022-1215: Fixed a format string vulnerability (bsc#1198111).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198111">SUSE bug 1198111</bugzilla>
	<cve impact="important" cvss3="8.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-1215/">CVE-2022-1215</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680460" comment="libinput-devel-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680461" comment="libinput-tools-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680462" comment="libinput-udev-1.10.5-150000.3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680463" comment="libinput10-1.10.5-150000.3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111851" version="1" class="patch">
	<metadata>
		<title>Security update for dnsmasq (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197872" ref_url="https://bugzilla.suse.com/1197872" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0934" ref_url="https://www.suse.com/security/cve/CVE-2022-0934/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010803.html" source="SUSE-SU"/>
		<description>
This update for dnsmasq fixes the following issues:

- CVE-2022-0934: Fixed an invalid memory access that could lead to remote denial
  of service via crafted packet (bsc#1197872).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-22"/>
	<updated date="2022-04-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197872">SUSE bug 1197872</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-0934/">CVE-2022-0934</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679512" comment="dnsmasq-2.86-150100.7.20.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111852" version="1" class="patch">
	<metadata>
		<title>Security update for busybox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1064976" ref_url="https://bugzilla.suse.com/1064976" source="BUGZILLA"/>
		<reference ref_id="1064978" ref_url="https://bugzilla.suse.com/1064978" source="BUGZILLA"/>
		<reference ref_id="1069412" ref_url="https://bugzilla.suse.com/1069412" source="BUGZILLA"/>
		<reference ref_id="1099260" ref_url="https://bugzilla.suse.com/1099260" source="BUGZILLA"/>
		<reference ref_id="1099263" ref_url="https://bugzilla.suse.com/1099263" source="BUGZILLA"/>
		<reference ref_id="1102912" ref_url="https://bugzilla.suse.com/1102912" source="BUGZILLA"/>
		<reference ref_id="1121426" ref_url="https://bugzilla.suse.com/1121426" source="BUGZILLA"/>
		<reference ref_id="1121428" ref_url="https://bugzilla.suse.com/1121428" source="BUGZILLA"/>
		<reference ref_id="1184522" ref_url="https://bugzilla.suse.com/1184522" source="BUGZILLA"/>
		<reference ref_id="1192869" ref_url="https://bugzilla.suse.com/1192869" source="BUGZILLA"/>
		<reference ref_id="951562" ref_url="https://bugzilla.suse.com/951562" source="BUGZILLA"/>
		<reference ref_id="970662" ref_url="https://bugzilla.suse.com/970662" source="BUGZILLA"/>
		<reference ref_id="970663" ref_url="https://bugzilla.suse.com/970663" source="BUGZILLA"/>
		<reference ref_id="991940" ref_url="https://bugzilla.suse.com/991940" source="BUGZILLA"/>
		<reference ref_id="CVE-2011-5325" ref_url="https://www.suse.com/security/cve/CVE-2011-5325/" source="CVE"/>
		<reference ref_id="CVE-2015-9261" ref_url="https://www.suse.com/security/cve/CVE-2015-9261/" source="CVE"/>
		<reference ref_id="CVE-2016-2147" ref_url="https://www.suse.com/security/cve/CVE-2016-2147/" source="CVE"/>
		<reference ref_id="CVE-2016-2148" ref_url="https://www.suse.com/security/cve/CVE-2016-2148/" source="CVE"/>
		<reference ref_id="CVE-2016-6301" ref_url="https://www.suse.com/security/cve/CVE-2016-6301/" source="CVE"/>
		<reference ref_id="CVE-2017-15873" ref_url="https://www.suse.com/security/cve/CVE-2017-15873/" source="CVE"/>
		<reference ref_id="CVE-2017-15874" ref_url="https://www.suse.com/security/cve/CVE-2017-15874/" source="CVE"/>
		<reference ref_id="CVE-2017-16544" ref_url="https://www.suse.com/security/cve/CVE-2017-16544/" source="CVE"/>
		<reference ref_id="CVE-2018-1000500" ref_url="https://www.suse.com/security/cve/CVE-2018-1000500/" source="CVE"/>
		<reference ref_id="CVE-2018-1000517" ref_url="https://www.suse.com/security/cve/CVE-2018-1000517/" source="CVE"/>
		<reference ref_id="CVE-2018-20679" ref_url="https://www.suse.com/security/cve/CVE-2018-20679/" source="CVE"/>
		<reference ref_id="CVE-2019-5747" ref_url="https://www.suse.com/security/cve/CVE-2019-5747/" source="CVE"/>
		<reference ref_id="CVE-2021-28831" ref_url="https://www.suse.com/security/cve/CVE-2021-28831/" source="CVE"/>
		<reference ref_id="CVE-2021-42373" ref_url="https://www.suse.com/security/cve/CVE-2021-42373/" source="CVE"/>
		<reference ref_id="CVE-2021-42374" ref_url="https://www.suse.com/security/cve/CVE-2021-42374/" source="CVE"/>
		<reference ref_id="CVE-2021-42375" ref_url="https://www.suse.com/security/cve/CVE-2021-42375/" source="CVE"/>
		<reference ref_id="CVE-2021-42376" ref_url="https://www.suse.com/security/cve/CVE-2021-42376/" source="CVE"/>
		<reference ref_id="CVE-2021-42377" ref_url="https://www.suse.com/security/cve/CVE-2021-42377/" source="CVE"/>
		<reference ref_id="CVE-2021-42378" ref_url="https://www.suse.com/security/cve/CVE-2021-42378/" source="CVE"/>
		<reference ref_id="CVE-2021-42379" ref_url="https://www.suse.com/security/cve/CVE-2021-42379/" source="CVE"/>
		<reference ref_id="CVE-2021-42380" ref_url="https://www.suse.com/security/cve/CVE-2021-42380/" source="CVE"/>
		<reference ref_id="CVE-2021-42381" ref_url="https://www.suse.com/security/cve/CVE-2021-42381/" source="CVE"/>
		<reference ref_id="CVE-2021-42382" ref_url="https://www.suse.com/security/cve/CVE-2021-42382/" source="CVE"/>
		<reference ref_id="CVE-2021-42383" ref_url="https://www.suse.com/security/cve/CVE-2021-42383/" source="CVE"/>
		<reference ref_id="CVE-2021-42384" ref_url="https://www.suse.com/security/cve/CVE-2021-42384/" source="CVE"/>
		<reference ref_id="CVE-2021-42385" ref_url="https://www.suse.com/security/cve/CVE-2021-42385/" source="CVE"/>
		<reference ref_id="CVE-2021-42386" ref_url="https://www.suse.com/security/cve/CVE-2021-42386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010031.html" source="SUSE-SU"/>
		<description>
This update for busybox fixes the following issues:

- CVE-2011-5325: Fixed tar directory traversal (bsc#951562).
- CVE-2015-9261: Fixed segfalts and application crashes in huft_build (bsc#1102912).
- CVE-2016-2147: Fixed out of bounds write (heap) due to integer underflow in udhcpc (bsc#970663).
- CVE-2016-2148: Fixed heap-based buffer overflow in OPTION_6RD parsing (bsc#970662).
- CVE-2016-6301: Fixed NTP server denial of service flaw (bsc#991940).
- CVE-2017-15873: Fixed integer overflow in get_next_block function in archival/libarchive/decompress_bunzip2.c (bsc#1064976).
- CVE-2017-15874: Fixed integer underflow in archival/libarchive/decompress_unlzma.c (bsc#1064978).
- CVE-2017-16544: Fixed Insufficient sanitization of filenames when autocompleting (bsc#1069412).
- CVE-2018-1000500 : Fixed missing SSL certificate validation in wget (bsc#1099263).
- CVE-2018-1000517: Fixed heap-based buffer overflow in the retrieve_file_data() (bsc#1099260).
- CVE-2018-20679: Fixed out of bounds read in udhcp (bsc#1121426).
- CVE-2019-5747: Fixed out of bounds read in udhcp components (bsc#1121428).
- CVE-2021-28831: Fixed invalid free or segmentation fault via malformed gzip data (bsc#1184522).
- CVE-2021-42373: Fixed NULL pointer dereference in man leading to DoS when a section name is supplied but no page argument is given (bsc#1192869).
- CVE-2021-42374: Fixed out-of-bounds heap read in unlzma leading to information leak and DoS when crafted LZMA-compressed input is decompressed (bsc#1192869).
- CVE-2021-42375: Fixed incorrect handling of a special element in ash leading to DoS when processing a crafted shell command, due to the shell mistaking specific characters for reserved characters (bsc#1192869).
- CVE-2021-42376: Fixed NULL pointer dereference in hush leading to DoS when processing a crafted shell command (bsc#1192869).
- CVE-2021-42377: Fixed attacker-controlled pointer free in hush leading to DoS and possible code execution when processing a crafted shell command (bsc#1192869).
- CVE-2021-42378: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_i function (bsc#1192869).
- CVE-2021-42379: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the next_input_file function (bsc#1192869).
- CVE-2021-42380: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the clrvar function (bsc#1192869).
- CVE-2021-42381: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the hash_init function (bsc#1192869).
- CVE-2021-42382: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the getvar_s function (bsc#1192869).
- CVE-2021-42383: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42384: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the handle_special function (bsc#1192869).
- CVE-2021-42385: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the evaluate function (bsc#1192869).
- CVE-2021-42386: Fixed use-after-free in awk leading to DoS and possibly code execution when processing a crafted awk pattern in the nvalloc function (bsc#1192869).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1064976">SUSE bug 1064976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1064978">SUSE bug 1064978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1069412">SUSE bug 1069412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099260">SUSE bug 1099260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1099263">SUSE bug 1099263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102912">SUSE bug 1102912</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121426">SUSE bug 1121426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1121428">SUSE bug 1121428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184522">SUSE bug 1184522</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192869">SUSE bug 1192869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/951562">SUSE bug 951562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970662">SUSE bug 970662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/970663">SUSE bug 970663</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/991940">SUSE bug 991940</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2011-5325/">CVE-2011-5325</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-9261/">CVE-2015-9261</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2016-2147/">CVE-2016-2147</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-2148/">CVE-2016-2148</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2016-6301/">CVE-2016-6301</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-15873/">CVE-2017-15873</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-15874/">CVE-2017-15874</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-16544/">CVE-2017-16544</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2018-1000500/">CVE-2018-1000500</cve>
	<cve impact="important" cvss3="5.6/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-1000517/">CVE-2018-1000517</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-20679/">CVE-2018-20679</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2019-5747/">CVE-2019-5747</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28831/">CVE-2021-28831</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42373/">CVE-2021-42373</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42374/">CVE-2021-42374</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42375/">CVE-2021-42375</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42376/">CVE-2021-42376</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42377/">CVE-2021-42377</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42378/">CVE-2021-42378</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42379/">CVE-2021-42379</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42380/">CVE-2021-42380</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42381/">CVE-2021-42381</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42382/">CVE-2021-42382</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42383/">CVE-2021-42383</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42384/">CVE-2021-42384</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42385/">CVE-2021-42385</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-42386/">CVE-2021-42386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663766" comment="busybox-1.34.1-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663767" comment="busybox-static-1.34.1-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111853" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194547" ref_url="https://bugzilla.suse.com/1194547" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4140" ref_url="https://www.suse.com/security/cve/CVE-2021-4140/" source="CVE"/>
		<reference ref_id="CVE-2022-22737" ref_url="https://www.suse.com/security/cve/CVE-2022-22737/" source="CVE"/>
		<reference ref_id="CVE-2022-22738" ref_url="https://www.suse.com/security/cve/CVE-2022-22738/" source="CVE"/>
		<reference ref_id="CVE-2022-22739" ref_url="https://www.suse.com/security/cve/CVE-2022-22739/" source="CVE"/>
		<reference ref_id="CVE-2022-22740" ref_url="https://www.suse.com/security/cve/CVE-2022-22740/" source="CVE"/>
		<reference ref_id="CVE-2022-22741" ref_url="https://www.suse.com/security/cve/CVE-2022-22741/" source="CVE"/>
		<reference ref_id="CVE-2022-22742" ref_url="https://www.suse.com/security/cve/CVE-2022-22742/" source="CVE"/>
		<reference ref_id="CVE-2022-22743" ref_url="https://www.suse.com/security/cve/CVE-2022-22743/" source="CVE"/>
		<reference ref_id="CVE-2022-22744" ref_url="https://www.suse.com/security/cve/CVE-2022-22744/" source="CVE"/>
		<reference ref_id="CVE-2022-22745" ref_url="https://www.suse.com/security/cve/CVE-2022-22745/" source="CVE"/>
		<reference ref_id="CVE-2022-22746" ref_url="https://www.suse.com/security/cve/CVE-2022-22746/" source="CVE"/>
		<reference ref_id="CVE-2022-22747" ref_url="https://www.suse.com/security/cve/CVE-2022-22747/" source="CVE"/>
		<reference ref_id="CVE-2022-22748" ref_url="https://www.suse.com/security/cve/CVE-2022-22748/" source="CVE"/>
		<reference ref_id="CVE-2022-22751" ref_url="https://www.suse.com/security/cve/CVE-2022-22751/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021404.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

- CVE-2021-4140: Fixed iframe sandbox bypass with XSLT (bsc#1194547).
- CVE-2022-22737: Fixed race condition when playing audio files (bsc#1194547).
- CVE-2022-22738: Fixed heap-buffer-overflow in blendGaussianBlur (bsc#1194547).
- CVE-2022-22739: Fixed missing throttling on external protocol launch dialog (bsc#1194547).
- CVE-2022-22740: Fixed use-after-free of ChannelEventQueue::mOwner (bsc#1194547).
- CVE-2022-22741: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22742: Fixed out-of-bounds memory access when inserting text in edit mode (bsc#1194547).
- CVE-2022-22743: Fixed browser window spoof using fullscreen mode (bsc#1194547).
- CVE-2022-22744: Fixed possible command injection via the 'Copy as curl' feature in DevTools (bsc#1194547).
- CVE-2022-22745: Fixed leaking cross-origin URLs through securitypolicyviolation event (bsc#1194547).
- CVE-2022-22746: Fixed calling into reportValidity could have lead to fullscreen window spoof (bsc#1194547).
- CVE-2022-22747: Fixed crash when handling empty pkcs7 sequence(bsc#1194547).
- CVE-2022-22748: Fixed spoofed origin on external protocol launch dialog (bsc#1194547).
- CVE-2022-22751: Fixed memory safety bugs (bsc#1194547).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-20"/>
	<updated date="2022-01-20"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194547">SUSE bug 1194547</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-4140/">CVE-2021-4140</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22737/">CVE-2022-22737</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22738/">CVE-2022-22738</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22739/">CVE-2022-22739</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22740/">CVE-2022-22740</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22741/">CVE-2022-22741</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22742/">CVE-2022-22742</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22743/">CVE-2022-22743</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22744/">CVE-2022-22744</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22745/">CVE-2022-22745</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22746/">CVE-2022-22746</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-22747/">CVE-2022-22747</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22748/">CVE-2022-22748</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22751/">CVE-2022-22751</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664215" comment="MozillaFirefox-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664216" comment="MozillaFirefox-devel-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664217" comment="MozillaFirefox-translations-common-91.5.0-152.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664218" comment="MozillaFirefox-translations-other-91.5.0-152.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111854" version="1" class="patch">
	<metadata>
		<title>Security update for cifs-utils (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197216" ref_url="https://bugzilla.suse.com/1197216" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-27239" ref_url="https://www.suse.com/security/cve/CVE-2022-27239/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010845.html" source="SUSE-SU"/>
		<description>
This update for cifs-utils fixes the following issues:

- CVE-2022-27239: Fixed a buffer overflow in the command line ip option (bsc#1197216).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197216">SUSE bug 1197216</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-27239/">CVE-2022-27239</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681201" comment="cifs-utils-6.9-150100.5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681202" comment="cifs-utils-devel-6.9-150100.5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111855" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="1198290" ref_url="https://bugzilla.suse.com/1198290" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22594" ref_url="https://www.suse.com/security/cve/CVE-2022-22594/" source="CVE"/>
		<reference ref_id="CVE-2022-22624" ref_url="https://www.suse.com/security/cve/CVE-2022-22624/" source="CVE"/>
		<reference ref_id="CVE-2022-22628" ref_url="https://www.suse.com/security/cve/CVE-2022-22628/" source="CVE"/>
		<reference ref_id="CVE-2022-22629" ref_url="https://www.suse.com/security/cve/CVE-2022-22629/" source="CVE"/>
		<reference ref_id="CVE-2022-22637" ref_url="https://www.suse.com/security/cve/CVE-2022-22637/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010848.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.36.0 (bsc#1198290):
- CVE-2022-22624: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22628: Fixed use after free that may lead to arbitrary code execution.
- CVE-2022-22629: Fixed a buffer overflow that may lead to arbitrary code execution.
- CVE-2022-22637: Fixed an unexpected cross-origin behavior due to a logic error.

Missing CVE reference for the update to 2.34.6 (bsc#1196133):
- CVE-2022-22594: Fixed a cross-origin issue in the IndexDB API. 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-27"/>
	<updated date="2022-04-27"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198290">SUSE bug 1198290</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22594/">CVE-2022-22594</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22624/">CVE-2022-22624</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22628/">CVE-2022-22628</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22629/">CVE-2022-22629</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22637/">CVE-2022-22637</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681203" comment="libjavascriptcoregtk-4_0-18-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681204" comment="libwebkit2gtk-4_0-37-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680166" comment="libwebkit2gtk3-lang-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681205" comment="typelib-1_0-JavaScriptCore-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681206" comment="typelib-1_0-WebKit2-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681207" comment="typelib-1_0-WebKit2WebExtension-4_0-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681208" comment="webkit2gtk-4_0-injected-bundles-2.36.0-150200.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681209" comment="webkit2gtk3-devel-2.36.0-150200.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111856" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1461-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010865.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	
- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681301" comment="nodejs12-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681302" comment="nodejs12-devel-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681174" comment="nodejs12-docs-12.22.12-150200.4.32.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681303" comment="npm12-12.22.12-150200.4.32.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111857" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194819" ref_url="https://bugzilla.suse.com/1194819" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="1197283" ref_url="https://bugzilla.suse.com/1197283" source="BUGZILLA"/>
		<reference ref_id="1198247" ref_url="https://bugzilla.suse.com/1198247" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44906" ref_url="https://www.suse.com/security/cve/CVE-2021-44906/" source="CVE"/>
		<reference ref_id="CVE-2021-44907" ref_url="https://www.suse.com/security/cve/CVE-2021-44907/" source="CVE"/>
		<reference ref_id="CVE-2022-0235" ref_url="https://www.suse.com/security/cve/CVE-2022-0235/" source="CVE"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:1462-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-April/010864.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2022-0778: Fixed a infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- CVE-2021-44906: Fixed a prototype pollution in node-minimist (bsc#1198247).
- CVE-2021-44907: Fixed a potential Denial of Service vulnerability in node-qs (bsc#1197283).
- CVE-2022-0235: Fixed an exposure of sensitive information to an unauthorized actor in node-fetch (bsc#1194819).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-28"/>
	<updated date="2022-04-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194819">SUSE bug 1194819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197283">SUSE bug 1197283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198247">SUSE bug 1198247</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44906/">CVE-2021-44906</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-44907/">CVE-2021-44907</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0235/">CVE-2022-0235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009681304" comment="nodejs14-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681305" comment="nodejs14-devel-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681170" comment="nodejs14-docs-14.19.1-150200.15.31.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009681306" comment="npm14-14.19.1-150200.15.31.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111858" version="1" class="patch">
	<metadata>
		<title>Security update for aide (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194735" ref_url="https://bugzilla.suse.com/1194735" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45417" ref_url="https://www.suse.com/security/cve/CVE-2021-45417/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010046.html" source="SUSE-SU"/>
		<description>
This update for aide fixes the following issues:

- CVE-2021-45417: Fix a bufferoverflow in base64 functions (bsc#1194735)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-21"/>
	<updated date="2022-01-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194735">SUSE bug 1194735</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45417/">CVE-2021-45417</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664211" comment="aide-0.16-24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111859" version="1" class="patch">
	<metadata>
		<title>Security update for unbound (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1076963" ref_url="https://bugzilla.suse.com/1076963" source="BUGZILLA"/>
		<reference ref_id="1112009" ref_url="https://bugzilla.suse.com/1112009" source="BUGZILLA"/>
		<reference ref_id="1112033" ref_url="https://bugzilla.suse.com/1112033" source="BUGZILLA"/>
		<reference ref_id="1179191" ref_url="https://bugzilla.suse.com/1179191" source="BUGZILLA"/>
		<reference ref_id="1185382" ref_url="https://bugzilla.suse.com/1185382" source="BUGZILLA"/>
		<reference ref_id="1185383" ref_url="https://bugzilla.suse.com/1185383" source="BUGZILLA"/>
		<reference ref_id="1185384" ref_url="https://bugzilla.suse.com/1185384" source="BUGZILLA"/>
		<reference ref_id="1185385" ref_url="https://bugzilla.suse.com/1185385" source="BUGZILLA"/>
		<reference ref_id="1185386" ref_url="https://bugzilla.suse.com/1185386" source="BUGZILLA"/>
		<reference ref_id="1185387" ref_url="https://bugzilla.suse.com/1185387" source="BUGZILLA"/>
		<reference ref_id="1185388" ref_url="https://bugzilla.suse.com/1185388" source="BUGZILLA"/>
		<reference ref_id="1185389" ref_url="https://bugzilla.suse.com/1185389" source="BUGZILLA"/>
		<reference ref_id="1185390" ref_url="https://bugzilla.suse.com/1185390" source="BUGZILLA"/>
		<reference ref_id="1185391" ref_url="https://bugzilla.suse.com/1185391" source="BUGZILLA"/>
		<reference ref_id="1185392" ref_url="https://bugzilla.suse.com/1185392" source="BUGZILLA"/>
		<reference ref_id="1185393" ref_url="https://bugzilla.suse.com/1185393" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-25031" ref_url="https://www.suse.com/security/cve/CVE-2019-25031/" source="CVE"/>
		<reference ref_id="CVE-2019-25032" ref_url="https://www.suse.com/security/cve/CVE-2019-25032/" source="CVE"/>
		<reference ref_id="CVE-2019-25033" ref_url="https://www.suse.com/security/cve/CVE-2019-25033/" source="CVE"/>
		<reference ref_id="CVE-2019-25034" ref_url="https://www.suse.com/security/cve/CVE-2019-25034/" source="CVE"/>
		<reference ref_id="CVE-2019-25035" ref_url="https://www.suse.com/security/cve/CVE-2019-25035/" source="CVE"/>
		<reference ref_id="CVE-2019-25036" ref_url="https://www.suse.com/security/cve/CVE-2019-25036/" source="CVE"/>
		<reference ref_id="CVE-2019-25037" ref_url="https://www.suse.com/security/cve/CVE-2019-25037/" source="CVE"/>
		<reference ref_id="CVE-2019-25038" ref_url="https://www.suse.com/security/cve/CVE-2019-25038/" source="CVE"/>
		<reference ref_id="CVE-2019-25039" ref_url="https://www.suse.com/security/cve/CVE-2019-25039/" source="CVE"/>
		<reference ref_id="CVE-2019-25040" ref_url="https://www.suse.com/security/cve/CVE-2019-25040/" source="CVE"/>
		<reference ref_id="CVE-2019-25041" ref_url="https://www.suse.com/security/cve/CVE-2019-25041/" source="CVE"/>
		<reference ref_id="CVE-2019-25042" ref_url="https://www.suse.com/security/cve/CVE-2019-25042/" source="CVE"/>
		<reference ref_id="CVE-2020-28935" ref_url="https://www.suse.com/security/cve/CVE-2020-28935/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010064.html" source="SUSE-SU"/>
		<description>
This update for unbound fixes the following issues:

- CVE-2019-25031: Fixed configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack (bsc#1185382).
- CVE-2019-25032: Fixed integer overflow in the regional allocator via regional_alloc (bsc#1185383).
- CVE-2019-25033: Fixed integer overflow in the regional allocator via the ALIGN_UP macro (bsc#1185384).
- CVE-2019-25034: Fixed integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write (bsc#1185385).
- CVE-2019-25035: Fixed out-of-bounds write in sldns_bget_token_par (bsc#1185386).
- CVE-2019-25036: Fixed assertion failure and denial of service in synth_cname (bsc#1185387).
- CVE-2019-25037: Fixed assertion failure and denial of service in dname_pkt_copy via an invalid packet (bsc#1185388).
- CVE-2019-25038: Fixed integer overflow in a size calculation in dnscrypt/dnscrypt.c (bsc#1185389).
- CVE-2019-25039: Fixed integer overflow in a size calculation in respip/respip.c (bsc#1185390).
- CVE-2019-25040: Fixed infinite loop via a compressed name in dname_pkt_copy (bsc#1185391).
- CVE-2019-25041: Fixed assertion failure via a compressed name in dname_pkt_copy (bsc#1185392).
- CVE-2019-25042: Fixed out-of-bounds write via a compressed name in rdata_copy (bsc#1185393).
- CVE-2020-28935: Fixed symbolic link traversal when writing PID file (bsc#1179191).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1076963">SUSE bug 1076963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112009">SUSE bug 1112009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1112033">SUSE bug 1112033</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179191">SUSE bug 1179191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185382">SUSE bug 1185382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185383">SUSE bug 1185383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185384">SUSE bug 1185384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185385">SUSE bug 1185385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185386">SUSE bug 1185386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185387">SUSE bug 1185387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185388">SUSE bug 1185388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185389">SUSE bug 1185389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185390">SUSE bug 1185390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185391">SUSE bug 1185391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185392">SUSE bug 1185392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185393">SUSE bug 1185393</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2019-25031/">CVE-2019-25031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25032/">CVE-2019-25032</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25033/">CVE-2019-25033</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25034/">CVE-2019-25034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25035/">CVE-2019-25035</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25036/">CVE-2019-25036</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25037/">CVE-2019-25037</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25038/">CVE-2019-25038</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25039/">CVE-2019-25039</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25040/">CVE-2019-25040</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-25041/">CVE-2019-25041</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-25042/">CVE-2019-25042</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28935/">CVE-2020-28935</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664331" comment="libunbound2-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664332" comment="unbound-anchor-1.6.8-10.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664333" comment="unbound-devel-1.6.8-10.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111860" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194251" ref_url="https://bugzilla.suse.com/1194251" source="BUGZILLA"/>
		<reference ref_id="1194362" ref_url="https://bugzilla.suse.com/1194362" source="BUGZILLA"/>
		<reference ref_id="1194474" ref_url="https://bugzilla.suse.com/1194474" source="BUGZILLA"/>
		<reference ref_id="1194476" ref_url="https://bugzilla.suse.com/1194476" source="BUGZILLA"/>
		<reference ref_id="1194477" ref_url="https://bugzilla.suse.com/1194477" source="BUGZILLA"/>
		<reference ref_id="1194478" ref_url="https://bugzilla.suse.com/1194478" source="BUGZILLA"/>
		<reference ref_id="1194479" ref_url="https://bugzilla.suse.com/1194479" source="BUGZILLA"/>
		<reference ref_id="1194480" ref_url="https://bugzilla.suse.com/1194480" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45960" ref_url="https://www.suse.com/security/cve/CVE-2021-45960/" source="CVE"/>
		<reference ref_id="CVE-2021-46143" ref_url="https://www.suse.com/security/cve/CVE-2021-46143/" source="CVE"/>
		<reference ref_id="CVE-2022-22822" ref_url="https://www.suse.com/security/cve/CVE-2022-22822/" source="CVE"/>
		<reference ref_id="CVE-2022-22823" ref_url="https://www.suse.com/security/cve/CVE-2022-22823/" source="CVE"/>
		<reference ref_id="CVE-2022-22824" ref_url="https://www.suse.com/security/cve/CVE-2022-22824/" source="CVE"/>
		<reference ref_id="CVE-2022-22825" ref_url="https://www.suse.com/security/cve/CVE-2022-22825/" source="CVE"/>
		<reference ref_id="CVE-2022-22826" ref_url="https://www.suse.com/security/cve/CVE-2022-22826/" source="CVE"/>
		<reference ref_id="CVE-2022-22827" ref_url="https://www.suse.com/security/cve/CVE-2022-22827/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010063.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2021-45960: Fixed left shift in the storeAtts function in xmlparse.c that can lead to realloc misbehavior (bsc#1194251).
- CVE-2021-46143: Fixed integer overflow in m_groupSize in doProlog (bsc#1194362).
- CVE-2022-22822: Fixed integer overflow in addBinding in xmlparse.c (bsc#1194474).
- CVE-2022-22823: Fixed integer overflow in build_model in xmlparse.c (bsc#1194476).
- CVE-2022-22824: Fixed integer overflow in defineAttribute in xmlparse.c (bsc#1194477).
- CVE-2022-22825: Fixed integer overflow in lookup in xmlparse.c (bsc#1194478).
- CVE-2022-22826: Fixed integer overflow in nextScaffoldPart in xmlparse.c (bsc#1194479).
- CVE-2022-22827: Fixed integer overflow in storeAtts in xmlparse.c (bsc#1194480).  
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194251">SUSE bug 1194251</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194362">SUSE bug 1194362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194474">SUSE bug 1194474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194476">SUSE bug 1194476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194477">SUSE bug 1194477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194478">SUSE bug 1194478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194479">SUSE bug 1194479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194480">SUSE bug 1194480</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-45960/">CVE-2021-45960</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-46143/">CVE-2021-46143</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22822/">CVE-2022-22822</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22823/">CVE-2022-22823</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22824/">CVE-2022-22824</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22825/">CVE-2022-22825</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22826/">CVE-2022-22826</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22827/">CVE-2022-22827</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664212" comment="expat-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664213" comment="libexpat-devel-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664214" comment="libexpat1-2.2.5-3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664063" comment="libexpat1-32bit-2.2.5-3.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111861" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194019" ref_url="https://bugzilla.suse.com/1194019" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-8766" ref_url="https://www.suse.com/security/cve/CVE-2019-8766/" source="CVE"/>
		<reference ref_id="CVE-2019-8782" ref_url="https://www.suse.com/security/cve/CVE-2019-8782/" source="CVE"/>
		<reference ref_id="CVE-2019-8808" ref_url="https://www.suse.com/security/cve/CVE-2019-8808/" source="CVE"/>
		<reference ref_id="CVE-2019-8815" ref_url="https://www.suse.com/security/cve/CVE-2019-8815/" source="CVE"/>
		<reference ref_id="CVE-2020-13753" ref_url="https://www.suse.com/security/cve/CVE-2020-13753/" source="CVE"/>
		<reference ref_id="CVE-2020-27918" ref_url="https://www.suse.com/security/cve/CVE-2020-27918/" source="CVE"/>
		<reference ref_id="CVE-2020-29623" ref_url="https://www.suse.com/security/cve/CVE-2020-29623/" source="CVE"/>
		<reference ref_id="CVE-2020-3902" ref_url="https://www.suse.com/security/cve/CVE-2020-3902/" source="CVE"/>
		<reference ref_id="CVE-2020-9802" ref_url="https://www.suse.com/security/cve/CVE-2020-9802/" source="CVE"/>
		<reference ref_id="CVE-2020-9803" ref_url="https://www.suse.com/security/cve/CVE-2020-9803/" source="CVE"/>
		<reference ref_id="CVE-2020-9805" ref_url="https://www.suse.com/security/cve/CVE-2020-9805/" source="CVE"/>
		<reference ref_id="CVE-2020-9947" ref_url="https://www.suse.com/security/cve/CVE-2020-9947/" source="CVE"/>
		<reference ref_id="CVE-2020-9948" ref_url="https://www.suse.com/security/cve/CVE-2020-9948/" source="CVE"/>
		<reference ref_id="CVE-2020-9951" ref_url="https://www.suse.com/security/cve/CVE-2020-9951/" source="CVE"/>
		<reference ref_id="CVE-2020-9952" ref_url="https://www.suse.com/security/cve/CVE-2020-9952/" source="CVE"/>
		<reference ref_id="CVE-2021-1765" ref_url="https://www.suse.com/security/cve/CVE-2021-1765/" source="CVE"/>
		<reference ref_id="CVE-2021-1788" ref_url="https://www.suse.com/security/cve/CVE-2021-1788/" source="CVE"/>
		<reference ref_id="CVE-2021-1817" ref_url="https://www.suse.com/security/cve/CVE-2021-1817/" source="CVE"/>
		<reference ref_id="CVE-2021-1820" ref_url="https://www.suse.com/security/cve/CVE-2021-1820/" source="CVE"/>
		<reference ref_id="CVE-2021-1825" ref_url="https://www.suse.com/security/cve/CVE-2021-1825/" source="CVE"/>
		<reference ref_id="CVE-2021-1826" ref_url="https://www.suse.com/security/cve/CVE-2021-1826/" source="CVE"/>
		<reference ref_id="CVE-2021-1844" ref_url="https://www.suse.com/security/cve/CVE-2021-1844/" source="CVE"/>
		<reference ref_id="CVE-2021-1871" ref_url="https://www.suse.com/security/cve/CVE-2021-1871/" source="CVE"/>
		<reference ref_id="CVE-2021-30661" ref_url="https://www.suse.com/security/cve/CVE-2021-30661/" source="CVE"/>
		<reference ref_id="CVE-2021-30666" ref_url="https://www.suse.com/security/cve/CVE-2021-30666/" source="CVE"/>
		<reference ref_id="CVE-2021-30682" ref_url="https://www.suse.com/security/cve/CVE-2021-30682/" source="CVE"/>
		<reference ref_id="CVE-2021-30761" ref_url="https://www.suse.com/security/cve/CVE-2021-30761/" source="CVE"/>
		<reference ref_id="CVE-2021-30762" ref_url="https://www.suse.com/security/cve/CVE-2021-30762/" source="CVE"/>
		<reference ref_id="CVE-2021-30809" ref_url="https://www.suse.com/security/cve/CVE-2021-30809/" source="CVE"/>
		<reference ref_id="CVE-2021-30818" ref_url="https://www.suse.com/security/cve/CVE-2021-30818/" source="CVE"/>
		<reference ref_id="CVE-2021-30823" ref_url="https://www.suse.com/security/cve/CVE-2021-30823/" source="CVE"/>
		<reference ref_id="CVE-2021-30836" ref_url="https://www.suse.com/security/cve/CVE-2021-30836/" source="CVE"/>
		<reference ref_id="CVE-2021-30846" ref_url="https://www.suse.com/security/cve/CVE-2021-30846/" source="CVE"/>
		<reference ref_id="CVE-2021-30848" ref_url="https://www.suse.com/security/cve/CVE-2021-30848/" source="CVE"/>
		<reference ref_id="CVE-2021-30849" ref_url="https://www.suse.com/security/cve/CVE-2021-30849/" source="CVE"/>
		<reference ref_id="CVE-2021-30851" ref_url="https://www.suse.com/security/cve/CVE-2021-30851/" source="CVE"/>
		<reference ref_id="CVE-2021-30858" ref_url="https://www.suse.com/security/cve/CVE-2021-30858/" source="CVE"/>
		<reference ref_id="CVE-2021-30884" ref_url="https://www.suse.com/security/cve/CVE-2021-30884/" source="CVE"/>
		<reference ref_id="CVE-2021-30887" ref_url="https://www.suse.com/security/cve/CVE-2021-30887/" source="CVE"/>
		<reference ref_id="CVE-2021-30888" ref_url="https://www.suse.com/security/cve/CVE-2021-30888/" source="CVE"/>
		<reference ref_id="CVE-2021-30889" ref_url="https://www.suse.com/security/cve/CVE-2021-30889/" source="CVE"/>
		<reference ref_id="CVE-2021-30890" ref_url="https://www.suse.com/security/cve/CVE-2021-30890/" source="CVE"/>
		<reference ref_id="CVE-2021-30897" ref_url="https://www.suse.com/security/cve/CVE-2021-30897/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010070.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

- Update to version 2.34.3 (bsc#1194019).
- CVE-2021-30887: Fixed logic issue allowing unexpectedly unenforced Content Security Policy when processing maliciously crafted web content.
- CVE-2021-30890: Fixed logic issue allowing universal cross site scripting when processing maliciously crafted web content.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194019">SUSE bug 1194019</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8766/">CVE-2019-8766</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8782/">CVE-2019-8782</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8808/">CVE-2019-8808</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-8815/">CVE-2019-8815</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13753/">CVE-2020-13753</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27918/">CVE-2020-27918</cve>
	<cve impact="important" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-29623/">CVE-2020-29623</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-3902/">CVE-2020-3902</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9802/">CVE-2020-9802</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9803/">CVE-2020-9803</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-9805/">CVE-2020-9805</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9947/">CVE-2020-9947</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-9948/">CVE-2020-9948</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-9951/">CVE-2020-9951</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-9952/">CVE-2020-9952</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-1765/">CVE-2021-1765</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1788/">CVE-2021-1788</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1817/">CVE-2021-1817</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1820/">CVE-2021-1820</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1825/">CVE-2021-1825</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-1826/">CVE-2021-1826</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1844/">CVE-2021-1844</cve>
	<cve impact="important" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-1871/">CVE-2021-1871</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30661/">CVE-2021-30661</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30666/">CVE-2021-30666</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30682/">CVE-2021-30682</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30761/">CVE-2021-30761</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-30762/">CVE-2021-30762</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30809/">CVE-2021-30809</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30818/">CVE-2021-30818</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30823/">CVE-2021-30823</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30836/">CVE-2021-30836</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30846/">CVE-2021-30846</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30848/">CVE-2021-30848</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30849/">CVE-2021-30849</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30851/">CVE-2021-30851</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30858/">CVE-2021-30858</cve>
	<cve impact="important" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30884/">CVE-2021-30884</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-30887/">CVE-2021-30887</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30888/">CVE-2021-30888</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30889/">CVE-2021-30889</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-30890/">CVE-2021-30890</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-30897/">CVE-2021-30897</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664624" comment="libjavascriptcoregtk-4_0-18-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664625" comment="libwebkit2gtk-4_0-37-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664285" comment="libwebkit2gtk3-lang-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664626" comment="typelib-1_0-JavaScriptCore-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664627" comment="typelib-1_0-WebKit2-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664628" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664629" comment="webkit2gtk-4_0-injected-bundles-2.34.3-23.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664630" comment="webkit2gtk3-devel-2.34.3-23.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111862" version="1" class="patch">
	<metadata>
		<title>Security update for json-c (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1171479" ref_url="https://bugzilla.suse.com/1171479" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12762" ref_url="https://www.suse.com/security/cve/CVE-2020-12762/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010072.html" source="SUSE-SU"/>
		<description>
This update for json-c fixes the following issues:

- CVE-2020-12762: Fixed integer overflow and out-of-bounds write. (bsc#1171479)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171479">SUSE bug 1171479</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12762/">CVE-2020-12762</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664209" comment="libjson-c-devel-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664210" comment="libjson-c3-0.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664150" comment="libjson-c3-32bit-0.13-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111863" version="1" class="patch">
	<metadata>
		<title>Security update for polkit (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194568" ref_url="https://bugzilla.suse.com/1194568" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4034" ref_url="https://www.suse.com/security/cve/CVE-2021-4034/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0190-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2022-January/021462.html" source="SUSE-SU"/>
		<description>
This update for polkit fixes the following issues:

- CVE-2021-4034: Fixed a local privilege escalation in pkexec (bsc#1194568).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-25"/>
	<updated date="2022-01-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194568">SUSE bug 1194568</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4034/">CVE-2021-4034</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664631" comment="libpolkit0-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664632" comment="polkit-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664633" comment="polkit-devel-0.116-3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664634" comment="typelib-1_0-Polkit-1_0-0.116-3.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111864" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153275" ref_url="https://bugzilla.suse.com/1153275" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154355" ref_url="https://bugzilla.suse.com/1154355" source="BUGZILLA"/>
		<reference ref_id="1161907" ref_url="https://bugzilla.suse.com/1161907" source="BUGZILLA"/>
		<reference ref_id="1164565" ref_url="https://bugzilla.suse.com/1164565" source="BUGZILLA"/>
		<reference ref_id="1166780" ref_url="https://bugzilla.suse.com/1166780" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179599" ref_url="https://bugzilla.suse.com/1179599" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183897" ref_url="https://bugzilla.suse.com/1183897" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1187541" ref_url="https://bugzilla.suse.com/1187541" source="BUGZILLA"/>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1189158" ref_url="https://bugzilla.suse.com/1189158" source="BUGZILLA"/>
		<reference ref_id="1191271" ref_url="https://bugzilla.suse.com/1191271" source="BUGZILLA"/>
		<reference ref_id="1191793" ref_url="https://bugzilla.suse.com/1191793" source="BUGZILLA"/>
		<reference ref_id="1191876" ref_url="https://bugzilla.suse.com/1191876" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192507" ref_url="https://bugzilla.suse.com/1192507" source="BUGZILLA"/>
		<reference ref_id="1192511" ref_url="https://bugzilla.suse.com/1192511" source="BUGZILLA"/>
		<reference ref_id="1192569" ref_url="https://bugzilla.suse.com/1192569" source="BUGZILLA"/>
		<reference ref_id="1192606" ref_url="https://bugzilla.suse.com/1192606" source="BUGZILLA"/>
		<reference ref_id="1192845" ref_url="https://bugzilla.suse.com/1192845" source="BUGZILLA"/>
		<reference ref_id="1192847" ref_url="https://bugzilla.suse.com/1192847" source="BUGZILLA"/>
		<reference ref_id="1192877" ref_url="https://bugzilla.suse.com/1192877" source="BUGZILLA"/>
		<reference ref_id="1192946" ref_url="https://bugzilla.suse.com/1192946" source="BUGZILLA"/>
		<reference ref_id="1192969" ref_url="https://bugzilla.suse.com/1192969" source="BUGZILLA"/>
		<reference ref_id="1192987" ref_url="https://bugzilla.suse.com/1192987" source="BUGZILLA"/>
		<reference ref_id="1192990" ref_url="https://bugzilla.suse.com/1192990" source="BUGZILLA"/>
		<reference ref_id="1192998" ref_url="https://bugzilla.suse.com/1192998" source="BUGZILLA"/>
		<reference ref_id="1193002" ref_url="https://bugzilla.suse.com/1193002" source="BUGZILLA"/>
		<reference ref_id="1193042" ref_url="https://bugzilla.suse.com/1193042" source="BUGZILLA"/>
		<reference ref_id="1193169" ref_url="https://bugzilla.suse.com/1193169" source="BUGZILLA"/>
		<reference ref_id="1193255" ref_url="https://bugzilla.suse.com/1193255" source="BUGZILLA"/>
		<reference ref_id="1193306" ref_url="https://bugzilla.suse.com/1193306" source="BUGZILLA"/>
		<reference ref_id="1193318" ref_url="https://bugzilla.suse.com/1193318" source="BUGZILLA"/>
		<reference ref_id="1193349" ref_url="https://bugzilla.suse.com/1193349" source="BUGZILLA"/>
		<reference ref_id="1193440" ref_url="https://bugzilla.suse.com/1193440" source="BUGZILLA"/>
		<reference ref_id="1193442" ref_url="https://bugzilla.suse.com/1193442" source="BUGZILLA"/>
		<reference ref_id="1193660" ref_url="https://bugzilla.suse.com/1193660" source="BUGZILLA"/>
		<reference ref_id="1193669" ref_url="https://bugzilla.suse.com/1193669" source="BUGZILLA"/>
		<reference ref_id="1193727" ref_url="https://bugzilla.suse.com/1193727" source="BUGZILLA"/>
		<reference ref_id="1193767" ref_url="https://bugzilla.suse.com/1193767" source="BUGZILLA"/>
		<reference ref_id="1193901" ref_url="https://bugzilla.suse.com/1193901" source="BUGZILLA"/>
		<reference ref_id="1193927" ref_url="https://bugzilla.suse.com/1193927" source="BUGZILLA"/>
		<reference ref_id="1194001" ref_url="https://bugzilla.suse.com/1194001" source="BUGZILLA"/>
		<reference ref_id="1194087" ref_url="https://bugzilla.suse.com/1194087" source="BUGZILLA"/>
		<reference ref_id="1194094" ref_url="https://bugzilla.suse.com/1194094" source="BUGZILLA"/>
		<reference ref_id="1194302" ref_url="https://bugzilla.suse.com/1194302" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1194517" ref_url="https://bugzilla.suse.com/1194517" source="BUGZILLA"/>
		<reference ref_id="1194529" ref_url="https://bugzilla.suse.com/1194529" source="BUGZILLA"/>
		<reference ref_id="1194888" ref_url="https://bugzilla.suse.com/1194888" source="BUGZILLA"/>
		<reference ref_id="1194985" ref_url="https://bugzilla.suse.com/1194985" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-27820" ref_url="https://www.suse.com/security/cve/CVE-2020-27820/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2021-28711" ref_url="https://www.suse.com/security/cve/CVE-2021-28711/" source="CVE"/>
		<reference ref_id="CVE-2021-28712" ref_url="https://www.suse.com/security/cve/CVE-2021-28712/" source="CVE"/>
		<reference ref_id="CVE-2021-28713" ref_url="https://www.suse.com/security/cve/CVE-2021-28713/" source="CVE"/>
		<reference ref_id="CVE-2021-28714" ref_url="https://www.suse.com/security/cve/CVE-2021-28714/" source="CVE"/>
		<reference ref_id="CVE-2021-28715" ref_url="https://www.suse.com/security/cve/CVE-2021-28715/" source="CVE"/>
		<reference ref_id="CVE-2021-33098" ref_url="https://www.suse.com/security/cve/CVE-2021-33098/" source="CVE"/>
		<reference ref_id="CVE-2021-4001" ref_url="https://www.suse.com/security/cve/CVE-2021-4001/" source="CVE"/>
		<reference ref_id="CVE-2021-4002" ref_url="https://www.suse.com/security/cve/CVE-2021-4002/" source="CVE"/>
		<reference ref_id="CVE-2021-4083" ref_url="https://www.suse.com/security/cve/CVE-2021-4083/" source="CVE"/>
		<reference ref_id="CVE-2021-4135" ref_url="https://www.suse.com/security/cve/CVE-2021-4135/" source="CVE"/>
		<reference ref_id="CVE-2021-4149" ref_url="https://www.suse.com/security/cve/CVE-2021-4149/" source="CVE"/>
		<reference ref_id="CVE-2021-4197" ref_url="https://www.suse.com/security/cve/CVE-2021-4197/" source="CVE"/>
		<reference ref_id="CVE-2021-4202" ref_url="https://www.suse.com/security/cve/CVE-2021-4202/" source="CVE"/>
		<reference ref_id="CVE-2021-43975" ref_url="https://www.suse.com/security/cve/CVE-2021-43975/" source="CVE"/>
		<reference ref_id="CVE-2021-43976" ref_url="https://www.suse.com/security/cve/CVE-2021-43976/" source="CVE"/>
		<reference ref_id="CVE-2021-44733" ref_url="https://www.suse.com/security/cve/CVE-2021-44733/" source="CVE"/>
		<reference ref_id="CVE-2021-45485" ref_url="https://www.suse.com/security/cve/CVE-2021-45485/" source="CVE"/>
		<reference ref_id="CVE-2021-45486" ref_url="https://www.suse.com/security/cve/CVE-2021-45486/" source="CVE"/>
		<reference ref_id="CVE-2022-0185" ref_url="https://www.suse.com/security/cve/CVE-2022-0185/" source="CVE"/>
		<reference ref_id="CVE-2022-0322" ref_url="https://www.suse.com/security/cve/CVE-2022-0322/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010080.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0185: Incorrect param length parsing in legacy_parse_param which could have led to a local privilege escalation (bsc#1194517).
- CVE-2022-0322: Fixed a denial of service in SCTP sctp_addto_chunk (bsc#1194985).
- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel that occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).
- CVE-2021-4197: Fixed a cgroup issue where lower privileged processes could write to fds of lower privileged ones that could lead to privilege escalation (bsc#1194302).
- CVE-2021-4135: Fixed an information leak in the nsim_bpf_map_alloc function (bsc#1193927).
- CVE-2021-4202: Fixed a race condition during NFC device remove which could lead to a use-after-free memory corruption (bsc#1194529)
- CVE-2021-4083: A read-after-free memory flaw was found in the Linux kernel's garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allowed a local user to crash the system or escalate their privileges on the system. (bnc#1193727).
- CVE-2021-4149: Fixed a locking condition in btrfs which could lead to system deadlocks (bsc#1194001).
- CVE-2021-45485: The IPv6 implementation in net/ipv6/output_core.c had an information leak because of certain use of a hash table which, although big, doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses (bnc#1194094).
- CVE-2021-45486: The IPv4 implementation in net/ipv4/route.c had an information leak because the hash table is very small (bnc#1194087).
- CVE-2021-4001: A race condition was found in the Linux kernel's ebpf verifier between bpf_map_update_elem and bpf_map_freeze due to a missing lock in kernel/bpf/syscall.c. In this flaw, a local user with a special privilege (cap_sys_admin or cap_bpf) can modify the frozen mapped address space. (bnc#1192990).
- CVE-2021-28715: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing. ()
- CVE-2021-28714: Guest can force Linux netback driver to hog large amounts of kernel memory. Incoming data packets for a guest in the Linux kernel's netback driver are buffered until the guest is ready to process them. There are some measures taken for avoiding to pile up too much data, but those can be bypassed by the guest: There was a timeout how long the client side of an interface can stop consuming new packets before it is assumed to have stalled, but this timeout is rather long (60 seconds by default). Using a UDP connection on a fast interface can easily accumulate gigabytes of data in that time. (CVE-2021-28715) The timeout could even never trigger if the guest manages to have only one free slot in its RX queue ring page and the next package would require more than one free slot, which may be the case when using GSO, XDP, or software hashing (bnc#1193442).
- CVE-2021-28713: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28712: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time. (bsc#1193440)
- CVE-2021-28711: Rogue backends can cause DoS of guests via high frequency events. Xen offers the ability to run PV backends in regular unprivileged guests, typically referred to as 'driver domains'. Running PV backends in driver domains has one primary security advantage: if a driver domain gets compromised, it doesn't have the privileges to take over the system. However, a malicious driver domain could try to attack other guests via sending events at a high frequency leading to a Denial of Service in the guest due to trying to service interrupts for elongated amounts of time (bnc#1193440).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2021-43975: hw_atl_utils_fw_rpc_wait in drivers/net/ethernet/aquantia/atlantic/hw_atl/hw_atl_utils.c allowed an attacker (who can introduce a crafted device) to trigger an out-of-bounds write via a crafted length value (bnc#1192845).
- CVE-2021-33098: Improper input validation in the Intel(R) Ethernet ixgbe driver for Linux before version 3.17.3 may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1192877).
- CVE-2021-43976: mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c allowed an attacker (who can connect a crafted USB device) to cause a denial of service (skb_over_panic) (bnc#1192847).
- CVE-2021-4002: Incorrect TLBs flushing after huge_pmd_unshare could lead to exposing hugepages to other users (bsc#1192946).
- CVE-2020-27820: A use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if 'unbind' the driver) (bnc#1179599).

The following non-security bugs were fixed:

- smb3: print warning once if posix context returned on open  (bsc#1164565).
- ACPI: PMIC: Fix intel_pmic_regs_handler() read accesses (git-fixes).
- ACPI: battery: Accept charges over the design capacity as full (git-fixes).
- ACPICA: Avoid evaluating methods too early during system resume (git-fixes).
- ALSA: ISA: not for M68K (git-fixes).
- ALSA: ctxfi: Fix out-of-range access (git-fixes).
- ALSA: gus: fix null pointer dereference on pointer block (git-fixes).
- ALSA: hda/realtek: Add a quirk for Acer Spin SP513-54N (git-fixes).
- ALSA: hda/realtek: Add quirk for ASUS UX550VE (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC70HS (git-fixes).
- ALSA: hda/realtek: Add quirk for HP EliteBook 840 G7 mute LED (git-fixes).
- ALSA: hda: hdac_ext_stream: fix potential locking issues (git-fixes).
- ALSA: hda: hdac_stream: fix potential locking issue in snd_hdac_stream_assign() (git-fixes).
- ALSA: synth: missing check for possible NULL after the call to kstrdup (git-fixes).
- ALSA: timer: Fix use-after-free problem (git-fixes).
- ALSA: timer: Unconditionally unlink slave instances, too (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 400 (git-fixes).
- ARM: 8970/1: decompressor: increase tag size (git-fixes).
- ARM: 8974/1: use SPARSMEM_STATIC when SPARSEMEM is enabled (git-fixes)
- ARM: 8986/1: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (git-fixes)
- ARM: 9007/1: l2c: fix prefetch bits init in L2X0_AUX_CTRL using DT (git-fixes)
- ARM: 9019/1: kprobes: Avoid fortify_panic() when copying optprobe (git-fixes)
- ARM: 9046/1: decompressor: Do not clear SCTLR.nTLSMD for ARMv7+ cores (git-fixes)
- ARM: 9064/1: hw_breakpoint: Do not directly check the event's (git-fixes)
- ARM: 9071/1: uprobes: Do not hook on thumb instructions (git-fixes)
- ARM: 9081/1: fix gcc-10 thumb2-kernel regression (git-fixes)
- ARM: 9091/1: Revert 'mm: qsd8x50: Fix incorrect permission faults' (git-fixes)
- ARM: 9133/1: mm: proc-macros: ensure *_tlb_fns are 4B aligned (git-fixes)
- ARM: 9134/1: remove duplicate memcpy() definition (git-fixes)
- ARM: 9139/1: kprobes: fix arch_init_kprobes() prototype (git-fixes)
- ARM: 9141/1: only warn about XIP address when not compile testing (git-fixes)
- ARM: 9155/1: fix early early_iounmap() (git-fixes)
- ARM: OMAP2+: Fix legacy mode dss_reset (git-fixes)
- ARM: OMAP2+: omap_device: fix idling of devices during probe (git-fixes)
- ARM: OMAP2+: pm33xx-core: Make am43xx_get_rtc_base_addr static (git-fixes)
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() (git-fixes)
- ARM: at91: pm: of_node_put() after its usage (git-fixes)
- ARM: at91: pm: use proper master clock register offset (git-fixes)
- ARM: bcm: Select ARM_TIMER_SP804 for ARCH_BCM_NSP (git-fixes)
- ARM: dts sunxi: Relax a bit the CMA pool allocation range (git-fixes)
- ARM: dts: BCM5301X: Add interrupt properties to GPIO node (git-fixes)
- ARM: dts: BCM5301X: Fix I2C controller interrupt (git-fixes)
- ARM: dts: BCM5301X: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Configure missing thermal interrupt for 4430 (git-fixes)
- ARM: dts: Fix dcan driver probe failed on am437x platform (git-fixes)
- ARM: dts: Fix duovero smsc interrupt for suspend (git-fixes)
- ARM: dts: N900: fix onenand timings (git-fixes).
- ARM: dts: NSP: Correct FA2 mailbox node (git-fixes)
- ARM: dts: NSP: Disable PL330 by default, add dma-coherent property (git-fixes)
- ARM: dts: NSP: Fixed QSPI compatible string (git-fixes)
- ARM: dts: Remove non-existent i2c1 from 98dx3236 (git-fixes)
- ARM: dts: am335x-pocketbeagle: Fix mmc0 Write Protect (git-fixes)
- ARM: dts: am335x: align ti,pindir-d0-out-d1-in property with dt-shema (git-fixes)
- ARM: dts: am437x-idk-evm: Fix incorrect OPP node names (git-fixes)
- ARM: dts: am437x-l4: fix typo in can@0 node (git-fixes)
- ARM: dts: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to LEDs (git-fixes)
- ARM: dts: armada388-helios4: assign pinctrl to each fan (git-fixes)
- ARM: dts: aspeed: s2600wf: Fix VGA memory region location (git-fixes)
- ARM: dts: aspeed: tiogapass: Remove vuart (git-fixes)
- ARM: dts: at91-sama5d27_som1: fix phy address to 7 (git-fixes)
- ARM: dts: at91: add pinctrl-{names, 0} for all gpios (git-fixes)
- ARM: dts: at91: at91sam9rl: fix ADC triggers (git-fixes)
- ARM: dts: at91: sama5d2: fix CAN message ram offset and size (git-fixes)
- ARM: dts: at91: sama5d2: map securam as device (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix sdmmc0 node description (git-fixes)
- ARM: dts: at91: sama5d2_ptc_ek: fix vbus pin (git-fixes)
- ARM: dts: at91: sama5d2_xplained: classd: pull-down the R1 and R3 lines (git-fixes)
- ARM: dts: at91: sama5d3_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: sama5d4: fix pinctrl muxing (git-fixes)
- ARM: dts: at91: sama5d4_xplained: add pincontrol for USB Host (git-fixes)
- ARM: dts: at91: tse850: the emac&amp;lt;-&gt;phy interface is rmii (git-fixes)
- ARM: dts: bcm2835-rpi-zero-w: Fix led polarity (git-fixes)
- ARM: dts: bcm: HR2: Fix PPI interrupt types (git-fixes)
- ARM: dts: bcm: HR2: Fixed QSPI compatible string (git-fixes)
- ARM: dts: colibri-imx6ull: limit SDIO clock to 25MHz (git-fixes)
- ARM: dts: dra76x: m_can: fix order of clocks (git-fixes)
- ARM: dts: dra7xx-clocks: Fixup IPU1 mux clock parent source (git-fixes)
- ARM: dts: exynos: Fix GPIO polarity for thr GalaxyS3 CM36651 sensor's bus (git-fixes)
- ARM: dts: exynos: correct MUIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Arndale (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Artik 5 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Monk (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid X/U3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Odroid XU3 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Rinato (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on SMDK5250 (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Snow (git-fixes)
- ARM: dts: exynos: correct PMIC interrupt trigger level on Spring (git-fixes)
- ARM: dts: exynos: correct fuel gauge interrupt trigger level on Midas (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid HC1 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU/XU3 (git-fixes)
- ARM: dts: exynos: fix PWM LED max brightness on Odroid XU4 (git-fixes)
- ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on (git-fixes)
- ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid (git-fixes)
- ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU (git-fixes)
- ARM: dts: gemini-rut1xx: remove duplicate ethernet node (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7180 (git-fixes)
- ARM: dts: gose: Fix ports node name for adv7612 (git-fixes)
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries (git-fixes)
- ARM: dts: imx50-evk: Fix the chip select 1 IOMUX (git-fixes)
- ARM: dts: imx6: Use gpc for FEC interrupt controller to fix wake on LAN (git-fixes)
- ARM: dts: imx6: pbab01: Set vmmc supply for both SD interfaces (git-fixes)
- ARM: dts: imx6: phycore-som: fix arm and soc minimum voltage (git-fixes)
- ARM: dts: imx6: phycore-som: fix emmc supply (git-fixes)
- ARM: dts: imx6dl-colibri-eval-v3: fix sram compatible properties (git-fixes).
- ARM: dts: imx6dl-yapp4: Fix RGMII connection to QCA8334 switch (git-fixes)
- ARM: dts: imx6dl-yapp4: Fix Ursa board Ethernet connection (git-fixes)
- ARM: dts: imx6q-dhcom: Add PU,VDD1P1,VDD2P5 regulators (git-fixes)
- ARM: dts: imx6q-dhcom: Add gpios pinctrl for i2c bus recovery (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet plugin detection problems (git-fixes)
- ARM: dts: imx6q-dhcom: Fix ethernet reset time properties (git-fixes)
- ARM: dts: imx6qdl-gw52xx: fix duplicate regulator naming (git-fixes)
- ARM: dts: imx6qdl-gw551x: Do not use 'simple-audio-card,dai-link' (git-fixes)
- ARM: dts: imx6qdl-gw551x: fix audio SSI (git-fixes)
- ARM: dts: imx6qdl-icore: Fix OTG_ID pin and sdcard detect (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix I2C_PM scl pin (git-fixes)
- ARM: dts: imx6qdl-kontron-samx6i: fix i2c_lcd/cam default status (git-fixes)
- ARM: dts: imx6qdl-sr-som: Increase the PHY reset duration to 10ms (git-fixes)
- ARM: dts: imx6sl: fix rng node (git-fixes)
- ARM: dts: imx6sx-sabreauto: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx-sdb: Fix the phy-mode on fec2 (git-fixes)
- ARM: dts: imx6sx: Add missing UART RTS/CTS pins mux (git-fixes)
- ARM: dts: imx6sx: Improve UART pins macro defines (git-fixes)
- ARM: dts: imx6sx: fix the pad QSPI1B_SCLK mux mode for uart3 (git-fixes)
- ARM: dts: imx7-colibri: Fix frequency for sd/mmc (git-fixes)
- ARM: dts: imx7-colibri: fix muxing of usbc_det pin (git-fixes)
- ARM: dts: imx7-colibri: prepare module device tree for FlexCAN (git-fixes)
- ARM: dts: imx7d-meerkat96: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d-pico: Fix the 'tuning-step' property (git-fixes)
- ARM: dts: imx7d: Correct speed grading fuse settings (git-fixes)
- ARM: dts: imx7d: fix opp-supported-hw (git-fixes)
- ARM: dts: imx7ulp: Correct gpio ranges (git-fixes)
- ARM: dts: imx: Fix USB host power regulator polarity on M53Menlo (git-fixes)
- ARM: dts: imx: Swap M53Menlo pinctrl_power_button/pinctrl_power_out (git-fixes)
- ARM: dts: imx: emcon-avari: Fix nxp,pca8574 #gpio-cells (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix broken audio (git-fixes)
- ARM: dts: logicpd-som-lv-baseboard: Fix missing video (git-fixes)
- ARM: dts: logicpd-torpedo-baseboard: Fix broken audio (git-fixes)
- ARM: dts: lpc32xx: Revert set default clock rate of HCLK PLL (git-fixes)
- ARM: dts: ls1021a: Restore MDIO compatible to gianfar (git-fixes)
- ARM: dts: ls1021a: fix QuadSPI-memory reg range (git-fixes)
- ARM: dts: meson8: Use a higher default GPU clock frequency (git-fixes)
- ARM: dts: meson8: remove two invalid interrupt lines from the GPU (git-fixes)
- ARM: dts: meson8b: ec100: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: mxq: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson8b: odroidc1: Fix the pwm regulator supply properties (git-fixes)
- ARM: dts: meson: fix PHY deassert timing requirements (git-fixes)
- ARM: dts: omap3430-sdp: Fix NAND device node (git-fixes)
- ARM: dts: owl-s500: Fix incorrect PPI interrupt specifiers (git-fixes)
- ARM: dts: oxnas: Fix clear-mask property (git-fixes)
- ARM: dts: pandaboard: fix pinmux for gpio user button of Pandaboard (git-fixes)
- ARM: dts: qcom: apq8064: Use 27MHz PXO clock as DSI PLL reference (git-fixes)
- ARM: dts: qcom: msm8974: Add xo_board reference clock to DSI0 PHY (git-fixes)
- ARM: dts: r7s9210: Remove bogus clock-names from OSTM nodes (git-fixes)
- ARM: dts: r8a73a4: Add missing CMT1 interrupts (git-fixes)
- ARM: dts: r8a7740: Add missing extal2 to CPG node (git-fixes)
- ARM: dts: r8a7779, marzen: Fix DU clock names (git-fixes)
- ARM: dts: renesas: Fix IOMMU device node names (git-fixes)
- ARM: dts: s5pv210: Set keep-power-in-suspend for SDHCI1 on Aries (git-fixes)
- ARM: dts: socfpga: Align L2 cache-controller nodename with dtschema (git-fixes)
- ARM: dts: socfpga: fix register entry for timer3 on Arria10 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32f429 (git-fixes)
- ARM: dts: stm32: fix a typo for DAC io-channel-cells on stm32h743 (git-fixes)
- ARM: dts: sun6i: a31-hummingbird: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: a20: bananapro: Fix ethernet phy-mode (git-fixes)
- ARM: dts: sun7i: bananapi-m1-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun7i: bananapi: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: cubietruck: Enable RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun7i: pcduino3-nano: enable RGMII RX/TX delay on PHY (git-fixes)
- ARM: dts: sun8i-a83t-tbs-a711: Fix USB OTG mode detection (git-fixes)
- ARM: dts: sun8i-h2-plus-bananapi-m2-zero: Fix led polarity (git-fixes)
- ARM: dts: sun8i: a83t: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sun8i: h3: orangepi-plus2e: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: sun8i: r40: Move AHCI device node based on address order (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-berry: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix dcdc1 regulator (git-fixes)
- ARM: dts: sun8i: r40: bananapi-m2-ultra: Fix ethernet node (git-fixes)
- ARM: dts: sun8i: v3s: fix GIC node memory range (git-fixes)
- ARM: dts: sun8i: v40: bananapi-m2-berry: Fix ethernet node (git-fixes)
- ARM: dts: sun9i: Enable both RGMII RX/TX delay on Ethernet PHY (git-fixes)
- ARM: dts: sunxi: Fix DE2 clocks register range (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus-v1.2: Fix CPU supply voltages (git-fixes)
- ARM: dts: sunxi: bananapi-m2-plus: Enable RGMII RX/TX delay on (git-fixes)
- ARM: dts: turris-omnia: add SFP node (git-fixes)
- ARM: dts: turris-omnia: add comphy handle to eth2 (git-fixes)
- ARM: dts: turris-omnia: configure LED[2]/INTn pin as interrupt pin (git-fixes)
- ARM: dts: turris-omnia: describe switch interrupt (git-fixes)
- ARM: dts: turris-omnia: enable HW buffer management (git-fixes)
- ARM: dts: turris-omnia: fix hardware buffer management (git-fixes)
- ARM: dts: uniphier: Change phy-mode to RGMII-ID to enable delay pins (git-fixes)
- ARM: dts: uniphier: Set SCSSI clock and reset IDs for each channel (git-fixes).
- ARM: dts: vf610-zii-dev-rev-b: Remove #address-cells and #size-cells (git-fixes)
- ARM: dts: vfxxx: Add syscon compatible with OCOTP (git-fixes)
- ARM: exynos: MCPM: Restore big.LITTLE cpuidle support (git-fixes)
- ARM: exynos: add missing of_node_put for loop iteration (git-fixes)
- ARM: footbridge: fix PCI interrupt mapping (git-fixes)
- ARM: imx5: add missing put_device() call in imx_suspend_alloc_ocram() (git-fixes)
- ARM: imx6: disable the GIC CPU interface before calling stby-poweroff (git-fixes)
- ARM: imx: add missing clk_disable_unprepare() (git-fixes)
- ARM: imx: add missing iounmap() (git-fixes)
- ARM: imx: build suspend-imx6.S with arm instruction set (git-fixes)
- ARM: imx: fix missing 3rd argument in macro imx_mmdc_perf_init (git-fixes)
- ARM: mvebu: drop pointless check for coherency_base (git-fixes)
- ARM: p2v: fix handling of LPAE translation in BE mode (git-fixes)
- ARM: s3c24xx: fix missing system reset (git-fixes)
- ARM: s3c24xx: fix mmc gpio lookup tables (git-fixes)
- ARM: s3c: irq-s3c24xx: Fix return value check for s3c24xx_init_intc() (git-fixes)
- ARM: samsung: do not build plat/pm-common for Exynos (git-fixes)
- ARM: samsung: fix PM debug build with DEBUG_LL but !MMU (git-fixes)
- ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() (git-fixes)
- ASoC: DAPM: Cover regression by kctl change notification fix (git-fixes).
- ASoC: SOF: Intel: hda-dai: fix potential locking issue (git-fixes).
- ASoC: nau8824: Add DMI quirk mechanism for active-high jack-detect (git-fixes).
- ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer (git-fixes).
- ASoC: topology: Add missing rwsem around snd_ctl_remove() calls (git-fixes).
- Add SMB 2 support for getting and setting SACLs (bsc#1192606).
- Add to supported.conf: fs/smbfs_common/cifs_arc4 fs/smbfs_common/cifs_md4
- Blacklist SCSI commit that breaks kABI (git-fixes)
- Bluetooth: fix use-after-free error in lock_sock_nested() (git-fixes).
- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1164565).
- CIFS: Clarify SMB1 code for POSIX Create (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX Lock (bsc#1192606).
- CIFS: Clarify SMB1 code for POSIX delete file (bsc#1192606).
- CIFS: Clarify SMB1 code for SetFileSize (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixCreateSymLink (bsc#1192606).
- CIFS: Clarify SMB1 code for UnixSetPathInfo (bsc#1192606).
- CIFS: Clarify SMB1 code for delete (bsc#1192606).
- CIFS: Clarify SMB1 code for rename open file (bsc#1192606).
- CIFS: Close cached root handle only if it had a lease (bsc#1164565).
- CIFS: Close open handle after interrupted close (bsc#1164565).
- CIFS: Do not miss cancelled OPEN responses (bsc#1164565).
- CIFS: Fix NULL pointer dereference in mid callback (bsc#1164565).
- CIFS: Fix NULL-pointer dereference in smb2_push_mandatory_locks (bnc#1151927 5.3.16).
- CIFS: Fix SMB2 oplock break processing (bsc#1154355 bnc#1151927 5.3.16).
- CIFS: Fix bug which the return value by asynchronous read is error (bsc#1192606).
- CIFS: Fix oplock handling for SMB 2.1+ protocols (bnc#1151927 5.3.4).
- CIFS: Fix retry mid list corruption on reconnects (bnc#1151927 5.3.10).
- CIFS: Fix task struct use-after-free on reconnect (bsc#1164565).
- CIFS: Fix use after free of file info structures (bnc#1151927 5.3.8).
- CIFS: Force reval dentry if LOOKUP_REVAL flag is set (bnc#1151927 5.3.7).
- CIFS: Force revalidate inode when dentry is stale (bnc#1151927 5.3.7).
- CIFS: Gracefully handle QueryInfo errors during open (bnc#1151927 5.3.7).
- CIFS: Increment num_remote_opens stats counter even in case of smb2_query_dir_first (bsc#1192606).
- CIFS: Properly process SMB3 lease breaks (bsc#1164565).
- CIFS: Respect O_SYNC and O_DIRECT flags during reconnect (bsc#1164565).
- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1164565).
- CIFS: Spelling s/EACCESS/EACCES/ (bsc#1192606).
- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1164565).
- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1164565).
- CIFS: Warn less noisily on default mount (bsc#1192606).
- CIFS: avoid using MID 0xFFFF (bnc#1151927 5.3.8).
- CIFS: check new file size when extending file by fallocate (bsc#1192606).
- CIFS: fiemap: do not return EINVAL if get nothing (bsc#1192606).
- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1164565).
- CIFS: fix max ea value size (bnc#1151927 5.3.4).
- CIFS: refactor cifs_get_inode_info() (bsc#1164565).
- CIFS: remove set but not used variables 'cinode' and 'netfid' (bsc#1164565).
- Convert trailing spaces and periods in path components (bsc#1179424).
- EDAC/amd64: Handle three rank interleaving mode (bsc#1152489).
- Handle STATUS_IO_TIMEOUT gracefully (bsc#1192606).
- Input: iforce - fix control-message timeout (git-fixes).
- MM: reclaim mustn't enter FS for swap-over-NFS (bsc#1191876).
- Mark commit as not needed (git-fixes)
- Move upstreamed i8042 patch into sorted section
- NFC: add NCI_UNREG flag to eliminate the race (git-fixes).
- NFC: reorder the logic in nfc_{un,}register_device (git-fixes).
- NFC: reorganize the functions in nci_request (git-fixes).
- NFS: Do not set NFS_INO_DATA_INVAL_DEFER and NFS_INO_INVALID_DATA (git-fixes).
- NFS: Fix deadlocks in nfs_scan_commit_list() (git-fixes).
- NFS: Fix up commit deadlocks (git-fixes).
- NFS: do not take i_rwsem for swap IO (bsc#1191876).
- NFS: move generic_write_checks() call from nfs_file_direct_write() to nfs_file_write() (bsc#1191876).
- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (git-fixes).
- PCI/MSI: Deal with devices lying about their MSI mask capability (git-fixes).
- PCI: Add PCI_EXP_DEVCTL_PAYLOAD_* macros (git-fixes).
- PCI: Mark Atheros QCA6174 to avoid bus reset (git-fixes).
- PM: hibernate: Get block device exclusively in swsusp_check() (git-fixes).
- PM: hibernate: use correct mode for swsusp_close() (git-fixes).
- Pass consistent param-&gt;type to fs_parse() (bsc#1192606).
- Replace HTTP links with HTTPS ones: CIFS (bsc#1192606).
- Revert 'ARM: sti: Implement dummy L2 cache's write_sec' (git-fixes)
- Revert 'arm: sun8i: orangepi-pc-plus: Set EMAC activity LEDs to (git-fixes)
- Revert 'cifs: Fix the target file was deleted when rename failed.' (bsc#1192606).
- SMB3.1.1: Add support for negotiating signing algorithm (bsc#1192606).
- SMB3.1.1: Fix ids returned in POSIX query dir (bsc#1192606).
- SMB3.1.1: add defines for new signing negotiate context (bsc#1192606).
- SMB3.1.1: do not log warning message if server does not populate salt (bsc#1192606).
- SMB3.1.1: fix mount failure to some servers when compression enabled (bsc#1192606).
- SMB3.1.1: remove confusing mount warning when no SPNEGO info on negprot rsp (bsc#1192606).
- SMB3.1.1: update comments clarifying SPNEGO info in negprot response (bsc#1192606).
- SMB311: Add support for query info using posix extensions (level 100) (bsc#1192606).
- SMB3: Add new compression flags (bsc#1192606).
- SMB3: Add new info level for query directory (bsc#1192606).
- SMB3: Add support for getting and setting SACLs (bsc#1192606).
- SMB3: Additional compression structures (bsc#1192606).
- SMB3: Backup intent flag missing from some more ops (bsc#1164565).
- SMB3: Fix crash in SMB2_open_init due to uninitialized field in compounding path (bsc#1164565).
- SMB3: Fix mkdir when idsfromsid configured on mount (bsc#1192606).
- SMB3: Fix persistent handles reconnect (bnc#1151927 5.3.11).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Minor cleanup of protocol definitions (bsc#1192606).
- SMB3: Resolve data corruption of TCP server info fields (bsc#1192606).
- SMB3: add support for recognizing WSL reparse tags (bsc#1192606).
- SMB3: avoid confusing warning message on mount to Azure (bsc#1192606).
- SMB3: fix readpage for large swap cache (bsc#1192606).
- SMB3: incorrect file id in requests compounded with open (bsc#1192606).
- SMB3: update structures for new compression protocol definitions (bsc#1192606).
- SUNRPC/auth: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/call_alloc: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC/xprt: async tasks mustn't block waiting for memory (bsc#1191876).
- SUNRPC: improve 'swap' handling: scheduling and PF_MEMALLOC (bsc#1191876).
- SUNRPC: remove scheduling boost for 'SWAPPER' tasks (bsc#1191876).
- TCON Reconnect during STATUS_NETWORK_NAME_DELETED (bsc#1192606).
- USB: serial: option: add Fibocom FM101-GL variants (git-fixes).
- USB: serial: option: add Telit LE910S1 0x9200 composition (git-fixes).
- Update configs to add CONFIG_SMBFS_COMMON=m.
- Update patches.suse/qla2xxx-synchronize-rport-dev_loss_tmo-setting.patch (bsc#1189158)
- arm: dts: dra76x: Fix mmc3 max-frequency (git-fixes)
- arm: dts: imx6qdl-udoo: fix rgmii phy-mode for ksz9031 phy (git-fixes)
- arm: dts: mt7623: add missing pause for switchport (git-fixes)
- arm: dts: omap3-gta04a4: accelerometer irq fix (git-fixes)
- ath10k: fix invalid dma_addr_t token assignment (git-fixes).
- ath10k: high latency fixes for beacon buffer (git-fixes).
- ath: dfs_pattern_detector: Fix possible null-pointer dereference in channel_detector_create() (git-fixes).
- block: Fix use-after-free issue accessing struct io_cq (bsc#1193042).
- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).
- bonding: Fix a use-after-free problem when bond_sysfs_slave_add() failed (git-fixes).
- bpf, arm: Fix register clobbering in div/mod implementation (git-fixes)
- brcmfmac: Add DMI nvram filename quirk for Cyberbook T116 tablet (git-fixes).
- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).
- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).
- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).
- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).
- btrfs: make checksum item extension more efficient (bsc#1193002).
- cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (git-fixes).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- cifs: Add get_security_type_str function to return sec type (bsc#1192606).
- cifs: Add missing sentinel to smb3_fs_parameters (bsc#1192606).
- cifs: Add new mount parameter 'acdirmax' to allow caching directory metadata (bsc#1192606).
- cifs: Add new parameter 'acregmax' for distinct file and directory metadata timeout (bsc#1192606).
- cifs: Add tracepoints for errors on flush or fsync (bsc#1164565).
- cifs: Add witness information to debug data dump (bsc#1192606).
- cifs: Adjust indentation in smb2_open_file (bsc#1164565).
- cifs: Adjust key sizes and key generation routines for AES256 encryption (bsc#1192606).
- cifs: Allocate crypto structures on the fly for calculating signatures of incoming packets (bsc#1192606).
- cifs: Allocate encryption header through kmalloc (bsc#1192606).
- cifs: Always update signing key of first channel (bsc#1192606).
- cifs: Avoid doing network I/O while holding cache lock (bsc#1164565).
- cifs: Avoid error pointer dereference (bsc#1192606).
- cifs: Avoid field over-reading memcpy() (bsc#1192606).
- cifs: Change SIDs in ACEs while transferring file ownership (bsc#1192606).
- cifs: Clean up DFS referral cache (bsc#1164565).
- cifs: Constify static struct genl_ops (bsc#1192606).
- cifs: Convert to use the fallthrough macro (bsc#1192606).
- cifs: Create a new shared file holding smb2 pdu definitions (bsc#1192606).
- cifs: Deal with some warnings from W=1 (bsc#1192606).
- cifs: Delete a stray unlock in cifs_swn_reconnect() (bsc#1192606).
- cifs: Display local UID details for SMB sessions in DebugData (bsc#1192606).
- cifs: Do not display RDMA transport on reconnect (bsc#1164565).
- cifs: Do not leak EDEADLK to dgetents64 for STATUS_USER_SESSION_DELETED (bsc#1192606).
- cifs: Do not use iov_iter::type directly (bsc#1192606).
- cifs: Do not use the original cruid when following DFS links for multiuser mounts (bsc#1192606).
- cifs: Enable sticky bit with cifsacl mount option (bsc#1192606).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: Fix cached_fid refcnt leak in open_shroot (bsc#1192606).
- cifs: Fix chmod with modefromsid when an older ACE already exists (bsc#1192606).
- cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs (bnc#1151927 5.3.10).
- cifs: Fix cifsacl ACE mask for group and others (bsc#1192606).
- cifs: Fix double add page to memcg when cifs_readpages (bsc#1192606).
- cifs: Fix fall-through warnings for Clang (bsc#1192606).
- cifs: Fix in error types returned for out-of-credit situations (bsc#1192606).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: Fix inconsistent IS_ERR and PTR_ERR (bsc#1192606).
- cifs: Fix inconsistent indenting (bsc#1192606).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs: Fix lookup of SMB connections on multichannel (bsc#1192606).
- cifs: Fix lookup of root ses in DFS referral cache (bsc#1164565).
- cifs: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1164565).
- cifs: Fix missed free operations (bnc#1151927 5.3.8).
- cifs: Fix mode output in debugging statements (bsc#1164565).
- cifs: Fix mount options set in automount (bsc#1164565).
- cifs: Fix null pointer check in cifs_read (bsc#1192606).
- cifs: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1164565).
- cifs: Fix potential softlockups while refreshing DFS cache (bsc#1164565).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Fix retrieval of DFS referrals in cifs_mount() (bsc#1164565).
- cifs: Fix return value in __update_cache_entry (bsc#1164565).
- cifs: Fix some error pointers handling detected by static checker (bsc#1192606).
- cifs: Fix spelling of 'security' (bsc#1192606).
- cifs: Fix support for remount when not changing rsize/wsize (bsc#1192606).
- cifs: Fix the target file was deleted when rename failed (bsc#1192606).
- cifs: Fix unix perm bits to cifsacl conversion for 'other' bits (bsc#1192606).
- cifs: Fix use-after-free bug in cifs_reconnect() (bsc#1164565).
- cifs: Get rid of kstrdup_const()'d paths (bsc#1164565).
- cifs: Grab a reference for the dentry of the cached directory during the lifetime of the cache (bsc#1192606).
- cifs: Handle witness client move notification (bsc#1192606).
- cifs: Identify a connection by a conn_id (bsc#1192606).
- cifs: If a corrupted DACL is returned by the server, bail out (bsc#1192606).
- cifs: In the new mount api we get the full devname as source= (bsc#1192606).
- cifs: Introduce helpers for finding TCP connection (bsc#1164565).
- cifs: Make extract_hostname function public (bsc#1192606).
- cifs: Make extract_sharename function public (bsc#1192606).
- cifs: Merge is_path_valid() into get_normalized_path() (bsc#1164565).
- cifs: Move SMB2_Create definitions to the shared area (bsc#1192606).
- cifs: Move more definitions into the shared area (bsc#1192606).
- cifs: New optype for session operations (bsc#1181507).
- cifs: On cifs_reconnect, resolve the hostname again (bsc#1192606).
- cifs: Optimize readdir on reparse points (bsc#1164565).
- cifs: Print the address and port we are connecting to in generic_ip_connect() (bsc#1192606).
- cifs: Re-indent cifs_swn_reconnect() (bsc#1192606).
- cifs: Reformat DebugData and index connections by conn_id (bsc#1192606).
- cifs: Register generic netlink family (bsc#1192606). Update configs with CONFIG_SWN_UPCALL unset.
- cifs: Remove the superfluous break (bsc#1192606).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: Remove useless variable (bsc#1192606).
- cifs: Retain old ACEs when converting between mode bits and ACL (bsc#1192606).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- cifs: Send witness register and unregister commands to userspace daemon (bsc#1192606).
- cifs: Send witness register messages to userspace daemon in echo task (bsc#1192606).
- cifs: Set CIFS_MOUNT_USE_PREFIX_PATH flag on setting cifs_sb-&gt;prepath (bsc#1192606).
- cifs: Set witness notification handler for messages from userspace daemon (bsc#1192606).
- cifs: Silently ignore unknown oplock break handle (bsc#1192606).
- cifs: Simplify reconnect code when dfs upcall is enabled (bsc#1192606).
- cifs: Standardize logging output (bsc#1192606).
- cifs: To match file servers, make sure the server hostname matches (bsc#1192606).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- cifs: Unlock on errors in cifs_swn_reconnect() (bsc#1192606).
- cifs: Use #define in cifs_dbg (bsc#1164565).
- cifs: add FALLOC_FL_INSERT_RANGE support (bsc#1192606).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: add SMB2_open() arg to return POSIX data (bsc#1164565).
- cifs: add SMB3 change notification support (bsc#1164565).
- cifs: add a debug macro that prints \\server\share for errors (bsc#1164565).
- cifs: add a function to get a cached dir based on its dentry (bsc#1192606).
- cifs: add a helper to find an existing readable handle to a file (bsc#1154355).
- cifs: add a timestamp to track when the lease of the cached dir was taken (bsc#1192606).
- cifs: add an smb3_fs_context to cifs_sb (bsc#1192606).
- cifs: add files to host new mount api (bsc#1192606).
- cifs: add fs_context param to parsing helpers (bsc#1192606).
- cifs: add initial reconfigure support (bsc#1192606).
- cifs: add missing mount option to /proc/mounts (bsc#1164565).
- cifs: add missing parsing of backupuid (bsc#1192606).
- cifs: add mount parameter tcpnodelay (bsc#1192606).
- cifs: add multichannel mount options and data structs (bsc#1192606).
- cifs: add new debugging macro cifs_server_dbg (bsc#1164565).
- cifs: add passthrough for smb2 setinfo (bsc#1164565).
- cifs: add server param (bsc#1192606).
- cifs: add shutdown support (bsc#1192606).
- cifs: add smb2 POSIX info level (bsc#1164565).
- cifs: add support for FALLOC_FL_COLLAPSE_RANGE (bsc#1192606).
- cifs: add support for fallocate mode 0 for non-sparse files (bsc#1164565).
- cifs: add support for flock (bsc#1164565).
- cifs: add witness mount option and data structs (bsc#1192606).
- cifs: added WARN_ON for all the count decrements (bsc#1192606).
- cifs: allocate buffer in the caller of build_path_from_dentry() (bsc#1192606).
- cifs: allow chmod to set mode bits using special sid (bsc#1164565).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: allow unlock flock and OFD lock across fork (bsc#1192606).
- cifs: ask for more credit on async read/write code paths (bsc#1192606).
- cifs: avoid extra calls in posix_info_parse (bsc#1192606).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: call wake_up(&amp;server-&gt;response_q) inside of cifs_reconnect() (bsc#1164565).
- cifs: change confusing field serverName (to ip_addr) (bsc#1192606).
- cifs: change format of CIFS_FULL_KEY_DUMP ioctl (bsc#1192606).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: check pointer before freeing (bsc#1183534).
- cifs: check the timestamp for the cached dirent when deciding on revalidate (bsc#1192606).
- cifs: cifs_md4 convert to SPDX identifier (bsc#1192606).
- cifs: cifspdu.h: Replace one-element array with flexible-array member (bsc#1192606).
- cifs: cifspdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: clarify SMB1 code for UnixCreateHardLink (bsc#1192606).
- cifs: clarify comment about timestamp granularity for old servers (bsc#1192606).
- cifs: clarify hostname vs ip address in /proc/fs/cifs/DebugData (bsc#1192606).
- cifs: cleanup a few le16 vs. le32 uses in cifsacl.c (bsc#1192606).
- cifs: cleanup misc.c (bsc#1192606).
- cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1192606).
- cifs: close the shared root handle on tree disconnect (bsc#1164565).
- cifs: compute full_path already in cifs_readdir() (bsc#1192606).
- cifs: connect individual channel servers to primary channel server (bsc#1192606).
- cifs: connect: style: Simplify bool comparison (bsc#1192606).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: constify path argument of -&gt;make_node() (bsc#1192606).
- cifs: constify pathname arguments in a bunch of helpers (bsc#1192606).
- cifs: convert list_for_each to entry variant (bsc#1192606, jsc#SLE-20042).
- cifs: convert list_for_each to entry variant in cifs_debug.c (bsc#1192606).
- cifs: convert list_for_each to entry variant in smb2misc.c (bsc#1192606).
- cifs: convert revalidate of directories to using directory metadata cache timeout (bsc#1192606).
- cifs: convert to use be32_add_cpu() (bsc#1192606).
- cifs: correct comments explaining internal semaphore usage in the module (bsc#1192606).
- cifs: correct four aliased mount parms to allow use of previous names (bsc#1192606).
- cifs: create a MD4 module and switch cifs.ko to use it (bsc#1192606).
- cifs: create a helper function to parse the query-directory response buffer (bsc#1164565).
- cifs: create a helper to find a writeable handle by path name (bsc#1154355).
- cifs: create sd context must be a multiple of 8 (bsc#1192606).
- cifs: delete duplicated words in header files (bsc#1192606).
- cifs: detect dead connections only when echoes are enabled (bsc#1192606).
- cifs: do d_move in rename (bsc#1164565).
- cifs: do not allow changing posix_paths during remount (bsc#1192606).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not create a temp nls in cifs_setup_ipc (bsc#1192606).
- cifs: do not disable noperm if multiuser mount option is not provided (bsc#1192606).
- cifs: do not duplicate fscache cookie for secondary channels (bsc#1192606).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: do not ignore the SYNC flags in getattr (bsc#1164565).
- cifs: do not leak -EAGAIN for stat() during reconnect (bsc#1164565).
- cifs: do not negotiate session if session already exists (bsc#1192606).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: do not use 'pre:' for MODULE_SOFTDEP (bsc#1164565).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: dump Security Type info in DebugData (bsc#1192606).
- cifs: dump channel info in DebugData (bsc#1192606).
- cifs: dump the session id and keys also for SMB2 sessions (bsc#1192606).
- cifs: enable change notification for SMB2.1 dialect (bsc#1164565).
- cifs: enable extended stats by default (bsc#1192606).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: escape spaces in share names (bsc#1192606).
- cifs: export supported mount options via new mount_params /proc file (bsc#1192606).
- cifs: fail i/o on soft mounts if sessionsetup errors out (bsc#1164565).
- cifs: fix DFS failover (bsc#1192606).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix NULL dereference in match_prepath (bsc#1164565).
- cifs: fix NULL dereference in smb2_check_message() (bsc#1192606).
- cifs: fix SMB1 error path in cifs_get_file_info_unix (bsc#1192606).
- cifs: fix a comment for the timeouts when sending echos (bsc#1164565).
- cifs: fix a memleak with modefromsid (bsc#1192606).
- cifs: fix a sign extension bug (bsc#1192606).
- cifs: fix allocation size on newly created files (bsc#1192606).
- cifs: fix channel signing (bsc#1192606).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix chown and chgrp when idsfromsid mount option enabled (bsc#1192606).
- cifs: fix credit accounting for extra channel (bsc#1192606).
- cifs: fix dereference on ses before it is null checked (bsc#1164565).
- cifs: fix dfs domain referrals (bsc#1192606).
- cifs: fix dfs-links (bsc#1192606).
- cifs: fix doc warnings in cifs_dfs_ref.c (bsc#1192606).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix fallocate when trying to allocate a hole (bsc#1192606).
- cifs: fix handling of escaped ',' in the password mount argument (bsc#1192606).
- cifs: fix incorrect check for null pointer in header_assemble (bsc#1192606).
- cifs: fix incorrect kernel doc comments (bsc#1192606).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix ipv6 formating in cifs_ses_add_channel (bsc#1192606).
- cifs: fix leak in cifs_smb3_do_mount() ctx (bsc#1192606).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- cifs: fix memory leak of smb3_fs_context_dup::server_hostname (bsc#1192606).
- cifs: fix minor typos in comments and log messages (bsc#1192606).
- cifs: fix missing null session check in mount (bsc#1192606).
- cifs: fix missing spinlock around update to ses-&gt;status (bsc#1192606).
- cifs: fix mode bits from dir listing when mounted with modefromsid (bsc#1164565).
- cifs: fix mount option display for sec=krb5i (bsc#1161907).
- cifs: fix mounts to subdirectories of target (bsc#1192606).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: fix out-of-bound memory access when calling smb3_notify() at mount point (bsc#1192606).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: fix possible uninitialized access and race on iface_list (bsc#1192606).
- cifs: fix potential mismatch of UNC paths (bsc#1164565).
- cifs: fix potential use-after-free bugs (bsc#1192606, jsc#SLE-20042).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix print of hdr_flags in dfscache_proc_show() (bsc#1192606, jsc#SLE-20042).
- cifs: fix reference leak for tlink (bsc#1192606).
- cifs: fix regression when mounting shares with prefix paths (bsc#1192606).
- cifs: fix rename() by ensuring source handle opened with DELETE bit (bsc#1164565).
- cifs: fix rsize/wsize to be negotiated values (bsc#1192606).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix soft mounts hanging in the reconnect code (bsc#1164565).
- cifs: fix string declarations and assignments in tracepoints (bsc#1192606).
- cifs: fix the out of range assignment to bit fields in parse_server_interfaces (bsc#1192606).
- cifs: fix trivial typo (bsc#1192606).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: fix uninitialized variable in smb3_fs_context_parse_param (bsc#1192606).
- cifs: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1164565).
- cifs: fix unneeded null check (bsc#1192606).
- cifs: fix use after free in cifs_smb3_do_mount() (bsc#1192606).
- cifs: fix wrong release in sess_alloc_buffer() failed path (bsc#1192606).
- cifs: for compound requests, use open handle if possible (bsc#1192606).
- cifs: fork arc4 and create a separate module for it for cifs and other users (bsc#1192606).
- cifs: get mode bits from special sid on stat (bsc#1164565).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: get rid of cifs_sb-&gt;mountdata (bsc#1192606).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle 'guest' mount parameter (bsc#1192606).
- cifs: handle 'nolease' option for vers=1.0 (bsc#1192606).
- cifs: handle -EINTR in cifs_setattr (bsc#1192606).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle prefix paths in reconnect (bsc#1164565).
- cifs: handle reconnect of tcon when there is no cached dfs referral (bsc#1192606).
- cifs: have -&gt;mkdir() handle race with another client sanely (bsc#1192606).
- cifs: have cifs_fattr_to_inode() refuse to change type on live inode (bsc#1192606).
- cifs: ignore auto and noauto options if given (bsc#1192606).
- cifs: ignore cached share root handle closing errors (bsc#1166780).
- cifs: improve fallocate emulation (bsc#1192606).
- cifs: improve read performance for page size 64KB &amp; cache=strict &amp; vers=2.1+ (bsc#1192606).
- cifs: introduce cifs_ses_mark_for_reconnect() helper (bsc#1192606).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: introduce new helper for cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: log mount errors using cifs_errorf() (bsc#1192606).
- cifs: log warning message (once) if out of disk space (bsc#1164565).
- cifs: make build_path_from_dentry() return const char * (bsc#1192606).
- cifs: make const array static, makes object smaller (bsc#1192606).
- cifs: make fs_context error logging wrapper (bsc#1192606).
- cifs: make locking consistent around the server session status (bsc#1192606).
- cifs: make multichannel warning more visible (bsc#1192606).
- cifs: make sure we do not overflow the max EA buffer size (bsc#1164565).
- cifs: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1164565).
- cifs: map STATUS_ACCOUNT_LOCKED_OUT to -EACCES (bsc#1192606).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: minor fix to two debug messages (bsc#1192606).
- cifs: minor kernel style fixes for comments (bsc#1192606).
- cifs: minor simplification to smb2_is_network_name_deleted (bsc#1192606).
- cifs: minor update to comments around the cifs_tcp_ses_lock mutex (bsc#1192606).
- cifs: minor updates to Kconfig (bsc#1192606).
- cifs: misc: Use array_size() in if-statement controlling expression (bsc#1192606).
- cifs: missed ref-counting smb session in find (bsc#1192606).
- cifs: missing null check for newinode pointer (bsc#1192606).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: modefromsid: make room for 4 ACE (bsc#1164565).
- cifs: modefromsid: write mode ACE first (bsc#1164565).
- cifs: move NEGOTIATE_PROTOCOL definitions out into the common area (bsc#1192606).
- cifs: move SMB FSCTL definitions to common code (bsc#1192606).
- cifs: move [brw]size from cifs_sb to cifs_sb-&gt;ctx (bsc#1192606).
- cifs: move cache mount options to fs_context.ch (bsc#1192606).
- cifs: move cifsFileInfo_put logic into a work-queue (bsc#1154355).
- cifs: move cifs_cleanup_volume_info[_content] to fs_context.c (bsc#1192606).
- cifs: move cifs_parse_devname to fs_context.c (bsc#1192606).
- cifs: move debug print out of spinlock (bsc#1192606).
- cifs: move security mount options into fs_context.ch (bsc#1192606).
- cifs: move smb version mount options into fs_context.c (bsc#1192606).
- cifs: move some variables off the stack in smb2_ioctl_query_info (bsc#1192606).
- cifs: move the check for nohandlecache into open_shroot (bsc#1192606).
- cifs: move the enum for cifs parameters into fs_context.h (bsc#1192606).
- cifs: move update of flags into a separate function (bsc#1192606).
- cifs: multichannel: always zero struct cifs_io_parms (bsc#1192606).
- cifs: multichannel: move channel selection above transport layer (bsc#1192606).
- cifs: multichannel: move channel selection in function (bsc#1192606).
- cifs: multichannel: try to rebind when reconnecting a channel (bsc#1192606).
- cifs: multichannel: use pointer for binding channel (bsc#1192606).
- cifs: nosharesock should be set on new server (bsc#1192606).
- cifs: nosharesock should not share socket with future sessions (bsc#1192606).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: only write 64kb at a time when fallocating a small region of a file (bsc#1192606).
- cifs: pass a path to open_shroot and check if it is the root or not (bsc#1192606).
- cifs: pass the dentry instead of the inode down to the revalidation check functions (bsc#1192606).
- cifs: plumb smb2 POSIX dir enumeration (bsc#1164565).
- cifs: populate server_hostname for extra channels (bsc#1192606).
- cifs: potential unintitliazed error code in cifs_getattr() (bsc#1164565).
- cifs: prepare SMB2_Flush to be usable in compounds (bsc#1154355).
- cifs: prepare SMB2_query_directory to be used with compounding (bsc#1164565).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: prevent truncation from long to int in wait_for_free_credits (bsc#1192606).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: print warning mounting with vers=1.0 (bsc#1164565).
- cifs: properly invalidate cached root handle when closing it (bsc#1192606).
- cifs: protect session channel fields with chan_lock (bsc#1192606).
- cifs: protect srv_count with cifs_tcp_ses_lock (bsc#1192606).
- cifs: protect updating server-&gt;dstaddr with a spinlock (bsc#1192606).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: reduce stack use in smb2_compound_op (bsc#1192606).
- cifs: refactor create_sd_buf() and and avoid corrupting the buffer (bsc#1192606).
- cifs: release lock earlier in dequeue_mid error case (bsc#1192606).
- cifs: remove [gu]id/backup[gu]id/file_mode/dir_mode from cifs_sb (bsc#1192606).
- cifs: remove actimeo from cifs_sb (bsc#1192606).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: remove ctx argument from cifs_setup_cifs_sb (bsc#1192606).
- cifs: remove duplicated prototype (bsc#1192606).
- cifs: remove old dead code (bsc#1192606).
- cifs: remove pathname for file from SPDX header (bsc#1192606).
- cifs: remove redundant assignment to pointer pneg_ctxt (bsc#1164565).
- cifs: remove redundant assignment to variable rc (bsc#1164565).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove redundant initialization of variable rc (bsc#1192606).
- cifs: remove set but not used variable 'server' (bsc#1164565).
- cifs: remove set but not used variables (bsc#1164565).
- cifs: remove some minor warnings pointed out by kernel test robot (bsc#1192606).
- cifs: remove the devname argument to cifs_compose_mount_options (bsc#1192606).
- cifs: remove the retry in cifs_poxis_lock_set (bsc#1192606).
- cifs: remove two cases where rc is set unnecessarily in sid_to_id (bsc#1192606).
- cifs: remove unnecessary copies of tcon-&gt;crfid.fid (bsc#1192606).
- cifs: remove unused variable 'server' (bsc#1192606).
- cifs: remove unused variable 'sid_user' (bsc#1164565).
- cifs: remove unused variable (bsc#1164565).
- cifs: remove various function description warnings (bsc#1192606).
- cifs: rename a variable in SendReceive() (bsc#1164565).
- cifs: rename cifs_common to smbfs_common (bsc#1192606).
- cifs: rename dup_vol to smb3_fs_context_dup and move it into fs_context.c (bsc#1192606).
- cifs: rename posix create rsp (bsc#1164565).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: rename smb_vol as smb3_fs_context and move it to fs_context.h (bsc#1192606).
- cifs: rename the *_shroot* functions to *_cached_dir* (bsc#1192606).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cifs: retry lookup and readdir when EAGAIN is returned (bsc#1192606).
- cifs: return cached_fid from open_shroot (bsc#1192606).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: returning mount parm processing errors correctly (bsc#1192606).
- cifs: revalidate mapping when we open files for SMB1 POSIX (bsc#1192606).
- cifs: send workstation name during ntlmssp session setup (bsc#1192606).
- cifs: set a minimum of 120s for next dns resolution (bsc#1192606).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- cifs: set correct max-buffer-size for smb2_ioctl_init() (bsc#1164565).
- cifs: set server-&gt;cipher_type to AES-128-CCM for SMB3.0 (bsc#1192606).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- cifs: simplify SWN code with dummy funcs instead of ifdefs (bsc#1192606).
- cifs: simplify handling of cifs_sb/ctx-&gt;local_nls (bsc#1192606).
- cifs: smb1: Try failing back to SetFileInfo if SetPathInfo fails (bsc#1192606).
- cifs: smb2pdu.h: Replace zero-length array with flexible-array member (bsc#1192606).
- cifs: smbd: Add messages on RDMA session destroy and reconnection (bsc#1164565).
- cifs: smbd: Calculate the correct maximum packet size for segmented SMBDirect send/receive (bsc#1192606).
- cifs: smbd: Check and extend sender credits in interrupt context (bsc#1192606).
- cifs: smbd: Check send queue size before posting a send (bsc#1192606).
- cifs: smbd: Do not schedule work to send immediate packet on every receive (bsc#1192606).
- cifs: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1164565).
- cifs: smbd: Merge code to track pending packets (bsc#1192606).
- cifs: smbd: Only queue work for error recovery on memory registration (bsc#1164565).
- cifs: smbd: Properly process errors on ib_post_send (bsc#1192606).
- cifs: smbd: Return -EAGAIN when transport is reconnecting (bsc#1164565).
- cifs: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1164565).
- cifs: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1164565).
- cifs: smbd: Update receive credits before sending and deal with credits roll back on failure before sending (bsc#1192606).
- cifs: sort interface list by speed (bsc#1192606).
- cifs: split out dfs code from cifs_reconnect() (bsc#1192606, jsc#SLE-20042).
- cifs: store a pointer to the root dentry in cifs_sb_info once we have completed mounting the share (bsc#1192606).
- cifs: style: replace one-element array with flexible-array (bsc#1192606).
- cifs: support nested dfs links over reconnect (bsc#1192606, jsc#SLE-20042).
- cifs: support share failover when remounting (bsc#1192606, jsc#SLE-20042).
- cifs: switch build_path_from_dentry() to using dentry_path_raw() (bsc#1192606).
- cifs: switch servers depending on binding state (bsc#1192606).
- cifs: switch to new mount api (bsc#1192606).
- cifs: try harder to open new channels (bsc#1192606).
- cifs: try opening channels after mounting (bsc#1192606).
- cifs: uncomplicate printing the iocharset parameter (bsc#1192606).
- cifs: update FSCTL definitions (bsc#1192606).
- cifs: update ctime and mtime during truncate (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal module version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update internal version number (bsc#1192606).
- cifs: update mnt_cifs_flags during reconfigure (bsc#1192606).
- cifs: update new ACE pointer after populate_new_aces (bsc#1192606).
- cifs: update super_operations to show_devname (bsc#1192606).
- cifs: use PTR_ERR_OR_ZERO() to simplify code (bsc#1164565).
- cifs: use SPDX-Licence-Identifier (bsc#1192606).
- cifs: use cifsInodeInfo-&gt;open_file_lock while iterating to avoid a panic (bnc#1151927 5.3.7).
- cifs: use compounding for open and first query-dir for readdir() (bsc#1164565).
- cifs: use discard iterator to discard unneeded network data more efficiently (bsc#1192606).
- cifs: use echo_interval even when connection not ready (bsc#1192606).
- cifs: use existing handle for compound_op(OP_SET_INFO) when possible (bsc#1154355).
- cifs: use helpers when parsing uid/gid mount options and validate them (bsc#1192606).
- cifs: use mod_delayed_work() for &amp;server-&gt;reconnect if already queued (bsc#1164565).
- cifs: use the expiry output of dns_query to schedule next resolution (bsc#1192606).
- cifs: warn and fail if trying to use rootfs without the config option (bsc#1192606).
- cifs: we do not allow changing username/password/unc/... during remount (bsc#1192606).
- cifs_atomic_open(): fix double-put on late allocation failure (bsc#1192606).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1192606).
- cifs`: handle ERRBaduid for SMB1 (bsc#1192606).
- clk: imx: imx6ul: Move csi_sel mux to correct base register (git-fixes).
- clk: ingenic: Fix bugs with divided dividers (git-fixes).
- crypto: ecc - fix CRYPTO_DEFAULT_RNG dependency (git-fixes).
- crypto: pcrypt - Delay write to padata-&gt;info (git-fixes).
- crypto: s5p-sss - Add error handling in s5p_aes_probe() (git-fixes).
- cxgb4: fix eeprom len when diagnostics not implemented (git-fixes).
- dmaengine: at_xdmac: fix AT_XDMAC_CC_PERID() macro (git-fixes).
- dmaengine: dmaengine_desc_callback_valid(): Check for `callback_result` (git-fixes).
- do_cifs_create(): do not set -&gt;i_mode of something we had not created (bsc#1192606).
- drm/amdgpu: fix set scaling mode Full/Full aspect/Center not works on vga and dvi connectors (git-fixes).
- drm/msm: Do hw_init() before capturing GPU state (git-fixes).
- drm/nouveau: hdmigv100.c: fix corrupted HDMI Vendor InfoFrame (git-fixes).
- drm/panel-orientation-quirks: add Valve Steam Deck (git-fixes).
- drm/plane-helper: fix uninitialized variable reference (git-fixes).
- drm/vc4: fix error code in vc4_create_object() (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Aya Neo 2021 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for GPD Win3 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for KD Kurio Smart C15200 2-in-1 (git-fixes).
- drm: panel-orientation-quirks: Add quirk for the Samsung Galaxy Book 10.6 (git-fixes).
- drm: panel-orientation-quirks: Update the Lenovo Ideapad D330 quirk (v2) (git-fixes).
- elfcore: correct reference to CONFIG_UML (git-fixes).
- elfcore: fix building with clang (bsc#1169514).
- ext4: Avoid trim error on fs with small groups (bsc#1191271).
- fget: clarify and improve __fget_files() implementation (bsc#1193727).
- fix memory leak in large read decrypt offload (bsc#1164565).
- fs/cifs/: fix misspellings using codespell tool (bsc#1192606).
- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1164565).
- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1164565).
- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1164565).
- fs/cifs: Assign boolean values to a bool variable (bsc#1192606).
- fs/cifs: Fix resource leak (bsc#1192606).
- fs/cifs: Simplify bool comparison (bsc#1192606).
- fs/cifs: fix gcc warning in sid_to_id (bsc#1192606).
- fs: cifs: Fix atime update check vs mtime (bsc#1164565).
- fs: cifs: Initialize filesystem timestamp ranges (bsc#1164565).
- fs: cifs: Remove repeated struct declaration (bsc#1192606).
- fs: cifs: Remove unnecessary struct declaration (bsc#1192606).
- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1164565).
- fs: cifs: mute -Wunused-const-variable message (bnc#1151927 5.3.9).
- fs: cifs: remove unneeded variable in smb3_fs_context_dup (bsc#1192606).
- fuse: release pipe buf after last use (bsc#1193318).
- gve: Add netif_set_xps_queue call (bsc#1176940).
- gve: Add rx buffer pagecnt bias (bsc#1176940).
- gve: Allow pageflips on larger pages (bsc#1176940).
- gve: DQO: avoid unused variable warnings (bsc#1176940).
- gve: Do lazy cleanup in TX path (git-fixes).
- gve: Switch to use napi_complete_done (git-fixes).
- gve: Track RX buffer allocation failures (bsc#1176940).
- i2c: cbus-gpio: set atomic transfer callback (git-fixes).
- i2c: stm32f7: flush TX FIFO upon transfer errors (git-fixes).
- i2c: stm32f7: recover the bus on access timeout (git-fixes).
- i2c: stm32f7: stop dma transfer in case of NACK (git-fixes).
- i2c: xlr: Fix a resource leak in the error handling path of 'xlr_i2c_probe()' (git-fixes).
- i40e: Fix NULL ptr dereference on VSI filter sync (git-fixes).
- i40e: Fix changing previously set num_queue_pairs for PFs (git-fixes).
- i40e: Fix correct max_pkt_size on VF RX queue (git-fixes).
- i40e: Fix creation of first queue by omitting it if is not power of two (git-fixes).
- i40e: Fix display error code in dmesg (git-fixes).
- i40e: Fix failed opcode appearing if handling messages from VF (git-fixes).
- i40e: Fix ping is lost after configuring ADq on VF (git-fixes).
- i40e: Fix pre-set max number of queues for VF (git-fixes).
- i40e: Fix warning message and call stack during rmmod i40e driver (git-fixes).
- iavf: Fix failure to exit out from last all-multicast mode (git-fixes).
- iavf: Fix for the false positive ASQ/ARQ errors while issuing VF reset (git-fixes).
- iavf: Fix reporting when setting descriptor count (git-fixes).
- iavf: Prevent changing static ITR values if adaptive moderation is on (git-fixes).
- iavf: Restore VLAN filters after link down (git-fixes).
- iavf: check for null in iavf_fix_features (git-fixes).
- iavf: do not clear a lock we do not hold (git-fixes).
- iavf: free q_vectors before queues in iavf_disable_vf (git-fixes).
- iavf: prevent accidental free of filter structure (git-fixes).
- iavf: validate pointers (git-fixes).
- ibmvnic: drop bad optimization in reuse_rx_pools() (bsc#1193349 ltc#195568).
- ibmvnic: drop bad optimization in reuse_tx_pools() (bsc#1193349 ltc#195568).
- ice: Delete always true check of PF pointer (git-fixes).
- ice: avoid bpf_prog refcount underflow (jsc#SLE-7926).
- ice: fix vsi-&gt;txq_map sizing (jsc#SLE-7926).
- ice: ignore dropped packets during init (git-fixes).
- igb: fix netpoll exit with traffic (git-fixes).
- igc: Remove _I_PHY_ID checking (bsc#1193169).
- igc: Remove phy-&gt;type checking (bsc#1193169).
- iio: imu: st_lsm6dsx: Avoid potential array overflow in st_lsm6dsx_set_odr() (git-fixes).
- iommu/amd: Relocate GAMSup check to early_enable_iommus (git-fixes).
- iommu/amd: Remove iommu_init_ga() (git-fixes).
- iommu: Check if group is NULL before remove device (git-fixes).
- ipmi: Disable some operations during a panic (git-fixes).
- kernel-source.spec: install-kernel-tools also required on 15.4
- kprobes: Limit max data_size of the kretprobe instances (bsc#1193669).
- lib/xz: Avoid overlapping memcpy() with invalid input with in-place decompression (git-fixes).
- lib/xz: Validate the value before assigning it to an enum variable (git-fixes).
- libata: fix checking of DMA state (git-fixes).
- linux/parser.h: add include guards (bsc#1192606).
- livepatch: Avoid CPU hogging with cond_resched (bsc#1071995).
- lpfc: Reintroduce old IRQ probe logic (bsc#1183897).
- md: fix a lock order reversal in md_alloc (git-fixes).
- media: Revert 'media: uvcvideo: Set unique vdev name based in type' (bsc#1193255).
- media: imx: set a media_device bus_info string (git-fixes).
- media: ipu3-imgu: VIDIOC_QUERYCAP: Fix bus_info (git-fixes).
- media: ipu3-imgu: imgu_fmt: Handle properly try (git-fixes).
- media: ir-kbd-i2c: improve responsiveness of hauppauge zilog receivers (git-fixes).
- media: mceusb: return without resubmitting URB in case of -EPROTO error (git-fixes).
- media: mt9p031: Fix corrupted frame after restarting stream (git-fixes).
- media: netup_unidvb: handle interrupt properly according to the firmware (git-fixes).
- media: rcar-csi2: Add checking to rcsi2_start_receiver() (git-fixes).
- media: s5p-mfc: fix possible null-pointer dereference in s5p_mfc_probe() (git-fixes).
- media: stm32: Potential NULL pointer dereference in dcmi_irq_thread() (git-fixes).
- media: usb: dvd-usb: fix uninit-value bug in dibusb_read_eeprom_byte() (git-fixes).
- media: uvcvideo: Return -EIO for control errors (git-fixes).
- media: uvcvideo: Set capability in s_param (git-fixes).
- media: uvcvideo: Set unique vdev name based in type (git-fixes).
- memstick: r592: Fix a UAF bug when removing the driver (git-fixes).
- mmc: dw_mmc: Dont wait for DRTO on Write RSP error (git-fixes).
- mmc: winbond: do not build on M68K (git-fixes).
- moxart: fix potential use-after-free on remove path (bsc#1194516).
- mtd: core: do not remove debugfs directory if device is in use (git-fixes).
- mwifiex: Properly initialize private structure on interface type changes (git-fixes).
- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).
- mwifiex: Run SET_BSS_MODE when changing from P2P to STATION vif-type (git-fixes).
- mwl8k: Fix use-after-free in mwl8k_fw_state_machine() (git-fixes).
- net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() (git-fixes).
- net/mlx5: Update error handler for UCTX and UMEM (git-fixes).
- net/mlx5e: reset XPS on error flow if netdev isn't registered yet (git-fixes).
- net: asix: fix uninit value bugs (git-fixes).
- net: bnx2x: fix variable dereferenced before check (git-fixes).
- net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero (git-fixes).
- net: delete redundant function declaration (git-fixes).
- net: hso: fix control-request directions (git-fixes).
- net: hso: fix muxed tty registration (git-fixes).
- net: linkwatch: fix failure to restore device state across suspend/resume (bsc#1192511).
- net: mana: Allow setting the number of queues while the NIC is down (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix memory leak in mana_hwc_create_wq (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix spelling mistake 'calledd' -&gt; 'called' (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix the netdev_err()'s vPort argument in mana_init_port() (jsc#SLE-18779, bsc#1185726).
- net: mana: Improve the HWC error handling (jsc#SLE-18779, bsc#1185726).
- net: mana: Support hibernation and kexec (jsc#SLE-18779, bsc#1185726).
- net: mana: Use kcalloc() instead of kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: pegasus: fix uninit-value in get_interrupt_interval (git-fixes).
- net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (git-fixes).
- net: usb: Merge cpu_to_le32s + memcpy to put_unaligned_le32 (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- net: usb: lan78xx: lan78xx_phy_init(): use PHY_POLL instead of '0' if no IRQ is available (git-fixes).
- nfc: pn533: Fix double free when pn533_fill_fragment_skbs() fails (git-fixes).
- nfp: Fix memory leak in nfp_cpp_area_cache_add() (git-fixes).
- nfp: checking parameter process for rx-usecs/tx-usecs is invalid (git-fixes).
- nfsd4: Handle the NFSv4 READDIR 'dircount' hint being zero (git-fixes).
- nfsd: do not alloc under spinlock in rpc_parse_scope_id (git-fixes).
- nfsd: fix error handling of register_pernet_subsys() in init_nfsd() (git-fixes).
- nvme-multipath: Skip not ready namespaces when revalidating paths (bsc#1191793 bsc#1192507 bsc#1192969).
- nvme-pci: add NO APST quirk for Kioxia device (git-fixes).
- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).
- perf/x86/intel/uncore: Fix Intel ICX IIO event constraints (git-fixes).
- perf/x86/intel/uncore: Fix M2M event umask for Ice Lake server (git-fixes).
- perf/x86/intel/uncore: Fix the scale of the IMC free-running events (git-fixes).
- perf/x86/intel/uncore: Support extra IMC channel on Ice Lake server (git-fixes).
- perf: Correctly handle failed perf_get_aux_event() (git-fixes).
- platform/x86: hp_accel: Fix an error handling path in 'lis3lv02d_probe()' (git-fixes).
- platform/x86: wmi: do not fail if disabling fails (git-fixes).
- pnfs/flexfiles: Fix misplaced barrier in nfs4_ff_layout_prepare_ds (git-fixes).
- powerpc/fadump: Fix inaccurate CPU state info in vmcore generated with panic (bsc#1193901 ltc#194976).
- powerpc/paravirt: correct preempt debug splat in vcpu_is_preempted() (bsc#1181148 ltc#190702 git-fixes).
- powerpc/paravirt: vcpu_is_preempted() commentary (bsc#1181148 ltc#190702 git-fixes).
- powerpc/pseries: Move some PAPR paravirt functions to their own file (bsc#1181148 ltc#190702 git-fixes).
- powerpc/watchdog: Avoid holding wd_smp_lock over printk and smp_send_nmi_ipi (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix missed watchdog reset due to memory ordering race (bsc#1187541 ltc#192129).
- powerpc/watchdog: Fix wd_smp_last_reset_tb reporting (bsc#1187541 ltc#192129).
- powerpc/watchdog: read TB close to where it is used (bsc#1187541 ltc#192129).
- powerpc/watchdog: tighten non-atomic read-modify-write access (bsc#1187541 ltc#192129).
- powerpc: fix unbalanced node refcount in check_kvm_guest() (jsc#SLE-15869 jsc#SLE-16321 git-fixes).
- powerpc: handle kdump appropriately with crash_kexec_post_notifiers option (bsc#1193901 ltc#194976).
- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).
- qede: validate non LSO skb length (git-fixes).
- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).
- r8169: Add device 10ec:8162 to driver r8169 (git-fixes).
- recordmcount.pl: fix typo in s390 mcount regex (bsc#1192267).
- recordmcount.pl: look for jgnop instruction as well as bcrl on s390 (bsc#1192267).
- reset: socfpga: add empty driver allowing consumers to probe (git-fixes).
- ring-buffer: Protect ring_buffer_reset() from reentrancy (bsc#1179960).
- rpm/kernel-binary.spec.in: do not strip vmlinux again (bsc#1193306)
- rpm/kernel-obs-build.spec.in: move to zstd for the initrd
- rt2x00: do not mark device gone on EPROTO errors during start (git-fixes).
- rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() (bsc#1154353 bnc#1151927 5.3.9).
- s390/uv: fully validate the VMA before calling follow_page() (git-fixes).
- s390: mm: Fix secure storage access exception handling (git-fixes).
- scsi: iscsi: Adjust iface sysfs attr detection (git-fixes).
- scsi: lpfc: Fix non-recovery of remote ports following an unsolicited LOGO (bsc#1189126).
- scsi: mpt3sas: Fix kernel panic during drive powercycle test (git-fixes).
- scsi: mpt3sas: Fix system going into read-only mode (git-fixes).
- scsi: qla2xxx: Fix gnl list corruption (git-fixes).
- scsi: qla2xxx: Relogin during fabric disturbance (git-fixes).
- scsi: qla2xxx: Turn off target reset during issue_lip (git-fixes).
- serial: 8250_pci: Fix ACCES entries in pci_serial_quirks array (git-fixes).
- serial: 8250_pci: rewrite pericom_do_set_divisor() (git-fixes).
- serial: core: fix transmit-buffer reset and memleak (git-fixes).
- series.conf: whitespace and comment cleanup No effect on expanded tree.
- smb2: clarify rc initialization in smb2_reconnect (bsc#1192606).
- smb2: fix use-after-free in smb2_ioctl_query_info() (bsc#1192606).
- smb3.1.1: add new module load parm enable_gcm_256 (bsc#1192606).
- smb3.1.1: add new module load parm require_gcm_256 (bsc#1192606).
- smb3.1.1: allow dumping GCM256 keys to improve debugging of encrypted shares (bsc#1192606).
- smb3.1.1: allow dumping keys for multiuser mounts (bsc#1192606).
- smb3.1.1: do not fail if no encryption required but server does not support it (bsc#1192606).
- smb3.1.1: enable negotiating stronger encryption by default (bsc#1192606).
- smb3.1.1: fix typo in compression flag (bsc#1192606).
- smb3.1.1: print warning if server does not support requested encryption type (bsc#1192606).
- smb3.1.1: rename nonces used for GCM and CCM encryption (bsc#1192606).
- smb3.1.1: set gcm256 when requested (bsc#1192606).
- smb311: Add support for SMB311 query info (non-compounded) (bsc#1192606).
- smb311: Add support for lookup with posix extensions query info (bsc#1192606).
- smb311: Add tracepoints for new compound posix query info (bsc#1192606).
- smb311: add support for using info level for posix extensions query (bsc#1192606).
- smb311: remove dead code for non compounded posix query info (bsc#1192606).
- smb3: Add debug message for new file creation with idsfromsid mount option (bsc#1192606).
- smb3: Add defines for new information level, FileIdInformation (bsc#1164565).
- smb3: Add missing reparse tags (bsc#1164565).
- smb3: Add new parm 'nodelete' (bsc#1192606).
- smb3: Avoid Mid pending list corruption (bsc#1192606).
- smb3: Call cifs reconnect from demultiplex thread (bsc#1192606).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- smb3: Fix regression in time handling (bsc#1164565).
- smb3: Handle error case during offload read path (bsc#1192606).
- smb3: Incorrect size for netname negotiate context (bsc#1154355).
- smb3: add additional null check in SMB2_ioctl (bsc#1192606).
- smb3: add additional null check in SMB2_open (bsc#1192606).
- smb3: add additional null check in SMB2_tcon (bsc#1192606).
- smb3: add additional null check in SMB311_posix_mkdir (bsc#1192606).
- smb3: add debug messages for closing unmatched open (bsc#1164565).
- smb3: add defines for new crypto algorithms (bsc#1192606).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: add dynamic trace points for socket connection (bsc#1192606).
- smb3: add dynamic tracepoints for flush and close (bsc#1164565).
- smb3: add indatalen that can be a non-zero value to calculation of credit charge in smb2 ioctl (bsc#1192606).
- smb3: add missing flag definitions (bsc#1164565).
- smb3: add missing worker function for SMB3 change notify (bsc#1164565).
- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1164565).
- smb3: add mount option to allow forced caching of read only share (bsc#1164565).
- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1164565).
- smb3: add rasize mount parameter to improve readahead performance (bsc#1192606).
- smb3: add some missing definitions from MS-FSCC (bsc#1192606).
- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1164565).
- smb3: add support for stat of WSL reparse points for special file types (bsc#1192606).
- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1164565).
- smb3: allow disabling requesting leases (bnc#1151927 5.3.4).
- smb3: allow parallelizing decryption of reads (bsc#1164565).
- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1164565).
- smb3: allow uid and gid owners to be set on create with idsfromsid mount option (bsc#1192606).
- smb3: change noisy error message to FYI (bsc#1192606).
- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1164565).
- smb3: correct server pointer dereferencing check to be more consistent (bsc#1192606).
- smb3: correct smb3 ACL security descriptor (bsc#1192606).
- smb3: default to minimum of two channels when multichannel specified (bsc#1192606).
- smb3: display max smb3 requests in flight at any one time (bsc#1164565).
- smb3: do not attempt multichannel to server which does not support it (bsc#1192606).
- smb3: do not error on fsync when readonly (bsc#1192606).
- smb3: do not setup the fscache_super_cookie until fsinfo initialized (bsc#1192606).
- smb3: do not try to cache root directory if dir leases not supported (bsc#1192606).
- smb3: dump in_send and num_waiters stats counters by default (bsc#1164565).
- smb3: enable offload of decryption of large reads via mount option (bsc#1164565).
- smb3: enable swap on SMB3 mounts (bsc#1192606).
- smb3: extend fscache mount volume coherency check (bsc#1192606).
- smb3: fix access denied on change notify request to some servers (bsc#1192606).
- smb3: fix cached file size problems in duplicate extents (reflink) (bsc#1192606).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1164565).
- smb3: fix incorrect number of credits when ioctl MaxOutputResponse &gt; 64K (bsc#1192606).
- smb3: fix leak in 'open on server' perf counter (bnc#1151927 5.3.4).
- smb3: fix mode passed in on create for modetosid mount option (bsc#1164565).
- smb3: fix performance regression with setting mtime (bsc#1164565).
- smb3: fix posix extensions mount option (bsc#1192606).
- smb3: fix possible access to uninitialized pointer to DACL (bsc#1192606).
- smb3: fix potential null dereference in decrypt offload (bsc#1164565).
- smb3: fix problem with null cifs super block with previous patch (bsc#1164565).
- smb3: fix refcount underflow warning on unmount when no directory leases (bsc#1164565).
- smb3: fix signing verification of large reads (bsc#1154355).
- smb3: fix stat when special device file and mounted with modefromsid (bsc#1192606).
- smb3: fix typo in header file (bsc#1192606).
- smb3: fix typo in mount options displayed in /proc/mounts (bsc#1192606).
- smb3: fix uninitialized value for port in witness protocol move (bsc#1192606).
- smb3: fix unmount hang in open_shroot (bnc#1151927 5.3.4).
- smb3: fix unneeded error message on change notify (bsc#1192606).
- smb3: if max_channels set to more than one channel request multichannel (bsc#1192606).
- smb3: improve check for when we send the security descriptor context on create (bsc#1164565).
- smb3: improve handling of share deleted (and share recreated) (bsc#1154355).
- smb3: limit noisy error (bsc#1192606).
- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1164565).
- smb3: minor update to compression header definitions (bsc#1192606).
- smb3: missing ACL related flags (bsc#1164565).
- smb3: negotiate current dialect (SMB3.1.1) when version 3 or greater requested (bsc#1192606).
- smb3: only offload decryption of read responses if multiple requests (bsc#1164565).
- smb3: pass mode bits into create calls (bsc#1164565).
- smb3: prevent races updating CurrentMid (bsc#1192606).
- smb3: query attributes on file close (bsc#1164565).
- smb3: rc uninitialized in one fallocate path (bsc#1192606).
- smb3: remind users that witness protocol is experimental (bsc#1192606).
- smb3: remove confusing dmesg when mounting with encryption ('seal') (bsc#1164565).
- smb3: remove noisy debug message and minor cleanup (bsc#1164565).
- smb3: remove overly noisy debug line in signing errors (bsc#1192606).
- smb3: remove static checker warning (bsc#1192606).
- smb3: remove trivial dfs compile warning (bsc#1192606, jsc#SLE-20042).
- smb3: remove two unused variables (bsc#1192606).
- smb3: remove unused flag passed into close functions (bsc#1164565).
- smb3: set COMPOUND_FID to FileID field of subsequent compound request (bsc#1192606).
- smb3: smbdirect support can be configured by default (bsc#1192606).
- smb3: update protocol header definitions based to include new flags (bsc#1192606).
- smb3: use SMB2_SIGNATURE_SIZE define (bsc#1192606).
- smb3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- smb3: when mounting with multichannel include it in requested capabilities (bsc#1192606).
- smbdirect: missing rc checks while waiting for rdma events (bsc#1192606).
- soc/tegra: Fix an error handling path in tegra_powergate_power_up() (git-fixes).
- soc/tegra: pmc: Fix imbalanced clock disabling in error code path (git-fixes).
- spi: bcm-qspi: Fix missing clk_disable_unprepare() on error in bcm_qspi_probe() (git-fixes).
- spi: spl022: fix Microwire full duplex mode (git-fixes).
- swiotlb-xen: avoid double free (git-fixes).
- swiotlb: Fix the type of index (git-fixes).
- tlb: mmu_gather: add tlb_flush_*_range APIs
- tpm: fix potential NULL pointer access in tpm_del_char_device (bsc#1184209 ltc#190917 git-fixes bsc#1193660 ltc#195634).
- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).
- tracing: Add length protection to histogram string copies (git-fixes).
- tracing: Change STR_VAR_MAX_LEN (git-fixes).
- tracing: Check pid filtering when creating events (git-fixes).
- tracing: Fix pid filtering when triggers are attached (git-fixes).
- tracing: use %ps format string to print symbols (git-fixes).
- tty: hvc: replace BUG_ON() with negative return value (git-fixes).
- tty: serial: msm_serial: Deactivate RX DMA for polling support (git-fixes).
- tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc (git-fixes).
- update structure definitions from updated protocol documentation (bsc#1192606).
- usb-storage: Add compatibility quirk flags for iODD 2531/2541 (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for elapsed frames (git-fixes).
- usb: dwc2: hcd_queue: Fix use of floating point literal (git-fixes).
- usb: host: ohci-tmio: check return value after calling platform_get_resource() (git-fixes).
- usb: musb: tusb6010: check return value after calling platform_get_resource() (git-fixes).
- usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).
- usb: xhci: Enable runtime-pm by default on AMD Yellow Carp platform (git-fixes).
- vfs: check fd has read access in kernel_read_file_from_fd() (bsc#1194888).
- vfs: do not parse forbidden flags (bsc#1192606).
- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).
- x86/cpu: Fix migration safety with X86_BUG_NULL_SEL (bsc#1152489).
- x86/pkey: Fix undefined behaviour with PKRU_WD_BIT (bsc#1152489).
- x86/pvh: add prototype for xen_pvh_init() (git-fixes).
- x86/xen: Add xenpv_restore_regs_and_return_to_usermode() (bsc#1152489).
- xen/blkfront: do not take local copy of a request from the ring page (git-fixes).
- xen/blkfront: do not trust the backend response data blindly (git-fixes).
- xen/blkfront: read response from backend only once (git-fixes).
- xen/netfront: disentangle tx_skb_freelist (git-fixes).
- xen/netfront: do not read data from request on the ring page (git-fixes).
- xen/netfront: do not trust the backend response data blindly (git-fixes).
- xen/netfront: read response from backend only once (git-fixes).
- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).
- xen/pvh: add missing prototype to header (git-fixes).
- xen/x86: fix PV trap handling on secondary processors (git-fixes).
- xen: sync include/xen/interface/io/ring.h with Xen's newest version (git-fixes).
- xhci: Fix USB 3.1 enumeration issues by increasing roothub power-on-good delay (git-fixes).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1192569).
- xhci: Fix commad ring abort, write all 64 bits to CRCR register (git-fixes).
- zram: fix return value on writeback_store (git-fixes).
- zram: off by one in read_block_state() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-26"/>
	<updated date="2022-01-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153275">SUSE bug 1153275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154355">SUSE bug 1154355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161907">SUSE bug 1161907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164565">SUSE bug 1164565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166780">SUSE bug 1166780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179599">SUSE bug 1179599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183897">SUSE bug 1183897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187541">SUSE bug 1187541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189158">SUSE bug 1189158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191271">SUSE bug 1191271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191793">SUSE bug 1191793</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191876">SUSE bug 1191876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192507">SUSE bug 1192507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192511">SUSE bug 1192511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192569">SUSE bug 1192569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192606">SUSE bug 1192606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192845">SUSE bug 1192845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192847">SUSE bug 1192847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192877">SUSE bug 1192877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192946">SUSE bug 1192946</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192969">SUSE bug 1192969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192987">SUSE bug 1192987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192990">SUSE bug 1192990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192998">SUSE bug 1192998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193002">SUSE bug 1193002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193042">SUSE bug 1193042</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193169">SUSE bug 1193169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193255">SUSE bug 1193255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193306">SUSE bug 1193306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193318">SUSE bug 1193318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193349">SUSE bug 1193349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193440">SUSE bug 1193440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193442">SUSE bug 1193442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193660">SUSE bug 1193660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193669">SUSE bug 1193669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193727">SUSE bug 1193727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193767">SUSE bug 1193767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193901">SUSE bug 1193901</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193927">SUSE bug 1193927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194001">SUSE bug 1194001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194087">SUSE bug 1194087</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194094">SUSE bug 1194094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194302">SUSE bug 1194302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194517">SUSE bug 1194517</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194529">SUSE bug 1194529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194888">SUSE bug 1194888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194985">SUSE bug 1194985</bugzilla>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-27820/">CVE-2020-27820</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28711/">CVE-2021-28711</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28712/">CVE-2021-28712</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28713/">CVE-2021-28713</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28714/">CVE-2021-28714</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28715/">CVE-2021-28715</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33098/">CVE-2021-33098</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4001/">CVE-2021-4001</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-4002/">CVE-2021-4002</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4083/">CVE-2021-4083</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-4135/">CVE-2021-4135</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4149/">CVE-2021-4149</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-4197/">CVE-2021-4197</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4202/">CVE-2021-4202</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43975/">CVE-2021-43975</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43976/">CVE-2021-43976</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-44733/">CVE-2021-44733</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45485/">CVE-2021-45485</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45486/">CVE-2021-45486</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0185/">CVE-2022-0185</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0322/">CVE-2022-0322</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664899" comment="kernel-default-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664900" comment="kernel-default-base-5.3.18-24.99.1.9.46.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664901" comment="kernel-default-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664566" comment="kernel-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664567" comment="kernel-docs-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664568" comment="kernel-macros-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664902" comment="kernel-obs-build-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664611" comment="kernel-preempt-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664612" comment="kernel-preempt-devel-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664572" comment="kernel-source-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664903" comment="kernel-syms-5.3.18-24.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664904" comment="reiserfs-kmp-default-5.3.18-24.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111865" version="1" class="patch">
	<metadata>
		<title>Security update for log4j12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1193184" ref_url="https://bugzilla.suse.com/1193184" source="BUGZILLA"/>
		<reference ref_id="1194842" ref_url="https://bugzilla.suse.com/1194842" source="BUGZILLA"/>
		<reference ref_id="1194843" ref_url="https://bugzilla.suse.com/1194843" source="BUGZILLA"/>
		<reference ref_id="1194844" ref_url="https://bugzilla.suse.com/1194844" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23302" ref_url="https://www.suse.com/security/cve/CVE-2022-23302/" source="CVE"/>
		<reference ref_id="CVE-2022-23305" ref_url="https://www.suse.com/security/cve/CVE-2022-23305/" source="CVE"/>
		<reference ref_id="CVE-2022-23307" ref_url="https://www.suse.com/security/cve/CVE-2022-23307/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/010135.html" source="SUSE-SU"/>
		<description>
This update for log4j12 fixes the following issues:

- CVE-2022-23307: Fix deserialization issue by removing the chainsaw sub-package. (bsc#1194844)
- CVE-2022-23305: Fix SQL injection by removing src/main/java/org/apache/log4j/jdbc/JDBCAppender.java. (bsc#1194843)
- CVE-2022-23302: Fix remote code execution by removing src/main/java/org/apache/log4j/net/JMSSink.java. (bsc#1194842)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-28"/>
	<updated date="2022-01-28"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193184">SUSE bug 1193184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194842">SUSE bug 1194842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194843">SUSE bug 1194843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194844">SUSE bug 1194844</bugzilla>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23302/">CVE-2022-23302</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23305/">CVE-2022-23305</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23307/">CVE-2022-23307</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664290" comment="log4j12-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664306" comment="log4j12-javadoc-1.2.17-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664307" comment="log4j12-manual-1.2.17-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111866" version="1" class="patch">
	<metadata>
		<title>Security update for samba (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194859" ref_url="https://bugzilla.suse.com/1194859" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44142" ref_url="https://www.suse.com/security/cve/CVE-2021-44142/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010160.html" source="SUSE-SU"/>
		<description>
This update for samba fixes the following issues:

- CVE-2021-44142: Fixed out-of-Bound Read/Write on Samba vfs_fruit module. (bsc#1194859)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-01"/>
	<updated date="2022-02-01"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1194859">SUSE bug 1194859</bugzilla>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-44142/">CVE-2021-44142</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009666635" comment="libdcerpc-binding0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665611" comment="libdcerpc-binding0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666636" comment="libdcerpc-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666637" comment="libdcerpc-samr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666638" comment="libdcerpc-samr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666639" comment="libdcerpc0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665616" comment="libdcerpc0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666640" comment="libndr-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666641" comment="libndr-krb5pac-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666642" comment="libndr-krb5pac0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665620" comment="libndr-krb5pac0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666643" comment="libndr-nbt-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666644" comment="libndr-nbt0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665623" comment="libndr-nbt0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666645" comment="libndr-standard-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666646" comment="libndr-standard0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665626" comment="libndr-standard0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666647" comment="libndr0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665628" comment="libndr0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666648" comment="libnetapi-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666649" comment="libnetapi0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665631" comment="libnetapi0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666650" comment="libsamba-credentials-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666651" comment="libsamba-credentials0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665634" comment="libsamba-credentials0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666652" comment="libsamba-errors-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666653" comment="libsamba-errors0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665637" comment="libsamba-errors0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666654" comment="libsamba-hostconfig-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666655" comment="libsamba-hostconfig0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665640" comment="libsamba-hostconfig0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666656" comment="libsamba-passdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666657" comment="libsamba-passdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665643" comment="libsamba-passdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666658" comment="libsamba-policy-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666659" comment="libsamba-policy-python3-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666660" comment="libsamba-policy0-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666661" comment="libsamba-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666662" comment="libsamba-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665649" comment="libsamba-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666663" comment="libsamdb-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666664" comment="libsamdb0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665652" comment="libsamdb0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666665" comment="libsmbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666666" comment="libsmbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666667" comment="libsmbconf-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666668" comment="libsmbconf0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665657" comment="libsmbconf0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666669" comment="libsmbldap-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666670" comment="libsmbldap2-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665660" comment="libsmbldap2-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666671" comment="libtevent-util-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666672" comment="libtevent-util0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665663" comment="libtevent-util0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666673" comment="libwbclient-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666674" comment="libwbclient0-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665666" comment="libwbclient0-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666675" comment="samba-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666676" comment="samba-ad-dc-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665720" comment="samba-ceph-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666677" comment="samba-client-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666678" comment="samba-core-devel-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666679" comment="samba-dsdb-modules-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666680" comment="samba-libs-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665674" comment="samba-libs-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666681" comment="samba-libs-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666682" comment="samba-python3-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009666683" comment="samba-winbind-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665678" comment="samba-winbind-32bit-4.11.14+git.319.91d693db37c-4.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111867" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177599" ref_url="https://bugzilla.suse.com/1177599" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1188605" ref_url="https://bugzilla.suse.com/1188605" source="BUGZILLA"/>
		<reference ref_id="1193096" ref_url="https://bugzilla.suse.com/1193096" source="BUGZILLA"/>
		<reference ref_id="1193506" ref_url="https://bugzilla.suse.com/1193506" source="BUGZILLA"/>
		<reference ref_id="1193861" ref_url="https://bugzilla.suse.com/1193861" source="BUGZILLA"/>
		<reference ref_id="1193864" ref_url="https://bugzilla.suse.com/1193864" source="BUGZILLA"/>
		<reference ref_id="1193867" ref_url="https://bugzilla.suse.com/1193867" source="BUGZILLA"/>
		<reference ref_id="1194048" ref_url="https://bugzilla.suse.com/1194048" source="BUGZILLA"/>
		<reference ref_id="1194227" ref_url="https://bugzilla.suse.com/1194227" source="BUGZILLA"/>
		<reference ref_id="1194880" ref_url="https://bugzilla.suse.com/1194880" source="BUGZILLA"/>
		<reference ref_id="1195009" ref_url="https://bugzilla.suse.com/1195009" source="BUGZILLA"/>
		<reference ref_id="1195065" ref_url="https://bugzilla.suse.com/1195065" source="BUGZILLA"/>
		<reference ref_id="1195184" ref_url="https://bugzilla.suse.com/1195184" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22600" ref_url="https://www.suse.com/security/cve/CVE-2021-22600/" source="CVE"/>
		<reference ref_id="CVE-2021-39648" ref_url="https://www.suse.com/security/cve/CVE-2021-39648/" source="CVE"/>
		<reference ref_id="CVE-2021-39657" ref_url="https://www.suse.com/security/cve/CVE-2021-39657/" source="CVE"/>
		<reference ref_id="CVE-2021-45095" ref_url="https://www.suse.com/security/cve/CVE-2021-45095/" source="CVE"/>
		<reference ref_id="CVE-2022-0330" ref_url="https://www.suse.com/security/cve/CVE-2022-0330/" source="CVE"/>
		<reference ref_id="CVE-2022-0435" ref_url="https://www.suse.com/security/cve/CVE-2022-0435/" source="CVE"/>
		<reference ref_id="CVE-2022-22942" ref_url="https://www.suse.com/security/cve/CVE-2022-22942/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0365-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010211.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 LTSS kernel was updated receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).
- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).
- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).
- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).
- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).
- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).
- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).

The following non-security bugs were fixed:

- bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() (bsc#1194227).
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).
- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).
- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).
- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).
- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).
- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).
- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).
- net: mana: Add RX fencing (bsc#1193506).
- net: mana: Add XDP support (bsc#1193506).
- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).
- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).
- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).
- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).
- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).
- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).
- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).
- net_sched: avoid resetting active qdisc for multiple times (bsc#1183405).
- net_sched: get rid of unnecessary dev_qdisc_reset() (bsc#1183405).
- net_sched: use qdisc_reset() in qdisc_destroy() (bsc#1183405).
- nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096).
- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-10"/>
	<updated date="2022-02-10"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1177599">SUSE bug 1177599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188605">SUSE bug 1188605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193096">SUSE bug 1193096</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193506">SUSE bug 1193506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193861">SUSE bug 1193861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193864">SUSE bug 1193864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193867">SUSE bug 1193867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194048">SUSE bug 1194048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194227">SUSE bug 1194227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194880">SUSE bug 1194880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195009">SUSE bug 1195009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195065">SUSE bug 1195065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195184">SUSE bug 1195184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22600/">CVE-2021-22600</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39648/">CVE-2021-39648</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-39657/">CVE-2021-39657</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-45095/">CVE-2021-45095</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0330/">CVE-2022-0330</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0435/">CVE-2022-0435</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22942/">CVE-2022-22942</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667593" comment="kernel-default-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667594" comment="kernel-default-base-5.3.18-24.102.1.9.48.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667595" comment="kernel-default-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667501" comment="kernel-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667502" comment="kernel-docs-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667503" comment="kernel-macros-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667596" comment="kernel-obs-build-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667563" comment="kernel-preempt-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667564" comment="kernel-preempt-devel-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667507" comment="kernel-source-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667597" comment="kernel-syms-5.3.18-24.102.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667598" comment="reiserfs-kmp-default-5.3.18-24.102.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111868" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194166" ref_url="https://bugzilla.suse.com/1194166" source="BUGZILLA"/>
		<reference ref_id="1194167" ref_url="https://bugzilla.suse.com/1194167" source="BUGZILLA"/>
		<reference ref_id="1194168" ref_url="https://bugzilla.suse.com/1194168" source="BUGZILLA"/>
		<reference ref_id="1194169" ref_url="https://bugzilla.suse.com/1194169" source="BUGZILLA"/>
		<reference ref_id="1194170" ref_url="https://bugzilla.suse.com/1194170" source="BUGZILLA"/>
		<reference ref_id="1194171" ref_url="https://bugzilla.suse.com/1194171" source="BUGZILLA"/>
		<reference ref_id="1194780" ref_url="https://bugzilla.suse.com/1194780" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4181" ref_url="https://www.suse.com/security/cve/CVE-2021-4181/" source="CVE"/>
		<reference ref_id="CVE-2021-4182" ref_url="https://www.suse.com/security/cve/CVE-2021-4182/" source="CVE"/>
		<reference ref_id="CVE-2021-4183" ref_url="https://www.suse.com/security/cve/CVE-2021-4183/" source="CVE"/>
		<reference ref_id="CVE-2021-4184" ref_url="https://www.suse.com/security/cve/CVE-2021-4184/" source="CVE"/>
		<reference ref_id="CVE-2021-4185" ref_url="https://www.suse.com/security/cve/CVE-2021-4185/" source="CVE"/>
		<reference ref_id="CVE-2021-4190" ref_url="https://www.suse.com/security/cve/CVE-2021-4190/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010221.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to version 3.6.1: 

- CVE-2021-4185: RTMPT dissector infinite loop (bsc#1194166)
- CVE-2021-4184: BitTorrent DHT dissector infinite loop (bsc#1194167)
- CVE-2021-4183: pcapng file parser crash (bsc#1194168)
- CVE-2021-4182: RFC 7468 file parser infinite loop (bsc#1194169)
- CVE-2021-4181: Sysdig Event dissector crash (bsc#1194170)
- CVE-2021-4190: Kafka dissector infinite loop (bsc#1194171)
- Support for Shared Memory Communications (SMC) (jsc#SLE-18727)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-14"/>
	<updated date="2022-02-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194166">SUSE bug 1194166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194167">SUSE bug 1194167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194168">SUSE bug 1194168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194169">SUSE bug 1194169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194170">SUSE bug 1194170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194171">SUSE bug 1194171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194780">SUSE bug 1194780</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4181/">CVE-2021-4181</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4182/">CVE-2021-4182</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4183/">CVE-2021-4183</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4184/">CVE-2021-4184</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4185/">CVE-2021-4185</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4190/">CVE-2021-4190</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663950" comment="libwireshark15-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663951" comment="libwiretap12-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663952" comment="libwsutil13-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663953" comment="wireshark-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663954" comment="wireshark-devel-3.6.1-3.68.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663955" comment="wireshark-ui-qt-3.6.1-3.68.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111869" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009990.html" source="SUSE-SU"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009663013" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663014" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663015" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663016" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663017" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663018" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663019" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663020" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663021" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663022" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663023" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663024" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663025" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663026" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663027" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663028" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663029" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663030" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663031" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662084" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663032" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663033" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663034" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663035" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663036" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663037" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663038" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009663039" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111870" version="1" class="patch">
	<metadata>
		<title>Security update for xen (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194576" ref_url="https://bugzilla.suse.com/1194576" source="BUGZILLA"/>
		<reference ref_id="1194581" ref_url="https://bugzilla.suse.com/1194581" source="BUGZILLA"/>
		<reference ref_id="1194588" ref_url="https://bugzilla.suse.com/1194588" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23033" ref_url="https://www.suse.com/security/cve/CVE-2022-23033/" source="CVE"/>
		<reference ref_id="CVE-2022-23034" ref_url="https://www.suse.com/security/cve/CVE-2022-23034/" source="CVE"/>
		<reference ref_id="CVE-2022-23035" ref_url="https://www.suse.com/security/cve/CVE-2022-23035/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010239.html" source="SUSE-SU"/>
		<description>
This update for xen fixes the following issues:

- CVE-2022-23033: Fixed guest_physmap_remove_page not removing the p2m mappings. (XSA-393) (bsc#1194576)
- CVE-2022-23034: Fixed possible DoS by a PV guest Xen while unmapping a grant. (XSA-394) (bsc#1194581)
- CVE-2022-23035: Fixed insufficient cleanup of passed-through device IRQs. (XSA-395) (bsc#1194588)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194576">SUSE bug 1194576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194581">SUSE bug 1194581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194588">SUSE bug 1194588</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-23033/">CVE-2022-23033</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-23034/">CVE-2022-23034</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23035/">CVE-2022-23035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665604" comment="xen-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665605" comment="xen-devel-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665606" comment="xen-libs-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665607" comment="xen-tools-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665608" comment="xen-tools-domU-4.13.4_04-3.43.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665609" comment="xen-tools-xendomains-wait-disk-4.13.4_04-3.43.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111871" version="1" class="patch">
	<metadata>
		<title>Security update for virglrenderer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195389" ref_url="https://bugzilla.suse.com/1195389" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0135" ref_url="https://www.suse.com/security/cve/CVE-2022-0135/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010243.html" source="SUSE-SU"/>
		<description>
This update for virglrenderer fixes the following issues:
	  
- CVE-2022-0135: Fixed out-of-bonds write in read_transfer_data() (bsc#1195389).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195389">SUSE bug 1195389</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0135/">CVE-2022-0135</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009667320" comment="libvirglrenderer0-0.6.0-4.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667321" comment="virglrenderer-devel-0.6.0-4.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111872" version="1" class="patch">
	<metadata>
		<title>Security update for tiff (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1071031" ref_url="https://bugzilla.suse.com/1071031" source="BUGZILLA"/>
		<reference ref_id="1154365" ref_url="https://bugzilla.suse.com/1154365" source="BUGZILLA"/>
		<reference ref_id="1182808" ref_url="https://bugzilla.suse.com/1182808" source="BUGZILLA"/>
		<reference ref_id="1182809" ref_url="https://bugzilla.suse.com/1182809" source="BUGZILLA"/>
		<reference ref_id="1182811" ref_url="https://bugzilla.suse.com/1182811" source="BUGZILLA"/>
		<reference ref_id="1182812" ref_url="https://bugzilla.suse.com/1182812" source="BUGZILLA"/>
		<reference ref_id="1190312" ref_url="https://bugzilla.suse.com/1190312" source="BUGZILLA"/>
		<reference ref_id="1194539" ref_url="https://bugzilla.suse.com/1194539" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-17095" ref_url="https://www.suse.com/security/cve/CVE-2017-17095/" source="CVE"/>
		<reference ref_id="CVE-2019-17546" ref_url="https://www.suse.com/security/cve/CVE-2019-17546/" source="CVE"/>
		<reference ref_id="CVE-2020-19131" ref_url="https://www.suse.com/security/cve/CVE-2020-19131/" source="CVE"/>
		<reference ref_id="CVE-2020-35521" ref_url="https://www.suse.com/security/cve/CVE-2020-35521/" source="CVE"/>
		<reference ref_id="CVE-2020-35522" ref_url="https://www.suse.com/security/cve/CVE-2020-35522/" source="CVE"/>
		<reference ref_id="CVE-2020-35523" ref_url="https://www.suse.com/security/cve/CVE-2020-35523/" source="CVE"/>
		<reference ref_id="CVE-2020-35524" ref_url="https://www.suse.com/security/cve/CVE-2020-35524/" source="CVE"/>
		<reference ref_id="CVE-2022-22844" ref_url="https://www.suse.com/security/cve/CVE-2022-22844/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0480-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010245.html" source="SUSE-SU"/>
		<description>
This update for tiff fixes the following issues:

- CVE-2017-17095: Fixed DoS in tools/pal2rgb.c in pal2rgb (bsc#1071031).
- CVE-2019-17546: Fixed integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image (bsc#1154365).
- CVE-2020-19131: Fixed buffer overflow in tiffcrop that may cause DoS via the invertImage() function (bsc#1190312).
- CVE-2020-35521: Fixed memory allocation failure in tif_read.c (bsc#1182808).
- CVE-2020-35522: Fixed memory allocation failure in tif_pixarlog.c (bsc#1182809).
- CVE-2020-35523: Fixed integer overflow in tif_getimage.c (bsc#1182811).
- CVE-2020-35524: Fixed heap-based buffer overflow in TIFF2PDF tool (bsc#1182812).
- CVE-2022-22844: Fixed out-of-bounds read in _TIFFmemcpy in tif_unix.c (bsc#1194539).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-17"/>
	<updated date="2022-02-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1071031">SUSE bug 1071031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154365">SUSE bug 1154365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182808">SUSE bug 1182808</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182809">SUSE bug 1182809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182811">SUSE bug 1182811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182812">SUSE bug 1182812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190312">SUSE bug 1190312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194539">SUSE bug 1194539</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-17095/">CVE-2017-17095</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-17546/">CVE-2019-17546</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-19131/">CVE-2020-19131</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35521/">CVE-2020-35521</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35522/">CVE-2020-35522</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35523/">CVE-2020-35523</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35524/">CVE-2020-35524</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-22844/">CVE-2022-22844</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665983" comment="libtiff-devel-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665984" comment="libtiff5-4.0.9-45.5.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665439" comment="libtiff5-32bit-4.0.9-45.5.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111873" version="1" class="patch">
	<metadata>
		<title>Security update for rust (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194767" ref_url="https://bugzilla.suse.com/1194767" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21658" ref_url="https://www.suse.com/security/cve/CVE-2022-21658/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010252.html" source="SUSE-SU"/>
		<description>
This update for rust fixes the following issues:

- CVE-2022-21658: Fixed race condition in std::fs::remove_dir_all (bsc#1194767).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1194767">SUSE bug 1194767</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21658/">CVE-2022-21658</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664622" comment="cargo-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664580" comment="rls-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664623" comment="rust-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664582" comment="rust-analysis-1.53.0-22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664558" comment="rust-src-1.53.0-22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111874" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194471" ref_url="https://bugzilla.suse.com/1194471" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45079" ref_url="https://www.suse.com/security/cve/CVE-2021-45079/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0492-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010267.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

- CVE-2021-45079: Fixed authentication bypass in EAP authentication. (bsc#1194471)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194471">SUSE bug 1194471</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45079/">CVE-2021-45079</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009668327" comment="strongswan-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664853" comment="strongswan-doc-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668328" comment="strongswan-hmac-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668329" comment="strongswan-ipsec-5.8.2-11.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668330" comment="strongswan-libs0-5.8.2-11.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111875" version="1" class="patch">
	<metadata>
		<title>Security update for clamav (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194731" ref_url="https://bugzilla.suse.com/1194731" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-20698" ref_url="https://www.suse.com/security/cve/CVE-2022-20698/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010270.html" source="SUSE-SU"/>
		<description>
This update for clamav fixes the following issues:

- CVE-2022-20698: Fixed invalid pointer read allowing denial of service crash. (bsc#1194731)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194731">SUSE bug 1194731</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-20698/">CVE-2022-20698</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009664618" comment="clamav-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664619" comment="clamav-devel-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664620" comment="libclamav9-0.103.5-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009664621" comment="libfreshclam2-0.103.5-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111876" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195054" ref_url="https://bugzilla.suse.com/1195054" source="BUGZILLA"/>
		<reference ref_id="1195217" ref_url="https://bugzilla.suse.com/1195217" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23852" ref_url="https://www.suse.com/security/cve/CVE-2022-23852/" source="CVE"/>
		<reference ref_id="CVE-2022-23990" ref_url="https://www.suse.com/security/cve/CVE-2022-23990/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010268.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- CVE-2022-23852: Fixed signed integer overflow in XML_GetBuffer (bsc#1195054).
- CVE-2022-23990: Fixed integer overflow in the doProlog function (bsc#1195217).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195054">SUSE bug 1195054</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195217">SUSE bug 1195217</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23852/">CVE-2022-23852</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23990/">CVE-2022-23990</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009665985" comment="expat-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665986" comment="libexpat-devel-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665987" comment="libexpat1-2.2.5-3.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009665436" comment="libexpat1-32bit-2.2.5-3.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111877" version="1" class="patch">
	<metadata>
		<title>Security update for python-Twisted (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195667" ref_url="https://bugzilla.suse.com/1195667" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21712" ref_url="https://www.suse.com/security/cve/CVE-2022-21712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010263.html" source="SUSE-SU"/>
		<description>
This update for python-Twisted fixes the following issues:

- CVE-2022-21712: Fixed secret exposure in cross-origin redirects by
  properly removing sensitive headers when redirecting to a different origin
  (bsc#1195667).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195667">SUSE bug 1195667</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21712/">CVE-2022-21712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668331" comment="python3-Twisted-19.10.0-3.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111878" version="1" class="patch">
	<metadata>
		<title>Security update for net-snmp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1027353" ref_url="https://bugzilla.suse.com/1027353" source="BUGZILLA"/>
		<reference ref_id="1081164" ref_url="https://bugzilla.suse.com/1081164" source="BUGZILLA"/>
		<reference ref_id="1102775" ref_url="https://bugzilla.suse.com/1102775" source="BUGZILLA"/>
		<reference ref_id="1108471" ref_url="https://bugzilla.suse.com/1108471" source="BUGZILLA"/>
		<reference ref_id="1111122" ref_url="https://bugzilla.suse.com/1111122" source="BUGZILLA"/>
		<reference ref_id="1116807" ref_url="https://bugzilla.suse.com/1116807" source="BUGZILLA"/>
		<reference ref_id="1140341" ref_url="https://bugzilla.suse.com/1140341" source="BUGZILLA"/>
		<reference ref_id="1145864" ref_url="https://bugzilla.suse.com/1145864" source="BUGZILLA"/>
		<reference ref_id="1152968" ref_url="https://bugzilla.suse.com/1152968" source="BUGZILLA"/>
		<reference ref_id="1174961" ref_url="https://bugzilla.suse.com/1174961" source="BUGZILLA"/>
		<reference ref_id="1178021" ref_url="https://bugzilla.suse.com/1178021" source="BUGZILLA"/>
		<reference ref_id="1178351" ref_url="https://bugzilla.suse.com/1178351" source="BUGZILLA"/>
		<reference ref_id="1179009" ref_url="https://bugzilla.suse.com/1179009" source="BUGZILLA"/>
		<reference ref_id="1179699" ref_url="https://bugzilla.suse.com/1179699" source="BUGZILLA"/>
		<reference ref_id="1181591" ref_url="https://bugzilla.suse.com/1181591" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-18065" ref_url="https://www.suse.com/security/cve/CVE-2018-18065/" source="CVE"/>
		<reference ref_id="CVE-2020-15862" ref_url="https://www.suse.com/security/cve/CVE-2020-15862/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0050-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010490.html" source="SUSE-SU"/>
		<description>
This update for net-snmp fixes the following issues:

- CVE-2020-15862: Make extended MIB read-only (bsc#1174961)
- CVE-2018-18065: Fix remote DoS in agent/helpers/table.c (bsc#1111122)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-21"/>
	<updated date="2022-03-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1027353">SUSE bug 1027353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081164">SUSE bug 1081164</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102775">SUSE bug 1102775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1108471">SUSE bug 1108471</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1111122">SUSE bug 1111122</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1116807">SUSE bug 1116807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1140341">SUSE bug 1140341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1145864">SUSE bug 1145864</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152968">SUSE bug 1152968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174961">SUSE bug 1174961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178021">SUSE bug 1178021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178351">SUSE bug 1178351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179009">SUSE bug 1179009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179699">SUSE bug 1179699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181591">SUSE bug 1181591</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-18065/">CVE-2018-18065</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15862/">CVE-2020-15862</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661292" comment="libsnmp30-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661293" comment="net-snmp-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661294" comment="net-snmp-devel-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661295" comment="perl-SNMP-5.7.3-10.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661296" comment="snmp-mibs-5.7.3-10.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111879" version="1" class="patch">
	<metadata>
		<title>Security update for xerces-j2 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195108" ref_url="https://bugzilla.suse.com/1195108" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23437" ref_url="https://www.suse.com/security/cve/CVE-2022-23437/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010271.html" source="SUSE-SU"/>
		<description>
This update for xerces-j2 fixes the following issues:

- CVE-2022-23437: Fixed infinite loop within Apache XercesJ xml parser (bsc#1195108).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-18"/>
	<updated date="2022-02-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195108">SUSE bug 1195108</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23437/">CVE-2022-23437</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667862" comment="xerces-j2-2.12.0-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111880" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-January/009992.html" source="SUSE-SU"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662474" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662475" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111881" version="1" class="patch">
	<metadata>
		<title>Security update for ucode-intel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1192615" ref_url="https://bugzilla.suse.com/1192615" source="BUGZILLA"/>
		<reference ref_id="1195779" ref_url="https://bugzilla.suse.com/1195779" source="BUGZILLA"/>
		<reference ref_id="1195780" ref_url="https://bugzilla.suse.com/1195780" source="BUGZILLA"/>
		<reference ref_id="1195781" ref_url="https://bugzilla.suse.com/1195781" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0127" ref_url="https://www.suse.com/security/cve/CVE-2021-0127/" source="CVE"/>
		<reference ref_id="CVE-2021-0145" ref_url="https://www.suse.com/security/cve/CVE-2021-0145/" source="CVE"/>
		<reference ref_id="CVE-2021-0146" ref_url="https://www.suse.com/security/cve/CVE-2021-0146/" source="CVE"/>
		<reference ref_id="CVE-2021-33120" ref_url="https://www.suse.com/security/cve/CVE-2021-33120/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-February/010310.html" source="SUSE-SU"/>
		<description>
This update for ucode-intel fixes the following issues:

Updated to Intel CPU Microcode 20220207 release.

- CVE-2021-0146: Fixed a potential security vulnerability in some Intel Processors may allow escalation of privilege (bsc#1192615)
- CVE-2021-0127: Intel Processor Breakpoint Control Flow (bsc#1195779)
- CVE-2021-0145: Fast store forward predictor - Cross Domain Training (bsc#1195780)
- CVE-2021-33120: Out of bounds read for some Intel Atom processors (bsc#1195781)

- Security updates for [INTEL-SA-00528](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html)
- Security updates for [INTEL-SA-00532](https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00532.html)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-02-25"/>
	<updated date="2022-02-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1192615">SUSE bug 1192615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195779">SUSE bug 1195779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195780">SUSE bug 1195780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195781">SUSE bug 1195781</bugzilla>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0127/">CVE-2021-0127</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0145/">CVE-2021-0145</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0146/">CVE-2021-0146</cve>
	<cve impact="moderate" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-33120/">CVE-2021-33120</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009667863" comment="ucode-intel-20220207-10.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111882" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs12 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010326.html" source="SUSE-SU"/>
		<description>
This update for nodejs12 fixes the following issues:
	  
- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-02"/>
	<updated date="2022-03-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670526" comment="nodejs12-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670527" comment="nodejs12-devel-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668510" comment="nodejs12-docs-12.22.10-4.29.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670528" comment="npm12-12.22.10-4.29.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111883" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195230" ref_url="https://bugzilla.suse.com/1195230" source="BUGZILLA"/>
		<reference ref_id="1195682" ref_url="https://bugzilla.suse.com/1195682" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-22753" ref_url="https://www.suse.com/security/cve/CVE-2022-22753/" source="CVE"/>
		<reference ref_id="CVE-2022-22754" ref_url="https://www.suse.com/security/cve/CVE-2022-22754/" source="CVE"/>
		<reference ref_id="CVE-2022-22756" ref_url="https://www.suse.com/security/cve/CVE-2022-22756/" source="CVE"/>
		<reference ref_id="CVE-2022-22759" ref_url="https://www.suse.com/security/cve/CVE-2022-22759/" source="CVE"/>
		<reference ref_id="CVE-2022-22760" ref_url="https://www.suse.com/security/cve/CVE-2022-22760/" source="CVE"/>
		<reference ref_id="CVE-2022-22761" ref_url="https://www.suse.com/security/cve/CVE-2022-22761/" source="CVE"/>
		<reference ref_id="CVE-2022-22763" ref_url="https://www.suse.com/security/cve/CVE-2022-22763/" source="CVE"/>
		<reference ref_id="CVE-2022-22764" ref_url="https://www.suse.com/security/cve/CVE-2022-22764/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0696-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010343.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.0 ESR / MFSA 2022-05 (bsc#1195682)

- CVE-2022-22753: Privilege Escalation to SYSTEM on Windows via Maintenance Service
- CVE-2022-22754: Extensions could have bypassed permission confirmation during update
- CVE-2022-22756: Drag and dropping an image could have resulted in the dropped object being an executable
- CVE-2022-22759: Sandboxed iframes could have executed script if the parent appended elements
- CVE-2022-22760: Cross-Origin responses could be distinguished between script and non-script content-types
- CVE-2022-22761: frame-ancestors Content Security Policy directive was not enforced for framed extension pages
- CVE-2022-22763: Script Execution during invalid object state
- CVE-2022-22764: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6


Firefox Extended Support Release 91.5.1 ESR (bsc#1195230)

- Fixed an issue that allowed unexpected data to be submitted in some of our search telemetry
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195230">SUSE bug 1195230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195682">SUSE bug 1195682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22753/">CVE-2022-22753</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22754/">CVE-2022-22754</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22756/">CVE-2022-22756</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22759/">CVE-2022-22759</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22760/">CVE-2022-22760</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22761/">CVE-2022-22761</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22763/">CVE-2022-22763</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-22764/">CVE-2022-22764</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670748" comment="MozillaFirefox-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670749" comment="MozillaFirefox-devel-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670750" comment="MozillaFirefox-translations-common-91.6.0-152.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670751" comment="MozillaFirefox-translations-other-91.6.0-152.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111884" version="1" class="patch">
	<metadata>
		<title>Security update for cyrus-sasl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196036" ref_url="https://bugzilla.suse.com/1196036" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-24407" ref_url="https://www.suse.com/security/cve/CVE-2022-24407/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010340.html" source="SUSE-SU"/>
		<description>
This update for cyrus-sasl fixes the following issues:

- CVE-2022-24407: Fixed SQL injection in sql_auxprop_store in plugins/sql.c (bsc#1196036).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196036">SUSE bug 1196036</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-24407/">CVE-2022-24407</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669258" comment="cyrus-sasl-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669201" comment="cyrus-sasl-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669259" comment="cyrus-sasl-crammd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669203" comment="cyrus-sasl-crammd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669260" comment="cyrus-sasl-devel-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669261" comment="cyrus-sasl-digestmd5-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669206" comment="cyrus-sasl-digestmd5-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669262" comment="cyrus-sasl-gssapi-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669208" comment="cyrus-sasl-gssapi-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669263" comment="cyrus-sasl-otp-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669264" comment="cyrus-sasl-plain-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669211" comment="cyrus-sasl-plain-32bit-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669265" comment="cyrus-sasl-saslauthd-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669266" comment="cyrus-sasl-sqlauxprop-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669267" comment="libsasl2-3-2.1.26-5.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669215" comment="libsasl2-3-32bit-2.1.26-5.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111885" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs8 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010344.html" source="SUSE-SU"/>
		<description>
This update for nodejs8 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-03"/>
	<updated date="2022-03-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669756" comment="nodejs-common-2.0-3.4.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670752" comment="nodejs8-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670753" comment="nodejs8-devel-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669768" comment="nodejs8-docs-8.17.0-10.19.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670754" comment="npm8-8.17.0-10.19.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111886" version="1" class="patch">
	<metadata>
		<title>Security update for webkit2gtk3 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195064" ref_url="https://bugzilla.suse.com/1195064" source="BUGZILLA"/>
		<reference ref_id="1195735" ref_url="https://bugzilla.suse.com/1195735" source="BUGZILLA"/>
		<reference ref_id="1196133" ref_url="https://bugzilla.suse.com/1196133" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30934" ref_url="https://www.suse.com/security/cve/CVE-2021-30934/" source="CVE"/>
		<reference ref_id="CVE-2021-30936" ref_url="https://www.suse.com/security/cve/CVE-2021-30936/" source="CVE"/>
		<reference ref_id="CVE-2021-30951" ref_url="https://www.suse.com/security/cve/CVE-2021-30951/" source="CVE"/>
		<reference ref_id="CVE-2021-30952" ref_url="https://www.suse.com/security/cve/CVE-2021-30952/" source="CVE"/>
		<reference ref_id="CVE-2021-30953" ref_url="https://www.suse.com/security/cve/CVE-2021-30953/" source="CVE"/>
		<reference ref_id="CVE-2021-30954" ref_url="https://www.suse.com/security/cve/CVE-2021-30954/" source="CVE"/>
		<reference ref_id="CVE-2021-30984" ref_url="https://www.suse.com/security/cve/CVE-2021-30984/" source="CVE"/>
		<reference ref_id="CVE-2021-45481" ref_url="https://www.suse.com/security/cve/CVE-2021-45481/" source="CVE"/>
		<reference ref_id="CVE-2021-45482" ref_url="https://www.suse.com/security/cve/CVE-2021-45482/" source="CVE"/>
		<reference ref_id="CVE-2021-45483" ref_url="https://www.suse.com/security/cve/CVE-2021-45483/" source="CVE"/>
		<reference ref_id="CVE-2022-22589" ref_url="https://www.suse.com/security/cve/CVE-2022-22589/" source="CVE"/>
		<reference ref_id="CVE-2022-22590" ref_url="https://www.suse.com/security/cve/CVE-2022-22590/" source="CVE"/>
		<reference ref_id="CVE-2022-22592" ref_url="https://www.suse.com/security/cve/CVE-2022-22592/" source="CVE"/>
		<reference ref_id="CVE-2022-22620" ref_url="https://www.suse.com/security/cve/CVE-2022-22620/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010348.html" source="SUSE-SU"/>
		<description>
This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195064">SUSE bug 1195064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195735">SUSE bug 1195735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196133">SUSE bug 1196133</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30934/">CVE-2021-30934</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30936/">CVE-2021-30936</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30951/">CVE-2021-30951</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30952/">CVE-2021-30952</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30953/">CVE-2021-30953</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30954/">CVE-2021-30954</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30984/">CVE-2021-30984</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45481/">CVE-2021-45481</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45482/">CVE-2021-45482</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-45483/">CVE-2021-45483</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-22589/">CVE-2022-22589</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22590/">CVE-2022-22590</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-22592/">CVE-2022-22592</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-22620/">CVE-2022-22620</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670755" comment="libjavascriptcoregtk-4_0-18-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670756" comment="libwebkit2gtk-4_0-37-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670665" comment="libwebkit2gtk3-lang-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670757" comment="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670758" comment="typelib-1_0-WebKit2-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670759" comment="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670760" comment="webkit2gtk-4_0-injected-bundles-2.34.6-29.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670761" comment="webkit2gtk3-devel-2.34.6-29.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111887" version="1" class="patch">
	<metadata>
		<title>Security update for flatpak (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194610" ref_url="https://bugzilla.suse.com/1194610" source="BUGZILLA"/>
		<reference ref_id="1194611" ref_url="https://bugzilla.suse.com/1194611" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43860" ref_url="https://www.suse.com/security/cve/CVE-2021-43860/" source="CVE"/>
		<reference ref_id="CVE-2022-21682" ref_url="https://www.suse.com/security/cve/CVE-2022-21682/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010349.html" source="SUSE-SU"/>
		<description>
This update for flatpak fixes the following issues:

Update to flatpak 1.10.7:

- CVE-2022-21682: Introduce new option --nofilesystem=host:reset to support flatpak-builder 1.2.2 (bsc#1194611).
- CVE-2021-43860: A malicious repository could hav sent invalid application metadata in a way that hides some of the app permissions displayed during installation (bsc#1194610).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194610">SUSE bug 1194610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194611">SUSE bug 1194611</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-43860/">CVE-2021-43860</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-21682/">CVE-2022-21682</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670762" comment="flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670763" comment="flatpak-devel-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670764" comment="flatpak-zsh-completion-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670765" comment="libflatpak0-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670766" comment="system-user-flatpak-1.10.7-4.12.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670767" comment="typelib-1_0-Flatpak-1_0-1.10.7-4.12.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111888" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196026" ref_url="https://bugzilla.suse.com/1196026" source="BUGZILLA"/>
		<reference ref_id="1196168" ref_url="https://bugzilla.suse.com/1196168" source="BUGZILLA"/>
		<reference ref_id="1196169" ref_url="https://bugzilla.suse.com/1196169" source="BUGZILLA"/>
		<reference ref_id="1196171" ref_url="https://bugzilla.suse.com/1196171" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25235" ref_url="https://www.suse.com/security/cve/CVE-2022-25235/" source="CVE"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="CVE-2022-25313" ref_url="https://www.suse.com/security/cve/CVE-2022-25313/" source="CVE"/>
		<reference ref_id="CVE-2022-25314" ref_url="https://www.suse.com/security/cve/CVE-2022-25314/" source="CVE"/>
		<reference ref_id="CVE-2022-25315" ref_url="https://www.suse.com/security/cve/CVE-2022-25315/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010357.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:
  
- CVE-2022-25236: Fixed possible namespace-separator characters insertion into namespace URIs (bsc#1196025).
- CVE-2022-25235: Fixed UTF-8 character validation in a certain context (bsc#1196026).
- CVE-2022-25313: Fixed stack exhaustion in build_model() via uncontrolled recursion (bsc#1196168).
- CVE-2022-25314: Fixed integer overflow in copyString (bsc#1196169).
- CVE-2022-25315: Fixed integer overflow in storeRawNames (bsc#1196171).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196026">SUSE bug 1196026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196168">SUSE bug 1196168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196169">SUSE bug 1196169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196171">SUSE bug 1196171</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25235/">CVE-2022-25235</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-25313/">CVE-2022-25313</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25314/">CVE-2022-25314</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25315/">CVE-2022-25315</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669807" comment="expat-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669808" comment="libexpat-devel-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669809" comment="libexpat1-2.2.5-3.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669165" comment="libexpat1-32bit-2.2.5-3.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111889" version="1" class="patch">
	<metadata>
		<title>Security update for nodejs14 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1191962" ref_url="https://bugzilla.suse.com/1191962" source="BUGZILLA"/>
		<reference ref_id="1191963" ref_url="https://bugzilla.suse.com/1191963" source="BUGZILLA"/>
		<reference ref_id="1192153" ref_url="https://bugzilla.suse.com/1192153" source="BUGZILLA"/>
		<reference ref_id="1192154" ref_url="https://bugzilla.suse.com/1192154" source="BUGZILLA"/>
		<reference ref_id="1192696" ref_url="https://bugzilla.suse.com/1192696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23343" ref_url="https://www.suse.com/security/cve/CVE-2021-23343/" source="CVE"/>
		<reference ref_id="CVE-2021-32803" ref_url="https://www.suse.com/security/cve/CVE-2021-32803/" source="CVE"/>
		<reference ref_id="CVE-2021-32804" ref_url="https://www.suse.com/security/cve/CVE-2021-32804/" source="CVE"/>
		<reference ref_id="CVE-2021-3807" ref_url="https://www.suse.com/security/cve/CVE-2021-3807/" source="CVE"/>
		<reference ref_id="CVE-2021-3918" ref_url="https://www.suse.com/security/cve/CVE-2021-3918/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010355.html" source="SUSE-SU"/>
		<description>
This update for nodejs14 fixes the following issues:

- CVE-2021-23343: Fixed ReDoS via splitDeviceRe, splitTailRe and splitPathRe (bsc#1192153).
- CVE-2021-32803: Fixed insufficient symlink protection in node-tar allowing arbitrary file creation and overwrite (bsc#1191963).
- CVE-2021-32804: Fixed insufficient absolute path sanitization in node-tar allowing arbitrary file creation and overwrite (bsc#1191962).
- CVE-2021-3918: Fixed improper controlled modification of object prototype attributes in json-schema (bsc#1192696).
- CVE-2021-3807: Fixed regular expression denial of service (ReDoS) matching ANSI escape codes in node-ansi-regex (bsc#1192154).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191962">SUSE bug 1191962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191963">SUSE bug 1191963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192153">SUSE bug 1192153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192154">SUSE bug 1192154</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192696">SUSE bug 1192696</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23343/">CVE-2021-23343</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32803/">CVE-2021-32803</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32804/">CVE-2021-32804</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3807/">CVE-2021-3807</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3918/">CVE-2021-3918</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670768" comment="nodejs14-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670769" comment="nodejs14-devel-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669196" comment="nodejs14-docs-14.19.0-15.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670770" comment="npm14-14.19.0-15.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111890" version="1" class="patch">
	<metadata>
		<title>Security update for wpa_supplicant (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1194732" ref_url="https://bugzilla.suse.com/1194732" source="BUGZILLA"/>
		<reference ref_id="1194733" ref_url="https://bugzilla.suse.com/1194733" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23303" ref_url="https://www.suse.com/security/cve/CVE-2022-23303/" source="CVE"/>
		<reference ref_id="CVE-2022-23304" ref_url="https://www.suse.com/security/cve/CVE-2022-23304/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010363.html" source="SUSE-SU"/>
		<description>
This update for wpa_supplicant fixes the following issues:
	  
- CVE-2022-23303: Fixed side-channel attacks in SAE (bsc#1194732).
- CVE-2022-23304: Fixed side-channel attacks in EAP-pwd (bsc#1194733).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194732">SUSE bug 1194732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194733">SUSE bug 1194733</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23303/">CVE-2022-23303</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23304/">CVE-2022-23304</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669257" comment="wpa_supplicant-2.9-4.33.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111891" version="1" class="patch">
	<metadata>
		<title>Security update for kernel-firmware (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195786" ref_url="https://bugzilla.suse.com/1195786" source="BUGZILLA"/>
		<reference ref_id="1196333" ref_url="https://bugzilla.suse.com/1196333" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0066" ref_url="https://www.suse.com/security/cve/CVE-2021-0066/" source="CVE"/>
		<reference ref_id="CVE-2021-0072" ref_url="https://www.suse.com/security/cve/CVE-2021-0072/" source="CVE"/>
		<reference ref_id="CVE-2021-0076" ref_url="https://www.suse.com/security/cve/CVE-2021-0076/" source="CVE"/>
		<reference ref_id="CVE-2021-0161" ref_url="https://www.suse.com/security/cve/CVE-2021-0161/" source="CVE"/>
		<reference ref_id="CVE-2021-0164" ref_url="https://www.suse.com/security/cve/CVE-2021-0164/" source="CVE"/>
		<reference ref_id="CVE-2021-0165" ref_url="https://www.suse.com/security/cve/CVE-2021-0165/" source="CVE"/>
		<reference ref_id="CVE-2021-0166" ref_url="https://www.suse.com/security/cve/CVE-2021-0166/" source="CVE"/>
		<reference ref_id="CVE-2021-0168" ref_url="https://www.suse.com/security/cve/CVE-2021-0168/" source="CVE"/>
		<reference ref_id="CVE-2021-0170" ref_url="https://www.suse.com/security/cve/CVE-2021-0170/" source="CVE"/>
		<reference ref_id="CVE-2021-0172" ref_url="https://www.suse.com/security/cve/CVE-2021-0172/" source="CVE"/>
		<reference ref_id="CVE-2021-0173" ref_url="https://www.suse.com/security/cve/CVE-2021-0173/" source="CVE"/>
		<reference ref_id="CVE-2021-0174" ref_url="https://www.suse.com/security/cve/CVE-2021-0174/" source="CVE"/>
		<reference ref_id="CVE-2021-0175" ref_url="https://www.suse.com/security/cve/CVE-2021-0175/" source="CVE"/>
		<reference ref_id="CVE-2021-0176" ref_url="https://www.suse.com/security/cve/CVE-2021-0176/" source="CVE"/>
		<reference ref_id="CVE-2021-0183" ref_url="https://www.suse.com/security/cve/CVE-2021-0183/" source="CVE"/>
		<reference ref_id="CVE-2021-33139" ref_url="https://www.suse.com/security/cve/CVE-2021-33139/" source="CVE"/>
		<reference ref_id="CVE-2021-33155" ref_url="https://www.suse.com/security/cve/CVE-2021-33155/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0721-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010356.html" source="SUSE-SU"/>
		<description>
This update for kernel-firmware fixes the following issues:

- Update Intel Wireless firmware for 9xxx (CVE-2021-0161,
  CVE-2021-0164,CVE-2021-0165,CVE-2021-0066,CVE-2021-0166,
  CVE-2021-0168,CVE-2021-0170,CVE-2021-0172,CVE-2021-0173,
  CVE-2021-0174,CVE-2021-0175,CVE-2021-0076,CVE-2021-0176,
  CVE-2021-0183,CVE-2021-0072,INTEL-SA-00539,bsc#1196333):
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
  iwlwifi-9000-pu-b0-jf-b0-46.ucode
- Update Intel Bluetooth firmware (CVE-2021-33139,CVE-2021-33155,
  INTEL-SA-00604,bsc#1195786)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195786">SUSE bug 1195786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196333">SUSE bug 1196333</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0066/">CVE-2021-0066</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0072/">CVE-2021-0072</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0076/">CVE-2021-0076</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0161/">CVE-2021-0161</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0164/">CVE-2021-0164</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0165/">CVE-2021-0165</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0166/">CVE-2021-0166</cve>
	<cve impact="important" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0168/">CVE-2021-0168</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-0170/">CVE-2021-0170</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0172/">CVE-2021-0172</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0173/">CVE-2021-0173</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0174/">CVE-2021-0174</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0175/">CVE-2021-0175</cve>
	<cve impact="important" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0176/">CVE-2021-0176</cve>
	<cve impact="important" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0183/">CVE-2021-0183</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33139/">CVE-2021-33139</cve>
	<cve impact="moderate" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-33155/">CVE-2021-33155</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669993" comment="kernel-firmware-20200107-3.26.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669994" comment="ucode-amd-20200107-3.26.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111892" version="1" class="patch">
	<metadata>
		<title>Security update for wireshark (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195866" ref_url="https://bugzilla.suse.com/1195866" source="BUGZILLA"/>
		<reference ref_id="1195867" ref_url="https://bugzilla.suse.com/1195867" source="BUGZILLA"/>
		<reference ref_id="1195868" ref_url="https://bugzilla.suse.com/1195868" source="BUGZILLA"/>
		<reference ref_id="1195869" ref_url="https://bugzilla.suse.com/1195869" source="BUGZILLA"/>
		<reference ref_id="1195870" ref_url="https://bugzilla.suse.com/1195870" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0581" ref_url="https://www.suse.com/security/cve/CVE-2022-0581/" source="CVE"/>
		<reference ref_id="CVE-2022-0582" ref_url="https://www.suse.com/security/cve/CVE-2022-0582/" source="CVE"/>
		<reference ref_id="CVE-2022-0583" ref_url="https://www.suse.com/security/cve/CVE-2022-0583/" source="CVE"/>
		<reference ref_id="CVE-2022-0585" ref_url="https://www.suse.com/security/cve/CVE-2022-0585/" source="CVE"/>
		<reference ref_id="CVE-2022-0586" ref_url="https://www.suse.com/security/cve/CVE-2022-0586/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010360.html" source="SUSE-SU"/>
		<description>
This update for wireshark fixes the following issues:

Update to Wireshark 3.6.2:

- CVE-2022-0586: RTMPT dissector infinite loop (bsc#1195866)
- CVE-2022-0585: Large loops in multiple dissectors (bsc#1195867)
- CVE-2022-0583: PVFS dissector crash (bsc#1195868)
- CVE-2022-0582: CSN.1 dissector crash (bsc#1195869)
- CVE-2022-0581: CMS dissector crash (bsc#1195870)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195866">SUSE bug 1195866</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195867">SUSE bug 1195867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195868">SUSE bug 1195868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195869">SUSE bug 1195869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195870">SUSE bug 1195870</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0581/">CVE-2022-0581</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0582/">CVE-2022-0582</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0583/">CVE-2022-0583</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0585/">CVE-2022-0585</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0586/">CVE-2022-0586</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670086" comment="libwireshark15-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670087" comment="libwiretap12-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670088" comment="libwsutil13-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670089" comment="wireshark-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670090" comment="wireshark-devel-3.6.2-3.71.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670091" comment="wireshark-ui-qt-3.6.2-3.71.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111893" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010351.html" source="SUSE-SU"/>
		<description>
This update for go1.17 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50978 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50701 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50687 cmd/go: do not treat branches with semantic-version names as releases
- go#50942 cmd/asm: 'compile: loop' compiler bug?
- go#50867 cmd/compile: incorrect use of CMN on arm64
- go#50812 cmd/go: remove bitbucket VCS probing
- go#50781 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50722 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50683 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50586 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50297 cmd/link: does not set section type of .init_array correctly
- go#50246 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670771" comment="go1.17-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670772" comment="go1.17-doc-1.17.7-1.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669590" comment="go1.17-race-1.17.7-1.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111894" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1195834" ref_url="https://bugzilla.suse.com/1195834" source="BUGZILLA"/>
		<reference ref_id="1195835" ref_url="https://bugzilla.suse.com/1195835" source="BUGZILLA"/>
		<reference ref_id="1195838" ref_url="https://bugzilla.suse.com/1195838" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23772" ref_url="https://www.suse.com/security/cve/CVE-2022-23772/" source="CVE"/>
		<reference ref_id="CVE-2022-23773" ref_url="https://www.suse.com/security/cve/CVE-2022-23773/" source="CVE"/>
		<reference ref_id="CVE-2022-23806" ref_url="https://www.suse.com/security/cve/CVE-2022-23806/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0724-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010358.html" source="SUSE-SU"/>
		<description>
This update for go1.16 fixes the following issues:

- CVE-2022-23806: Fixed incorrect returned value in crypto/elliptic IsOnCurve (bsc#1195838).
- CVE-2022-23772: Fixed overflow in Rat.SetString in math/big can lead to uncontrolled memory consumption (bsc#1195835).
- CVE-2022-23773: Fixed incorrect access control in cmd/go (bsc#1195834).

The following non-security bugs were fixed:

- go#50977 crypto/elliptic: IsOnCurve returns true for invalid field elements
- go#50700 math/big: Rat.SetString may consume large amount of RAM and crash
- go#50686 cmd/go: do not treat branches with semantic-version names as releases
- go#50866 cmd/compile: incorrect use of CMN on arm64
- go#50832 runtime/race: NoRaceMutexPureHappensBefore failures
- go#50811 cmd/go: remove bitbucket VCS probing
- go#50780 runtime: incorrect frame information in traceback traversal may hang the process.
- go#50721 debug/pe: reading debug_info section of PE files that use the DWARF5 form DW_FORM_line_strp causes error
- go#50682 cmd/compile: MOVWreg missing sign-extension following a Copy from a floating-point LoadReg
- go#50645 testing: surprising interaction of subtests with TempDir
- go#50585 net/http/httptest: add fipsonly compliant certificate in for NewTLSServer(), for dev.boringcrypto branch
- go#50245 runtime: intermittent os/exec.Command.Start() Hang on Darwin in Presence of 'plugin' Package
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195834">SUSE bug 1195834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195835">SUSE bug 1195835</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195838">SUSE bug 1195838</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23772/">CVE-2022-23772</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2022-23773/">CVE-2022-23773</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-23806/">CVE-2022-23806</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670773" comment="go1.16-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670774" comment="go1.16-doc-1.16.14-1.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669587" comment="go1.16-race-1.16.14-1.43.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111895" version="1" class="patch">
	<metadata>
		<title>Security update for mariadb (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195325" ref_url="https://bugzilla.suse.com/1195325" source="BUGZILLA"/>
		<reference ref_id="1195334" ref_url="https://bugzilla.suse.com/1195334" source="BUGZILLA"/>
		<reference ref_id="1195339" ref_url="https://bugzilla.suse.com/1195339" source="BUGZILLA"/>
		<reference ref_id="1196016" ref_url="https://bugzilla.suse.com/1196016" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-46657" ref_url="https://www.suse.com/security/cve/CVE-2021-46657/" source="CVE"/>
		<reference ref_id="CVE-2021-46658" ref_url="https://www.suse.com/security/cve/CVE-2021-46658/" source="CVE"/>
		<reference ref_id="CVE-2021-46659" ref_url="https://www.suse.com/security/cve/CVE-2021-46659/" source="CVE"/>
		<reference ref_id="CVE-2021-46661" ref_url="https://www.suse.com/security/cve/CVE-2021-46661/" source="CVE"/>
		<reference ref_id="CVE-2021-46663" ref_url="https://www.suse.com/security/cve/CVE-2021-46663/" source="CVE"/>
		<reference ref_id="CVE-2021-46664" ref_url="https://www.suse.com/security/cve/CVE-2021-46664/" source="CVE"/>
		<reference ref_id="CVE-2021-46665" ref_url="https://www.suse.com/security/cve/CVE-2021-46665/" source="CVE"/>
		<reference ref_id="CVE-2021-46668" ref_url="https://www.suse.com/security/cve/CVE-2021-46668/" source="CVE"/>
		<reference ref_id="CVE-2022-24048" ref_url="https://www.suse.com/security/cve/CVE-2022-24048/" source="CVE"/>
		<reference ref_id="CVE-2022-24050" ref_url="https://www.suse.com/security/cve/CVE-2022-24050/" source="CVE"/>
		<reference ref_id="CVE-2022-24051" ref_url="https://www.suse.com/security/cve/CVE-2022-24051/" source="CVE"/>
		<reference ref_id="CVE-2022-24052" ref_url="https://www.suse.com/security/cve/CVE-2022-24052/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010362.html" source="SUSE-SU"/>
		<description>
This update for mariadb fixes the following issues:

- Update to 10.4.24 (bsc#1196016):
    * 10.4.24: CVE-2021-46665
             CVE-2021-46664
             CVE-2021-46661
             CVE-2021-46668
             CVE-2021-46663
    * 10.4.23: CVE-2022-24052
             CVE-2022-24051
             CVE-2022-24050
             CVE-2022-24048
             CVE-2021-46659, bsc#1195339
	     
- The following issues have already been fixed in this package but weren't
  previously mentioned in the changes file:
  CVE-2021-46658, bsc#1195334
  CVE-2021-46657, bsc#1195325
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195325">SUSE bug 1195325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195334">SUSE bug 1195334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195339">SUSE bug 1195339</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196016">SUSE bug 1196016</bugzilla>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46657/">CVE-2021-46657</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46658/">CVE-2021-46658</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-46659/">CVE-2021-46659</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46661/">CVE-2021-46661</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46663/">CVE-2021-46663</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46664/">CVE-2021-46664</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-46665/">CVE-2021-46665</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-46668/">CVE-2021-46668</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24048/">CVE-2022-24048</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24050/">CVE-2022-24050</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24051/">CVE-2022-24051</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-24052/">CVE-2022-24052</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670775" comment="libmariadbd-devel-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670776" comment="libmariadbd19-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670777" comment="mariadb-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670778" comment="mariadb-client-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669774" comment="mariadb-errormessages-10.4.24-3.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670779" comment="mariadb-tools-10.4.24-3.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111896" version="1" class="patch">
	<metadata>
		<title>Security update for zsh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1163882" ref_url="https://bugzilla.suse.com/1163882" source="BUGZILLA"/>
		<reference ref_id="1196435" ref_url="https://bugzilla.suse.com/1196435" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-20044" ref_url="https://www.suse.com/security/cve/CVE-2019-20044/" source="CVE"/>
		<reference ref_id="CVE-2021-45444" ref_url="https://www.suse.com/security/cve/CVE-2021-45444/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010365.html" source="SUSE-SU"/>
		<description>
This update for zsh fixes the following issues:

- CVE-2021-45444: Fixed a vulnerability where arbitrary shell commands could be 
  executed related to prompt expansion (bsc#1196435).
- CVE-2019-20044: Fixed a vulnerability where shell privileges would not be
  properly dropped when unsetting the PRIVILEGED option (bsc#1163882).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1163882">SUSE bug 1163882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196435">SUSE bug 1196435</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-20044/">CVE-2019-20044</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45444/">CVE-2021-45444</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670523" comment="zsh-5.6-7.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111897" version="1" class="patch">
	<metadata>
		<title>Security update for vim (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190533" ref_url="https://bugzilla.suse.com/1190533" source="BUGZILLA"/>
		<reference ref_id="1190570" ref_url="https://bugzilla.suse.com/1190570" source="BUGZILLA"/>
		<reference ref_id="1191893" ref_url="https://bugzilla.suse.com/1191893" source="BUGZILLA"/>
		<reference ref_id="1192478" ref_url="https://bugzilla.suse.com/1192478" source="BUGZILLA"/>
		<reference ref_id="1192481" ref_url="https://bugzilla.suse.com/1192481" source="BUGZILLA"/>
		<reference ref_id="1193294" ref_url="https://bugzilla.suse.com/1193294" source="BUGZILLA"/>
		<reference ref_id="1193298" ref_url="https://bugzilla.suse.com/1193298" source="BUGZILLA"/>
		<reference ref_id="1194216" ref_url="https://bugzilla.suse.com/1194216" source="BUGZILLA"/>
		<reference ref_id="1194556" ref_url="https://bugzilla.suse.com/1194556" source="BUGZILLA"/>
		<reference ref_id="1195004" ref_url="https://bugzilla.suse.com/1195004" source="BUGZILLA"/>
		<reference ref_id="1195066" ref_url="https://bugzilla.suse.com/1195066" source="BUGZILLA"/>
		<reference ref_id="1195126" ref_url="https://bugzilla.suse.com/1195126" source="BUGZILLA"/>
		<reference ref_id="1195202" ref_url="https://bugzilla.suse.com/1195202" source="BUGZILLA"/>
		<reference ref_id="1195356" ref_url="https://bugzilla.suse.com/1195356" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3778" ref_url="https://www.suse.com/security/cve/CVE-2021-3778/" source="CVE"/>
		<reference ref_id="CVE-2021-3796" ref_url="https://www.suse.com/security/cve/CVE-2021-3796/" source="CVE"/>
		<reference ref_id="CVE-2021-3872" ref_url="https://www.suse.com/security/cve/CVE-2021-3872/" source="CVE"/>
		<reference ref_id="CVE-2021-3927" ref_url="https://www.suse.com/security/cve/CVE-2021-3927/" source="CVE"/>
		<reference ref_id="CVE-2021-3928" ref_url="https://www.suse.com/security/cve/CVE-2021-3928/" source="CVE"/>
		<reference ref_id="CVE-2021-3984" ref_url="https://www.suse.com/security/cve/CVE-2021-3984/" source="CVE"/>
		<reference ref_id="CVE-2021-4019" ref_url="https://www.suse.com/security/cve/CVE-2021-4019/" source="CVE"/>
		<reference ref_id="CVE-2021-4193" ref_url="https://www.suse.com/security/cve/CVE-2021-4193/" source="CVE"/>
		<reference ref_id="CVE-2021-46059" ref_url="https://www.suse.com/security/cve/CVE-2021-46059/" source="CVE"/>
		<reference ref_id="CVE-2022-0318" ref_url="https://www.suse.com/security/cve/CVE-2022-0318/" source="CVE"/>
		<reference ref_id="CVE-2022-0319" ref_url="https://www.suse.com/security/cve/CVE-2022-0319/" source="CVE"/>
		<reference ref_id="CVE-2022-0351" ref_url="https://www.suse.com/security/cve/CVE-2022-0351/" source="CVE"/>
		<reference ref_id="CVE-2022-0361" ref_url="https://www.suse.com/security/cve/CVE-2022-0361/" source="CVE"/>
		<reference ref_id="CVE-2022-0413" ref_url="https://www.suse.com/security/cve/CVE-2022-0413/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010366.html" source="SUSE-SU"/>
		<description>
This update for vim fixes the following issues:

- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-04"/>
	<updated date="2022-03-04"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190533">SUSE bug 1190533</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190570">SUSE bug 1190570</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191893">SUSE bug 1191893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192478">SUSE bug 1192478</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192481">SUSE bug 1192481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193294">SUSE bug 1193294</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193298">SUSE bug 1193298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194216">SUSE bug 1194216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194556">SUSE bug 1194556</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195004">SUSE bug 1195004</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195066">SUSE bug 1195066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195126">SUSE bug 1195126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195202">SUSE bug 1195202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195356">SUSE bug 1195356</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3778/">CVE-2021-3778</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3796/">CVE-2021-3796</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3872/">CVE-2021-3872</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3927/">CVE-2021-3927</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3928/">CVE-2021-3928</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3984/">CVE-2021-3984</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4019/">CVE-2021-4019</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-4193/">CVE-2021-4193</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-46059/">CVE-2021-46059</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0318/">CVE-2022-0318</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0319/">CVE-2022-0319</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-0351/">CVE-2022-0351</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-0361/">CVE-2022-0361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0413/">CVE-2022-0413</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670092" comment="gvim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670093" comment="vim-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669882" comment="vim-data-8.0.1568-5.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669883" comment="vim-data-common-8.0.1568-5.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111898" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1189126" ref_url="https://bugzilla.suse.com/1189126" source="BUGZILLA"/>
		<reference ref_id="1191580" ref_url="https://bugzilla.suse.com/1191580" source="BUGZILLA"/>
		<reference ref_id="1192483" ref_url="https://bugzilla.suse.com/1192483" source="BUGZILLA"/>
		<reference ref_id="1194516" ref_url="https://bugzilla.suse.com/1194516" source="BUGZILLA"/>
		<reference ref_id="1195254" ref_url="https://bugzilla.suse.com/1195254" source="BUGZILLA"/>
		<reference ref_id="1195286" ref_url="https://bugzilla.suse.com/1195286" source="BUGZILLA"/>
		<reference ref_id="1195516" ref_url="https://bugzilla.suse.com/1195516" source="BUGZILLA"/>
		<reference ref_id="1195543" ref_url="https://bugzilla.suse.com/1195543" source="BUGZILLA"/>
		<reference ref_id="1195612" ref_url="https://bugzilla.suse.com/1195612" source="BUGZILLA"/>
		<reference ref_id="1195701" ref_url="https://bugzilla.suse.com/1195701" source="BUGZILLA"/>
		<reference ref_id="1195897" ref_url="https://bugzilla.suse.com/1195897" source="BUGZILLA"/>
		<reference ref_id="1195905" ref_url="https://bugzilla.suse.com/1195905" source="BUGZILLA"/>
		<reference ref_id="1195908" ref_url="https://bugzilla.suse.com/1195908" source="BUGZILLA"/>
		<reference ref_id="1195947" ref_url="https://bugzilla.suse.com/1195947" source="BUGZILLA"/>
		<reference ref_id="1195949" ref_url="https://bugzilla.suse.com/1195949" source="BUGZILLA"/>
		<reference ref_id="1195987" ref_url="https://bugzilla.suse.com/1195987" source="BUGZILLA"/>
		<reference ref_id="1195995" ref_url="https://bugzilla.suse.com/1195995" source="BUGZILLA"/>
		<reference ref_id="1196079" ref_url="https://bugzilla.suse.com/1196079" source="BUGZILLA"/>
		<reference ref_id="1196095" ref_url="https://bugzilla.suse.com/1196095" source="BUGZILLA"/>
		<reference ref_id="1196132" ref_url="https://bugzilla.suse.com/1196132" source="BUGZILLA"/>
		<reference ref_id="1196155" ref_url="https://bugzilla.suse.com/1196155" source="BUGZILLA"/>
		<reference ref_id="1196235" ref_url="https://bugzilla.suse.com/1196235" source="BUGZILLA"/>
		<reference ref_id="1196584" ref_url="https://bugzilla.suse.com/1196584" source="BUGZILLA"/>
		<reference ref_id="1196601" ref_url="https://bugzilla.suse.com/1196601" source="BUGZILLA"/>
		<reference ref_id="1196612" ref_url="https://bugzilla.suse.com/1196612" source="BUGZILLA"/>
		<reference ref_id="1196776" ref_url="https://bugzilla.suse.com/1196776" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44879" ref_url="https://www.suse.com/security/cve/CVE-2021-44879/" source="CVE"/>
		<reference ref_id="CVE-2022-0001" ref_url="https://www.suse.com/security/cve/CVE-2022-0001/" source="CVE"/>
		<reference ref_id="CVE-2022-0002" ref_url="https://www.suse.com/security/cve/CVE-2022-0002/" source="CVE"/>
		<reference ref_id="CVE-2022-0487" ref_url="https://www.suse.com/security/cve/CVE-2022-0487/" source="CVE"/>
		<reference ref_id="CVE-2022-0492" ref_url="https://www.suse.com/security/cve/CVE-2022-0492/" source="CVE"/>
		<reference ref_id="CVE-2022-0516" ref_url="https://www.suse.com/security/cve/CVE-2022-0516/" source="CVE"/>
		<reference ref_id="CVE-2022-0617" ref_url="https://www.suse.com/security/cve/CVE-2022-0617/" source="CVE"/>
		<reference ref_id="CVE-2022-0644" ref_url="https://www.suse.com/security/cve/CVE-2022-0644/" source="CVE"/>
		<reference ref_id="CVE-2022-0847" ref_url="https://www.suse.com/security/cve/CVE-2022-0847/" source="CVE"/>
		<reference ref_id="CVE-2022-24448" ref_url="https://www.suse.com/security/cve/CVE-2022-24448/" source="CVE"/>
		<reference ref_id="CVE-2022-24958" ref_url="https://www.suse.com/security/cve/CVE-2022-24958/" source="CVE"/>
		<reference ref_id="CVE-2022-24959" ref_url="https://www.suse.com/security/cve/CVE-2022-24959/" source="CVE"/>
		<reference ref_id="CVE-2022-25258" ref_url="https://www.suse.com/security/cve/CVE-2022-25258/" source="CVE"/>
		<reference ref_id="CVE-2022-25375" ref_url="https://www.suse.com/security/cve/CVE-2022-25375/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010392.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


Transient execution side-channel attacks attacking the Branch History Buffer (BHB),
named 'Branch Target Injection' and 'Intra-Mode Branch History Injection' are now mitigated.

The following security bugs were fixed:

- CVE-2022-0001: Fixed Branch History Injection vulnerability (bsc#1191580).
- CVE-2022-0002: Fixed Intra-Mode Branch Target Injection vulnerability (bsc#1191580).
- CVE-2022-0847: Fixed a vulnerability were a local attackers could overwrite data in arbitrary (read-only) files (bsc#1196584).
- CVE-2022-0617: Fixed a null pointer dereference in UDF file system functionality. A local user could crash the system by triggering udf_file_write_iter() via a malicious UDF image. (bsc#1196079)
- CVE-2022-0644: Fixed a denial of service by a local user. A assertion failure could be triggered in kernel_read_file_from_fd() (bsc#1196155).
- CVE-2021-44879: In gc_data_segment() in fs/f2fs/gc.c, special files were not considered, which lead to a move_data_page NULL pointer dereference (bsc#1195987).
- CVE-2022-24959: Fixed a memory leak in yam_siocdevprivate() in drivers/net/hamradio/yam.c (bsc#1195897).
- CVE-2022-0487: A use-after-free vulnerability was found in rtsx_usb_ms_drv_remove() in drivers/memstick/host/rtsx_usb_ms.c (bsc#1194516).
- CVE-2022-0492: Fixed a privilege escalation related to cgroups v1 release_agent feature, which allowed bypassing namespace isolation unexpectedly (bsc#1195543).
- CVE-2022-24448: Fixed an issue in fs/nfs/dir.c. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should have occured, but the server instead returned uninitialized data in the file descriptor (bsc#1195612).
- CVE-2022-25375: The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory (bsc#1196235).
- CVE-2022-0516: Fixed missing check in ioctl related to KVM in s390 allows kernel memory read/write (bsc#1195516).
- CVE-2022-25258: The USB Gadget subsystem lacked certain validation of interface OS descriptor requests, which could have lead to memory corruption (bsc#1196096).
- CVE-2022-24958: drivers/usb/gadget/legacy/inode.c mishandled dev-&gt;buf release (bsc#1195905).

The following non-security bugs were fixed:

- btrfs: check for missing device in btrfs_trim_fs (bsc#1195701).
- gve: Add RX context (jsc#SLE-23652).
- gve: Add a jumbo-frame device option (jsc#SLE-23652).
- gve: Add consumed counts to ethtool stats (jsc#SLE-23652).
- gve: Add optional metadata descriptor type GVE_TXD_MTD (jsc#SLE-23652).
- gve: Correct order of processing device options (jsc#SLE-23652).
- gve: Fix GFP flags when allocing pages (jsc#SLE-23652).
- gve: Implement packet continuation for RX (jsc#SLE-23652).
- gve: Implement suspend/resume/shutdown (jsc#SLE-23652).
- gve: Move the irq db indexes out of the ntfy block struct (jsc#SLE-23652).
- gve: Recording rx queue before sending to napi (jsc#SLE-23652).
- gve: Update gve_free_queue_page_list signature (jsc#SLE-23652).
- gve: Use kvcalloc() instead of kvzalloc() (jsc#SLE-23652).
- gve: fix for null pointer dereference (jsc#SLE-23652).
- gve: fix the wrong AdminQ buffer queue index check (jsc#SLE-23652).
- gve: fix unmatched u64_stats_update_end() (jsc#SLE-23652).
- gve: remove memory barrier around seqno (jsc#SLE-23652).
- lib/iov_iter: initialize 'flags' in new pipe_buffer (bsc#1196584).
- net: tipc: validate domain record count on input (bsc#1195254).
- nfsd: allow delegation state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow lock state ids to be revoked and then freed (bsc#1192483).
- nfsd: allow open state ids to be revoked and then freed (bsc#1192483).
- nfsd: do not admin-revoke NSv4.0 state ids (bsc#1192483).
- nfsd: prepare for supporting admin-revocation of state (bsc#1192483).
- powerpc/pseries/ddw: Revert 'Extend upper limit for huge DMA window for persistent memory' (bsc#1195995 ltc#196394).
- scsi: lpfc: Fix pt2pt NVMe PRLI reject LOGO loop (bsc#1189126).
- scsi: target: iscsi: Fix cmd abort fabric stop race (bsc#1195286).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-08"/>
	<updated date="2022-03-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189126">SUSE bug 1189126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191580">SUSE bug 1191580</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192483">SUSE bug 1192483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194516">SUSE bug 1194516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195254">SUSE bug 1195254</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195286">SUSE bug 1195286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195516">SUSE bug 1195516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195543">SUSE bug 1195543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195612">SUSE bug 1195612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195701">SUSE bug 1195701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195897">SUSE bug 1195897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195905">SUSE bug 1195905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195908">SUSE bug 1195908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195947">SUSE bug 1195947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195949">SUSE bug 1195949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195987">SUSE bug 1195987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195995">SUSE bug 1195995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196079">SUSE bug 1196079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196095">SUSE bug 1196095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196132">SUSE bug 1196132</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196155">SUSE bug 1196155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196235">SUSE bug 1196235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196584">SUSE bug 1196584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196601">SUSE bug 1196601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196612">SUSE bug 1196612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196776">SUSE bug 1196776</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44879/">CVE-2021-44879</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0001/">CVE-2022-0001</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-0002/">CVE-2022-0002</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0487/">CVE-2022-0487</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0492/">CVE-2022-0492</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0516/">CVE-2022-0516</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0617/">CVE-2022-0617</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0644/">CVE-2022-0644</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-0847/">CVE-2022-0847</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-24448/">CVE-2022-24448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24958/">CVE-2022-24958</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-24959/">CVE-2022-24959</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25258/">CVE-2022-25258</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-25375/">CVE-2022-25375</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671680" comment="kernel-default-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671681" comment="kernel-default-base-5.3.18-24.107.1.9.50.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671682" comment="kernel-default-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671508" comment="kernel-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671509" comment="kernel-docs-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671510" comment="kernel-macros-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671683" comment="kernel-obs-build-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671530" comment="kernel-preempt-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671531" comment="kernel-preempt-devel-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671514" comment="kernel-source-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671684" comment="kernel-syms-5.3.18-24.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671685" comment="reiserfs-kmp-default-5.3.18-24.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111899" version="1" class="patch">
	<metadata>
		<title>Security update for libcaca (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1184751" ref_url="https://bugzilla.suse.com/1184751" source="BUGZILLA"/>
		<reference ref_id="1184752" ref_url="https://bugzilla.suse.com/1184752" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-30498" ref_url="https://www.suse.com/security/cve/CVE-2021-30498/" source="CVE"/>
		<reference ref_id="CVE-2021-30499" ref_url="https://www.suse.com/security/cve/CVE-2021-30499/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010405.html" source="SUSE-SU"/>
		<description>
This update for libcaca fixes the following issues:

- CVE-2021-30498, CVE-2021-30499: If an image has a size of 0x0, when exporting, no 
  data is written and space is allocated for the header only, not taking into
  account that sprintf appends a NUL byte (bsc#1184751, bsc#1184752).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184751">SUSE bug 1184751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184752">SUSE bug 1184752</bugzilla>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30498/">CVE-2021-30498</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30499/">CVE-2021-30499</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672259" comment="libcaca-devel-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672260" comment="libcaca0-0.99.beta19.git20171003-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672261" comment="libcaca0-plugins-0.99.beta19.git20171003-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111900" version="1" class="patch">
	<metadata>
		<title>Security update for tcpdump (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195825" ref_url="https://bugzilla.suse.com/1195825" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-16301" ref_url="https://www.suse.com/security/cve/CVE-2018-16301/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010403.html" source="SUSE-SU"/>
		<description>
This update for tcpdump fixes the following issues:

- CVE-2018-16301: Fixed segfault when handling large files (bsc#1195825).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1195825">SUSE bug 1195825</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2018-16301/">CVE-2018-16301</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009668005" comment="tcpdump-4.9.2-3.18.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111901" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196809" ref_url="https://bugzilla.suse.com/1196809" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26485" ref_url="https://www.suse.com/security/cve/CVE-2022-26485/" source="CVE"/>
		<reference ref_id="CVE-2022-26486" ref_url="https://www.suse.com/security/cve/CVE-2022-26486/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010407.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.6.1 ESR (bsc#1196809):

- CVE-2022-26485: Use-after-free in XSLT parameter processing
- CVE-2022-26486: Use-after-free in WebGPU IPC Framework
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-09"/>
	<updated date="2022-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196809">SUSE bug 1196809</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26485/">CVE-2022-26485</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-26486/">CVE-2022-26486</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672262" comment="MozillaFirefox-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672263" comment="MozillaFirefox-devel-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672264" comment="MozillaFirefox-translations-common-91.6.1-152.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672265" comment="MozillaFirefox-translations-other-91.6.1-152.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111902" version="1" class="patch">
	<metadata>
		<title>Security update for python-libxml2-python (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196490" ref_url="https://bugzilla.suse.com/1196490" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23308" ref_url="https://www.suse.com/security/cve/CVE-2022-23308/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010416.html" source="SUSE-SU"/>
		<description>
This update for python-libxml2-python fixes the following issues:

- CVE-2022-23308: Fixed a use-after-free of ID and IDREF attributes (bsc#1196490).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196490">SUSE bug 1196490</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2022-23308/">CVE-2022-23308</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009670524" comment="python2-libxml2-python-2.9.7-3.40.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009670525" comment="python3-libxml2-python-2.9.7-3.40.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111903" version="1" class="patch">
	<metadata>
		<title>Security update for python-lxml (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1118088" ref_url="https://bugzilla.suse.com/1118088" source="BUGZILLA"/>
		<reference ref_id="1179534" ref_url="https://bugzilla.suse.com/1179534" source="BUGZILLA"/>
		<reference ref_id="1184177" ref_url="https://bugzilla.suse.com/1184177" source="BUGZILLA"/>
		<reference ref_id="1193752" ref_url="https://bugzilla.suse.com/1193752" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-19787" ref_url="https://www.suse.com/security/cve/CVE-2018-19787/" source="CVE"/>
		<reference ref_id="CVE-2020-27783" ref_url="https://www.suse.com/security/cve/CVE-2020-27783/" source="CVE"/>
		<reference ref_id="CVE-2021-28957" ref_url="https://www.suse.com/security/cve/CVE-2021-28957/" source="CVE"/>
		<reference ref_id="CVE-2021-43818" ref_url="https://www.suse.com/security/cve/CVE-2021-43818/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010414.html" source="SUSE-SU"/>
		<description>
This update for python-lxml fixes the following issues:

- CVE-2018-19787: Fixed XSS vulnerability via unescaped URL (bsc#1118088).
- CVE-2021-28957: Fixed XSS vulnerability ia HTML5 attributes unescaped (bsc#1184177).
- CVE-2021-43818: Fixed XSS vulnerability via script content in SVG images using data URIs (bnc#1193752).
- CVE-2020-27783: Fixed mutation XSS with improper parser use (bnc#1179534).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1118088">SUSE bug 1118088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179534">SUSE bug 1179534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184177">SUSE bug 1184177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193752">SUSE bug 1193752</bugzilla>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2018-19787/">CVE-2018-19787</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-27783/">CVE-2020-27783</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-28957/">CVE-2021-28957</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-43818/">CVE-2021-43818</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672546" comment="python2-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672547" comment="python2-lxml-devel-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672548" comment="python3-lxml-4.7.1-3.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672549" comment="python3-lxml-devel-4.7.1-3.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111904" version="1" class="patch">
	<metadata>
		<title>Security update for openssh (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1190975" ref_url="https://bugzilla.suse.com/1190975" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41617" ref_url="https://www.suse.com/security/cve/CVE-2021-41617/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010415.html" source="SUSE-SU"/>
		<description>
This update for openssh fixes the following issues:

- CVE-2021-41617: Fixed a potential privilege escalation for non-default
  configuration settings (bsc#1190975).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-10"/>
	<updated date="2022-03-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190975">SUSE bug 1190975</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41617/">CVE-2021-41617</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672550" comment="openssh-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672551" comment="openssh-askpass-gnome-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672552" comment="openssh-fips-8.1p1-5.21.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672553" comment="openssh-helpers-8.1p1-5.21.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111905" version="1" class="patch">
	<metadata>
		<title>Security update for tomcat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195255" ref_url="https://bugzilla.suse.com/1195255" source="BUGZILLA"/>
		<reference ref_id="1196137" ref_url="https://bugzilla.suse.com/1196137" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23181" ref_url="https://www.suse.com/security/cve/CVE-2022-23181/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0818-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010428.html" source="SUSE-SU"/>
		<description>
This update for tomcat fixes the following issues:

Security issues fixed:

- CVE-2022-23181: Make calculation of session storage location more robust (bsc#1195255)
- Remove log4j (bsc#1196137) 
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195255">SUSE bug 1195255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196137">SUSE bug 1196137</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23181/">CVE-2022-23181</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671229" comment="tomcat-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671230" comment="tomcat-admin-webapps-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671231" comment="tomcat-el-3_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671232" comment="tomcat-jsp-2_3-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671233" comment="tomcat-lib-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671234" comment="tomcat-servlet-4_0-api-9.0.36-19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671235" comment="tomcat-webapps-9.0.36-19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111906" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaFirefox (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196900" ref_url="https://bugzilla.suse.com/1196900" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-26381" ref_url="https://www.suse.com/security/cve/CVE-2022-26381/" source="CVE"/>
		<reference ref_id="CVE-2022-26383" ref_url="https://www.suse.com/security/cve/CVE-2022-26383/" source="CVE"/>
		<reference ref_id="CVE-2022-26384" ref_url="https://www.suse.com/security/cve/CVE-2022-26384/" source="CVE"/>
		<reference ref_id="CVE-2022-26386" ref_url="https://www.suse.com/security/cve/CVE-2022-26386/" source="CVE"/>
		<reference ref_id="CVE-2022-26387" ref_url="https://www.suse.com/security/cve/CVE-2022-26387/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010433.html" source="SUSE-SU"/>
		<description>
This update for MozillaFirefox fixes the following issues:

Firefox Extended Support Release 91.7.0 ESR (bsc#1196900):

- CVE-2022-26383: Browser window spoof using fullscreen mode
- CVE-2022-26384: iframe allow-scripts sandbox bypass
- CVE-2022-26387: Time-of-check time-of-use bug when verifying add-on signatures
- CVE-2022-26381: Use-after-free in text reflows
- CVE-2022-26386: Temporary files downloaded to /tmp and accessible by other local users
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196900">SUSE bug 1196900</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26381/">CVE-2022-26381</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26383/">CVE-2022-26383</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26384/">CVE-2022-26384</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26386/">CVE-2022-26386</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2022-26387/">CVE-2022-26387</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672757" comment="MozillaFirefox-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672758" comment="MozillaFirefox-devel-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672759" comment="MozillaFirefox-translations-common-91.7.0-152.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672760" comment="MozillaFirefox-translations-other-91.7.0-152.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111907" version="1" class="patch">
	<metadata>
		<title>Security update for glibc (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1193625" ref_url="https://bugzilla.suse.com/1193625" source="BUGZILLA"/>
		<reference ref_id="1194640" ref_url="https://bugzilla.suse.com/1194640" source="BUGZILLA"/>
		<reference ref_id="1194768" ref_url="https://bugzilla.suse.com/1194768" source="BUGZILLA"/>
		<reference ref_id="1194770" ref_url="https://bugzilla.suse.com/1194770" source="BUGZILLA"/>
		<reference ref_id="1195560" ref_url="https://bugzilla.suse.com/1195560" source="BUGZILLA"/>
		<reference ref_id="CVE-2015-8985" ref_url="https://www.suse.com/security/cve/CVE-2015-8985/" source="CVE"/>
		<reference ref_id="CVE-2021-3999" ref_url="https://www.suse.com/security/cve/CVE-2021-3999/" source="CVE"/>
		<reference ref_id="CVE-2022-23218" ref_url="https://www.suse.com/security/cve/CVE-2022-23218/" source="CVE"/>
		<reference ref_id="CVE-2022-23219" ref_url="https://www.suse.com/security/cve/CVE-2022-23219/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010437.html" source="SUSE-SU"/>
		<description>

glibc was updated to fix the following issues:

Security issues fixed:

- CVE-2022-23219: Fixed Buffer overflow in sunrpc clnt_create for 'unix' (bsc#1194768)
- CVE-2022-23218: Buffer overflow in sunrpc svcunix_create (bsc#1194770)
- CVE-2021-3999: Fixed getcwd to set errno to ERANGE for size == 1 (bsc#1194640)
- CVE-2015-8985: Fixed Assertion failure in pop_fail_stack when executing a malformed regexp (bsc#1193625)

Also the following bug was fixed:

- Fix pthread_rwlock_try*lock stalls (bsc#1195560)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-14"/>
	<updated date="2022-03-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193625">SUSE bug 1193625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194640">SUSE bug 1194640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194768">SUSE bug 1194768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194770">SUSE bug 1194770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195560">SUSE bug 1195560</bugzilla>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2015-8985/">CVE-2015-8985</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3999/">CVE-2021-3999</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23218/">CVE-2022-23218</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2022-23219/">CVE-2022-23219</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669074" comment="glibc-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669025" comment="glibc-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669075" comment="glibc-devel-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669027" comment="glibc-devel-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669076" comment="glibc-devel-static-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669077" comment="glibc-extra-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669030" comment="glibc-i18ndata-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669031" comment="glibc-info-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669078" comment="glibc-locale-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669079" comment="glibc-locale-base-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669034" comment="glibc-locale-base-32bit-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669080" comment="glibc-profile-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669081" comment="glibc-utils-2.26-13.65.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009669082" comment="nscd-2.26-13.65.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111908" version="1" class="patch">
	<metadata>
		<title>Security update for libqt5-qtbase (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1195386" ref_url="https://bugzilla.suse.com/1195386" source="BUGZILLA"/>
		<reference ref_id="1196501" ref_url="https://bugzilla.suse.com/1196501" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-23853" ref_url="https://www.suse.com/security/cve/CVE-2022-23853/" source="CVE"/>
		<reference ref_id="CVE-2022-25255" ref_url="https://www.suse.com/security/cve/CVE-2022-25255/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010443.html" source="SUSE-SU"/>
		<description>
This update for libqt5-qtbase fixes the following issues:

- CVE-2022-23853, CVE-2022-25255: Avoid unintentionally using binaries from CWD
  (bsc#1195386, bsc#1196501).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1195386">SUSE bug 1195386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196501">SUSE bug 1196501</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-23853/">CVE-2022-23853</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25255/">CVE-2022-25255</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672920" comment="libQt5Concurrent-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672921" comment="libQt5Concurrent5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672922" comment="libQt5Core-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671974" comment="libQt5Core-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672923" comment="libQt5Core5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672924" comment="libQt5DBus-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671977" comment="libQt5DBus-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672925" comment="libQt5DBus5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672926" comment="libQt5Gui-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671980" comment="libQt5Gui-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672927" comment="libQt5Gui5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672928" comment="libQt5KmsSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671983" comment="libQt5KmsSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672929" comment="libQt5Network-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671985" comment="libQt5Network-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672930" comment="libQt5Network5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672931" comment="libQt5OpenGL-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671988" comment="libQt5OpenGL-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672932" comment="libQt5OpenGL5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672933" comment="libQt5OpenGLExtensions-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672934" comment="libQt5PlatformHeaders-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672935" comment="libQt5PlatformSupport-devel-static-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671992" comment="libQt5PlatformSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672936" comment="libQt5PrintSupport-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671994" comment="libQt5PrintSupport-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672937" comment="libQt5PrintSupport5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672938" comment="libQt5Sql-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671997" comment="libQt5Sql-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672939" comment="libQt5Sql5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672940" comment="libQt5Sql5-mysql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672941" comment="libQt5Sql5-postgresql-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672942" comment="libQt5Sql5-sqlite-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672943" comment="libQt5Sql5-unixODBC-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672944" comment="libQt5Test-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672001" comment="libQt5Test-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672945" comment="libQt5Test5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672946" comment="libQt5Widgets-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672004" comment="libQt5Widgets-private-headers-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672947" comment="libQt5Widgets5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672948" comment="libQt5Xml-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672949" comment="libQt5Xml5-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672950" comment="libqt5-qtbase-common-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672951" comment="libqt5-qtbase-devel-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672952" comment="libqt5-qtbase-platformtheme-gtk3-5.12.7-4.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672010" comment="libqt5-qtbase-private-headers-devel-5.12.7-4.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111909" version="1" class="patch">
	<metadata>
		<title>Security update for expat (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196025" ref_url="https://bugzilla.suse.com/1196025" source="BUGZILLA"/>
		<reference ref_id="1196784" ref_url="https://bugzilla.suse.com/1196784" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-25236" ref_url="https://www.suse.com/security/cve/CVE-2022-25236/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010445.html" source="SUSE-SU"/>
		<description>
This update for expat fixes the following issues:

- Fixed a regression caused by the patch for CVE-2022-25236 (bsc#1196784).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196025">SUSE bug 1196025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196784">SUSE bug 1196784</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2022-25236/">CVE-2022-25236</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009671245" comment="expat-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671246" comment="libexpat-devel-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671247" comment="libexpat1-2.2.5-3.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009671084" comment="libexpat1-32bit-2.2.5-3.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111910" version="1" class="patch">
	<metadata>
		<title>Security update for php7 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196252" ref_url="https://bugzilla.suse.com/1196252" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21708" ref_url="https://www.suse.com/security/cve/CVE-2021-21708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010446.html" source="SUSE-SU"/>
		<description>
This update for php7 fixes the following issues:

- CVE-2021-21708: Fixed a memory corruption issue when processing integers
  from an untrusted source (bsc#1196252).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196252">SUSE bug 1196252</bugzilla>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-21708/">CVE-2021-21708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672953" comment="apache2-mod_php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672954" comment="php7-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672955" comment="php7-bcmath-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672956" comment="php7-bz2-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672957" comment="php7-calendar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672958" comment="php7-ctype-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672959" comment="php7-curl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672960" comment="php7-dba-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672961" comment="php7-devel-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672962" comment="php7-dom-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672963" comment="php7-enchant-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672964" comment="php7-exif-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672965" comment="php7-fastcgi-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672966" comment="php7-fileinfo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672967" comment="php7-fpm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672968" comment="php7-ftp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672969" comment="php7-gd-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672970" comment="php7-gettext-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672971" comment="php7-gmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672972" comment="php7-iconv-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672973" comment="php7-intl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672974" comment="php7-json-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672975" comment="php7-ldap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672976" comment="php7-mbstring-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672977" comment="php7-mysql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672978" comment="php7-odbc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672979" comment="php7-opcache-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672980" comment="php7-openssl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672981" comment="php7-pcntl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672982" comment="php7-pdo-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672983" comment="php7-pgsql-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672984" comment="php7-phar-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672985" comment="php7-posix-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672986" comment="php7-readline-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672987" comment="php7-shmop-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672988" comment="php7-snmp-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672989" comment="php7-soap-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672990" comment="php7-sockets-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672991" comment="php7-sodium-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672992" comment="php7-sqlite-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672993" comment="php7-sysvmsg-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672994" comment="php7-sysvsem-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672995" comment="php7-sysvshm-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672996" comment="php7-tidy-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672997" comment="php7-tokenizer-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672998" comment="php7-xmlreader-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672999" comment="php7-xmlrpc-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673000" comment="php7-xmlwriter-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673001" comment="php7-xsl-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673002" comment="php7-zip-7.4.6-3.35.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673003" comment="php7-zlib-7.4.6-3.35.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111911" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_0_0 (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010450.html" source="SUSE-SU"/>
		<description>
This update for openssl-1_0_0 fixes the following issues:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-15"/>
	<updated date="2022-03-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672913" comment="libopenssl-1_0_0-devel-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672914" comment="libopenssl1_0_0-1.0.2p-3.49.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672915" comment="openssl-1_0_0-1.0.2p-3.49.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111912" version="1" class="patch">
	<metadata>
		<title>Security update for openssl-1_1  (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1182959" ref_url="https://bugzilla.suse.com/1182959" source="BUGZILLA"/>
		<reference ref_id="1195149" ref_url="https://bugzilla.suse.com/1195149" source="BUGZILLA"/>
		<reference ref_id="1195792" ref_url="https://bugzilla.suse.com/1195792" source="BUGZILLA"/>
		<reference ref_id="1195856" ref_url="https://bugzilla.suse.com/1195856" source="BUGZILLA"/>
		<reference ref_id="1196877" ref_url="https://bugzilla.suse.com/1196877" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-0778" ref_url="https://www.suse.com/security/cve/CVE-2022-0778/" source="CVE"/>
		<description>
This update for openssl-1_1 fixes the following issues:

openssl-1_1:

- CVE-2022-0778: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (bsc#1196877).
- Fix PAC pointer authentication in ARM (bsc#1195856)
- Pull libopenssl-1_1 when updating openssl-1_1 with the same version (bsc#1195792)
- FIPS: Fix function and reason error codes (bsc#1182959)
- Enable zlib compression support (bsc#1195149)
    
glibc:

- Resolve installation issue of `glibc-devel` in SUSE Linux Enterprise Micro 5.1
    
linux-glibc-devel:

- Resolve installation issue of `linux-kernel-headers` in SUSE Linux Enterprise Micro 5.1

libxcrypt:

- Resolve installation issue of `libxcrypt-devel` in SUSE Linux Enterprise Micro 5.1

zlib:

- Resolve installation issue of `zlib-devel` in SUSE Linux Enterprise Micro 5.1
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182959">SUSE bug 1182959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195149">SUSE bug 1195149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195792">SUSE bug 1195792</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195856">SUSE bug 1195856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1196877">SUSE bug 1196877</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2022-0778/">CVE-2022-0778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673296" comment="libminizip1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673301" comment="libopenssl-1_1-devel-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673302" comment="libopenssl1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673203" comment="libopenssl1_1-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673303" comment="libopenssl1_1-hmac-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673205" comment="libopenssl1_1-hmac-32bit-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673297" comment="libz1-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673208" comment="libz1-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673304" comment="linux-glibc-devel-5.3-3.2.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673298" comment="minizip-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673305" comment="openssl-1_1-1.1.1d-11.43.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673299" comment="zlib-devel-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673222" comment="zlib-devel-32bit-1.2.11-3.26.10 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673300" comment="zlib-devel-static-1.2.11-3.26.10 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111913" version="1" class="patch">
	<metadata>
		<title>Security update for stunnel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1181400" ref_url="https://bugzilla.suse.com/1181400" source="BUGZILLA"/>
		<reference ref_id="1182529" ref_url="https://bugzilla.suse.com/1182529" source="BUGZILLA"/>
		<reference ref_id="SUSE-SU-2022:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010458.html" source="SUSE-SU"/>
		<description>
This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

  * Security bugfixes
    - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529).
    - Fixed a double free with OpenSSL older than 1.1.0.
    - Added hardening to systemd service (bsc#1181400).
  * New features
    - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options.
    - Added support for the new SSL_set_options() values.
    - Added a bash completion script.
    - New 'sessionResume' service-level option to allow or disallow session resumption
    - Download fresh ca-certs.pem for each new release.
    - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers.
      This feature can be used to impersonate other software (e.g. web browsers).
    - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
    - Initial FIPS 3.0 support.
    - Client-side 'protocol = ldap' support
  * Bugfixes
    - Fixed a transfer() loop bug.
    - Fixed reloading configuration with 'systemctl reload stunnel.service'.
    - Fixed incorrect messages logged for OpenSSL errors.
    - Fixed 'redirect' with 'protocol'.  This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
    - Fixed a tiny memory leak in configuration file reload error handling.
    - Fixed engine initialization.
    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
    - Fix configuration reload when compression is used
    - Fix test suite fixed not to require external connectivity
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181400">SUSE bug 1181400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182529">SUSE bug 1182529</bugzilla>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673306" comment="stunnel-5.62-3.14.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111914" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-openjdk (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1193314" ref_url="https://bugzilla.suse.com/1193314" source="BUGZILLA"/>
		<reference ref_id="1193444" ref_url="https://bugzilla.suse.com/1193444" source="BUGZILLA"/>
		<reference ref_id="1193491" ref_url="https://bugzilla.suse.com/1193491" source="BUGZILLA"/>
		<reference ref_id="1194926" ref_url="https://bugzilla.suse.com/1194926" source="BUGZILLA"/>
		<reference ref_id="1194928" ref_url="https://bugzilla.suse.com/1194928" source="BUGZILLA"/>
		<reference ref_id="1194929" ref_url="https://bugzilla.suse.com/1194929" source="BUGZILLA"/>
		<reference ref_id="1194931" ref_url="https://bugzilla.suse.com/1194931" source="BUGZILLA"/>
		<reference ref_id="1194932" ref_url="https://bugzilla.suse.com/1194932" source="BUGZILLA"/>
		<reference ref_id="1194933" ref_url="https://bugzilla.suse.com/1194933" source="BUGZILLA"/>
		<reference ref_id="1194934" ref_url="https://bugzilla.suse.com/1194934" source="BUGZILLA"/>
		<reference ref_id="1194935" ref_url="https://bugzilla.suse.com/1194935" source="BUGZILLA"/>
		<reference ref_id="1194937" ref_url="https://bugzilla.suse.com/1194937" source="BUGZILLA"/>
		<reference ref_id="1194939" ref_url="https://bugzilla.suse.com/1194939" source="BUGZILLA"/>
		<reference ref_id="1194940" ref_url="https://bugzilla.suse.com/1194940" source="BUGZILLA"/>
		<reference ref_id="1194941" ref_url="https://bugzilla.suse.com/1194941" source="BUGZILLA"/>
		<reference ref_id="1195163" ref_url="https://bugzilla.suse.com/1195163" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21248" ref_url="https://www.suse.com/security/cve/CVE-2022-21248/" source="CVE"/>
		<reference ref_id="CVE-2022-21282" ref_url="https://www.suse.com/security/cve/CVE-2022-21282/" source="CVE"/>
		<reference ref_id="CVE-2022-21283" ref_url="https://www.suse.com/security/cve/CVE-2022-21283/" source="CVE"/>
		<reference ref_id="CVE-2022-21293" ref_url="https://www.suse.com/security/cve/CVE-2022-21293/" source="CVE"/>
		<reference ref_id="CVE-2022-21294" ref_url="https://www.suse.com/security/cve/CVE-2022-21294/" source="CVE"/>
		<reference ref_id="CVE-2022-21296" ref_url="https://www.suse.com/security/cve/CVE-2022-21296/" source="CVE"/>
		<reference ref_id="CVE-2022-21299" ref_url="https://www.suse.com/security/cve/CVE-2022-21299/" source="CVE"/>
		<reference ref_id="CVE-2022-21305" ref_url="https://www.suse.com/security/cve/CVE-2022-21305/" source="CVE"/>
		<reference ref_id="CVE-2022-21340" ref_url="https://www.suse.com/security/cve/CVE-2022-21340/" source="CVE"/>
		<reference ref_id="CVE-2022-21341" ref_url="https://www.suse.com/security/cve/CVE-2022-21341/" source="CVE"/>
		<reference ref_id="CVE-2022-21349" ref_url="https://www.suse.com/security/cve/CVE-2022-21349/" source="CVE"/>
		<reference ref_id="CVE-2022-21360" ref_url="https://www.suse.com/security/cve/CVE-2022-21360/" source="CVE"/>
		<reference ref_id="CVE-2022-21365" ref_url="https://www.suse.com/security/cve/CVE-2022-21365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010457.html" source="SUSE-SU"/>
		<description>
This update for java-1_8_0-openjdk fixes the following issues:

Update to version jdk8u322 (icedtea-3.22.0)

Including the following security fixes:

- CVE-2022-21248, bsc#1194926: Enhance cross VM serialization
- CVE-2022-21283, bsc#1194937: Better String matching
- CVE-2022-21293, bsc#1194935: Improve String constructions
- CVE-2022-21294, bsc#1194934: Enhance construction of Identity maps
- CVE-2022-21282, bsc#1194933: Better resolution of URIs
- CVE-2022-21296, bsc#1194932: Improve SAX Parser configuration management
- CVE-2022-21299, bsc#1194931: Improved scanning of XML entities
- CVE-2022-21305, bsc#1194939: Better array indexing
- CVE-2022-21340, bsc#1194940: Verify Jar Verification
- CVE-2022-21341, bsc#1194941: Improve serial forms for transport
- CVE-2022-21349: Improve Solaris font rendering
- CVE-2022-21360, bsc#1194929: Enhance BMP image support
- CVE-2022-21365, bsc#1194928: Enhanced BMP processing
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-16"/>
	<updated date="2022-03-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193314">SUSE bug 1193314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193444">SUSE bug 1193444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193491">SUSE bug 1193491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194926">SUSE bug 1194926</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194928">SUSE bug 1194928</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194929">SUSE bug 1194929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194931">SUSE bug 1194931</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194932">SUSE bug 1194932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194933">SUSE bug 1194933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194934">SUSE bug 1194934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194935">SUSE bug 1194935</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194937">SUSE bug 1194937</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194939">SUSE bug 1194939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194940">SUSE bug 1194940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194941">SUSE bug 1194941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1195163">SUSE bug 1195163</bugzilla>
	<cve impact="moderate" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21248/">CVE-2022-21248</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21282/">CVE-2022-21282</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21283/">CVE-2022-21283</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21293/">CVE-2022-21293</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21294/">CVE-2022-21294</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21296/">CVE-2022-21296</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21299/">CVE-2022-21299</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21305/">CVE-2022-21305</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21340/">CVE-2022-21340</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21341/">CVE-2022-21341</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21349/">CVE-2022-21349</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21360/">CVE-2022-21360</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21365/">CVE-2022-21365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009672645" comment="java-1_8_0-openjdk-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672646" comment="java-1_8_0-openjdk-demo-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672647" comment="java-1_8_0-openjdk-devel-1.8.0.322-3.64.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009672648" comment="java-1_8_0-openjdk-headless-1.8.0.322-3.64.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111915" version="1" class="patch">
	<metadata>
		<title>Security update for bind (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1197135" ref_url="https://bugzilla.suse.com/1197135" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25220" ref_url="https://www.suse.com/security/cve/CVE-2021-25220/" source="CVE"/>
		<reference ref_id="SUSE-SU-2022:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2022-March/010510.html" source="SUSE-SU"/>
		<description>
This update for bind fixes the following issues:

- CVE-2021-25220: Fixed a DNS cache poisoning vulnerability due to loose
  caching rules (bsc#1197135).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-03-24"/>
	<updated date="2022-03-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1197135">SUSE bug 1197135</bugzilla>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-25220/">CVE-2021-25220</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009673958" comment="bind-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673959" comment="bind-chrootenv-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673960" comment="bind-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673907" comment="bind-doc-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673961" comment="bind-utils-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673962" comment="libbind9-1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673963" comment="libdns1605-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673964" comment="libirs-devel-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673965" comment="libirs1601-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673966" comment="libisc1606-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673967" comment="libisccc1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673968" comment="libisccfg1600-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673969" comment="libns1604-9.16.6-150000.12.60.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009673917" comment="python3-bind-9.16.6-150000.12.60.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111916" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678579" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678579" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111917" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111918" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680364" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680365" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680366" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680367" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680368" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680364" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680365" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680366" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680367" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680368" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111919" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680369" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680370" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680371" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680372" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680369" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680370" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680371" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680372" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111920" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678596" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678596" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111921" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111922" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680505" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680506" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680507" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680508" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680509" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680505" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680506" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680507" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680508" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680509" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111923" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="OR">
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680510" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680511" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680512" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680513" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680510" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680511" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680512" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680513" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111924" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1172402" ref_url="https://bugzilla.suse.com/1172402" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12398" ref_url="https://www.suse.com/security/cve/CVE-2020-12398/" source="CVE"/>
		<reference ref_id="CVE-2020-12405" ref_url="https://www.suse.com/security/cve/CVE-2020-12405/" source="CVE"/>
		<reference ref_id="CVE-2020-12406" ref_url="https://www.suse.com/security/cve/CVE-2020-12406/" source="CVE"/>
		<reference ref_id="CVE-2020-12410" ref_url="https://www.suse.com/security/cve/CVE-2020-12410/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1591-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007108.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 68.9.0 (bsc#1172402)

- CVE-2020-12405: Fixed a use-after-free in SharedWorkerService.
- CVE-2020-12406: Fixed a JavaScript Type confusion with NativeTypes.
- CVE-2020-12410: Fixed multiple memory safety issues
- CVE-2020-12398: Fixed a potential information leak due to security downgrade 
  with IMAP STARTTLS
- Use a symbolic icon from branding internals
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172402">SUSE bug 1172402</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12398/">CVE-2020-12398</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12405/">CVE-2020-12405</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12406/">CVE-2020-12406</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12410/">CVE-2020-12410</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509067" comment="MozillaThunderbird-68.9.0-3.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509068" comment="MozillaThunderbird-translations-common-68.9.0-3.85.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509069" comment="MozillaThunderbird-translations-other-68.9.0-3.85.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111925" version="1" class="patch">
	<metadata>
		<title>Security update for libEMF (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1171496" ref_url="https://bugzilla.suse.com/1171496" source="BUGZILLA"/>
		<reference ref_id="1171497" ref_url="https://bugzilla.suse.com/1171497" source="BUGZILLA"/>
		<reference ref_id="1171498" ref_url="https://bugzilla.suse.com/1171498" source="BUGZILLA"/>
		<reference ref_id="1171499" ref_url="https://bugzilla.suse.com/1171499" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11863" ref_url="https://www.suse.com/security/cve/CVE-2020-11863/" source="CVE"/>
		<reference ref_id="CVE-2020-11864" ref_url="https://www.suse.com/security/cve/CVE-2020-11864/" source="CVE"/>
		<reference ref_id="CVE-2020-11865" ref_url="https://www.suse.com/security/cve/CVE-2020-11865/" source="CVE"/>
		<reference ref_id="CVE-2020-11866" ref_url="https://www.suse.com/security/cve/CVE-2020-11866/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1621-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007101.html" source="SUSE-SU"/>
		<description>
This update for libEMF fixes the following issues:

- CVE-2020-11863: Fixed an issue which could have led to denial of service (bsc#1171496).
- CVE-2020-11864: Fixed an issue which could have led to denial of service (bsc#1171499).
- CVE-2020-11865: Fixed an out of bounds memory access (bsc#1171497).
- CVE-2020-11866: Fixed a use after free (bsc#1171498).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1171496">SUSE bug 1171496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171497">SUSE bug 1171497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171498">SUSE bug 1171498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171499">SUSE bug 1171499</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11863/">CVE-2020-11863</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-11864/">CVE-2020-11864</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11865/">CVE-2020-11865</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-11866/">CVE-2020-11866</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509071" comment="libEMF1-1.0.7-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111926" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007096.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2017-18922: Fixed an issue which could have allowed to an attacker to pre-auth overwrite a function pointer 
  which subsequently used leading to potential remote code execution (bsc#1173477).	  
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-07"/>
	<updated date="2020-07-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509072" comment="libvncclient0-0.9.10-4.19.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509255" comment="libvncserver0-0.9.10-4.19.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111927" version="1" class="patch">
	<metadata>
		<title>Security update for opencv (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1144348" ref_url="https://bugzilla.suse.com/1144348" source="BUGZILLA"/>
		<reference ref_id="1144352" ref_url="https://bugzilla.suse.com/1144352" source="BUGZILLA"/>
		<reference ref_id="1149742" ref_url="https://bugzilla.suse.com/1149742" source="BUGZILLA"/>
		<reference ref_id="1154091" ref_url="https://bugzilla.suse.com/1154091" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14491" ref_url="https://www.suse.com/security/cve/CVE-2019-14491/" source="CVE"/>
		<reference ref_id="CVE-2019-14492" ref_url="https://www.suse.com/security/cve/CVE-2019-14492/" source="CVE"/>
		<reference ref_id="CVE-2019-15939" ref_url="https://www.suse.com/security/cve/CVE-2019-15939/" source="CVE"/>
		<reference ref_id="SUSE-SU-2019:3192-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007098.html" source="SUSE-SU"/>
		<description>
This update for opencv fixes the following issues:

Security issues fixed:

- CVE-2019-14491: Fixed an out of bounds read in the function cv:predictOrdered&lt;cv:HaarEvaluator&gt;, leading to DOS (bsc#1144352).
- CVE-2019-14492: Fixed an out of bounds read/write in the function HaarEvaluator:OptFeature:calc, which leads to denial of service (bsc#1144348).
- CVE-2019-15939: Fixed a divide-by-zero error in cv:HOGDescriptor:getDescriptorSize (bsc#1149742).

Non-security issue fixed:

- Fixed an issue in opencv-devel that broke builds with 'No rule to make target opencv_calib3d-NOTFOUND' (bsc#1154091).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-08"/>
	<updated date="2020-07-08"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1144348">SUSE bug 1144348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1144352">SUSE bug 1144352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149742">SUSE bug 1149742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154091">SUSE bug 1154091</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14491/">CVE-2019-14491</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-14492/">CVE-2019-14492</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-15939/">CVE-2019-15939</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009508524" comment="libopencv3_3-3.3.1-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009508525" comment="opencv-3.3.1-6.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009508526" comment="opencv-devel-3.3.1-6.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111928" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1173576" ref_url="https://bugzilla.suse.com/1173576" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12417" ref_url="https://www.suse.com/security/cve/CVE-2020-12417/" source="CVE"/>
		<reference ref_id="CVE-2020-12418" ref_url="https://www.suse.com/security/cve/CVE-2020-12418/" source="CVE"/>
		<reference ref_id="CVE-2020-12419" ref_url="https://www.suse.com/security/cve/CVE-2020-12419/" source="CVE"/>
		<reference ref_id="CVE-2020-12420" ref_url="https://www.suse.com/security/cve/CVE-2020-12420/" source="CVE"/>
		<reference ref_id="CVE-2020-12421" ref_url="https://www.suse.com/security/cve/CVE-2020-12421/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007122.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird to version 68.10.0 ESR fixes the following issues:

- CVE-2020-12417: Memory corruption due to missing sign-extension for ValueTags on ARM64 (bsc#1173576).
- CVE-2020-12418: Information disclosure due to manipulated URL object (bsc#1173576).
- CVE-2020-12419: Use-after-free in nsGlobalWindowInner (bsc#1173576).
- CVE-2020-12420: Use-After-Free when trying to connect to a STUN server (bsc#1173576).
- CVE-2020-12421: Add-On updates did not respect the same certificate trust rules as software updates (bsc#1173576).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-13"/>
	<updated date="2020-07-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173576">SUSE bug 1173576</bugzilla>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12417/">CVE-2020-12417</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12418/">CVE-2020-12418</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12419/">CVE-2020-12419</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12420/">CVE-2020-12420</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-12421/">CVE-2020-12421</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509073" comment="MozillaThunderbird-68.10.0-3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509074" comment="MozillaThunderbird-translations-common-68.10.0-3.88.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509075" comment="MozillaThunderbird-translations-other-68.10.0-3.88.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111929" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1173477" ref_url="https://bugzilla.suse.com/1173477" source="BUGZILLA"/>
		<reference ref_id="1173691" ref_url="https://bugzilla.suse.com/1173691" source="BUGZILLA"/>
		<reference ref_id="1173694" ref_url="https://bugzilla.suse.com/1173694" source="BUGZILLA"/>
		<reference ref_id="1173700" ref_url="https://bugzilla.suse.com/1173700" source="BUGZILLA"/>
		<reference ref_id="1173701" ref_url="https://bugzilla.suse.com/1173701" source="BUGZILLA"/>
		<reference ref_id="1173743" ref_url="https://bugzilla.suse.com/1173743" source="BUGZILLA"/>
		<reference ref_id="1173874" ref_url="https://bugzilla.suse.com/1173874" source="BUGZILLA"/>
		<reference ref_id="1173875" ref_url="https://bugzilla.suse.com/1173875" source="BUGZILLA"/>
		<reference ref_id="1173876" ref_url="https://bugzilla.suse.com/1173876" source="BUGZILLA"/>
		<reference ref_id="1173880" ref_url="https://bugzilla.suse.com/1173880" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18922" ref_url="https://www.suse.com/security/cve/CVE-2017-18922/" source="CVE"/>
		<reference ref_id="CVE-2018-21247" ref_url="https://www.suse.com/security/cve/CVE-2018-21247/" source="CVE"/>
		<reference ref_id="CVE-2019-20839" ref_url="https://www.suse.com/security/cve/CVE-2019-20839/" source="CVE"/>
		<reference ref_id="CVE-2019-20840" ref_url="https://www.suse.com/security/cve/CVE-2019-20840/" source="CVE"/>
		<reference ref_id="CVE-2020-14397" ref_url="https://www.suse.com/security/cve/CVE-2020-14397/" source="CVE"/>
		<reference ref_id="CVE-2020-14398" ref_url="https://www.suse.com/security/cve/CVE-2020-14398/" source="CVE"/>
		<reference ref_id="CVE-2020-14399" ref_url="https://www.suse.com/security/cve/CVE-2020-14399/" source="CVE"/>
		<reference ref_id="CVE-2020-14400" ref_url="https://www.suse.com/security/cve/CVE-2020-14400/" source="CVE"/>
		<reference ref_id="CVE-2020-14401" ref_url="https://www.suse.com/security/cve/CVE-2020-14401/" source="CVE"/>
		<reference ref_id="CVE-2020-14402" ref_url="https://www.suse.com/security/cve/CVE-2020-14402/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007136.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- security update
- added patches
  fix CVE-2018-21247 [bsc#1173874], uninitialized memory contents are vulnerable to Information leak
  + LibVNCServer-CVE-2018-21247.patch
  fix CVE-2019-20839 [bsc#1173875], buffer overflow in ConnectClientToUnixSock()
  + LibVNCServer-CVE-2019-20839.patch
  fix CVE-2019-20840 [bsc#1173876], unaligned accesses in hybiReadAndDecode can lead to denial of service
  + LibVNCServer-CVE-2019-20840.patch
  fix CVE-2020-14398 [bsc#1173880], improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c
  + LibVNCServer-CVE-2020-14398.patch
  fix CVE-2020-14397 [bsc#1173700], NULL pointer dereference in libvncserver/rfbregion.c
  + LibVNCServer-CVE-2020-14397.patch
  fix CVE-2020-14399 [bsc#1173743], Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c.
  + LibVNCServer-CVE-2020-14399.patch
  fix CVE-2020-14400 [bsc#1173691], Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c.
  + LibVNCServer-CVE-2020-14400.patch
  fix CVE-2020-14401 [bsc#1173694], potential integer overflows in libvncserver/scale.c
  + LibVNCServer-CVE-2020-14401.patch
  fix CVE-2020-14402 [bsc#1173701], out-of-bounds access via encodings.
  + LibVNCServer-CVE-2020-14402,14403,14404.patch
  fix CVE-2017-18922 [bsc#1173477], preauth buffer overwrite
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173477">SUSE bug 1173477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173691">SUSE bug 1173691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173694">SUSE bug 1173694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173700">SUSE bug 1173700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173701">SUSE bug 1173701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173743">SUSE bug 1173743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173874">SUSE bug 1173874</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173875">SUSE bug 1173875</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173876">SUSE bug 1173876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173880">SUSE bug 1173880</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2017-18922/">CVE-2017-18922</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2018-21247/">CVE-2018-21247</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20839/">CVE-2019-20839</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20840/">CVE-2019-20840</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14397/">CVE-2020-14397</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14398/">CVE-2020-14398</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14399/">CVE-2020-14399</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14400/">CVE-2020-14400</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14401/">CVE-2020-14401</cve>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-14402/">CVE-2020-14402</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509076" comment="libvncclient0-0.9.10-4.22.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509256" comment="libvncserver0-0.9.10-4.22.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111930" version="1" class="patch">
	<metadata>
		<title>Security update for openconnect (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1171862" ref_url="https://bugzilla.suse.com/1171862" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12823" ref_url="https://www.suse.com/security/cve/CVE-2020-12823/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:1930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007140.html" source="SUSE-SU"/>
		<description>
This update for openconnect fixes the following issues:
	  
- CVE-2020-12823: Fixed a buffer overflow via crafted certificate data which could have led to denial of service (bsc#1171862).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-15"/>
	<updated date="2020-07-15"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1171862">SUSE bug 1171862</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12823/">CVE-2020-12823</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509077" comment="openconnect-7.08-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509078" comment="openconnect-devel-7.08-6.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509079" comment="openconnect-lang-7.08-6.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111931" version="1" class="patch">
	<metadata>
		<title>Security update for libraw (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1173674" ref_url="https://bugzilla.suse.com/1173674" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15503" ref_url="https://www.suse.com/security/cve/CVE-2020-15503/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007173.html" source="SUSE-SU"/>
		<description>
This update for libraw fixes the following issues:

- security update
- added patches
  fix CVE-2020-15503 [bsc#1173674], lack of thumbnail size range check can lead to buffer overflow
  + libraw-CVE-2020-15503.patch
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-23"/>
	<updated date="2020-07-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173674">SUSE bug 1173674</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-15503/">CVE-2020-15503</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509080" comment="libraw-devel-0.18.9-3.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509081" comment="libraw16-0.18.9-3.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111932" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1169679" ref_url="https://bugzilla.suse.com/1169679" source="BUGZILLA"/>
		<reference ref_id="1169748" ref_url="https://bugzilla.suse.com/1169748" source="BUGZILLA"/>
		<reference ref_id="1171441" ref_url="https://bugzilla.suse.com/1171441" source="BUGZILLA"/>
		<reference ref_id="1171443" ref_url="https://bugzilla.suse.com/1171443" source="BUGZILLA"/>
		<reference ref_id="1171444" ref_url="https://bugzilla.suse.com/1171444" source="BUGZILLA"/>
		<reference ref_id="1171445" ref_url="https://bugzilla.suse.com/1171445" source="BUGZILLA"/>
		<reference ref_id="1171446" ref_url="https://bugzilla.suse.com/1171446" source="BUGZILLA"/>
		<reference ref_id="1171447" ref_url="https://bugzilla.suse.com/1171447" source="BUGZILLA"/>
		<reference ref_id="1171474" ref_url="https://bugzilla.suse.com/1171474" source="BUGZILLA"/>
		<reference ref_id="1173247" ref_url="https://bugzilla.suse.com/1173247" source="BUGZILLA"/>
		<reference ref_id="1173605" ref_url="https://bugzilla.suse.com/1173605" source="BUGZILLA"/>
		<reference ref_id="1174200" ref_url="https://bugzilla.suse.com/1174200" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-11017" ref_url="https://www.suse.com/security/cve/CVE-2020-11017/" source="CVE"/>
		<reference ref_id="CVE-2020-11018" ref_url="https://www.suse.com/security/cve/CVE-2020-11018/" source="CVE"/>
		<reference ref_id="CVE-2020-11019" ref_url="https://www.suse.com/security/cve/CVE-2020-11019/" source="CVE"/>
		<reference ref_id="CVE-2020-11038" ref_url="https://www.suse.com/security/cve/CVE-2020-11038/" source="CVE"/>
		<reference ref_id="CVE-2020-11039" ref_url="https://www.suse.com/security/cve/CVE-2020-11039/" source="CVE"/>
		<reference ref_id="CVE-2020-11040" ref_url="https://www.suse.com/security/cve/CVE-2020-11040/" source="CVE"/>
		<reference ref_id="CVE-2020-11041" ref_url="https://www.suse.com/security/cve/CVE-2020-11041/" source="CVE"/>
		<reference ref_id="CVE-2020-11043" ref_url="https://www.suse.com/security/cve/CVE-2020-11043/" source="CVE"/>
		<reference ref_id="CVE-2020-11085" ref_url="https://www.suse.com/security/cve/CVE-2020-11085/" source="CVE"/>
		<reference ref_id="CVE-2020-11086" ref_url="https://www.suse.com/security/cve/CVE-2020-11086/" source="CVE"/>
		<reference ref_id="CVE-2020-11087" ref_url="https://www.suse.com/security/cve/CVE-2020-11087/" source="CVE"/>
		<reference ref_id="CVE-2020-11088" ref_url="https://www.suse.com/security/cve/CVE-2020-11088/" source="CVE"/>
		<reference ref_id="CVE-2020-11089" ref_url="https://www.suse.com/security/cve/CVE-2020-11089/" source="CVE"/>
		<reference ref_id="CVE-2020-11095" ref_url="https://www.suse.com/security/cve/CVE-2020-11095/" source="CVE"/>
		<reference ref_id="CVE-2020-11096" ref_url="https://www.suse.com/security/cve/CVE-2020-11096/" source="CVE"/>
		<reference ref_id="CVE-2020-11097" ref_url="https://www.suse.com/security/cve/CVE-2020-11097/" source="CVE"/>
		<reference ref_id="CVE-2020-11098" ref_url="https://www.suse.com/security/cve/CVE-2020-11098/" source="CVE"/>
		<reference ref_id="CVE-2020-11099" ref_url="https://www.suse.com/security/cve/CVE-2020-11099/" source="CVE"/>
		<reference ref_id="CVE-2020-11521" ref_url="https://www.suse.com/security/cve/CVE-2020-11521/" source="CVE"/>
		<reference ref_id="CVE-2020-11522" ref_url="https://www.suse.com/security/cve/CVE-2020-11522/" source="CVE"/>
		<reference ref_id="CVE-2020-11523" ref_url="https://www.suse.com/security/cve/CVE-2020-11523/" source="CVE"/>
		<reference ref_id="CVE-2020-11524" ref_url="https://www.suse.com/security/cve/CVE-2020-11524/" source="CVE"/>
		<reference ref_id="CVE-2020-11525" ref_url="https://www.suse.com/security/cve/CVE-2020-11525/" source="CVE"/>
		<reference ref_id="CVE-2020-11526" ref_url="https://www.suse.com/security/cve/CVE-2020-11526/" source="CVE"/>
		<reference ref_id="CVE-2020-13396" ref_url="https://www.suse.com/security/cve/CVE-2020-13396/" source="CVE"/>
		<reference ref_id="CVE-2020-13397" ref_url="https://www.suse.com/security/cve/CVE-2020-13397/" source="CVE"/>
		<reference ref_id="CVE-2020-13398" ref_url="https://www.suse.com/security/cve/CVE-2020-13398/" source="CVE"/>
		<reference ref_id="CVE-2020-4030" ref_url="https://www.suse.com/security/cve/CVE-2020-4030/" source="CVE"/>
		<reference ref_id="CVE-2020-4031" ref_url="https://www.suse.com/security/cve/CVE-2020-4031/" source="CVE"/>
		<reference ref_id="CVE-2020-4032" ref_url="https://www.suse.com/security/cve/CVE-2020-4032/" source="CVE"/>
		<reference ref_id="CVE-2020-4033" ref_url="https://www.suse.com/security/cve/CVE-2020-4033/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-July/007190.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

frerdp was updated to version 2.1.2 (bsc#1171441,bsc#1173247 and jsc#ECO-2006):

- CVE-2020-11017: Fixed a double free which could have denied the server's service.
- CVE-2020-11018: Fixed an out of bounds read which a malicious clients could have triggered.
- CVE-2020-11019: Fixed an issue which could have led to denial of service if logger was set to 'WLOG_TRACE'.
- CVE-2020-11038: Fixed a buffer overflow when /video redirection was used.
- CVE-2020-11039: Fixed an issue which could have allowed arbitrary memory read and write when USB redirection was enabled.
- CVE-2020-11040: Fixed an out of bounds data read in clear_decompress_subcode_rlex.
- CVE-2020-11041: Fixed an issue with the configuration for sound backend which could have led to server's denial of service.
- CVE-2020-11043: Fixed an out of bounds read in rfx_process_message_tileset.
- CVE-2020-11085: Fixed an out of bounds read in cliprdr_read_format_list.
- CVE-2020-11086: Fixed an out of bounds read in ntlm_read_ntlm_v2_client_challenge.
- CVE-2020-11087: Fixed an out of bounds read in ntlm_read_AuthenticateMessage.
- CVE-2020-11088: Fixed an out of bounds read in ntlm_read_NegotiateMessage.
- CVE-2020-11089: Fixed an out of bounds read in irp function family.
- CVE-2020-11095: Fixed a global out of bounds read in update_recv_primary_order.
- CVE-2020-11096: Fixed a global out of bounds read in update_read_cache_bitmap_v3_order.
- CVE-2020-11097: Fixed an out of bounds read in ntlm_av_pair_get.
- CVE-2020-11098: Fixed an out of bounds read in glyph_cache_put.
- CVE-2020-11099: Fixed an out of bounds Read in license_read_new_or_upgrade_license_packet.
- CVE-2020-11521: Fixed an out of bounds write in planar.c (bsc#1171443).
- CVE-2020-11522: Fixed an out of bounds read in gdi.c (bsc#1171444).
- CVE-2020-11523: Fixed an integer overflow in region.c (bsc#1171445).
- CVE-2020-11524: Fixed an out of bounds write in interleaved.c (bsc#1171446).
- CVE-2020-11525: Fixed an out of bounds read in bitmap.c (bsc#1171447).
- CVE-2020-11526: Fixed an out of bounds read in update_recv_secondary_order (bsc#1171674).
- CVE-2020-13396: Fixed an Read in ntlm_read_ChallengeMessage.
- CVE-2020-13397: Fixed an out of bounds read in security_fips_decrypt due to uninitialized value.
- CVE-2020-13398: Fixed an out of bounds write in crypto_rsa_common.
- CVE-2020-4030: Fixed an out of bounds read in `TrioParse`.
- CVE-2020-4031: Fixed a use after free in gdi_SelectObject.
- CVE-2020-4032: Fixed an integer casting in `update_recv_secondary_order`.
- CVE-2020-4033: Fixed an out of bound read in RLEDECOMPRESS.
- Fixed an issue where freerdp failed with -fno-common (bsc#1169748).
- Fixed an issue where USB redirection with FreeRDP was not working (bsc#1169679).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-07-29"/>
	<updated date="2020-07-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1169679">SUSE bug 1169679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169748">SUSE bug 1169748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171441">SUSE bug 1171441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171443">SUSE bug 1171443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171444">SUSE bug 1171444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171445">SUSE bug 1171445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171446">SUSE bug 1171446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171447">SUSE bug 1171447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171474">SUSE bug 1171474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173247">SUSE bug 1173247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173605">SUSE bug 1173605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174200">SUSE bug 1174200</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11017/">CVE-2020-11017</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11018/">CVE-2020-11018</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11019/">CVE-2020-11019</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11038/">CVE-2020-11038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11039/">CVE-2020-11039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11040/">CVE-2020-11040</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11041/">CVE-2020-11041</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11043/">CVE-2020-11043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11085/">CVE-2020-11085</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11086/">CVE-2020-11086</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11087/">CVE-2020-11087</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11088/">CVE-2020-11088</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11089/">CVE-2020-11089</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11095/">CVE-2020-11095</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11096/">CVE-2020-11096</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11097/">CVE-2020-11097</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11098/">CVE-2020-11098</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-11099/">CVE-2020-11099</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11521/">CVE-2020-11521</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11522/">CVE-2020-11522</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11523/">CVE-2020-11523</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-11524/">CVE-2020-11524</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11525/">CVE-2020-11525</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2020-11526/">CVE-2020-11526</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13396/">CVE-2020-13396</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13397/">CVE-2020-13397</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-13398/">CVE-2020-13398</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4030/">CVE-2020-4030</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4031/">CVE-2020-4031</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-4032/">CVE-2020-4032</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-4033/">CVE-2020-4033</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509257" comment="freerdp-2.1.2-15.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509258" comment="freerdp-devel-2.1.2-15.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509259" comment="libfreerdp2-2.1.2-15.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509260" comment="libwinpr2-2.1.2-15.7.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509261" comment="winpr2-devel-2.1.2-15.7.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111933" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157169" ref_url="https://bugzilla.suse.com/1157169" source="BUGZILLA"/>
		<reference ref_id="1158050" ref_url="https://bugzilla.suse.com/1158050" source="BUGZILLA"/>
		<reference ref_id="1158242" ref_url="https://bugzilla.suse.com/1158242" source="BUGZILLA"/>
		<reference ref_id="1158265" ref_url="https://bugzilla.suse.com/1158265" source="BUGZILLA"/>
		<reference ref_id="1158748" ref_url="https://bugzilla.suse.com/1158748" source="BUGZILLA"/>
		<reference ref_id="1158765" ref_url="https://bugzilla.suse.com/1158765" source="BUGZILLA"/>
		<reference ref_id="1158983" ref_url="https://bugzilla.suse.com/1158983" source="BUGZILLA"/>
		<reference ref_id="1159781" ref_url="https://bugzilla.suse.com/1159781" source="BUGZILLA"/>
		<reference ref_id="1159867" ref_url="https://bugzilla.suse.com/1159867" source="BUGZILLA"/>
		<reference ref_id="1160947" ref_url="https://bugzilla.suse.com/1160947" source="BUGZILLA"/>
		<reference ref_id="1161495" ref_url="https://bugzilla.suse.com/1161495" source="BUGZILLA"/>
		<reference ref_id="1162002" ref_url="https://bugzilla.suse.com/1162002" source="BUGZILLA"/>
		<reference ref_id="1162063" ref_url="https://bugzilla.suse.com/1162063" source="BUGZILLA"/>
		<reference ref_id="1162400" ref_url="https://bugzilla.suse.com/1162400" source="BUGZILLA"/>
		<reference ref_id="1162702" ref_url="https://bugzilla.suse.com/1162702" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1164777" ref_url="https://bugzilla.suse.com/1164777" source="BUGZILLA"/>
		<reference ref_id="1164780" ref_url="https://bugzilla.suse.com/1164780" source="BUGZILLA"/>
		<reference ref_id="1165211" ref_url="https://bugzilla.suse.com/1165211" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1165975" ref_url="https://bugzilla.suse.com/1165975" source="BUGZILLA"/>
		<reference ref_id="1166985" ref_url="https://bugzilla.suse.com/1166985" source="BUGZILLA"/>
		<reference ref_id="1167104" ref_url="https://bugzilla.suse.com/1167104" source="BUGZILLA"/>
		<reference ref_id="1167651" ref_url="https://bugzilla.suse.com/1167651" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168230" ref_url="https://bugzilla.suse.com/1168230" source="BUGZILLA"/>
		<reference ref_id="1168779" ref_url="https://bugzilla.suse.com/1168779" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1168959" ref_url="https://bugzilla.suse.com/1168959" source="BUGZILLA"/>
		<reference ref_id="1169021" ref_url="https://bugzilla.suse.com/1169021" source="BUGZILLA"/>
		<reference ref_id="1169094" ref_url="https://bugzilla.suse.com/1169094" source="BUGZILLA"/>
		<reference ref_id="1169194" ref_url="https://bugzilla.suse.com/1169194" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169681" ref_url="https://bugzilla.suse.com/1169681" source="BUGZILLA"/>
		<reference ref_id="1169771" ref_url="https://bugzilla.suse.com/1169771" source="BUGZILLA"/>
		<reference ref_id="1170011" ref_url="https://bugzilla.suse.com/1170011" source="BUGZILLA"/>
		<reference ref_id="1170284" ref_url="https://bugzilla.suse.com/1170284" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1170617" ref_url="https://bugzilla.suse.com/1170617" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1170879" ref_url="https://bugzilla.suse.com/1170879" source="BUGZILLA"/>
		<reference ref_id="1170891" ref_url="https://bugzilla.suse.com/1170891" source="BUGZILLA"/>
		<reference ref_id="1170895" ref_url="https://bugzilla.suse.com/1170895" source="BUGZILLA"/>
		<reference ref_id="1171150" ref_url="https://bugzilla.suse.com/1171150" source="BUGZILLA"/>
		<reference ref_id="1171189" ref_url="https://bugzilla.suse.com/1171189" source="BUGZILLA"/>
		<reference ref_id="1171191" ref_url="https://bugzilla.suse.com/1171191" source="BUGZILLA"/>
		<reference ref_id="1171219" ref_url="https://bugzilla.suse.com/1171219" source="BUGZILLA"/>
		<reference ref_id="1171220" ref_url="https://bugzilla.suse.com/1171220" source="BUGZILLA"/>
		<reference ref_id="1171246" ref_url="https://bugzilla.suse.com/1171246" source="BUGZILLA"/>
		<reference ref_id="1171417" ref_url="https://bugzilla.suse.com/1171417" source="BUGZILLA"/>
		<reference ref_id="1171513" ref_url="https://bugzilla.suse.com/1171513" source="BUGZILLA"/>
		<reference ref_id="1171529" ref_url="https://bugzilla.suse.com/1171529" source="BUGZILLA"/>
		<reference ref_id="1171530" ref_url="https://bugzilla.suse.com/1171530" source="BUGZILLA"/>
		<reference ref_id="1171662" ref_url="https://bugzilla.suse.com/1171662" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171699" ref_url="https://bugzilla.suse.com/1171699" source="BUGZILLA"/>
		<reference ref_id="1171732" ref_url="https://bugzilla.suse.com/1171732" source="BUGZILLA"/>
		<reference ref_id="1171739" ref_url="https://bugzilla.suse.com/1171739" source="BUGZILLA"/>
		<reference ref_id="1171743" ref_url="https://bugzilla.suse.com/1171743" source="BUGZILLA"/>
		<reference ref_id="1171759" ref_url="https://bugzilla.suse.com/1171759" source="BUGZILLA"/>
		<reference ref_id="1171828" ref_url="https://bugzilla.suse.com/1171828" source="BUGZILLA"/>
		<reference ref_id="1171857" ref_url="https://bugzilla.suse.com/1171857" source="BUGZILLA"/>
		<reference ref_id="1171868" ref_url="https://bugzilla.suse.com/1171868" source="BUGZILLA"/>
		<reference ref_id="1171904" ref_url="https://bugzilla.suse.com/1171904" source="BUGZILLA"/>
		<reference ref_id="1171915" ref_url="https://bugzilla.suse.com/1171915" source="BUGZILLA"/>
		<reference ref_id="1171982" ref_url="https://bugzilla.suse.com/1171982" source="BUGZILLA"/>
		<reference ref_id="1171983" ref_url="https://bugzilla.suse.com/1171983" source="BUGZILLA"/>
		<reference ref_id="1171988" ref_url="https://bugzilla.suse.com/1171988" source="BUGZILLA"/>
		<reference ref_id="1172017" ref_url="https://bugzilla.suse.com/1172017" source="BUGZILLA"/>
		<reference ref_id="1172046" ref_url="https://bugzilla.suse.com/1172046" source="BUGZILLA"/>
		<reference ref_id="1172061" ref_url="https://bugzilla.suse.com/1172061" source="BUGZILLA"/>
		<reference ref_id="1172062" ref_url="https://bugzilla.suse.com/1172062" source="BUGZILLA"/>
		<reference ref_id="1172063" ref_url="https://bugzilla.suse.com/1172063" source="BUGZILLA"/>
		<reference ref_id="1172064" ref_url="https://bugzilla.suse.com/1172064" source="BUGZILLA"/>
		<reference ref_id="1172065" ref_url="https://bugzilla.suse.com/1172065" source="BUGZILLA"/>
		<reference ref_id="1172066" ref_url="https://bugzilla.suse.com/1172066" source="BUGZILLA"/>
		<reference ref_id="1172067" ref_url="https://bugzilla.suse.com/1172067" source="BUGZILLA"/>
		<reference ref_id="1172068" ref_url="https://bugzilla.suse.com/1172068" source="BUGZILLA"/>
		<reference ref_id="1172069" ref_url="https://bugzilla.suse.com/1172069" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1172086" ref_url="https://bugzilla.suse.com/1172086" source="BUGZILLA"/>
		<reference ref_id="1172095" ref_url="https://bugzilla.suse.com/1172095" source="BUGZILLA"/>
		<reference ref_id="1172169" ref_url="https://bugzilla.suse.com/1172169" source="BUGZILLA"/>
		<reference ref_id="1172170" ref_url="https://bugzilla.suse.com/1172170" source="BUGZILLA"/>
		<reference ref_id="1172201" ref_url="https://bugzilla.suse.com/1172201" source="BUGZILLA"/>
		<reference ref_id="1172208" ref_url="https://bugzilla.suse.com/1172208" source="BUGZILLA"/>
		<reference ref_id="1172223" ref_url="https://bugzilla.suse.com/1172223" source="BUGZILLA"/>
		<reference ref_id="1172342" ref_url="https://bugzilla.suse.com/1172342" source="BUGZILLA"/>
		<reference ref_id="1172343" ref_url="https://bugzilla.suse.com/1172343" source="BUGZILLA"/>
		<reference ref_id="1172344" ref_url="https://bugzilla.suse.com/1172344" source="BUGZILLA"/>
		<reference ref_id="1172365" ref_url="https://bugzilla.suse.com/1172365" source="BUGZILLA"/>
		<reference ref_id="1172366" ref_url="https://bugzilla.suse.com/1172366" source="BUGZILLA"/>
		<reference ref_id="1172374" ref_url="https://bugzilla.suse.com/1172374" source="BUGZILLA"/>
		<reference ref_id="1172391" ref_url="https://bugzilla.suse.com/1172391" source="BUGZILLA"/>
		<reference ref_id="1172393" ref_url="https://bugzilla.suse.com/1172393" source="BUGZILLA"/>
		<reference ref_id="1172394" ref_url="https://bugzilla.suse.com/1172394" source="BUGZILLA"/>
		<reference ref_id="1172453" ref_url="https://bugzilla.suse.com/1172453" source="BUGZILLA"/>
		<reference ref_id="1172458" ref_url="https://bugzilla.suse.com/1172458" source="BUGZILLA"/>
		<reference ref_id="1172467" ref_url="https://bugzilla.suse.com/1172467" source="BUGZILLA"/>
		<reference ref_id="1172484" ref_url="https://bugzilla.suse.com/1172484" source="BUGZILLA"/>
		<reference ref_id="1172537" ref_url="https://bugzilla.suse.com/1172537" source="BUGZILLA"/>
		<reference ref_id="1172543" ref_url="https://bugzilla.suse.com/1172543" source="BUGZILLA"/>
		<reference ref_id="1172687" ref_url="https://bugzilla.suse.com/1172687" source="BUGZILLA"/>
		<reference ref_id="1172719" ref_url="https://bugzilla.suse.com/1172719" source="BUGZILLA"/>
		<reference ref_id="1172739" ref_url="https://bugzilla.suse.com/1172739" source="BUGZILLA"/>
		<reference ref_id="1172751" ref_url="https://bugzilla.suse.com/1172751" source="BUGZILLA"/>
		<reference ref_id="1172759" ref_url="https://bugzilla.suse.com/1172759" source="BUGZILLA"/>
		<reference ref_id="1172775" ref_url="https://bugzilla.suse.com/1172775" source="BUGZILLA"/>
		<reference ref_id="1172781" ref_url="https://bugzilla.suse.com/1172781" source="BUGZILLA"/>
		<reference ref_id="1172782" ref_url="https://bugzilla.suse.com/1172782" source="BUGZILLA"/>
		<reference ref_id="1172783" ref_url="https://bugzilla.suse.com/1172783" source="BUGZILLA"/>
		<reference ref_id="1172814" ref_url="https://bugzilla.suse.com/1172814" source="BUGZILLA"/>
		<reference ref_id="1172823" ref_url="https://bugzilla.suse.com/1172823" source="BUGZILLA"/>
		<reference ref_id="1172841" ref_url="https://bugzilla.suse.com/1172841" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172938" ref_url="https://bugzilla.suse.com/1172938" source="BUGZILLA"/>
		<reference ref_id="1172939" ref_url="https://bugzilla.suse.com/1172939" source="BUGZILLA"/>
		<reference ref_id="1172940" ref_url="https://bugzilla.suse.com/1172940" source="BUGZILLA"/>
		<reference ref_id="1172956" ref_url="https://bugzilla.suse.com/1172956" source="BUGZILLA"/>
		<reference ref_id="1172983" ref_url="https://bugzilla.suse.com/1172983" source="BUGZILLA"/>
		<reference ref_id="1172984" ref_url="https://bugzilla.suse.com/1172984" source="BUGZILLA"/>
		<reference ref_id="1172985" ref_url="https://bugzilla.suse.com/1172985" source="BUGZILLA"/>
		<reference ref_id="1172986" ref_url="https://bugzilla.suse.com/1172986" source="BUGZILLA"/>
		<reference ref_id="1172987" ref_url="https://bugzilla.suse.com/1172987" source="BUGZILLA"/>
		<reference ref_id="1172988" ref_url="https://bugzilla.suse.com/1172988" source="BUGZILLA"/>
		<reference ref_id="1172989" ref_url="https://bugzilla.suse.com/1172989" source="BUGZILLA"/>
		<reference ref_id="1172990" ref_url="https://bugzilla.suse.com/1172990" source="BUGZILLA"/>
		<reference ref_id="1172999" ref_url="https://bugzilla.suse.com/1172999" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173068" ref_url="https://bugzilla.suse.com/1173068" source="BUGZILLA"/>
		<reference ref_id="1173074" ref_url="https://bugzilla.suse.com/1173074" source="BUGZILLA"/>
		<reference ref_id="1173085" ref_url="https://bugzilla.suse.com/1173085" source="BUGZILLA"/>
		<reference ref_id="1173139" ref_url="https://bugzilla.suse.com/1173139" source="BUGZILLA"/>
		<reference ref_id="1173206" ref_url="https://bugzilla.suse.com/1173206" source="BUGZILLA"/>
		<reference ref_id="1173271" ref_url="https://bugzilla.suse.com/1173271" source="BUGZILLA"/>
		<reference ref_id="1173280" ref_url="https://bugzilla.suse.com/1173280" source="BUGZILLA"/>
		<reference ref_id="1173284" ref_url="https://bugzilla.suse.com/1173284" source="BUGZILLA"/>
		<reference ref_id="1173428" ref_url="https://bugzilla.suse.com/1173428" source="BUGZILLA"/>
		<reference ref_id="1173438" ref_url="https://bugzilla.suse.com/1173438" source="BUGZILLA"/>
		<reference ref_id="1173461" ref_url="https://bugzilla.suse.com/1173461" source="BUGZILLA"/>
		<reference ref_id="1173514" ref_url="https://bugzilla.suse.com/1173514" source="BUGZILLA"/>
		<reference ref_id="1173552" ref_url="https://bugzilla.suse.com/1173552" source="BUGZILLA"/>
		<reference ref_id="1173573" ref_url="https://bugzilla.suse.com/1173573" source="BUGZILLA"/>
		<reference ref_id="1173625" ref_url="https://bugzilla.suse.com/1173625" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1173776" ref_url="https://bugzilla.suse.com/1173776" source="BUGZILLA"/>
		<reference ref_id="1173817" ref_url="https://bugzilla.suse.com/1173817" source="BUGZILLA"/>
		<reference ref_id="1173818" ref_url="https://bugzilla.suse.com/1173818" source="BUGZILLA"/>
		<reference ref_id="1173820" ref_url="https://bugzilla.suse.com/1173820" source="BUGZILLA"/>
		<reference ref_id="1173822" ref_url="https://bugzilla.suse.com/1173822" source="BUGZILLA"/>
		<reference ref_id="1173823" ref_url="https://bugzilla.suse.com/1173823" source="BUGZILLA"/>
		<reference ref_id="1173824" ref_url="https://bugzilla.suse.com/1173824" source="BUGZILLA"/>
		<reference ref_id="1173825" ref_url="https://bugzilla.suse.com/1173825" source="BUGZILLA"/>
		<reference ref_id="1173826" ref_url="https://bugzilla.suse.com/1173826" source="BUGZILLA"/>
		<reference ref_id="1173827" ref_url="https://bugzilla.suse.com/1173827" source="BUGZILLA"/>
		<reference ref_id="1173828" ref_url="https://bugzilla.suse.com/1173828" source="BUGZILLA"/>
		<reference ref_id="1173830" ref_url="https://bugzilla.suse.com/1173830" source="BUGZILLA"/>
		<reference ref_id="1173831" ref_url="https://bugzilla.suse.com/1173831" source="BUGZILLA"/>
		<reference ref_id="1173832" ref_url="https://bugzilla.suse.com/1173832" source="BUGZILLA"/>
		<reference ref_id="1173833" ref_url="https://bugzilla.suse.com/1173833" source="BUGZILLA"/>
		<reference ref_id="1173834" ref_url="https://bugzilla.suse.com/1173834" source="BUGZILLA"/>
		<reference ref_id="1173836" ref_url="https://bugzilla.suse.com/1173836" source="BUGZILLA"/>
		<reference ref_id="1173837" ref_url="https://bugzilla.suse.com/1173837" source="BUGZILLA"/>
		<reference ref_id="1173838" ref_url="https://bugzilla.suse.com/1173838" source="BUGZILLA"/>
		<reference ref_id="1173839" ref_url="https://bugzilla.suse.com/1173839" source="BUGZILLA"/>
		<reference ref_id="1173841" ref_url="https://bugzilla.suse.com/1173841" source="BUGZILLA"/>
		<reference ref_id="1173843" ref_url="https://bugzilla.suse.com/1173843" source="BUGZILLA"/>
		<reference ref_id="1173844" ref_url="https://bugzilla.suse.com/1173844" source="BUGZILLA"/>
		<reference ref_id="1173845" ref_url="https://bugzilla.suse.com/1173845" source="BUGZILLA"/>
		<reference ref_id="1173847" ref_url="https://bugzilla.suse.com/1173847" source="BUGZILLA"/>
		<reference ref_id="1173849" ref_url="https://bugzilla.suse.com/1173849" source="BUGZILLA"/>
		<reference ref_id="1173860" ref_url="https://bugzilla.suse.com/1173860" source="BUGZILLA"/>
		<reference ref_id="1173894" ref_url="https://bugzilla.suse.com/1173894" source="BUGZILLA"/>
		<reference ref_id="1173941" ref_url="https://bugzilla.suse.com/1173941" source="BUGZILLA"/>
		<reference ref_id="1174018" ref_url="https://bugzilla.suse.com/1174018" source="BUGZILLA"/>
		<reference ref_id="1174072" ref_url="https://bugzilla.suse.com/1174072" source="BUGZILLA"/>
		<reference ref_id="1174116" ref_url="https://bugzilla.suse.com/1174116" source="BUGZILLA"/>
		<reference ref_id="1174126" ref_url="https://bugzilla.suse.com/1174126" source="BUGZILLA"/>
		<reference ref_id="1174127" ref_url="https://bugzilla.suse.com/1174127" source="BUGZILLA"/>
		<reference ref_id="1174128" ref_url="https://bugzilla.suse.com/1174128" source="BUGZILLA"/>
		<reference ref_id="1174129" ref_url="https://bugzilla.suse.com/1174129" source="BUGZILLA"/>
		<reference ref_id="1174185" ref_url="https://bugzilla.suse.com/1174185" source="BUGZILLA"/>
		<reference ref_id="1174244" ref_url="https://bugzilla.suse.com/1174244" source="BUGZILLA"/>
		<reference ref_id="1174263" ref_url="https://bugzilla.suse.com/1174263" source="BUGZILLA"/>
		<reference ref_id="1174264" ref_url="https://bugzilla.suse.com/1174264" source="BUGZILLA"/>
		<reference ref_id="1174331" ref_url="https://bugzilla.suse.com/1174331" source="BUGZILLA"/>
		<reference ref_id="1174332" ref_url="https://bugzilla.suse.com/1174332" source="BUGZILLA"/>
		<reference ref_id="1174333" ref_url="https://bugzilla.suse.com/1174333" source="BUGZILLA"/>
		<reference ref_id="1174345" ref_url="https://bugzilla.suse.com/1174345" source="BUGZILLA"/>
		<reference ref_id="1174356" ref_url="https://bugzilla.suse.com/1174356" source="BUGZILLA"/>
		<reference ref_id="1174396" ref_url="https://bugzilla.suse.com/1174396" source="BUGZILLA"/>
		<reference ref_id="1174398" ref_url="https://bugzilla.suse.com/1174398" source="BUGZILLA"/>
		<reference ref_id="1174407" ref_url="https://bugzilla.suse.com/1174407" source="BUGZILLA"/>
		<reference ref_id="1174409" ref_url="https://bugzilla.suse.com/1174409" source="BUGZILLA"/>
		<reference ref_id="1174411" ref_url="https://bugzilla.suse.com/1174411" source="BUGZILLA"/>
		<reference ref_id="1174438" ref_url="https://bugzilla.suse.com/1174438" source="BUGZILLA"/>
		<reference ref_id="1174462" ref_url="https://bugzilla.suse.com/1174462" source="BUGZILLA"/>
		<reference ref_id="1174513" ref_url="https://bugzilla.suse.com/1174513" source="BUGZILLA"/>
		<reference ref_id="1174527" ref_url="https://bugzilla.suse.com/1174527" source="BUGZILLA"/>
		<reference ref_id="1174543" ref_url="https://bugzilla.suse.com/1174543" source="BUGZILLA"/>
		<reference ref_id="1174627" ref_url="https://bugzilla.suse.com/1174627" source="BUGZILLA"/>
		<reference ref_id="962849" ref_url="https://bugzilla.suse.com/962849" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-19462" ref_url="https://www.suse.com/security/cve/CVE-2019-19462/" source="CVE"/>
		<reference ref_id="CVE-2019-20810" ref_url="https://www.suse.com/security/cve/CVE-2019-20810/" source="CVE"/>
		<reference ref_id="CVE-2019-20812" ref_url="https://www.suse.com/security/cve/CVE-2019-20812/" source="CVE"/>
		<reference ref_id="CVE-2020-0305" ref_url="https://www.suse.com/security/cve/CVE-2020-0305/" source="CVE"/>
		<reference ref_id="CVE-2020-10135" ref_url="https://www.suse.com/security/cve/CVE-2020-10135/" source="CVE"/>
		<reference ref_id="CVE-2020-10711" ref_url="https://www.suse.com/security/cve/CVE-2020-10711/" source="CVE"/>
		<reference ref_id="CVE-2020-10732" ref_url="https://www.suse.com/security/cve/CVE-2020-10732/" source="CVE"/>
		<reference ref_id="CVE-2020-10751" ref_url="https://www.suse.com/security/cve/CVE-2020-10751/" source="CVE"/>
		<reference ref_id="CVE-2020-10766" ref_url="https://www.suse.com/security/cve/CVE-2020-10766/" source="CVE"/>
		<reference ref_id="CVE-2020-10767" ref_url="https://www.suse.com/security/cve/CVE-2020-10767/" source="CVE"/>
		<reference ref_id="CVE-2020-10768" ref_url="https://www.suse.com/security/cve/CVE-2020-10768/" source="CVE"/>
		<reference ref_id="CVE-2020-10773" ref_url="https://www.suse.com/security/cve/CVE-2020-10773/" source="CVE"/>
		<reference ref_id="CVE-2020-10781" ref_url="https://www.suse.com/security/cve/CVE-2020-10781/" source="CVE"/>
		<reference ref_id="CVE-2020-12656" ref_url="https://www.suse.com/security/cve/CVE-2020-12656/" source="CVE"/>
		<reference ref_id="CVE-2020-12769" ref_url="https://www.suse.com/security/cve/CVE-2020-12769/" source="CVE"/>
		<reference ref_id="CVE-2020-12771" ref_url="https://www.suse.com/security/cve/CVE-2020-12771/" source="CVE"/>
		<reference ref_id="CVE-2020-12888" ref_url="https://www.suse.com/security/cve/CVE-2020-12888/" source="CVE"/>
		<reference ref_id="CVE-2020-13143" ref_url="https://www.suse.com/security/cve/CVE-2020-13143/" source="CVE"/>
		<reference ref_id="CVE-2020-13974" ref_url="https://www.suse.com/security/cve/CVE-2020-13974/" source="CVE"/>
		<reference ref_id="CVE-2020-14416" ref_url="https://www.suse.com/security/cve/CVE-2020-14416/" source="CVE"/>
		<reference ref_id="CVE-2020-15393" ref_url="https://www.suse.com/security/cve/CVE-2020-15393/" source="CVE"/>
		<reference ref_id="CVE-2020-15780" ref_url="https://www.suse.com/security/cve/CVE-2020-15780/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2105-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007213.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
- CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
- CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
- CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth? BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
- CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
- CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
- CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
- CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
- CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
- CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
- CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
- CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
- CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
- CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
- CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
- CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
- CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
- CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
- CVE-2020-14416: Fixed a race condition in tty-&gt;disc_data handling in the slip and slcan line discipline could lead to a use-after-free. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
- CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
- CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).

The following non-security bugs were fixed:

- ACPICA: Dispatcher: add status checks (git-fixes).
- ACPICA: Fixes for acpiExec namespace init file (git-fixes).
- ACPI: configfs: Disallow loading ACPI tables when locked down (git-fixes).
- ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).
- ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).
- ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).
- ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).
- ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).
- ACPI: sysfs: Fix pm_profile_attr type (git-fixes).
- ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).
- ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).
- ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).
- af_unix: add compat_ioctl support (git-fixes).
- agp/intel: Reinforce the barrier after GTT updates (git-fixes).
- aio: fix async fsync creds (bsc#1173828).
- ALSA: emu10k1: delete an unnecessary condition (git-fixes).
- ALSA: es1688: Add the missed snd_card_free() (git-fixes).
- ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).
- ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).
- ALSA: hda: add member to store ratio for stripe control (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a &amp; 9d through a0 to patch table (git-fixes).
- ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later (git-fixes).
- ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).
- ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).
- ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).
- ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).
- ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).
- ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).
- ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).
- ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).
- ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).
- ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).
- ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).
- ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).
- ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).
- ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).
- ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (git-fixes).
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).
- ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).
- ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).
- ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).
- ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).
- ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).
- ALSA: opl3: fix infoleak in opl3 (git-fixes).
- ALSA: pcm: disallow linking stream to itself (git-fixes).
- ALSA: pcm: fix incorrect hw_base increase (git-fixes).
- ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).
- ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).
- ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).
- ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).
- ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).
- ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).
- ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).
- ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix packet size calculation (bsc#1173847).
- ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: Fix racy list management in output queue (git-fixes).
- ALSA: usb-audio: Improve frames size computation (git-fixes).
- ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).
- ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).
- ALSA: usb-audio: Print more information in stream proc files (git-fixes).
- ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).
- ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).
- ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).
- ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).
- ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).
- amdgpu: a NULL -&gt;mm does not mean a thread is a kthread (git-fixes).
- amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).
- apparmor: ensure that dfa state tables have entries (git-fixes).
- apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).
- apparmor: Fix memory leak of profile proxy (git-fixes).
- apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).
- apparmor: remove useless aafs_create_symlink (git-fixes).
- arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).
- arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).
- arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).
- ARM: oxnas: make ox820_boot_secondary static (git-fixes).
- asm-gemeric/tlb: remove stray function declarations (bsc#1156395).
- ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).
- ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).
- ASoC: core: only convert non DPCM link to DPCM link (git-fixes).
- ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type (git-fixes).
- ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).
- ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet (git-fixes).
- ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).
- ASoC: intel - fix the card names (git-fixes).
- ASoC: max98373: reorder max98373_reset() in resume (git-fixes).
- ASoC: max9867: fix volume controls (git-fixes).
- ASoC: meson: add missing free_irq() in error path (git-fixes).
- ASoc: q6afe: add support to get port direction (git-fixes).
- ASoC: q6asm: handle EOS correctly (git-fixes).
- ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).
- ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).
- ASoC: rockchip: Fix a reference count leak (git-fixes).
- ASoC: rt286: fix unexpected interrupt happens (git-fixes).
- ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).
- ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).
- ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).
- ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5682: Report the button event in the headset type only (git-fixes).
- ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).
- ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).
- ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags (git-fixes).
- ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).
- ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()' (git-fixes).
- ASoC: topology: fix kernel oops on route addition error (git-fixes).
- ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).
- ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).
- ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).
- ASoC: wm8974: remove unsupported clock mode (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: fix kernel null pointer dereference (git-fixes).
- ath10k: Fix the race condition in firmware dump work queue (git-fixes).
- ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).
- ath10k: remove the max_sched_scan_reqs value (git-fixes).
- ath10k: Skip handling del_server during driver exit (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).
- ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).
- ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).
- ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).
- ax88172a: fix ax88172a_unbind() failures (git-fixes).
- b43: Fix connection problem with WPA3 (git-fixes).
- b43legacy: Fix case where channel status is corrupted (git-fixes).
- b43_legacy: Fix connection problem with WPA3 (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- batman-adv: Revert 'disable ethtool link speed detection when auto negotiation off' (git-fixes).
- bdev: fix bdev inode reference count disbalance regression (bsc#1174244)
- bfq: Avoid false bfq queue merging (bsc#1171513).
- bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).
- bfq: Use only idle IO periods for think time calculations (bsc#1171513).
- bfq: Use 'ttime' local variable (bsc#1171513).
- blacklist.conf: Add 9486727f5981 iommu/vt-d: Make Intel SVM code 64-bit only
- blacklist.conf: Add superfluous stable commit IDs
- blacklist.conf: cleanup removing unused exported symbols, unavoidable kABI breakage
- blacklist.conf: for future infrastructure, and will need kABI workarounds in each user, only if we really need it
- blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).
- blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).
- blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).
- block/bio-integrity: do not free 'buf' if bio_integrity_add_page() failed (bsc#1173817).
- block: Fix use-after-free in blkdev_get() (bsc#1173834).
- block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).
- Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).
- Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).
- Bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).
- Bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).
- bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).
- bnxt_en: fix firmware message length endianness (bsc#1173894).
- bnxt_en: Fix return code to 'flash_device' (bsc#1173894).
- bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Return from timer if interface is not in open state (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).
- bpf: Document optval &gt; PAGE_SIZE behavior for sockopt hooks (bsc#1155518).
- bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).
- bpf: Do not return EINVAL from {get,set}sockopt when optlen &gt; PAGE_SIZE (bsc#1155518).
- bpf: Fix an error code in check_btf_func() (bsc#1154353).
- bpf: Fix map permissions check (bsc#1155518).
- bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).
- bpf: Restrict bpf_probe_read{, str}() only to archs where they work (bsc#1172344).
- bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier (bsc#1172344).
- bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).
- bpf, sockmap: Check update requirements after locking (git-fixes).
- bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).
- bpf, xdp, samples: Fix null pointer dereference in *_user code (bsc#1155518).
- brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).
- brcmfmac: fix wrong location to get firmware feature (git-fixes).
- brcmfmac: Transform compatible string for FW loading (bsc#1169771).
- bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).
- btrfs: add assertions for tree == inode-&gt;io_tree to extent IO helpers (bsc#1174438).
- btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).
- btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).
- btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).
- btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).
- btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).
- btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).
- btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).
- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).
- btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).
- bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).
- bus: ti-sysc: Ignore clockactivity unless specified as a quirk (git-fixes).
- carl9170: remove P2P_GO support (git-fixes).
- cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- CDC-ACM: heed quirk also in error handling (git-fixes).
- ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).
- ceph: allow rename operation under different quota realms (bsc#1172988).
- ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).
- ceph: convert mdsc-&gt;cap_dirty to a per-session list (bsc#1172984 bsc#1167104).
- ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).
- ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).
- ceph: do not return -ESTALE if there's still an open file (bsc#1171915).
- ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).
- ceph: fix potential race in ceph_check_caps (bsc#1172940).
- ceph: flush release queue when handling caps for unknown inode (bsc#1172939).
- ceph: make sure mdsc-&gt;mutex is nested in s-&gt;s_mutex to fix dead lock (bsc#1172989).
- ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).
- ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).
- ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).
- ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).
- ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).
- ceph: split up __finish_cap_flush (bsc#1172940).
- ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).
- char/random: Add a newline at the end of the file (jsc#SLE-12424).
- clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).
- clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).
- clk: clk-flexgen: fix clock-critical handling (git-fixes).
- clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).
- clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).
- clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).
- clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits (git-fixes).
- clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll-&gt;config_reg (git-fixes).
- clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).
- clk: sifive: allocate sufficient memory for struct __prci_data (git-fixes).
- clk: sprd: return correct type of value for _sprd_pll_recalc_rate (git-fixes).
- clk: sunxi: Fix incorrect usage of round_down() (git-fixes).
- clk: ti: am33xx: fix RTC clock parent (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).
- clocksource: dw_apb_timer: Make CPU-affiliation being optional (git-fixes).
- clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).
- component: Silence bind error on -EPROBE_DEFER (git-fixes).
- config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739
- coredump: fix crash when umh is disabled (git-fixes).
- coredump: fix null pointer dereference on coredump (git-fixes).
- cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).
- cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once (git-fixes).
- cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn (git-fixes).
- cpuidle: Fix three reference count leaks (git-fixes).
- crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).
- crypto: algboss - do not wait during notifier callback (git-fixes).
- crypto: algif_skcipher - Cap recv SG list at ctx-&gt;used (git-fixes).
- crypto - Avoid free() namespace collision (git-fixes).
- crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).
- crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).
- crypto/chcr: fix for ccm(aes) failed test (git-fixes).
- crypto: chelsio/chtls: properly set tp-&gt;lsndtime (git-fixes).
- crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).
- crypto: omap-sham - add proper load balancing support for multicore (git-fixes).
- crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).
- crypto: stm32/crc32 - fix multi-instance (git-fixes).
- crypto: stm32/crc32 - fix run-time self test issue (git-fixes).
- cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).
- cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).
- dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).
- debugfs: Check module state before warning in {full/open}_proxy_open() (bsc#1173746).
- devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).
- devlink: fix return value after hitting end in region read (networking-stable-20_05_12).
- devmap: Use bpf_map_area_alloc() for allocating hash buckets (bsc#1154353).
- /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).
- /dev/mem: Revoke mappings when a driver claims the region (git-fixes).
- dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).
- dma-debug: fix displaying of dma allocation type (git-fixes).
- dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).
- dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).
- dmaengine: dmatest: Restore default for channel (git-fixes).
- dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).
- dmaengine: dw: Initialize channel before each transfer (git-fixes).
- dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).
- dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).
- dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).
- dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).
- dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).
- dmaengine: mmp_tdma: Reset channel error on release (git-fixes).
- dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).
- dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).
- dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).
- dm: do not use waitqueue for request-based DM (bsc#1165933).
- dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).
- dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).
- dm writecache: reject asynchronous pmem devices (bsc#1156395).
- dpaa2-eth: prevent array underflow in update_cls_rule() (networking-stable-20_05_16).
- dpaa2-eth: properly handle buffer size restrictions (networking-stable-20_05_16).
- dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).
- dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).
- dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617).
- drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).
- drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).
- drm/amd/display: add basic atomic check for cursor plane (git-fixes).
- drm/amd/display: drop cursor position check in atomic test (git-fixes).
- drm: amd/display: fix Kconfig help text (bsc#1152489) 	* context changes
- drm/amd/display: Only revalidate bandwidth on medium and fast updates (git-fixes).
- drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).
- drm/amd/display: Revalidate bandwidth before commiting DC updates (git-fixes).
- drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).
- drm/amd: fix potential memleak in err branch (git-fixes).
- drm/amdgpu: add fw release for sdma v5_0 (git-fixes).
- drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).
- drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).
- drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).
- drm/amdgpu: fix gfx hang during suspend with video playback (v2) (git-fixes).
- drm/amdgpu: fix the hw hang during perform system reboot and reset (git-fixes).
- drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes
- drm/amdgpu: Init data to avoid oops while reading pp_num_states (git-fixes).
- drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).
- drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).
- drm/amdgpu: Replace invalid device ID with a valid device ID (bsc#1152472)
- drm/amdgpu/sdma5: fix wptr overwritten in -&gt;get_wptr() (git-fixes).
- drm/amdgpu: simplify padding calculations (v2) (git-fixes).
- drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).
- drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and raven (git-fixes).
- drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).
- drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).
- drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).
- drm/connector: notify userspace on hotplug after register complete (bsc#1152489) 	* context changes
- drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes
- drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).
- drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).
- drm: encoder_slave: fix refcouting error for modules (git-fixes).
- drm/etnaviv: fix perfmon domain interation (git-fixes).
- drm/etnaviv: rework perfmon query infrastructure (git-fixes).
- drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).
- drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)
- drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).
- drm/i915: extend audio CDCLK&gt;=2*BCLK constraint to more platforms (git-fixes).
- drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)
- drm/i915: fix port checks for MST support on gen &gt;= 11 (git-fixes).
- drm/i915/gem: Avoid iterating an empty list (git-fixes).
- drm/i915/gt: Do not schedule normal requests immediately along (bsc#1152489)
- drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)
- drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression. (bsc#1152489)
- drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).
- drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes
- drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).
- drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1152489)
- drm/i915: Limit audio CDCLK&gt;=2*BCLK constraint back to GLK only (git-fixes).
- drm/i915: Propagate error from completed fences (git-fixes).
- drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).
- drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).
- drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).
- drm: mcde: Fix display initialization problem (git-fixes).
- drm/mediatek: Check plane visibility in atomic_update (git-fixes).
- drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)
- drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).
- drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)
- drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).
- drm/msm: fix potential memleak in error branch (git-fixes).
- drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation (git-fixes).
- drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection (git-fixes).
- drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).
- drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).
- drm/qxl: Use correct notify port address when creating cursor ring (bsc#1152472)
- drm/radeon: fix double free (git-fixes).
- drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)
- drm: rcar-du: Fix build error (bsc#1152472)
- drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).
- drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)
- drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).
- drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).
- drm/tegra: hub: Do not enable orphaned window group (git-fixes).
- drm/vkms: Hold gem object while still in-use (git-fixes).
- Drop a couple of block layer git-fixes (bsc#1170891 bsc#1173139) Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport. (cherry picked from commit 70ad1b2fa5955d91e1a09a8027daf210e28fee30)
- Drop a couple of block layer git-fixes Upstream changed the partition usage counter check back and forth and ended up reverting all changes. Let's drop our the partial backport.
- dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).
- e1000: Distribute switch variables for initialization (git-fixes).
- e1000e: Disable TSO for buffer overrun workaround (git-fixes).
- e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).
- e1000e: Relax condition to trigger reset for ME workaround (git-fixes).
- EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).
- EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).
- EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).
- EDAC/synopsys: Do not dump uninitialized pinf-&gt;col (bsc#1152489).
- efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).
- efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).
- efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).
- efi/tpm: Verify event log header before parsing (bsc#1173461).
- eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).
- evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).
- evm: Fix a small race in init_desc() (git-fixes).
- evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).
- evm: Fix RCU list related warnings (git-fixes).
- exfat: add missing brelse() calls on error paths (git-fixes).
- exfat: fix incorrect update of stream entry in __exfat_truncate() (git-fixes).
- exfat: fix memory leak in exfat_parse_param() (git-fixes).
- exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).
- ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).
- ext4: fix error pointer dereference (bsc#1173837).
- ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).
- ext4: fix partial cluster initialization when splitting extent (bsc#1173839).
- ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).
- ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).
- ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).
- extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).
- fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).
- fat: do not allow to mount if the FAT length == 0 (bsc#1173831).
- fdt: add support for rng-seed (jsc#SLE-12424).
- fdt: Update CRC check for rng-seed (jsc#SLE-12424).
- firmware: imx: scu: Fix corruption of header (git-fixes).
- firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).
- firmware: imx-scu: Support one TX and one RX (git-fixes).
- firmware: imx: warn on unexpected RX (git-fixes).
- firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).
- firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).
- Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)
- fix multiplication overflow in copy_fdtable() (bsc#1173825).
- fork: prevent accidental access to clone3 features (bsc#1174018).
- fpga: dfl: afu: Corrected error handling levels (git-fixes).
- fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).
- fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).
- fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file
- fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).
- fuse: copy_file_range should truncate cache (git-fixes).
- fuse: fix copy_file_range cache issues (git-fixes).
- genetlink: clean up family attributes allocations (git-fixes).
- genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).
- geneve: allow changing DF behavior after creation (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- gfs2: fix glock reference problem in gfs2_trans_remove_revoke (bsc#1173823).
- gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).
- gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).
- gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).
- gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).
- gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).
- gpiolib: Document that GPIO line names are not globally unique (git-fixes).
- gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).
- gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).
- gpio: pca953x: fix handling of automatic address incrementing (git-fixes).
- gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).
- gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).
- gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).
- gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).
- gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).
- gpu: host1x: Detach driver on unregister (git-fixes).
- habanalabs: Align protection bits configuration of all TPCs (git-fixes).
- HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).
- HID: alps: Add AUI1657 device ID (git-fixes).
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).
- HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).
- HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).
- HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).
- HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).
- HID: magicmouse: do not set up autorepeat (git-fixes).
- HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).
- HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).
- HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).
- HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).
- HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).
- HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).
- hinic: fix a bug of ndo_stop (networking-stable-20_05_16).
- hinic: fix wrong para of wait_for_completion_timeout (networking-stable-20_05_16).
- hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).
- hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).
- hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (git-fixes).
- hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).
- hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).
- hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).
- hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).
- hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).
- i2c: acpi: put device when verifying client fails (git-fixes).
- i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).
- i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).
- i2c: core: check returned size of emulated smbus block read (git-fixes).
- i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).
- i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).
- i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).
- i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).
- i2c: eg20t: Load module automatically if ID matches (git-fixes).
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).
- i2c: fsi: Fix the port number field in status register (git-fixes).
- i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).
- IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).
- IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).
- ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).
- ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).
- ibmvnic: Flush existing work items before device removal (bsc#1065729).
- ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).
- IB/rdmavt: Free kernel completion queue when done (bsc#1173625).
- ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).
- ice: Fix inability to set channels when down (jsc#SLE-7926).
- ieee80211: Fix incorrect mask for default PE duration (git-fixes).
- iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).
- iio: adc: stm32-adc: fix device used to request dma (git-fixes).
- iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).
- iio: adc: ti-ads8344: Fix channel selection (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).
- iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:chemical:sps30: Fix timestamp alignment (git-fixes).
- iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).
- iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).
- iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).
- iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).
- iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).
- iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).
- iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).
- iio:pressure:ms5611 Fix buffer element alignment (git-fixes).
- iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).
- iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).
- iio: vcnl4000: Fix i2c swapped word reading (git-fixes).
- ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).
- ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223) 
- ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).
- ima: Remove __init annotation from ima_pcrread() (git-fixes).
- include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).
- Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).
- Input: edt-ft5x06 - fix get_default register write access (git-fixes).
- Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).
- Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).
- Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).
- Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).
- Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).
- input: i8042 - Remove special PowerPC handling (git-fixes).
- Input: mms114 - add extra compatible for mms345l (git-fixes).
- Input: mms114 - fix handling of mms345l (git-fixes).
- Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).
- Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).
- Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).
- Input: usbtouchscreen - add support for BonXeon TP (git-fixes).
- Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).
- intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).
- intel_th: pci: Add Emmitsburg PCH support (git-fixes).
- intel_th: pci: Add Jasper Lake CPU support (git-fixes).
- intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).
- iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).
- iocost: over-budget forced IOs should schedule async delay (bsc#1173206).
- iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).
- iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).
- iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).
- iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).
- iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).
- iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).
- iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).
- iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).
- iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).
- iommu/qcom: Fix local_base status check (bsc#1172067).
- iommu/virtio: Reverse arguments to list_add (bsc#1172068).
- iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).
- iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).
- ionic: add pcie_print_link_status (bsc#1167773).
- ionic: centralize queue reset code (bsc#1167773).
- ionic: export features for vlans to use (bsc#1167773).
- ionic: no link check while resetting queues (bsc#1167773).
- ionic: remove support for mgmt device (bsc#1167773).
- ionic: tame the watchdog timer on reconfig (bsc#1167773).
- ionic: update the queue count on open (bsc#1167773).
- ionic: wait on queue start until after IFF_UP (bsc#1167773).
- io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).
- ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).
- ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).
- ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).
- ipvs: Improve robustness to the ipvs sysctl (git-fixes).
- irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).
- irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).
- irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).
- irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).
- iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).
- iwlwifi: mvm: fix aux station leak (git-fixes).
- iwlwifi: mvm: limit maximum queue appropriately (git-fixes).
- iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).
- ixgbe: do not check firmware errors (bsc#1170284).
- jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).
- jbd2: fix data races at struct journal_head (bsc#1173438).
- jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).
- kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch (bsc1174263).
- kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- kabi: hv: prevent struct device_node to become defined (bsc#1172871).
- kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).
- kABI: protect struct fib_dump_filter (kabi).
- kABI: protect struct mlx5_cmd_work_ent (kabi).
- kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).
- kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third party.
- kABI workaround for struct hdac_bus changes (git-fixes).
- keys: asymmetric: fix error return code in software_key_query() (git-fixes).
- ktest: Add timeout for ssh sync testing (git-fixes).
- KVM: Check validity of resolved slot when searching memslots (bsc#1172069).
- KVM: nVMX: always update CR3 in VMCS (git-fixes).
- KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).
- KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).
- l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).
- l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).
- l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).
- libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).
- libceph: do not omit recovery_deletes in target_copy() (git-fixes).
- libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).
- lib: devres: add a helper function for ioremap_uc (git-fixes).
- libertas_tf: avoid a null dereference in pointer priv (git-fixes).
- lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).
- libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).
- libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).
- libnvdimm: cover up nd_region changes (bsc#1162400).
- libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).
- libnvdimm/label: Remove the dpa align check (bsc#1171759).
- libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).
- libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).
- libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).
- libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).
- libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).
- libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).
- libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).
- libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).
- libnvdimm/region: Fix build error (bsc#1162400).
- libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).
- libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).
- libnvdimm/region: Rewrite _probe_success() to _advance_seeds() (bsc#1171743).
- libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).
- lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).
- lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).
- list: Add hlist_unhashed_lockless() (bsc#1173438).
- livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).
- livepatch: Disallow vmlinux.ko (bsc#1071995).
- livepatch: Make klp_apply_object_relocs static (bsc#1071995).
- livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).
- livepatch: Remove .klp.arch (bsc#1071995).
- locktorture: Allow CPU-hotplug to be disabled via --bootargs (bsc#1173068).
- loop: replace kill_bdev with invalidate_bdev (bsc#1173820).
- lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).
- lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).
- lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).
- lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).
- lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).
- mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).
- mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).
- Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).
- mdraid: fix read/write bytes accounting (bsc#1172537).
- media: cec: silence shift wrapping warning in __cec_s_log_addrs() (git-fixes).
- media: cedrus: Program output format during each run (git-fixes).
- media: dvbdev: Fix tuner-&gt;demod media controller link (git-fixes).
- media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).
- media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).
- media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).
- media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling (git-fixes).
- media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).
- media: ov5640: fix use of destroyed mutex (git-fixes).
- media: platform: fcp: Set appropriate DMA parameters (git-fixes).
- media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).
- media: si2157: Better check for running tuner in init (git-fixes).
- media: si2168: add support for Mygica T230C v2 (bsc#1173776).
- media: staging: imgu: do not hold spinlock during freeing mmu page table (git-fixes).
- media: staging/intel-ipu3: Implement lock for stream on/off operations (git-fixes).
- media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).
- media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).
- media: vicodec: Fix error codes in probe function (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: release me_cl object reference (git-fixes).
- mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).
- mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).
- mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).
- mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).
- mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).
- misc: rtsx: Add short delay after exit from ASPM (git-fixes).
- mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).
- mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).
- mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).
- mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).
- mmc: block: Fix use-after-free issue for rpmb (git-fixes).
- mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).
- mmc: fix compilation of user API (git-fixes).
- mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).
- mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).
- mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).
- mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).
- mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).
- mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).
- mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).
- mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).
- mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).
- mmc: tmio: Further fixup runtime PM management at remove (git-fixes).
- mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).
- mmc: via-sdmmc: Respect the cmd-&gt;busy_timeout from the mmc core (git-fixes).
- mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).
- mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).
- mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).
- mm/memory_hotplug: refrain from adding memory into an impossible node (bsc#1173552).
- mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).
- mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).
- mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).
- mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).
- mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).
- move unsortable patch out of sorted section patches.suse/revert-zram-convert-remaining-class_attr-to-class_attr_ro
- mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).
- mtd: Fix mtd not registered due to nvmem name collision (git-fixes).
- mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).
- mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).
- mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).
- mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).
- mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).
- mtd: rawnand: ingenic: Fix the probe error path (git-fixes).
- mtd: rawnand: marvell: Fix probe error path (git-fixes).
- mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).
- mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).
- mtd: rawnand: mtk: Fix the probe error path (git-fixes).
- mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).
- mtd: rawnand: orion: Fix the probe error path (git-fixes).
- mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).
- mtd: rawnand: oxnas: Release all devices in the _remove() path (git-fixes).
- mtd: rawnand: pasemi: Fix the probe error path (git-fixes).
- mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).
- mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).
- mtd: rawnand: socrates: Fix the probe error path (git-fixes).
- mtd: rawnand: sunxi: Fix the probe error path (git-fixes).
- mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).
- mtd: rawnand: tmio: Fix the probe error path (git-fixes).
- mtd: rawnand: xway: Fix the probe error path (git-fixes).
- mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).
- mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).
- mvpp2: remove module bugfix (bsc#1154353).
- mwifiex: avoid -Wstringop-overflow warning (git-fixes).
- mwifiex: Fix memory corruption in dump_station (git-fixes).
- namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).
- nbd: Fix memory leak in nbd_add_socket (git-fixes).
- neigh: send protocol value in neighbor create notification (networking-stable-20_05_12).
- net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).
- net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).
- net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).
- net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).
- net: do not return invalid table id error when we fall back to PF_UNSPEC (networking-stable-20_05_27).
- net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).
- net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).
- net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).
- net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).
- net: dsa: bcm_sf2: Fix node reference count (git-fixes).
- net: dsa: declare lockless TX feature for slave ports (bsc#1154353).
- net: dsa: Do not leave DSA master with NULL netdev_ops (networking-stable-20_05_12).
- net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).
- net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).
- net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).
- net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).
- net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).
- net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend (networking-stable-20_05_27).
- net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).
- netfilter: connlabels: prefer static lock initialiser (git-fixes).
- netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).
- netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).
- netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).
- netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).
- netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).
- netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).
- netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).
- netfilter: not mark a spinlock as __read_mostly (git-fixes).
- net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).
- net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).
- net: hns3: check reset pending after FLR prepare (bsc#1154353).
- __netif_receive_skb_core: pass skb by reference (networking-stable-20_05_27).
- net: inet_csk: Fix so_reuseport bind-address cache in tb-&gt;fast* (networking-stable-20_05_27).
- net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).
- net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).
- net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).
- net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).
- net: macb: call pm_runtime_put_sync on failure path (git-fixes).
- net: macb: fix an issue about leak related system resources (networking-stable-20_05_12).
- net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).
- net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).
- net/mlx5: Add command entry handling completion (networking-stable-20_05_27).
- net/mlx5: Disable reload while removing the device (jsc#SLE-8464).
- net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).
- net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).
- net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).
- net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).
- net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).
- net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).
- net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).
- net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).
- net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).
- net/mlx5e: kTLS, Destroy key object after destroying the TIS (networking-stable-20_05_27).
- net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).
- net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).
- net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).
- net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).
- net/mlx5: Fix crash upon suspend/resume (bsc#1172365).
- net/mlx5: Fix error flow in case of function_setup failure (networking-stable-20_05_27).
- net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).
- net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).
- net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).
- net/mlx5: Fix memory leak in mlx5_events_init (networking-stable-20_05_27).
- net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del() (networking-stable-20_05_12).
- net: mvpp2: fix RX hashing for non-10G ports (networking-stable-20_05_27).
- net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx() (networking-stable-20_05_12).
- net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).
- net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).
- net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).
- net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).
- net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).
- net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).
- netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).
- net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).
- net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).
- net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).
- net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).
- net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).
- net_sched: sch_skbprio: add message validation to skbprio_change() (networking-stable-20_05_12).
- net/smc: fix restoring of fallback changes (git-fixes).
- net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).
- net: stmmac: do not attach interface until resume finishes (bsc#1174072).
- net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).
- net: stmmac: dwc-qos: use generic device api (bsc#1174072).
- net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).
- net: stmmac: fix num_por initialization (networking-stable-20_05_16).
- net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).
- net: stricter validation of untrusted gso packets (networking-stable-20_05_12).
- net: tc35815: Fix phydev supported/advertising mask (networking-stable-20_05_12).
- net: tcp: fix rx timestamp behavior for tcp_recvmsg (networking-stable-20_05_16).
- net/tls: fix encryption error checking (git-fixes).
- net/tls: fix race condition causing kernel panic (networking-stable-20_05_27).
- net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).
- net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).
- net/tls: free record only on encryption error (git-fixes).
- net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).
- net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).
- net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).
- net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).
- net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).
- nexthop: Fix attribute checking for groups (networking-stable-20_05_27).
- NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).
- nfp: abm: fix a memory leak bug (networking-stable-20_05_12).
- nfp: abm: fix error return code in nfp_abm_vnic_alloc() (networking-stable-20_05_16).
- nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).
- nfs: add minor version to nfs_server_key for fscache (bsc#1172467).
- nfsd4: fix nfsdfs reference count loop (git-fixes).
- nfsd4: make drc_slab global, not per-net (git-fixes).
- nfsd: always check return value of find_any_file (bsc#1172208).
- nfsd: apply umask on fs without ACL support (git-fixes).
- nfsd: fix nfsdfs inode reference count leak (git-fixes).
- NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).
- NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).
- nfs: fix NULL deference in nfs4_get_valid_delegation.
- nfs: fscache: use timespec64 in inode auxdata (git-fixes).
- nfs: set invalid blocks after NFSv4 writes (git-fixes).
- NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).
- NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).
- NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).
- ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).
- ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).
- ntb: intel: fix static declaration (jsc#SLE-12710).
- nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).
- nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).
- nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).
- nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).
- objtool: Allow no-op CFI ops in alternatives (bsc#1169514).
- objtool: Clean instruction state before each function validation (bsc#1169514).
- objtool: Fix !CFI insn_state propagation (bsc#1169514).
- objtool: Fix ORC vs alternatives (bsc#1169514).
- objtool: Ignore empty alternatives (bsc#1169514).
- objtool: Remove check preventing branches within alternative (bsc#1169514).
- objtool: Rename struct cfi_state (bsc#1169514).
- objtool: Uniquely identify alternative instruction groups (bsc#1169514).
- ovl: inode reference leak in ovl_is_inuse true case (git-fixes).
- p54usb: add AirVasT USB stick device-id (git-fixes).
- padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).
- padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).
- panic: do not print uninitialized taint_flags (bsc#1172814).
- PCI: aardvark: Do not blindly enable ASPM L0s and do not write to read-only register (git-fixes).
- PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints (git-fixes).
- PCI: Add Loongson vendor ID (git-fixes).
- PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).
- PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).
- PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).
- PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI: Avoid FLR for AMD Matisse HD Audio &amp; USB 3.0 (git-fixes).
- PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).
- PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).
- pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.
- PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).
- PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).
- PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).
- PCI: hv: Decouple the func definition in hv_dr_state from VSP message (bsc#1172871).
- PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871).
- PCI: hv: Introduce hv_msi_entry (bsc#1172871).
- PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871).
- PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).
- PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).
- PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).
- PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).
- PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).
- PCI: mobiveil: Add callback function for link up check (bsc#1161495).
- PCI: mobiveil: Add Header Type field check (bsc#1161495).
- PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).
- PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).
- PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).
- PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).
- PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).
- PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).
- PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).
- PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).
- PCI: mobiveil: Move the host initialization into a function (bsc#1161495).
- PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).
- PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).
- PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).
- PCI: Program MPS for RCiEP devices (git-fixes).
- PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).
- PCI: rcar: Fix incorrect programming of OB windows (git-fixes).
- pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).
- PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).
- PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).
- PCI: vmd: Filter resource type bits from shadow register (git-fixes).
- pcm_native: result of put_user() needs to be checked (git-fixes).
- percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).
- perf/core: Fix endless multiplex timer (git-fixes).
- perf/core: fix parent pid/tid in task exit events (git-fixes).
- pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).
- pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).
- pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).
- pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).
- pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).
- pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).
- pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).
- pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).
- pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).
- pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).
- pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).
- pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).
- platform/x86: asus_wmi: Reserve more space for struct bias_args (git-fixes).
- platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).
- platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (git-fixes).
- platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015) (git-fixes).
- platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).
- platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).
- platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).
- platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).
- platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).
- platform/x86: ISST: Increase timeout (bsc#1174185).
- PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- pnp: Use list_for_each_entry() instead of open coding (git-fixes).
- powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).
- powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).
- powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).
- powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).
- powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).
- powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).
- powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again (bsc#1172344).
- powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).
- powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).
- powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).
- powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).
- powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).
- powerpc/powernv: Fix a warning message (bsc#1156395).
- powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).
- powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).
- powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).
- power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).
- power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).
- power: supply: core: fix HWMON temperature labels (git-fixes).
- power: supply: core: fix memory leak in HWMON error path (git-fixes).
- power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).
- power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).
- pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).
- printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).
- proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).
- proc: Use new_inode not new_inode_pseudo (bsc#1173830).
- pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case (git-fixes).
- pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).
- r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).
- r8169: Revive default chip version for r8168 (bsc#1173085).
- raid5: remove gfp flags from scribble_alloc() (bsc#1166985).
- random: fix data races at timer_rand_state (bsc#1173438).
- rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).
- rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).
- rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).
- rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).
- rcutorture: Add 100-CPU configuration (bsc#1173068).
- rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).
- rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).
- rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).
- rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).
- rcutorture: Summarize summary of build and run results (bsc#1173068).
- rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).
- rcu: Use *_ONCE() to protect lockless -&gt;expmask accesses (bsc#1171828).
- rcu: Use WRITE_ONCE() for assignments to -&gt;pprev for hlist_nulls (bsc#1173438).
- RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).
- RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).
- RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).
- RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).
- RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).
- RDMA/srpt: Fix disabling device management (jsc#SLE-8449).
- RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).
- regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).
- regmap: fix alignment issue (git-fixes).
- regmap: Fix memory leak from regmap_register_patch (git-fixes).
- regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).
- remoteproc: Add missing '\n' in log messages (git-fixes).
- remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).
- remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).
- remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).
- remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use (git-fixes).
- Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (git-fixes).
- Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).
- Revert 'i2c: tegra: Fix suspending in active runtime PM state' (git-fixes).
- Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).
- Revert 'thermal: mediatek: fix register index error' (git-fixes).
- ring-buffer: Zero out time extend if it is nested and not absolute (git-fixes).
- rpm: drop execute permissions on source files Sometimes a source file with execute permission appears in upstream repository and makes it into our kernel-source packages. This is caught by OBS build checks and may even result in build failures. Sanitize the source tree by removing execute permissions from all C source and header files.
- rpm/modules.fips: add aes-ce-ccm, des3_ede-x86_64, aes_ti and aes_neon_bs 
- rtc: mc13xxx: fix a double-unlock issue (git-fixes).
- rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).
- rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).
- rtw88: fix an issue about leak system resources (git-fixes).
- rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).
- s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).
- s390: fix syscall_get_error for compat processes (git-fixes).
- s390/ism: fix error return code in ism_probe() (git-fixes).
- s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).
- s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).
- s390/pci: Log new handle in clp_disable_fh() (git-fixes).
- s390/qdio: consistently restore the IRQ handler (git-fixes).
- s390/qdio: put thinint indicator after early error (git-fixes).
- s390/qdio: tear down thinint indicator after early error (git-fixes).
- s390/qeth: fix error handling for isolation mode cmds (git-fixes).
- sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).
- sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).
- sched/cfs: change initial value of runnable_avg (bsc#1158765).
- sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).
- sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).
- sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/deadline: Initialize -&gt;dl_boosted (bsc#1172823).
- sched/deadline: Initialize -&gt;dl_boosted (git fixes (sched)).
- sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).
- sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix race against ptrace_freeze_trace() (bsc#1174345).
- sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).
- sched: Optimize ttwu() spinning on p-&gt;on_cpu (bnc#1158748, bnc#1159781).
- sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).
- sch_sfq: validate silly quantum values (networking-stable-20_05_12).
- scripts/decodecode: fix trapping instruction formatting (bsc#1065729).
- scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).
- scsi: libfc: free response frame from GPN_ID (bsc#1173849).
- scsi: libfc: Handling of extra kref (bsc#1173849).
- scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).
- scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).
- scsi: libfc: Skip additional kref updating work event (bsc#1173849).
- scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).
- scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).
- scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).
- scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).
- scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).
- scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).
- scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).
- scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).
- scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).
- scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).
- scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).
- scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).
- scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).
- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).
- scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).
- scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).
- scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).
- scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).
- scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).
- scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).
- scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).
- scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).
- scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).
- scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).
- scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).
- scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).
- scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).
- scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).
- scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).
- scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).
- scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).
- scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).
- scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).
- scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).
- scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).
- scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).
- scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).
- scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).
- scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).
- scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).
- scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).
- scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).
- scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).
- scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).
- scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).
- sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).
- sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).
- selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).
- selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).
- selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).
- selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).
- selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).
- selftests/bpf: Make sure optvals &gt; PAGE_SIZE are bypassed (bsc#1155518).
- selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).
- selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).
- selinux: fall back to ref-walk if audit is required (bsc#1174333).
- selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).
- serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).
- serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).
- signal: Avoid corrupting si_pid and si_uid in do_notify_parent (bsc#1171529).
- slimbus: core: Fix mismatch in of_node_get/put (git-fixes).
- slimbus: ngd: get drvdata from correct device (git-fixes).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- socionext: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- soc: mediatek: cmdq: return send msg error code (git-fixes).
- soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).
- soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).
- soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).
- soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).
- soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).
- soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).
- soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).
- spi: bcm2835aux: Fix controller unregister order (git-fixes).
- spi: bcm2835: Fix controller unregister order (git-fixes).
- spi: bcm-qspi: Handle clock probe deferral (git-fixes).
- spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).
- SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).
- spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).
- spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix controller unregister order (git-fixes).
- spi: dw: Fix native CS being unset (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).
- spi: dw-pci: Add runtime power management support (jsc#SLE-12735).
- spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).
- spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).
- spi: Fix controller unregister order (git-fixes).
- spi: fsl: do not map irq during probe (git-fixes).
- spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).
- spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).
- spi: pxa2xx: Fix controller unregister order (git-fixes).
- spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).
- spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).
- spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).
- spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).
- spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH (git-fixes).
- staging: comedi: verify array index is correct before using it (git-fixes).
- staging: iio: ad2s1210: Fix SPI reading (git-fixes).
- staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).
- staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).
- Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate() (git-fixes).
- staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).
- sun6i: dsi: fix gcc-4.8 (bsc#1152489)
- SUNRPC dont update timeout value on connection reset (bsc#1174263).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).
- supported.conf: Add pinctrl-tigerlake as supported
- supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)
- svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).
- tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).
- tcp: fix error recovery in tcp_zerocopy_receive() (networking-stable-20_05_16).
- tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).
- tcp: md5: allow changing MD5 keys in all socket states (git-fixes).
- team: fix hang in team_mode_get() (networking-stable-20_04_27).
- tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).
- thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).
- thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).
- thermal/drivers/rcar_gen3: Fix undefined temperature if negative (git-fixes).
- thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).
- thermal: int3403_thermal: Downgrade error message (git-fixes).
- thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).
- tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).
- timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).
- tipc: block BH before using dst_cache (networking-stable-20_05_27).
- tipc: fix partial topology connection closure (networking-stable-20_05_12).
- torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).
- torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).
- torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).
- torture: Handle systems lacking the mpstat command (bsc#1173068).
- torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).
- torture: Make results-directory date format completion-friendly (bsc#1173068).
- torture: Use gawk instead of awk for systime() function (bsc#1173068).
- tpm: Fix TIS locality timeout problems (git-fixes).
- tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).
- tpm_tis: extra chip-&gt;ops check on error path in tpm_tis_core_init (git-fixes).
- tpm_tis: Remove the HID IFX0102 (git-fixes).
- tracing: Fix event trigger to accept redundant spaces (git-fixes).
- tty: hvc_console, fix crashes on parallel open/close (git-fixes).
- tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).
- tty: n_gsm: Fix SOF skipping (git-fixes).
- tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).
- tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).
- tun: correct header offsets in napi frags mode (git-fixes).
- tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).
- ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).
- ubifs: remove broken lazytime support (bsc#1173826).
- udp: Copy has_conns in reuseport_grow() (git-fixes).
- udp: Improve load balancing for SO_REUSEPORT (git-fixes).
- usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).
- USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).
- usb: chipidea: core: add wakeup support for extcon (git-fixes).
- USB: core: Fix misleading driver bug report (git-fixes).
- usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).
- usb: dwc2: Fix shutdown callback in platform (git-fixes).
- usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).
- usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).
- usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).
- usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).
- usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).
- usb/ehci-platform: Set PM runtime as active on resume (git-fixes).
- USB: ehci: reopen solution for Synopsys HC bug (git-fixes).
- usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).
- USB: gadget: fix illegal array access in binding with UDC (git-fixes).
- usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).
- usb: gadget: fix potential double-free in m66592_probe (git-fixes).
- usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).
- usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).
- usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).
- usb: gadget: legacy: fix redundant initialization warnings (git-fixes).
- usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).
- usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).
- usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).
- usb: gadget: udc: atmel: Make some symbols static (git-fixes).
- usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).
- usb: gadget: udc: Potential Oops in error handling code (git-fixes).
- USB: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).
- usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (git-fixes).
- USB: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).
- usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).
- usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).
- usb: host: xhci-plat: keep runtime active when removing host (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usb: musb: Fix runtime PM imbalance on error (git-fixes).
- usb: musb: start session in resume for host port (git-fixes).
- usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).
- usb/ohci-platform: Fix a warning when hibernating (git-fixes).
- USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).
- USB: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).
- usb: renesas_usbhs: getting residue from callback_result (git-fixes).
- USB: serial: ch341: add basis for quirk detection (git-fixes).
- USB: serial: ch341: add new Product ID for CH340 (git-fixes).
- USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).
- USB: serial: iuu_phoenix: fix memory corruption (git-fixes).
- USB: serial: option: add GosunCn GM500 series (git-fixes).
- USB: serial: option: add Quectel EG95 LTE modem (git-fixes).
- USB: serial: option: add Telit LE910C1-EUX compositions (git-fixes).
- USB: serial: qcserial: add DW5816e QDL support (git-fixes).
- USB: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).
- usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs (git-fixes).
- usb: usbfs: correct kernel-&gt;user page attribute mismatch (git-fixes).
- USB: usbfs: fix mmap dma mismatch (git-fixes).
- usb/xhci-plat: Set PM runtime as active on resume (git-fixes).
- vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).
- vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).
- vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).
- vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).
- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).
- vfio/type1: Fix VA-&gt;PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).
- video: fbdev: w100fb: Fix a potential double free (git-fixes).
- video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)
- virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).
- virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).
- virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).
- virt: vbox: Fix guest capabilities mask check (git-fixes).
- virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).
- vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).
- vmxnet3: add support to get/set rx flow hash (bsc#1172484).
- vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).
- vmxnet3: prepare for version 4 changes (bsc#1172484).
- vmxnet3: update to version 4 (bsc#1172484).
- vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).
- vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).
- vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).
- vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).
- vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).
- vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).
- vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).
- vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).
- vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).
- w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).
- watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).
- wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).
- wil6210: account for napi_gro_receive never returning GRO_DROP (bsc#1154353).
- wil6210: add wil_netif_rx() helper function (bsc#1154353).
- wil6210: use after free in wil_netif_rx_any() (bsc#1154353).
- wireguard: device: avoid circular netns references (git-fixes).
- wireguard: noise: do not assign initiation time in if condition (git-fixes).
- wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).
- wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).
- wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).
- wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).
- wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).
- wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).
- work around mvfs bug (bsc#1162063).
- workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).
- workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).
- x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).
- x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).
- x86: Fix early boot crash on gcc-10, third try (bsc#1152489).
- x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).
- x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).
- x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).
- x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).
- x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).
- xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish (networking-stable-20_04_27).
- xfrm: fix error in comment (git fixes (block drivers)).
- xfs: clean up the error handling in xfs_swap_extents (git-fixes).
- xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).
- xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).
- xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).
- xfs: force writes to delalloc regions to unwritten (bsc#1158242).
- xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).
- xfs: preserve default grace interval during quotacheck (bsc#1172170).
- xfs: refactor agfl length computation function (bsc#1172169).
- xfs: split the sunit parameter update into two parts (bsc#1172169).
- xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).
- xhci: Fix incorrect EP_STATE_MASK (git-fixes).
- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).
- xhci: Return if xHCI does not support LPM (git-fixes).
- xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).
- workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-03"/>
	<updated date="2020-08-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157169">SUSE bug 1157169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158050">SUSE bug 1158050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158242">SUSE bug 1158242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158265">SUSE bug 1158265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158748">SUSE bug 1158748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158765">SUSE bug 1158765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158983">SUSE bug 1158983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159781">SUSE bug 1159781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159867">SUSE bug 1159867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160947">SUSE bug 1160947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161495">SUSE bug 1161495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162002">SUSE bug 1162002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162063">SUSE bug 1162063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162400">SUSE bug 1162400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1162702">SUSE bug 1162702</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164777">SUSE bug 1164777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164780">SUSE bug 1164780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165211">SUSE bug 1165211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165975">SUSE bug 1165975</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166985">SUSE bug 1166985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167104">SUSE bug 1167104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167651">SUSE bug 1167651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168230">SUSE bug 1168230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168779">SUSE bug 1168779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168959">SUSE bug 1168959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169021">SUSE bug 1169021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169094">SUSE bug 1169094</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169194">SUSE bug 1169194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169681">SUSE bug 1169681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169771">SUSE bug 1169771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170011">SUSE bug 1170011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170284">SUSE bug 1170284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170617">SUSE bug 1170617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170879">SUSE bug 1170879</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170891">SUSE bug 1170891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170895">SUSE bug 1170895</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171150">SUSE bug 1171150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171189">SUSE bug 1171189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171191">SUSE bug 1171191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171219">SUSE bug 1171219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171220">SUSE bug 1171220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171246">SUSE bug 1171246</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171417">SUSE bug 1171417</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171513">SUSE bug 1171513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171529">SUSE bug 1171529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171530">SUSE bug 1171530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171662">SUSE bug 1171662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171699">SUSE bug 1171699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171732">SUSE bug 1171732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171739">SUSE bug 1171739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171743">SUSE bug 1171743</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171759">SUSE bug 1171759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171828">SUSE bug 1171828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171857">SUSE bug 1171857</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171868">SUSE bug 1171868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171904">SUSE bug 1171904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171915">SUSE bug 1171915</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171982">SUSE bug 1171982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171983">SUSE bug 1171983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171988">SUSE bug 1171988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172017">SUSE bug 1172017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172046">SUSE bug 1172046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172061">SUSE bug 1172061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172062">SUSE bug 1172062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172063">SUSE bug 1172063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172064">SUSE bug 1172064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172065">SUSE bug 1172065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172066">SUSE bug 1172066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172067">SUSE bug 1172067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172068">SUSE bug 1172068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172069">SUSE bug 1172069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172086">SUSE bug 1172086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172095">SUSE bug 1172095</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172169">SUSE bug 1172169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172170">SUSE bug 1172170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172201">SUSE bug 1172201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172208">SUSE bug 1172208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172223">SUSE bug 1172223</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172342">SUSE bug 1172342</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172343">SUSE bug 1172343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172344">SUSE bug 1172344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172365">SUSE bug 1172365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172366">SUSE bug 1172366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172374">SUSE bug 1172374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172391">SUSE bug 1172391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172393">SUSE bug 1172393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172394">SUSE bug 1172394</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172453">SUSE bug 1172453</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172458">SUSE bug 1172458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172467">SUSE bug 1172467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172484">SUSE bug 1172484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172537">SUSE bug 1172537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172543">SUSE bug 1172543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172687">SUSE bug 1172687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172719">SUSE bug 1172719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172739">SUSE bug 1172739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172751">SUSE bug 1172751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172759">SUSE bug 1172759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172775">SUSE bug 1172775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172781">SUSE bug 1172781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172782">SUSE bug 1172782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172783">SUSE bug 1172783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172814">SUSE bug 1172814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172823">SUSE bug 1172823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172841">SUSE bug 1172841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172938">SUSE bug 1172938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172939">SUSE bug 1172939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172940">SUSE bug 1172940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172956">SUSE bug 1172956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172983">SUSE bug 1172983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172984">SUSE bug 1172984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172985">SUSE bug 1172985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172986">SUSE bug 1172986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172987">SUSE bug 1172987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172988">SUSE bug 1172988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172989">SUSE bug 1172989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172990">SUSE bug 1172990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172999">SUSE bug 1172999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173068">SUSE bug 1173068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173074">SUSE bug 1173074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173085">SUSE bug 1173085</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173139">SUSE bug 1173139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173206">SUSE bug 1173206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173271">SUSE bug 1173271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173280">SUSE bug 1173280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173284">SUSE bug 1173284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173428">SUSE bug 1173428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173438">SUSE bug 1173438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173461">SUSE bug 1173461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173514">SUSE bug 1173514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173552">SUSE bug 1173552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173573">SUSE bug 1173573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173625">SUSE bug 1173625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173776">SUSE bug 1173776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173817">SUSE bug 1173817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173818">SUSE bug 1173818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173820">SUSE bug 1173820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173822">SUSE bug 1173822</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173823">SUSE bug 1173823</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173824">SUSE bug 1173824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173825">SUSE bug 1173825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173826">SUSE bug 1173826</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173827">SUSE bug 1173827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173828">SUSE bug 1173828</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173830">SUSE bug 1173830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173831">SUSE bug 1173831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173832">SUSE bug 1173832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173833">SUSE bug 1173833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173834">SUSE bug 1173834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173836">SUSE bug 1173836</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173837">SUSE bug 1173837</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173838">SUSE bug 1173838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173839">SUSE bug 1173839</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173841">SUSE bug 1173841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173843">SUSE bug 1173843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173844">SUSE bug 1173844</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173845">SUSE bug 1173845</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173847">SUSE bug 1173847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173849">SUSE bug 1173849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173860">SUSE bug 1173860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173894">SUSE bug 1173894</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173941">SUSE bug 1173941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174018">SUSE bug 1174018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174072">SUSE bug 1174072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174116">SUSE bug 1174116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174126">SUSE bug 1174126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174127">SUSE bug 1174127</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174128">SUSE bug 1174128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174129">SUSE bug 1174129</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174185">SUSE bug 1174185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174244">SUSE bug 1174244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174263">SUSE bug 1174263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174264">SUSE bug 1174264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174331">SUSE bug 1174331</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174332">SUSE bug 1174332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174333">SUSE bug 1174333</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174345">SUSE bug 1174345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174356">SUSE bug 1174356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174396">SUSE bug 1174396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174398">SUSE bug 1174398</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174407">SUSE bug 1174407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174409">SUSE bug 1174409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174411">SUSE bug 1174411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174438">SUSE bug 1174438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174462">SUSE bug 1174462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174513">SUSE bug 1174513</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174527">SUSE bug 1174527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174543">SUSE bug 1174543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174627">SUSE bug 1174627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/962849">SUSE bug 962849</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19462/">CVE-2019-19462</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-20810/">CVE-2019-20810</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-20812/">CVE-2019-20812</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0305/">CVE-2020-0305</cve>
	<cve impact="moderate" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-10135/">CVE-2020-10135</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10711/">CVE-2020-10711</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10732/">CVE-2020-10732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-10751/">CVE-2020-10751</cve>
	<cve impact="moderate" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10766/">CVE-2020-10766</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10767/">CVE-2020-10767</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10768/">CVE-2020-10768</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-10773/">CVE-2020-10773</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-10781/">CVE-2020-10781</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12656/">CVE-2020-12656</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12769/">CVE-2020-12769</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12771/">CVE-2020-12771</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-12888/">CVE-2020-12888</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-13143/">CVE-2020-13143</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-13974/">CVE-2020-13974</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14416/">CVE-2020-14416</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15393/">CVE-2020-15393</cve>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-15780/">CVE-2020-15780</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509262" comment="kernel-default-extra-5.3.18-24.9.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111934" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174538" ref_url="https://bugzilla.suse.com/1174538" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15652" ref_url="https://www.suse.com/security/cve/CVE-2020-15652/" source="CVE"/>
		<reference ref_id="CVE-2020-15659" ref_url="https://www.suse.com/security/cve/CVE-2020-15659/" source="CVE"/>
		<reference ref_id="CVE-2020-6463" ref_url="https://www.suse.com/security/cve/CVE-2020-6463/" source="CVE"/>
		<reference ref_id="CVE-2020-6514" ref_url="https://www.suse.com/security/cve/CVE-2020-6514/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007246.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Updated to Mozilla Thunderbird 68.11:
  * Fixed various security issues (MFSA-2020-35, bsc#1174538).
  * Fixed CVE-2020-15652: Potential leak of redirect targets when loading scripts in a worker (bsc#1174538).
  * Fixed CVE-2020-6514: WebRTC data channel leaks internal address to peer (bsc#1174538).
  * Fixed CVE-2020-6463: Use-after-free in ANGLE gl::Texture::onUnbindAsSamplerTexture (bsc#1174538).
  * Fixed CVE-2020-15659: Memory safety bugs fixed in Thunderbird 68.11 (bsc#1174538).
  * Fixed a bug with FileLink attachments included as a link and file when added from a network drive via drag &amp; drop (bmo#793118).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-10"/>
	<updated date="2020-08-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174538">SUSE bug 1174538</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-15652/">CVE-2020-15652</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15659/">CVE-2020-15659</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-6463/">CVE-2020-6463</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-6514/">CVE-2020-6514</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509088" comment="MozillaThunderbird-68.11.0-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509089" comment="MozillaThunderbird-translations-common-68.11.0-3.91.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509090" comment="MozillaThunderbird-translations-other-68.11.0-3.91.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111935" version="1" class="patch">
	<metadata>
		<title>Security update for libreoffice (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1062631" ref_url="https://bugzilla.suse.com/1062631" source="BUGZILLA"/>
		<reference ref_id="1146025" ref_url="https://bugzilla.suse.com/1146025" source="BUGZILLA"/>
		<reference ref_id="1157627" ref_url="https://bugzilla.suse.com/1157627" source="BUGZILLA"/>
		<reference ref_id="1165849" ref_url="https://bugzilla.suse.com/1165849" source="BUGZILLA"/>
		<reference ref_id="1172053" ref_url="https://bugzilla.suse.com/1172053" source="BUGZILLA"/>
		<reference ref_id="1172189" ref_url="https://bugzilla.suse.com/1172189" source="BUGZILLA"/>
		<reference ref_id="1172795" ref_url="https://bugzilla.suse.com/1172795" source="BUGZILLA"/>
		<reference ref_id="1172796" ref_url="https://bugzilla.suse.com/1172796" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12802" ref_url="https://www.suse.com/security/cve/CVE-2020-12802/" source="CVE"/>
		<reference ref_id="CVE-2020-12803" ref_url="https://www.suse.com/security/cve/CVE-2020-12803/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007265.html" source="SUSE-SU"/>
		<description>
This update for libreoffice fixes the following issues:

- Update to 6.4.5.2:
  * Various fixes all around
- Remove mime-info and application-registry dirs bsc#1062631
- Fix bsc#1172053 - LO-L3: Image disappears during roundtrip 365-&gt;Impress-&gt;365
  * bsc1172053.diff
- Fix bsc#1172189 - LO-L3: Impress crashes midway opening a PPTX document
  * bsc1172189.diff
- Fix bsc#1157627 - LO-L3: Some XML-created shapes simply lost upon PPTX import (= earth loses countries)
  * bsc1157627.diff
- Fix bsc#1146025 - LO-L3: Colored textboxes in PPTX look very odd (SmartArt)
- Fix bsc#1165849 - LO-L3: Shadow size for rectangle is only a fraction of Office 365
  * bsc1165849-1.diff
  * bsc1165849-2.diff
  * bsc1165849-3.diff
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-13"/>
	<updated date="2020-08-13"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1062631">SUSE bug 1062631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1146025">SUSE bug 1146025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157627">SUSE bug 1157627</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165849">SUSE bug 1165849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172053">SUSE bug 1172053</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172189">SUSE bug 1172189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172795">SUSE bug 1172795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172796">SUSE bug 1172796</bugzilla>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-12802/">CVE-2020-12802</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12803/">CVE-2020-12803</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509263" comment="libreoffice-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509264" comment="libreoffice-base-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509265" comment="libreoffice-base-drivers-postgresql-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509266" comment="libreoffice-branding-upstream-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509267" comment="libreoffice-calc-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509268" comment="libreoffice-calc-extensions-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509269" comment="libreoffice-draw-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509270" comment="libreoffice-filters-optional-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509271" comment="libreoffice-gnome-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509272" comment="libreoffice-gtk3-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509273" comment="libreoffice-icon-themes-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509274" comment="libreoffice-impress-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509275" comment="libreoffice-l10n-af-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509276" comment="libreoffice-l10n-ar-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509277" comment="libreoffice-l10n-as-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509278" comment="libreoffice-l10n-bg-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509279" comment="libreoffice-l10n-bn-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509280" comment="libreoffice-l10n-br-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509281" comment="libreoffice-l10n-ca-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509282" comment="libreoffice-l10n-cs-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509283" comment="libreoffice-l10n-cy-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509284" comment="libreoffice-l10n-da-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509285" comment="libreoffice-l10n-de-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509286" comment="libreoffice-l10n-dz-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509287" comment="libreoffice-l10n-el-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509288" comment="libreoffice-l10n-en-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509289" comment="libreoffice-l10n-eo-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509290" comment="libreoffice-l10n-es-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509291" comment="libreoffice-l10n-et-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509292" comment="libreoffice-l10n-eu-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509293" comment="libreoffice-l10n-fa-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509294" comment="libreoffice-l10n-fi-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509295" comment="libreoffice-l10n-fr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509296" comment="libreoffice-l10n-ga-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509297" comment="libreoffice-l10n-gl-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509298" comment="libreoffice-l10n-gu-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509299" comment="libreoffice-l10n-he-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509300" comment="libreoffice-l10n-hi-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509301" comment="libreoffice-l10n-hr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509302" comment="libreoffice-l10n-hu-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509303" comment="libreoffice-l10n-it-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509304" comment="libreoffice-l10n-ja-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509305" comment="libreoffice-l10n-kk-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509306" comment="libreoffice-l10n-kn-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509307" comment="libreoffice-l10n-ko-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509308" comment="libreoffice-l10n-lt-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509309" comment="libreoffice-l10n-lv-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509310" comment="libreoffice-l10n-mai-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509311" comment="libreoffice-l10n-ml-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509312" comment="libreoffice-l10n-mr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509313" comment="libreoffice-l10n-nb-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509314" comment="libreoffice-l10n-nl-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509315" comment="libreoffice-l10n-nn-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509316" comment="libreoffice-l10n-nr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509317" comment="libreoffice-l10n-nso-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509318" comment="libreoffice-l10n-or-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509319" comment="libreoffice-l10n-pa-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509320" comment="libreoffice-l10n-pl-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509321" comment="libreoffice-l10n-pt_BR-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509322" comment="libreoffice-l10n-pt_PT-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509323" comment="libreoffice-l10n-ro-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509324" comment="libreoffice-l10n-ru-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509325" comment="libreoffice-l10n-si-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509326" comment="libreoffice-l10n-sk-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509327" comment="libreoffice-l10n-sl-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509328" comment="libreoffice-l10n-sr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509329" comment="libreoffice-l10n-ss-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509330" comment="libreoffice-l10n-st-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509331" comment="libreoffice-l10n-sv-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509332" comment="libreoffice-l10n-ta-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509333" comment="libreoffice-l10n-te-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509334" comment="libreoffice-l10n-th-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509335" comment="libreoffice-l10n-tn-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509336" comment="libreoffice-l10n-tr-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509337" comment="libreoffice-l10n-ts-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509338" comment="libreoffice-l10n-uk-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509339" comment="libreoffice-l10n-ve-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509340" comment="libreoffice-l10n-xh-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509341" comment="libreoffice-l10n-zh_CN-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509342" comment="libreoffice-l10n-zh_TW-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509343" comment="libreoffice-l10n-zu-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509344" comment="libreoffice-mailmerge-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509345" comment="libreoffice-math-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509346" comment="libreoffice-officebean-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509347" comment="libreoffice-pyuno-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509348" comment="libreoffice-writer-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509349" comment="libreoffice-writer-extensions-6.4.5.2-13.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509350" comment="libreofficekit-6.4.5.2-13.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111936" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174633" ref_url="https://bugzilla.suse.com/1174633" source="BUGZILLA"/>
		<reference ref_id="1174635" ref_url="https://bugzilla.suse.com/1174635" source="BUGZILLA"/>
		<reference ref_id="1174638" ref_url="https://bugzilla.suse.com/1174638" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14345" ref_url="https://www.suse.com/security/cve/CVE-2020-14345/" source="CVE"/>
		<reference ref_id="CVE-2020-14346" ref_url="https://www.suse.com/security/cve/CVE-2020-14346/" source="CVE"/>
		<reference ref_id="CVE-2020-14347" ref_url="https://www.suse.com/security/cve/CVE-2020-14347/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2240-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-August/007302.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14347: Leak of uninitialized heap memory from the X server to clients on pixmap allocation (bsc#1174633, ZDI-CAN-11426).
- CVE-2020-14346: XIChangeHierarchy Integer Underflow Privilege Escalation Vulnerability (bsc#1174638, ZDI-CAN-11429).
- CVE-2020-14345: XKB out-of-bounds access privilege escalation vulnerability (bsc#1174635, ZDI-CAN-11428).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-08-25"/>
	<updated date="2020-08-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174633">SUSE bug 1174633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174635">SUSE bug 1174635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174638">SUSE bug 1174638</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14345/">CVE-2020-14345</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14346/">CVE-2020-14346</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-14347/">CVE-2020-14347</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509351" comment="xorg-x11-server-wayland-1.20.3-22.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111937" version="1" class="patch">
	<metadata>
		<title>Security update for freerdp (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174321" ref_url="https://bugzilla.suse.com/1174321" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15103" ref_url="https://www.suse.com/security/cve/CVE-2020-15103/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2408-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007324.html" source="SUSE-SU"/>
		<description>
This update for freerdp fixes the following issues:

- CVE-2020-15103: Fix integer overflow due to missing input sanitation in rdpegfx channel (bsc#1174321).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-01"/>
	<updated date="2020-09-01"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1174321">SUSE bug 1174321</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15103/">CVE-2020-15103</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509352" comment="freerdp-2.1.2-15.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509353" comment="freerdp-devel-2.1.2-15.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509354" comment="libfreerdp2-2.1.2-15.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509355" comment="libwinpr2-2.1.2-15.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509356" comment="winpr2-devel-2.1.2-15.10.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111938" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174910" ref_url="https://bugzilla.suse.com/1174910" source="BUGZILLA"/>
		<reference ref_id="1174913" ref_url="https://bugzilla.suse.com/1174913" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14361" ref_url="https://www.suse.com/security/cve/CVE-2020-14361/" source="CVE"/>
		<reference ref_id="CVE-2020-14362" ref_url="https://www.suse.com/security/cve/CVE-2020-14362/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007335.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-14361: Fix XkbSelectEvents() integer underflow (bsc#1174910 ZDI-CAN-11573).
- CVE-2020-14362: Fix XRecordRegisterClients() Integer underflow (bsc#1174913 ZDI-CAN-11574).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-02"/>
	<updated date="2020-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174910">SUSE bug 1174910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174913">SUSE bug 1174913</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14361/">CVE-2020-14361</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14362/">CVE-2020-14362</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509357" comment="xorg-x11-server-wayland-1.20.3-22.5.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111939" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1071995" ref_url="https://bugzilla.suse.com/1071995" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1120163" ref_url="https://bugzilla.suse.com/1120163" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1154488" ref_url="https://bugzilla.suse.com/1154488" source="BUGZILLA"/>
		<reference ref_id="1154492" ref_url="https://bugzilla.suse.com/1154492" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159058" ref_url="https://bugzilla.suse.com/1159058" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1169790" ref_url="https://bugzilla.suse.com/1169790" source="BUGZILLA"/>
		<reference ref_id="1171634" ref_url="https://bugzilla.suse.com/1171634" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172108" ref_url="https://bugzilla.suse.com/1172108" source="BUGZILLA"/>
		<reference ref_id="1172197" ref_url="https://bugzilla.suse.com/1172197" source="BUGZILLA"/>
		<reference ref_id="1172247" ref_url="https://bugzilla.suse.com/1172247" source="BUGZILLA"/>
		<reference ref_id="1172418" ref_url="https://bugzilla.suse.com/1172418" source="BUGZILLA"/>
		<reference ref_id="1172871" ref_url="https://bugzilla.suse.com/1172871" source="BUGZILLA"/>
		<reference ref_id="1172963" ref_url="https://bugzilla.suse.com/1172963" source="BUGZILLA"/>
		<reference ref_id="1173468" ref_url="https://bugzilla.suse.com/1173468" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1173798" ref_url="https://bugzilla.suse.com/1173798" source="BUGZILLA"/>
		<reference ref_id="1173813" ref_url="https://bugzilla.suse.com/1173813" source="BUGZILLA"/>
		<reference ref_id="1173954" ref_url="https://bugzilla.suse.com/1173954" source="BUGZILLA"/>
		<reference ref_id="1174002" ref_url="https://bugzilla.suse.com/1174002" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174026" ref_url="https://bugzilla.suse.com/1174026" source="BUGZILLA"/>
		<reference ref_id="1174205" ref_url="https://bugzilla.suse.com/1174205" source="BUGZILLA"/>
		<reference ref_id="1174247" ref_url="https://bugzilla.suse.com/1174247" source="BUGZILLA"/>
		<reference ref_id="1174362" ref_url="https://bugzilla.suse.com/1174362" source="BUGZILLA"/>
		<reference ref_id="1174387" ref_url="https://bugzilla.suse.com/1174387" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174625" ref_url="https://bugzilla.suse.com/1174625" source="BUGZILLA"/>
		<reference ref_id="1174645" ref_url="https://bugzilla.suse.com/1174645" source="BUGZILLA"/>
		<reference ref_id="1174689" ref_url="https://bugzilla.suse.com/1174689" source="BUGZILLA"/>
		<reference ref_id="1174699" ref_url="https://bugzilla.suse.com/1174699" source="BUGZILLA"/>
		<reference ref_id="1174737" ref_url="https://bugzilla.suse.com/1174737" source="BUGZILLA"/>
		<reference ref_id="1174757" ref_url="https://bugzilla.suse.com/1174757" source="BUGZILLA"/>
		<reference ref_id="1174762" ref_url="https://bugzilla.suse.com/1174762" source="BUGZILLA"/>
		<reference ref_id="1174770" ref_url="https://bugzilla.suse.com/1174770" source="BUGZILLA"/>
		<reference ref_id="1174771" ref_url="https://bugzilla.suse.com/1174771" source="BUGZILLA"/>
		<reference ref_id="1174777" ref_url="https://bugzilla.suse.com/1174777" source="BUGZILLA"/>
		<reference ref_id="1174805" ref_url="https://bugzilla.suse.com/1174805" source="BUGZILLA"/>
		<reference ref_id="1174824" ref_url="https://bugzilla.suse.com/1174824" source="BUGZILLA"/>
		<reference ref_id="1174825" ref_url="https://bugzilla.suse.com/1174825" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1174865" ref_url="https://bugzilla.suse.com/1174865" source="BUGZILLA"/>
		<reference ref_id="1174880" ref_url="https://bugzilla.suse.com/1174880" source="BUGZILLA"/>
		<reference ref_id="1174897" ref_url="https://bugzilla.suse.com/1174897" source="BUGZILLA"/>
		<reference ref_id="1174906" ref_url="https://bugzilla.suse.com/1174906" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175009" ref_url="https://bugzilla.suse.com/1175009" source="BUGZILLA"/>
		<reference ref_id="1175010" ref_url="https://bugzilla.suse.com/1175010" source="BUGZILLA"/>
		<reference ref_id="1175011" ref_url="https://bugzilla.suse.com/1175011" source="BUGZILLA"/>
		<reference ref_id="1175012" ref_url="https://bugzilla.suse.com/1175012" source="BUGZILLA"/>
		<reference ref_id="1175013" ref_url="https://bugzilla.suse.com/1175013" source="BUGZILLA"/>
		<reference ref_id="1175014" ref_url="https://bugzilla.suse.com/1175014" source="BUGZILLA"/>
		<reference ref_id="1175015" ref_url="https://bugzilla.suse.com/1175015" source="BUGZILLA"/>
		<reference ref_id="1175016" ref_url="https://bugzilla.suse.com/1175016" source="BUGZILLA"/>
		<reference ref_id="1175017" ref_url="https://bugzilla.suse.com/1175017" source="BUGZILLA"/>
		<reference ref_id="1175018" ref_url="https://bugzilla.suse.com/1175018" source="BUGZILLA"/>
		<reference ref_id="1175019" ref_url="https://bugzilla.suse.com/1175019" source="BUGZILLA"/>
		<reference ref_id="1175020" ref_url="https://bugzilla.suse.com/1175020" source="BUGZILLA"/>
		<reference ref_id="1175021" ref_url="https://bugzilla.suse.com/1175021" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175112" ref_url="https://bugzilla.suse.com/1175112" source="BUGZILLA"/>
		<reference ref_id="1175116" ref_url="https://bugzilla.suse.com/1175116" source="BUGZILLA"/>
		<reference ref_id="1175128" ref_url="https://bugzilla.suse.com/1175128" source="BUGZILLA"/>
		<reference ref_id="1175149" ref_url="https://bugzilla.suse.com/1175149" source="BUGZILLA"/>
		<reference ref_id="1175175" ref_url="https://bugzilla.suse.com/1175175" source="BUGZILLA"/>
		<reference ref_id="1175176" ref_url="https://bugzilla.suse.com/1175176" source="BUGZILLA"/>
		<reference ref_id="1175180" ref_url="https://bugzilla.suse.com/1175180" source="BUGZILLA"/>
		<reference ref_id="1175181" ref_url="https://bugzilla.suse.com/1175181" source="BUGZILLA"/>
		<reference ref_id="1175182" ref_url="https://bugzilla.suse.com/1175182" source="BUGZILLA"/>
		<reference ref_id="1175183" ref_url="https://bugzilla.suse.com/1175183" source="BUGZILLA"/>
		<reference ref_id="1175184" ref_url="https://bugzilla.suse.com/1175184" source="BUGZILLA"/>
		<reference ref_id="1175185" ref_url="https://bugzilla.suse.com/1175185" source="BUGZILLA"/>
		<reference ref_id="1175186" ref_url="https://bugzilla.suse.com/1175186" source="BUGZILLA"/>
		<reference ref_id="1175187" ref_url="https://bugzilla.suse.com/1175187" source="BUGZILLA"/>
		<reference ref_id="1175188" ref_url="https://bugzilla.suse.com/1175188" source="BUGZILLA"/>
		<reference ref_id="1175189" ref_url="https://bugzilla.suse.com/1175189" source="BUGZILLA"/>
		<reference ref_id="1175190" ref_url="https://bugzilla.suse.com/1175190" source="BUGZILLA"/>
		<reference ref_id="1175191" ref_url="https://bugzilla.suse.com/1175191" source="BUGZILLA"/>
		<reference ref_id="1175192" ref_url="https://bugzilla.suse.com/1175192" source="BUGZILLA"/>
		<reference ref_id="1175195" ref_url="https://bugzilla.suse.com/1175195" source="BUGZILLA"/>
		<reference ref_id="1175199" ref_url="https://bugzilla.suse.com/1175199" source="BUGZILLA"/>
		<reference ref_id="1175213" ref_url="https://bugzilla.suse.com/1175213" source="BUGZILLA"/>
		<reference ref_id="1175232" ref_url="https://bugzilla.suse.com/1175232" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175284" ref_url="https://bugzilla.suse.com/1175284" source="BUGZILLA"/>
		<reference ref_id="1175296" ref_url="https://bugzilla.suse.com/1175296" source="BUGZILLA"/>
		<reference ref_id="1175344" ref_url="https://bugzilla.suse.com/1175344" source="BUGZILLA"/>
		<reference ref_id="1175345" ref_url="https://bugzilla.suse.com/1175345" source="BUGZILLA"/>
		<reference ref_id="1175346" ref_url="https://bugzilla.suse.com/1175346" source="BUGZILLA"/>
		<reference ref_id="1175347" ref_url="https://bugzilla.suse.com/1175347" source="BUGZILLA"/>
		<reference ref_id="1175367" ref_url="https://bugzilla.suse.com/1175367" source="BUGZILLA"/>
		<reference ref_id="1175377" ref_url="https://bugzilla.suse.com/1175377" source="BUGZILLA"/>
		<reference ref_id="1175440" ref_url="https://bugzilla.suse.com/1175440" source="BUGZILLA"/>
		<reference ref_id="1175493" ref_url="https://bugzilla.suse.com/1175493" source="BUGZILLA"/>
		<reference ref_id="1175546" ref_url="https://bugzilla.suse.com/1175546" source="BUGZILLA"/>
		<reference ref_id="1175550" ref_url="https://bugzilla.suse.com/1175550" source="BUGZILLA"/>
		<reference ref_id="1175654" ref_url="https://bugzilla.suse.com/1175654" source="BUGZILLA"/>
		<reference ref_id="1175691" ref_url="https://bugzilla.suse.com/1175691" source="BUGZILLA"/>
		<reference ref_id="1175768" ref_url="https://bugzilla.suse.com/1175768" source="BUGZILLA"/>
		<reference ref_id="1175769" ref_url="https://bugzilla.suse.com/1175769" source="BUGZILLA"/>
		<reference ref_id="1175770" ref_url="https://bugzilla.suse.com/1175770" source="BUGZILLA"/>
		<reference ref_id="1175771" ref_url="https://bugzilla.suse.com/1175771" source="BUGZILLA"/>
		<reference ref_id="1175772" ref_url="https://bugzilla.suse.com/1175772" source="BUGZILLA"/>
		<reference ref_id="1175774" ref_url="https://bugzilla.suse.com/1175774" source="BUGZILLA"/>
		<reference ref_id="1175775" ref_url="https://bugzilla.suse.com/1175775" source="BUGZILLA"/>
		<reference ref_id="1175834" ref_url="https://bugzilla.suse.com/1175834" source="BUGZILLA"/>
		<reference ref_id="1175873" ref_url="https://bugzilla.suse.com/1175873" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14314" ref_url="https://www.suse.com/security/cve/CVE-2020-14314/" source="CVE"/>
		<reference ref_id="CVE-2020-14331" ref_url="https://www.suse.com/security/cve/CVE-2020-14331/" source="CVE"/>
		<reference ref_id="CVE-2020-14356" ref_url="https://www.suse.com/security/cve/CVE-2020-14356/" source="CVE"/>
		<reference ref_id="CVE-2020-16166" ref_url="https://www.suse.com/security/cve/CVE-2020-16166/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007350.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-14314: Fixed a potential negative array index in ext4 (bsc#1173798).
- CVE-2020-14331: Fixed a missing check in scrollback handling  (bsc#1174205 bsc#1174247).
- CVE-2020-14356: Fixed a NULL pointer dereference in the cgroupv2 subsystem (bsc#1175213).
- CVE-2020-16166: Fixed an information leak in the network RNG (bsc#1174757).

The following non-security bugs were fixed:

- 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- af_key: pfkey_dump needs parameter validation (git-fixes).
- agp/intel: Fix a memory leak on module initialisation failure (git-fixes).
- ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).
- ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).
- ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).
- ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).
- ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).
- ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).
- ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).
- ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).
- ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).
- ALSA: echoaudio: Remove redundant check (git-fixes).
- ALSA: firewire: fix kernel-doc (git-fixes).
- ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).
- ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).
- ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).
- ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).
- ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).
- ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).
- ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).
- ALSA: hda/realtek - Fix unused variable warning (git-fixes).
- ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).
- ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).
- ALSA: hda/realtek: Add model alc298-samsung-headphone (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Flex Book (git-fixes).
- ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).
- ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).
- ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).
- ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).
- ALSA: hda/tegra: Disable sync-write operation (git-fixes).
- ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).
- ALSA: hda: avoid reset of sdo_limit (git-fixes).
- ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).
- ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).
- ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).
- ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).
- ALSA: isa/gus: remove 'set but not used' warning (git-fixes).
- ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).
- ALSA: isa: fix spelling mistakes in the comments (git-fixes).
- ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).
- ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).
- ALSA: pci/asihpi: fix kernel-doc (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).
- ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).
- ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).
- ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).
- ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).
- ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).
- ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).
- ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).
- ALSA: pci/fm801: fix kernel-doc (git-fixes).
- ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).
- ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).
- ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).
- ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).
- ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).
- ALSA: seq: oss: Serialize ioctls (git-fixes).
- ALSA: usb-audio: Add capture support for Saffire 6 (USB 1.1) (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).
- ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).
- ALSA: usb-audio: add startech usb audio dock name (git-fixes).
- ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).
- ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).
- ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).
- ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).
- ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).
- ALSA: usb-audio: Fix some typos (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'buss' -&gt; 'bus' (git-fixes).
- ALSA: usb-audio: ignore broken processing/extension unit (git-fixes).
- ALSA: usb-audio: Update documentation comment for MS2109 quirk (git-fixes).
- ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).
- ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).
- ALSA: vx_core: remove warning for empty loop body (git-fixes).
- ALSA: xen: remove 'set but not used' warning (git-fixes).
- ALSA: xen: Remove superfluous fall through comments (git-fixes).
- appletalk: Fix atalk_proc_init() return path (git-fixes).
- arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).
- arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).
- arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).
- arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).
- arm64: csum: Fix handling of bad packets (bsc#1175192).
- arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).
- arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).
- arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).
- arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).
- arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).
- arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).
- arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).
- arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).
- arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).
- arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).
- arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).
- arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).
- arm64: dts: uDPU: fix broken ethernet (bsc#1175344).
- arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).
- arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).
- arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).
- arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).
- arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).
- arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).
- arm64: kexec_file: print appropriate variable (bsc#1175187).
- arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).
- arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).
- arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).
- arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).
- arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).
- arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).
- arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).
- arm64: vdso: do not free unallocated pages (bsc#1175181).
- arm: percpu.h: fix build error (git-fixes).
- arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).
- ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).
- ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).
- ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).
- ASoC: intel: Fix memleak in sst_media_open (git-fixes).
- ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).
- ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).
- ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).
- ASoC: msm8916-wcd-analog: fix register Interrupt offset (git-fixes).
- ASoC: q6afe-dai: mark all widgets registers as SND_SOC_NOPM (git-fixes).
- ASoC: q6routing: add dummy register read/write function (git-fixes).
- ASoC: SOF: nocodec: add missing .owner field (git-fixes).
- ASoC: wm8994: Avoid attempts to read unreadable registers (git-fixes).
- ath10k: Acquire tx_lock in tx error paths (git-fixes).
- ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).
- ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).
- ath9k: Fix regression with Atheros 9271 (git-fixes).
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).
- AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).
- AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).
- AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).
- b43: Remove uninitialized_var() usage (git-fixes).
- bdc: Fix bug causing crash after multiple disconnects (git-fixes).
- bfq: fix blkio cgroup leakage v4 (bsc#1175775).
- block: Fix the type of 'sts' in bsg_queue_rq() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).
- Bluetooth: btusb: fix up firmware download sequence (git-fixes).
- Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).
- Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).
- Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).
- Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).
- bnxt_en: fix NULL dereference in case SR-IOV configuration fails (networking-stable-20_07_17).
- bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).
- bonding: fix active-backup failover for current ARP slave (bsc#1174771).
- bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).
- bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).
- bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).
- bpfilter: fix up a sparse annotation (bsc#1155518).
- bpfilter: Initialize pos variable (bsc#1155518).
- bpfilter: reject kernel addresses (bsc#1155518).
- bpfilter: switch to kernel_write (bsc#1155518).
- brcmfmac: keep SDIO watchdog running when console_interval is non-zero (git-fixes).
- brcmfmac: set state of hanger slot to FREE when flushing PSQ (git-fixes).
- brcmfmac: Set timeout value when configuring power save (bsc#1173468).
- brcmfmac: To fix Bss Info flag definition Bug (git-fixes).
- btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).
- btrfs: add helper to get the end offset of a file extent item (bsc#1175546).
- btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).
- btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).
- btrfs: delete the ordered isize update code (bsc#1175377).
- btrfs: do not set path-&gt;leave_spinning for truncate (bsc#1175377).
- btrfs: factor out inode items copy loop from btrfs_log_inode() (bsc#1175546).
- btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).
- btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).
- btrfs: fix block group leak when removing fails (bsc#1175149).
- btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).
- btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).
- btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).
- btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).
- btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).
- btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).
- btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).
- btrfs: fix memory leaks after failure to lookup checksums during inode logging (bsc#1175550).
- btrfs: fix missing file extent item for hole after ranged fsync (bsc#1175546).
- btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).
- btrfs: fix race between block group removal and block group creation (bsc#1175149).
- btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).
- btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).
- btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).
- btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).
- btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).
- btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).
- btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).
- btrfs: introduce per-inode file extent tree (bsc#1175377).
- btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).
- btrfs: make full fsyncs always operate on the entire file again (bsc#1175546).
- btrfs: make ranged full fsyncs more efficient (bsc#1175546).
- btrfs: move extent_io_tree defs to their own header (bsc#1175377).
- btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).
- btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).
- btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).
- btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).
- btrfs: qgroup: try to flush qgroup space when we get -EDQUOT (bsc#1120163).
- btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).
- btrfs: Remove leftover of in-band dedupe (bsc#1175149).
- btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).
- btrfs: remove useless check for copy_items() return value (bsc#1175546).
- btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).
- btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).
- btrfs: separate out the extent io init function (bsc#1175377).
- btrfs: separate out the extent leak code (bsc#1175377).
- btrfs: treat RWF_{,D}SYNC writes as sync for CRCs (bsc#1175493).
- btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).
- btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).
- btrfs: use the file extent tree infrastructure (bsc#1175377).
- cfg80211: check vendor command doit pointer before use (git-fixes).
- clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).
- clk: at91: clk-generated: check best_rate against ranges (git-fixes).
- clk: at91: clk-generated: continue if __clk_determine_rate() returns error (git-fixes).
- clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).
- clk: at91: sam9x60-pll: use logical or for range check (git-fixes).
- clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).
- clk: at91: sckc: register slow_rc with accuracy option (git-fixes).
- clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).
- clk: bcm63xx-gate: fix last clock availability (git-fixes).
- clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).
- clk: iproc: round clock rate to the closest (git-fixes).
- clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).
- clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).
- clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).
- clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).
- clk: spear: Remove uninitialized_var() usage (git-fixes).
- clk: st: Remove uninitialized_var() usage (git-fixes).
- console: newport_con: fix an issue about leak related system resources (git-fixes).
- cpumap: Use non-locked version __ptr_ring_consume_batched (git-fixes).
- crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).
- crypto: aesni - add compatibility with IAS (git-fixes).
- crypto: aesni - Fix build with LLVM_IAS=1 (git-fixes).
- crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).
- crypto: ccp - Fix use of merged scatterlists (git-fixes).
- crypto: ccree - fix resource leak on error path (git-fixes).
- crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).
- crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).
- devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).
- devres: keep both device name and resource name in pretty name (git-fixes).
- dlm: Fix kobject memleak (bsc#1175768).
- dlm: remove BUG() before panic() (git-fixes).
- dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).
- dmaengine: ioat setting ioat timeout as module parameter (git-fixes).
- dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).
- docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)
- drbd: Remove uninitialized_var() usage (git-fixes).
- driver core: Avoid binding drivers to dead devices (git-fixes).
- drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).
- drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).
- drivers: hv: vmbus: Only notify Hyper-V for die events that are oops (bsc#1175128).
- drm/amd/display: Fix EDID parsing after resume from suspend (git-fixes).
- drm/amd/display: fix pow() crashing when given base 0 (git-fixes).
- drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)
- drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).
- drm/amd/powerplay: fix compile error with ARCH=arc (git-fixes).
- drm/amdgpu/display bail early in dm_pp_get_static_clocks (git-fixes).
- drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0
- drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).
- drm/amdgpu: avoid dereferencing a NULL pointer (git-fixes).
- drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).
- drm/amdgpu: fix preemption unit test (git-fixes).
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).
- drm/arm: fix unintentional integer overflow on left shift (git-fixes).
- drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes
- drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).
- drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).
- drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).
- drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes
- drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -&gt; tinydrm/mipi-dbi.c
- drm/debugfs: fix plain echo to connector 'force' attribute (git-fixes).
- drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).
- drm/etnaviv: fix ref count leak via pm_runtime_get_sync (git-fixes).
- drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).
- drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes
- drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).
- drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).
- drm/i915/gt: Move new timelines to the end of active_list (git-fixes).
- drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes
- drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).
- drm/i915: Actually emit the await_start (bsc#1174737).
- drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).
- drm/i915: Do not poison i915_request.link on removal (bsc#1174737).
- drm/i915: Drop no-semaphore boosting (bsc#1174737).
- drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).
- drm/i915: Flush execution tasklets before checking request status (bsc#1174737).
- drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).
- drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).
- drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).
- drm/i915: Keep track of request among the scheduling lists (bsc#1174737).
- drm/i915: Lock signaler timeline while navigating (bsc#1174737).
- drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).
- drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).
- drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).
- drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes
- drm/i915: Peel dma-fence-chains for await (bsc#1174737).
- drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).
- drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).
- drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).
- drm/i915: Rely on direct submission to the queue (bsc#1174737).
- drm/i915: Remove wait priority boosting (bsc#1174737).
- drm/i915: Reorder await_execution before await_request (bsc#1174737).
- drm/i915: Return early for await_start on same timeline (bsc#1174737).
- drm/i915: Use EAGAIN for trylock failures (bsc#1174737).
- drm/imx: fix use after free (git-fixes).
- drm/imx: imx-ldb: Disable both channels for split mode in enc-&gt;disable() (git-fixes).
- drm/imx: tve: fix regulator_disable error path (git-fixes).
- drm/ingenic: Fix incorrect assumption about plane-&gt;index (bsc#1152489) 	* refreshed for context changes
- drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).
- drm/msm: ratelimit crtc event overflow error (git-fixes).
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).
- drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).
- drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).
- drm/nouveau/kms/nv50-: Fix disabling dithering (git-fixes).
- drm/nouveau: fix multiple instances of reference count leaks (git-fixes).
- drm/nouveau: fix reference count leak in nouveau_debugfs_strap_peek (git-fixes).
- drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).
- drm/radeon: disable AGP by default (git-fixes).
- drm/radeon: fix array out-of-bounds read and write issues (git-fixes).
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync (git-fixes).
- drm/stm: repair runtime power management (git-fixes).
- drm/tilcdc: fix leak &amp; null ref in panel_connector_get_modes (git-fixes).
- drm/ttm/nouveau: do not call tt destroy callback on alloc failure (git-fixes bsc#1175232).
- drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes
- drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).
- drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).
- drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).
- drm: hold gem reference until object is no longer accessed (git-fixes).
- drm: msm: a6xx: fix gpu failure after system resume (git-fixes).
- drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).
- drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).
- dyndbg: fix a BUG_ON in ddebug_describe_flags (git-fixes).
- enetc: Fix tx rings bitmap iteration range, irq handling (networking-stable-20_06_28).
- ext2: fix missing percpu_counter_inc (bsc#1175774).
- ext4: check journal inode extents more carefully (bsc#1173485).
- ext4: do not allow overlapping system zones (bsc#1173485).
- ext4: do not BUG on inconsistent journal feature (bsc#1171634).
- ext4: fix checking of directory entry validity for inline directories (bsc#1175771).
- ext4: handle error of ext4_setup_system_zone() on remount (bsc#1173485).
- fbdev: Detect integer underflow at 'struct fbcon_ops'-&gt;clear_margins (git-fixes).
- firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).
- firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).
- firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).
- firmware: Fix a reference count leak (git-fixes).
- firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).
- firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).
- firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).
- firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).
- firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).
- firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).
- firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).
- firmware_loader: fix memory leak for paged buffer (bsc#1175367).
- fpga: dfl: fix bug in port reset handshake (git-fixes).
- fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).
- fuse: fix weird page warning (bsc#1175175).
- genetlink: remove genl_bind (networking-stable-20_07_17).
- geneve: fix an uninitialized value in geneve_changelink() (git-fixes).
- genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).
- genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).
- genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).
- gfs2: Another gfs2_find_jhead fix (bsc#1174824).
- gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).
- go7007: add sanity checking for endpoints (git-fixes).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: arizona: put pm_runtime in case of failure (git-fixes).
- gpio: max77620: Fix missing release of interrupt (git-fixes).
- gpu: host1x: debug: Fix multiple channels emitting messages simultaneously (git-fixes).
- habanalabs: increase timeout during reset (git-fixes).
- HID: alps: support devices with report id 2 (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).
- HID: input: Fix devices that return multiple bytes in battery report (git-fixes).
- HID: steam: fixes race in handling device list (git-fixes).
- hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).
- hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).
- hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).
- i2c: also convert placeholder function to return errno (git-fixes).
- i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).
- i2c: i801: Add support for Intel Comet Lake PCH-V (jsc#SLE-13411).
- i2c: i801: Add support for Intel Emmitsburg PCH (jsc#SLE-13411).
- i2c: i801: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- i2c: iproc: fix race between client unreg and isr (git-fixes).
- i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).
- i2c: rcar: avoid race when unregistering slave (git-fixes).
- i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).
- i2c: slave: add sanity check when unregistering (git-fixes).
- i2c: slave: improve sanity check when registering (git-fixes).
- i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).
- i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).
- i40iw: Report correct firmware version (git-fixes).
- IB/cma: Fix ports memory leak in cma_configfs (git-fixes).
- IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).
- IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).
- IB/hfi1: Ensure pq is not left on waitlist (git-fixes).
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).
- IB/mad: Fix use after free when destroying MAD agent (git-fixes).
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).
- IB/mlx5: Fix 50G per lane indication (git-fixes).
- IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).
- IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).
- IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).
- IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).
- IB/rdmavt: Delete unused routine (git-fixes).
- IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).
- IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).
- ibmveth: Fix use of ibmveth in a bridge (bsc#1174387 ltc#187506).
- ibmvnic fix NULL tx_pools and rx_tools issue at do_reset (bsc#1175873 ltc#187922).
- ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).
- ice: Clear and free XLT entries on reset (jsc#SLE-7926).
- ice: Graceful error handling in HW table calloc failure (jsc#SLE-7926).
- ide: Remove uninitialized_var() usage (git-fixes).
- ieee802154: fix one possible memleak in adf7242_probe (git-fixes).
- igc: Fix PTP initialization (bsc#1160634).
- iio: improve IIO_CONCENTRATION channel type description (git-fixes).
- Input: elan_i2c - only increment wakeup count on touch (git-fixes).
- Input: psmouse - add a newline when printing 'proto' by sysfs (git-fixes).
- Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- integrity: remove redundant initialization of variable ret (git-fixes).
- io-mapping: indicate mapping failure (git-fixes).
- ionic: fix up filter locks and debug msgs (bsc#1167773).
- ionic: keep rss hash after fw update (bsc#1167773).
- ionic: unlock queue mutex in error path (bsc#1167773).
- ionic: update filter id after replay (bsc#1167773).
- ionic: use mutex to protect queue operations (bsc#1167773).
- ionic: use offset for ethtool regs data (bsc#1167773).
- ip6_gre: fix null-ptr-deref in ip6gre_init_net() (git-fixes).
- ip6_gre: fix use-after-free in ip6gre_tunnel_lookup() (networking-stable-20_06_28).
- ip_tunnel: fix use-after-free in ip_tunnel_lookup() (networking-stable-20_06_28).
- ipv4: fill fl4_icmp_{type,code} in ping_v4_sendmsg (networking-stable-20_07_17).
- ipv6: fib6_select_path can not use out path for nexthop objects (networking-stable-20_07_17).
- ipv6: Fix use of anycast address with loopback (networking-stable-20_07_17).
- ipvs: fix the connection sync failed in some cases (bsc#1174699).
- irqchip/gic: Atomically update affinity (bsc#1175195).
- iwlegacy: Check the return value of pcie_capability_read_*() (git-fixes).
- jbd2: add the missing unlock_buffer() in the error path of jbd2_write_superblock() (bsc#1175772).
- kABI workaround for enum cpuhp_state (git-fixes).
- kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.
- kABI workaround for struct kvm_vcpu_arch (git-fixes). Add a struct variable to the end of kvm_vcpu_arch and kvm_vcpu_arch is embedded into kvm_vcpu at the end. It is usually used by pointer and allocated dynamically, so this change should be fine even for external kvm module.
- kABI/severities: ignore KABI for NVMe, except nvme-fc (bsc#1174777) Exported symbols under drivers/nvme/host/ are only used by the nvme subsystem itself, except for the nvme-fc symbols.
- kABI/severities: ignore qla2xxx as all symbols are internal
- kABI: genetlink: remove genl_bind (kabi).
- kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).
- kernel.h: remove duplicate include of asm/div64.h (git-fixes).
- kernel/relay.c: fix memleak on destroy relay channel (git-fixes).
- kernfs: do not call fsnotify() with name without a parent (bsc#1175770).
- kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).
- KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).
- KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).
- KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Annotate hyp NMI-related functions as __always_inline (bsc#1175190).
- KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).
- KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).
- KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).
- KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Stop clobbering x0 for HVC_SOFT_RESTART (bsc#1133021).
- KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).
- KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).
- KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).
- KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).
- KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).
- KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).
- KVM: PPC: Book3S PR: Remove uninitialized_var() usage (bsc#1065729).
- KVM: Reinstall old memslots if arch preparation fails (bsc#1133021).
- KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).
- KVM: x86: Fix APIC page invalidation race (bsc#1133021).
- l2tp: remove skb_dst_set() from l2tp_xmit_skb() (networking-stable-20_07_17).
- leds: 88pm860x: fix use-after-free on unbind (git-fixes).
- leds: core: Flush scheduled work for system suspend (git-fixes).
- leds: da903x: fix use-after-free on unbind (git-fixes).
- leds: gpio: Fix semantic error (git-fixes).
- leds: lm3533: fix use-after-free on unbind (git-fixes).
- leds: lm355x: avoid enum conversion warning (git-fixes).
- leds: lm36274: fix use-after-free on unbind (git-fixes).
- leds: wm831x-status: fix use-after-free on unbind (git-fixes).
- libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).
- liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).
- llc: make sure applications use ARPHRD_ETHER (networking-stable-20_07_17).
- locktorture: Print ratio of acquisitions, not failures (bsc#1149032).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: fix misplaced while instead of if (git-fixes).
- mac80211: mesh: Free ie data when leaving mesh (git-fixes).
- mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).
- Mark the SLE15-SP2 kernel properly released. There perhaps was a typo, when SUSE_KERNEL_RELEASED missed the trailing 'D' - this leads to our kernels being marked as 'Unreleased kernel'. SUSE_KERNEL_RELEASED is defined in rpm/kernel-binary.spec.in. To fix that, it should be enough to switch from SUSE_KERNEL_RELEASE to SUSE_KERNEL_RELEASED.
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (git-fixes).
- md/raid5: Fix Force reconstruct-write io stuck in degraded raid5 (git-fixes).
- media: budget-core: Improve exception handling in budget_register() (git-fixes).
- media: camss: fix memory leaks on error handling paths in probe (git-fixes).
- media: cxusb-analog: fix V4L2 dependency (git-fixes).
- media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).
- media: firewire: Using uninitialized values in node_probe() (git-fixes).
- media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).
- media: media-request: Fix crash if memory allocation fails (git-fixes).
- media: nuvoton-cir: remove setting tx carrier functions (git-fixes).
- media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).
- media: rockchip: rga: Introduce color fmt macros and refactor CSC mode logic (git-fixes).
- media: rockchip: rga: Only set output CSC mode for RGB input (git-fixes).
- media: sur40: Remove uninitialized_var() usage (git-fixes).
- media: vpss: clean up resources in init (git-fixes).
- media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).
- mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).
- mfd: dln2: Run event handler loop under spinlock (git-fixes).
- mfd: intel-lpss: Add Intel Tiger Lake PCH-H PCI IDs (jsc#SLE-13411).
- mld: fix memory leak in ipv6_mc_destroy_dev() (networking-stable-20_06_28).
- mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).
- mlxsw: pci: Fix use-after-free in case of failed devlink reload (networking-stable-20_07_17).
- mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (networking-stable-20_07_17).
- mm, vmstat: reduce zone-&gt;lock holding time by /proc/pagetypeinfo (bsc#1175691).
- mm/vunmap: add cond_resched() in vunmap_pmd_range (bsc#1175654 ltc#184617).
- mm: filemap: clear idle flag for writes (bsc#1175769).
- mm: Fix protection usage propagation (bsc#1174002).
- mmc: sdhci-cadence: do not use hardware tuning for SD mode (git-fixes).
- mmc: sdhci-pci-o2micro: Bug fix for O2 host controller Seabird1 (git-fixes).
- mtd: properly check all write ioctls for permissions (git-fixes).
- mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).
- mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).
- mvpp2: ethtool rxtx stats fix (networking-stable-20_06_28).
- mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).
- mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).
- mwifiex: Prevent memory corruption handling keys (git-fixes).
- ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).
- net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).
- net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).
- net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).
- net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).
- net/mlx5: DR, Change push vlan action sequence (jsc#SLE-8464).
- net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).
- net/mlx5: Fix eeprom support for SFP module (networking-stable-20_07_17).
- net/mlx5e: Fix 50G per lane indication (networking-stable-20_07_17).
- net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).
- net: Added pointer check for dst-&gt;ops-&gt;neigh_lookup in dst_neigh_lookup_skb (networking-stable-20_07_17).
- net: bridge: enfore alignment for ethernet address (networking-stable-20_06_28).
- net: core: reduce recursion limit value (networking-stable-20_06_28).
- net: Do not clear the sock TX queue in sk_set_socket() (networking-stable-20_06_28).
- net: dsa: microchip: set the correct number of ports (networking-stable-20_07_17).
- net: ena: add reserved PCI device ID (bsc#1174852).
- net: ena: add support for reporting of packet drops (bsc#1174852).
- net: ena: add support for the rx offset feature (bsc#1174852).
- net: ena: add support for traffic mirroring (bsc#1174852).
- net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).
- net: ena: allow setting the hash function without changing the key (bsc#1174852).
- net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).
- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).
- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).
- net: ena: change default RSS hash function to Toeplitz (bsc#1174852).
- net: ena: Change WARN_ON expression in ena_del_napi_in_range() (bsc#1154492).
- net: ena: changes to RSS hash key allocation (bsc#1174852).
- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).
- net: ena: cosmetic: code reorderings (bsc#1174852).
- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).
- net: ena: cosmetic: fix line break issues (bsc#1174852).
- net: ena: cosmetic: fix spacing issues (bsc#1174852).
- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).
- net: ena: cosmetic: minor code changes (bsc#1174852).
- net: ena: cosmetic: remove unnecessary code (bsc#1174852).
- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).
- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).
- net: ena: cosmetic: satisfy gcc warning (bsc#1174852).
- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).
- net: ena: drop superfluous prototype (bsc#1174852).
- net: ena: enable support of rss hash key and function changes (bsc#1174852).
- net: ena: ethtool: clean up minor indentation issue (bsc#1174852).
- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).
- net: ena: fix continuous keep-alive resets (bsc#1174852).
- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).
- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).
- net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).
- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).
- net: ena: Make missed_tx stat incremental (git-fixes).
- net: ena: Make some functions static (bsc#1174852).
- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).
- net: ena: Prevent reset after device destruction (git-fixes).
- net: ena: reduce driver load time (bsc#1174852).
- net: ena: remove code that does nothing (bsc#1174852).
- net: ena: remove set but not used variable 'hash_key' (bsc#1174852).
- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).
- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).
- net: ena: support new LLQ acceleration mode (bsc#1174852).
- net: ena: use explicit variable size for clarity (bsc#1174852).
- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).
- net: Fix a documentation bug wrt. ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)
- net: fix memleak in register_netdevice() (networking-stable-20_06_28).
- net: Fix the arp error in some cases (networking-stable-20_06_28).
- net: hns3: fix error handling for desc filling (git-fixes).
- net: hns3: fix for not calculating TX BD send size correctly (git-fixes).
- net: hns3: fix return value error when query MAC link status fail (git-fixes).
- net: increment xmit_recursion level in dev_direct_xmit() (networking-stable-20_06_28).
- net: lan78xx: add missing endpoint sanity check (git-fixes).
- net: lan78xx: fix transfer-buffer memory leak (git-fixes).
- net: lan78xx: replace bogus endpoint lookup (git-fixes).
- net: mvneta: fix use of state-&gt;speed (networking-stable-20_07_17).
- net: phy: Check harder for errors in get_phy_id() (git-fixes).
- net: phy: fix memory leak in device-create error path (git-fixes).
- net: qrtr: Fix an out of bounds read qrtr_endpoint_post() (networking-stable-20_07_17).
- net: usb: ax88179_178a: fix packet alignment padding (networking-stable-20_06_28).
- net: usb: qmi_wwan: add support for Quectel EG95 LTE modem (networking-stable-20_07_17).
- net_sched: fix a memory leak in atm_tc_init() (networking-stable-20_07_17).
- netdevsim: fix unbalaced locking in nsim_create() (git-fixes).
- nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ntb: Fix static check warning in perf_clear_test (git-fixes).
- ntb: Fix the default port and peer numbers for legacy drivers (git-fixes).
- ntb: hw: remove the code that sets the DMA mask (git-fixes).
- ntb: ntb_pingpong: Choose doorbells based on port number (git-fixes).
- ntb: ntb_test: Fix bug when counting remote files (git-fixes).
- ntb: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).
- ntb: perf: Do not require one more memory window than number of peers (git-fixes).
- ntb: perf: Fix race condition when run with ntb_test (git-fixes).
- ntb: perf: Fix support for hardware that does not have port numbers (git-fixes).
- ntb: Revert the change to use the NTB device dev for DMA allocations (git-fixes).
- ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).
- ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).
- nvme-multipath: do not fall back to __nvme_find_path() for non-optimized paths (bsc#1172108).
- nvme-multipath: fix logic for non-optimized paths (bsc#1172108).
- nvme-multipath: round-robin: eliminate 'fallback' variable (bsc#1172108).
- nvme-multipath: set bdi capabilities once (bsc#1159058).
- nvme-pci: Re-order nvme_pci_free_ctrl (bsc#1159058).
- nvme-rdma: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: Add warning on state change failure at (bsc#1159058).
- nvme-tcp: fix possible crash in write_zeroes processing (bsc#1159058).
- nvme: add a Identify Namespace Identification Descriptor list quirk (git-fixes).
- nvme: always search for namespace head (bsc#1159058).
- nvme: avoid an Identify Controller command for each namespace (bsc#1159058).
- nvme: check namespace head shared property (bsc#1159058).
- nvme: clean up nvme_scan_work (bsc#1159058).
- nvme: cleanup namespace identifier reporting in (bsc#1159058).
- nvme: consolidate chunk_sectors settings (bsc#1159058).
- nvme: consolodate io settings (bsc#1159058).
- nvme: expose hostid via sysfs for fabrics controllers (bsc#1159058).
- nvme: expose hostnqn via sysfs for fabrics controllers (bsc#1159058).
- nvme: factor out a nvme_ns_remove_by_nsid helper (bsc#1159058).
- nvme: fix a crash in nvme_mpath_add_disk (git-fixes, bsc#1159058).
- nvme: Fix controller creation races with teardown flow (bsc#1159058).
- nvme: Fix ctrl use-after-free during sysfs deletion (bsc#1159058).
- nvme: fix identify error status silent ignore (git-fixes, bsc#1159058).
- nvme: fix possible hang when ns scanning fails during error (bsc#1159058).
- nvme: kABI fixes for nvme_ctrl (bsc#1159058).
- nvme: Make nvme_uninit_ctrl symmetric to nvme_init_ctrl (bsc#1159058).
- nvme: multipath: round-robin: fix single non-optimized path case (bsc#1172108).
- nvme: prevent double free in nvme_alloc_ns() error handling (bsc#1159058).
- nvme: provide num dword helper (bsc#1159058).
- nvme: refactor nvme_identify_ns_descs error handling (bsc#1159058).
- nvme: refine the Qemu Identify CNS quirk (bsc#1159058).
- nvme: release ida resources (bsc#1159058).
- nvme: release namespace head reference on error (bsc#1159058).
- nvme: remove the magic 1024 constant in nvme_scan_ns_list (bsc#1159058).
- nvme: remove unused parameter (bsc#1159058).
- nvme: Remove unused return code from nvme_delete_ctrl_sync (bsc#1159058).
- nvme: rename __nvme_find_ns_head to nvme_find_ns_head (bsc#1159058).
- nvme: revalidate after verifying identifiers (bsc#1159058).
- nvme: revalidate namespace stream parameters (bsc#1159058).
- nvme: unlink head after removing last namespace (bsc#1159058).
- ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).
- ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).
- ocfs2: fix remounting needed after setfacl command (bsc#1173954).
- ocfs2: load global_inode_alloc (bsc#1172963).
- omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).
- openvswitch: take into account de-fragmentation/gso_size in execute_check_pkt_len (networking-stable-20_06_28).
- PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).
- PCI: Fix pci_cfg_wait queue locking problem (git-fixes).
- PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).
- PCI: hv: Fix a timing issue which causes kdump to fail occasionally (bsc#1172871, git-fixes).
- PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).
- PCI: qcom: Add missing reset for ipq806x (git-fixes).
- PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).
- PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).
- PCI: rcar: Fix runtime PM imbalance on error (git-fixes).
- PCI: Release IVRS table in AMD ACS quirk (git-fixes).
- PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).
- PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).
- PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).
- phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).
- phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).
- phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).
- phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).
- pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).
- pinctrl: single: fix function name in documentation (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).
- platform/x86: asus-nb-wmi: add support for ASUS ROG Zephyrus G14 and G15 (git-fixes).
- platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).
- platform/x86: ISST: Add new PCI device ids (git-fixes).
- PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).
- power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).
- powerpc/64s: Do not init FSCR_DSCR in __init_FSCR() (bsc#1065729).
- powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).
- powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).
- powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).
- powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).
- powerpc/fadump: Fix build error with CONFIG_PRESERVE_FA_DUMP=y (bsc#1156395).
- powerpc/iommu: Allow bypass-only for DMA (bsc#1156395).
- powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).
- powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).
- powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- powerpc/perf: Fix missing is_sier_aviable() during build (bsc#1065729).
- powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).
- powerpc/pseries/hotplug-cpu: wait indefinitely for vCPU death (bsc#1085030 ltC#165630).
- powerpc/pseries: Do not initiate shutdown when system is running on UPS (bsc#1175440 ltc#187574).
- powerpc/pseries: PCIE PHB reset (bsc#1174689).
- powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).
- powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).
- powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).
- powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).
- powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- pseries: Fix 64 bit logical memory block panic (bsc#1065729).
- pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).
- qed: suppress 'do not support RoCE &amp; iWARP' flooding on HW init (git-fixes).
- qed: suppress false-positives interrupt error messages on HW init (git-fixes).
- r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).
- r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).
- r8169: fix resume on cable plug-in (bsc#1175296).
- r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).
- r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).
- r8169: read common register for PCI commit (bsc#1175296).
- random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).
- random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).
- random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).
- RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).
- RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).
- RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).
- RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).
- RDMA/cm: Remove a race freeing timewait_info (git-fixes).
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).
- RDMA/core: Fix double destruction of uobject (git-fixes).
- RDMA/core: Fix double put of resource (git-fixes).
- RDMA/core: Fix missing error check on dev_set_name() (git-fixes).
- RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).
- RDMA/core: Fix race between destroy and release FD object (git-fixes).
- RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).
- RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).
- RDMA/counter: Query a counter before release (git-fixes).
- RDMA/efa: Set maximum pkeys device attribute (git-fixes).
- RDMA/hns: Bugfix for querying qkey (git-fixes).
- RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).
- RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).
- RDMA/iwcm: Fix iwcm work deallocation (git-fixes).
- RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).
- RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).
- RDMA/mlx5: Add init2init as a modify command (git-fixes).
- RDMA/mlx5: Add missing srcu_read_lock in ODP implicit flow (jsc#SLE-8446).
- RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).
- RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).
- RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).
- RDMA/mlx5: Fix typo in enum name (git-fixes).
- RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).
- RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).
- RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).
- RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).
- RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).
- RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).
- RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).
- RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).
- RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).
- RDMA/rxe: Set default vendor ID (git-fixes).
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).
- RDMA/siw: Fix failure handling during device creation (git-fixes).
- RDMA/siw: Fix passive connection establishment (git-fixes).
- RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).
- RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).
- RDMA/siw: Fix reporting vendor_part_id (git-fixes).
- RDMA/siw: Fix setting active_mtu attribute (git-fixes).
- RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).
- RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).
- RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: gpio: Honor regulator-boot-on property (git-fixes).
- remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).
- remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).
- Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).
- Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes
- Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).
- Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).
- Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).
- Revert 'scsi: qla2xxx: Disable T10-DIF feature with FC-NVMe during probe' (bsc#1171688 bsc#1174003).
- Revert 'scsi: qla2xxx: Fix crash on qla2x00_mailbox_command' (bsc#1171688 bsc#1174003).
- rhashtable: Document the right function parameters (bsc#1174880).
- rhashtable: drop duplicated word in &lt;linux/rhashtable.h&gt; (bsc#1174880).
- rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).
- rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).
- rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).
- RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).
- rocker: fix incorrect error handling in dma_rings_init (networking-stable-20_06_28).
- rpm/modules.fips: * add ecdh_generic (boo#1173813)
- rtc: goldfish: Enable interrupt in set_alarm() when necessary (git-fixes).
- rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (bsc#1154353).
- rtnetlink: Fix memory(net_device) leak when -&gt;newlink fails (git-fixes).
- rtw88: fix LDPC field for RA info (git-fixes).
- rtw88: fix short GI capability based on current bandwidth (git-fixes).
- sch_cake: do not call diffserv parsing code when it is not needed (networking-stable-20_06_28).
- sch_cake: do not try to reallocate or unshare skb unconditionally (networking-stable-20_06_28).
- sched: consistently handle layer3 header accesses in the presence of VLANs (networking-stable-20_07_17).
- scsi/fc: kABI fixes for new ELS_RPD definition (bsc#1171688 bsc#1174003).
- scsi: dh: Add Fujitsu device to devinfo and dh lists (bsc#1174026).
- scsi: Fix trivial spelling (bsc#1171688 bsc#1174003).
- scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).
- scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).
- scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).
- scsi: qla2xxx: Add more BUILD_BUG_ON() statements (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Address a set of sparse warnings (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Cast explicitly to uint16_t / uint32_t (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change in PUREX to handle FPIN ELS requests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change two hardcoded constants into offsetof() / sizeof() expressions (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Change {RD,WRT}_REG_*() function names from upper case into lower case (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check if FW supports MQ before enabling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Check the size of struct fcp_hdr at compile time (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix a Coverity complaint in qla2100_fw_dump() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in header files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix endianness annotations in source files (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix failure message in qlt_disable_vha() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix issue with adapter's stopping state (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix login timeout (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI failure AEN (8200) handling (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix null pointer access during disconnect from subsystem (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix spelling of a variable name (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix the code that reads from mailbox registers (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix WARN_ON in qla_nvme_register_hba (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix warning after FC target reset (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush all sessions on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Flush I/O on zone disable (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Increase the size of struct qla_fcp_prio_cfg to FCP_PRIO_CFG_SIZE (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Indicate correct supported speeds for Mezz card (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Initialize 'n' before using it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Introduce a function for computing the debug message prefix (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Keep initiator ports after RSCN (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: make 1-bit bit-fields unsigned int (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make __qla2x00_alloc_iocbs() initialize 32 bits of request_t.handle (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make a gap in struct qla2xxx_offld_chain explicit (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla2x00_restart_isp() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla82xx_flash_wait_write_finish() easier to read (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qla_set_ini_mode() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make qlafx00_process_aen() return void (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce noisy debug message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove a superfluous cast (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove an unused function (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove return value from qla_nvme_ls() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove the __packed annotation from struct fcp_hdr and fcp_hdr_le (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: SAN congestion management implementation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Simplify the functions for dumping firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Sort BUILD_BUG_ON() statements alphabetically (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Split qla2x00_configure_local_loop() (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use ARRAY_SIZE() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use make_handle() instead of open-coding it (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use MBX_TOV_SECONDS for mailbox command timeout values (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use register names instead of register offsets (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for ha-&gt;fw_dumped (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Use true, false for need_mpi_reset (bsc#1171688 bsc#1174003).
- scsi: smartpqi: add id support for SmartRAID 3152-8i (bsc#1172418).
- scsi: smartpqi: add RAID bypass counter (bsc#1172418).
- scsi: smartpqi: avoid crashing kernel for controller issues (bsc#1172418).
- scsi: smartpqi: bump version to 1.2.16-010 (bsc#1172418).
- scsi: smartpqi: Identify physical devices without issuing INQUIRY (bsc#1172418).
- scsi: smartpqi: support device deletion via sysfs (bsc#1172418).
- scsi: smartpqi: update logical volume size after expansion (bsc#1172418).
- scsi: smartpqi: Use scnprintf() for avoiding potential buffer overflow (bsc#1172418).
- scsi: target/iblock: fix WRITE SAME zeroing (bsc#1169790).
- sctp: Do not advertise IPv4 addresses if ipv6only is set on the socket (networking-stable-20_06_28).
- selftests/livepatch: fix mem leaks in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: more verification in test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: rework test-klp-shadow-vars (bsc#1071995).
- selftests/livepatch: simplify test-klp-callbacks busy target tests (bsc#1071995).
- seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).
- serial: 8250: change lock order in serial8250_do_startup() (git-fixes).
- serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).
- serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).
- serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).
- serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).
- serial: pl011: Do not leak amba_ports entry on driver register error (git-fixes).
- serial: pl011: Fix oops on -EPROBE_DEFER (git-fixes).
- serial: tegra: fix CREAD handling for PIO (git-fixes).
- soc/tegra: pmc: Enable PMIC wake event on Tegra194 (bsc#1175834).
- soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).
- soc: qcom: rpmh-rsc: Set suppress_bind_attrs flag (git-fixes).
- spi: davinci: Remove uninitialized_var() usage (git-fixes).
- spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).
- spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).
- spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).
- spi: pxa2xx: Add support for Intel Tiger Lake PCH-H (jsc#SLE-13411).
- spi: rockchip: Fix error in SPI slave pio read (git-fixes).
- spi: spi-geni-qcom: Actually use our FIFO (git-fixes).
- spi: spidev: Align buffers for DMA (git-fixes).
- spi: stm32: fixes suspend/resume management (git-fixes).
- spi: sun4i: update max transfer size reported (git-fixes).
- staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).
- staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).
- Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).
- staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).
- staging: rtl8712: handle firmware load failure (git-fixes).
- staging: vchiq_arm: Add a matching unregister call (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- tcp: do not ignore ECN CWR on pure ACK (networking-stable-20_06_28).
- tcp: fix SO_RCVLOWAT possible hangs under high mem pressure (networking-stable-20_07_17).
- tcp: grow window for OOO packets only for SACK flows (networking-stable-20_06_28).
- tcp: make sure listeners do not initialize congestion-control state (networking-stable-20_07_17).
- tcp: md5: add missing memory barriers in tcp_md5_do_add()/tcp_md5_hash_key() (networking-stable-20_07_17).
- tcp: md5: do not send silly options in SYNCOOKIES (networking-stable-20_07_17).
- tcp: md5: refine tcp_md5_do_add()/tcp_md5_hash_key() barriers (networking-stable-20_07_17).
- tcp_cubic: fix spurious HYSTART_DELAY exit upon drop in min RTT (networking-stable-20_06_28).
- thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).
- tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).
- tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).
- tracepoint: Mark __tracepoint_string's __used (git-fixes).
- tracing: Use trace_sched_process_free() instead of exit() for pid tracing (git-fixes).
- ubsan: check panic_on_warn (bsc#1174805).
- uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).
- update upstream reference
- usb: bdc: Halt controller on suspend (git-fixes).
- usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).
- usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).
- usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).
- usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant (git-fixes).
- usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: check for return value in hso_serial_common_create() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: iowarrior: fix up report size handling for some devices (git-fixes).
- usb: mtu3: clear dual mode of u3port when disable device (git-fixes).
- usb: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).
- usb: serial: cp210x: re-enable auto-RTS on open (git-fixes).
- usb: serial: iuu_phoenix: fix led-activity helpers (git-fixes).
- usb: serial: qcserial: add EM7305 QDL product ID (git-fixes).
- usb: tegra: Fix allocation for the FPCI context (git-fixes).
- usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).
- usb: xhci: define IDs for various ASMedia host controllers (git-fixes).
- usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).
- usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).
- usbip: tools: fix module name in man page (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- video: fbdev: savage: fix memory leak on error handling path in probe (git-fixes).
- video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).
- video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).
- vlan: consolidate VLAN parsing code and limit max parsing depth (networking-stable-20_07_17).
- vmxnet3: use correct tcp hdr length when packet is encapsulated (bsc#1175199).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).
- watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).
- watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).
- watchdog: initialize device before misc_register (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- wl1251: fix always return 0 error (git-fixes).
- x86/bugs/multihit: Fix mitigation reporting when VMX is not in use (git-fixes).
- xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).
- xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).
- xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).
- xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).
- xfs: fix inode allocation block res calculation precedence (git-fixes).
- xfs: fix reflink quota reservation accounting error (git-fixes).
- xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-03"/>
	<updated date="2020-09-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1071995">SUSE bug 1071995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120163">SUSE bug 1120163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154488">SUSE bug 1154488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154492">SUSE bug 1154492</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159058">SUSE bug 1159058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169790">SUSE bug 1169790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171634">SUSE bug 1171634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172108">SUSE bug 1172108</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172197">SUSE bug 1172197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172247">SUSE bug 1172247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172418">SUSE bug 1172418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172871">SUSE bug 1172871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172963">SUSE bug 1172963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173468">SUSE bug 1173468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173798">SUSE bug 1173798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173813">SUSE bug 1173813</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173954">SUSE bug 1173954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174002">SUSE bug 1174002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174026">SUSE bug 1174026</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174205">SUSE bug 1174205</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174247">SUSE bug 1174247</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174362">SUSE bug 1174362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174387">SUSE bug 1174387</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174625">SUSE bug 1174625</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174645">SUSE bug 1174645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174689">SUSE bug 1174689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174699">SUSE bug 1174699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174737">SUSE bug 1174737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174757">SUSE bug 1174757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174762">SUSE bug 1174762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174770">SUSE bug 1174770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174771">SUSE bug 1174771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174777">SUSE bug 1174777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174805">SUSE bug 1174805</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174824">SUSE bug 1174824</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174825">SUSE bug 1174825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174865">SUSE bug 1174865</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174880">SUSE bug 1174880</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174897">SUSE bug 1174897</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174906">SUSE bug 1174906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175009">SUSE bug 1175009</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175010">SUSE bug 1175010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175011">SUSE bug 1175011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175012">SUSE bug 1175012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175013">SUSE bug 1175013</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175014">SUSE bug 1175014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175015">SUSE bug 1175015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175016">SUSE bug 1175016</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175017">SUSE bug 1175017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175018">SUSE bug 1175018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175019">SUSE bug 1175019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175020">SUSE bug 1175020</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175021">SUSE bug 1175021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175112">SUSE bug 1175112</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175116">SUSE bug 1175116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175128">SUSE bug 1175128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175149">SUSE bug 1175149</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175175">SUSE bug 1175175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175176">SUSE bug 1175176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175180">SUSE bug 1175180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175181">SUSE bug 1175181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175182">SUSE bug 1175182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175183">SUSE bug 1175183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175184">SUSE bug 1175184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175185">SUSE bug 1175185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175186">SUSE bug 1175186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175187">SUSE bug 1175187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175188">SUSE bug 1175188</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175189">SUSE bug 1175189</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175190">SUSE bug 1175190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175191">SUSE bug 1175191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175192">SUSE bug 1175192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175195">SUSE bug 1175195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175199">SUSE bug 1175199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175213">SUSE bug 1175213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175232">SUSE bug 1175232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175284">SUSE bug 1175284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175296">SUSE bug 1175296</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175344">SUSE bug 1175344</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175345">SUSE bug 1175345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175346">SUSE bug 1175346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175347">SUSE bug 1175347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175367">SUSE bug 1175367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175377">SUSE bug 1175377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175440">SUSE bug 1175440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175493">SUSE bug 1175493</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175546">SUSE bug 1175546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175550">SUSE bug 1175550</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175654">SUSE bug 1175654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175691">SUSE bug 1175691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175768">SUSE bug 1175768</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175769">SUSE bug 1175769</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175770">SUSE bug 1175770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175771">SUSE bug 1175771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175772">SUSE bug 1175772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175774">SUSE bug 1175774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175775">SUSE bug 1175775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175834">SUSE bug 1175834</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175873">SUSE bug 1175873</bugzilla>
	<cve impact="moderate" cvss3="2.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-14314/">CVE-2020-14314</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14331/">CVE-2020-14331</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14356/">CVE-2020-14356</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16166/">CVE-2020-16166</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509358" comment="kernel-default-extra-5.3.18-24.12.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111940" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1175686" ref_url="https://bugzilla.suse.com/1175686" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15663" ref_url="https://www.suse.com/security/cve/CVE-2020-15663/" source="CVE"/>
		<reference ref_id="CVE-2020-15664" ref_url="https://www.suse.com/security/cve/CVE-2020-15664/" source="CVE"/>
		<reference ref_id="CVE-2020-15669" ref_url="https://www.suse.com/security/cve/CVE-2020-15669/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2552-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007376.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird was updated to 68.12 (bsc#1175686)

- CVE-2020-15663: Downgrade attack on the Mozilla Maintenance Service could
  have resulted in escalation of privilege
- CVE-2020-15664: Attacker-induced prompt for extension installation
- CVE-2020-15669: Use-After-Free when aborting an operation
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-07"/>
	<updated date="2020-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1175686">SUSE bug 1175686</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15663/">CVE-2020-15663</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15664/">CVE-2020-15664</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15669/">CVE-2020-15669</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509187" comment="MozillaThunderbird-68.12.0-3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509188" comment="MozillaThunderbird-translations-common-68.12.0-3.94.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509189" comment="MozillaThunderbird-translations-other-68.12.0-3.94.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111941" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1176069" ref_url="https://bugzilla.suse.com/1176069" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14386" ref_url="https://www.suse.com/security/cve/CVE-2020-14386/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-September/007386.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bug was fixed:

- CVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-09-09"/>
	<updated date="2020-09-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176069">SUSE bug 1176069</bugzilla>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14386/">CVE-2020-14386</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509359" comment="kernel-default-extra-5.3.18-24.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111942" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1058115" ref_url="https://bugzilla.suse.com/1058115" source="BUGZILLA"/>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094244" ref_url="https://bugzilla.suse.com/1094244" source="BUGZILLA"/>
		<reference ref_id="1136666" ref_url="https://bugzilla.suse.com/1136666" source="BUGZILLA"/>
		<reference ref_id="1152148" ref_url="https://bugzilla.suse.com/1152148" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167527" ref_url="https://bugzilla.suse.com/1167527" source="BUGZILLA"/>
		<reference ref_id="1170232" ref_url="https://bugzilla.suse.com/1170232" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171068" ref_url="https://bugzilla.suse.com/1171068" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1171742" ref_url="https://bugzilla.suse.com/1171742" source="BUGZILLA"/>
		<reference ref_id="1172419" ref_url="https://bugzilla.suse.com/1172419" source="BUGZILLA"/>
		<reference ref_id="1172757" ref_url="https://bugzilla.suse.com/1172757" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173017" ref_url="https://bugzilla.suse.com/1173017" source="BUGZILLA"/>
		<reference ref_id="1173060" ref_url="https://bugzilla.suse.com/1173060" source="BUGZILLA"/>
		<reference ref_id="1173115" ref_url="https://bugzilla.suse.com/1173115" source="BUGZILLA"/>
		<reference ref_id="1173267" ref_url="https://bugzilla.suse.com/1173267" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1174029" ref_url="https://bugzilla.suse.com/1174029" source="BUGZILLA"/>
		<reference ref_id="1174110" ref_url="https://bugzilla.suse.com/1174110" source="BUGZILLA"/>
		<reference ref_id="1174111" ref_url="https://bugzilla.suse.com/1174111" source="BUGZILLA"/>
		<reference ref_id="1174358" ref_url="https://bugzilla.suse.com/1174358" source="BUGZILLA"/>
		<reference ref_id="1174484" ref_url="https://bugzilla.suse.com/1174484" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1174899" ref_url="https://bugzilla.suse.com/1174899" source="BUGZILLA"/>
		<reference ref_id="1175263" ref_url="https://bugzilla.suse.com/1175263" source="BUGZILLA"/>
		<reference ref_id="1175667" ref_url="https://bugzilla.suse.com/1175667" source="BUGZILLA"/>
		<reference ref_id="1175718" ref_url="https://bugzilla.suse.com/1175718" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1175787" ref_url="https://bugzilla.suse.com/1175787" source="BUGZILLA"/>
		<reference ref_id="1175882" ref_url="https://bugzilla.suse.com/1175882" source="BUGZILLA"/>
		<reference ref_id="1175952" ref_url="https://bugzilla.suse.com/1175952" source="BUGZILLA"/>
		<reference ref_id="1175996" ref_url="https://bugzilla.suse.com/1175996" source="BUGZILLA"/>
		<reference ref_id="1175997" ref_url="https://bugzilla.suse.com/1175997" source="BUGZILLA"/>
		<reference ref_id="1175998" ref_url="https://bugzilla.suse.com/1175998" source="BUGZILLA"/>
		<reference ref_id="1175999" ref_url="https://bugzilla.suse.com/1175999" source="BUGZILLA"/>
		<reference ref_id="1176000" ref_url="https://bugzilla.suse.com/1176000" source="BUGZILLA"/>
		<reference ref_id="1176001" ref_url="https://bugzilla.suse.com/1176001" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176022" ref_url="https://bugzilla.suse.com/1176022" source="BUGZILLA"/>
		<reference ref_id="1176038" ref_url="https://bugzilla.suse.com/1176038" source="BUGZILLA"/>
		<reference ref_id="1176063" ref_url="https://bugzilla.suse.com/1176063" source="BUGZILLA"/>
		<reference ref_id="1176137" ref_url="https://bugzilla.suse.com/1176137" source="BUGZILLA"/>
		<reference ref_id="1176235" ref_url="https://bugzilla.suse.com/1176235" source="BUGZILLA"/>
		<reference ref_id="1176236" ref_url="https://bugzilla.suse.com/1176236" source="BUGZILLA"/>
		<reference ref_id="1176237" ref_url="https://bugzilla.suse.com/1176237" source="BUGZILLA"/>
		<reference ref_id="1176242" ref_url="https://bugzilla.suse.com/1176242" source="BUGZILLA"/>
		<reference ref_id="1176278" ref_url="https://bugzilla.suse.com/1176278" source="BUGZILLA"/>
		<reference ref_id="1176357" ref_url="https://bugzilla.suse.com/1176357" source="BUGZILLA"/>
		<reference ref_id="1176358" ref_url="https://bugzilla.suse.com/1176358" source="BUGZILLA"/>
		<reference ref_id="1176359" ref_url="https://bugzilla.suse.com/1176359" source="BUGZILLA"/>
		<reference ref_id="1176360" ref_url="https://bugzilla.suse.com/1176360" source="BUGZILLA"/>
		<reference ref_id="1176361" ref_url="https://bugzilla.suse.com/1176361" source="BUGZILLA"/>
		<reference ref_id="1176362" ref_url="https://bugzilla.suse.com/1176362" source="BUGZILLA"/>
		<reference ref_id="1176363" ref_url="https://bugzilla.suse.com/1176363" source="BUGZILLA"/>
		<reference ref_id="1176364" ref_url="https://bugzilla.suse.com/1176364" source="BUGZILLA"/>
		<reference ref_id="1176365" ref_url="https://bugzilla.suse.com/1176365" source="BUGZILLA"/>
		<reference ref_id="1176366" ref_url="https://bugzilla.suse.com/1176366" source="BUGZILLA"/>
		<reference ref_id="1176367" ref_url="https://bugzilla.suse.com/1176367" source="BUGZILLA"/>
		<reference ref_id="1176381" ref_url="https://bugzilla.suse.com/1176381" source="BUGZILLA"/>
		<reference ref_id="1176423" ref_url="https://bugzilla.suse.com/1176423" source="BUGZILLA"/>
		<reference ref_id="1176449" ref_url="https://bugzilla.suse.com/1176449" source="BUGZILLA"/>
		<reference ref_id="1176482" ref_url="https://bugzilla.suse.com/1176482" source="BUGZILLA"/>
		<reference ref_id="1176486" ref_url="https://bugzilla.suse.com/1176486" source="BUGZILLA"/>
		<reference ref_id="1176507" ref_url="https://bugzilla.suse.com/1176507" source="BUGZILLA"/>
		<reference ref_id="1176536" ref_url="https://bugzilla.suse.com/1176536" source="BUGZILLA"/>
		<reference ref_id="1176537" ref_url="https://bugzilla.suse.com/1176537" source="BUGZILLA"/>
		<reference ref_id="1176538" ref_url="https://bugzilla.suse.com/1176538" source="BUGZILLA"/>
		<reference ref_id="1176539" ref_url="https://bugzilla.suse.com/1176539" source="BUGZILLA"/>
		<reference ref_id="1176540" ref_url="https://bugzilla.suse.com/1176540" source="BUGZILLA"/>
		<reference ref_id="1176541" ref_url="https://bugzilla.suse.com/1176541" source="BUGZILLA"/>
		<reference ref_id="1176542" ref_url="https://bugzilla.suse.com/1176542" source="BUGZILLA"/>
		<reference ref_id="1176544" ref_url="https://bugzilla.suse.com/1176544" source="BUGZILLA"/>
		<reference ref_id="1176545" ref_url="https://bugzilla.suse.com/1176545" source="BUGZILLA"/>
		<reference ref_id="1176546" ref_url="https://bugzilla.suse.com/1176546" source="BUGZILLA"/>
		<reference ref_id="1176548" ref_url="https://bugzilla.suse.com/1176548" source="BUGZILLA"/>
		<reference ref_id="1176558" ref_url="https://bugzilla.suse.com/1176558" source="BUGZILLA"/>
		<reference ref_id="1176559" ref_url="https://bugzilla.suse.com/1176559" source="BUGZILLA"/>
		<reference ref_id="1176587" ref_url="https://bugzilla.suse.com/1176587" source="BUGZILLA"/>
		<reference ref_id="1176588" ref_url="https://bugzilla.suse.com/1176588" source="BUGZILLA"/>
		<reference ref_id="1176659" ref_url="https://bugzilla.suse.com/1176659" source="BUGZILLA"/>
		<reference ref_id="1176698" ref_url="https://bugzilla.suse.com/1176698" source="BUGZILLA"/>
		<reference ref_id="1176699" ref_url="https://bugzilla.suse.com/1176699" source="BUGZILLA"/>
		<reference ref_id="1176700" ref_url="https://bugzilla.suse.com/1176700" source="BUGZILLA"/>
		<reference ref_id="1176721" ref_url="https://bugzilla.suse.com/1176721" source="BUGZILLA"/>
		<reference ref_id="1176722" ref_url="https://bugzilla.suse.com/1176722" source="BUGZILLA"/>
		<reference ref_id="1176725" ref_url="https://bugzilla.suse.com/1176725" source="BUGZILLA"/>
		<reference ref_id="1176732" ref_url="https://bugzilla.suse.com/1176732" source="BUGZILLA"/>
		<reference ref_id="1176763" ref_url="https://bugzilla.suse.com/1176763" source="BUGZILLA"/>
		<reference ref_id="1176775" ref_url="https://bugzilla.suse.com/1176775" source="BUGZILLA"/>
		<reference ref_id="1176788" ref_url="https://bugzilla.suse.com/1176788" source="BUGZILLA"/>
		<reference ref_id="1176789" ref_url="https://bugzilla.suse.com/1176789" source="BUGZILLA"/>
		<reference ref_id="1176833" ref_url="https://bugzilla.suse.com/1176833" source="BUGZILLA"/>
		<reference ref_id="1176869" ref_url="https://bugzilla.suse.com/1176869" source="BUGZILLA"/>
		<reference ref_id="1176877" ref_url="https://bugzilla.suse.com/1176877" source="BUGZILLA"/>
		<reference ref_id="1176925" ref_url="https://bugzilla.suse.com/1176925" source="BUGZILLA"/>
		<reference ref_id="1176962" ref_url="https://bugzilla.suse.com/1176962" source="BUGZILLA"/>
		<reference ref_id="1176980" ref_url="https://bugzilla.suse.com/1176980" source="BUGZILLA"/>
		<reference ref_id="1176990" ref_url="https://bugzilla.suse.com/1176990" source="BUGZILLA"/>
		<reference ref_id="1177021" ref_url="https://bugzilla.suse.com/1177021" source="BUGZILLA"/>
		<reference ref_id="1177030" ref_url="https://bugzilla.suse.com/1177030" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0404" ref_url="https://www.suse.com/security/cve/CVE-2020-0404/" source="CVE"/>
		<reference ref_id="CVE-2020-0427" ref_url="https://www.suse.com/security/cve/CVE-2020-0427/" source="CVE"/>
		<reference ref_id="CVE-2020-0431" ref_url="https://www.suse.com/security/cve/CVE-2020-0431/" source="CVE"/>
		<reference ref_id="CVE-2020-0432" ref_url="https://www.suse.com/security/cve/CVE-2020-0432/" source="CVE"/>
		<reference ref_id="CVE-2020-14385" ref_url="https://www.suse.com/security/cve/CVE-2020-14385/" source="CVE"/>
		<reference ref_id="CVE-2020-14390" ref_url="https://www.suse.com/security/cve/CVE-2020-14390/" source="CVE"/>
		<reference ref_id="CVE-2020-25212" ref_url="https://www.suse.com/security/cve/CVE-2020-25212/" source="CVE"/>
		<reference ref_id="CVE-2020-25284" ref_url="https://www.suse.com/security/cve/CVE-2020-25284/" source="CVE"/>
		<reference ref_id="CVE-2020-26088" ref_url="https://www.suse.com/security/cve/CVE-2020-26088/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007533.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-26088: Fixed an improper CAP_NET_RAW check in NFC socket creation could have been used by local attackers to create raw sockets, bypassing security mechanisms (bsc#1176990).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-0432: Fixed an out of bounds write due to an integer overflow (bsc#1176721).
- CVE-2020-0427: Fixed an out of bounds read due to a use after free (bsc#1176725).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2020-2521: Fixed getxattr kernel panic and memory overflow (bsc#1176381).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-14385: Fixed a failure of the file system metadata validator in XFS which could have caused an inode with a valid, user-creatable extended attribute to be flagged as corrupt (bsc#1176137).

The following non-security bugs were fixed:

- ALSA: asihpi: fix iounmap in error handler (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: firewire-digi00x: exclude Avid Adrenaline from detection (git-fixes).
- ALSA: firewire-tascam: exclude Tascam FE-8 from detection (git-fixes).
- ALSA: hda: Fix 2 channel swapping for Tegra (git-fixes).
- ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda: fixup headset for ASUS GX502 laptop (git-fixes).
- ALSA: hda: hdmi - add Rocketlake support (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek: Add quirk for Samsung Galaxy Book Ion NT950XCJ-X716A (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek - Improved routing for Thinkpad X1 7th/8th Gen (git-fixes).
- ALSA: hda/realtek - The Mic on a RedmiBook does not work (git-fixes).
- ALSA: hda/tegra: Program WAKEEN register for Tegra (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: usb-audio: Add basic capture support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for UR22C (git-fixes).
- ALSA: usb-audio: Disable autosuspend for Lenovo ThinkStation P620 (git-fixes).
- arm64: paravirt: Initialize steal time when cpu is online (bsc#1176833).
- ASoC: img: Fix a reference count leak in img_i2s_in_set_fmt (git-fixes).
- ASoC: img-parallel-out: Fix a reference count leak (git-fixes).
- ASoC: meson: axg-toddr: fix channel order on g12 platforms (git-fixes).
- ASoC: qcom: common: Fix refcount imbalance on error (git-fixes).
- ASoC: qcom: Set card-&gt;owner to avoid warnings (git-fixes).
- ASoC: SOF: Intel: add PCI ID for CometLake-S (git-fixes).
- ASoC: tegra: Fix reference count leaks (git-fixes).
- ata: ahci: use ata_link_info() instead of ata_link_printk() (jsc#SLE-14459).
- batman-adv: Add missing include for in_interrupt() (git-fixes).
- batman-adv: Avoid uninitialized chaddr when handling DHCP (git-fixes).
- batman-adv: bla: fix type misuse for backbone_gw hash indexing (git-fixes).
- batman-adv: bla: use netif_rx_ni when not in interrupt context (git-fixes).
- batman-adv: Fix own OGM check in aggregated OGMs (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets from BLA backbone to mesh (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from LAN (git-fixes).
- batman-adv: mcast: fix duplicate mcast packets in BLA backbone from mesh (git-fixes).
- batman-adv: mcast/TT: fix wrongly dropped or rerouted packets (git-fixes).
- bcache: allocate meta data pages as compound pages (bsc#1172873).
- bitfield.h: do not compile-time validate _val in FIELD_FIT (git fixes (bitfield)).
- blktrace: fix debugfs use after free (git fixes (block drivers)).
- block: add docs for gendisk / request_queue refcount helpers (git fixes (block drivers)).
- block: check queue's limits.discard_granularity in __blkdev_issue_discard() (bsc#1152148).
- block: improve discard bio alignment in __blkdev_issue_discard() (bsc#1152148).
- block: revert back to synchronous request_queue removal (git fixes (block drivers)).
- block: Use non _rcu version of list functions for tag_set_list (git-fixes).
- Bluetooth: btrtl: Add support for RTL8761B (bsc#1177021).
- bnxt: do not enable NAPI until rings are ready (git-fixes).
- bnxt_en: Check for zero dir entries in NVRAM (git-fixes).
- bnxt_en: Do not query FW when netif_running() is false (git-fixes).
- bnxt_en: Fix completion ring sizing with TPA enabled (networking-stable-20_07_29).
- bnxt_en: fix HWRM error when querying VF temperature (git-fixes).
- bnxt_en: Fix PCI AER error recovery flow (git-fixes).
- bnxt_en: Fix possible crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix race when modifying pause settings (networking-stable-20_07_29).
- bonding: check error value of register_netdevice() immediately (networking-stable-20_07_29).
- bonding: check return value of register_netdevice() in bond_newlink() (networking-stable-20_07_29).
- bonding: fix a potential double-unregister (git-fixes).
- bpf: Fix a rcu warning for bpffs map pretty-print (bsc#1155518).
- bpf: map_seq_next should always increase position index (bsc#1155518).
- btrfs: add a leak check for roots (bsc#1176019).
- btrfs: add __cold attribute to more functions (bsc#1176019).
- btrfs: add dedicated members for start and length of a block group (bsc#1176019).
- btrfs: Add read_backup_root (bsc#1176019).
- btrfs: block-group: Refactor btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: Reuse the item key from caller of read_one_block_group() (bsc#1176019).
- btrfs: Cleanup and simplify find_newest_super_backup (bsc#1176019).
- btrfs: clear DEAD_RELOC_TREE before dropping the reloc root (bsc#1176019).
- btrfs: do not init a reloc root if we are not relocating (bsc#1176019).
- btrfs: Do not use objectid_mutex during mount (bsc#1176019).
- btrfs: drop block from cache on error in relocation (bsc#1176019).
- btrfs: drop create parameter to btrfs_get_extent() (bsc#1176019).
- btrfs: drop unused parameter is_new from btrfs_iget (bsc#1176019).
- btrfs: export and rename free_fs_info (bsc#1176019).
- btrfs: export and use btrfs_read_tree_root for tree-log (bsc#1176019).
- btrfs: Factor out tree roots initialization during mount (bsc#1176019).
- btrfs: fix setting last_trans for reloc roots (bsc#1176019).
- btrfs: free more things in btrfs_free_fs_info (bsc#1176019).
- btrfs: free the reloc_control in a consistent way (bsc#1176019).
- btrfs: handle NULL roots in btrfs_put/btrfs_grab_fs_root (bsc#1176019).
- btrfs: hold a ref for the root in btrfs_find_orphan_roots (bsc#1176019).
- btrfs: hold a ref on fs roots while they're in the radix tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_check_uuid_tree_entry (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_get_subvol_info (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_ioctl_send (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_log_trees (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_recover_relocation (bsc#1176019).
- btrfs: hold a ref on the root in __btrfs_run_defrag_inode (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree (bsc#1176019).
- btrfs: hold a ref on the root in btrfs_search_path_in_tree_user (bsc#1176019).
- btrfs: hold a ref on the root in build_backref_tree (bsc#1176019).
- btrfs: hold a ref on the root in create_pending_snapshot (bsc#1176019).
- btrfs: hold a ref on the root in create_reloc_inode (bsc#1176019).
- btrfs: hold a ref on the root in create_subvol (bsc#1176019).
- btrfs: hold a ref on the root in find_data_references (bsc#1176019).
- btrfs: hold a ref on the root in fixup_tree_root_location (bsc#1176019).
- btrfs: hold a ref on the root in get_subvol_name_from_objectid (bsc#1176019).
- btrfs: hold a ref on the root in merge_reloc_roots (bsc#1176019).
- btrfs: hold a ref on the root in open_ctree (bsc#1176019).
- btrfs: hold a ref on the root in prepare_to_merge (bsc#1176019).
- btrfs: hold a ref on the root in record_reloc_root_in_trans (bsc#1176019).
- btrfs: hold a ref on the root in resolve_indirect_ref (bsc#1176019).
- btrfs: hold a ref on the root in scrub_print_warning_inode (bsc#1176019).
- btrfs: hold a ref on the root in search_ioctl (bsc#1176019).
- btrfs: hold a ref on the root-&gt;reloc_root (bsc#1176019).
- btrfs: hold a root ref in btrfs_get_dentry (bsc#1176019).
- btrfs: hold ref on root in btrfs_ioctl_default_subvol (bsc#1176019).
- btrfs: implement full reflink support for inline extents (bsc#1176019).
- btrfs: make btrfs_find_orphan_roots use btrfs_get_fs_root (bsc#1176019).
- btrfs: make relocation use btrfs_read_tree_root() (bsc#1176019).
- btrfs: make the fs root init functions static (bsc#1176019).
- btrfs: make the init of static elements in fs_info separate (bsc#1176019).
- btrfs: move all reflink implementation code into its own file (bsc#1176019).
- btrfs: move block_group_item::flags to block group (bsc#1176019).
- btrfs: move block_group_item::used to block group (bsc#1176019).
- btrfs: move fs_info init work into it's own helper function (bsc#1176019).
- btrfs: move fs root init stuff into btrfs_init_fs_root (bsc#1176019).
- btrfs: open code btrfs_read_fs_root_no_name (bsc#1176019).
- btrfs: push btrfs_grab_fs_root into btrfs_get_fs_root (bsc#1176019).
- btrfs: push grab_fs_root into read_fs_root (bsc#1176019).
- btrfs: push __setup_root into btrfs_alloc_root (bsc#1176019).
- btrfs: reloc: clean dirty subvols if we fail to start a transaction (bsc#1176019).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1176019).
- btrfs: Remove block_rsv parameter from btrfs_drop_snapshot (bsc#1176019).
- btrfs: remove btrfs_read_fs_root, not used anymore (bsc#1176019).
- btrfs: remove embedded block_group_cache::item (bsc#1176019).
- btrfs: Remove newest_gen argument from find_oldest_super_backup (bsc#1176019).
- btrfs: Remove unused next_root_backup function (bsc#1176019).
- btrfs: rename block_group_item on-stack accessors to follow naming (bsc#1176019).
- btrfs: rename btrfs_block_group_cache (bsc#1176019).
- btrfs: rename btrfs_put_fs_root and btrfs_grab_fs_root (bsc#1176019).
- btrfs: rename extent buffer block group item accessors (bsc#1176019).
- btrfs: Rename find_oldest_super_backup to init_backup_root_slot (bsc#1176019).
- btrfs: require only sector size alignment for parent eb bytenr (bsc#1176789).
- btrfs: reset tree root pointer after error in init_tree_roots (bsc#1176019).
- btrfs: simplify inline extent handling when doing reflinks (bsc#1176019).
- btrfs: stop clearing EXTENT_DIRTY in inode I/O tree (bsc#1176019).
- btrfs: Streamline btrfs_fs_info::backup_root_index semantics (bsc#1176019).
- btrfs: tree-checker: fix the error message for transid error (bsc#1176788).
- btrfs: unset reloc control if we fail to recover (bsc#1176019).
- btrfs: use bool argument in free_root_pointers() (bsc#1176019).
- btrfs: use btrfs_block_group_cache_done in update_block_group (bsc#1176019).
- btrfs: use btrfs_put_fs_root to free roots always (bsc#1176019).
- ceph: do not allow setlease on cephfs (bsc#1176537).
- ceph: fix potential mdsc use-after-free crash (bsc#1176538).
- ceph: fix use-after-free for fsc-&gt;mdsc (bsc#1176539).
- ceph: handle zero-length feature mask in session messages (bsc#1176540).
- ceph: set sec_context xattr on symlink creation (bsc#1176541).
- ceph: use frag's MDS in either mode (bsc#1176542).
- cfg80211: regulatory: reject invalid hints (bsc#1176699).
- char: virtio: Select VIRTIO from VIRTIO_CONSOLE (bsc#1175667).
- cifs: Fix leak when handling lease break for cached root fid (bsc#1176242).
- cifs/smb3: Fix data inconsistent when punch hole (bsc#1176544).
- cifs/smb3: Fix data inconsistent when zero file range (bsc#1176536).
- clk: davinci: Use the correct size when allocating memory (git-fixes).
- clk: rockchip: Fix initialization of mux_pll_src_4plls_p (git-fixes).
- crypto: ecdh - check validity of Z before export (bsc#1175718).
- crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
- crypto: dh - check validity of Z before export (bsc#1175718).
- crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
- cxgb4: fix thermal zone device registration (git-fixes).
- dax: do not print error message for non-persistent memory block device (bsc#1171073).
- dax: print error message by pr_info() in __generic_fsdax_supported() (bsc#1171073).
- debugfs: Fix module state check condition (bsc#1173746).
- debugfs: Fix module state check condition (git-fixes).
- dev: Defer free of skbs in flush_backlog (networking-stable-20_07_29).
- device property: Fix the secondary firmware node handling in set_primary_fwnode() (git-fixes).
- dmaengine: acpi: Put the CSRT table after using it (git-fixes).
- dmaengine: at_hdmac: check return value of of_find_device_by_node() in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix scatter-gather address calculation (git-fixes).
- dmaengine: of-dma: Fix of_dma_router_xlate's of_dma_xlate handling (git-fixes).
- dmaengine: pl330: Fix burst length if burst size is smaller than bus width (git-fixes).
- dm: do not call report zones for more than the user requested (git fixes (block drivers)).
- dm integrity: fix integrity recalculation that is improperly skipped (git fixes (block drivers)).
- dm rq: do not call blk_mq_queue_stopped() in dm_stop_queue() (git fixes (block drivers)).
- dm writecache: add cond_resched to loop in persistent_memory_claim() (git fixes (block drivers)).
- dm writecache: correct uncommitted_block when discarding uncommitted entry (git fixes (block drivers)).
- dm zoned: assign max_io_len correctly (git fixes (block drivers)).
- dpaa2-eth: Fix passing zero to 'PTR_ERR' warning (networking-stable-20_08_08).
- dpaa_eth: Fix one possible memleak in dpaa_eth_probe (bsc#1175996).
- driver-core: Introduce DEVICE_ATTR_ADMIN_{RO,RW} (bsc#1176486 ltc#188130).
- Drivers: hv: Specify receive buffer size using Hyper-V page size (bsc#1176877).
- Drivers: hv: vmbus: Add timeout to vmbus_wait_for_unload (git-fixes).
- Drivers: hv: vmbus: hibernation: do not hang forever in vmbus_bus_resume() (git-fixes).
- drivers/net/wan/x25_asy: Fix to make it work (networking-stable-20_07_29).
- drm/amd/display: fix ref count leak in amdgpu_drm_ioctl (git-fixes).
- drm/amd/display: Switch to immediate mode for updating infopackets (git-fixes).
- drm/amdgpu/display: fix ref count leak when pm_runtime_get_sync fails (git-fixes).
- drm/amdgpu: Fix buffer overflow in INFO ioctl (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_display_crtc_set_config (git-fixes).
- drm/amdgpu: fix ref count leak in amdgpu_driver_open_kms (git-fixes).
- drm/amdgpu/gfx10: refine mgcg setting (git-fixes).
- drm/amdkfd: Fix reference count leaks (git-fixes).
- drm/amd/pm: correct the thermal alert temperature limit settings (git-fixes).
- drm/amd/pm: correct Vega10 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega12 swctf limit setting (git-fixes).
- drm/amd/pm: correct Vega20 swctf limit setting (git-fixes).
- drm/amd/powerplay: correct UVD/VCE PG state on custom pptable uploading (git-fixes).
- drm/amd/powerplay: correct Vega20 cached smu feature state (git-fixes).
- drm/amd/powerplay: Fix hardmins not being sent to SMU for RV (git-fixes).
- drm/ast: Initialize DRAM type before posting GPU (bsc#1152472) 	* context changes
- drm/mgag200: Remove declaration of mgag200_mmap() from header file (bsc#1152472) 	* context changes
- drm/msm/a6xx: fix crashdec section name typo (git-fixes).
- drm/msm/adreno: fix updating ring fence (git-fixes).
- drm/msm/gpu: make ringbuffer readonly (git-fixes).
- drm/nouveau/drm/noveau: fix reference count leak in nouveau_fbcon_open (git-fixes).
- drm/nouveau: Fix reference count leak in nouveau_connector_detect (git-fixes).
- drm/nouveau: fix reference count leak in nv50_disp_atomic_commit (git-fixes).
- drm/radeon: fix multiple reference count leak (git-fixes).
- drm/radeon: Prefer lower feedback dividers (git-fixes).
- drm/sched: Fix passing zero to 'PTR_ERR' warning v2 (git-fixes).
- drm/sun4i: add missing put_device() call in (bsc#1152472)
- drm/sun4i: backend: Disable alpha on the lowest plane on the A20 (bsc#1152472)
- drm/sun4i: backend: Support alpha property on lowest plane (bsc#1152472)
- drm/sun4i: Fix dsi dcs long write function (bsc#1152472)
- drm/virtio: fix missing dma_fence_put() in (bsc#1152489) 	* context changes
- drm/xen-front: Fix misused IS_ERR_OR_NULL checks (bsc#1065600).
- EDAC/amd64: Add AMD family 17h model 60h PCI IDs (bsc#1152489).
- EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1152489).
- EDAC: Fix reference count leaks (bsc#1152489).
- efi: Add support for EFI_RT_PROPERTIES table (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: avoid error message when booting under Xen (bsc#1172419).
- efi/efivars: Expose RT service availability via efivars abstraction (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: libstub/tpm: enable tpm eventlog function for ARM platforms (bsc#1173267).
- efi: Mark all EFI runtime services as unsupported on non-EFI boot (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Register EFI rtc platform device only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Store mask of supported runtime services in struct efi (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use EFI ResetSystem only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- efi: Use more granular check for availability for variable services (bsc#1174029, bsc#1174110, bsc#1174111).
- enetc: Remove the mdio bus on PF probe bailout (networking-stable-20_07_29).
- epoll: atomically remove wait entry on wake up (bsc#1176236).
- epoll: call final ep_events_available() check under the lock (bsc#1176237).
- ext4: handle read only external journal device (bsc#1176063).
- fbcon: prevent user font height or width change from causing potential out-of-bounds access (git-fixes).
- felix: Fix initialization of ioremap resources (bsc#1175997).
- Fix build error when CONFIG_ACPI is not set/enabled: (bsc#1065600).
- HID: core: Add printk_once variants to hid_warn() etc (bsc#1176775).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: fix dmesg flooding if report field larger than 32bit (bsc#1176775).
- HID: core: reformat and reduce hid_printk macros (bsc#1176775).
- HID: core: Sanitize event code and type when mapping input (git-fixes).
- HID: elan: Fix memleak in elan_input_configured (git-fixes).
- HID: hiddev: Fix slab-out-of-bounds write in hiddev_ioctl_usage() (git-fixes).
- HID: i2c-hid: Always sleep 60ms after I2C_HID_PWR_ON commands (git-fixes).
- HID: microsoft: Add rumble support for the 8bitdo SN30 Pro+ controller (git-fixes).
- HID: quirks: add NOGET quirk for Logitech GROUP (git-fixes).
- HID: quirks: Always poll three more Lenovo PixArt mice (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for all Saitek X52 devices (git-fixes).
- hsr: use netdev_err() instead of WARN_ONCE() (bsc#1176659).
- hv_netvsc: do not use VF device if link is down (git-fixes).
- hv_netvsc: Fix the queue_mapping in netvsc_vf_xmit() (git-fixes).
- hv_netvsc: Remove 'unlikely' from netvsc_select_queue (git-fixes).
- hv_utils: drain the timesync packets on onchannelcallback (bsc#1176877).
- hv_utils: return error if host timesysnc update is stale (bsc#1176877).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: core: Do not fail PRP0001 enumeration when no ID table exist (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: mxs: use MXS_DMA_CTRL_WAIT4END instead of DMA_CTRL_ACK (git-fixes).
- i2c: rcar: in slave mode, clear NACK earlier (git-fixes).
- i40e: Fix crash during removing i40e driver (git-fixes).
- i40e: Set RX_ONLY mode for unicast promiscuous on VLAN (git-fixes).
- ibmvnic: add missing parenthesis in do_reset() (bsc#1176700 ltc#188140).
- iio:accel:bmc150-accel: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: accel: kxsd9: Fix alignment of local buffer (git-fixes).
- iio:accel:mma7455: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:accel:mma8452: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:adc:ina2xx Fix timestamp alignment issue (git-fixes).
- iio:adc:max1118 Fix alignment of timestamp and data leak issues (git-fixes).
- iio: adc: mcp3422: fix locking on error path (git-fixes).
- iio: adc: mcp3422: fix locking scope (git-fixes).
- iio:adc:ti-adc081c Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-adc084s021 Fix alignment and data leak issues (git-fixes).
- iio: adc: ti-ads1015: fix conversion when CONFIG_PM is not set (git-fixes).
- iio:chemical:ccs811: Fix timestamp alignment and prevent data leak (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio:light:ltr501 Fix timestamp alignment issue (git-fixes).
- iio:light:max44000 Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:ak8975 Fix alignment and data leak issues (git-fixes).
- iio:proximity:mb1232: Fix timestamp alignment and prevent data leak (git-fixes).
- include/asm-generic/vmlinux.lds.h: align ro_after_init (git-fixes).
- include/linux/bitops.h: avoid clang shift-count-overflow warnings (git-fixes).
- include/linux/poison.h: remove obsolete comment (git-fixes).
- infiniband: hfi1: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- initramfs: remove clean_rootfs (git-fixes).
- initramfs: remove the populate_initrd_image and clean_rootfs stubs (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- integrity: Check properly whether EFI GetVariable() is available (bsc#1174029, bsc#1174110, bsc#1174111).
- iommu/amd: Do not force direct mapping when SME is active (bsc#1174358).
- iommu/amd: Do not use IOMMUv2 functionality when SME is active (bsc#1174358).
- iommu/amd: Print extended features in one line to fix divergent log levels (bsc#1176357).
- iommu/amd: Restore IRTE.RemapEn bit after programming IRTE (bsc#1176358).
- iommu/amd: Use cmpxchg_double() when updating 128-bit IRTE (bsc#1176359).
- iommu/omap: Check for failure of a call to omap_iommu_dump_ctx (bsc#1176360).
- iommu/vt-d: Fix PASID devTLB invalidation (bsc#1176361).
- iommu/vt-d: Handle 36bit addressing for x86-32 (bsc#1176362).
- iommu/vt-d: Handle non-page aligned address (bsc#1176367).
- iommu/vt-d: Remove global page support in devTLB flush (bsc#1176363).
- iommu/vt-d: Serialize IOMMU GCMD register modifications (bsc#1176364).
- iommu/vt-d: Support flushing more translation cache types (bsc#1176365).
- ipv4: Silence suspicious RCU usage warning (networking-stable-20_08_08).
- ipv6: fix memory leaks on IPV6_ADDRFORM path (networking-stable-20_08_08).
- ipv6: Fix nexthop refcnt leak when creating ipv6 route info (networking-stable-20_08_08).
- irqdomain/treewide: Free firmware node after domain removal (git-fixes).
- irqdomain/treewide: Keep firmware node unconditionally allocated (git-fixes).
- kABI: Fix kABI after EFI_RT_PROPERTIES table backport (bsc#1174029, bsc#1174110, bsc#1174111).
- kABI: net: dsa: microchip: call phy_remove_link_mode during probe (kabi).
- kabi/severities: ignore kABI for net/ethernet/mscc/ References: bsc#1176001,bsc#1175999 Exported symbols from drivers/net/ethernet/mscc/ are only used by drivers/net/dsa/ocelot/
- kernel/cpu_pm: Fix uninitted local in cpu_pm (git fixes (kernel/pm)).
- kernel-syms.spec.in: Also use bz compression (boo#1175882).
- libnvdimm: cover up struct nvdimm changes (bsc#1171742).
- libnvdimm: cover up nvdimm_security_ops changes (bsc#1171742).
- libnvdimm/security: fix a typo (bsc#1171742 bsc#1167527).
- libnvdimm/security: Introduce a 'frozen' attribute (bsc#1171742).
- libbpf: Fix readelf output parsing on powerpc with recent binutils (bsc#1155518).
- libbpf: Fix readelf output parsing for Fedora (bsc#1155518).
- libata: implement ATA_HORKAGE_MAX_TRIM_128M and apply to Sandisks (jsc#SLE-14459).
- lib/mpi: Add mpi_sub_ui() (bsc#1175718).
- md: raid0/linear: fix dereference before null check on pointer mddev (git fixes (block drivers)).
- media: cedrus: Add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- media: davinci: vpif_capture: fix potential double free (git-fixes).
- media: gpio-ir-tx: improve precision of transmitted signal due to scheduling (git-fixes).
- media: pci: ttpci: av7110: fix possible buffer overflow caused by bad DMA value in debiirq() (git-fixes).
- mei: fix CNL itouch device number to match the spec (bsc#1175952).
- mei: me: disable mei interface on LBG servers (bsc#1175952).
- mei: me: disable mei interface on Mehlow server platforms (bsc#1175952).
- mfd: intel-lpss: Add Intel Emmitsburg PCH PCI IDs (git-fixes).
- mlx4: disable device on shutdown (git-fixes).
- mlxsw: destroy workqueue when trap_register in mlxsw_emad_init (networking-stable-20_07_29).
- mmc: dt-bindings: Add resets/reset-names for Mediatek MMC bindings (git-fixes).
- mmc: mediatek: add optional module reset property (git-fixes).
- mmc: sdhci-acpi: Clear amd_sdhci_host on reset (git-fixes).
- mmc: sdhci-acpi: Fix HS400 tuning for AMDI0040 (git-fixes).
- mmc: sdhci-msm: Add retries when all tuning phases are found valid (git-fixes).
- mmc: sdhci-of-esdhc: Do not walk device-tree on every interrupt (git-fixes).
- mmc: sdio: Use mmc_pre_req() / mmc_post_req() (git-fixes).
- mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).
- mm, page_alloc: fix core hung in free_pcppages_bulk() (git fixes (mm/pgalloc)).
- mm/page_alloc: silence a KASAN false positive (git fixes (mm/pgalloc)).
- mm: remove VM_BUG_ON(PageSlab()) from page_mapcount() (git fixes (mm/compaction)).
- mm/shuffle: do not move pages between zones and do not read garbage memmaps (git fixes (mm/pgalloc)).
- mm/sparse: rename pfn_present() to pfn_in_present_section() (git fixes (mm/pgalloc)).
- mm, thp: fix defrag setting if newline is not used (git fixes (mm/thp)).
- net: dsa: felix: send VLANs on CPU port as egress-tagged (bsc#1175998).
- net: dsa: microchip: call phy_remove_link_mode during probe (networking-stable-20_07_29).
- net: dsa: ocelot: the MAC table on Felix is twice as large (bsc#1175999).
- net: enetc: fix an issue about leak system resources (bsc#1176000).
- net: ethernet: mlx4: Fix memory allocation in mlx4_buddy_init() (git-fixes).
- net: ethernet: mtk_eth_soc: fix MTU warnings (networking-stable-20_08_08).
- netfilter: ipset: Fix forceadd evaluation path (bsc#1176587).
- net: Fix potential memory leak in proto_register() (networking-stable-20_08_15).
- net: gre: recompute gre csum for sctp over gre tunnels (networking-stable-20_08_08).
- net: initialize fastreuse on inet_inherit_port (networking-stable-20_08_15).
- net: mscc: ocelot: fix untagged packet drops when enslaving to vlan aware bridge (bsc#1176001).
- net/nfc/rawsock.c: add CAP_NET_RAW check (networking-stable-20_08_15).
- net: refactor bind_bucket fastreuse into helper (networking-stable-20_08_15).
- net: sched: initialize with 0 before setting erspan md-&gt;u (bsc#1154353).
- net: Set fput_needed iff FDPUT_FPUT is set (networking-stable-20_08_15).
- net/smc: put slot when connection is killed (git-fixes).
- net-sysfs: add a newline when printing 'tx_timeout' by sysfs (networking-stable-20_07_29).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (networking-stable-20_08_08).
- net/tls: Fix kmap usage (networking-stable-20_08_15).
- net: udp: Fix wrong clean up for IS_UDPLITE macro (networking-stable-20_07_29).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nvme-fc: set max_segments to lldd max value (bsc#1176038).
- nvme-pci: override the value of the controller's numa node (bsc#1176507).
- obsolete_kmp: provide newer version than the obsoleted one (boo#1170232).
- omapfb: fix multiple reference count leaks due to pm_runtime_get_sync (git-fixes).
- openvswitch: Prevent kernel-infoleak in ovs_ct_put_key() (networking-stable-20_08_08).
- PCI: Add device even if driver attach failed (git-fixes).
- PCI: Avoid Pericom USB controller OHCI/EHCI PME# defect (git-fixes).
- PCI: Fix pci_create_slot() reference count leak (git-fixes).
- PCI: Mark AMD Navi10 GPU rev 0x00 ATS as broken (git-fixes).
- platform/x86: dcdbas: Check SMBIOS for protected buffer address (jsc#SLE-14407).
- PM: sleep: core: Fix the handling of pending runtime resume requests (git-fixes).
- powerpc/64: mark emergency stacks valid to unwind (bsc#1156395).
- powerpc/64s: machine check do not trace real-mode handler (bsc#1094244 ltc#168122).
- powerpc/64s: machine check interrupt update NMI accounting (bsc#1094244 ltc#168122).
- powerpc: Add cputime_to_nsecs() (bsc#1065729).
- powerpc/book3s64/radix: Add kernel command line option to disable radix GTSE (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/book3s64/radix: Fix boot failure with large amount of guest memory (bsc#1176022 ltc#187208).
- powerpc: Do not flush caches when adding memory (bsc#1176980 ltc#187962).
- powerpc: Implement ftrace_enabled() helpers (bsc#1094244 ltc#168122).
- powerpc/kernel: Cleanup machine check function declarations (bsc#1065729).
- powerpc/kernel: Enables memory hot-remove after reboot on pseries guests (bsc#1177030 ltc#187588).
- powerpc/mm: Enable radix GTSE only if supported (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/mm: Limit resize_hpt_for_hotplug() call to hash guests only (bsc#1177030 ltc#187588).
- powerpc/mm/radix: Create separate mappings for hot-plugged memory (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Fix PTE/PMD fragment count for early page table mappings (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Free PUD table when freeing pagetable (bsc#1055186 ltc#153436).
- powerpc/mm/radix: Remove split_kernel_mapping() (bsc#1055186 ltc#153436).
- powerpc/numa: Early request for home node associativity (bsc#1171068 ltc#183935).
- powerpc/numa: Offline memoryless cpuless node 0 (bsc#1171068 ltc#183935).
- powerpc/numa: Prefer node id queried from vphn (bsc#1171068 ltc#183935).
- powerpc/numa: Set numa_node for all possible cpus (bsc#1171068 ltc#183935).
- powerpc/numa: Use cpu node map of first sibling thread (bsc#1171068 ltc#183935).
- powerpc/papr_scm: Limit the readability of 'perf_stats' sysfs attribute (bsc#1176486 ltc#188130).
- powerpc/perf: Fix crashes with generic_compat_pmu &amp; BHRB (bsc#1156395).
- powerpc/prom: Enable Radix GTSE in cpu pa-features (bsc#1055186 ltc#153436 jsc#SLE-13512).
- powerpc/pseries: Limit machine check stack to 4GB (bsc#1094244 ltc#168122).
- powerpc/pseries: Machine check use rtas_call_unlocked() with args on stack (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Avoid calling rtas_token() in NMI paths (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: Fix FWNMI_VALID off by one (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi avoid modifying r3 in error case (bsc#1094244 ltc#168122).
- powerpc/pseries/ras: fwnmi sreset should not interlock (bsc#1094244 ltc#168122).
- powerpc/traps: Do not trace system reset (bsc#1094244 ltc#168122).
- powerpc/traps: Make unrecoverable NMIs die instead of panic (bsc#1094244 ltc#168122).
- powerpc/xmon: Use `dcbf` inplace of `dcbi` instruction for 64bit Book3S (bsc#1065729).
- qrtr: orphan socket in qrtr_release() (networking-stable-20_07_29).
- RDMA/bnxt_re: Do not report transparent vlan from QP1 (bsc#1173017).
- RDMA/bnxt_re: Fix the qp table indexing (bsc#1173017).
- RDMA/bnxt_re: Remove set but not used variable 'qplib_ctx' (bsc#1170774).
- RDMA/bnxt_re: Remove the qp from list only if the qp destroy succeeds (bsc#1170774).
- RDMA/bnxt_re: Restrict the max_gids to 256 (bsc#1173017).
- RDMA/bnxt_re: Static NQ depth allocation (bsc#1170774).
- RDMA/mlx4: Read pkey table length instead of hardcoded value (git-fixes).
- RDMA/siw: Suppress uninitialized var warning (jsc#SLE-8381).
- regulator: core: Fix slab-out-of-bounds in regulator_unlock_recursive() (git-fixes).
- regulator: fix memory leak on error path of regulator_register() (git-fixes).
- regulator: plug of_node leak in regulator_register()'s error path (git-fixes).
- regulator: push allocation in regulator_ena_gpio_request() out of lock (git-fixes).
- regulator: push allocation in regulator_init_coupling() outside of lock (git-fixes).
- regulator: push allocation in set_consumer_device_supply() out of lock (git-fixes).
- regulator: push allocations in create_regulator() outside of lock (git-fixes).
- regulator: pwm: Fix machine constraints application (git-fixes).
- regulator: remove superfluous lock in regulator_resolve_coupling() (git-fixes).
- Revert 'xen/balloon: Fix crash when ballooning on x86 32 bit PAE' (bsc#1065600).
- rpadlpar_io: Add MODULE_DESCRIPTION entries to kernel modules (bsc#1176869 ltc#188243).
- rpm/kernel-binary.spec.in: Also sign ppc64 kernels (jsc#SLE-15857 jsc#SLE-13618).
- rpm/kernel-binary.spec.in: pack .ipa-clones files for live patching When -fdump-ipa-clones option is enabled, GCC reports about its cloning operation during IPA optimizations. We use the information for live patches preparation, because it is crucial to know if and how functions are optimized. Currently, we create the needed .ipa-clones dump files manually. It is unnecessary, because the files may be created automatically during our kernel build. Prepare for the step and provide the resulting files in -livepatch-devel package.
- rpm/kernel-cert-subpackage: add CA check on key enrollment (bsc#1173115) To avoid the unnecessary key enrollment, when enrolling the signing key of the kernel package, '--ca-check' is added to mokutil so that mokutil will ignore the request if the CA of the signing key already exists in MokList or UEFI db. Since the macro, %_suse_kernel_module_subpackage, is only defined in a kernel module package (KMP), it's used to determine whether the %post script is running in a kernel package, or a kernel module package.
- rpm/kernel-source.spec.in: Also use bz compression (boo#1175882).
- rpm/macros.kernel-source: pass -c proerly in kernel module package (bsc#1176698) The '-c' option wasn't passed down to %_kernel_module_package so the ueficert subpackage wasn't generated even if the certificate is specified in the spec file.
- rtlwifi: rtl8192cu: Prevent leaking urb (git-fixes).
- rxrpc: Fix race between recvmsg and sendmsg on immediate call failure (networking-stable-20_08_08).
- rxrpc: Fix sendmsg() returning EPIPE due to recvmsg() returning ENODATA (networking-stable-20_07_29).
- s390: Change s390_kernel_write() return type to match memcpy() (bsc#1176449). Prerequisite for bsc#1176449.
- s390/dasd: fix inability to use DASD with DIAG driver (git-fixes).
- s390: fix GENERIC_LOCKBREAK dependency typo in Kconfig (git-fixes).
- s390/maccess: add no DAT mode to kernel_write (bsc#1176449).
- s390/mm: fix huge pte soft dirty copying (git-fixes).
- s390/qeth: do not process empty bridge port events (git-fixes).
- s390/qeth: integrate RX refill worker with NAPI (git-fixes).
- s390/qeth: tolerate pre-filled RX buffer (git-fixes).
- s390/setup: init jump labels before command line parsing (git-fixes).
- sbitmap: Consider cleared bits in sbitmap_bitmap_show() (git fixes (block drivers)).
- sched: Add a tracepoint to track rq-&gt;nr_running (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Better document ttwu() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/cputime: Improve cputime_adjust() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Add new tracepoints to track util_est (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/debug: Fix the alignment of the show-state debug output (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: fix NOHZ next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Remove unused 'sd' parameter from scale_rt_capacity() (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: update_pick_idlest() Select group with lowest group_util when idle_cpus are equal (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: Fix use of count for nr_running tracepoint (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched: nohz: stop passing around unused 'ticks' parameter (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Check numa balancing information only when enabled (bsc#1176588).
- sched/numa: Avoid creating large imbalances at task creation time (bsc#1176588).
- sched/pelt: Remove redundant cap_scale() definition (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: fcoe: Memory leak fix in fcoe_sysfs_fcf_del() (bsc#1174899).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- scsi: iscsi: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- scsi: libfc: Fix for double free() (bsc#1174899).
- scsi: libfc: Free skb in fc_disc_gpn_id_resp() for valid cases (bsc#1174899).
- scsi: lpfc: Add and rename a whole bunch of function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add dependency on CPU_FREQ (git-fixes).
- scsi: lpfc: Add description for lpfc_release_rpi()'s 'ndlpl param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Add missing misc_deregister() for lpfc_init() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Correct some pretty obvious misdocumentation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Ensure variable has the same stipulations as code using it (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix a bunch of kerneldoc misdemeanors (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix FCoE speed reporting (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix kerneldoc parameter formatting/misnaming/missing issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix LUN loss after cable pull (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix no message shown for lpfc_hdw_queue out of range value (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix oops when unloading driver while running mds diags (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix retry of PRLI when status indicates its unsupported (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix RSCN timeout due to incorrect gidft counter (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix setting IRQ affinity with an empty CPU mask (git-fixes).
- scsi: lpfc: Fix some function parameter descriptions (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix typo in comment for ULP (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up around 120 documentation issues (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix-up formatting/docrot where appropriate (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Fix validation of bsg reply lengths (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: NVMe remote port devloss_tmo from lldd (bcs#1173060 bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449). 
- scsi: lpfc: nvmet: Avoid hang / use-after-free again when destroying targetport (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Provide description for lpfc_mem_alloc()'s 'align' param (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Quieten some printks (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Remove unused variable 'pg_addr' (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Update lpfc version to 12.8.0.3 (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: lpfc: Use __printf() format notation (bsc#1171558 bsc#1136666 bsc#1174486 bsc#1175787 bsc#1171000 jsc#SLE-15796 jsc#SLE-15449).
- scsi: qla2xxx: Fix regression on sparc64 (git-fixes).
- scsi: qla2xxx: Fix the return value (bsc#1171688).
- scsi: qla2xxx: Fix the size used in a 'dma_free_coherent()' call (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qla_nvme_register_hba() (bsc#1171688).
- scsi: qla2xxx: Fix wrong return value in qlt_chk_unresolv_exchg() (bsc#1171688).
- scsi: qla2xxx: Log calling function name in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Remove pci-dma-compat wrapper API (bsc#1171688).
- scsi: qla2xxx: Remove redundant variable initialization (bsc#1171688).
- scsi: qla2xxx: Remove superfluous memset() (bsc#1171688).
- scsi: qla2xxx: Simplify return value logic in qla2x00_get_sp_from_handle() (bsc#1171688).
- scsi: qla2xxx: Suppress two recently introduced compiler warnings (git-fixes).
- scsi: qla2xxx: Warn if done() or free() are called on an already freed srb (bsc#1171688).
- scsi: zfcp: Fix use-after-free in request timeout handlers (git-fixes).
- sctp: shrink stream outq only when new outcnt &lt; old outcnt (networking-stable-20_07_29).
- sctp: shrink stream outq when fails to do addstream reconf (networking-stable-20_07_29).
- sdhci: tegra: Add missing TMCLK for data timeout (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra186 (git-fixes).
- sdhci: tegra: Remove SDHCI_QUIRK_DATA_TIMEOUT_USES_SDCLK for Tegra210 (git-fixes).
- selftests/net: relax cpu affinity requirement in msg_zerocopy test (networking-stable-20_08_08).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- Set VIRTIO_CONSOLE=y (bsc#1175667).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor persistent/resilient handle flags for multiuser mounts (bsc#1176546).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor 'seal' flag for multiuser mounts (bsc#1176545).
- SMB3: warn on confusing error scenario with sec=krb5 (bsc#1176548).
- soundwire: fix double free of dangling pointer (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: stm32: always perform registers configuration prior to transfer (git-fixes).
- spi: stm32: clear only asserted irq flags on interrupt (git-fixes).
- spi: stm32: fix fifo threshold level in case of short transfer (git-fixes).
- spi: stm32: fix pm_runtime_get_sync() error checking (git-fixes).
- spi: stm32: fix stm32_spi_prepare_mbr in case of odd clk_rate (git-fixes).
- spi: stm32h7: fix race condition at end of transfer (git-fixes).
- taprio: Fix using wrong queues in gate mask (bsc#1154353).
- tcp: apply a floor of 1 for RTT samples from TCP timestamps (networking-stable-20_08_08).
- tcp: correct read of TFO keys on big endian systems (networking-stable-20_08_15).
- test_kmod: avoid potential double free in trigger_config_run_type() (git-fixes).
- tg3: Fix soft lockup when tg3_reset_task() fails (git-fixes).
- thermal: qcom-spmi-temp-alarm: Do not suppress negative temp (git-fixes).
- thermal: ti-soc-thermal: Fix bogus thermal shutdowns for omap4430 (git-fixes).
- tracing: fix double free (git-fixes).
- Update patches.suse/btrfs-add-dedicated-members-for-start-and-length-of-.patch (bsc#1176019).
- Update patches.suse/btrfs-Move-free_pages_out-label-in-inline-extent-han.patch (bsc#1174484). 
- USB: cdc-acm: rework notification_buffer resizing (git-fixes).
- USB: core: fix slab-out-of-bounds Read in read_descriptors (git-fixes).
- USB: Fix out of sync data toggle if a configured device is reconfigured (git-fixes).
- USB: gadget: f_ncm: add bounds checks to ncm_unwrap_ntb() (git-fixes).
- USB: gadget: f_tcm: Fix some resource leaks in some error paths (git-fixes).
- USB: gadget: u_f: add overflow checks to VLA macros (git-fixes).
- USB: gadget: u_f: Unbreak offset calculation in VLAs (git-fixes).
- USB: host: ohci-exynos: Fix error handling in exynos_ohci_probe() (git-fixes).
- USB: host: xhci: fix ep context print mismatch in debugfs (git-fixes).
- USB: Ignore UAS for JMicron JMS567 ATA/ATAPI Bridge (git-fixes).
- USB: lvtest: return proper error code in probe (git-fixes).
- USB: quirks: Add no-lpm quirk for another Raydium touchscreen (git-fixes).
- USB: quirks: Add USB_QUIRK_IGNORE_REMOTE_WAKEUP quirk for BYD zhaoxin notebook (git-fixes).
- USB: quirks: Ignore duplicate endpoint on Sound Devices MixPre-D (git-fixes).
- USB: rename USB quirk to USB_QUIRK_ENDPOINT_IGNORE (git-fixes).
- USB: serial: ftdi_sio: add IDs for Xsens Mti USB converter (git-fixes).
- USB: serial: ftdi_sio: clean up receive processing (git-fixes).
- USB: serial: ftdi_sio: fix break and sysrq handling (git-fixes).
- USB: serial: ftdi_sio: make process-packet buffer unsigned (git-fixes).
- USB: serial: option: add support for SIM7070/SIM7080/SIM7090 modules (git-fixes).
- USB: serial: option: support dynamic Quectel USB compositions (git-fixes).
- USB: sisUSBvga: Fix a potential UB casued by left shifting a negative value (git-fixes).
- USB: storage: Add unusual_uas entry for Sony PSZ drives (git-fixes).
- USB: typec: ucsi: acpi: Check the _DEP dependencies (git-fixes).
- USB: typec: ucsi: Prevent mode overrun (git-fixes).
- USB: uas: Add quirk for PNY Pro Elite (git-fixes).
- USB: UAS: fix disconnect by unplugging a hub (git-fixes).
- USB: yurex: Fix bad gfp argument (git-fixes).
- vfio-pci: Avoid recursive read-lock usage (bsc#1176366).
- virtio-blk: free vblk-vqs in error path of virtblk_probe() (git fixes (block drivers)).
- virtio_pci_modern: Fix the comment of virtio_pci_find_capability() (git-fixes).
- vsock/virtio: annotate 'the_virtio_vsock' RCU pointer (networking-stable-20_07_29).
- vt: defer kfree() of vc_screenbuf in vc_do_resize() (git-fixes).
- vxlan: Ensure FDB dump is performed under RCU (networking-stable-20_08_08).
- wireguard: noise: take lock when removing handshake entry from table (git-fixes).
- wireguard: peerlookup: take lock before checking hash in replace operation (git-fixes).
- workqueue: require CPU hotplug read exclusion for apply_workqueue_attrs (bsc#1176763).
- x86/hotplug: Silence APIC only after all interrupts are migrated (git-fixes).
- x86/ima: Use EFI GetVariable only when available (bsc#1174029, bsc#1174110, bsc#1174111).
- x86/mce/inject: Fix a wrong assignment of i_mce.status (bsc#1152489).
- x86, sched: Bail out of frequency invariance if turbo_freq/base_freq gives 0 (bsc#1176925).
- x86, sched: Bail out of frequency invariance if turbo frequency is unknown (bsc#1176925).
- x86, sched: check for counters overflow in frequency invariant accounting (bsc#1176925).
- x86/stacktrace: Fix reliable check for empty user task stacks (bsc#1058115).
- x86/unwind/orc: Fix ORC for newly forked tasks (bsc#1058115).
- xen/balloon: fix accounting in alloc_xenballooned_pages error path (bsc#1065600).
- xen/balloon: make the balloon wait interruptible (bsc#1065600).
- xen: do not reschedule in preemption off sections (bsc#1175749).
- xen/gntdev: Fix dmabuf import with non-zero sgt offset (bsc#1065600).
- XEN uses irqdesc::irq_data_common::handler_data to store a per interrupt XEN data pointer which contains XEN specific information (bsc#1065600).
- xhci: Always restore EP_SOFT_CLEAR_TOGGLE even if ep reset failed (git-fixes).
- xhci: Do warm-reset when both CAS and XDEV_RESUME are set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-08"/>
	<updated date="2020-10-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1058115">SUSE bug 1058115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094244">SUSE bug 1094244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1136666">SUSE bug 1136666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152148">SUSE bug 1152148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167527">SUSE bug 1167527</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170232">SUSE bug 1170232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171068">SUSE bug 1171068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171742">SUSE bug 1171742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172419">SUSE bug 1172419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172757">SUSE bug 1172757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173017">SUSE bug 1173017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173060">SUSE bug 1173060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173115">SUSE bug 1173115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173267">SUSE bug 1173267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174029">SUSE bug 1174029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174110">SUSE bug 1174110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174111">SUSE bug 1174111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174358">SUSE bug 1174358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174484">SUSE bug 1174484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174899">SUSE bug 1174899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175263">SUSE bug 1175263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175667">SUSE bug 1175667</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175718">SUSE bug 1175718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175787">SUSE bug 1175787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175882">SUSE bug 1175882</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175952">SUSE bug 1175952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175996">SUSE bug 1175996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175997">SUSE bug 1175997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175998">SUSE bug 1175998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175999">SUSE bug 1175999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176000">SUSE bug 1176000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176001">SUSE bug 1176001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176022">SUSE bug 1176022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176038">SUSE bug 1176038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176063">SUSE bug 1176063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176137">SUSE bug 1176137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176235">SUSE bug 1176235</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176236">SUSE bug 1176236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176237">SUSE bug 1176237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176242">SUSE bug 1176242</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176278">SUSE bug 1176278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176357">SUSE bug 1176357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176358">SUSE bug 1176358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176359">SUSE bug 1176359</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176360">SUSE bug 1176360</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176361">SUSE bug 1176361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176362">SUSE bug 1176362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176363">SUSE bug 1176363</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176364">SUSE bug 1176364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176365">SUSE bug 1176365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176366">SUSE bug 1176366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176367">SUSE bug 1176367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176381">SUSE bug 1176381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176423">SUSE bug 1176423</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176449">SUSE bug 1176449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176482">SUSE bug 1176482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176486">SUSE bug 1176486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176507">SUSE bug 1176507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176536">SUSE bug 1176536</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176537">SUSE bug 1176537</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176538">SUSE bug 1176538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176539">SUSE bug 1176539</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176540">SUSE bug 1176540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176541">SUSE bug 1176541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176542">SUSE bug 1176542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176544">SUSE bug 1176544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176545">SUSE bug 1176545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176546">SUSE bug 1176546</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176548">SUSE bug 1176548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176558">SUSE bug 1176558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176559">SUSE bug 1176559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176587">SUSE bug 1176587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176588">SUSE bug 1176588</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176659">SUSE bug 1176659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176698">SUSE bug 1176698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176699">SUSE bug 1176699</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176700">SUSE bug 1176700</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176721">SUSE bug 1176721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176722">SUSE bug 1176722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176725">SUSE bug 1176725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176732">SUSE bug 1176732</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176763">SUSE bug 1176763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176775">SUSE bug 1176775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176788">SUSE bug 1176788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176789">SUSE bug 1176789</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176833">SUSE bug 1176833</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176869">SUSE bug 1176869</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176877">SUSE bug 1176877</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176925">SUSE bug 1176925</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176962">SUSE bug 1176962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176980">SUSE bug 1176980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176990">SUSE bug 1176990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177021">SUSE bug 1177021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177030">SUSE bug 1177030</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-0404/">CVE-2020-0404</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-0427/">CVE-2020-0427</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0431/">CVE-2020-0431</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0432/">CVE-2020-0432</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14385/">CVE-2020-14385</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14390/">CVE-2020-14390</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25212/">CVE-2020-25212</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25284/">CVE-2020-25284</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-26088/">CVE-2020-26088</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509360" comment="kernel-default-extra-5.3.18-24.24.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111943" version="1" class="patch">
	<metadata>
		<title>Security update for libproxy (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1176410" ref_url="https://bugzilla.suse.com/1176410" source="BUGZILLA"/>
		<reference ref_id="1177143" ref_url="https://bugzilla.suse.com/1177143" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25219" ref_url="https://www.suse.com/security/cve/CVE-2020-25219/" source="CVE"/>
		<reference ref_id="CVE-2020-26154" ref_url="https://www.suse.com/security/cve/CVE-2020-26154/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007540.html" source="SUSE-SU"/>
		<description>
This update for libproxy fixes the following issues:

- CVE-2020-25219: Rewrote url::recvline to be nonrecursive (bsc#1176410).
- CVE-2020-26154: Fixed a buffer overflow when PAC is enabled (bsc#1177143).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-13"/>
	<updated date="2020-10-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1176410">SUSE bug 1176410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177143">SUSE bug 1177143</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25219/">CVE-2020-25219</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26154/">CVE-2020-26154</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509197" comment="libproxy1-config-gnome3-0.4.15-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509198" comment="libproxy1-networkmanager-0.4.15-4.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111944" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007584.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Security issue fixed:

- CVE-2019-14275: Fixed stack-based buffer overflow in the calc_arrow function (bsc#1143650).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-16"/>
	<updated date="2020-10-16"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509200" comment="transfig-3.2.6a-4.9.113 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111945" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1155798" ref_url="https://bugzilla.suse.com/1155798" source="BUGZILLA"/>
		<reference ref_id="1165692" ref_url="https://bugzilla.suse.com/1165692" source="BUGZILLA"/>
		<reference ref_id="1168468" ref_url="https://bugzilla.suse.com/1168468" source="BUGZILLA"/>
		<reference ref_id="1171675" ref_url="https://bugzilla.suse.com/1171675" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1174003" ref_url="https://bugzilla.suse.com/1174003" source="BUGZILLA"/>
		<reference ref_id="1174098" ref_url="https://bugzilla.suse.com/1174098" source="BUGZILLA"/>
		<reference ref_id="1175599" ref_url="https://bugzilla.suse.com/1175599" source="BUGZILLA"/>
		<reference ref_id="1175621" ref_url="https://bugzilla.suse.com/1175621" source="BUGZILLA"/>
		<reference ref_id="1175807" ref_url="https://bugzilla.suse.com/1175807" source="BUGZILLA"/>
		<reference ref_id="1176019" ref_url="https://bugzilla.suse.com/1176019" source="BUGZILLA"/>
		<reference ref_id="1176400" ref_url="https://bugzilla.suse.com/1176400" source="BUGZILLA"/>
		<reference ref_id="1176907" ref_url="https://bugzilla.suse.com/1176907" source="BUGZILLA"/>
		<reference ref_id="1176979" ref_url="https://bugzilla.suse.com/1176979" source="BUGZILLA"/>
		<reference ref_id="1177090" ref_url="https://bugzilla.suse.com/1177090" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177121" ref_url="https://bugzilla.suse.com/1177121" source="BUGZILLA"/>
		<reference ref_id="1177193" ref_url="https://bugzilla.suse.com/1177193" source="BUGZILLA"/>
		<reference ref_id="1177194" ref_url="https://bugzilla.suse.com/1177194" source="BUGZILLA"/>
		<reference ref_id="1177206" ref_url="https://bugzilla.suse.com/1177206" source="BUGZILLA"/>
		<reference ref_id="1177258" ref_url="https://bugzilla.suse.com/1177258" source="BUGZILLA"/>
		<reference ref_id="1177271" ref_url="https://bugzilla.suse.com/1177271" source="BUGZILLA"/>
		<reference ref_id="1177283" ref_url="https://bugzilla.suse.com/1177283" source="BUGZILLA"/>
		<reference ref_id="1177284" ref_url="https://bugzilla.suse.com/1177284" source="BUGZILLA"/>
		<reference ref_id="1177285" ref_url="https://bugzilla.suse.com/1177285" source="BUGZILLA"/>
		<reference ref_id="1177286" ref_url="https://bugzilla.suse.com/1177286" source="BUGZILLA"/>
		<reference ref_id="1177297" ref_url="https://bugzilla.suse.com/1177297" source="BUGZILLA"/>
		<reference ref_id="1177384" ref_url="https://bugzilla.suse.com/1177384" source="BUGZILLA"/>
		<reference ref_id="1177511" ref_url="https://bugzilla.suse.com/1177511" source="BUGZILLA"/>
		<reference ref_id="1177617" ref_url="https://bugzilla.suse.com/1177617" source="BUGZILLA"/>
		<reference ref_id="1177681" ref_url="https://bugzilla.suse.com/1177681" source="BUGZILLA"/>
		<reference ref_id="1177683" ref_url="https://bugzilla.suse.com/1177683" source="BUGZILLA"/>
		<reference ref_id="1177687" ref_url="https://bugzilla.suse.com/1177687" source="BUGZILLA"/>
		<reference ref_id="1177694" ref_url="https://bugzilla.suse.com/1177694" source="BUGZILLA"/>
		<reference ref_id="1177697" ref_url="https://bugzilla.suse.com/1177697" source="BUGZILLA"/>
		<reference ref_id="1177719" ref_url="https://bugzilla.suse.com/1177719" source="BUGZILLA"/>
		<reference ref_id="1177724" ref_url="https://bugzilla.suse.com/1177724" source="BUGZILLA"/>
		<reference ref_id="1177725" ref_url="https://bugzilla.suse.com/1177725" source="BUGZILLA"/>
		<reference ref_id="1177726" ref_url="https://bugzilla.suse.com/1177726" source="BUGZILLA"/>
		<reference ref_id="954532" ref_url="https://bugzilla.suse.com/954532" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12351" ref_url="https://www.suse.com/security/cve/CVE-2020-12351/" source="CVE"/>
		<reference ref_id="CVE-2020-12352" ref_url="https://www.suse.com/security/cve/CVE-2020-12352/" source="CVE"/>
		<reference ref_id="CVE-2020-24490" ref_url="https://www.suse.com/security/cve/CVE-2020-24490/" source="CVE"/>
		<reference ref_id="CVE-2020-25641" ref_url="https://www.suse.com/security/cve/CVE-2020-25641/" source="CVE"/>
		<reference ref_id="CVE-2020-25643" ref_url="https://www.suse.com/security/cve/CVE-2020-25643/" source="CVE"/>
		<reference ref_id="CVE-2020-25645" ref_url="https://www.suse.com/security/cve/CVE-2020-25645/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:2980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007602.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-12351: Fixed a type confusion while processing AMP packets aka 'BleedingTooth' aka 'BadKarma' (bsc#1177724).
- CVE-2020-24490: Fixed a heap buffer overflow when processing extended advertising report events aka 'BleedingTooth' aka 'BadVibes' (bsc#1177726).
- CVE-2020-12352: Fixed an information leak when processing certain AMP packets aka 'BleedingTooth' aka 'BadChoice' (bsc#1177725).
- CVE-2020-25641: Fixed a zero-length biovec request issued by the block subsystem could have caused the kernel to enter an infinite loop, causing a denial of service (bsc#1177121).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2020-25645: Fixed an issue which traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted (bsc#1177511).

The following non-security bugs were fixed:

- 9p: Fix memory leak in v9fs_mount (git-fixes).
- ACPI: EC: Reference count query handlers under lock (git-fixes).
- airo: Fix read overflows sending packets (git-fixes).
- ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
- arm64: Enable PCI write-combine resources under sysfs (bsc#1175807).
- ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1 (git-fixes).
- ASoC: kirkwood: fix IRQ error handling (git-fixes).
- ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions (git-fixes).
- ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811 (git-fixes).
- ata: ahci: mvebu: Make SATA PHY optional for Armada 3720 (git-fixes).
- ath10k: fix array out-of-bounds access (git-fixes).
- ath10k: fix memory leak for tpc_stats_final (git-fixes).
- ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
- Bluetooth: Fix refcount use-after-free issue (git-fixes).
- Bluetooth: guard against controllers sending zero'd events (git-fixes).
- Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
- Bluetooth: L2CAP: handle l2cap config request during open state (git-fixes).
- Bluetooth: prefetch channel before killing sock (git-fixes).
- brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
- btrfs: block-group: do not set the wrong READA flag for btrfs_read_block_groups() (bsc#1176019).
- btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
- btrfs: block-group: refactor how we delete one block group item (bsc#1176019).
- btrfs: block-group: refactor how we insert a block group item (bsc#1176019).
- btrfs: block-group: refactor how we read one block group item (bsc#1176019).
- btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
- btrfs: check the right error variable in btrfs_del_dir_entries_in_log (bsc#1177687).
- btrfs: do not set the full sync flag on the inode during page release (bsc#1177687).
- btrfs: do not take an extra root ref at allocation time (bsc#1176019).
- btrfs: drop logs when we've aborted a transaction (bsc#1176019).
- btrfs: fix a race between scrub and block group removal/allocation (bsc#1176019).
- Btrfs: fix crash during unmount due to race with delayed inode workers (bsc#1176019).
- btrfs: fix race between page release and a fast fsync (bsc#1177687).
- btrfs: free block groups after free'ing fs trees (bsc#1176019).
- btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
- btrfs: kill the subvol_srcu (bsc#1176019).
- btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
- btrfs: make inodes hold a ref on their roots (bsc#1176019).
- btrfs: make the extent buffer leak check per fs info (bsc#1176019).
- btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#1176019).
- btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc#1176019).
- btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
- btrfs: only commit delayed items at fsync if we are logging a directory (bsc#1177687).
- btrfs: only commit the delayed inode when doing a full fsync (bsc#1177687).
- btrfs: reduce contention on log trees when logging checksums (bsc#1177687).
- btrfs: release old extent maps during page release (bsc#1177687).
- btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
- btrfs: remove no longer needed use of log_writers for the log root tree (bsc#1177687).
- btrfs: rename member 'trimming' of block group to a more generic name (bsc#1176019).
- btrfs: scrub, only lookup for csums if we are dealing with a data extent (bsc#1176019).
- btrfs: stop incremening log_batch for the log root tree when syncing log (bsc#1177687).
- bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host removal (git-fixes).
- clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED (git-fixes).
- clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk (git-fixes).
- clk: tegra: Always program PLL_E when enabled (git-fixes).
- clk/ti/adpll: allocate room for terminating null (git-fixes).
- clocksource/drivers/h8300_timer8: Fix wrong return value in h8300_8timer_init() (git-fixes).
- clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
- create Storage / NVMe subsection
- crypto: algif_aead - Do not set MAY_BACKLOG on the async path (git-fixes).
- crypto: algif_skcipher - EBUSY on aio should be an error (git-fixes).
- crypto: bcm - Verify GCM/CCM key length in setkey (git-fixes).
- crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- crypto: mediatek - Fix wrong return value in mtk_desc_ring_alloc() (git-fixes).
- crypto: omap-sham - fix digcnt register handling with export/import (git-fixes).
- crypto: picoxcell - Fix potential race condition bug (git-fixes).
- crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA (git-fixes).
- cypto: mediatek - fix leaks in mtk_desc_ring_alloc (git-fixes).
- Disable CONFIG_LIVEPATCH_IPA_CLONES where not needed Explicitly disable CONFIG_LIVEPATCH_IPA_CLONES in configs where it is not needed to avoid confusion and unwanted values due to fragment config files.
- dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq fails (git-fixes).
- dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all (git-fixes).
- dmaengine: tegra-apb: Prevent race conditions on channel's freeing (git-fixes).
- dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
- dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling) (git-fixes).
- drivers: char: tlclk.c: Avoid data race between init and interrupt handler (git-fixes).
- drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config (git-fixes).
- drm/radeon: revert 'Prefer lower feedback dividers' (bsc#1177384).
- drop Storage / bsc#1171688 subsection No effect on expanded tree.
- e1000: Do not perform reset in reset_task if we are already down (git-fixes).
- ftrace: Move RCU is watching check after recursion check (git-fixes).
- fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
- gpio: mockup: fix resource leak in error path (git-fixes).
- gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
- gpio: siox: explicitly support only threaded irqs (git-fixes).
- gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
- gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
- hwmon: (applesmc) check status earlier (git-fixes).
- hwmon: (mlxreg-fan) Fix double 'Mellanox' (git-fixes).
- hwmon: (pmbus/max34440) Fix status register reads for MAX344{51,60,61} (git-fixes).
- i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
- i2c: core: Call i2c_acpi_install_space_handler() before i2c_acpi_register_devices() (git-fixes).
- i2c: cpm: Fix i2c_ram structure (git-fixes).
- i2c: i801: Exclude device from suspend direct complete optimization (git-fixes).
- i2c: meson: fix clock setting overwrite (git-fixes).
- i2c: meson: fixup rate calculation with filter delay (git-fixes).
- i2c: owl: Clear NACK and BUS error bits (git-fixes).
- i2c: tegra: Prevent interrupt triggering after transfer timeout (git-fixes).
- i2c: tegra: Restore pinmux on system resume (git-fixes).
- ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
- ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
- iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
- ima: extend boot_aggregate with kernel measurements (bsc#1177617).
- Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
- iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#1177297).
- iommu/amd: Fix potential @entry null deref (bsc#1177283).
- iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
- iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#1177285).
- iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc#1177286).
- iommu/vt-d: Correctly calculate agaw in domain_init() (bsc#1176400).
- kabi fix for NFS: Fix flexfiles read failover (git-fixes).
- kabi: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- kabi/severities: ignore kABI for target_core_rbd Match behaviour for all other Ceph specific modules.
- kernel-binary.spec.in: Exclude .config.old from kernel-devel  - use tar excludes for .kernel-binary.spec.buildenv
- kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.
- leds: mlxreg: Fix possible buffer overflow (git-fixes).
- libceph-add-support-for-CMPEXT-compare-extent-reques.patch: (bsc#1177090).
- mac80211: do not allow bigger VHT MPDUs than the hardware supports (git-fixes).
- mac80211: skip mpath lookup also for control port tx (git-fixes).
- mac802154: tx: fix use-after-free (git-fixes).
- macsec: avoid use-after-free in macsec_handle_frame() (git-fixes).
- media: camss: Fix a reference count leak (git-fixes).
- media: m5mols: Check function pointer in m5mols_sensor_power (git-fixes).
- media: mc-device.c: fix memleak in media_device_register_entity (git-fixes).
- media: mx2_emmaprp: Fix memleak in emmaprp_probe (git-fixes).
- media: omap3isp: Fix memleak in isp_probe (git-fixes).
- media: ov5640: Correct Bit Div register in clock tree diagram (git-fixes).
- media: platform: fcp: Fix a reference count leak (git-fixes).
- media: rcar-csi2: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar-vin: Fix a reference count leak (git-fixes).
- media: rc: do not access device via sysfs after rc_unregister_device() (git-fixes).
- media: rc: uevent sysfs file races with rc_unregister_device() (git-fixes).
- media: Revert 'media: exynos4-is: Add missed check for pinctrl_lookup_state()' (git-fixes).
- media: rockchip/rga: Fix a reference count leak (git-fixes).
- media: s5p-mfc: Fix a reference count leak (git-fixes).
- media: smiapp: Fix error handling at NVM reading (git-fixes).
- media: staging/intel-ipu3: css: Correctly reset some memory (git-fixes).
- media: stm32-dcmi: Fix a reference count leak (git-fixes).
- media: tc358743: cleanup tc358743_cec_isr (git-fixes).
- media: tc358743: initialize variable (git-fixes).
- media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
- media: ti-vpe: Fix a missing check and reference count leak (git-fixes).
- media: tuner-simple: fix regression in simple_set_radio_freq (git-fixes).
- media: usbtv: Fix refcounting mixup (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Document asd allocation requirements (git-fixes).
- mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
- mm: call cond_resched() from deferred_init_memmap() (git fixes (mm/init), bsc#1177697).
- mmc: core: do not set limits.discard_granularity as 0 (git-fixes).
- mmc: core: Rework wp-gpio handling (git-fixes).
- mm, compaction: fully assume capture is not NULL in compact_zone_order() (git fixes (mm/compaction), bsc#1177681).
- mm, compaction: make capture control handling safe wrt interrupts (git fixes (mm/compaction), bsc#1177681).
- mmc: sdhci-acpi: AMDI0040: Set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mmc: sdhci: Add LTR support for some Intel BYT based controllers (git-fixes).
- mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS models (git-fixes).
- mm/debug.c: always print flags in dump_page() (git fixes (mm/debug)).
- mm: initialize deferred pages with interrupts enabled (git fixes (mm/init), bsc#1177697).
- mm/memcontrol.c: lost css_put in memcg_expand_shrinker_maps() (bsc#1177694).
- mm/migrate.c: also overwrite error when it is bigger than zero (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: report the number of non-attempted pages (git fixes (mm/move_pages), bsc#1177683).
- mm: move_pages: return valid node id in status if the page is already on the target node (git fixes (mm/move_pages), bsc#1177683).
- mm/pagealloc.c: call touch_nmi_watchdog() on max order boundaries in deferred init (git fixes (mm/init), bsc#1177697).
- mm, slab/slub: move and improve cache_from_obj() (mm/slub bsc#1165692). mm, slab/slub: improve error reporting and overhead of cache_from_obj() (mm/slub bsc#1165692). 
- mm, slub: extend checks guarded by slub_debug static key (mm/slub bsc#1165692).
- mm, slub: extend slub_debug syntax for multiple blocks (mm/slub bsc#1165692).
- mm, slub: introduce kmem_cache_debug_flags() (mm/slub bsc#1165692).
- mm, slub: introduce static key for slub_debug() (mm/slub bsc#1165692).
- mm, slub: make reclaim_account attribute read-only (mm/slub bsc#1165692).
- mm, slub: make remaining slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: make some slub_debug related attributes read-only (mm/slub bsc#1165692).
- mm, slub: remove runtime allocation order changes (mm/slub bsc#1165692).
- mm, slub: restore initial kmem_cache flags (mm/slub bsc#1165692).
- Move upstreamed intel-vbtn patch into sorted section
- mt76: add missing locking around ampdu action (git-fixes).
- mt76: clear skb pointers from rx aggregation reorder buffer during cleanup (git-fixes).
- mt76: do not use devm API for led classdev (git-fixes).
- mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
- mt76: fix LED link time failure (git-fixes).
- mtd: cfi_cmdset_0002: do not free cfi-&gt;cfiq in error path of cfi_amdstd_setup() (git-fixes).
- mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
- mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
- net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
- nfsd4: fix NULL dereference in nfsd/clients display code (git-fixes).
- NFS: Do not move layouts to plh_return_segs list while in use (git-fixes).
- NFS: Do not return layout segments that are in use (git-fixes).
- NFS: ensure correct writeback errors are returned on close() (git-fixes).
- NFS: Fix flexfiles read failover (git-fixes).
- NFS: Fix security label length not being reset (bsc#1176381).
- NFS: nfs_file_write() should check for writeback errors (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- nvme-multipath: retry commands for dying queues (bsc#1171688).
- patches.suse/target-compare-and-write-backend-driver-sense-handli.patch: (bsc#1177719).
- patches.suse/target-rbd-detect-stripe_unit-SCSI-block-size-misali.patch (bsc#1177090).
- patches.suse/target-rbd-support-COMPARE_AND_WRITE.patch: (fate#318836, bsc#1177090).
- PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
- PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
- phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
- pinctrl: bcm: fix kconfig dependency warning when !GPIOLIB (git-fixes).
- pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
- Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
- platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP (git-fixes).
- platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
- platform/x86: intel_pmc_core: do not create a static struct device (git-fixes).
- platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE reporting (bsc#1175599).
- platform/x86: thinkpad_acpi: initialize tp_nvram_state variable (git-fixes).
- platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse (git-fixes).
- pNFS/flexfiles: Ensure we initialise the mirror bsizes correctly on read (git-fixes).
- powerpc/dma: Fix dma_map_ops::get_required_mask (bsc#1065729).
- power: supply: max17040: Correct voltage reading (git-fixes).
- qla2xxx: Return EBUSY on fcport deletion (bsc#1171688).
- r8169: fix data corruption issue on RTL8402 (bsc#1174098).
- rbd-add-rbd_img_fill_cmp_and_write_from_bvecs.patch: (bsc#1177090).
- rbd-add-support-for-COMPARE_AND_WRITE-CMPEXT.patch: (bsc#1177090).
- RDMA/hfi1: Correct an interlock issue for TID RDMA WRITE request (bsc#1175621).
- Refresh patches.suse/fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#1171675).
- regulator: axp20x: fix LDO2/4 description (git-fixes).
- regulator: resolve supply after creating regulator (git-fixes).
- rename Other drivers / Intel IOMMU subsection to IOMMU
- Rename patches to the same name as in SLE15-SP3.
- Rename scsi-fnic-do-not-call-scsi_done-for-unhandled-commands.patch Fix typo in patch file name.
- rtc: ds1374: fix possible race condition (git-fixes).
- rtc: sa1100: fix possible race condition (git-fixes).
- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
- sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#1155798 (CPU scheduler functional and performance backports)).
- sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler functional and performance backports)).
- scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername() (bsc#1177258).
- scsi: qla2xxx: Add IOCB resource tracking (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add rport fields in debugfs (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Add SLER and PI control support (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Correct the check for sscanf() return value (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix buffer-buffer credit extraction error (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix crash on session cleanup with unload (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_dbg.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in qla_os.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix inconsistent format argument type in tcm_qla2xxx.c (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O errors during LIP reset tests (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix I/O failures during remote port toggle testing (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix memory size truncation (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix MPI reset needed message (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix point-to-point (N2N) device discovery issue (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Fix reset of MPI firmware (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Honor status qualifier in FCP_RSP per spec (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Make tgt_port_database available in initiator mode (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Performance tweak (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Reduce duplicate code in reporting speed (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Remove unneeded variable 'rval' (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Setup debugfs entries for remote ports (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.102-k (bsc#1171688 bsc#1174003).
- scsi: qla2xxx: Update version to 10.02.00.103-k (bsc#1171688 bsc#1174003).
- serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout (git-fixes).
- serial: 8250_omap: Fix sleeping function called from invalid context during probe (git-fixes).
- serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
- serial: uartps: Wait for tx_empty in console setup (git-fixes).
- spi: dw-pci: free previously allocated IRQs if desc-&gt;setup() fails (git-fixes).
- spi: fsl-espi: Only process interrupts for expected events (git-fixes).
- spi: omap2-mcspi: Improve performance waiting for CHSTAT (git-fixes).
- spi: sprd: Release DMA channel also on probe deferral (git-fixes).
- spi: stm32: Rate-limit the 'Communication suspended' message (git-fixes).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (git-fixes).
- target-rbd-add-emulate_legacy_capacity-dev-attribute.patch: (bsc#1177109).
- target-rbd-add-WRITE-SAME-support.patch: (bsc#1177090).
- target-rbd-conditionally-fix-off-by-one-bug-in-get_b.patch: (bsc#1177109).
- target-rbd-fix-unmap-discard-block-size-conversion.patch: (bsc#1177271).
- target-rbd-fix-unmap-handling-with-unmap_zeroes_data.patch: (bsc#1177271).
- thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
- Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#1177194).
- USB: dwc3: Increase timeout for CmdAct cleared by device controller (git-fixes).
- USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
- USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int (git-fixes).
- USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1176979).
- virtio-net: do not disable guest csum when disable LRO (git-fixes).
- vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
- wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
- wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
- x86/unwind/orc: Fix inactive tasks with stack pointer in %sp on GCC 10 compiled kernels (bsc#1176907).
- xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
- xprtrdma: fix incorrect header size calculations (git-fixes).
- yam: fix possible memory leak in yam_init_driver (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-21"/>
	<updated date="2020-10-21"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155798">SUSE bug 1155798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165692">SUSE bug 1165692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168468">SUSE bug 1168468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171675">SUSE bug 1171675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174003">SUSE bug 1174003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174098">SUSE bug 1174098</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175599">SUSE bug 1175599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175621">SUSE bug 1175621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175807">SUSE bug 1175807</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176019">SUSE bug 1176019</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176400">SUSE bug 1176400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176907">SUSE bug 1176907</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176979">SUSE bug 1176979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177090">SUSE bug 1177090</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177121">SUSE bug 1177121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177193">SUSE bug 1177193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177194">SUSE bug 1177194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177206">SUSE bug 1177206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177258">SUSE bug 1177258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177271">SUSE bug 1177271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177283">SUSE bug 1177283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177284">SUSE bug 1177284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177285">SUSE bug 1177285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177286">SUSE bug 1177286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177297">SUSE bug 1177297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177384">SUSE bug 1177384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177511">SUSE bug 1177511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177617">SUSE bug 1177617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177681">SUSE bug 1177681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177683">SUSE bug 1177683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177687">SUSE bug 1177687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177694">SUSE bug 1177694</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177697">SUSE bug 1177697</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177719">SUSE bug 1177719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177724">SUSE bug 1177724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177725">SUSE bug 1177725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177726">SUSE bug 1177726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/954532">SUSE bug 954532</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12351/">CVE-2020-12351</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12352/">CVE-2020-12352</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-24490/">CVE-2020-24490</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25641/">CVE-2020-25641</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25643/">CVE-2020-25643</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-25645/">CVE-2020-25645</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509361" comment="kernel-default-extra-5.3.18-24.29.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111946" version="1" class="patch">
	<metadata>
		<title>Security update for bluez (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1166751" ref_url="https://bugzilla.suse.com/1166751" source="BUGZILLA"/>
		<reference ref_id="1177895" ref_url="https://bugzilla.suse.com/1177895" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0556" ref_url="https://www.suse.com/security/cve/CVE-2020-0556/" source="CVE"/>
		<reference ref_id="CVE-2020-27153" ref_url="https://www.suse.com/security/cve/CVE-2020-27153/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007623.html" source="SUSE-SU"/>
		<description>
This update for bluez fixes the following issues:

- CVE-2020-27153: Fixed crash on disconnect (bsc#1177895).
- CVE-2020-0556: Fixed potential escalation of privilege and denial of service via adjacent access, caused by improper access control (bsc#1166751).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-26"/>
	<updated date="2020-10-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1166751">SUSE bug 1166751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177895">SUSE bug 1177895</bugzilla>
	<cve impact="moderate" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-0556/">CVE-2020-0556</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2020-27153/">CVE-2020-27153</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509362" comment="bluez-cups-5.48-13.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111947" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird and mozilla-nspr (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174230" ref_url="https://bugzilla.suse.com/1174230" source="BUGZILLA"/>
		<reference ref_id="1176384" ref_url="https://bugzilla.suse.com/1176384" source="BUGZILLA"/>
		<reference ref_id="1176756" ref_url="https://bugzilla.suse.com/1176756" source="BUGZILLA"/>
		<reference ref_id="1176899" ref_url="https://bugzilla.suse.com/1176899" source="BUGZILLA"/>
		<reference ref_id="1177977" ref_url="https://bugzilla.suse.com/1177977" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15673" ref_url="https://www.suse.com/security/cve/CVE-2020-15673/" source="CVE"/>
		<reference ref_id="CVE-2020-15676" ref_url="https://www.suse.com/security/cve/CVE-2020-15676/" source="CVE"/>
		<reference ref_id="CVE-2020-15677" ref_url="https://www.suse.com/security/cve/CVE-2020-15677/" source="CVE"/>
		<reference ref_id="CVE-2020-15678" ref_url="https://www.suse.com/security/cve/CVE-2020-15678/" source="CVE"/>
		<reference ref_id="CVE-2020-15683" ref_url="https://www.suse.com/security/cve/CVE-2020-15683/" source="CVE"/>
		<reference ref_id="CVE-2020-15969" ref_url="https://www.suse.com/security/cve/CVE-2020-15969/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-October/007671.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird and mozilla-nspr fixes the following issues:

- Mozilla Thunderbird 78.4
  * new: MailExtensions: browser.tabs.sendMessage API added
  * new: MailExtensions: messageDisplayScripts API added
  * changed: Yahoo and AOL mail users using password authentication will be migrated to OAuth2
  * changed: MailExtensions: messageDisplay APIs extended to support multiple selected messages
  * changed: MailExtensions: compose.begin functions now support creating a message with attachments
  * fixed: Thunderbird could freeze when updating global search index
  * fixed: Multiple issues with handling of self-signed SSL certificates addressed
  * fixed: Recipient address fields in compose window could expand to fill all available space
  * fixed: Inserting emoji characters in message compose window caused unexpected behavior
  * fixed: Button to restore default folder icon color was not keyboard accessible
  * fixed: Various keyboard navigation fixes
  * fixed: Various color-related theme fixes
  * fixed: MailExtensions: Updating attachments with onBeforeSend.addListener() did not work
  MFSA 2020-47 (bsc#1177977)
  * CVE-2020-15969 Use-after-free in usersctp
  * CVE-2020-15683 Memory safety bugs fixed in Thunderbird 78.4
- Mozilla Thunderbird 78.3.3
  * OpenPGP: Improved support for encrypting with subkeys
  * OpenPGP message status icons were not visible in message header pane
  * Creating a new calendar event did not require an event title
- Mozilla Thunderbird 78.3.2 (bsc#1176899)
  * OpenPGP: Improved support for encrypting with subkeys
  * OpenPGP: Encrypted messages with international characters were sometimes displayed incorrectly
  * Single-click deletion of recipient pills with middle mouse button restored
  * Searching an address book list did not display results
  * Dark mode, high contrast, and Windows theming fixes
- Mozilla Thunderbird 78.3.1
  * fix crash in nsImapProtocol::CreateNewLineFromSocket
- Mozilla Thunderbird 78.3.0
  MFSA 2020-44 (bsc#1176756)
  * CVE-2020-15677 Download origin spoofing via redirect
  * CVE-2020-15676 XSS when pasting attacker-controlled data into a contenteditable element
  * CVE-2020-15678 When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after- free scenario
  * CVE-2020-15673 Memory safety bugs fixed in Thunderbird 78.3

- update mozilla-nspr to version 4.25.1
  * The macOS platform code for shared library loading was
    changed to support macOS 11.
  * Dependency needed for the MozillaThunderbird udpate
		</description>
<advisory from="security@suse.de">
	<issued date="2020-10-29"/>
	<updated date="2020-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174230">SUSE bug 1174230</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176384">SUSE bug 1176384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176756">SUSE bug 1176756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176899">SUSE bug 1176899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177977">SUSE bug 1177977</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15673/">CVE-2020-15673</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2020-15676/">CVE-2020-15676</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15677/">CVE-2020-15677</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15678/">CVE-2020-15678</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15683/">CVE-2020-15683</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15969/">CVE-2020-15969</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509202" comment="MozillaThunderbird-78.4.0-3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509203" comment="MozillaThunderbird-translations-common-78.4.0-3.99.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509204" comment="MozillaThunderbird-translations-other-78.4.0-3.99.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111948" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1055014" ref_url="https://bugzilla.suse.com/1055014" source="BUGZILLA"/>
		<reference ref_id="1055186" ref_url="https://bugzilla.suse.com/1055186" source="BUGZILLA"/>
		<reference ref_id="1061843" ref_url="https://bugzilla.suse.com/1061843" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1077428" ref_url="https://bugzilla.suse.com/1077428" source="BUGZILLA"/>
		<reference ref_id="1129923" ref_url="https://bugzilla.suse.com/1129923" source="BUGZILLA"/>
		<reference ref_id="1134760" ref_url="https://bugzilla.suse.com/1134760" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1174748" ref_url="https://bugzilla.suse.com/1174748" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175898" ref_url="https://bugzilla.suse.com/1175898" source="BUGZILLA"/>
		<reference ref_id="1176485" ref_url="https://bugzilla.suse.com/1176485" source="BUGZILLA"/>
		<reference ref_id="1176713" ref_url="https://bugzilla.suse.com/1176713" source="BUGZILLA"/>
		<reference ref_id="1177086" ref_url="https://bugzilla.suse.com/1177086" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177410" ref_url="https://bugzilla.suse.com/1177410" source="BUGZILLA"/>
		<reference ref_id="1177411" ref_url="https://bugzilla.suse.com/1177411" source="BUGZILLA"/>
		<reference ref_id="1177470" ref_url="https://bugzilla.suse.com/1177470" source="BUGZILLA"/>
		<reference ref_id="1177739" ref_url="https://bugzilla.suse.com/1177739" source="BUGZILLA"/>
		<reference ref_id="1177749" ref_url="https://bugzilla.suse.com/1177749" source="BUGZILLA"/>
		<reference ref_id="1177750" ref_url="https://bugzilla.suse.com/1177750" source="BUGZILLA"/>
		<reference ref_id="1177754" ref_url="https://bugzilla.suse.com/1177754" source="BUGZILLA"/>
		<reference ref_id="1177755" ref_url="https://bugzilla.suse.com/1177755" source="BUGZILLA"/>
		<reference ref_id="1177765" ref_url="https://bugzilla.suse.com/1177765" source="BUGZILLA"/>
		<reference ref_id="1177814" ref_url="https://bugzilla.suse.com/1177814" source="BUGZILLA"/>
		<reference ref_id="1177817" ref_url="https://bugzilla.suse.com/1177817" source="BUGZILLA"/>
		<reference ref_id="1177854" ref_url="https://bugzilla.suse.com/1177854" source="BUGZILLA"/>
		<reference ref_id="1177855" ref_url="https://bugzilla.suse.com/1177855" source="BUGZILLA"/>
		<reference ref_id="1177856" ref_url="https://bugzilla.suse.com/1177856" source="BUGZILLA"/>
		<reference ref_id="1177861" ref_url="https://bugzilla.suse.com/1177861" source="BUGZILLA"/>
		<reference ref_id="1178002" ref_url="https://bugzilla.suse.com/1178002" source="BUGZILLA"/>
		<reference ref_id="1178079" ref_url="https://bugzilla.suse.com/1178079" source="BUGZILLA"/>
		<reference ref_id="1178246" ref_url="https://bugzilla.suse.com/1178246" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14351" ref_url="https://www.suse.com/security/cve/CVE-2020-14351/" source="CVE"/>
		<reference ref_id="CVE-2020-16120" ref_url="https://www.suse.com/security/cve/CVE-2020-16120/" source="CVE"/>
		<reference ref_id="CVE-2020-25285" ref_url="https://www.suse.com/security/cve/CVE-2020-25285/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007681.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485).
- CVE-2020-16120: Fixed permission check to open real file when using overlayfs. It was possible to have a file not readable by an unprivileged user be copied to a mountpoint controlled by that user and then be able to access the file. (bsc#1177470)
- CVE-2020-14351: Fixed a race condition in the perf_mmap_close() function (bsc#1177086).

The following non-security bugs were fixed:

- ACPI: Always build evged in (git-fixes).
- ACPI: button: fix handling lid state changes when input device closed (git-fixes).
- ACPI: configfs: Add missing config_item_put() to fix refcount leak (git-fixes).
- acpi-cpufreq: Honor _PSD table setting on new AMD CPUs (git-fixes).
- ACPI: debug: do not allow debugging when ACPI is disabled (git-fixes).
- Add CONFIG_CHECK_CODESIGN_EKU
- ALSA: ac97: (cosmetic) align argument names (git-fixes).
- ALSA: aoa: i2sbus: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: asihpi: fix spellint typo in comments (git-fixes).
- ALSA: atmel: ac97: clarify operator precedence (git-fixes).
- ALSA: bebob: potential info leak in hwdep_read() (git-fixes).
- ALSA: compress_offload: remove redundant initialization (git-fixes).
- ALSA: core: init: use DECLARE_COMPLETION_ONSTACK() macro (git-fixes).
- ALSA: core: pcm: simplify locking for timers (git-fixes).
- ALSA: core: timer: clarify operator precedence (git-fixes).
- ALSA: core: timer: remove redundant assignment (git-fixes).
- ALSA: ctl: Workaround for lockdep warning wrt card-&gt;ctl_files_rwlock (git-fixes).
- ALSA: fireworks: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hda: auto_parser: remove shadowed variable declaration (git-fixes).
- ALSA: hda: (cosmetic) align function parameters (git-fixes).
- ALSA: hda - Do not register a cb func if it is registered already (git-fixes).
- ALSA: hda - Fix the return value if cb func is already registered (git-fixes).
- ALSA: hda/hdmi: fix incorrect locking in hdmi_pcm_close (git-fixes).
- ALSA: hda/realtek - Add mute Led support for HP Elitebook 845 G7 (git-fixes).
- ALSA: hda/realtek: Enable audio jacks of ASUS D700SA with ALC887 (git-fixes).
- ALSA: hda/realtek - set mic to auto detect on a HP AIO machine (git-fixes).
- ALSA: hda/realtek - The front Mic on a HP machine does not work (git-fixes).
- ALSA: hda: use semicolons rather than commas to separate statements (git-fixes).
- ALSA: hdspm: Fix typo arbitary (git-fixes).
- ALSA: mixart: Correct comment wrt obsoleted tasklet usage (git-fixes).
- ALSA: portman2x4: fix repeated word 'if' (git-fixes).
- ALSA: rawmidi: (cosmetic) align function parameters (git-fixes).
- ALSA: seq: oss: Avoid mutex lock for a long-time ioctl (git-fixes).
- ALSA: sparc: dbri: fix repeated word 'the' (git-fixes).
- ALSA: usb-audio: Add mixer support for Pioneer DJ DJM-250MK2 (git-fixes).
- ALSA: usb-audio: endpoint.c: fix repeated word 'there' (git-fixes).
- ALSA: usb-audio: fix spelling mistake 'Frequence' -&gt; 'Frequency' (git-fixes).
- ALSA: usb-audio: Line6 Pod Go interface requires static clock rate quirk (git-fixes).
- ALSA: usb: scarless_gen2: fix endianness issue (git-fixes).
- ALSA: vx: vx_core: clarify operator precedence (git-fixes).
- ALSA: vx: vx_pcm: remove redundant assignment (git-fixes).
- ASoC: fsl: imx-es8328: add missing put_device() call in imx_es8328_probe() (git-fixes).
- ASoC: fsl_sai: Instantiate snd_soc_dai_driver (git-fixes).
- ASoC: qcom: lpass-cpu: fix concurrency issue (git-fixes).
- ASoC: qcom: lpass-platform: fix memory leak (git-fixes).
- ASoC: sun50i-codec-analog: Fix duplicate use of ADC enable bits (git-fixes).
- ASoC: tlv320aic32x4: Fix bdiv clock rate derivation (git-fixes).
- ata: sata_rcar: Fix DMA boundary mask (git-fixes).
- ath10k: Fix the size used in a 'dma_free_coherent()' call in an error handling path (git-fixes).
- ath10k: provide survey info as accumulated data (git-fixes).
- ath6kl: prevent potential array overflow in ath6kl_add_new_sta() (git-fixes).
- ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() (git-fixes).
- ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: sky81452-backlight: Fix refcount imbalance on error (git-fixes).
- blk-mq: order adding requests to hctx-&gt;dispatch and checking SCHED_RESTART (bsc#1177750).
- block: ensure bdi-&gt;io_pages is always initialized (bsc#1177749).
- block: Fix page_is_mergeable() for compound pages (bsc#1177814).
- Bluetooth: hci_uart: Cancel init work before unregistering (git-fixes).
- Bluetooth: MGMT: Fix not checking if BT_HS is enabled (git-fixes).
- brcmfmac: check ndev pointer (git-fixes).
- btrfs: add owner and fs_info to alloc_state io_tree (bsc#1177854).
- btrfs: qgroup: fix qgroup meta rsv leak for subvolume operations (bsc#1177856).
- btrfs: qgroup: fix wrong qgroup metadata reserve for delayed inode (bsc#1177855).
- btrfs: tree-checker: fix false alert caused by legacy btrfs root item (bsc#1177861).
- can: c_can: reg_map_{c,d}_can: mark as __maybe_unused (git-fixes).
- can: flexcan: remove ack_grp and ack_bit handling from driver (git-fixes).
- can: softing: softing_card_shutdown(): add braces around empty body in an 'if' statement (git-fixes).
- clk: at91: clk-main: update key before writing AT91_CKGR_MOR (git-fixes).
- clk: at91: remove the checking of parent_name (git-fixes).
- clk: bcm2835: add missing release if devm_clk_hw_register fails (git-fixes).
- clk: imx8mq: Fix usdhc parents order (git-fixes).
- clk: keystone: sci-clk: fix parsing assigned-clock data during probe (git-fixes).
- clk: meson: g12a: mark fclk_div2 as critical (git-fixes).
- clk: qcom: gcc-sdm660: Fix wrong parent_map (git-fixes).
- cxl: Rework error message for incompatible slots (bsc#1055014 git-fixes).
- dax: Fix compilation for CONFIG_DAX &amp;&amp; !CONFIG_FS_DAX (bsc#1177817).
- dma-direct: add missing set_memory_decrypted() for coherent mapping (bsc#1175898, ECO-2743).
- dma-direct: always align allocation size in dma_direct_alloc_pages() (bsc#1175898, ECO-2743).
- dma-direct: atomic allocations must come from atomic coherent pools (bsc#1175898, ECO-2743).
- dma-direct: check return value when encrypting or decrypting memory (bsc#1175898, ECO-2743).
- dma-direct: consolidate the error handling in dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dma-direct: make uncached_kernel_address more general (bsc#1175898, ECO-2743).
- dma-direct: provide function to check physical memory area validity (bsc#1175898, ECO-2743).
- dma-direct: provide mmap and get_sgtable method overrides (bsc#1175898, ECO-2743).
- dma-direct: re-encrypt memory if dma_direct_alloc_pages() fails (bsc#1175898, ECO-2743).
- dma-direct: remove __dma_direct_free_pages (bsc#1175898, ECO-2743).
- dma-direct: remove the dma_handle argument to __dma_direct_alloc_pages (bsc#1175898, ECO-2743).
- dmaengine: dma-jz4780: Fix race in jz4780_dma_tx_status (git-fixes).
- dmaengine: dmatest: Check list for emptiness before access its last entry (git-fixes).
- dma-mapping: add a dma_can_mmap helper (bsc#1175898, ECO-2743).
- dma-mapping: always use VM_DMA_COHERENT for generic DMA remap (bsc#1175898, ECO-2743).
- dma-mapping: DMA_COHERENT_POOL should select GENERIC_ALLOCATOR (bsc#1175898, ECO-2743).
- dma-mapping: make dma_atomic_pool_init self-contained (bsc#1175898, ECO-2743).
- dma-mapping: merge the generic remapping helpers into dma-direct (bsc#1175898, ECO-2743).
- dma-mapping: remove arch_dma_mmap_pgprot (bsc#1175898, ECO-2743).
- dma-mapping: warn when coherent pool is depleted (bsc#1175898, ECO-2743).
- dma-pool: add additional coherent pools to map to gfp mask (bsc#1175898, ECO-2743).
- dma-pool: add pool sizes to debugfs (bsc#1175898, ECO-2743).
- dma-pool: decouple DMA_REMAP from DMA_COHERENT_POOL (bsc#1175898, ECO-2743).
- dma-pool: do not allocate pool memory from CMA (bsc#1175898, ECO-2743).
- dma-pool: dynamically expanding atomic pools (bsc#1175898, ECO-2743).
- dma-pool: Fix an uninitialized variable bug in atomic_pool_expand() (bsc#1175898, ECO-2743).
- dma-pool: fix coherent pool allocations for IOMMU mappings (bsc#1175898, ECO-2743).
- dma-pool: fix too large DMA pools on medium memory size systems (bsc#1175898, ECO-2743).
- dma-pool: get rid of dma_in_atomic_pool() (bsc#1175898, ECO-2743).
- dma-pool: introduce dma_guess_pool() (bsc#1175898, ECO-2743).
- dma-pool: make sure atomic pool suits device (bsc#1175898, ECO-2743).
- dma-pool: Only allocate from CMA when in same memory zone (bsc#1175898, ECO-2743).
- dma-pool: scale the default DMA coherent pool size with memory capacity (bsc#1175898, ECO-2743).
- dma-remap: separate DMA atomic pools from direct remap code (bsc#1175898, ECO-2743).
- dm: Call proper helper to determine dax support (bsc#1177817).
- dm/dax: Fix table reference counts (bsc#1178246).
- docs: driver-api: remove a duplicated index entry (git-fixes).
- EDAC/i5100: Fix error handling order in i5100_init_one() (bsc#1152489).
- extcon: ptn5150: Fix usage of atomic GPIO with sleeping GPIO chips (git-fixes).
- HID: hid-input: fix stylus battery reporting (git-fixes).
- HID: roccat: add bounds checking in kone_sysfs_write_settings() (git-fixes).
- HID: wacom: Avoid entering wacom_wac_pen_report for pad / battery (git-fixes).
- i2c: core: Restore acpi_walk_dep_device_list() getting called after registering the ACPI i2c devs (git-fixes).
- i2c: imx: Fix external abort on interrupt in exit paths (git-fixes).
- i2c: rcar: Auto select RESET_CONTROLLER (git-fixes).
- i3c: master add i3c_master_attach_boardinfo to preserve boardinfo (git-fixes).
- i3c: master: Fix error return in cdns_i3c_master_probe() (git-fixes).
- ibmveth: Switch order of ibmveth_helper calls (bsc#1061843 git-fixes).
- ibmvnic: save changed mac address to adapter-&gt;mac_addr (bsc#1134760 ltc#177449 git-fixes).
- ibmvnic: set up 200GBPS speed (bsc#1129923 git-fixes).
- ida: Free allocated bitmap in error path (git-fixes).
- iio:accel:bma180: Fix use of true when should be iio_shared_by enum (git-fixes).
- iio: adc: gyroadc: fix leak of device node iterator (git-fixes).
- iio: adc: stm32-adc: fix runtime autosuspend delay when slow polling (git-fixes).
- iio:adc:ti-adc0832 Fix alignment issue with timestamp (git-fixes).
- iio:adc:ti-adc12138 Fix alignment issue with timestamp (git-fixes).
- iio:dac:ad5592r: Fix use of true for IIO_SHARED_BY_TYPE (git-fixes).
- iio:gyro:itg3200: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:si1145: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magn:hmc5843: Fix passing true where iio_shared_by enum required (git-fixes).
- ima: Do not ignore errors from crypto_shash_update() (git-fixes).
- ima: Remove semicolon at the end of ima_get_binary_runtime_size() (git-fixes).
- Input: ati_remote2 - add missing newlines when printing module parameters (git-fixes).
- Input: ep93xx_keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: imx6ul_tsc - clean up some errors in imx6ul_tsc_resume() (git-fixes).
- Input: omap4-keypad - fix handling of platform_get_irq() error (git-fixes).
- Input: stmfts - fix a &amp; vs &amp;&amp; typo (git-fixes).
- Input: sun4i-ps2 - fix handling of platform_get_irq() error (git-fixes).
- Input: twl4030_keypad - fix handling of platform_get_irq() error (git-fixes).
- iomap: Make sure iomap_end is called after iomap_begin (bsc#1177754).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1177739).
- ipmi_si: Fix wrong return value in try_smi_init() (git-fixes).
- iwlwifi: mvm: split a print to avoid a WARNING in ROC (git-fixes).
- kABI: Fix kABI after add CodeSigning extended key usage (bsc#1177353).
- leds: mt6323: move period calculation (git-fixes).
- lib/crc32.c: fix trivial typo in preprocessor condition (git-fixes).
- memory: fsl-corenet-cf: Fix handling of platform_get_irq() error (git-fixes).
- memory: omap-gpmc: Fix a couple off by ones (git-fixes).
- memory: omap-gpmc: Fix build error without CONFIG_OF (git-fixes).
- mfd: sm501: Fix leaks in probe() (git-fixes).
- misc: mic: scif: Fix error handling path (git-fixes).
- mm: do not panic when links can't be created in sysfs (bsc#1178002).
- mm: do not rely on system state to detect hot-plug operations (bsc#1178002).
- mm/huge_memory.c: use head to check huge zero page (git-fixes (mm/thp)).
- mm/mempolicy.c: fix out of bounds write in mpol_parse_str() (git-fixes (mm/mempolicy)).
- mm/page-writeback.c: avoid potential division by zero in wb_min_max_ratio() (git-fixes (mm/writeback)).
- mm/page-writeback.c: improve arithmetic divisions (git-fixes (mm/writeback)).
- mm: replace memmap_context by meminit_context (bsc#1178002).
- mm/rmap: fixup copying of soft dirty and uffd ptes (git-fixes (mm/rmap)).
- mm/zsmalloc.c: fix the migrated zspage statistics (git-fixes (mm/zsmalloc)).
- mtd: lpddr: Fix bad logic in print_drs_error (git-fixes).
- mtd: lpddr: fix excessive stack usage with clang (git-fixes).
- mtd: mtdoops: Do not write panic data twice (git-fixes).
- mtd: rawnand: stm32_fmc2: fix a buffer overflow (git-fixes).
- mtd: rawnand: vf610: disable clk on error handling path in probe (git-fixes).
- mtd: spinand: gigadevice: Add QE Bit (git-fixes).
- mtd: spinand: gigadevice: Only one dummy byte in QUADIO (git-fixes).
- mwifiex: Do not use GFP_KERNEL in atomic context (git-fixes).
- mwifiex: fix double free (git-fixes).
- mwifiex: remove function pointer check (git-fixes).
- mwifiex: Remove unnecessary braces from HostCmd_SET_SEQ_NO_BSS_INFO (git-fixes).
- net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() (git-fixes).
- nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() (git-fixes).
- nl80211: fix non-split wiphy information (git-fixes).
- NTB: hw: amd: fix an issue about leak system resources (git-fixes).
- ntb: intel: Fix memleak in intel_ntb_pci_probe (git-fixes).
- nvme-rdma: fix crash due to incorrect cqe (bsc#1174748).
- nvme-rdma: fix crash when connect rejected (bsc#1174748).
- overflow: Include header file with SIZE_MAX declaration (git-fixes).
- PCI: aardvark: Check for errors from pci_bridge_emul_init() call (git-fixes).
- percpu: fix first chunk size calculation for populated bitmap (git-fixes (mm/percpu)).
- perf/x86/amd: Fix sampling Large Increment per Cycle events (bsc#1152489).
- perf/x86: Fix n_pair for cancelled txn (bsc#1152489).
- pinctrl: mcp23s08: Fix mcp23x17 precious range (git-fixes).
- pinctrl: mcp23s08: Fix mcp23x17_regmap initialiser (git-fixes).
- PKCS#7: Check codeSigning EKU for kernel module and kexec pe verification (bsc#1177353).
- platform/x86: mlx-platform: Remove PSU EEPROM configuration (git-fixes).
- PM: hibernate: Batch hibernate and resume IO requests (bsc#1178079).
- powerpc/book3s64/radix: Make radix_mem_block_size 64bit (bsc#1055186 ltc#153436 git-fixes).
- powerpc: Fix undetected data corruption with P9N DD2.1 VSX CI load emulation (bsc#1065729).
- powerpc/hwirq: Remove stale forward irq_chip declaration (bsc#1065729).
- powerpc/icp-hv: Fix missing of_node_put() in success path (bsc#1065729).
- powerpc/irq: Drop forward declaration of struct irqaction (bsc#1065729).
- powerpc/papr_scm: Fix warning triggered by perf_stats_show() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/perf/hv-gpci: Fix starting index value (bsc#1065729).
- powerpc/powernv/dump: Fix race while processing OPAL dump (bsc#1065729).
- powerpc/powernv/elog: Fix race while processing OPAL error log event (bsc#1065729).
- powerpc/pseries: Avoid using addr_to_pfn in real mode (jsc#SLE-9246 git-fixes).
- powerpc/pseries: explicitly reschedule during drmem_lmb list traversal (bsc#1077428 ltc#163882 git-fixes).
- powerpc/pseries: Fix missing of_node_put() in rng_init() (bsc#1065729).
- pwm: img: Fix null pointer access in probe (git-fixes).
- pwm: lpss: Add range limit check for the base_unit register value (git-fixes).
- pwm: lpss: Fix off by one error in base_unit math in pwm_lpss_prepare() (git-fixes).
- qtnfmac: fix resource leaks on unsupported iftype error return path (git-fixes).
- r8169: fix operation under forced interrupt threading (git-fixes).
- rapidio: fix the missed put_device() for rio_mport_add_riodev (git-fixes).
- reset: sti: reset-syscfg: fix struct description warnings (git-fixes).
- ring-buffer: Return 0 on success from ring_buffer_resize() (git-fixes).
- rtc: rx8010: do not modify the global rtc ops (git-fixes).
- scsi: ibmvfc: Fix error return in ibmvfc_probe() (bsc#1065729).
- scsi: mptfusion: Do not use GFP_ATOMIC for larger DMA allocations (bsc#1175898, ECO-2743).
- slimbus: core: check get_addr before removing laddr ida (git-fixes).
- slimbus: core: do not enter to clock pause mode in core (git-fixes).
- slimbus: qcom-ngd-ctrl: disable ngd in qmi server down callback (git-fixes).
- soc: fsl: qbman: Fix return value on success (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: rtl8192u: Do not use GFP_KERNEL in atomic context (git-fixes).
- tracing: Check return value of __create_val_fields() before using its result (git-fixes).
- tracing: Save normal string variables (git-fixes).
- USB: dwc2: Fix INTR OUT transfers in DDMA mode (git-fixes).
- USB: dwc2: Fix parameter type in function pointer prototype (git-fixes).
- USB: dwc3: core: add phy cleanup for probe error handling (git-fixes).
- USB: dwc3: core: do not trigger runtime pm when remove driver (git-fixes).
- USB: dwc3: ep0: Fix ZLP for OUT ep0 requests (git-fixes).
- USB: dwc3: gadget: Resume pending requests after CLEAR_STALL (git-fixes).
- USB: dwc3: pci: Allow Elkhart Lake to utilize DSM method for PM functionality (git-fixes).
- USB: gadget: f_ncm: fix ncm_bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: u_ether: enable qmult on SuperSpeed Plus as well (git-fixes).
- usblp: fix race between disconnect() and read() (git-fixes).
- USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters (git-fixes).
- USB: serial: option: add Cellient MPL200 card (git-fixes).
- USB: serial: option: Add Telit FT980-KS composition (git-fixes).
- USB: serial: pl2303: add device-id for HP GC device (git-fixes).
- USB: serial: qcserial: fix altsetting probing (git-fixes).
- usb: xhci-mtk: Fix typo (git-fixes).
- VMCI: check return value of get_user_pages_fast() for errors (git-fixes).
- w1: mxc_w1: Fix timeout resolution problem leading to bus error (git-fixes).
- watchdog: Fix memleak in watchdog_cdev_register (git-fixes).
- watchdog: sp5100: Fix definition of EFCH_PM_DECODEEN3 (git-fixes).
- watchdog: Use put_device on error (git-fixes).
- wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 (git-fixes).
- writeback: Avoid skipping inode writeback (bsc#1177755).
- writeback: Fix sync livelock due to b_dirty_time processing (bsc#1177755).
- writeback: Protect inode-&gt;i_io_list with inode-&gt;i_lock (bsc#1177755).
- X.509: Add CodeSigning extended key usage parsing (bsc#1177353).
- x86/fpu: Allow multiple bits in clearcpuid= parameter (bsc#1152489).
- x86/ioapic: Unbreak check_timer() (bsc#1152489).
- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (bsc#1177765).
- x86/mm: unencrypted non-blocking DMA allocations use coherent pools (bsc#1175898, ECO-2743).
- x86/xen: disable Firmware First mode for correctable memory errors (bsc#1176713).
- xen/blkback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/events: add a new 'late EOI' evtchn framework (XSA-332 bsc#1177411).
- xen/events: add a proper barrier to 2-level uevent unmasking (XSA-332 bsc#1177411).
- xen/events: avoid removing an event channel while handling it (XSA-331 bsc#1177410).
- xen/events: block rogue events for some time (XSA-332 bsc#1177411).
- xen/events: defer eoi in case of excessive number of events (XSA-332 bsc#1177411).
- xen/events: fix race in evtchn_fifo_unmask() (XSA-332 bsc#1177411).
- xen/events: switch user event channels to lateeoi model (XSA-332 bsc#1177411).
- xen/events: use a common cpu hotplug hook for event channels (XSA-332 bsc#1177411).
- xen/netback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pciback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/pvcallsback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xen/scsiback: use lateeoi irq binding (XSA-332 bsc#1177411).
- xfs: force the log after remapping a synchronous-writes file (git-fixes).
- xhci: do not create endpoint debugfs entry before ring buffer is set (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1055014">SUSE bug 1055014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055186">SUSE bug 1055186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1061843">SUSE bug 1061843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1077428">SUSE bug 1077428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129923">SUSE bug 1129923</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1134760">SUSE bug 1134760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174748">SUSE bug 1174748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175898">SUSE bug 1175898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176485">SUSE bug 1176485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176713">SUSE bug 1176713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177086">SUSE bug 1177086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177410">SUSE bug 1177410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177411">SUSE bug 1177411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177470">SUSE bug 1177470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177739">SUSE bug 1177739</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177749">SUSE bug 1177749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177750">SUSE bug 1177750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177754">SUSE bug 1177754</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177755">SUSE bug 1177755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177765">SUSE bug 1177765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177814">SUSE bug 1177814</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177817">SUSE bug 1177817</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177854">SUSE bug 1177854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177855">SUSE bug 1177855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177856">SUSE bug 1177856</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177861">SUSE bug 1177861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178002">SUSE bug 1178002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178079">SUSE bug 1178079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178246">SUSE bug 1178246</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-14351/">CVE-2020-14351</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16120/">CVE-2020-16120</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25285/">CVE-2020-25285</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509363" comment="kernel-default-extra-5.3.18-24.34.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111949" version="1" class="patch">
	<metadata>
		<title>Security update for gnome-settings-daemon, gnome-shell (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1172760" ref_url="https://bugzilla.suse.com/1172760" source="BUGZILLA"/>
		<reference ref_id="1175155" ref_url="https://bugzilla.suse.com/1175155" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-17489" ref_url="https://www.suse.com/security/cve/CVE-2020-17489/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007684.html" source="SUSE-SU"/>
		<description>
This update for gnome-settings-daemon, gnome-shell fixes the following issues:

gnome-settings-daemon:

- Add support for recent UCM related changes in ALSA and PulseAudio. (jsc#SLE-16518)
- Don't warn when a default source or sink is missing and the PulseAudio daemon is restarting. (jsc#SLE-16518)
- Don't warn about starting/stopping services which don't exist. (bsc#1172760).

gnome-shell:

- Add support for recent UCM related changes in ALSA and PulseAudio. (jsc#SLE-16518)
- CVE-2020-17489: reset auth prompt on vt switch before fade in in loginDialog (bsc#1175155).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-03"/>
	<updated date="2020-11-03"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1172760">SUSE bug 1172760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175155">SUSE bug 1175155</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-17489/">CVE-2020-17489</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509364" comment="gnome-shell-calendar-3.34.5-3.13.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111950" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1066382" ref_url="https://bugzilla.suse.com/1066382" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1163592" ref_url="https://bugzilla.suse.com/1163592" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1170415" ref_url="https://bugzilla.suse.com/1170415" source="BUGZILLA"/>
		<reference ref_id="1175721" ref_url="https://bugzilla.suse.com/1175721" source="BUGZILLA"/>
		<reference ref_id="1175749" ref_url="https://bugzilla.suse.com/1175749" source="BUGZILLA"/>
		<reference ref_id="1176354" ref_url="https://bugzilla.suse.com/1176354" source="BUGZILLA"/>
		<reference ref_id="1177281" ref_url="https://bugzilla.suse.com/1177281" source="BUGZILLA"/>
		<reference ref_id="1177766" ref_url="https://bugzilla.suse.com/1177766" source="BUGZILLA"/>
		<reference ref_id="1177799" ref_url="https://bugzilla.suse.com/1177799" source="BUGZILLA"/>
		<reference ref_id="1177801" ref_url="https://bugzilla.suse.com/1177801" source="BUGZILLA"/>
		<reference ref_id="1178166" ref_url="https://bugzilla.suse.com/1178166" source="BUGZILLA"/>
		<reference ref_id="1178173" ref_url="https://bugzilla.suse.com/1178173" source="BUGZILLA"/>
		<reference ref_id="1178175" ref_url="https://bugzilla.suse.com/1178175" source="BUGZILLA"/>
		<reference ref_id="1178176" ref_url="https://bugzilla.suse.com/1178176" source="BUGZILLA"/>
		<reference ref_id="1178177" ref_url="https://bugzilla.suse.com/1178177" source="BUGZILLA"/>
		<reference ref_id="1178183" ref_url="https://bugzilla.suse.com/1178183" source="BUGZILLA"/>
		<reference ref_id="1178184" ref_url="https://bugzilla.suse.com/1178184" source="BUGZILLA"/>
		<reference ref_id="1178185" ref_url="https://bugzilla.suse.com/1178185" source="BUGZILLA"/>
		<reference ref_id="1178186" ref_url="https://bugzilla.suse.com/1178186" source="BUGZILLA"/>
		<reference ref_id="1178190" ref_url="https://bugzilla.suse.com/1178190" source="BUGZILLA"/>
		<reference ref_id="1178191" ref_url="https://bugzilla.suse.com/1178191" source="BUGZILLA"/>
		<reference ref_id="1178255" ref_url="https://bugzilla.suse.com/1178255" source="BUGZILLA"/>
		<reference ref_id="1178307" ref_url="https://bugzilla.suse.com/1178307" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178395" ref_url="https://bugzilla.suse.com/1178395" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25656" ref_url="https://www.suse.com/security/cve/CVE-2020-25656/" source="CVE"/>
		<reference ref_id="CVE-2020-25705" ref_url="https://www.suse.com/security/cve/CVE-2020-25705/" source="CVE"/>
		<reference ref_id="CVE-2020-8694" ref_url="https://www.suse.com/security/cve/CVE-2020-8694/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007745.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bug fixes.


The following security bugs were fixed:

- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-8694: Restricted energy meter to root access (bsc#1170415).
- CVE-2020-25705: A ICMP global rate limiting side-channel was removed which could lead to e.g. the SADDNS attack (bsc#1175721)

The following non-security bugs were fixed:

- act_ife: load meta modules before tcf_idr_check_alloc() (networking-stable-20_09_24).
- ath10k: check idx validity in __ath10k_htt_rx_ring_fill_n() (git-fixes).
- ath9k: hif_usb: fix race condition between usb_get_urb() and usb_kill_anchored_urbs() (git-fixes).
- block: Set same_page to false in __bio_try_merge_page if ret is false (git-fixes).
- Bluetooth: btusb: Fix memleak in btusb_mtk_submit_wmt_recv_urb (git-fixes).
- Bluetooth: Only mark socket zapped after unlocking (git-fixes).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (git-fixes).
- bonding: show saner speed for broadcast mode (networking-stable-20_08_24).
- brcm80211: fix possible memleak in brcmf_proto_msgbuf_attach (git-fixes).
- brcmsmac: fix memory leak in wlc_phy_attach_lcnphy (git-fixes).
- btrfs: allocate scrub workqueues outside of locks (bsc#1178183).
- btrfs: do not force read-only after error in drop snapshot (bsc#1176354).
- btrfs: drop path before adding new uuid tree entry (bsc#1178176).
- btrfs: fix filesystem corruption after a device replace (bsc#1178395).
- btrfs: fix NULL pointer dereference after failure to create snapshot (bsc#1178190).
- btrfs: fix overflow when copying corrupt csums for a message (bsc#1178191).
- btrfs: fix space cache memory leak after transaction abort (bsc#1178173).
- btrfs: move btrfs_rm_dev_replace_free_srcdev outside of all locks (bsc#1178395).
- btrfs: move btrfs_scratch_superblocks into btrfs_dev_replace_finishing (bsc#1178395).
- btrfs: set the correct lockdep class for new nodes (bsc#1178184).
- btrfs: set the lockdep class for log tree extent buffers (bsc#1178186).
- can: flexcan: flexcan_chip_stop(): add error handling and propagate error value (git-fixes).
- ceph: promote to unsigned long long before shifting (bsc#1178175).
- crypto: ccp - fix error handling (git-fixes).
- cxgb4: fix memory leak during module unload (networking-stable-20_09_24).
- cxgb4: Fix offset when clearing filter byte counters (networking-stable-20_09_24).
- Disable ipa-clones dump for KMP builds (bsc#1178330) The feature is not really useful for KMP, and rather confusing, so let's disable it at building out-of-tree codes
- Disable module compression on SLE15 SP2 (bsc#1178307)
- dmaengine: dw: Activate FIFO-mode for memory peripherals only (git-fixes).
- eeprom: at25: set minimum read/write access stride to 1 (git-fixes).
- futex: Adjust absolute futex timeouts with per time namespace offset (bsc#1164648).
- futex: Consistently use fshared as boolean (bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1149032).
- futex: Remove put_futex_key() (bsc#1149032).
- futex: Remove unused or redundant includes (bsc#1149032).
- gre6: Fix reception with IP6_TNL_F_RCV_DSCP_COPY (networking-stable-20_08_24).
- gtp: add GTPA_LINK info to msg sent to userspace (networking-stable-20_09_11).
- HID: ite: Add USB id match for Acer One S1003 keyboard dock (git-fixes).
- ibmveth: Identify ingress large send packets (bsc#1178185 ltc#188897).
- ibmvnic: fix ibmvnic_set_mac (bsc#1066382 ltc#160943 git-fixes).
- icmp: randomize the global rate limiter (git-fixes).
- ip: fix tos reflection in ack and reset packets (networking-stable-20_09_24).
- ipv4: Initialize flowi4_multipath_hash in data path (networking-stable-20_09_24).
- ipv4: Restore flowi4_oif update before call to xfrm_lookup_route (git-fixes).
- ipv4: Update exception handling for multipath routes via same device (networking-stable-20_09_24).
- ipv6: avoid lockdep issue in fib6_del() (networking-stable-20_09_24).
- ipv6: Fix sysctl max for fib_multipath_hash_policy (networking-stable-20_09_11).
- ipvlan: fix device features (networking-stable-20_08_24).
- kallsyms: Refactor kallsyms_show_value() to take cred (git-fixes).
- kbuild: enforce -Werror=return-type (bsc#1177281).
- KVM: x86/mmu: Commit zap of remaining invalid pages when recovering lpages (git-fixes).
- libceph: clear con-&gt;out_msg on Policy::stateful_server faults (bsc#1178177).
- mac80211: handle lack of sband-&gt;bitrates in rates (git-fixes).
- mailbox: avoid timer start from callback (git-fixes).
- media: ati_remote: sanity check for both endpoints (git-fixes).
- media: bdisp: Fix runtime PM imbalance on error (git-fixes).
- media: exynos4-is: Fix a reference count leak (git-fixes).
- media: exynos4-is: Fix a reference count leak due to pm_runtime_get_sync (git-fixes).
- media: exynos4-is: Fix several reference count leaks due to pm_runtime_get_sync (git-fixes).
- media: firewire: fix memory leak (git-fixes).
- media: i2c: ov5640: Enable data pins on poweron for DVP mode (git-fixes).
- media: i2c: ov5640: Remain in power down for DVP mode unless streaming (git-fixes).
- media: i2c: ov5640: Separate out mipi configuration from s_power (git-fixes).
- media: media/pci: prevent memory leak in bttv_probe (git-fixes).
- media: platform: s3c-camif: Fix runtime PM imbalance on error (git-fixes).
- media: platform: sti: hva: Fix runtime PM imbalance on error (git-fixes).
- media: rcar_drif: Allocate v4l2_async_subdev dynamically (git-fixes).
- media: rcar_drif: Fix fwnode reference leak when parsing DT (git-fixes).
- media: saa7134: avoid a shift overflow (git-fixes).
- media: st-delta: Fix reference count leak in delta_run_work (git-fixes).
- media: sti: Fix reference count leaks (git-fixes).
- media: uvcvideo: Ensure all probed info is returned to v4l2 (git-fixes).
- media: venus: core: Fix runtime PM imbalance in venus_probe (git-fixes).
- media: vsp1: Fix runtime PM imbalance on error (git-fixes).
- mic: vop: copy data to kernel space then write to io memory (git-fixes).
- misc: rtsx: Fix memory leak in rtsx_pci_probe (git-fixes).
- misc: vop: add round_up(x,4) for vring_size to avoid kernel panic (git-fixes).
- mm: fix a race during THP splitting (bsc#1178255).
- mm: madvise: fix vma user-after-free (git-fixes).
- mmc: sdio: Check for CISTPL_VERS_1 buffer size (git-fixes).
- module: Correctly truncate sysfs sections output (git-fixes).
- module: Do not expose section addresses to non-CAP_SYSLOG (git-fixes).
- module: Refactor section attr into bin attribute (git-fixes).
- module: statically initialize init section freeing data (git-fixes).
- mwifiex: do not call del_timer_sync() on uninitialized timer (git-fixes).
- net/core: check length before updating Ethertype in skb_mpls_{push,pop} (git-fixes).
- net/mlx5: Fix FTE cleanup (networking-stable-20_09_24).
- net/mlx5e: Enable adding peer miss rules only if merged eswitch is supported (networking-stable-20_09_24).
- net/mlx5e: TLS, Do not expose FPGA TLS counter if not supported (networking-stable-20_09_24).
- net/sched: act_ct: Fix skb double-free in tcf_ct_handle_fragments() error flow (networking-stable-20_08_24).
- net/smc: Prevent kernel-infoleak in __smc_diag_dump() (networking-stable-20_08_24).
- net: bridge: br_vlan_get_pvid_rcu() should dereference the VLAN group under RCU (networking-stable-20_09_24).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (networking-stable-20_09_24).
- net: disable netpoll on fresh napis (networking-stable-20_09_11).
- net: dsa: b53: check for timeout (networking-stable-20_08_24).
- net: dsa: rtl8366: Properly clear member config (networking-stable-20_09_24).
- net: fec: correct the error path for regulator disable in probe (networking-stable-20_08_24).
- net: Fix bridge enslavement failure (networking-stable-20_09_24).
- net: Fix potential wrong skb-&gt;protocol in skb_vlan_untag() (networking-stable-20_08_24).
- net: hns: Fix memleak in hns_nic_dev_probe (networking-stable-20_09_11).
- net: ipv6: fix kconfig dependency warning for IPV6_SEG6_HMAC (networking-stable-20_09_24).
- net: lantiq: Disable IRQs only if NAPI gets scheduled (networking-stable-20_09_24).
- net: lantiq: Use napi_complete_done() (networking-stable-20_09_24).
- net: lantiq: use netif_tx_napi_add() for TX NAPI (networking-stable-20_09_24).
- net: lantiq: Wake TX queue again (networking-stable-20_09_24).
- net: phy: Avoid NPD upon phy_detach() when driver is unbound (networking-stable-20_09_24).
- net: phy: Do not warn in phy_stop() on PHY_DOWN (networking-stable-20_09_24).
- net: qrtr: fix usage of idr in port assignment to socket (networking-stable-20_08_24).
- net: sctp: Fix IPv6 ancestor_size calc in sctp_copy_descendant (networking-stable-20_09_24).
- net: sctp: Fix negotiation of the number of data streams (networking-stable-20_08_24).
- net: systemport: Fix memleak in bcm_sysport_probe (networking-stable-20_09_11).
- net: usb: dm9601: Add USB ID of Keenetic Plus DSL (networking-stable-20_09_11).
- net: usb: qmi_wwan: add Cellient MPL200 card (git-fixes).
- net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails (git-fixes).
- netlabel: fix problems with mapping removal (networking-stable-20_09_11).
- nfp: use correct define to return NONE fec (networking-stable-20_09_24).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- r8169: fix issue with forced threading in combination with shared interrupts (git-fixes).
- rpm/kernel-binary.spec.in: Fix compressed module handling for in-tree KMP (jsc#SLE-10886) The in-tree KMP that is built with SLE kernels have a different scriptlet that is embedded in kernel-binary.spec.in rather than *.sh files.
- rpm/kernel-module-subpackage: make Group tag optional (bsc#1163592)
- rtl8xxxu: prevent potential memory leak (git-fixes).
- rtw88: increse the size of rx buffer size (git-fixes).
- s390/cio: add cond_resched() in the slow_eval_known_fn() loop (bsc#1177799 LTC#188733).
- s390/dasd: Fix zero write for FBA devices (bsc#1177801 LTC#188735).
- scsi: ibmvscsi: Fix potential race after loss of transport (bsc#1178166 ltc#188226).
- sctp: not disable bh in the whole sctp_get_port_local() (networking-stable-20_09_11).
- selftests/timers: Turn off timeout setting (git-fixes).
- spi: spi-s3c64xx: Check return values (git-fixes).
- spi: spi-s3c64xx: swap s3c64xx_spi_set_cs() and s3c64xx_enable_datapath() (git-fixes).
- taprio: Fix allowing too small intervals (networking-stable-20_09_24).
- time: Prevent undefined behaviour in timespec64_to_ns() (bsc#1164648).
- tipc: fix memory leak caused by tipc_buf_append() (git-fixes).
- tipc: Fix memory leak in tipc_group_create_member() (networking-stable-20_09_24).
- tipc: fix shutdown() of connection oriented socket (networking-stable-20_09_24).
- tipc: fix shutdown() of connectionless socket (networking-stable-20_09_11).
- tipc: fix the skb_unshare() in tipc_buf_append() (git-fixes).
- tipc: fix uninit skb-&gt;data in tipc_nl_compat_dumpit() (networking-stable-20_08_24).
- tipc: use skb_unshare() instead in tipc_buf_append() (networking-stable-20_09_24).
- tty: ipwireless: fix error handling (git-fixes).
- tty: serial: fsl_lpuart: fix lpuart32_poll_get_char (git-fixes).
- usb: cdc-acm: add quirk to blacklist ETAS ES58X devices (git-fixes).
- usb: cdc-acm: handle broken union descriptors (git-fixes).
- usb: cdc-wdm: Make wdm_flush() interruptible and add wdm_fsync() (git-fixes).
- usb: core: Solve race condition in anchor cleanup functions (git-fixes).
- usb: dwc3: simple: add support for Hikey 970 (git-fixes).
- usb: gadget: f_ncm: allow using NCM in SuperSpeed Plus gadgets (git-fixes).
- usb: gadget: function: printer: fix use-after-free in __lock_acquire (git-fixes).
- usb: ohci: Default to per-port over-current protection (git-fixes).
- x86/alternative: Do not call text_poke() in lazy TLB mode (bsc#1175749).
- xen/gntdev.c: Mark pages as dirty (bsc#1065600).
- xfs: fix high key handling in the rt allocator's query_range function (git-fixes).
- xfs: fix xfs_bmap_validate_extent_raw when checking attr fork of rt files (git-fixes).
- xfs: limit entries returned when counting fsmap records (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-14"/>
	<updated date="2020-11-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1066382">SUSE bug 1066382</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163592">SUSE bug 1163592</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170415">SUSE bug 1170415</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175721">SUSE bug 1175721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175749">SUSE bug 1175749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176354">SUSE bug 1176354</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177281">SUSE bug 1177281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177766">SUSE bug 1177766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177799">SUSE bug 1177799</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177801">SUSE bug 1177801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178166">SUSE bug 1178166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178173">SUSE bug 1178173</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178175">SUSE bug 1178175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178176">SUSE bug 1178176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178177">SUSE bug 1178177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178183">SUSE bug 1178183</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178184">SUSE bug 1178184</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178185">SUSE bug 1178185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178186">SUSE bug 1178186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178190">SUSE bug 1178190</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178191">SUSE bug 1178191</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178255">SUSE bug 1178255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178307">SUSE bug 1178307</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178395">SUSE bug 1178395</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25656/">CVE-2020-25656</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-25705/">CVE-2020-25705</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8694/">CVE-2020-8694</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509365" comment="kernel-default-extra-5.3.18-24.37.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111951" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1178611" ref_url="https://bugzilla.suse.com/1178611" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26950" ref_url="https://www.suse.com/security/cve/CVE-2020-26950/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007812.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.4.2 
  MFSA 2020-49 (bsc#1178611)
  * CVE-2020-26950 (bmo#1675905)
    Write side effects in MCallGetProperty opcode not accounted
    for
- Mozilla Thunderbird 78.4.1
  * new: Thunderbird prompts for an address to use when starting
    an email from an address book entry with multiple addresses
    (bmo#84028)
  * fixed: Searching global search results did not work
    (bmo#1664761)
  * fixed: Link location was not focused by default when adding a
    hyperlink in message composer (bmo#1670660)
  * fixed: Advanced address book search dialog was unusable
    (bmo#1668147)
  * fixed: Encrypted draft reply emails lost 'Re:' prefix
    (bmo#1661510)
  * fixed: Replying to a newsgroup message did not open the
    compose window (bmo#1672667)
  * fixed: Unable to delete multiple newsgroup messages
    (bmo#1657988)
  * fixed: Appmenu displayed visual glitches (bmo#1636243)
  * fixed: Visual glitches when selecting multiple messages in
    the message pane and using Ctrl+click (bmo#1671800)
  * fixed: Switching between dark and light mode could lead to
    unreadable text on macOS (bmo#1668989)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-19"/>
	<updated date="2020-11-19"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1178611">SUSE bug 1178611</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26950/">CVE-2020-26950</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509207" comment="MozillaThunderbird-78.4.2-3.103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509208" comment="MozillaThunderbird-translations-common-78.4.2-3.103.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509209" comment="MozillaThunderbird-translations-other-78.4.2-3.103.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111952" version="1" class="patch">
	<metadata>
		<title>Security update for LibVNCServer (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1178682" ref_url="https://bugzilla.suse.com/1178682" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25708" ref_url="https://www.suse.com/security/cve/CVE-2020-25708/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007855.html" source="SUSE-SU"/>
		<description>
This update for LibVNCServer fixes the following issues:

- CVE-2020-25708 [bsc#1178682], libvncserver/rfbserver.c has a divide by zero which could result in DoS
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-25"/>
	<updated date="2020-11-25"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178682">SUSE bug 1178682</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-25708/">CVE-2020-25708</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509211" comment="libvncclient0-0.9.10-4.25.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509366" comment="libvncserver0-0.9.10-4.25.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111953" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1178894" ref_url="https://bugzilla.suse.com/1178894" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15999" ref_url="https://www.suse.com/security/cve/CVE-2020-15999/" source="CVE"/>
		<reference ref_id="CVE-2020-16012" ref_url="https://www.suse.com/security/cve/CVE-2020-16012/" source="CVE"/>
		<reference ref_id="CVE-2020-26951" ref_url="https://www.suse.com/security/cve/CVE-2020-26951/" source="CVE"/>
		<reference ref_id="CVE-2020-26953" ref_url="https://www.suse.com/security/cve/CVE-2020-26953/" source="CVE"/>
		<reference ref_id="CVE-2020-26956" ref_url="https://www.suse.com/security/cve/CVE-2020-26956/" source="CVE"/>
		<reference ref_id="CVE-2020-26958" ref_url="https://www.suse.com/security/cve/CVE-2020-26958/" source="CVE"/>
		<reference ref_id="CVE-2020-26959" ref_url="https://www.suse.com/security/cve/CVE-2020-26959/" source="CVE"/>
		<reference ref_id="CVE-2020-26960" ref_url="https://www.suse.com/security/cve/CVE-2020-26960/" source="CVE"/>
		<reference ref_id="CVE-2020-26961" ref_url="https://www.suse.com/security/cve/CVE-2020-26961/" source="CVE"/>
		<reference ref_id="CVE-2020-26965" ref_url="https://www.suse.com/security/cve/CVE-2020-26965/" source="CVE"/>
		<reference ref_id="CVE-2020-26966" ref_url="https://www.suse.com/security/cve/CVE-2020-26966/" source="CVE"/>
		<reference ref_id="CVE-2020-26968" ref_url="https://www.suse.com/security/cve/CVE-2020-26968/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-November/007870.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

    TODO
- Mozilla Thunderbird 78.5.0
  * new: OpenPGP: Added option to disable attaching the public
    key to a signed message (bmo#1654950)
  * new: MailExtensions: 'compose_attachments' context added to
    Menus API (bmo#1670822)
  * new: MailExtensions: Menus API now available on displayed
    messages (bmo#1670825)
  * changed: MailExtensions: browser.tabs.create will now wait
    for 'mail-delayed-startup-finished' event (bmo#1674407)
  * fixed: OpenPGP: Support for inline PGP messages improved
    (bmo#1672851)
  * fixed: OpenPGP: Message security dialog showed unverified
    keys as unavailable (bmo#1675285)
  * fixed: Chat: New chat contact menu item did not function
    (bmo#1663321)
  * fixed: Various theme and usability improvements (bmo#1673861)
  * fixed: Various security fixes
  MFSA 2020-52 (bsc#1178894)
  * CVE-2020-26951 (bmo#1667113)
    Parsing mismatches could confuse and bypass security
    sanitizer for chrome privileged code
  * CVE-2020-16012 (bmo#1642028)
    Variable time processing of cross-origin images during
    drawImage calls
  * CVE-2020-26953 (bmo#1656741)
    Fullscreen could be enabled without displaying the security UI
  * CVE-2020-26956 (bmo#1666300)
    XSS through paste (manual and clipboard API)
  * CVE-2020-26958 (bmo#1669355)
    Requests intercepted through ServiceWorkers lacked MIME type
    restrictions
  * CVE-2020-26959 (bmo#1669466)
    Use-after-free in WebRequestService
  * CVE-2020-26960 (bmo#1670358)
    Potential use-after-free in uses of nsTArray
  * CVE-2020-15999 (bmo#1672223)
    Heap buffer overflow in freetype
  * CVE-2020-26961 (bmo#1672528)
    DoH did not filter IPv4 mapped IP Addresses
  * CVE-2020-26965 (bmo#1661617)
    Software keyboards may have remembered typed passwords
  * CVE-2020-26966 (bmo#1663571)
    Single-word search queries were also broadcast to local
    network
  * CVE-2020-26968 (bmo#1551615, bmo#1607762, bmo#1656697,
    bmo#1657739, bmo#1660236, bmo#1667912, bmo#1671479,
    bmo#1671923)
    Memory safety bugs fixed in Thunderbird 78.5

- Mozilla Thunderbird 78.4.3 
  * fixed: User interface was inconsistent when switching from
    the default theme to the dark theme and back to the default
    theme (bmo#1659282)
  * fixed: Email subject would disappear when hovering over it
    with the mouse when using Windows 7 Classic theme
    (bmo#1675970)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-11-26"/>
	<updated date="2020-11-26"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1178894">SUSE bug 1178894</bugzilla>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15999/">CVE-2020-15999</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16012/">CVE-2020-16012</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26951/">CVE-2020-26951</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26953/">CVE-2020-26953</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26956/">CVE-2020-26956</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26958/">CVE-2020-26958</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26959/">CVE-2020-26959</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26960/">CVE-2020-26960</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26961/">CVE-2020-26961</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26965/">CVE-2020-26965</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26966/">CVE-2020-26966</cve>
	<cve impact="moderate" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26968/">CVE-2020-26968</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509212" comment="MozillaThunderbird-78.5.0-3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509213" comment="MozillaThunderbird-translations-common-78.5.0-3.107.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509214" comment="MozillaThunderbird-translations-other-78.5.0-3.107.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111954" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1174908" ref_url="https://bugzilla.suse.com/1174908" source="BUGZILLA"/>
		<reference ref_id="1177596" ref_url="https://bugzilla.suse.com/1177596" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14360" ref_url="https://www.suse.com/security/cve/CVE-2020-14360/" source="CVE"/>
		<reference ref_id="CVE-2020-25712" ref_url="https://www.suse.com/security/cve/CVE-2020-25712/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/007896.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908).
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-01"/>
	<updated date="2020-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1174908">SUSE bug 1174908</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177596">SUSE bug 1177596</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-14360/">CVE-2020-14360</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25712/">CVE-2020-25712</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509367" comment="xorg-x11-server-wayland-1.20.3-22.5.16.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111955" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1166146" ref_url="https://bugzilla.suse.com/1166146" source="BUGZILLA"/>
		<reference ref_id="1166166" ref_url="https://bugzilla.suse.com/1166166" source="BUGZILLA"/>
		<reference ref_id="1167030" ref_url="https://bugzilla.suse.com/1167030" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170139" ref_url="https://bugzilla.suse.com/1170139" source="BUGZILLA"/>
		<reference ref_id="1171073" ref_url="https://bugzilla.suse.com/1171073" source="BUGZILLA"/>
		<reference ref_id="1171558" ref_url="https://bugzilla.suse.com/1171558" source="BUGZILLA"/>
		<reference ref_id="1172873" ref_url="https://bugzilla.suse.com/1172873" source="BUGZILLA"/>
		<reference ref_id="1173504" ref_url="https://bugzilla.suse.com/1173504" source="BUGZILLA"/>
		<reference ref_id="1174852" ref_url="https://bugzilla.suse.com/1174852" source="BUGZILLA"/>
		<reference ref_id="1175306" ref_url="https://bugzilla.suse.com/1175306" source="BUGZILLA"/>
		<reference ref_id="1175918" ref_url="https://bugzilla.suse.com/1175918" source="BUGZILLA"/>
		<reference ref_id="1176109" ref_url="https://bugzilla.suse.com/1176109" source="BUGZILLA"/>
		<reference ref_id="1176180" ref_url="https://bugzilla.suse.com/1176180" source="BUGZILLA"/>
		<reference ref_id="1176200" ref_url="https://bugzilla.suse.com/1176200" source="BUGZILLA"/>
		<reference ref_id="1176481" ref_url="https://bugzilla.suse.com/1176481" source="BUGZILLA"/>
		<reference ref_id="1176586" ref_url="https://bugzilla.suse.com/1176586" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1176983" ref_url="https://bugzilla.suse.com/1176983" source="BUGZILLA"/>
		<reference ref_id="1177066" ref_url="https://bugzilla.suse.com/1177066" source="BUGZILLA"/>
		<reference ref_id="1177070" ref_url="https://bugzilla.suse.com/1177070" source="BUGZILLA"/>
		<reference ref_id="1177353" ref_url="https://bugzilla.suse.com/1177353" source="BUGZILLA"/>
		<reference ref_id="1177397" ref_url="https://bugzilla.suse.com/1177397" source="BUGZILLA"/>
		<reference ref_id="1177577" ref_url="https://bugzilla.suse.com/1177577" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177703" ref_url="https://bugzilla.suse.com/1177703" source="BUGZILLA"/>
		<reference ref_id="1177820" ref_url="https://bugzilla.suse.com/1177820" source="BUGZILLA"/>
		<reference ref_id="1178123" ref_url="https://bugzilla.suse.com/1178123" source="BUGZILLA"/>
		<reference ref_id="1178182" ref_url="https://bugzilla.suse.com/1178182" source="BUGZILLA"/>
		<reference ref_id="1178227" ref_url="https://bugzilla.suse.com/1178227" source="BUGZILLA"/>
		<reference ref_id="1178286" ref_url="https://bugzilla.suse.com/1178286" source="BUGZILLA"/>
		<reference ref_id="1178304" ref_url="https://bugzilla.suse.com/1178304" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1178393" ref_url="https://bugzilla.suse.com/1178393" source="BUGZILLA"/>
		<reference ref_id="1178401" ref_url="https://bugzilla.suse.com/1178401" source="BUGZILLA"/>
		<reference ref_id="1178426" ref_url="https://bugzilla.suse.com/1178426" source="BUGZILLA"/>
		<reference ref_id="1178461" ref_url="https://bugzilla.suse.com/1178461" source="BUGZILLA"/>
		<reference ref_id="1178579" ref_url="https://bugzilla.suse.com/1178579" source="BUGZILLA"/>
		<reference ref_id="1178581" ref_url="https://bugzilla.suse.com/1178581" source="BUGZILLA"/>
		<reference ref_id="1178584" ref_url="https://bugzilla.suse.com/1178584" source="BUGZILLA"/>
		<reference ref_id="1178585" ref_url="https://bugzilla.suse.com/1178585" source="BUGZILLA"/>
		<reference ref_id="1178589" ref_url="https://bugzilla.suse.com/1178589" source="BUGZILLA"/>
		<reference ref_id="1178635" ref_url="https://bugzilla.suse.com/1178635" source="BUGZILLA"/>
		<reference ref_id="1178653" ref_url="https://bugzilla.suse.com/1178653" source="BUGZILLA"/>
		<reference ref_id="1178659" ref_url="https://bugzilla.suse.com/1178659" source="BUGZILLA"/>
		<reference ref_id="1178661" ref_url="https://bugzilla.suse.com/1178661" source="BUGZILLA"/>
		<reference ref_id="1178669" ref_url="https://bugzilla.suse.com/1178669" source="BUGZILLA"/>
		<reference ref_id="1178686" ref_url="https://bugzilla.suse.com/1178686" source="BUGZILLA"/>
		<reference ref_id="1178740" ref_url="https://bugzilla.suse.com/1178740" source="BUGZILLA"/>
		<reference ref_id="1178755" ref_url="https://bugzilla.suse.com/1178755" source="BUGZILLA"/>
		<reference ref_id="1178762" ref_url="https://bugzilla.suse.com/1178762" source="BUGZILLA"/>
		<reference ref_id="1178838" ref_url="https://bugzilla.suse.com/1178838" source="BUGZILLA"/>
		<reference ref_id="1178853" ref_url="https://bugzilla.suse.com/1178853" source="BUGZILLA"/>
		<reference ref_id="1178886" ref_url="https://bugzilla.suse.com/1178886" source="BUGZILLA"/>
		<reference ref_id="1179001" ref_url="https://bugzilla.suse.com/1179001" source="BUGZILLA"/>
		<reference ref_id="1179012" ref_url="https://bugzilla.suse.com/1179012" source="BUGZILLA"/>
		<reference ref_id="1179014" ref_url="https://bugzilla.suse.com/1179014" source="BUGZILLA"/>
		<reference ref_id="1179015" ref_url="https://bugzilla.suse.com/1179015" source="BUGZILLA"/>
		<reference ref_id="1179045" ref_url="https://bugzilla.suse.com/1179045" source="BUGZILLA"/>
		<reference ref_id="1179076" ref_url="https://bugzilla.suse.com/1179076" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179140" ref_url="https://bugzilla.suse.com/1179140" source="BUGZILLA"/>
		<reference ref_id="1179141" ref_url="https://bugzilla.suse.com/1179141" source="BUGZILLA"/>
		<reference ref_id="1179160" ref_url="https://bugzilla.suse.com/1179160" source="BUGZILLA"/>
		<reference ref_id="1179201" ref_url="https://bugzilla.suse.com/1179201" source="BUGZILLA"/>
		<reference ref_id="1179211" ref_url="https://bugzilla.suse.com/1179211" source="BUGZILLA"/>
		<reference ref_id="1179217" ref_url="https://bugzilla.suse.com/1179217" source="BUGZILLA"/>
		<reference ref_id="1179225" ref_url="https://bugzilla.suse.com/1179225" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179424" ref_url="https://bugzilla.suse.com/1179424" source="BUGZILLA"/>
		<reference ref_id="1179425" ref_url="https://bugzilla.suse.com/1179425" source="BUGZILLA"/>
		<reference ref_id="1179426" ref_url="https://bugzilla.suse.com/1179426" source="BUGZILLA"/>
		<reference ref_id="1179427" ref_url="https://bugzilla.suse.com/1179427" source="BUGZILLA"/>
		<reference ref_id="1179429" ref_url="https://bugzilla.suse.com/1179429" source="BUGZILLA"/>
		<reference ref_id="1179432" ref_url="https://bugzilla.suse.com/1179432" source="BUGZILLA"/>
		<reference ref_id="1179442" ref_url="https://bugzilla.suse.com/1179442" source="BUGZILLA"/>
		<reference ref_id="1179550" ref_url="https://bugzilla.suse.com/1179550" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15436" ref_url="https://www.suse.com/security/cve/CVE-2020-15436/" source="CVE"/>
		<reference ref_id="CVE-2020-15437" ref_url="https://www.suse.com/security/cve/CVE-2020-15437/" source="CVE"/>
		<reference ref_id="CVE-2020-25668" ref_url="https://www.suse.com/security/cve/CVE-2020-25668/" source="CVE"/>
		<reference ref_id="CVE-2020-25669" ref_url="https://www.suse.com/security/cve/CVE-2020-25669/" source="CVE"/>
		<reference ref_id="CVE-2020-25704" ref_url="https://www.suse.com/security/cve/CVE-2020-25704/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-28915" ref_url="https://www.suse.com/security/cve/CVE-2020-28915/" source="CVE"/>
		<reference ref_id="CVE-2020-28941" ref_url="https://www.suse.com/security/cve/CVE-2020-28941/" source="CVE"/>
		<reference ref_id="CVE-2020-28974" ref_url="https://www.suse.com/security/cve/CVE-2020-28974/" source="CVE"/>
		<reference ref_id="CVE-2020-29369" ref_url="https://www.suse.com/security/cve/CVE-2020-29369/" source="CVE"/>
		<reference ref_id="CVE-2020-29371" ref_url="https://www.suse.com/security/cve/CVE-2020-29371/" source="CVE"/>
		<reference ref_id="CVE-2020-4788" ref_url="https://www.suse.com/security/cve/CVE-2020-4788/" source="CVE"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to 3.12.31 to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-25668: Fixed a concurrency use-after-free in con_font_op (bsc#1178123).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25704: Fixed a leak in perf_event_parse_addr_filter() (bsc#1178393).
- CVE-2020-27777: Restrict RTAS requests from userspace  (bsc#1179107)
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-25705: Fixed an issue which could have allowed to quickly scan open UDP ports. This flaw allowed an off-path remote user to effectively bypassing source port UDP randomization (bsc#1175721).
- CVE-2020-28941: Fixed an issue where local attackers on systems with the speakup driver could cause a local denial of service attack (bsc#1178740).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-29369: Fixed a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe (bnc#1173504 1179432).

The following non-security bugs were fixed:


- 9P: Cast to loff_t before multiplying (git-fixes).
- ACPI: button: Add DMI quirk for Medion Akoya E2228T (git-fixes).
- ACPICA: Add NHLT table signature (bsc#1176200).
- ACPI: dock: fix enum-conversion warning (git-fixes).
- ACPI / extlog: Check for RDMSR failure (git-fixes).
- ACPI: GED: fix -Wformat (git-fixes).
- ACPI: NFIT: Fix comparison to '-ENXIO' (git-fixes).
- ACPI: video: use ACPI backlight for HP 635 Notebook (git-fixes).
- Add bug reference to two hv_netvsc patches (bsc#1178853).
- ALSA: ctl: fix error path at adding user-defined element set (git-fixes).
- ALSA: firewire: Clean up a locking issue in copy_resp_to_buf() (git-fixes).
- ALSA: fix kernel-doc markups (git-fixes).
- ALSA: hda: fix jack detection with Realtek codecs when in D3 (git-fixes).
- ALSA: hda: prevent undefined shift in snd_hdac_ext_bus_get_link() (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek - Add supported for Lenovo ThinkPad Headset Button (git-fixes).
- ALSA: hda/realtek - Add supported mute Led for HP (git-fixes).
- ALSA: hda/realtek - Enable headphone for ASUS TM420 (git-fixes).
- ALSA: hda/realtek - Fixed HP headset Mic can't be detected (git-fixes).
- ALSA: hda/realtek - HP Headset Mic can't detect after boot (git-fixes).
- ALSA: hda: Reinstate runtime_allow() for all hda controllers (git-fixes).
- ALSA: mixart: Fix mutex deadlock (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- arm64: bpf: Fix branch offset in JIT (git-fixes).
- arm64: dts: allwinner: a64: bananapi-m64: Enable RGMII RX/TX delay on PHY (git-fixes).
- arm64: dts: allwinner: a64: OrangePi Win: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: a64: Pine64 Plus: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: beelink-gs1: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: allwinner: h5: OrangePi PC2: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: h5: OrangePi Prime: Fix ethernet node (git-fixes).
- arm64: dts: allwinner: Pine H64: Enable both RGMII RX/TX delay (git-fixes).
- arm64: dts: fsl: DPAA FMan DMA operations are coherent (git-fixes).
- arm64: dts: imx8mm: fix voltage for 1.6GHz CPU operating point (git-fixes).
- arm64: dts: imx8mq: Add missing interrupts to GPC (git-fixes).
- arm64: dts: imx8mq: Fix TMU interrupt property (git-fixes).
- arm64: dts: zynqmp: Remove additional compatible string for i2c IPs (git-fixes).
- arm64: kprobe: add checks for ARMv8.3-PAuth combined instructions (git-fixes).
- arm64: Run ARCH_WORKAROUND_1 enabling code on all CPUs (git-fixes).
- arm64: Run ARCH_WORKAROUND_2 enabling code on all CPUs (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra186 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra194 SDMMC nodes (git-fixes).
- arm64: tegra: Add missing timeout clock to Tegra210 SDMMC (git-fixes).
- arm64: vdso: Add '-Bsymbolic' to ldflags (git-fixes).
- arm64: vdso: Add --eh-frame-hdr to ldflags (git-fixes).
- ASoC: codecs: wcd9335: Set digital gain range correctly (git-fixes).
- ASoC: cs42l51: manage mclk shutdown delay (git-fixes).
- ASoC: Intel: kbl_rt5663_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: qcom: lpass-platform: Fix memory leak (git-fixes).
- ASoC: qcom: sdm845: set driver name correctly (git-fixes).
- ath10k: fix VHT NSS calculation when STBC is enabled (git-fixes).
- ath10k: start recovery process when payload length exceeds max htc length for sdio (git-fixes).
- batman-adv: set .owner to THIS_MODULE (git-fixes).
- bnxt_en: Avoid sending firmware messages when AER error is detected (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix NULL ptr dereference crash in bnxt_fw_reset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix regression in workqueue cleanup logic in bnxt_remove_one() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Invoke cancel_delayed_work_sync() for PFs also (jsc#SLE-8371 bsc#1153274).
- bnxt_en: return proper error codes in bnxt_show_temp (git-fixes).
- bnxt_en: Send HWRM_FUNC_RESET fw command unconditionally (jsc#SLE-8371 bsc#1153274).
- bpf: Do not rely on GCC __attribute__((optimize)) to disable GCSE (bsc#1155518).
- bpf: Fix comment for helper bpf_current_task_under_cgroup() (bsc#1155518).
- bpf: Zero-fill re-used per-cpu map element (bsc#1155518).
- btrfs: Account for merged patches upstream Move below patches to sorted section.
- btrfs: cleanup cow block on error (bsc#1178584).
- btrfs: fix bytes_may_use underflow in prealloc error condtition (bsc#1179217).
- btrfs: fix metadata reservation for fallocate that leads to transaction aborts (bsc#1179217).
- btrfs: fix relocation failure due to race with fallocate (bsc#1179217).
- btrfs: remove item_size member of struct btrfs_clone_extent_info (bsc#1179217).
- btrfs: rename btrfs_insert_clone_extent() to a more generic name (bsc#1179217).
- btrfs: rename btrfs_punch_hole_range() to a more generic name (bsc#1179217).
- btrfs: rename struct btrfs_clone_extent_info to a more generic name (bsc#1179217).
- btrfs: reschedule if necessary when logging directory items (bsc#1178585).
- btrfs: send, orphanize first all conflicting inodes when processing references (bsc#1178579).
- btrfs: send, recompute reference path after orphanization of a directory (bsc#1178581).
- can: af_can: prevent potential access of uninitialized member in canfd_rcv() (git-fixes).
- can: af_can: prevent potential access of uninitialized member in can_rcv() (git-fixes).
- can: can_create_echo_skb(): fix echo skb generation: always use skb_clone() (git-fixes).
- can: dev: __can_get_echo_skb(): fix real payload length return value for RTR frames (git-fixes).
- can: dev: can_get_echo_skb(): prevent call to kfree_skb() in hard IRQ context (git-fixes).
- can: dev: can_restart(): post buffer from the right context (git-fixes).
- can: flexcan: flexcan_remove(): disable wakeup completely (git-fixes).
- can: flexcan: flexcan_setup_stop_mode(): add missing 'req_bit' to stop mode property comment (git-fixes).
- can: flexcan: remove FLEXCAN_QUIRK_DISABLE_MECR quirk for LS1021A (git-fixes).
- can: gs_usb: fix endianess problem with candleLight firmware (git-fixes).
- can: kvaser_usb: kvaser_usb_hydra: Fix KCAN bittiming limits (git-fixes).
- can: m_can: fix nominal bitiming tseg2 min for version &gt;= 3.1 (git-fixes).
- can: m_can: m_can_handle_state_change(): fix state change (git-fixes).
- can: m_can: m_can_stop(): set device to software init mode before closing (git-fixes).
- can: mcba_usb: mcba_usb_start_xmit(): first fill skb, then pass to can_put_echo_skb() (git-fixes).
- can: peak_canfd: pucan_handle_can_rx(): fix echo management when loopback is on (git-fixes).
- can: peak_usb: add range checking in decode operations (git-fixes).
- can: peak_usb: fix potential integer overflow on shift of a int (git-fixes).
- can: peak_usb: peak_usb_get_ts_time(): fix timestamp wrapping (git-fixes).
- can: rx-offload: do not call kfree_skb() from IRQ context (git-fixes).
- ceph: add check_session_state() helper and make it global (bsc#1179012).
- ceph: check session state after bumping session-&gt;s_seq (bsc#1179012).
- ceph: check the sesion state and return false in case it is closed (bsc#1179012).
- ceph: downgrade warning from mdsmap decode to debug (bsc#1178653).
- ceph: fix race in concurrent __ceph_remove_cap invocations (bsc#1178635).
- cfg80211: initialize wdev data earlier (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: Fix incomplete memory allocation on setxattr path (bsc#1179211).
- cifs: remove bogus debug code (bsc#1179427).
- cifs: Return the error from crypt_message when enc/dec key not found (bsc#1179426).
- clk: define to_clk_regmap() as inline function (git-fixes).
- Convert trailing spaces and periods in path components (bsc#1179424).
- cosa: Add missing kfree in error path of cosa_write (git-fixes).
- dax: fix detection of dax support for non-persistent memory block devices (bsc#1171073).
- dax: Fix stack overflow when mounting fsdax pmem device (bsc#1171073).
- Delete patches.suse/fs-select.c-batch-user-writes-in-do_sys_poll.patch (bsc#1179419)
- devlink: Make sure devlink instance and port are in same net namespace (bsc#1154353).
- docs: ABI: sysfs-c2port: remove a duplicated entry (git-fixes).
- Documentation/admin-guide/module-signing.rst: add openssl command option example for CodeSign EKU (bsc#1177353, bsc#1179076).
- Do not create null.i000.ipa-clones file (bsc#1178330) Kbuild cc-option compiles /dev/null file to test for an option availability. Filter out -fdump-ipa-clones so that null.i000.ipa-clones file is not generated in the process.
- drbd: code cleanup by using sendpage_ok() to check page for kernel_sendpage() (bsc#1172873).
- drivers/net/ethernet: remove incorrectly formatted doc (bsc#1177397).
- drivers: watchdog: rdc321x_wdt: Fix race condition bugs (git-fixes).
- Drop sysctl files for dropped archs, add ppc64le and arm (bsc#1178838). Also correct the page size on ppc64.
- EDAC/amd64: Cache secondary Chip Select registers (bsc#1179001).
- EDAC/amd64: Find Chip Select memory size using Address Mask (bsc#1179001).
- EDAC/amd64: Gather hardware information early (bsc#1179001).
- EDAC/amd64: Initialize DIMM info for systems with more than two channels (bsc#1179001).
- EDAC/amd64: Make struct amd64_family_type global (bsc#1179001).
- EDAC/amd64: Save max number of controllers to family type (bsc#1179001). 
- EDAC/amd64: Support asymmetric dual-rank DIMMs (bsc#1179001).
- efi: add missed destroy_workqueue when efisubsys_init fails (git-fixes).
- efi: efibc: check for efivars write capability (git-fixes).
- efi: EFI_EARLYCON should depend on EFI (git-fixes).
- efi/efivars: Set generic ops before loading SSDT (git-fixes).
- efi/esrt: Fix reference count leak in esre_create_sysfs_entry (git-fixes).
- efi/libstub/x86: Work around LLVM ELF quirk build regression (git-fixes).
- efi: provide empty efi_enter_virtual_mode implementation (git-fixes).
- efivarfs: fix memory leak in efivarfs_create() (git-fixes).
- efivarfs: revert 'fix memory leak in efivarfs_create()' (git-fixes).
- efi/x86: Align GUIDs to their size in the mixed mode runtime wrapper (git-fixes).
- efi/x86: Do not panic or BUG() on non-critical error conditions (git-fixes).
- efi/x86: Fix the deletion of variables in mixed mode (git-fixes).
- efi/x86: Free efi_pgd with free_pages() (git-fixes).
- efi/x86: Handle by-ref arguments covering multiple pages in mixed mode (git-fixes).
- efi/x86: Ignore the memory attributes table on i386 (git-fixes).
- efi/x86: Map the entire EFI vendor string before copying it (git-fixes).
- exfat: fix name_hash computation on big endian systems (git-fixes).
- exfat: fix overflow issue in exfat_cluster_to_sector() (git-fixes).
- exfat: fix possible memory leak in exfat_find() (git-fixes).
- exfat: fix use of uninitialized spinlock on error path (git-fixes).
- exfat: fix wrong hint_stat initialization in exfat_find_dir_entry() (git-fixes).
- fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h (git-fixes).
- Fix wrongly set CONFIG_SOUNDWIRE=y (bsc#1179201) CONFIG_SOUNDWIRE was mistakenly set as built-in. Mark it as module.
- ftrace: Fix recursion check for NMI test (git-fixes).
- ftrace: Handle tracing when switching between context (git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#1149032).
- gpio: pcie-idio-24: Enable PEX8311 interrupts (git-fixes).
- gpio: pcie-idio-24: Fix IRQ Enable Register value (git-fixes).
- gpio: pcie-idio-24: Fix irq mask when masking (git-fixes).
- HID: logitech-dj: Fix an error in mse_bluetooth_descriptor (git-fixes).
- HID: logitech-dj: Fix Dinovo Mini when paired with a MX5x00 receiver (git-fixes).
- HID: logitech-dj: Handle quad/bluetooth keyboards with a builtin trackpad (git-fixes).
- HID: logitech-hidpp: Add PID for MX Anywhere 2 (git-fixes).
- hv_balloon: disable warning when floor reached (git-fixes).
- hv: clocksource: Add notrace attribute to read_hv_sched_clock_*() functions (git-fixes).
- hv_netvsc: Add XDP support (bsc#1177820).
- hv_netvsc: Fix XDP refcnt for synthetic and VF NICs (bsc#1177820).
- hv_netvsc: make recording RSS hash depend on feature flag (bsc#1177820).
- hv_netvsc: record hardware hash in skb (bsc#1177820).
- hwmon: (pwm-fan) Fix RPM calculation (git-fixes).
- hyperv_fb: Update screen_info after removing old framebuffer (bsc#1175306).
- i2c: mediatek: move dma reset before i2c reset (git-fixes).
- i2c: sh_mobile: implement atomic transfers (git-fixes).
- igc: Fix not considering the TX delay for timestamps (bsc#1160634).
- igc: Fix wrong timestamp latency numbers (bsc#1160634).
- iio: accel: kxcjk1013: Add support for KIOX010A ACPI DSM for setting tablet-mode (git-fixes).
- iio: accel: kxcjk1013: Replace is_smo8500_device with an acpi_type enum (git-fixes).
- iio: adc: mediatek: fix unset field (git-fixes).
- iio: light: fix kconfig dependency bug for VCNL4035 (git-fixes).
- Input: adxl34x - clean up a data type in adxl34x_probe() (git-fixes).
- Input: resistive-adc-touch - fix kconfig dependency on IIO_BUFFER (git-fixes).
- intel_idle: Customize IceLake server support (bsc#1178286).
- ionic: check port ptr before use (bsc#1167773).
- iwlwifi: mvm: write queue_sync_state only for sync (git-fixes).
- kABI: revert use_mm name change (MM Functionality, bsc#1178426).
- kABI workaround for HD-audio (git-fixes).
- kernel: better document the use_mm/unuse_mm API contract (MM Functionality, bsc#1178426).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel/watchdog: fix watchdog_allowed_mask not used warning (git-fixes).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- kthread_worker: prevent queuing delayed work from timer_fn when it is being canceled (git-fixes).
- KVM: arm64: ARM_SMCCC_ARCH_WORKAROUND_1 does not return SMCCC_RET_NOT_REQUIRED (git-fixes).
- lan743x: fix 'BUG: invalid wait context' when setting rx mode (git-fixes).
- lan743x: fix issue causing intermittent kernel log warnings (git-fixes).
- lan743x: prevent entire kernel HANG on open, for some platforms (git-fixes).
- leds: bcm6328, bcm6358: use devres LED registering function (git-fixes).
- libbpf, hashmap: Fix undefined behavior in hash_bits (bsc#1155518).
- libceph: use sendpage_ok() in ceph_tcp_sendpage() (bsc#1172873).
- lib/crc32test: remove extra local_irq_disable/enable (git-fixes).
- libnvdimm/nvdimm/flush: Allow architecture to override the flush barrier (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- lib/strncpy_from_user.c: Mask out bytes after NUL terminator (bsc#1155518).
- mac80211: always wind down STA state (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: free sta in sta_info_insert_finish() on errors (git-fixes).
- mac80211: minstrel: fix tx status processing corner case (git-fixes).
- mac80211: minstrel: remove deferred sampling code (git-fixes).
- media: imx274: fix frame interval handling (git-fixes).
- media: platform: Improve queue set up flow for bug fixing (git-fixes).
- media: tw5864: check status of tw5864_frameinterval_get (git-fixes).
- media: uvcvideo: Fix dereference of out-of-bound list iterator (git-fixes).
- media: uvcvideo: Fix uvc_ctrl_fixup_xu_info() not having any effect (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memcg: fix NULL pointer dereference in __mem_cgroup_usage_unregister_event (bsc#1177703).
- mfd: sprd: Add wakeup capability for PMIC IRQ (git-fixes).
- mmc: renesas_sdhi_core: Add missing tmio_mmc_host_free() at remove (git-fixes).
- mmc: sdhci-of-esdhc: Handle pulse width detection erratum for more SoCs (git-fixes).
- mmc: sdhci-pci: Prefer SDR25 timing for High Speed mode for BYT-based Intel controllers (git-fixes).
- mm: fix exec activate_mm vs TLB shootdown and lazy tlb switching race (MM Functionality, bsc#1178426).
- mm: fix kthread_use_mm() vs TLB invalidate (MM Functionality, bsc#1178426).
- mm/gup: allow FOLL_FORCE for get_user_pages_fast() (git fixes (mm/gup)).
- mm/gup: fix gup_fast with dynamic page table folding (bnc#1176586, LTC#188235).
- mm/ksm: fix NULL pointer dereference when KSM zero page is enabled (git fixes (mm/ksm)).
- mm, memcg: fix inconsistent oom event behavior (bsc#1178659).
- mm/memcg: fix refcount error while moving and swapping (bsc#1178686).
- mm/memcontrol.c: add missed css_put() (bsc#1178661).
- mm: mempolicy: require at least one nodeid for MPOL_PREFERRED (git fixes (mm/mempolicy)).
- mm/swapfile.c: fix potential memory leak in sys_swapon (git-fixes).
- mm: swap: make page_evictable() inline (git fixes (mm/vmscan)).
- mm: swap: use smp_mb__after_atomic() to order LRU bit set (git fixes (mm/vmscan)).
- mm, THP, swap: fix allocating cluster for swapfile by mistake (bsc#1178755).
- modsign: Add codeSigning EKU when generating X.509 key generation config (bsc#1177353, bsc#1179076).
- net: add WARN_ONCE in kernel_sendpage() for improper zero-copy send (bsc#1172873).
- net: ena: Capitalize all log strings and improve code readability (bsc#1177397).
- net: ena: Change license into format to SPDX in all files (bsc#1177397).
- net: ena: Change log message to netif/dev function (bsc#1177397).
- net: ena: Change RSS related macros and variables names (bsc#1177397).
- net: ena: ethtool: Add new device statistics (bsc#1177397).
- net: ena: ethtool: add stats printing to XDP queues (bsc#1177397).
- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1177397).
- net: ena: Fix all static chekers' warnings (bsc#1177397).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (bsc#1174852).
- net: ena: Remove redundant print of placement policy (bsc#1177397).
- net: ena: xdp: add queue counters for xdp actions (bsc#1177397).
- net: fix pos incrementment in ipv6_route_seq_next (bsc#1154353).
- net: introduce helper sendpage_ok() in include/linux/net.h (bsc#1172873). kABI workaround for including mm.h in include/linux/net.h (bsc#1172873).
- net/mlx5: Clear bw_share upon VF disable (jsc#SLE-8464).
- net/mlx5: E-Switch, Fail mlx5_esw_modify_vport_rate if qos disabled (jsc#SLE-8464).
- net: mscc: ocelot: fix race condition with TX timestamping (bsc#1178461).
- net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition (git-fixes).
- nfc: s3fwrn5: use signed integer for parsing GPIO numbers (git-fixes).
- NFS: only invalidate dentrys that are clearly invalid (bsc#1178669 bsc#1170139).
- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1176180).
- NFSv4.x recover from pre-mature loss of openstateid (bsc#1176180).
- nvme: do not update disk info for multipathed device (bsc#1171558).
- nvme-tcp: check page by sendpage_ok() before calling kernel_sendpage() (bsc#1172873).
- p54: avoid accessing the data mapped to streaming DMA (git-fixes).
- PCI/ACPI: Whitelist hotplug ports for D3 if power managed by ACPI (git-fixes).
- pinctrl: amd: fix incorrect way to disable debounce filter (git-fixes).
- pinctrl: amd: use higher precision for 512 RtcClk (git-fixes).
- pinctrl: aspeed: Fix GPI only function problem (git-fixes).
- pinctrl: intel: Set default bias in case no particular value given (git-fixes).
- platform/x86: thinkpad_acpi: Send tablet mode switch at wakeup time (git-fixes).
- platform/x86: toshiba_acpi: Fix the wrong variable assignment (git-fixes).
- PM: runtime: Drop runtime PM references to supplier on link removal (git-fixes).
- powerpc/64s/radix: Fix mm_cpumask trimming race vs kthread_use_mm (MM Functionality, bsc#1178426).
- powerpc: Inline doorbell sending functions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/perf: consolidate GPCI hcall structs into asm/hvcall.h (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pmem: Add flush routines using new pmem store and sync instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Add new instructions for persistent storage and sync (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Avoid the barrier in flush routines (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Initialize pmem device on newer hardware (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Restrict papr_scm to P8 and above (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pmem: Update ppc64 to use the new barrier instruction (jsc#SLE-16402 jsc#SLE-16497 bsc#1176109 ltc#187964).
- powerpc/pseries: Add KVM guest doorbell restrictions (jsc#SLE-15869 jsc#SLE-16321).
- powerpc/pseries: new lparcfg key/value pair: partition_affinity_score (jsc#SLE-16360 jsc#SLE-16915).
- powerpc/pseries: Use doorbells even if XIVE is available (jsc#SLE-15869 jsc#SLE-16321).
- powerpc: select ARCH_WANT_IRQS_OFF_ACTIVATE_MM (MM Functionality, bsc#1178426).
- powerpc/vnic: Extend 'failover pending' window (bsc#1176855 ltc#187293).
- power: supply: bq27xxx: report 'not charging' on all types (git-fixes).
- power: supply: test_power: add missing newlines when printing parameters by sysfs (git-fixes).
- qla2xxx: Add MODULE_VERSION back to driver (bsc#1179160).
- RDMA/hns: Fix retry_cnt and rnr_cnt when querying QP (jsc#SLE-8449).
- RDMA/hns: Fix the wrong value of rnr_retry when querying qp (jsc#SLE-8449).
- RDMA/hns: Fix wrong field of SRQ number the device supports (jsc#SLE-8449).
- RDMA/hns: Solve the overflow of the calc_pg_sz() (jsc#SLE-8449).
- RDMA/mlx5: Fix devlink deadlock on net namespace deletion (jsc#SLE-8464).
- RDMA/qedr: Fix return code if accept is called on a destroyed qp (jsc#SLE-8215).
- RDMA/ucma: Add missing locking around rdma_leave_multicast() (git-fixes).
- reboot: fix overflow parsing reboot cpu number (git-fixes).
- Refresh patches.suse/vfs-add-super_operations-get_inode_dev. (bsc#1176983) 
- regulator: avoid resolve_supply() infinite recursion (git-fixes).
- regulator: defer probe when trying to get voltage from unresolved supply (git-fixes).
- regulator: fix memory leak with repeated set_machine_constraints() (git-fixes).
- regulator: pfuze100: limit pfuze-support-disable-sw to pfuze{100,200} (git-fixes).
- regulator: ti-abb: Fix array out of bound read access on the first transition (git-fixes).
- regulator: workaround self-referent regulators (git-fixes).
- Restore the header of series.conf The header of series.conf was accidentally changed by abb50be8e6bc '(kABI: revert use_mm name change (MM Functionality, bsc#1178426))'. 
- Revert 'cdc-acm: hardening against malicious devices' (git-fixes).
- Revert 'kernel/reboot.c: convert simple_strtoul to kstrtoint' (git-fixes).
- Revert 'xfs: complain if anyone tries to create a too-large buffer' (bsc#1179425, bsc#1179550).
- rfkill: Fix use-after-free in rfkill_resume() (git-fixes).
- ring-buffer: Fix recursion protection transitions between interrupt context (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) Author: Dominique Leuenberger -&lt;dimstar@opensuse.org&gt;
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) %split_extra still contained two.
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) egrep is only a deprecated bash wrapper for 'grep -E'. So use the latter instead.
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rpm/mkspec: do not build kernel-obs-build on x86_32 We want to use 64bit kernel due to various bugs (bsc#1178762 to name one). There is: ExportFilter: ^kernel-obs-build.*\.x86_64.rpm$ . i586 in Factory's prjconf now. No other actively maintained distro (i.e. merging packaging branch) builds a x86_32 kernel, hence pushing to packaging directly.
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpum_cf,perf: change DFLT_CCERROR counter name (bsc#1175918 LTC#187935).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pkey: fix paes selftest failure with paes and pkey static build (git-fixes).
- s390/zcrypt: fix kmalloc 256k failure (bsc#1177066 LTC#188341).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (bsc#1177070 LTC#188342).
- sched/fair: Ensure tasks spreading in LLC during LB (git fixes (sched)).
- sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list (git fixes (sched)).
- sched: Fix loadavg accounting race on arm64 kabi (bnc#1178227).
- sched: Fix rq-&gt;nr_iowait ordering (git fixes (sched)).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: libiscsi: Fix NOP race condition (bsc#1176481).
- scsi: libiscsi: use sendpage_ok() in iscsi_tcp_segment_map() (bsc#1172873).
- serial: 8250_mtk: Fix uart_get_baud_rate warning (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- spi: lpspi: Fix use-after-free on unbind (git-fixes).
- staging: comedi: cb_pcidas: Allow 2-channel commands for AO subdevice (git-fixes).
- staging: octeon: Drop on uncorrectable alignment or FCS error (git-fixes).
- staging: octeon: repair 'fixed-link' support (git-fixes).
- staging: rtl8723bs: Add 024c:0627 to the list of SDIO device-ids (git-fixes).
- SUNRPC: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1154353).
- SUNRPC: Fix general protection fault in trace_rpc_xdr_overflow() (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (git-fixes).
- tcp: use sendpage_ok() to detect misused .sendpage (bsc#1172873).
- thunderbolt: Add the missed ida_simple_remove() in ring_request_msix() (git-fixes).
- thunderbolt: Fix memory leak if ida_simple_get() fails in enumerate_services() (git-fixes).
- timer: Fix wheel index calculation on last level (git-fixes).
- timer: Prevent base-&gt;clk from moving backward (git-fixes).
- tpm: efi: Do not create binary_bios_measurements file for an empty log (git-fixes).
- tpm_tis: Disable interrupts on ThinkPad T490s (git-fixes).
- tracing: Fix out of bounds write in get_trace_buf (git-fixes).
- tty: serial: fsl_lpuart: add LS1028A support (git-fixes).
- tty: serial: fsl_lpuart: LS1021A had a FIFO size of 16 words, like LS1028A (git-fixes).
- tty: serial: imx: fix potential deadlock (git-fixes).
- tty: serial: imx: keep console clocks always on (git-fixes).
- uio: Fix use-after-free in uio_unregister_device() (git-fixes).
- uio: free uio id after uio file node is freed (git-fixes).
- USB: Add NO_LPM quirk for Kingston flash drive (git-fixes).
- USB: adutux: fix debugging (git-fixes).
- USB: cdc-acm: Add DISABLE_ECHO for Renesas USB Download mode (git-fixes).
- USB: cdc-acm: fix cooldown mechanism (git-fixes).
- USB: core: Change %pK for __user pointers to %px (git-fixes).
- USB: core: driver: fix stray tabs in error messages (git-fixes).
- USB: core: Fix regression in Hercules audio card (git-fixes).
- USB: gadget: Fix memleak in gadgetfs_fill_super (git-fixes).
- USB: gadget: f_midi: Fix memleak in f_midi_alloc (git-fixes).
- USB: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- USB: host: fsl-mph-dr-of: check return of dma_set_mask() (git-fixes).
- USB: mtu3: fix panic in mtu3_gadget_stop() (git-fixes).
- USB: serial: cyberjack: fix write-URB completion race (git-fixes).
- USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231 (git-fixes).
- USB: serial: option: add Quectel EC200T module support (git-fixes).
- USB: serial: option: add Telit FN980 composition 0x1055 (git-fixes).
- USB: typec: tcpm: During PR_SWAP, source caps should be sent only after tSwapSourceStart (git-fixes).
- USB: typec: tcpm: reset hard_reset_count for any disconnect (git-fixes).
- USB: xhci: omit duplicate actions when suspending a runtime suspended host (git-fixes).
- video: hyperv_fb: Fix the cache type when mapping the VRAM (git-fixes).
- video: hyperv_fb: include vmalloc.h (git-fixes).
- video: hyperv: hyperv_fb: Obtain screen resolution from Hyper-V host (bsc#1175306).
- video: hyperv: hyperv_fb: Support deferred IO for Hyper-V frame buffer driver (bsc#1175306).
- video: hyperv: hyperv_fb: Use physical memory for fb on HyperV Gen 1 VMs (bsc#1175306).
- virtio: virtio_console: fix DMA memory allocation for rproc serial (git-fixes).
- vt: Disable KD_FONT_OP_COPY (bsc#1178589).
- x86/hyperv: Clarify comment on x2apic mode (git-fixes).
- x86/i8259: Use printk_deferred() to prevent deadlock (git-fixes).
- x86/kexec: Use up-to-dated screen_info copy to fill boot params (bsc#1175306).
- x86/microcode/intel: Check patch signature before saving microcode for early loading (bsc#1152489).
- x86/speculation: Allow IBPB to be conditionally enabled on CPUs with always-on STIBP (bsc#1152489).
- xfs: complain if anyone tries to create a too-large buffer log item (bsc#1166146).
- xfs: do not update mtime on COW faults (bsc#1167030).
- xfs: fix a missing unlock on error in xfs_fs_map_blocks (git-fixes).
- xfs: fix brainos in the refcount scrubber's rmap fragment processor (git-fixes).
- xfs: fix flags argument to rmap lookup when converting shared file rmaps (git-fixes).
- xfs: fix rmap key and record comparison functions (git-fixes).
- xfs: fix scrub flagging rtinherit even if there is no rt device (git-fixes).
- xfs: flush new eof page on truncate to avoid post-eof corruption (git-fixes).
- xfs: introduce XFS_MAX_FILEOFF (bsc#1166166).
- xfs: prohibit fs freezing when using empty transactions (bsc#1179442).
- xfs: remove unused variable 'done' (bsc#1166166).
- xfs: revert 'xfs: fix rmap key and record comparison functions' (git-fixes).
- xfs: set the unwritten bit in rmap lookup flags in xchk_bmap_get_rmapextents (git-fixes).
- xfs: set xefi_discard when creating a deferred agfl free log intent item (git-fixes).
- xfs: truncate should remove all blocks, not just to the end of the page cache (bsc#1166166).
- xhci: Fix sizeof() mismatch (git-fixes).
- xhci: hisilicon: fix refercence leak in xhci_histb_probe (git-fixes).

kernel-default-base fixes the following issues:

- Add wireguard kernel module (bsc#1179225)
- Create the list of crypto kernel modules dynamically, supersedes hardcoded list of crc32 implementations (bsc#1177577)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-10"/>
	<updated date="2020-12-10"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166146">SUSE bug 1166146</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1166166">SUSE bug 1166166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167030">SUSE bug 1167030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170139">SUSE bug 1170139</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171073">SUSE bug 1171073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171558">SUSE bug 1171558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172873">SUSE bug 1172873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173504">SUSE bug 1173504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174852">SUSE bug 1174852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175306">SUSE bug 1175306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175918">SUSE bug 1175918</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176109">SUSE bug 1176109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176180">SUSE bug 1176180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176200">SUSE bug 1176200</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176481">SUSE bug 1176481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176586">SUSE bug 1176586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176983">SUSE bug 1176983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177066">SUSE bug 1177066</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177070">SUSE bug 1177070</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177353">SUSE bug 1177353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177397">SUSE bug 1177397</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177577">SUSE bug 1177577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177703">SUSE bug 1177703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177820">SUSE bug 1177820</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178123">SUSE bug 1178123</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178182">SUSE bug 1178182</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178227">SUSE bug 1178227</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178286">SUSE bug 1178286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178304">SUSE bug 1178304</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178393">SUSE bug 1178393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178401">SUSE bug 1178401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178426">SUSE bug 1178426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178461">SUSE bug 1178461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178579">SUSE bug 1178579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178581">SUSE bug 1178581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178584">SUSE bug 1178584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178585">SUSE bug 1178585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178589">SUSE bug 1178589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178635">SUSE bug 1178635</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178653">SUSE bug 1178653</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178659">SUSE bug 1178659</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178661">SUSE bug 1178661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178669">SUSE bug 1178669</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178686">SUSE bug 1178686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178740">SUSE bug 1178740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178755">SUSE bug 1178755</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178762">SUSE bug 1178762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178838">SUSE bug 1178838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178853">SUSE bug 1178853</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178886">SUSE bug 1178886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179001">SUSE bug 1179001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179012">SUSE bug 1179012</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179014">SUSE bug 1179014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179015">SUSE bug 1179015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179045">SUSE bug 1179045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179076">SUSE bug 1179076</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179140">SUSE bug 1179140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179141">SUSE bug 1179141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179160">SUSE bug 1179160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179201">SUSE bug 1179201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179211">SUSE bug 1179211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179217">SUSE bug 1179217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179225">SUSE bug 1179225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179424">SUSE bug 1179424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179425">SUSE bug 1179425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179426">SUSE bug 1179426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179427">SUSE bug 1179427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179429">SUSE bug 1179429</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179432">SUSE bug 1179432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179442">SUSE bug 1179442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179550">SUSE bug 1179550</bugzilla>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-15436/">CVE-2020-15436</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15437/">CVE-2020-15437</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25668/">CVE-2020-25668</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25669/">CVE-2020-25669</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25704/">CVE-2020-25704</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28915/">CVE-2020-28915</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28941/">CVE-2020-28941</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-28974/">CVE-2020-28974</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29369/">CVE-2020-29369</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-29371/">CVE-2020-29371</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-4788/">CVE-2020-4788</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509368" comment="kernel-default-extra-5.3.18-24.43.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111956" version="1" class="patch">
	<metadata>
		<title>Security update for PackageKit (Low)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1104313" ref_url="https://bugzilla.suse.com/1104313" source="BUGZILLA"/>
		<reference ref_id="1176930" ref_url="https://bugzilla.suse.com/1176930" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16121" ref_url="https://www.suse.com/security/cve/CVE-2020-16121/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008105.html" source="SUSE-SU"/>
		<description>
This update for PackageKit fixes the following issue:

- CVE-2020-16121: Fixed an  Information disclosure in InstallFiles, GetFilesLocal and GetDetailsLocal (bsc#1176930).
- Update summary and description of gstreamer-plugin and gtk3-module. (bsc#1104313)
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-22"/>
	<updated date="2020-12-22"/>
	<severity>Low</severity>
	<bugzilla href="https://bugzilla.suse.com/1104313">SUSE bug 1104313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176930">SUSE bug 1176930</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-16121/">CVE-2020-16121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509369" comment="PackageKit-gstreamer-plugin-1.1.13-4.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509370" comment="PackageKit-gtk3-module-1.1.13-4.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111957" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1179530" ref_url="https://bugzilla.suse.com/1179530" source="BUGZILLA"/>
		<reference ref_id="1180039" ref_url="https://bugzilla.suse.com/1180039" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16042" ref_url="https://www.suse.com/security/cve/CVE-2020-16042/" source="CVE"/>
		<reference ref_id="CVE-2020-26970" ref_url="https://www.suse.com/security/cve/CVE-2020-26970/" source="CVE"/>
		<reference ref_id="CVE-2020-26971" ref_url="https://www.suse.com/security/cve/CVE-2020-26971/" source="CVE"/>
		<reference ref_id="CVE-2020-26973" ref_url="https://www.suse.com/security/cve/CVE-2020-26973/" source="CVE"/>
		<reference ref_id="CVE-2020-26974" ref_url="https://www.suse.com/security/cve/CVE-2020-26974/" source="CVE"/>
		<reference ref_id="CVE-2020-26978" ref_url="https://www.suse.com/security/cve/CVE-2020-26978/" source="CVE"/>
		<reference ref_id="CVE-2020-35111" ref_url="https://www.suse.com/security/cve/CVE-2020-35111/" source="CVE"/>
		<reference ref_id="CVE-2020-35112" ref_url="https://www.suse.com/security/cve/CVE-2020-35112/" source="CVE"/>
		<reference ref_id="CVE-2020-35113" ref_url="https://www.suse.com/security/cve/CVE-2020-35113/" source="CVE"/>
		<reference ref_id="SUSE-SU-2020:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2020-December/008122.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.6
  * new: MailExtensions: Added
    browser.windows.openDefaultBrowser() (bmo#1664708)
  * changed: Thunderbird now only shows quota exceeded
    indications on the main window (bmo#1671748)
  * changed: MailExtensions: menus API enabled in messages being
    composed (bmo#1670832)
  * changed: MailExtensions: Honor allowScriptsToClose argument
    in windows.create API function (bmo#1675940)
  * changed: MailExtensions: APIs that returned an accountId will
    reflect the account the message belongs to, not what is
    stored in message headers (bmo#1644032)
  * fixed: Keyboard shortcut for toggling message 'read' status
    not shown in menus (bmo#1619248)
  * fixed: OpenPGP: After importing a secret key, Key Manager
    displayed properties of the wrong key (bmo#1667054)
  * fixed: OpenPGP: Inline PGP parsing improvements (bmo#1660041)
  * fixed: OpenPGP: Discovering keys online via Key Manager
    sometimes failed on Linux (bmo#1634053)
  * fixed: OpenPGP: Encrypted attachment 'Decrypt and Open/Save
    As' did not work (bmo#1663169)
  * fixed: OpenPGP: Importing keys failed on macOS (bmo#1680757)
  * fixed: OpenPGP: Verification of clear signed UTF-8 text
    failed (bmo#1679756)
  * fixed: Address book: Some columns incorrectly displayed no
    data (bmo#1631201)
  * fixed: Address book: The address book view did not update
    after changing the name format in the menu (bmo#1678555)
  * fixed: Calendar: Could not import an ICS file into a CalDAV
    calendar (bmo#1652984)
  * fixed: Calendar: Two 'Home' calendars were visible on a new
    profile (bmo#1656782)
  * fixed: Calendar: Dark theme was incomplete on Linux
    (bmo#1655543)
  * fixed: Dark theme did not apply to new mail notification
    popups (bmo#1681083)
  * fixed: Folder icon, message list, and contact side bar visual
    improvements (bmo#1679436)
  * fixed: MailExtensions: HTTP refresh in browser content tabs
    did not work (bmo#1667774)
  * fixed: MailExtensions: messageDisplayScripts failed to run in
    main window (bmo#1674932)
  * fixed: Various security fixes
  MFSA 2020-56 (bsc#1180039)
  * CVE-2020-16042 (bmo#1679003)
    Operations on a BigInt could have caused uninitialized memory
    to be exposed
  * CVE-2020-26971 (bmo#1663466)
    Heap buffer overflow in WebGL
  * CVE-2020-26973 (bmo#1680084)
    CSS Sanitizer performed incorrect sanitization
  * CVE-2020-26974 (bmo#1681022)
    Incorrect cast of StyleGenericFlexBasis resulted in a heap
    use-after-free
  * CVE-2020-26978 (bmo#1677047)
    Internal network hosts could have been probed by a malicious
    webpage
  * CVE-2020-35111 (bmo#1657916)
    The proxy.onRequest API did not catch view-source URLs
  * CVE-2020-35112 (bmo#1661365)
    Opening an extension-less download may have inadvertently
    launched an executable instead
  * CVE-2020-35113 (bmo#1664831, bmo#1673589)
    Memory safety bugs fixed in Thunderbird 78.6

Mozilla Thunderbird 78.5.1

* new: OpenPGP: Added option to disable email subject
  encryption (bmo#1666073)
* changed: OpenPGP public key import now supports multi-file
  selection and bulk accepting imported keys (bmo#1665145)
* changed: MailExtensions: getComposeDetails will wait for
  'compose-editor-ready' event (bmo#1675012)
* fixed: New mail icon was not removed from the system tray at
  shutdown (bmo#1664586)
* fixed: 'Place replies in the folder of the message being
  replied to' did not work when using 'Reply to List'
  (bmo#522450)
* fixed: Thunderbird did not honor the 'Run search on server'
  option when searching messages (bmo#546925)
* fixed: Highlight color for folders with unread messages
  wasn't visible in dark theme (bmo#1676697)
* fixed: OpenPGP: Key were missing from Key Manager
  (bmo#1674521)
* fixed: OpenPGP: Option to import keys from clipboard always
  disabled (bmo#1676842)
* fixed: The 'Link' button on the large attachments info bar
  failed to open up Filelink section in Options if the user had
  not yet configured Filelink (bmo#1677647)
* fixed: Address book: Printing members of a mailing list
  resulted in incorrect output (bmo#1676859)
* fixed: Unable to connect to LDAP servers configured with a
  self-signed SSL certificate (bmo#1659947)
* fixed: Autoconfig via LDAP did not work as expected
  (bmo#1662433)
* fixed: Calendar: Pressing Ctrl-Enter in the new event dialog
  would create duplicate events (bmo#1668478)
* fixed: Various security fixes

MFSA 2020-53 (bsc#1179530)
* CVE-2020-26970 (bmo#1677338)
  Stack overflow due to incorrect parsing of SMTP server
  response codes
		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-25"/>
	<updated date="2020-12-25"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1179530">SUSE bug 1179530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180039">SUSE bug 1180039</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16042/">CVE-2020-16042</cve>
	<cve impact="critical" href="https://www.suse.com/security/cve/CVE-2020-26970/">CVE-2020-26970</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26971/">CVE-2020-26971</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26973/">CVE-2020-26973</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-26974/">CVE-2020-26974</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26978/">CVE-2020-26978</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-35111/">CVE-2020-35111</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35112/">CVE-2020-35112</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35113/">CVE-2020-35113</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509371" comment="MozillaThunderbird-78.6.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509372" comment="MozillaThunderbird-translations-common-78.6.0-8.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509373" comment="MozillaThunderbird-translations-other-78.6.0-8.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111958" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1177542" ref_url="https://bugzilla.suse.com/1177542" source="BUGZILLA"/>
		<reference ref_id="1183942" ref_url="https://bugzilla.suse.com/1183942" source="BUGZILLA"/>
		<reference ref_id="1184536" ref_url="https://bugzilla.suse.com/1184536" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23981" ref_url="https://www.suse.com/security/cve/CVE-2021-23981/" source="CVE"/>
		<reference ref_id="CVE-2021-23982" ref_url="https://www.suse.com/security/cve/CVE-2021-23982/" source="CVE"/>
		<reference ref_id="CVE-2021-23984" ref_url="https://www.suse.com/security/cve/CVE-2021-23984/" source="CVE"/>
		<reference ref_id="CVE-2021-23987" ref_url="https://www.suse.com/security/cve/CVE-2021-23987/" source="CVE"/>
		<reference ref_id="CVE-2021-23991" ref_url="https://www.suse.com/security/cve/CVE-2021-23991/" source="CVE"/>
		<reference ref_id="CVE-2021-23992" ref_url="https://www.suse.com/security/cve/CVE-2021-23992/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008620.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird was updated to version 78.9.1 (MFSA 2021-12,MFSA 2021-13, bsc#1183942, bsc#1184536)
  * CVE-2021-23981: Texture upload into an unbound backing buffer resulted in an out-of-bound read
  * CVE-2021-23982: Internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23984: Malicious extensions could have spoofed popup information
  * CVE-2021-23987: Memory safety bugs
  * CVE-2021-23991: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key
  * CVE-2021-23993: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key
- cleaned up and fixed mozilla.sh.in for wayland (bsc#1177542)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177542">SUSE bug 1177542</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183942">SUSE bug 1183942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184536">SUSE bug 1184536</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23981/">CVE-2021-23981</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23982/">CVE-2021-23982</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23984/">CVE-2021-23984</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23987/">CVE-2021-23987</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-23991/">CVE-2021-23991</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23992/">CVE-2021-23992</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509374" comment="MozillaThunderbird-78.9.1-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509375" comment="MozillaThunderbird-translations-common-78.9.1-8.20.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509376" comment="MozillaThunderbird-translations-other-78.9.1-8.20.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111959" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1040855" ref_url="https://bugzilla.suse.com/1040855" source="BUGZILLA"/>
		<reference ref_id="1044120" ref_url="https://bugzilla.suse.com/1044120" source="BUGZILLA"/>
		<reference ref_id="1044767" ref_url="https://bugzilla.suse.com/1044767" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1109695" ref_url="https://bugzilla.suse.com/1109695" source="BUGZILLA"/>
		<reference ref_id="1115431" ref_url="https://bugzilla.suse.com/1115431" source="BUGZILLA"/>
		<reference ref_id="1138374" ref_url="https://bugzilla.suse.com/1138374" source="BUGZILLA"/>
		<reference ref_id="1139944" ref_url="https://bugzilla.suse.com/1139944" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156315" ref_url="https://bugzilla.suse.com/1156315" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1158775" ref_url="https://bugzilla.suse.com/1158775" source="BUGZILLA"/>
		<reference ref_id="1161099" ref_url="https://bugzilla.suse.com/1161099" source="BUGZILLA"/>
		<reference ref_id="1163727" ref_url="https://bugzilla.suse.com/1163727" source="BUGZILLA"/>
		<reference ref_id="1165933" ref_url="https://bugzilla.suse.com/1165933" source="BUGZILLA"/>
		<reference ref_id="1167657" ref_url="https://bugzilla.suse.com/1167657" source="BUGZILLA"/>
		<reference ref_id="1168952" ref_url="https://bugzilla.suse.com/1168952" source="BUGZILLA"/>
		<reference ref_id="1171000" ref_url="https://bugzilla.suse.com/1171000" source="BUGZILLA"/>
		<reference ref_id="1171078" ref_url="https://bugzilla.suse.com/1171078" source="BUGZILLA"/>
		<reference ref_id="1171688" ref_url="https://bugzilla.suse.com/1171688" source="BUGZILLA"/>
		<reference ref_id="1172145" ref_url="https://bugzilla.suse.com/1172145" source="BUGZILLA"/>
		<reference ref_id="1172733" ref_url="https://bugzilla.suse.com/1172733" source="BUGZILLA"/>
		<reference ref_id="1174486" ref_url="https://bugzilla.suse.com/1174486" source="BUGZILLA"/>
		<reference ref_id="1175079" ref_url="https://bugzilla.suse.com/1175079" source="BUGZILLA"/>
		<reference ref_id="1175480" ref_url="https://bugzilla.suse.com/1175480" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1176396" ref_url="https://bugzilla.suse.com/1176396" source="BUGZILLA"/>
		<reference ref_id="1176942" ref_url="https://bugzilla.suse.com/1176942" source="BUGZILLA"/>
		<reference ref_id="1176956" ref_url="https://bugzilla.suse.com/1176956" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177500" ref_url="https://bugzilla.suse.com/1177500" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1177679" ref_url="https://bugzilla.suse.com/1177679" source="BUGZILLA"/>
		<reference ref_id="1177733" ref_url="https://bugzilla.suse.com/1177733" source="BUGZILLA"/>
		<reference ref_id="1178049" ref_url="https://bugzilla.suse.com/1178049" source="BUGZILLA"/>
		<reference ref_id="1178203" ref_url="https://bugzilla.suse.com/1178203" source="BUGZILLA"/>
		<reference ref_id="1178270" ref_url="https://bugzilla.suse.com/1178270" source="BUGZILLA"/>
		<reference ref_id="1178372" ref_url="https://bugzilla.suse.com/1178372" source="BUGZILLA"/>
		<reference ref_id="1178590" ref_url="https://bugzilla.suse.com/1178590" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1178634" ref_url="https://bugzilla.suse.com/1178634" source="BUGZILLA"/>
		<reference ref_id="1178660" ref_url="https://bugzilla.suse.com/1178660" source="BUGZILLA"/>
		<reference ref_id="1178756" ref_url="https://bugzilla.suse.com/1178756" source="BUGZILLA"/>
		<reference ref_id="1178780" ref_url="https://bugzilla.suse.com/1178780" source="BUGZILLA"/>
		<reference ref_id="1179107" ref_url="https://bugzilla.suse.com/1179107" source="BUGZILLA"/>
		<reference ref_id="1179204" ref_url="https://bugzilla.suse.com/1179204" source="BUGZILLA"/>
		<reference ref_id="1179419" ref_url="https://bugzilla.suse.com/1179419" source="BUGZILLA"/>
		<reference ref_id="1179434" ref_url="https://bugzilla.suse.com/1179434" source="BUGZILLA"/>
		<reference ref_id="1179435" ref_url="https://bugzilla.suse.com/1179435" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179578" ref_url="https://bugzilla.suse.com/1179578" source="BUGZILLA"/>
		<reference ref_id="1179601" ref_url="https://bugzilla.suse.com/1179601" source="BUGZILLA"/>
		<reference ref_id="1179604" ref_url="https://bugzilla.suse.com/1179604" source="BUGZILLA"/>
		<reference ref_id="1179639" ref_url="https://bugzilla.suse.com/1179639" source="BUGZILLA"/>
		<reference ref_id="1179652" ref_url="https://bugzilla.suse.com/1179652" source="BUGZILLA"/>
		<reference ref_id="1179656" ref_url="https://bugzilla.suse.com/1179656" source="BUGZILLA"/>
		<reference ref_id="1179670" ref_url="https://bugzilla.suse.com/1179670" source="BUGZILLA"/>
		<reference ref_id="1179671" ref_url="https://bugzilla.suse.com/1179671" source="BUGZILLA"/>
		<reference ref_id="1179672" ref_url="https://bugzilla.suse.com/1179672" source="BUGZILLA"/>
		<reference ref_id="1179673" ref_url="https://bugzilla.suse.com/1179673" source="BUGZILLA"/>
		<reference ref_id="1179675" ref_url="https://bugzilla.suse.com/1179675" source="BUGZILLA"/>
		<reference ref_id="1179676" ref_url="https://bugzilla.suse.com/1179676" source="BUGZILLA"/>
		<reference ref_id="1179677" ref_url="https://bugzilla.suse.com/1179677" source="BUGZILLA"/>
		<reference ref_id="1179678" ref_url="https://bugzilla.suse.com/1179678" source="BUGZILLA"/>
		<reference ref_id="1179679" ref_url="https://bugzilla.suse.com/1179679" source="BUGZILLA"/>
		<reference ref_id="1179680" ref_url="https://bugzilla.suse.com/1179680" source="BUGZILLA"/>
		<reference ref_id="1179681" ref_url="https://bugzilla.suse.com/1179681" source="BUGZILLA"/>
		<reference ref_id="1179682" ref_url="https://bugzilla.suse.com/1179682" source="BUGZILLA"/>
		<reference ref_id="1179683" ref_url="https://bugzilla.suse.com/1179683" source="BUGZILLA"/>
		<reference ref_id="1179684" ref_url="https://bugzilla.suse.com/1179684" source="BUGZILLA"/>
		<reference ref_id="1179685" ref_url="https://bugzilla.suse.com/1179685" source="BUGZILLA"/>
		<reference ref_id="1179687" ref_url="https://bugzilla.suse.com/1179687" source="BUGZILLA"/>
		<reference ref_id="1179688" ref_url="https://bugzilla.suse.com/1179688" source="BUGZILLA"/>
		<reference ref_id="1179689" ref_url="https://bugzilla.suse.com/1179689" source="BUGZILLA"/>
		<reference ref_id="1179690" ref_url="https://bugzilla.suse.com/1179690" source="BUGZILLA"/>
		<reference ref_id="1179703" ref_url="https://bugzilla.suse.com/1179703" source="BUGZILLA"/>
		<reference ref_id="1179704" ref_url="https://bugzilla.suse.com/1179704" source="BUGZILLA"/>
		<reference ref_id="1179707" ref_url="https://bugzilla.suse.com/1179707" source="BUGZILLA"/>
		<reference ref_id="1179709" ref_url="https://bugzilla.suse.com/1179709" source="BUGZILLA"/>
		<reference ref_id="1179710" ref_url="https://bugzilla.suse.com/1179710" source="BUGZILLA"/>
		<reference ref_id="1179711" ref_url="https://bugzilla.suse.com/1179711" source="BUGZILLA"/>
		<reference ref_id="1179712" ref_url="https://bugzilla.suse.com/1179712" source="BUGZILLA"/>
		<reference ref_id="1179713" ref_url="https://bugzilla.suse.com/1179713" source="BUGZILLA"/>
		<reference ref_id="1179714" ref_url="https://bugzilla.suse.com/1179714" source="BUGZILLA"/>
		<reference ref_id="1179715" ref_url="https://bugzilla.suse.com/1179715" source="BUGZILLA"/>
		<reference ref_id="1179716" ref_url="https://bugzilla.suse.com/1179716" source="BUGZILLA"/>
		<reference ref_id="1179745" ref_url="https://bugzilla.suse.com/1179745" source="BUGZILLA"/>
		<reference ref_id="1179763" ref_url="https://bugzilla.suse.com/1179763" source="BUGZILLA"/>
		<reference ref_id="1179888" ref_url="https://bugzilla.suse.com/1179888" source="BUGZILLA"/>
		<reference ref_id="1179892" ref_url="https://bugzilla.suse.com/1179892" source="BUGZILLA"/>
		<reference ref_id="1179896" ref_url="https://bugzilla.suse.com/1179896" source="BUGZILLA"/>
		<reference ref_id="1179960" ref_url="https://bugzilla.suse.com/1179960" source="BUGZILLA"/>
		<reference ref_id="1179963" ref_url="https://bugzilla.suse.com/1179963" source="BUGZILLA"/>
		<reference ref_id="1180027" ref_url="https://bugzilla.suse.com/1180027" source="BUGZILLA"/>
		<reference ref_id="1180029" ref_url="https://bugzilla.suse.com/1180029" source="BUGZILLA"/>
		<reference ref_id="1180031" ref_url="https://bugzilla.suse.com/1180031" source="BUGZILLA"/>
		<reference ref_id="1180052" ref_url="https://bugzilla.suse.com/1180052" source="BUGZILLA"/>
		<reference ref_id="1180056" ref_url="https://bugzilla.suse.com/1180056" source="BUGZILLA"/>
		<reference ref_id="1180086" ref_url="https://bugzilla.suse.com/1180086" source="BUGZILLA"/>
		<reference ref_id="1180117" ref_url="https://bugzilla.suse.com/1180117" source="BUGZILLA"/>
		<reference ref_id="1180258" ref_url="https://bugzilla.suse.com/1180258" source="BUGZILLA"/>
		<reference ref_id="1180261" ref_url="https://bugzilla.suse.com/1180261" source="BUGZILLA"/>
		<reference ref_id="1180506" ref_url="https://bugzilla.suse.com/1180506" source="BUGZILLA"/>
		<reference ref_id="1180541" ref_url="https://bugzilla.suse.com/1180541" source="BUGZILLA"/>
		<reference ref_id="1180559" ref_url="https://bugzilla.suse.com/1180559" source="BUGZILLA"/>
		<reference ref_id="1180566" ref_url="https://bugzilla.suse.com/1180566" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-0444" ref_url="https://www.suse.com/security/cve/CVE-2020-0444/" source="CVE"/>
		<reference ref_id="CVE-2020-0465" ref_url="https://www.suse.com/security/cve/CVE-2020-0465/" source="CVE"/>
		<reference ref_id="CVE-2020-0466" ref_url="https://www.suse.com/security/cve/CVE-2020-0466/" source="CVE"/>
		<reference ref_id="CVE-2020-11668" ref_url="https://www.suse.com/security/cve/CVE-2020-11668/" source="CVE"/>
		<reference ref_id="CVE-2020-27068" ref_url="https://www.suse.com/security/cve/CVE-2020-27068/" source="CVE"/>
		<reference ref_id="CVE-2020-27777" ref_url="https://www.suse.com/security/cve/CVE-2020-27777/" source="CVE"/>
		<reference ref_id="CVE-2020-27786" ref_url="https://www.suse.com/security/cve/CVE-2020-27786/" source="CVE"/>
		<reference ref_id="CVE-2020-27825" ref_url="https://www.suse.com/security/cve/CVE-2020-27825/" source="CVE"/>
		<reference ref_id="CVE-2020-27830" ref_url="https://www.suse.com/security/cve/CVE-2020-27830/" source="CVE"/>
		<reference ref_id="CVE-2020-28374" ref_url="https://www.suse.com/security/cve/CVE-2020-28374/" source="CVE"/>
		<reference ref_id="CVE-2020-29370" ref_url="https://www.suse.com/security/cve/CVE-2020-29370/" source="CVE"/>
		<reference ref_id="CVE-2020-29373" ref_url="https://www.suse.com/security/cve/CVE-2020-29373/" source="CVE"/>
		<reference ref_id="CVE-2020-29660" ref_url="https://www.suse.com/security/cve/CVE-2020-29660/" source="CVE"/>
		<reference ref_id="CVE-2020-29661" ref_url="https://www.suse.com/security/cve/CVE-2020-29661/" source="CVE"/>
		<reference ref_id="CVE-2020-36158" ref_url="https://www.suse.com/security/cve/CVE-2020-36158/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html" source="SUSE-SU"/>
		<description>

The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).

The following non-security bugs were fixed:

- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG &amp; B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime-&gt;avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses-&gt;tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: 	* context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: 	* context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: 	* context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: 	* context fixes 	* adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: 	* context fixes 	* adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: 	* context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: 	* context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: 	* context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: 	* context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: 	* changed filename from vkms_composer.c to vkms_crc.c 	* context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: 	* context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: 	* context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: 	* context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma-&gt;vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head-&gt;lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns-&gt;head-&gt;lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr-&gt;next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl-&gt;sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -&gt; 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address &amp; portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address &amp; phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc-&gt;use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix -&gt;pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix -&gt;session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1040855">SUSE bug 1040855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044120">SUSE bug 1044120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1044767">SUSE bug 1044767</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1109695">SUSE bug 1109695</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115431">SUSE bug 1115431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1138374">SUSE bug 1138374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1139944">SUSE bug 1139944</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156315">SUSE bug 1156315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1158775">SUSE bug 1158775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161099">SUSE bug 1161099</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163727">SUSE bug 1163727</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165933">SUSE bug 1165933</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167657">SUSE bug 1167657</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168952">SUSE bug 1168952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171000">SUSE bug 1171000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171078">SUSE bug 1171078</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171688">SUSE bug 1171688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172145">SUSE bug 1172145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172733">SUSE bug 1172733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174486">SUSE bug 1174486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175079">SUSE bug 1175079</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175480">SUSE bug 1175480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176396">SUSE bug 1176396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176942">SUSE bug 1176942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176956">SUSE bug 1176956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177500">SUSE bug 1177500</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177679">SUSE bug 1177679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177733">SUSE bug 1177733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178049">SUSE bug 1178049</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178203">SUSE bug 1178203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178270">SUSE bug 1178270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178372">SUSE bug 1178372</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178590">SUSE bug 1178590</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178634">SUSE bug 1178634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178660">SUSE bug 1178660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178756">SUSE bug 1178756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178780">SUSE bug 1178780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179107">SUSE bug 1179107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179204">SUSE bug 1179204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179419">SUSE bug 1179419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179434">SUSE bug 1179434</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179435">SUSE bug 1179435</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179578">SUSE bug 1179578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179601">SUSE bug 1179601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179604">SUSE bug 1179604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179639">SUSE bug 1179639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179652">SUSE bug 1179652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179656">SUSE bug 1179656</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179670">SUSE bug 1179670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179671">SUSE bug 1179671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179672">SUSE bug 1179672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179673">SUSE bug 1179673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179675">SUSE bug 1179675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179676">SUSE bug 1179676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179677">SUSE bug 1179677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179678">SUSE bug 1179678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179679">SUSE bug 1179679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179680">SUSE bug 1179680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179681">SUSE bug 1179681</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179682">SUSE bug 1179682</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179683">SUSE bug 1179683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179684">SUSE bug 1179684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179685">SUSE bug 1179685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179687">SUSE bug 1179687</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179688">SUSE bug 1179688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179689">SUSE bug 1179689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179690">SUSE bug 1179690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179703">SUSE bug 1179703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179704">SUSE bug 1179704</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179707">SUSE bug 1179707</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179709">SUSE bug 1179709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179710">SUSE bug 1179710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179711">SUSE bug 1179711</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179712">SUSE bug 1179712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179713">SUSE bug 1179713</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179714">SUSE bug 1179714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179715">SUSE bug 1179715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179716">SUSE bug 1179716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179745">SUSE bug 1179745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179763">SUSE bug 1179763</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179888">SUSE bug 1179888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179892">SUSE bug 1179892</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179896">SUSE bug 1179896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179960">SUSE bug 1179960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179963">SUSE bug 1179963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180027">SUSE bug 1180027</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180029">SUSE bug 1180029</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180031">SUSE bug 1180031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180052">SUSE bug 1180052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180056">SUSE bug 1180056</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180086">SUSE bug 1180086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180117">SUSE bug 1180117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180258">SUSE bug 1180258</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180261">SUSE bug 1180261</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180506">SUSE bug 1180506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180541">SUSE bug 1180541</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180559">SUSE bug 1180559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180566">SUSE bug 1180566</bugzilla>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0444/">CVE-2020-0444</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0465/">CVE-2020-0465</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-0466/">CVE-2020-0466</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-11668/">CVE-2020-11668</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27068/">CVE-2020-27068</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27777/">CVE-2020-27777</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27786/">CVE-2020-27786</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27825/">CVE-2020-27825</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27830/">CVE-2020-27830</cve>
	<cve impact="important" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-28374/">CVE-2020-28374</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29370/">CVE-2020-29370</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29373/">CVE-2020-29373</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29660/">CVE-2020-29660</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29661/">CVE-2020-29661</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36158/">CVE-2020-36158</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509377" comment="kernel-default-extra-5.3.18-24.46.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111960" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1180128" ref_url="https://bugzilla.suse.com/1180128" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3472" ref_url="https://www.suse.com/security/cve/CVE-2021-3472/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008632.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-3472: XChangeFeedbackControl Integer Underflow Privilege Escalation (bsc#1180128)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-13"/>
	<updated date="2021-04-13"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180128">SUSE bug 1180128</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3472/">CVE-2021-3472</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509378" comment="xorg-x11-server-wayland-1.20.3-22.5.25.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111961" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1180623" ref_url="https://bugzilla.suse.com/1180623" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-16044" ref_url="https://www.suse.com/security/cve/CVE-2020-16044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-January/008204.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.6.1
  * changed: MailExtensions: browserAction, composeAction, and
    messageDisplayAction toolbar buttons now support label and
    default_label properties (bmo#1583478)
  * fixed: Running a quicksearch that returned no results did not
    offer to re-run as a global search (bmo#1663153)
  * fixed: Message search toolbar fixes (bmo#1681010)
  * fixed: Very long subject lines distorted the message compose
    and display windows, making them unusable (bmo#77806)
  * fixed: Compose window: Recipient addresses that had not yet
    been autocompleted were lost when clicking Send button
    (bmo#1674054)
  * fixed: Compose window: New message is no longer marked as
    'changed' just from tabbing out of the recipient field
    without editing anything (bmo#1681389)
  * fixed: Account autodiscover fixes when using MS Exchange
    servers (bmo#1679759)
  * fixed: LDAP address book stability fix (bmo#1680914)
  * fixed: Messages with invalid vcard attachments were not
    marked as read when viewed in the preview window
    (bmo#1680468)
  * fixed: Chat: Could not add TLS certificate exceptions for
    XMPP connections (bmo#1590471)
  * fixed: Calendar: System timezone was not always properly
    detected (bmo#1678839)
  * fixed: Calendar: Descriptions were sometimes blank when
    editing a single occurrence of a repeating event
    (bmo#1664731)
  * fixed: Various printing bugfixes (bmo#1676166)
  * fixed: Visual consistency and theme improvements
    (bmo#1682808)
  MFSA 2021-02 (bsc#1180623)
  * CVE-2020-16044 (bmo#1683964)
    Use-after-free write when handling a malicious COOKIE-ECHO
    SCTP chunk
		</description>
<advisory from="security@suse.de">
	<issued date="2021-01-14"/>
	<updated date="2021-01-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180623">SUSE bug 1180623</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-16044/">CVE-2020-16044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509379" comment="MozillaThunderbird-78.6.1-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509380" comment="MozillaThunderbird-translations-common-78.6.1-8.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509381" comment="MozillaThunderbird-translations-other-78.6.1-8.6.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111962" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1047233" ref_url="https://bugzilla.suse.com/1047233" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156256" ref_url="https://bugzilla.suse.com/1156256" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1159280" ref_url="https://bugzilla.suse.com/1159280" source="BUGZILLA"/>
		<reference ref_id="1160634" ref_url="https://bugzilla.suse.com/1160634" source="BUGZILLA"/>
		<reference ref_id="1167574" ref_url="https://bugzilla.suse.com/1167574" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1168777" ref_url="https://bugzilla.suse.com/1168777" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1169709" ref_url="https://bugzilla.suse.com/1169709" source="BUGZILLA"/>
		<reference ref_id="1171295" ref_url="https://bugzilla.suse.com/1171295" source="BUGZILLA"/>
		<reference ref_id="1173485" ref_url="https://bugzilla.suse.com/1173485" source="BUGZILLA"/>
		<reference ref_id="1175995" ref_url="https://bugzilla.suse.com/1175995" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1178163" ref_url="https://bugzilla.suse.com/1178163" source="BUGZILLA"/>
		<reference ref_id="1178181" ref_url="https://bugzilla.suse.com/1178181" source="BUGZILLA"/>
		<reference ref_id="1178330" ref_url="https://bugzilla.suse.com/1178330" source="BUGZILLA"/>
		<reference ref_id="1179454" ref_url="https://bugzilla.suse.com/1179454" source="BUGZILLA"/>
		<reference ref_id="1180197" ref_url="https://bugzilla.suse.com/1180197" source="BUGZILLA"/>
		<reference ref_id="1180980" ref_url="https://bugzilla.suse.com/1180980" source="BUGZILLA"/>
		<reference ref_id="1181383" ref_url="https://bugzilla.suse.com/1181383" source="BUGZILLA"/>
		<reference ref_id="1181507" ref_url="https://bugzilla.suse.com/1181507" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181862" ref_url="https://bugzilla.suse.com/1181862" source="BUGZILLA"/>
		<reference ref_id="1182011" ref_url="https://bugzilla.suse.com/1182011" source="BUGZILLA"/>
		<reference ref_id="1182077" ref_url="https://bugzilla.suse.com/1182077" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182552" ref_url="https://bugzilla.suse.com/1182552" source="BUGZILLA"/>
		<reference ref_id="1182574" ref_url="https://bugzilla.suse.com/1182574" source="BUGZILLA"/>
		<reference ref_id="1182591" ref_url="https://bugzilla.suse.com/1182591" source="BUGZILLA"/>
		<reference ref_id="1182595" ref_url="https://bugzilla.suse.com/1182595" source="BUGZILLA"/>
		<reference ref_id="1182715" ref_url="https://bugzilla.suse.com/1182715" source="BUGZILLA"/>
		<reference ref_id="1182716" ref_url="https://bugzilla.suse.com/1182716" source="BUGZILLA"/>
		<reference ref_id="1182717" ref_url="https://bugzilla.suse.com/1182717" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182989" ref_url="https://bugzilla.suse.com/1182989" source="BUGZILLA"/>
		<reference ref_id="1183015" ref_url="https://bugzilla.suse.com/1183015" source="BUGZILLA"/>
		<reference ref_id="1183018" ref_url="https://bugzilla.suse.com/1183018" source="BUGZILLA"/>
		<reference ref_id="1183022" ref_url="https://bugzilla.suse.com/1183022" source="BUGZILLA"/>
		<reference ref_id="1183023" ref_url="https://bugzilla.suse.com/1183023" source="BUGZILLA"/>
		<reference ref_id="1183048" ref_url="https://bugzilla.suse.com/1183048" source="BUGZILLA"/>
		<reference ref_id="1183252" ref_url="https://bugzilla.suse.com/1183252" source="BUGZILLA"/>
		<reference ref_id="1183277" ref_url="https://bugzilla.suse.com/1183277" source="BUGZILLA"/>
		<reference ref_id="1183278" ref_url="https://bugzilla.suse.com/1183278" source="BUGZILLA"/>
		<reference ref_id="1183279" ref_url="https://bugzilla.suse.com/1183279" source="BUGZILLA"/>
		<reference ref_id="1183280" ref_url="https://bugzilla.suse.com/1183280" source="BUGZILLA"/>
		<reference ref_id="1183281" ref_url="https://bugzilla.suse.com/1183281" source="BUGZILLA"/>
		<reference ref_id="1183282" ref_url="https://bugzilla.suse.com/1183282" source="BUGZILLA"/>
		<reference ref_id="1183283" ref_url="https://bugzilla.suse.com/1183283" source="BUGZILLA"/>
		<reference ref_id="1183284" ref_url="https://bugzilla.suse.com/1183284" source="BUGZILLA"/>
		<reference ref_id="1183285" ref_url="https://bugzilla.suse.com/1183285" source="BUGZILLA"/>
		<reference ref_id="1183286" ref_url="https://bugzilla.suse.com/1183286" source="BUGZILLA"/>
		<reference ref_id="1183287" ref_url="https://bugzilla.suse.com/1183287" source="BUGZILLA"/>
		<reference ref_id="1183288" ref_url="https://bugzilla.suse.com/1183288" source="BUGZILLA"/>
		<reference ref_id="1183366" ref_url="https://bugzilla.suse.com/1183366" source="BUGZILLA"/>
		<reference ref_id="1183369" ref_url="https://bugzilla.suse.com/1183369" source="BUGZILLA"/>
		<reference ref_id="1183386" ref_url="https://bugzilla.suse.com/1183386" source="BUGZILLA"/>
		<reference ref_id="1183405" ref_url="https://bugzilla.suse.com/1183405" source="BUGZILLA"/>
		<reference ref_id="1183412" ref_url="https://bugzilla.suse.com/1183412" source="BUGZILLA"/>
		<reference ref_id="1183416" ref_url="https://bugzilla.suse.com/1183416" source="BUGZILLA"/>
		<reference ref_id="1183427" ref_url="https://bugzilla.suse.com/1183427" source="BUGZILLA"/>
		<reference ref_id="1183428" ref_url="https://bugzilla.suse.com/1183428" source="BUGZILLA"/>
		<reference ref_id="1183445" ref_url="https://bugzilla.suse.com/1183445" source="BUGZILLA"/>
		<reference ref_id="1183447" ref_url="https://bugzilla.suse.com/1183447" source="BUGZILLA"/>
		<reference ref_id="1183501" ref_url="https://bugzilla.suse.com/1183501" source="BUGZILLA"/>
		<reference ref_id="1183509" ref_url="https://bugzilla.suse.com/1183509" source="BUGZILLA"/>
		<reference ref_id="1183530" ref_url="https://bugzilla.suse.com/1183530" source="BUGZILLA"/>
		<reference ref_id="1183534" ref_url="https://bugzilla.suse.com/1183534" source="BUGZILLA"/>
		<reference ref_id="1183540" ref_url="https://bugzilla.suse.com/1183540" source="BUGZILLA"/>
		<reference ref_id="1183593" ref_url="https://bugzilla.suse.com/1183593" source="BUGZILLA"/>
		<reference ref_id="1183596" ref_url="https://bugzilla.suse.com/1183596" source="BUGZILLA"/>
		<reference ref_id="1183598" ref_url="https://bugzilla.suse.com/1183598" source="BUGZILLA"/>
		<reference ref_id="1183637" ref_url="https://bugzilla.suse.com/1183637" source="BUGZILLA"/>
		<reference ref_id="1183646" ref_url="https://bugzilla.suse.com/1183646" source="BUGZILLA"/>
		<reference ref_id="1183662" ref_url="https://bugzilla.suse.com/1183662" source="BUGZILLA"/>
		<reference ref_id="1183686" ref_url="https://bugzilla.suse.com/1183686" source="BUGZILLA"/>
		<reference ref_id="1183692" ref_url="https://bugzilla.suse.com/1183692" source="BUGZILLA"/>
		<reference ref_id="1183696" ref_url="https://bugzilla.suse.com/1183696" source="BUGZILLA"/>
		<reference ref_id="1183750" ref_url="https://bugzilla.suse.com/1183750" source="BUGZILLA"/>
		<reference ref_id="1183757" ref_url="https://bugzilla.suse.com/1183757" source="BUGZILLA"/>
		<reference ref_id="1183775" ref_url="https://bugzilla.suse.com/1183775" source="BUGZILLA"/>
		<reference ref_id="1183843" ref_url="https://bugzilla.suse.com/1183843" source="BUGZILLA"/>
		<reference ref_id="1183859" ref_url="https://bugzilla.suse.com/1183859" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184074" ref_url="https://bugzilla.suse.com/1184074" source="BUGZILLA"/>
		<reference ref_id="1184120" ref_url="https://bugzilla.suse.com/1184120" source="BUGZILLA"/>
		<reference ref_id="1184167" ref_url="https://bugzilla.suse.com/1184167" source="BUGZILLA"/>
		<reference ref_id="1184168" ref_url="https://bugzilla.suse.com/1184168" source="BUGZILLA"/>
		<reference ref_id="1184170" ref_url="https://bugzilla.suse.com/1184170" source="BUGZILLA"/>
		<reference ref_id="1184176" ref_url="https://bugzilla.suse.com/1184176" source="BUGZILLA"/>
		<reference ref_id="1184192" ref_url="https://bugzilla.suse.com/1184192" source="BUGZILLA"/>
		<reference ref_id="1184193" ref_url="https://bugzilla.suse.com/1184193" source="BUGZILLA"/>
		<reference ref_id="1184194" ref_url="https://bugzilla.suse.com/1184194" source="BUGZILLA"/>
		<reference ref_id="1184196" ref_url="https://bugzilla.suse.com/1184196" source="BUGZILLA"/>
		<reference ref_id="1184198" ref_url="https://bugzilla.suse.com/1184198" source="BUGZILLA"/>
		<reference ref_id="1184211" ref_url="https://bugzilla.suse.com/1184211" source="BUGZILLA"/>
		<reference ref_id="1184217" ref_url="https://bugzilla.suse.com/1184217" source="BUGZILLA"/>
		<reference ref_id="1184218" ref_url="https://bugzilla.suse.com/1184218" source="BUGZILLA"/>
		<reference ref_id="1184219" ref_url="https://bugzilla.suse.com/1184219" source="BUGZILLA"/>
		<reference ref_id="1184220" ref_url="https://bugzilla.suse.com/1184220" source="BUGZILLA"/>
		<reference ref_id="1184224" ref_url="https://bugzilla.suse.com/1184224" source="BUGZILLA"/>
		<reference ref_id="1184388" ref_url="https://bugzilla.suse.com/1184388" source="BUGZILLA"/>
		<reference ref_id="1184391" ref_url="https://bugzilla.suse.com/1184391" source="BUGZILLA"/>
		<reference ref_id="1184393" ref_url="https://bugzilla.suse.com/1184393" source="BUGZILLA"/>
		<reference ref_id="1184485" ref_url="https://bugzilla.suse.com/1184485" source="BUGZILLA"/>
		<reference ref_id="1184509" ref_url="https://bugzilla.suse.com/1184509" source="BUGZILLA"/>
		<reference ref_id="1184511" ref_url="https://bugzilla.suse.com/1184511" source="BUGZILLA"/>
		<reference ref_id="1184512" ref_url="https://bugzilla.suse.com/1184512" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184583" ref_url="https://bugzilla.suse.com/1184583" source="BUGZILLA"/>
		<reference ref_id="1184585" ref_url="https://bugzilla.suse.com/1184585" source="BUGZILLA"/>
		<reference ref_id="1184647" ref_url="https://bugzilla.suse.com/1184647" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-18814" ref_url="https://www.suse.com/security/cve/CVE-2019-18814/" source="CVE"/>
		<reference ref_id="CVE-2019-19769" ref_url="https://www.suse.com/security/cve/CVE-2019-19769/" source="CVE"/>
		<reference ref_id="CVE-2020-25670" ref_url="https://www.suse.com/security/cve/CVE-2020-25670/" source="CVE"/>
		<reference ref_id="CVE-2020-25671" ref_url="https://www.suse.com/security/cve/CVE-2020-25671/" source="CVE"/>
		<reference ref_id="CVE-2020-25672" ref_url="https://www.suse.com/security/cve/CVE-2020-25672/" source="CVE"/>
		<reference ref_id="CVE-2020-25673" ref_url="https://www.suse.com/security/cve/CVE-2020-25673/" source="CVE"/>
		<reference ref_id="CVE-2020-27170" ref_url="https://www.suse.com/security/cve/CVE-2020-27170/" source="CVE"/>
		<reference ref_id="CVE-2020-27171" ref_url="https://www.suse.com/security/cve/CVE-2020-27171/" source="CVE"/>
		<reference ref_id="CVE-2020-27815" ref_url="https://www.suse.com/security/cve/CVE-2020-27815/" source="CVE"/>
		<reference ref_id="CVE-2020-35519" ref_url="https://www.suse.com/security/cve/CVE-2020-35519/" source="CVE"/>
		<reference ref_id="CVE-2020-36310" ref_url="https://www.suse.com/security/cve/CVE-2020-36310/" source="CVE"/>
		<reference ref_id="CVE-2020-36311" ref_url="https://www.suse.com/security/cve/CVE-2020-36311/" source="CVE"/>
		<reference ref_id="CVE-2020-36312" ref_url="https://www.suse.com/security/cve/CVE-2020-36312/" source="CVE"/>
		<reference ref_id="CVE-2020-36322" ref_url="https://www.suse.com/security/cve/CVE-2020-36322/" source="CVE"/>
		<reference ref_id="CVE-2021-27363" ref_url="https://www.suse.com/security/cve/CVE-2021-27363/" source="CVE"/>
		<reference ref_id="CVE-2021-27364" ref_url="https://www.suse.com/security/cve/CVE-2021-27364/" source="CVE"/>
		<reference ref_id="CVE-2021-27365" ref_url="https://www.suse.com/security/cve/CVE-2021-27365/" source="CVE"/>
		<reference ref_id="CVE-2021-28038" ref_url="https://www.suse.com/security/cve/CVE-2021-28038/" source="CVE"/>
		<reference ref_id="CVE-2021-28375" ref_url="https://www.suse.com/security/cve/CVE-2021-28375/" source="CVE"/>
		<reference ref_id="CVE-2021-28660" ref_url="https://www.suse.com/security/cve/CVE-2021-28660/" source="CVE"/>
		<reference ref_id="CVE-2021-28688" ref_url="https://www.suse.com/security/cve/CVE-2021-28688/" source="CVE"/>
		<reference ref_id="CVE-2021-28950" ref_url="https://www.suse.com/security/cve/CVE-2021-28950/" source="CVE"/>
		<reference ref_id="CVE-2021-28964" ref_url="https://www.suse.com/security/cve/CVE-2021-28964/" source="CVE"/>
		<reference ref_id="CVE-2021-28971" ref_url="https://www.suse.com/security/cve/CVE-2021-28971/" source="CVE"/>
		<reference ref_id="CVE-2021-28972" ref_url="https://www.suse.com/security/cve/CVE-2021-28972/" source="CVE"/>
		<reference ref_id="CVE-2021-29154" ref_url="https://www.suse.com/security/cve/CVE-2021-29154/" source="CVE"/>
		<reference ref_id="CVE-2021-29264" ref_url="https://www.suse.com/security/cve/CVE-2021-29264/" source="CVE"/>
		<reference ref_id="CVE-2021-29265" ref_url="https://www.suse.com/security/cve/CVE-2021-29265/" source="CVE"/>
		<reference ref_id="CVE-2021-29647" ref_url="https://www.suse.com/security/cve/CVE-2021-29647/" source="CVE"/>
		<reference ref_id="CVE-2021-30002" ref_url="https://www.suse.com/security/cve/CVE-2021-30002/" source="CVE"/>
		<reference ref_id="CVE-2021-3428" ref_url="https://www.suse.com/security/cve/CVE-2021-3428/" source="CVE"/>
		<reference ref_id="CVE-2021-3444" ref_url="https://www.suse.com/security/cve/CVE-2021-3444/" source="CVE"/>
		<reference ref_id="CVE-2021-3483" ref_url="https://www.suse.com/security/cve/CVE-2021-3483/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008645.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3444: Fixed an issue with the bpf verifier which did not properly handle mod32 destination register truncation when the source register was known to be 0 leading to out of bounds read  (bsc#1184170).
- CVE-2021-3428: Fixed an integer overflow in ext4_es_cache_extent (bsc#1173485).
- CVE-2021-29647: Fixed an issue in qrtr_recvmsg which could have allowed attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure (bsc#1184192 ).
- CVE-2021-29265: Fixed an issue in usbip_sockfd_store which could have allowed attackers to cause a denial of service due to race conditions during an update of the local and shared status (bsc#1184167).
- CVE-2021-29264: Fixed an issue in the Freescale Gianfar Ethernet driver which could have allowed attackers to cause a system crash due to a calculation of negative fragment size (bsc#1184168).
- CVE-2021-28972: Fixed a user-tolerable buffer overflow when writing a new device name to the driver from userspace, allowing userspace to write data to the kernel stack frame directly (bsc#1184198).
- CVE-2021-28971: Fixed an issue in intel_pmu_drain_pebs_nhm which could have caused a system crash because the PEBS status in a PEBS record was mishandled (bsc#1184196 ).
- CVE-2021-28964: Fixed a race condition in get_old_root which could have allowed attackers to cause a denial of service (bsc#1184193).
- CVE-2021-28688: Fixed an issue introduced by XSA-365 (bsc#1183646).
- CVE-2021-28660: Fixed an out of bounds write in rtw_wx_set_scan (bsc#1183593 ).
- CVE-2021-28375: Fixed an issue in fastrpc_internal_invoke which did not prevent user applications from sending kernel RPC messages (bsc#1183596).
- CVE-2021-28038: Fixed an issue with the netback driver which was lacking necessary treatment of errors such as failed memory allocations (bsc#1183022).
- CVE-2021-27365: Fixed an issue where an unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length of a Netlink message (bsc#1182715).
- CVE-2021-27364: Fixed an issue where an attacker could craft Netlink messages (bsc#1182717).
- CVE-2021-27363: Fixed a kernel pointer leak which could have been used to determine the address of the iscsi_transport structure (bsc#1182716).
- CVE-2020-35519: Fixed an out-of-bounds memory access  was found in x25_bind (bsc#1183696).
- CVE-2020-27815: Fixed an issue in JFS filesystem  where could have allowed an attacker to execute code (bsc#1179454).
- CVE-2020-27171: Fixed an off-by-one error affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183775).
- CVE-2020-27170: Fixed potential side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory (bsc#1183686).
- CVE-2019-19769: Fixed a use-after-free in the perf_trace_lock_acquire function (bsc#1159280 ).
- CVE-2019-18814: Fixed a use-after-free when aa_label_parse() fails in aa_audit_rule_init() (bsc#1156256).
- CVE-2021-3483: Fixed a use-after-free in nosy.c (bsc#1184393).
- CVE-2021-30002: Fixed a memory leak for large arguments in video_usercopy (bsc#1184120).
- CVE-2021-29154: Fixed incorrect computation of branch displacements, allowing arbitrary code execution (bsc#1184391).
- CVE-2021-28950: Fixed an issue in fs/fuse/fuse_i.h due to a retry loop continually was finding the same bad inode (bsc#1184194).
- CVE-2020-36312: Fixed a memory leak upon a kmalloc failure (bsc#1184509 ).
- CVE-2020-36311: Fixed a denial of service (soft lockup) by triggering destruction of a large SEV VM (bsc#1184511).
- CVE-2020-36310: Fixed infinite loop for certain nested page faults (bsc#1184512).
- CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673: Fixed multiple bugs in NFC subsytem (bsc#1178181).
- CVE-2020-36322: Fixed an issue was discovered in FUSE filesystem implementation which could have caused a system crash (bsc#1184211).

The following non-security bugs were fixed:

- 0007-block-add-docs-for-gendisk-request_queue-refcount-he.patch: (bsc#1171295, git fixes (block drivers)).
- 0008-block-revert-back-to-synchronous-request_queue-remov.patch: (bsc#1171295, git fixes (block drivers)).
- 0009-blktrace-fix-debugfs-use-after-free.patch: (bsc#1171295, git fixes (block drivers)). 
- ACPI: bus: Constify is_acpi_node() and friends (part 2) (git-fixes).
- ACPICA: Always create namespace nodes using acpi_ns_create_node() (git-fixes).
- ACPICA: Enable sleep button on ACPI legacy wake (bsc#1181383).
- ACPICA: Fix race in generic_serial_bus (I2C) and GPIO op_region parameter handling (git-fixes).
- ACPI: scan: Rearrange memory allocation in acpi_device_add() (git-fixes).
- ACPI: video: Add DMI quirk for GIGABYTE GB-BXBT-2807 (git-fixes).
- ACPI: video: Add missing callback back for Sony VPCEH3U1E (git-fixes).
- ALSA: aloop: Fix initialization of controls (git-fixes).
- ALSA: ctxfi: cthw20k2: fix mask on conf to allow 4 bits (git-fixes).
- ALSA: hda: Avoid spurious unsol event handling during S3/S4 (git-fixes).
- ALSA: hda: Drop the BATCH workaround for AMD controllers (git-fixes).
- ALSA: hda: generic: Fix the micmute led init state (git-fixes).
- ALSA: hda/hdmi: Cancel pending works before suspend (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo NH55RZQ (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel NUC 10 (git-fixes).
- ALSA: hda/realtek: Apply dual codec quirks for MSI Godlike X570 board (git-fixes).
- ALSA: hda/realtek: Apply headset-mic quirks for Xiaomi Redmibook Air (git-fixes).
- ALSA: hda/realtek: apply pin quirk for XiaomiNotebook Pro (git-fixes).
- ALSA: hda/realtek: Enable headset mic of Acer SWIFT with ALC256 (git-fixes).
- ALSA: hda/realtek: fix a determine_headset_type issue for a Dell AIO (git-fixes).
- ALSA: hda/realtek: Fix speaker amp setup on Acer Aspire E1 (git-fixes).
- ALSA: usb: Add Plantronics C320-M USB ctrl msg delay quirk (bsc#1182552).
- ALSA: usb-audio: Allow modifying parameters with succeeding hw_params calls (bsc#1182552).
- ALSA: usb-audio: Apply sample rate quirk to Logitech Connect (git-fixes).
- ALSA: usb-audio: Apply the control quirk to Plantronics headsets (bsc#1182552).
- ALSA: usb-audio: Disable USB autosuspend properly in setup_disable_autosuspend() (bsc#1182552).
- ALSA: usb-audio: Do not abort even if the clock rate differs (bsc#1182552).
- ALSA: usb-audio: Drop bogus dB range in too low level (bsc#1182552).
- ALSA: usb-audio: Fix 'cannot get freq eq' errors on Dell AE515 sound bar (bsc#1182552).
- ALSA: usb-audio: fix NULL ptr dereference in usb_audio_probe (bsc#1182552).
- ALSA: usb-audio: Fix 'RANGE setting not yet supported' errors (git-fixes).
- ALSA: usb-audio: fix use after free in usb_audio_disconnect (bsc#1182552).
- ALSA: usb-audio: Skip the clock selector inquiry for single connections (git-fixes).
- ALSA: usb: Use DIV_ROUND_UP() instead of open-coding it (git-fixes).
- amd/amdgpu: Disable VCN DPG mode for Picasso (git-fixes).
- apparmor: check/put label on apparmor_sk_clone_security() (git-fixes).
- appletalk: Fix skb allocation size in loopback case (git-fixes).
- arm64: make STACKPROTECTOR_PER_TASK configurable (bsc#1181862).
- ASoC: ak4458: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: ak5558: Add MODULE_DEVICE_TABLE (git-fixes).
- ASoC: cs42l42: Always wait at least 3ms after reset (git-fixes).
- ASoC: cs42l42: Do not enable/disable regulator at Bias Level (git-fixes).
- ASoC: cs42l42: Fix Bitclock polarity inversion (git-fixes).
- ASoC: cs42l42: Fix channel width support (git-fixes).
- ASoC: cs42l42: Fix mixer volume control (git-fixes).
- ASoC: cygnus: fix for_each_child.cocci warnings (git-fixes).
- ASoC: es8316: Simplify adc_pga_gain_tlv table (git-fixes).
- ASoC: fsl_esai: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: fsl_ssi: Fix TDM slot setup for I2S mode (git-fixes).
- ASoC: Intel: Add DMI quirk table to soc_intel_is_byt_cr() (git-fixes).
- ASoC: intel: atom: Remove 44100 sample-rate from the media and deep-buffer DAI descriptions (git-fixes).
- ASoC: intel: atom: Stop advertising non working S24LE support (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for ARCHOS Cesium 140 (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Acer One S1002 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Estar Beauty HD MID 7316R tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Voyo Winpad A15 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 10-p0XX OVCD current threshold (git-fixes).
- ASoC: Intel: bytcr_rt5651: Add quirk for the Jumper EZpad 7 tablet (git-fixes).
- ASoC: max98373: Added 30ms turn on/off time delay (git-fixes).
- ASoC: rt5640: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5651: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).
- ASoC: rt5670: Add emulated 'DAC1 Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove ADC vol-ctrl mute bits poking from Sto1 ADC mixer settings (git-fixes).
- ASoC: rt5670: Remove 'HP Playback Switch' control (git-fixes).
- ASoC: rt5670: Remove 'OUT Channel Switch' control (git-fixes).
- ASoC: sgtl5000: set DAP_AVC_CTRL register to correct default value on probe (git-fixes).
- ASoC: simple-card-utils: Do not handle device clock (git-fixes).
- ASoC: sunxi: sun4i-codec: fill ASoC card owner (git-fixes).
- ASoC: wm8960: Fix wrong bclk and lrclk with pll enabled for some chips (git-fixes).
- ath10k: fix wmi mgmt tx queue full due to race condition (git-fixes).
- ath10k: hold RCU lock when calling ieee80211_find_sta_by_ifaddr() (git-fixes).
- ath9k: fix transmitting to stations in dynamic SMPS mode (git-fixes).
- atl1c: fix error return code in atl1c_probe() (git-fixes).
- atl1e: fix error return code in atl1e_probe() (git-fixes).
- batman-adv: initialize 'struct batadv_tvlv_tt_vlan_data'-&gt;reserved field (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- binfmt_misc: fix possible deadlock in bm_register_write (git-fixes).
- blktrace-annotate-required-lock-on-do_blk_trace_setu.patch: (bsc#1171295).
- blktrace-Avoid-sparse-warnings-when-assigning-q-blk_.patch: (bsc#1171295).
- blktrace-break-out-of-blktrace-setup-on-concurrent-c.patch: (bsc#1171295).
- block-clarify-context-for-refcount-increment-helpers.patch: (bsc#1171295).
- block: rsxx: fix error return code of rsxx_pci_probe() (git-fixes).
- Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data (git-fixes).
- Bluetooth: hci_h5: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for btrtl (git-fixes).
- bnxt_en: reliably allocate IRQ table on reset to avoid crash (jsc#SLE-8371 bsc#1153274).
- bpf: Add sanity check for upper ptr_limit (bsc#1183686 bsc#1183775).
- bpf: Avoid warning when re-casting __bpf_call_base into __bpf_call_base_args (bsc#1155518).
- bpf: Declare __bpf_free_used_maps() unconditionally (bsc#1155518).
- bpf: Do not do bpf_cgroup_storage_set() for kuprobe/tp programs (bsc#1155518).
- bpf: Fix 32 bit src register truncation on div/mod (bsc#1184170).
- bpf: Fix verifier jsgt branch analysis on max bound (bsc#1155518).
- bpf_lru_list: Read double-checked variable once without lock (bsc#1155518).
- bpf: Remove MTU check in __bpf_skb_max_len (bsc#1155518).
- bpf: Simplify alu_limit masking for pointer arithmetic (bsc#1183686 bsc#1183775).
- bpf, sockmap: Fix sk-&gt;prot unhash op reset (bsc#1155518).
- bpf,x64: Pad NOPs to make images converge more easily (bsc#1178163).
- brcmfmac: Add DMI nvram filename quirk for Predia Basic tablet (git-fixes).
- brcmfmac: Add DMI nvram filename quirk for Voyo winpad A15 tablet (git-fixes).
- brcmfmac: clear EAP/association status bits on linkdown events (git-fixes).
- btrfs: abort the transaction if we fail to inc ref in btrfs_copy_root (bsc#1184217).
- btrfs: always pin deleted leaves when there are active tree mod log users (bsc#1184224).
- btrfs: fix exhaustion of the system chunk array due to concurrent allocations (bsc#1183386).
- btrfs: fix extent buffer leak on failure to copy root (bsc#1184218).
- btrfs: fix race when cloning extent buffer during rewind of an old root (bsc#1184193).
- btrfs: fix stale data exposure after cloning a hole with NO_HOLES enabled (bsc#1184220).
- btrfs: fix subvolume/snapshot deletion not triggered on mount (bsc#1184219).
- bus: omap_l3_noc: mark l3 irqs as IRQF_NO_THREAD (git-fixes).
- bus: ti-sysc: Fix warning on unbind if reset is not deasserted (git-fixes).
- can: c_can: move runtime PM enable/disable to c_can_platform (git-fixes).
- can: c_can_pci: c_can_pci_remove(): fix use-after-free (git-fixes).
- can: flexcan: assert FRZ bit in flexcan_chip_freeze() (git-fixes).
- can: flexcan: enable RX FIFO after FRZ/HALT valid (git-fixes).
- can: flexcan: flexcan_chip_freeze(): fix chip freeze for missing bitrate (git-fixes).
- can: flexcan: invoke flexcan_chip_freeze() to enter freeze mode (git-fixes).
- can: m_can: m_can_do_rx_poll(): fix extraneous msg loss warning (git-fixes).
- can: peak_usb: add forgotten supported devices (git-fixes).
- can: peak_usb: Revert 'can: peak_usb: add forgotten supported devices' (git-fixes).
- can: skb: can_skb_set_owner(): fix ref counting if socket was closed before setting skb ownership (git-fixes).
- cdc-acm: fix BREAK rx code path adding necessary calls (git-fixes).
- cifs: change noisy error message to FYI (bsc#1181507).
- cifs: check pointer before freeing (bsc#1183534).
- cifs_debug: use %pd instead of messing with -&gt;d_name (bsc#1181507).
- cifs: do not send close in compound create+close requests (bsc#1181507).
- cifs: New optype for session operations (bsc#1181507).
- cifs: print MIDs in decimal notation (bsc#1181507).
- cifs: return proper error code in statfs(2) (bsc#1181507).
- cifs: Tracepoints and logs for tracing credit changes (bsc#1181507).
- clk: fix invalid usage of list cursor in register (git-fixes).
- clk: fix invalid usage of list cursor in unregister (git-fixes).
- clk: socfpga: fix iomem pointer cast on 64-bit (git-fixes).
- completion: Drop init_completion define (git-fixes).
- configfs: fix a use-after-free in __configfs_open_file (git-fixes).
- config: net: freescale: change xgmac-mdio to built-in References: bsc#1183015,bsc#1182595
- crypto: aesni - prevent misaligned buffers on the stack (git-fixes).
- crypto: arm64/sha - add missing module aliases (git-fixes).
- crypto: bcm - Rename struct device_private to bcm_device_private (git-fixes).
- crypto: Kconfig - CRYPTO_MANAGER_EXTRA_TESTS requires the manager (git-fixes).
- crypto: tcrypt - avoid signed overflow in byte count (git-fixes).
- Delete patches.suse/sched-Reenable-interrupts-in-do_sched_yield.patch (bsc#1183530) 
- dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574, bsc#1175995, bsc#1184485).
- drivers/misc/vmw_vmci: restrict too big queue size in qp_host_alloc_queue (git-fixes).
- drivers: video: fbcon: fix NULL dereference in fbcon_cursor() (git-fixes).
- drm/amd/display: Guard against NULL pointer deref when get_i2c_info fails (git-fixes).
- drm/amdgpu: Add check to prevent IH overflow (git-fixes).
- drm/amdgpu: check alignment on CPU page for bo map (git-fixes).
- drm/amdgpu: fix offset calculation in amdgpu_vm_bo_clear_mappings() (git-fixes).
- drm/amdgpu: fix parameter error of RREG32_PCIE() in amdgpu_regs_pcie (git-fixes).
- drm/amdkfd: Put ACPI table after using it (bsc#1152489) 
- drm/amd/powerplay: fix spelling mistake 'smu_state_memroy_block' -&gt; (bsc#1152489) 
- drm/compat: Clear bounce structures (git-fixes).
- drm/hisilicon: Fix use-after-free (git-fixes).
- drm/i915: Fix invalid access to ACPI _DSM objects (bsc#1184074).
- drm/i915: Reject 446-480MHz HDMI clock on GLK (git-fixes).
- drm/mediatek: Fix aal size config (bsc#1152489) 
- drm: meson_drv add shutdown function (git-fixes).
- drm/msm/a5xx: Remove overwriting A5XX_PC_DBG_ECO_CNTL register (git-fixes).
- drm/msm/adreno: a5xx_power: Do not apply A540 lm_setup to other GPUs (git-fixes).
- drm/msm/dsi: Correct io_start for MSM8994 (20nm PHY) (git-fixes).
- drm/msm: Fix races managing the OOB state for timestamp vs (bsc#1152489) 
- drm/msm: fix shutdown hook in case GPU components failed to bind (git-fixes).
- drm/msm: Fix use-after-free in msm_gem with carveout (bsc#1152489) 
- drm/msm: Fix WARN_ON() splat in _free_object() (bsc#1152489) 
- drm/msm/gem: Add obj-&gt;lock wrappers (bsc#1152489) 
- drm/msm: Ratelimit invalid-fence message (git-fixes).
- drm/msm: Set drvdata to NULL when msm_drm_init() fails (git-fixes).
- drm/nouveau: bail out of nouveau_channel_new if channel init fails (bsc#1152489) 
- drm/nouveau/kms: handle mDP connectors (git-fixes).
- drm/panfrost: Do not corrupt the queue mutex on open/close (bsc#1152472) 
- drm/panfrost: Fix job timeout handling (bsc#1152472) 
- drm/panfrost: Remove unused variables in panfrost_job_close() (bsc#1152472)
- drm/radeon: fix AGP dependency (git-fixes).
- drm: rcar-du: Fix crash when using LVDS1 clock for CRTC (bsc#1152489) 
- drm/sched: Cancel and flush all outstanding jobs before finish (git-fixes).
- drm/sun4i: tcon: fix inverted DCLK polarity (bsc#1152489) 
- drm/tegra: sor: Grab runtime PM reference across reset (git-fixes).
- drm/vc4: hdmi: Restore cec physical address on reconnect (bsc#1152472) 
- efi: use 32-bit alignment for efi_guid_t literals (git-fixes).
- enetc: Fix reporting of h/w packet counters (git-fixes).
- epoll: check for events when removing a timed out thread from the wait queue (git-fixes).
- ethernet: alx: fix order of calls on resume (git-fixes).
- exec: Move would_dump into flush_old_exec (git-fixes).
- exfat: add missing MODULE_ALIAS_FS() (bsc#1182989).
- exfat: add the dummy mount options to be backward compatible with staging/exfat (bsc#1182989).
- extcon: Add stubs for extcon_register_notifier_all() functions (git-fixes).
- extcon: Fix error handling in extcon_dev_register (git-fixes).
- fbdev: aty: SPARC64 requires FB_ATY_CT (git-fixes).
- firmware/efi: Fix a use after bug in efi_mem_reserve_persistent (git-fixes).
- flow_dissector: fix byteorder of dissected ICMP ID (bsc#1154353).
- fsl/fman: check dereferencing null pointer (git-fixes).
- fsl/fman: fix dereference null return value (git-fixes).
- fsl/fman: fix eth hash table allocation (git-fixes).
- fsl/fman: fix unreachable code (git-fixes).
- fsl/fman: use 32-bit unsigned integer (git-fixes).
- fuse: fix bad inode (bsc#1184211).
- fuse: fix live lock in fuse_iget() (bsc#1184211).
- fuse: verify write return (git-fixes).
- gcc-plugins: drop support for GCC &lt;= 4.7 (bcs#1181862).
- gcc-plugins: make it possible to disable CONFIG_GCC_PLUGINS again (bcs#1181862).
- gcc-plugins: simplify GCC plugin-dev capability test (bsc#1181862).
- gianfar: Account for Tx PTP timestamp in the skb headroom (git-fixes).
- gianfar: Fix TX timestamping with a stacked DSA driver (git-fixes).
- gianfar: Handle error code at MAC address change (git-fixes).
- gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP (git-fixes).
- Goodix Fingerprint device is not a modem (git-fixes).
- gpiolib: acpi: Add missing IRQF_ONESHOT (git-fixes).
- gpio: pca953x: Set IRQ type when handle Intel Galileo Gen 2 (git-fixes).
- gpio: zynq: fix reference leak in zynq_gpio functions (git-fixes).
- HID: i2c-hid: Add I2C_HID_QUIRK_NO_IRQ_AFTER_RESET for ITE8568 EC on Voyo Winpad A15 (git-fixes).
- HID: mf: add support for 0079:1846 Mayflash/Dragonrise USB Gamecube Adapter (git-fixes).
- HSI: Fix PM usage counter unbalance in ssi_hw_init (git-fixes).
- hwmon: (ina3221) Fix PM usage counter unbalance in ina3221_write_enable (git-fixes).
- i2c: rcar: faster irq code to minimize HW race condition (git-fixes).
- i2c: rcar: optimize cacheline to minimize HW race condition (git-fixes).
- i40e: Fix parameters in aq_get_phy_register() (jsc#SLE-8025).
- i40e: Fix sparse error: 'vsi-&gt;netdev' could be null (jsc#SLE-8025).
- iavf: Fix incorrect adapter get in iavf_resume (git-fixes).
- iavf: use generic power management (git-fixes).
- ibmvnic: add comments for spinlock_t definitions (bsc#1183871 ltc#192139).
- ibmvnic: always store valid MAC address (bsc#1182011 ltc#191844).
- ibmvnic: avoid multiple line dereference (bsc#1183871 ltc#192139).
- ibmvnic: fix block comments (bsc#1183871 ltc#192139).
- ibmvnic: fix braces (bsc#1183871 ltc#192139).
- ibmvnic: fix miscellaneous checks (bsc#1183871 ltc#192139).
- ibmvnic: Fix possibly uninitialized old_num_tx_queues variable warning (jsc#SLE-17268).
- ibmvnic: merge do_change_param_reset into do_reset (bsc#1183871 ltc#192139).
- ibmvnic: prefer strscpy over strlcpy (bsc#1183871 ltc#192139).
- ibmvnic: prefer 'unsigned long' over 'unsigned long int' (bsc#1183871 ltc#192139).
- ibmvnic: remove excessive irqsave (bsc#1182485 ltc#191591).
- ibmvnic: remove unnecessary rmb() inside ibmvnic_poll (bsc#1183871 ltc#192139).
- ibmvnic: remove unused spinlock_t stats_lock definition (bsc#1183871 ltc#192139).
- ibmvnic: rework to ensure SCRQ entry reads are properly ordered (bsc#1183871 ltc#192139).
- ibmvnic: simplify reset_long_term_buff function (bsc#1183023 ltc#191791).
- ibmvnic: substitute mb() with dma_wmb() for send_*crq* functions (bsc#1183023 ltc#191791).
- ice: fix memory leak if register_netdev_fails (git-fixes).
- ice: fix memory leak in ice_vsi_setup (git-fixes).
- ice: Fix state bits on LLDP mode switch (jsc#SLE-7926).
- ice: remove DCBNL_DEVRESET bit from PF state (jsc#SLE-7926).
- ice: renegotiate link after FW DCB on (jsc#SLE-8464).
- ice: report correct max number of TCs (jsc#SLE-7926).
- ice: update the number of available RSS queues (jsc#SLE-7926).
- igc: Fix igc_ptp_rx_pktstamp() (bsc#1160634).
- iio: adc: ad7949: fix wrong ADC result due to incorrect bit mask (git-fixes).
- iio:adc:qcom-spmi-vadc: add default scale to LR_MUX2_BAT_ID channel (git-fixes).
- iio: adis16400: Fix an error code in adis16400_initial_setup() (git-fixes).
- iio: gyro: mpu3050: Fix error handling in mpu3050_trigger_handler (git-fixes).
- iio: hid-sensor-humidity: Fix alignment issue of timestamp channel (git-fixes).
- iio: hid-sensor-prox: Fix scale not correct issue (git-fixes).
- iio: hid-sensor-temperature: Fix issues of timestamp channel (git-fixes).
- include/linux/sched/mm.h: use rcu_dereference in in_vfork() (git-fixes).
- Input: applespi - do not wait for responses to commands indefinitely (git-fixes).
- Input: elantech - fix protocol errors for some trackpoints in SMBus mode (git-fixes).
- Input: i8042 - add ASUS Zenbook Flip to noselftest list (git-fixes).
- Input: raydium_ts_i2c - do not send zero length (git-fixes).
- Input: xpad - add support for PowerA Enhanced Wired Controller for Xbox Series X|S (git-fixes).
- iommu/amd: Fix sleeping in atomic in increase_address_space() (bsc#1183277).
- iommu/intel: Fix memleak in intel_irq_remapping_alloc (bsc#1183278).
- iommu/qcom: add missing put_device() call in qcom_iommu_of_xlate() (bsc#1183637).
- iommu/vt-d: Add get_domain_info() helper (bsc#1183279).
- iommu/vt-d: Avoid panic if iommu init fails in tboot system (bsc#1183280).
- iommu/vt-d: Correctly check addr alignment in qi_flush_dev_iotlb_pasid() (bsc#1183281).
- iommu/vt-d: Do not use flush-queue when caching-mode is on (bsc#1183282).
- iommu/vt-d: Fix general protection fault in aux_detach_device() (bsc#1183283).
- iommu/vt-d: Fix ineffective devTLB invalidation for subdevices (bsc#1183284).
- iommu/vt-d: Fix unaligned addresses for intel_flush_svm_range_dev() (bsc#1183285).
- iommu/vt-d: Move intel_iommu info from struct intel_svm to struct intel_svm_dev (bsc#1183286).
- iommu/vt-d: Use device numa domain if RHSA is missing (bsc#1184585).
- ionic: linearize tso skb with too many frags (bsc#1167773).
- kABI: powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- kbuild: add dummy toolchains to enable all cc-option etc. in Kconfig (bcs#1181862).
- kbuild: change *FLAGS_&lt;basetarget&gt;.o to take the path relative to $(obj) (bcs#1181862).
- kbuild: dummy-tools, fix inverted tests for gcc (bcs#1181862).
- kbuild: dummy-tools, support MPROFILE_KERNEL checks for ppc (bsc#1181862).
- kbuild: Fail if gold linker is detected (bcs#1181862).
- kbuild: improve cc-option to clean up all temporary files (bsc#1178330).
- kbuild: include scripts/Makefile.* only when relevant CONFIG is enabled (bcs#1181862).
- kbuild: simplify GCC_PLUGINS enablement in dummy-tools/gcc (bcs#1181862).
- kbuild: stop filtering out $(GCC_PLUGINS_CFLAGS) from cc-option base (bcs#1181862).
- kbuild: use -S instead of -E for precise cc-option test in Kconfig (bsc#1178330).
- kconfig: introduce m32-flag and m64-flag (bcs#1181862).
- KVM: nVMX: Properly handle userspace interrupt window request (bsc#1183427).
- KVM: SVM: Clear the CR4 register on reset (bsc#1183252).
- KVM: x86: Add helpers to perform CPUID-based guest vendor check (bsc#1183445). 
- KVM: x86: Add RIP to the kvm_entry, i.e. VM-Enter, tracepoint Needed as a dependency of 0b40723a827 ('kvm: tracing: Fix unmatched kvm_entry and kvm_exit events', bsc#1182770).
- KVM: x86: Allow guests to see MSR_IA32_TSX_CTRL even if tsx=off (bsc#1183287).
- KVM: x86: do not reset microcode version on INIT or RESET (bsc#1183412).
- KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs (bsc#1183447).
- KVM: x86: list MSR_IA32_UCODE_REV as an emulated MSR (bsc#1183369).
- KVM: x86: Return -E2BIG when KVM_GET_SUPPORTED_CPUID hits max entries (bsc#1183428).
- KVM: x86: Set so called 'reserved CR3 bits in LM mask' at vCPU reset (bsc#1183288).
- libbpf: Clear map_info before each bpf_obj_get_info_by_fd (bsc#1155518).
- libbpf: Fix BTF dump of pointer-to-array-of-struct (bsc#1155518).
- libbpf: Fix INSTALL flag order (bsc#1155518).
- libbpf: Only create rx and tx XDP rings when necessary (bsc#1155518).
- libbpf: Use SOCK_CLOEXEC when opening the netlink socket (bsc#1155518).
- lib/syscall: fix syscall registers retrieval on 32-bit platforms (git-fixes).
- locking/mutex: Fix non debug version of mutex_lock_io_nested() (git-fixes).
- loop-be-paranoid-on-exit-and-prevent-new-additions-r.patch: (bsc#1171295).
- mac80211: choose first enabled channel for monitor (git-fixes).
- mac80211: fix double free in ibss_leave (git-fixes).
- mac80211: fix rate mask reset (git-fixes).
- mac80211: fix TXQ AC confusion (git-fixes).
- mdio: fix mdio-thunder.c dependency &amp; build error (git-fixes).
- media: cros-ec-cec: do not bail on device_init_wakeup failure (git-fixes).
- media: cx23885: add more quirks for reset DMA on some AMD IOMMU (git-fixes).
- media: mceusb: Fix potential out-of-bounds shift (git-fixes).
- media: mceusb: sanity check for prescaler value (git-fixes).
- media: rc: compile rc-cec.c into rc-core (git-fixes).
- media: usbtv: Fix deadlock on suspend (git-fixes).
- media: uvcvideo: Allow entities with no pads (git-fixes).
- media: v4l2-ctrls.c: fix shift-out-of-bounds in std_validate (git-fixes).
- media: v4l: vsp1: Fix bru null pointer access (git-fixes).
- media: v4l: vsp1: Fix uif null pointer access (git-fixes).
- media: vicodec: add missing v4l2_ctrl_request_hdl_put() (git-fixes).
- misc: eeprom_93xx46: Add quirk to support Microchip 93LC46B eeprom (git-fixes).
- misc: fastrpc: restrict user apps from sending kernel RPC messages (git-fixes).
- misc/pvpanic: Export module FDT device table (git-fixes).
- misc: rtsx: init of rts522a add OCP power off when no card is present (git-fixes).
- mISDN: fix crash in fritzpci (git-fixes).
- mmc: core: Fix partition switch time for eMMC (git-fixes).
- mmc: cqhci: Fix random crash when remove mmc module/card (git-fixes).
- mmc: mxs-mmc: Fix a resource leak in an error handling path in 'mxs_mmc_probe()' (git-fixes).
- mmc: sdhci-esdhc-imx: fix kernel panic when remove module (git-fixes).
- mmc: sdhci-of-dwcmshc: set SDHCI_QUIRK2_PRESET_VALUE_BROKEN (git-fixes).
- mm: hugetlbfs: fix cannot migrate the fallocated HugeTLB page (git-fixes).
- mm, numa: fix bad pmd by atomically check for pmd_trans_huge when marking page tables prot_numa (bsc#1168777).
- mount: fix mounting of detached mounts onto targets that reside on shared mounts (git-fixes).
- mt76: dma: do not report truncated frames to mac80211 (git-fixes).
- mwifiex: pcie: skip cancel_work_sync() on reset failure path (git-fixes).
- net: arc_emac: Fix memleak in arc_mdio_probe (git-fixes).
- net: atheros: switch from 'pci_' to 'dma_' API (git-fixes).
- net: b44: fix error return code in b44_init_one() (git-fixes).
- net: bonding: fix error return code of bond_neigh_init() (bsc#1154353).
- net: cdc-phonet: fix data-interface release on probe failure (git-fixes).
- net: core: introduce __netdev_notify_peers (bsc#1183871 ltc#192139).
- netdevsim: init u64 stats for 32bit hardware (git-fixes).
- net: dsa: rtl8366: Fix VLAN semantics (git-fixes).
- net: dsa: rtl8366: Fix VLAN set-up (git-fixes).
- net: dsa: rtl8366rb: Support all 4096 VLANs (git-fixes).
- net: enic: Cure the enic api locking trainwreck (git-fixes).
- net: ethernet: aquantia: Fix wrong return value (git-fixes).
- net: ethernet: cavium: octeon_mgmt: use phy_start and phy_stop (git-fixes).
- net: ethernet: ibm: ibmvnic: Fix some kernel-doc misdemeanours (bsc#1183871 ltc#192139).
- net: ethernet: ti: cpsw: fix clean up of vlan mc entries for host port (git-fixes).
- net: ethernet: ti: cpsw: fix error return code in cpsw_probe() (git-fixes).
- net: fec: Fix phy_device lookup for phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix PHY init after phy_reset_after_clk_enable() (git-fixes).
- net: fec: Fix reference count leak in fec series ops (git-fixes).
- net: gemini: Fix another missing clk_disable_unprepare() in probe (git-fixes).
- net: gemini: Fix missing free_netdev() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gianfar: Add of_node_put() before goto statement (git-fixes).
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device (git-fixes).
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup (git-fixes).
- net: hns3: Remove the left over redundant check &amp; assignment (bsc#1154353).
- net: korina: cast KSEG0 address to pointer in kfree (git-fixes).
- net: korina: fix kfree of rx/tx descriptor array (git-fixes).
- net: lantiq: Wait for the GPHY firmware to be ready (git-fixes).
- net/mlx5: Disable devlink reload for lag devices (jsc#SLE-8464).
- net/mlx5: Disable devlink reload for multi port slave device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on lag device (jsc#SLE-8464).
- net/mlx5: Disallow RoCE on multi port slave device (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation division (jsc#SLE-8464).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5: Fix PPLM register mapping (jsc#SLE-8464).
- net: mvneta: fix double free of txq-&gt;buf (git-fixes).
- net: mvneta: make tx buffer array agnostic (git-fixes).
- net: pasemi: fix error return code in pasemi_mac_open() (git-fixes).
- net: phy: broadcom: Only advertise EEE for supported modes (git-fixes).
- net: qcom/emac: add missed clk_disable_unprepare in error path of emac_clks_phase1_init (git-fixes).
- net: qualcomm: rmnet: Fix incorrect receive packet handling during cleanup (git-fixes).
- net: sched: disable TCQ_F_NOLOCK for pfifo_fast (bsc#1183405)
- netsec: restore phy power state after controller reset (bsc#1183757).
- net: spider_net: Fix the size used in a 'dma_free_coherent()' call (git-fixes).
- net: stmmac: Fix incorrect location to set real_num_rx|tx_queues (git-fixes).
- net: stmmac: removed enabling eee in EEE set callback (git-fixes).
- net: stmmac: use netif_tx_start|stop_all_queues() function (git-fixes).
- net: stmmac: Use rtnl_lock/unlock on netif_set_real_num_rx_queues() call (git-fixes).
- net: usb: ax88179_178a: fix missing stop entry in driver_info (git-fixes).
- net: usb: qmi_wwan: allow qmimux add/del with master up (git-fixes).
- net: usb: qmi_wwan: support ZTE P685M modem (git-fixes).
- net: wan/lmc: unregister device when no matching device is found (git-fixes).
- nfp: flower: fix pre_tun mask id allocation (bsc#1154353).
- nvme: allocate the keep alive request using BLK_MQ_REQ_NOWAIT (bsc#1182077).
- nvme-fabrics: fix kato initialization (bsc#1182591).
- nvme-fabrics: only reserve a single tag (bsc#1182077).
- nvme-fc: fix racing controller reset and create association (bsc#1183048).
- nvme-hwmon: Return error code when registration fails (bsc#1177326).
- nvme: merge nvme_keep_alive into nvme_keep_alive_work (bsc#1182077).
- nvme: return an error if nvme_set_queue_count() fails (bsc#1180197).
- nvmet-rdma: Fix list_del corruption on queue establishment failure (bsc#1183501).
- objtool: Fix '.cold' section suffix check for newer versions of GCC (bsc#1169514).
- objtool: Fix error handling for STD/CLD warnings (bsc#1169514).
- objtool: Fix retpoline detection in asm code (bsc#1169514).
- ovl: fix dentry leak in ovl_get_redirect (bsc#1184176).
- ovl: fix out of date comment and unreachable code (bsc#1184176).
- ovl: fix regression with re-formatted lower squashfs (bsc#1184176).
- ovl: fix unneeded call to ovl_change_flags() (bsc#1184176).
- ovl: fix value of i_ino for lower hardlink corner case (bsc#1184176).
- ovl: initialize error in ovl_copy_xattr (bsc#1184176).
- ovl: relax WARN_ON() when decoding lower directory file handle (bsc#1184176).
- PCI: Add a REBAR size quirk for Sapphire RX 5600 XT Pulse (git-fixes).
- PCI: Add function 1 DMA alias quirk for Marvell 9215 SATA controller (git-fixes).
- PCI: Align checking of syscall user config accessors (git-fixes).
- PCI: Decline to resize resources if boot config must be preserved (git-fixes).
- PCI: Fix pci_register_io_range() memory leak (git-fixes).
- PCI: mediatek: Add missing of_node_put() to fix reference leak (git-fixes).
- PCI: qcom: Use PHY_REFCLK_USE_PAD only for ipq8064 (git-fixes).
- PCI: xgene-msi: Fix race in installing chained irq handler (git-fixes).
- pinctrl: rockchip: fix restore error in resume (git-fixes).
- Platform: OLPC: Fix probe error handling (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_KBD_DOCK quirk for the Aspire Switch 10E SW3-016 (git-fixes).
- platform/x86: acer-wmi: Add ACER_CAP_SET_FUNCTION_MODE capability flag (git-fixes).
- platform/x86: acer-wmi: Add new force_caps module parameter (git-fixes).
- platform/x86: acer-wmi: Add support for SW_TABLET_MODE on Switch devices (git-fixes).
- platform/x86: acer-wmi: Cleanup accelerometer device handling (git-fixes).
- platform/x86: acer-wmi: Cleanup ACER_CAP_FOO defines (git-fixes).
- platform/x86: intel-hid: Support Lenovo ThinkPad X1 Tablet Gen 2 (git-fixes).
- platform/x86: intel-vbtn: Stop reporting SW_DOCK events (git-fixes).
- platform/x86: thinkpad_acpi: Allow the FnLock LED to change state (git-fixes).
- PM: EM: postpone creating the debugfs dir till fs_initcall (git-fixes).
- PM: runtime: Add pm_runtime_resume_and_get to deal with usage counter (bsc#1183366).
- PM: runtime: Fix ordering in pm_runtime_get_suppliers() (git-fixes).
- PM: runtime: Fix race getting/putting suppliers at probe (git-fixes).
- post.sh: Return an error when module update fails (bsc#1047233 bsc#1184388).
- powerpc/64s: Fix instruction encoding for lis in ppc_function_entry() (bsc#1065729).
- powerpc/book3s64/radix: Remove WARN_ON in destroy_context() (bsc#1183692 ltc#191963).
- powerpc/pmem: Include pmem prototypes (bsc#1113295 git-fixes).
- powerpc/pseries/mobility: handle premature return from H_JOIN (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/mobility: use struct for shared state (bsc#1181674 ltc#189159 git-fixes bsc#1183662 ltc#191922).
- powerpc/pseries/ras: Remove unused variable 'status' (bsc#1065729).
- powerpc/sstep: Check instruction validity against ISA version before emulation (bsc#1156395).
- powerpc/sstep: Fix darn emulation (bsc#1156395).
- powerpc/sstep: Fix incorrect return from analyze_instr() (bsc#1156395).
- powerpc/sstep: Fix load-store and update emulation (bsc#1156395).
- printk: fix deadlock when kernel panic (bsc#1183018).
- proc: fix lookup in /proc/net subdirectories after setns(2) (git-fixes).
- pwm: rockchip: rockchip_pwm_probe(): Remove superfluous clk_unprepare() (git-fixes).
- qlcnic: fix error return code in qlcnic_83xx_restart_hw() (git-fixes).
- qxl: Fix uninitialised struct field head.surface_id (git-fixes).
- random: fix the RNDRESEEDCRNG ioctl (git-fixes).
- RAS/CEC: Correct ce_add_elem()'s returned values (bsc#1152489).
- RDMA/hns: Disable RQ inline by default (jsc#SLE-8449).
- RDMA/hns: Fix type of sq_signal_bits (jsc#SLE-8449).
- RDMA/srp: Fix support for unpopulated and unbalanced NUMA nodes (bsc#1169709)
- regulator: bd9571mwv: Fix AVS and DVFS voltage range (git-fixes).
- Revert 'net: bonding: fix error return code of bond_neigh_init()' (bsc#1154353).
- rpadlpar: fix potential drc_name corruption in store functions (bsc#1183416 ltc#191079).
- rpm/check-for-config-changes: add -mrecord-mcount ignore Added by 3b15cdc15956 (tracing: move function tracer options to Kconfig) upstream.
- rpm/check-for-config-changes: Also ignore AS_VERSION added in 5.12.
- rpm/check-for-config-changes: comment on the list To explain what it actually is.
- rpm/check-for-config-changes: declare sed args as an array So that we can reuse it in both seds. This also introduces IGNORED_CONFIGS_RE array which can be easily extended.
- rpm/check-for-config-changes: define ignores more strictly * search for whole words, so make wildcards explicit * use ' for quoting * prepend CONFIG_ dynamically, so it need not be in the list
- rpm/check-for-config-changes: sort the ignores They are growing so to make them searchable by humans.
- rpm/kernel-binary.spec.in: Fix dependency of kernel-*-devel package (bsc#1184514) The devel package requires the kernel binary package itself for building modules externally.
- rsi: Fix TX EAPOL packet handling against iwlwifi AP (git-fixes).
- rsi: Move card interrupt handling to RX thread (git-fixes).
- rsxx: Return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/cio: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/crypto: return -EFAULT if copy_to_user() fails (git-fixes).
- s390/dasd: fix hanging IO request during DASD driver unbind (git-fixes).
- s390/qeth: fix memory leak after failed TX Buffer allocation (git-fixes).
- s390/qeth: fix notification for pending buffers during teardown (git-fixes).
- s390/qeth: improve completion of pending TX buffers (git-fixes).
- s390/qeth: schedule TX NAPI on QAOB completion (git-fixes).
- s390/vtime: fix increased steal time accounting (bsc#1183859).
- samples, bpf: Add missing munmap in xdpsock (bsc#1155518).
- samples/bpf: Fix possible hang in xdpsock with multiple threads (bsc#1155518).
- scsi: ibmvfc: Fix invalid state machine BUG_ON() (bsc#1184647 ltc#191231).
- scsi: lpfc: Change wording of invalid pci reset log message (bsc#1182574).
- scsi: lpfc: Correct function header comments related to ndlp reference counting (bsc#1182574).
- scsi: lpfc: Fix ADISC handling that never frees nodes (bsc#1182574).
- scsi: lpfc: Fix crash caused by switch reboot (bsc#1182574).
- scsi: lpfc: Fix dropped FLOGI during pt2pt discovery recovery (bsc#1182574).
- scsi: lpfc: Fix FLOGI failure due to accessing a freed node (bsc#1182574).
- scsi: lpfc: Fix incorrect dbde assignment when building target abts wqe (bsc#1182574).
- scsi: lpfc: Fix lpfc_els_retry() possible null pointer dereference (bsc#1182574).
- scsi: lpfc: Fix nodeinfo debugfs output (bsc#1182574).
- scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() (bsc#1182574).
- scsi: lpfc: Fix PLOGI ACC to be transmit after REG_LOGIN (bsc#1182574).
- scsi: lpfc: Fix pt2pt connection does not recover after LOGO (bsc#1182574).
- scsi: lpfc: Fix pt2pt state transition causing rmmod hang (bsc#1182574).
- scsi: lpfc: Fix reftag generation sizing errors (bsc#1182574).
- scsi: lpfc: Fix stale node accesses on stale RRQ request (bsc#1182574).
- scsi: lpfc: Fix status returned in lpfc_els_retry() error exit path (bsc#1182574).
- scsi: lpfc: Fix unnecessary null check in lpfc_release_scsi_buf (bsc#1182574).
- scsi: lpfc: Fix use after free in lpfc_els_free_iocb (bsc#1182574).
- scsi: lpfc: Fix vport indices in lpfc_find_vport_by_vpid() (bsc#1182574).
- scsi: lpfc: Reduce LOG_TRACE_EVENT logging for vports (bsc#1182574).
- scsi: lpfc: Update copyrights for 12.8.0.7 and 12.8.0.8 changes (bsc#1182574).
- scsi: lpfc: Update lpfc version to 12.8.0.8 (bsc#1182574).
- scsi: target: pscsi: Avoid OOM in pscsi_map_sg() (bsc#1183843).
- scsi: target: pscsi: Clean up after failure in pscsi_map_sg() (bsc#1183843).
- selftests/bpf: Mask bpf_csum_diff() return value to 16 bits in test_verifier (bsc#1155518).
- selftests/bpf: No need to drop the packet when there is no geneve opt (bsc#1155518).
- selftests/bpf: Set gopt opt_class to 0 if get tunnel opt failed (bsc#1155518).
- selinux: fix error initialization in inode_doinit_with_dentry() (git-fixes).
- selinux: Fix error return code in sel_ib_pkey_sid_slow() (git-fixes).
- selinux: fix inode_doinit_with_dentry() LABEL_INVALID error handling (git-fixes).
- smb3: add dynamic trace point to trace when credits obtained (bsc#1181507).
- smb3: fix crediting for compounding when only one request in flight (bsc#1181507).
- smb3: Fix out-of-bounds bug in SMB2_negotiate() (bsc#1183540).
- soc/fsl: qbman: fix conflicting alignment attributes (git-fixes).
- software node: Fix node registration (git-fixes).
- spi: stm32: make spurious and overrun interrupts visible (git-fixes).
- squashfs: fix inode lookup sanity checks (bsc#1183750).
- squashfs: fix xattr id and id lookup sanity checks (bsc#1183750).
- stop_machine: mark helpers __always_inline (git-fixes).
- thermal/core: Add NULL pointer check before using cooling device stats (git-fixes).
- udlfb: Fix memory leak in dlfb_usb_probe (git-fixes).
- Update bug reference for USB-audio fixes (bsc#1182552 bsc#1183598)
- USB: cdc-acm: downgrade message to debug (git-fixes).
- USB: cdc-acm: fix double free on probe failure (git-fixes).
- USB: cdc-acm: fix use-after-free after probe failure (git-fixes).
- USB: cdc-acm: untangle a circular dependency between callback and softint (git-fixes).
- USB: dwc2: Fix HPRT0.PrtSusp bit setting for HiKey 960 board (git-fixes).
- USB: dwc2: Prevent core suspend when port connection flag is 0 (git-fixes).
- USB: dwc3: gadget: Fix dep-&gt;interval for fullspeed interrupt (git-fixes).
- USB: dwc3: gadget: Fix setting of DEPCFG.bInterval_m1 (git-fixes).
- USB: dwc3: qcom: Add missing DWC3 OF node refcount decrement (git-fixes).
- USB: dwc3: qcom: Honor wakeup enabled/disabled state (git-fixes).
- USB: gadget: configfs: Fix KASAN use-after-free (git-fixes).
- USB: gadget: f_uac1: stop playback on function disable (git-fixes).
- USB: gadget: f_uac2: always increase endpoint max_packet_size by one audio slot (git-fixes).
- USB: gadget: udc: amd5536udc_pci fix null-ptr-dereference (git-fixes).
- USB: gadget: u_ether: Fix a configfs return code (git-fixes).
- USBip: Fix incorrect double assignment to udc-&gt;ud.tcp_rx (git-fixes).
- USBip: fix stub_dev to check for stream socket (git-fixes).
- USBip: fix stub_dev usbip_sockfd_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd attach_store() races leading to gpf (git-fixes).
- USBip: fix vhci_hcd to check for stream socket (git-fixes).
- USBip: fix vudc to check for stream socket (git-fixes).
- USBip: fix vudc usbip_sockfd_store races leading to gpf (git-fixes).
- USBip: tools: fix build error for multiple definition (git-fixes).
- USBip: vhci_hcd fix shift out-of-bounds in vhci_hub_control() (git-fixes).
- USB: musb: Fix suspend with devices connected for a64 (git-fixes).
- USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem (git-fixes).
- USB: renesas_usbhs: Clear PIPECFG for re-enabling pipe with other EPNUM (git-fixes).
- USB: replace hardcode maximum usb string length by definition (git-fixes).
- USB: serial: ch341: add new Product ID (git-fixes).
- USB: serial: cp210x: add ID for Acuity Brands nLight Air Adapter (git-fixes).
- USB: serial: cp210x: add some more GE USB IDs (git-fixes).
- USB: serial: ftdi_sio: fix FTX sub-integer prescaler (git-fixes).
- USB: serial: io_edgeport: fix memory leak in edge_startup (git-fixes).
- USB-storage: Add quirk to defeat Kindle's automatic unload (git-fixes).
- USB: typec: tcpm: Invoke power_supply_changed for tcpm-source-psy- (git-fixes).
- USB: usblp: fix a hang in poll() if disconnected (git-fixes).
- USB: xhci: do not perform Soft Retry for some xHCI hosts (git-fixes).
- USB: xhci: Fix ASMedia ASM1042A and ASM3242 DMA addressing (git-fixes).
- USB: xhci-mtk: fix broken streams issue on 0.96 xHCI (git-fixes).
- use __netdev_notify_peers in ibmvnic (bsc#1183871 ltc#192139).
- video: fbdev: acornfb: remove free_unused_pages() (bsc#1152489)
- video: hyperv_fb: Fix a double free in hvfb_probe (git-fixes).
- VMCI: Use set_page_dirty_lock() when unregistering guest memory (git-fixes).
- vt/consolemap: do font sum unsigned (git-fixes).
- watchdog: mei_wdt: request stop on unregister (git-fixes).
- wireguard: device: do not generate ICMP for non-IP packets (git-fixes).
- wireguard: kconfig: use arm chacha even with no neon (git-fixes).
- wireguard: selftests: test multiple parallel streams (git-fixes).
- wlcore: Fix command execute failure 19 for wl12xx (git-fixes).
- x86/fsgsbase/64: Fix NULL deref in 86_fsgsbase_read_task (bsc#1152489).
- x86: Introduce TS_COMPAT_RESTART to fix get_nr_restart_syscall() (bsc#1152489).
- x86/ioapic: Ignore IRQ2 again (bsc#1152489).
- x86/mem_encrypt: Correct physical address calculation in __set_clr_pte_enc() (bsc#1152489).
- xen/events: avoid handling the same event on two cpus at the same time (git-fixes).
- xen/events: do not unmask an event channel when an eoi is pending (git-fixes).
- xen/events: fix setting irq affinity (bsc#1184583).
- xen/events: reset affinity of 2-level event when tearing it down (git-fixes).
- Xen/gnttab: handle p2m update errors on a per-slot basis (bsc#1183022 XSA-367).
- xen-netback: respect gnttab_map_refs()'s return value (bsc#1183022 XSA-367).
- xfs: group quota should return EDQUOT when prj quota enabled (bsc#1180980).
- xhci: Fix repeated xhci wake after suspend due to uncleared internal wake state (git-fixes).
- xhci: Improve detection of device initiated wake signal (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-16"/>
	<updated date="2021-04-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1047233">SUSE bug 1047233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156256">SUSE bug 1156256</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159280">SUSE bug 1159280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160634">SUSE bug 1160634</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167574">SUSE bug 1167574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168777">SUSE bug 1168777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169709">SUSE bug 1169709</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1171295">SUSE bug 1171295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173485">SUSE bug 1173485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175995">SUSE bug 1175995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178163">SUSE bug 1178163</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178181">SUSE bug 1178181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178330">SUSE bug 1178330</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179454">SUSE bug 1179454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180197">SUSE bug 1180197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180980">SUSE bug 1180980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181383">SUSE bug 1181383</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181507">SUSE bug 1181507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181862">SUSE bug 1181862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182011">SUSE bug 1182011</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182077">SUSE bug 1182077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182552">SUSE bug 1182552</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182574">SUSE bug 1182574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182591">SUSE bug 1182591</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182595">SUSE bug 1182595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182715">SUSE bug 1182715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182716">SUSE bug 1182716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182717">SUSE bug 1182717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182989">SUSE bug 1182989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183015">SUSE bug 1183015</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183018">SUSE bug 1183018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183022">SUSE bug 1183022</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183023">SUSE bug 1183023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183048">SUSE bug 1183048</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183252">SUSE bug 1183252</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183277">SUSE bug 1183277</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183278">SUSE bug 1183278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183279">SUSE bug 1183279</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183280">SUSE bug 1183280</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183281">SUSE bug 1183281</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183282">SUSE bug 1183282</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183283">SUSE bug 1183283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183284">SUSE bug 1183284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183285">SUSE bug 1183285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183286">SUSE bug 1183286</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183287">SUSE bug 1183287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183288">SUSE bug 1183288</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183366">SUSE bug 1183366</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183369">SUSE bug 1183369</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183386">SUSE bug 1183386</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183405">SUSE bug 1183405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183412">SUSE bug 1183412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183416">SUSE bug 1183416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183427">SUSE bug 1183427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183428">SUSE bug 1183428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183445">SUSE bug 1183445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183447">SUSE bug 1183447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183501">SUSE bug 1183501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183509">SUSE bug 1183509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183530">SUSE bug 1183530</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183534">SUSE bug 1183534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183540">SUSE bug 1183540</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183593">SUSE bug 1183593</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183596">SUSE bug 1183596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183598">SUSE bug 1183598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183637">SUSE bug 1183637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183646">SUSE bug 1183646</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183662">SUSE bug 1183662</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183686">SUSE bug 1183686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183692">SUSE bug 1183692</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183696">SUSE bug 1183696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183750">SUSE bug 1183750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183757">SUSE bug 1183757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183775">SUSE bug 1183775</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183843">SUSE bug 1183843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183859">SUSE bug 1183859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184074">SUSE bug 1184074</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184120">SUSE bug 1184120</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184167">SUSE bug 1184167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184168">SUSE bug 1184168</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184170">SUSE bug 1184170</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184176">SUSE bug 1184176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184192">SUSE bug 1184192</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184193">SUSE bug 1184193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184194">SUSE bug 1184194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184196">SUSE bug 1184196</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184198">SUSE bug 1184198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184211">SUSE bug 1184211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184217">SUSE bug 1184217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184218">SUSE bug 1184218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184219">SUSE bug 1184219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184220">SUSE bug 1184220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184224">SUSE bug 1184224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184388">SUSE bug 1184388</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184391">SUSE bug 1184391</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184393">SUSE bug 1184393</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184485">SUSE bug 1184485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184509">SUSE bug 1184509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184511">SUSE bug 1184511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184512">SUSE bug 1184512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184583">SUSE bug 1184583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184585">SUSE bug 1184585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184647">SUSE bug 1184647</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-18814/">CVE-2019-18814</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2019-19769/">CVE-2019-19769</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-25670/">CVE-2020-25670</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25671/">CVE-2020-25671</cve>
	<cve impact="important" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25672/">CVE-2020-25672</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25673/">CVE-2020-25673</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-27170/">CVE-2020-27170</cve>
	<cve impact="moderate" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-27171/">CVE-2020-27171</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27815/">CVE-2020-27815</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-35519/">CVE-2020-35519</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36310/">CVE-2020-36310</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36311/">CVE-2020-36311</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36312/">CVE-2020-36312</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36322/">CVE-2020-36322</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27363/">CVE-2021-27363</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-27364/">CVE-2021-27364</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-27365/">CVE-2021-27365</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28038/">CVE-2021-28038</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28375/">CVE-2021-28375</cve>
	<cve impact="important" cvss3="8/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28660/">CVE-2021-28660</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28688/">CVE-2021-28688</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28950/">CVE-2021-28950</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28964/">CVE-2021-28964</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-28971/">CVE-2021-28971</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-28972/">CVE-2021-28972</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29154/">CVE-2021-29154</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29264/">CVE-2021-29264</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29265/">CVE-2021-29265</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29647/">CVE-2021-29647</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-30002/">CVE-2021-30002</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-3428/">CVE-2021-3428</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3444/">CVE-2021-3444</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3483/">CVE-2021-3483</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509382" comment="kernel-default-extra-5.3.18-24.61.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509383" comment="kernel-preempt-extra-5.3.18-24.61.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111963" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1184960" ref_url="https://bugzilla.suse.com/1184960" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23961" ref_url="https://www.suse.com/security/cve/CVE-2021-23961/" source="CVE"/>
		<reference ref_id="CVE-2021-23994" ref_url="https://www.suse.com/security/cve/CVE-2021-23994/" source="CVE"/>
		<reference ref_id="CVE-2021-23995" ref_url="https://www.suse.com/security/cve/CVE-2021-23995/" source="CVE"/>
		<reference ref_id="CVE-2021-23998" ref_url="https://www.suse.com/security/cve/CVE-2021-23998/" source="CVE"/>
		<reference ref_id="CVE-2021-23999" ref_url="https://www.suse.com/security/cve/CVE-2021-23999/" source="CVE"/>
		<reference ref_id="CVE-2021-24002" ref_url="https://www.suse.com/security/cve/CVE-2021-24002/" source="CVE"/>
		<reference ref_id="CVE-2021-29945" ref_url="https://www.suse.com/security/cve/CVE-2021-29945/" source="CVE"/>
		<reference ref_id="CVE-2021-29946" ref_url="https://www.suse.com/security/cve/CVE-2021-29946/" source="CVE"/>
		<reference ref_id="CVE-2021-29948" ref_url="https://www.suse.com/security/cve/CVE-2021-29948/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-April/008698.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Firefox was updated to 78.10.0 ESR (bsc#1184960)
  * CVE-2021-23994: Out of bound write due to lazy initialization
  * CVE-2021-23995: Use-after-free in Responsive Design Mode
  * CVE-2021-23998: Secure Lock icon could have been spoofed
  * CVE-2021-23961: More internal network hosts could have been probed by a malicious webpage
  * CVE-2021-23999: Blob URLs may have been granted additional privileges
  * CVE-2021-24002: Arbitrary FTP command execution on FTP servers using an encoded URL
  * CVE-2021-29945: Incorrect size computation in WebAssembly JIT could lead to null-reads
  * CVE-2021-29946: Port blocking could be bypassed	  
  * CVE-2021-29948: Race condition when reading from disk while verifying signatures
		</description>
<advisory from="security@suse.de">
	<issued date="2021-04-29"/>
	<updated date="2021-04-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1184960">SUSE bug 1184960</bugzilla>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23961/">CVE-2021-23961</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23994/">CVE-2021-23994</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23995/">CVE-2021-23995</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23998/">CVE-2021-23998</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23999/">CVE-2021-23999</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-24002/">CVE-2021-24002</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29945/">CVE-2021-29945</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29946/">CVE-2021-29946</cve>
	<cve impact="important" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-29948/">CVE-2021-29948</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509384" comment="MozillaThunderbird-78.10.0-8.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509385" comment="MozillaThunderbird-translations-common-78.10.0-8.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509386" comment="MozillaThunderbird-translations-other-78.10.0-8.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111964" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1043990" ref_url="https://bugzilla.suse.com/1043990" source="BUGZILLA"/>
		<reference ref_id="1055117" ref_url="https://bugzilla.suse.com/1055117" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1167260" ref_url="https://bugzilla.suse.com/1167260" source="BUGZILLA"/>
		<reference ref_id="1168838" ref_url="https://bugzilla.suse.com/1168838" source="BUGZILLA"/>
		<reference ref_id="1174416" ref_url="https://bugzilla.suse.com/1174416" source="BUGZILLA"/>
		<reference ref_id="1174426" ref_url="https://bugzilla.suse.com/1174426" source="BUGZILLA"/>
		<reference ref_id="1178089" ref_url="https://bugzilla.suse.com/1178089" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1182613" ref_url="https://bugzilla.suse.com/1182613" source="BUGZILLA"/>
		<reference ref_id="1183063" ref_url="https://bugzilla.suse.com/1183063" source="BUGZILLA"/>
		<reference ref_id="1183203" ref_url="https://bugzilla.suse.com/1183203" source="BUGZILLA"/>
		<reference ref_id="1183289" ref_url="https://bugzilla.suse.com/1183289" source="BUGZILLA"/>
		<reference ref_id="1184208" ref_url="https://bugzilla.suse.com/1184208" source="BUGZILLA"/>
		<reference ref_id="1184209" ref_url="https://bugzilla.suse.com/1184209" source="BUGZILLA"/>
		<reference ref_id="1184436" ref_url="https://bugzilla.suse.com/1184436" source="BUGZILLA"/>
		<reference ref_id="1184514" ref_url="https://bugzilla.suse.com/1184514" source="BUGZILLA"/>
		<reference ref_id="1184650" ref_url="https://bugzilla.suse.com/1184650" source="BUGZILLA"/>
		<reference ref_id="1184724" ref_url="https://bugzilla.suse.com/1184724" source="BUGZILLA"/>
		<reference ref_id="1184728" ref_url="https://bugzilla.suse.com/1184728" source="BUGZILLA"/>
		<reference ref_id="1184730" ref_url="https://bugzilla.suse.com/1184730" source="BUGZILLA"/>
		<reference ref_id="1184731" ref_url="https://bugzilla.suse.com/1184731" source="BUGZILLA"/>
		<reference ref_id="1184736" ref_url="https://bugzilla.suse.com/1184736" source="BUGZILLA"/>
		<reference ref_id="1184737" ref_url="https://bugzilla.suse.com/1184737" source="BUGZILLA"/>
		<reference ref_id="1184738" ref_url="https://bugzilla.suse.com/1184738" source="BUGZILLA"/>
		<reference ref_id="1184740" ref_url="https://bugzilla.suse.com/1184740" source="BUGZILLA"/>
		<reference ref_id="1184741" ref_url="https://bugzilla.suse.com/1184741" source="BUGZILLA"/>
		<reference ref_id="1184742" ref_url="https://bugzilla.suse.com/1184742" source="BUGZILLA"/>
		<reference ref_id="1184760" ref_url="https://bugzilla.suse.com/1184760" source="BUGZILLA"/>
		<reference ref_id="1184811" ref_url="https://bugzilla.suse.com/1184811" source="BUGZILLA"/>
		<reference ref_id="1184893" ref_url="https://bugzilla.suse.com/1184893" source="BUGZILLA"/>
		<reference ref_id="1184934" ref_url="https://bugzilla.suse.com/1184934" source="BUGZILLA"/>
		<reference ref_id="1184942" ref_url="https://bugzilla.suse.com/1184942" source="BUGZILLA"/>
		<reference ref_id="1184957" ref_url="https://bugzilla.suse.com/1184957" source="BUGZILLA"/>
		<reference ref_id="1184969" ref_url="https://bugzilla.suse.com/1184969" source="BUGZILLA"/>
		<reference ref_id="1184984" ref_url="https://bugzilla.suse.com/1184984" source="BUGZILLA"/>
		<reference ref_id="1185041" ref_url="https://bugzilla.suse.com/1185041" source="BUGZILLA"/>
		<reference ref_id="1185113" ref_url="https://bugzilla.suse.com/1185113" source="BUGZILLA"/>
		<reference ref_id="1185233" ref_url="https://bugzilla.suse.com/1185233" source="BUGZILLA"/>
		<reference ref_id="1185244" ref_url="https://bugzilla.suse.com/1185244" source="BUGZILLA"/>
		<reference ref_id="1185269" ref_url="https://bugzilla.suse.com/1185269" source="BUGZILLA"/>
		<reference ref_id="1185365" ref_url="https://bugzilla.suse.com/1185365" source="BUGZILLA"/>
		<reference ref_id="1185454" ref_url="https://bugzilla.suse.com/1185454" source="BUGZILLA"/>
		<reference ref_id="1185472" ref_url="https://bugzilla.suse.com/1185472" source="BUGZILLA"/>
		<reference ref_id="1185491" ref_url="https://bugzilla.suse.com/1185491" source="BUGZILLA"/>
		<reference ref_id="1185549" ref_url="https://bugzilla.suse.com/1185549" source="BUGZILLA"/>
		<reference ref_id="1185586" ref_url="https://bugzilla.suse.com/1185586" source="BUGZILLA"/>
		<reference ref_id="1185587" ref_url="https://bugzilla.suse.com/1185587" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29155" ref_url="https://www.suse.com/security/cve/CVE-2021-29155/" source="CVE"/>
		<reference ref_id="CVE-2021-29650" ref_url="https://www.suse.com/security/cve/CVE-2021-29650/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-May/008767.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-29650: Fixed an issue with the netfilter subsystem that allowed attackers to cause a denial of service (panic) because net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h lack a full memory barrier upon the assignment of a new table value (bnc#1184208).
- CVE-2021-29155: Fixed an issue that was discovered in kernel/bpf/verifier.c that performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory. Specifically, for sequences of pointer arithmetic operations, the pointer modification performed by the first operation was not correctly accounted for when restricting subsequent operations (bnc#1184942).

The following non-security bugs were fixed:

- ACPI: CPPC: Replace cppc_attr with kobj_attribute (git-fixes).
- ALSA: core: remove redundant spin_lock pair in snd_card_disconnect (git-fixes).
- ALSA: emu8000: Fix a use after free in snd_emu8000_create_mixer (git-fixes).
- ALSA: hda/cirrus: Add error handling into CS8409 I2C functions (git-fixes).
- ALSA: hda/cirrus: Add Headphone and Headset MIC Volume Control (git-fixes).
- ALSA: hda/cirrus: Add jack detect interrupt support from CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Add support for CS8409 HDA bridge and CS42L42 companion codec (git-fixes).
- ALSA: hda/cirrus: Cleanup patch_cirrus.c code (git-fixes).
- ALSA: hda/cirrus: Fix CS42L42 Headset Mic volume control name (git-fixes).
- ALSA: hda/cirrus: Make CS8409 driver more generic by using fixups (git-fixes).
- ALSA: hda/cirrus: Set Initial DMIC volume for Bullseye to -26 dB (git-fixes).
- ALSA: hda/cirrus: Use CS8409 filter to fix abnormal sounds on Bullseye (git-fixes).
- ALSA: hda/realtek: Add quirk for Intel Clevo PCx0Dx (git-fixes).
- ALSA: hda/realtek: fix mic boost on Intel NUC 8 (git-fixes).
- ALSA: hda/realtek: fix static noise on ALC285 Lenovo laptops (git-fixes).
- ALSA: hda/realtek: GA503 use same quirks as GA401 (git-fixes).
- ALSA: hda/realtek - Headset Mic issue on HP platform (git-fixes).
- ALSA: hda/realtek: Remove redundant entry for ALC861 Haier/Uniwill devices (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 ASUS quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Dell quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 HP quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Lenovo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC269 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC662 quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Acer quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Clevo quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order ALC882 Sony quirk table entries (git-fixes).
- ALSA: hda/realtek: Re-order remaining ALC269 quirk table entries (git-fixes).
- ALSA: sb: Fix two use after free in snd_sb_qsound_build (git-fixes).
- ALSA: usb-audio: Add DJM450 to Pioneer format quirk (git-fixes).
- ALSA: usb-audio: Add error checks for usb_driver_claim_interface() calls (git-fixes).
- ALSA: usb-audio: Add MIDI quirk for Vox ToneLab EX (git-fixes).
- ALSA: usb-audio: Configure Pioneer DJM-850 samplerate (git-fixes).
- ALSA: usb-audio: DJM-750: ensure format is set (git-fixes).
- ALSA: usb-audio: Explicitly set up the clock selector (git-fixes).
- ALSA: usb-audio: Fix implicit sync clearance at stopping stream (git-fixes).
- ALSA: usb-audio: Fix Pioneer DJM devices URB_CONTROL request direction to set samplerate (git-fixes).
- ALSA: usb: midi: do not return -ENOMEM when usb_urb_ep_type_check fails (git-fixes).
- arm: dts: add imx7d pcf2127 fix to blacklist
- ASoC: ak5558: correct reset polarity (git-fixes).
- ASoC: ak5558: Fix s/show/slow/ typo (git-fixes).
- ASoC: Intel: kbl_da7219_max98927: Fix kabylake_ssp_fixup function (git-fixes).
- ASoC: samsung: tm2_wm5110: check of of_parse return value (git-fixes).
- ASoC: simple-card: fix possible uninitialized single_cpu local variable (git-fixes).
- ASoC: SOF: Intel: HDA: fix core status verification (git-fixes).
- ASoC: SOF: Intel: hda: remove unnecessary parentheses (git-fixes).
- ata: libahci_platform: fix IRQ check (git-fixes).
- ath10k: Fix ath10k_wmi_tlv_op_pull_peer_stats_info() unlock without lock (git-fixes).
- ath9k: Fix error check in ath9k_hw_read_revisions() for PCI devices (git-fixes).
- backlight: journada720: Fix Wmisleading-indentation warning (git-fixes).
- blkcg: fix memleak for iolatency (git-fixes).
- block, bfq: set next_rq to waker_bfqq-&gt;next_rq in waker injection (bsc#1168838).
- block: recalculate segment count for multi-segment discards correctly (bsc#1184724).
- block: rsxx: select CONFIG_CRC32 (git-fixes).
- bluetooth: eliminate the potential race condition when removing the HCI controller (git-fixes).
- bnxt_en: reverse order of TX disable and carrier off (git-fixes).
- bsg: free the request before return error code (git-fixes).
- btrfs: fix qgroup data rsv leak caused by falloc failure (bsc#1185549).
- btrfs: fix race between swap file activation and snapshot creation (bsc#1185587).
- btrfs: fix race between writes to swap files and scrub (bsc#1185586).
- btrfs: track qgroup released data in own variable in insert_prealloc_file_extent (bsc#1185549).
- bus: qcom: Put child node before return (git-fixes).
- cfg80211: remove WARN_ON() in cfg80211_sme_connect (git-fixes).
- clk: exynos7: Mark aclk_fsys1_200 as critical (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix switching CPU freq from 250 Mhz to 1 GHz (git-fixes).
- clk: mvebu: armada-37xx-periph: Fix workaround for switching from L1 to L0 (git-fixes).
- clk: mvebu: armada-37xx-periph: remove .set_parent method for CPU PM clock (git-fixes).
- clk: qcom: a53-pll: Add missing MODULE_DEVICE_TABLE (git-fixes).
- clk: uniphier: Fix potential infinite loop (git-fixes).
- clk: zynqmp: move zynqmp_pll_set_mode out of round_rate callback (git-fixes).
- coresight: etm4x: Fix issues on trcseqevr access (git-fixes).
- coresight: etm4x: Fix save and restore of TRCVMIDCCTLR1 register (git-fixes).
- coresight: tmc-etr: Fix barrier packet insertion for perf buffer (git-fixes).
- cpufreq: armada-37xx: Fix determining base CPU frequency (git-fixes).
- cpufreq: armada-37xx: Fix driver cleanup when registration failed (git-fixes).
- cpufreq: armada-37xx: Fix setting TBG parent for load levels (git-fixes).
- cpufreq: armada-37xx: Fix the AVS value for load L1 (git-fixes).
- cpufreq: Kconfig: fix documentation links (git-fixes).
- crypto: arm/curve25519 - Move '.fpu' after '.arch' (git-fixes).
- crypto: rng - fix crypto_rng_reset() refcounting when !CRYPTO_STATS (git-fixes).
- cxgb4: avoid collecting SGE_QBASE regs during traffic (git-fixes).
- cxgb4/chtls/cxgbit: Keeping the max ofld immediate data size same in cxgb4 and ulds (git-fixes).
- dmaengine: dw: Make it dependent to HAS_IOMEM (git-fixes).
- dm: eliminate potential source of excessive kernel log noise (git-fixes).
- dm era: Fix bitset memory leaks (git-fixes).
- dm era: only resize metadata in preresume (git-fixes).
- dm era: Recover committed writeset after crash (git-fixes).
- dm era: Reinitialize bitset cache before digesting a new writeset (git-fixes).
- dm era: Use correct value size in equality function of writeset tree (git-fixes).
- dm era: Verify the data block size hasn't changed (git-fixes).
- dm: fix bug with RCU locking in dm_blk_report_zones (git-fixes).
- dm integrity: fix error reporting in bitmap mode after creation (git-fixes).
- dm ioctl: fix error return code in target_message (git-fixes).
- dm mpath: fix racey management of PG initialization (git-fixes).
- dm raid: fix discard limits for raid1 (git-fixes).
- dm: remove invalid sparse __acquires and __releases annotations (git-fixes).
- dm writecache: fix the maximum number of arguments (git-fixes).
- dm writecache: handle DAX to partitions on persistent memory correctly (git-fixes).
- dm writecache: remove BUG() and fail gracefully instead (git-fixes).
- dm zoned: select CONFIG_CRC32 (git-fixes).
- dpaa_eth: copy timestamp fields to new skb in A-050385 workaround (git-fixes).
- dpaa_eth: fix the RX headroom size alignment (git-fixes).
- dpaa_eth: Remove unnecessary boolean expression in dpaa_get_headroom (git-fixes).
- dpaa_eth: Use random MAC address when none is given (bsc#1184811).
- drivers: net: xgene: Fix the order of the arguments of 'alloc_etherdev_mqs()' (git-fixes).
- drm/amdkfd: fix build error with AMD_IOMMU_V2=m (git-fixes).
- drm/ast: Add 25MHz refclk support (bsc#1174416).
- drm/ast: Add support for 1152x864 mode (bsc#1174416).
- drm/ast: Add support for AIP200 (bsc#1174416).
- drm/ast: AST2500 fixups (bsc#1174416).
- drm/ast: Correct mode table for AST2500 precatch (bsc#1174416).
- drm/ast: Disable screen on register init (bsc#1174416).
- drm/ast: Disable VGA decoding while driver is active (bsc#1174416).
- drm/ast: drm/ast: Fix boot address for AST2500 (bsc#1174416).
- drm/ast: Fix P2A config detection (bsc#1174416).
- drm/ast: Fix register access in non-P2A mode for DP501 (bsc#1174416).
- drm/ast: Keep MISC fields when enabling VGA (bsc#1174416).
- drm/i915/gvt: Fix error code in intel_gvt_init_device() (git-fixes).
- drm/imx: imx-ldb: fix out of bounds array access warning (git-fixes).
- drm/msm: Fix a5xx/a6xx timestamps (git-fixes).
- drm/omap: fix misleading indentation in pixinc() (git-fixes).
- drm/radeon: fix copy of uninitialized variable back to userspace (git-fixes).
- drm/tegra: dc: Do not set PLL clock to 0Hz (git-fixes).
- e1000e: add rtnl_lock() to e1000_reset_task (git-fixes).
- e1000e: Fix duplicate include guard (git-fixes).
- e1000e: Fix error handling in e1000_set_d0_lplu_state_82571 (git-fixes).
- enetc: Let the hardware auto-advance the taprio base-time of 0 (git-fixes).
- enetc: Workaround for MDIO register access issue (git-fixes).
- ethernet/netronome/nfp: Fix a use after free in nfp_bpf_ctrl_msg_rx (git-fixes).
- ext4: do not try to set xattr into ea_inode if value is empty (bsc#1184730).
- ext4: find old entry again if failed to rename whiteout (bsc#1184742).
- ext4: fix potential error in ext4_do_update_inode (bsc#1184731).
- ext4: fix potential htree index checksum corruption (bsc#1184728).
- firmware: qcom-scm: Fix QCOM_SCM configuration (git-fixes).
- fnic: use scsi_host_busy_iter() to traverse commands (bsc#1179851).
- fotg210-udc: Complete OUT requests on short packets (git-fixes).
- fotg210-udc: Do not DMA more than the buffer can take (git-fixes).
- fotg210-udc: Fix DMA on EP0 for length &gt; max packet size (git-fixes).
- fotg210-udc: Fix EP0 IN requests bigger than two packets (git-fixes).
- fotg210-udc: Mask GRP2 interrupts we do not handle (git-fixes).
- fotg210-udc: Remove a dubious condition leading to fotg210_done (git-fixes).
- fs: direct-io: fix missing sdio-&gt;boundary (bsc#1184736).
- fs/jfs: fix potential integer overflow on shift of a int (bsc#1184741).
- fsl/fman: reuse set_mac_address() in dtsec init() (bsc#1184811).
- fsl/fman: tolerate missing MAC address in device tree (bsc#1184811).
- gpio: omap: Save and restore sysconfig (git-fixes).
- gpio: sysfs: Obey valid_mask (git-fixes).
- HID: alps: fix error return code in alps_input_configured() (git-fixes).
- HID: google: add don USB id (git-fixes).
- HID: plantronics: Workaround for double volume key presses (git-fixes).
- HID: wacom: Assign boolean values to a bool variable (git-fixes).
- HID: wacom: set EV_KEY and EV_ABS only for non-HID_GENERIC type of devices (git-fixes).
- i2c: cadence: add IRQ check (git-fixes).
- i2c: emev2: add IRQ check (git-fixes).
- i2c: img-scb: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: jz4780: add IRQ check (git-fixes).
- i2c: omap: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i2c: sh7760: add IRQ check (git-fixes).
- i2c: sh7760: fix IRQ error path (git-fixes).
- i2c: sprd: fix reference leak when pm_runtime_get_sync fails (git-fixes).
- i40e: Added Asym_Pause to supported link modes (git-fixes).
- i40e: Add zero-initialization of AQ command structures (git-fixes).
- i40e: Fix addition of RX filters after enabling FW LLDP agent (git-fixes).
- i40e: Fix add TC filter for IPv6 (git-fixes).
- i40e: Fix display statistics for veb_tc (git-fixes).
- i40e: Fix endianness conversions (git-fixes).
- i40e: Fix flow for IPv6 next header (extension header) (git-fixes).
- i40e: Fix kernel oops when i40e driver removes VF's (git-fixes).
- i40e: Fix overwriting flow control settings during driver loading (git-fixes).
- i40e: Fix sparse errors in i40e_txrx.c (git-fixes).
- i40e: Fix sparse warning: missing error code 'err' (git-fixes).
- i40e: fix the panic when running bpf in xdpdrv mode (git-fixes).
- ibmvnic: avoid calling napi_disable() twice (bsc#1065729).
- ibmvnic: clean up the remaining debugfs data structures (bsc#1065729).
- ibmvnic: correctly use dev_consume/free_skb_irq (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290 git-fixes).
- ibmvnic: improve failover sysfs entry (bsc#1043990 ltc#155681 git-fixes).
- ibmvnic: print adapter state as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: print reset reason as a string (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: queue reset work in system_long_wq (bsc#1152457 ltc#174432 git-fixes).
- ibmvnic: remove duplicate napi_schedule call in do_reset function (bsc#1065729).
- ibmvnic: remove duplicate napi_schedule call in open function (bsc#1065729).
- ice: Account for port VLAN in VF max packet size calculation (git-fixes).
- ice: Cleanup fltr list in case of allocation issues (git-fixes).
- ice: Fix for dereference of NULL pointer (git-fixes).
- ice: Increase control queue timeout (git-fixes).
- ice: prevent ice_open and ice_stop during reset (git-fixes).
- igb: check timestamp validity (git-fixes).
- igb: Fix duplicate include guard (git-fixes).
- igc: Fix Pause Frame Advertising (git-fixes).
- igc: Fix Supported Pause Frame Link Setting (git-fixes).
- igc: reinit_locked() should be called with rtnl_lock (git-fixes).
- iio:accel:adis16201: Fix wrong axis assignment that prevents loading (git-fixes).
- ima: Free IMA measurement buffer after kexec syscall (git-fixes).
- Input: i8042 - fix Pegatron C15B ID entry (git-fixes).
- Input: nspire-keypad - enable interrupts only when opened (git-fixes).
- Input: s6sy761 - fix coordinate read bit shift (git-fixes).
- interconnect: core: fix error return code of icc_link_destroy() (git-fixes).
- iopoll: introduce read_poll_timeout macro (git-fixes).
- ipw2x00: potential buffer overflow in libipw_wx_set_encodeext() (git-fixes).
- irqchip: Add support for Layerscape external interrupt lines (bsc#1185233).
- irqchip/ls-extirq: add IRQCHIP_SKIP_SET_WAKE to the irqchip flags (bsc#1185233).
- irqchip/ls-extirq: Add LS1043A, LS1088A external interrupt support (bsc#1185233).
- isofs: release buffer head before return (bsc#1182613).
- ixgbe: fail to create xfrm offload of IPsec tunnel mode SA (git-fixes).
- jffs2: fix use after free in jffs2_sum_write_data() (bsc#1184740).
- kABI: cover up change in struct kvm_arch (bsc#1184969).
- kABI: Fix kABI caused by fixes for bsc#1174426 (bsc#1174426).
- kABI: powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- kernel/smp: make csdlock timeout depend on boot parameter (bsc#1180846). 
- KVM: kvmclock: Fix vCPUs &gt; 64 can't be online/hotpluged (bsc#1152489).
- KVM: PPC: Book3S HV P9: Restore host CTRL SPR after guest exit (bsc#1156395).
- KVM: PPC: Make the VMX instruction emulation routines static (bsc#1156395).
- libnvdimm/label: Return -ENXIO for no slot in __blk_label_update (bsc#1185269).
- libnvdimm/namespace: Fix reaping of invalidated block-window-namespace labels (bsc#1185269).
- libnvdimm/region: Fix nvdimm_has_flush() to handle ND_REGION_ASYNC (bsc#1184969 git-fixes).
- libnvdimm/security: ensure sysfs poll thread woke up and fetch updated attr (git-fixes).
- liquidio: Fix unintented sign extension of a left shift of a u16 (git-fixes).
- locking/qrwlock: Fix ordering in queued_write_lock_slowpath() (bsc#1185041).
- mac80211: bail out if cipher schemes are invalid (git-fixes).
- mac80211: clear sta-&gt;fast_rx when STA removed from 4-addr VLAN (git-fixes).
- macvlan: macvlan_count_rx() needs to be aware of preemption (git-fixes).
- media: dvbdev: Fix memory leak in dvb_media_device_free() (git-fixes).
- media: m88rs6000t: avoid potential out-of-bounds reads on arrays (git-fixes).
- media: mantis: remove orphan mantis_core.c (git-fixes).
- media: omap4iss: return error code when omap4iss_get() failed (git-fixes).
- media: platform: sunxi: sun6i-csi: fix error return code of sun6i_video_start_streaming() (git-fixes).
- media: staging/intel-ipu3: Fix memory leak in imu_fmt (git-fixes).
- media: staging/intel-ipu3: Fix race condition during set_fmt (git-fixes).
- media: staging/intel-ipu3: Fix set_fmt error handling (git-fixes).
- media: v4l2-ctrls.c: fix race condition in hdl-&gt;requests list (git-fixes).
- memory: gpmc: fix out of bounds read and dereference on gpmc_cs[] (git-fixes).
- memory: pl353: fix mask of ECC page_size config register (git-fixes).
- mfd: lpc_sch: Partially revert 'Add support for Intel Quark X1000' (git-fixes).
- mfd: stm32-timers: Avoid clearing auto reload register (git-fixes).
- misc: lis3lv02d: Fix false-positive WARN on various HP models (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_datagram payload (git-fixes).
- misc: vmw_vmci: explicitly initialize vmci_notify_bm_set_msg struct (git-fixes).
- mmc: core: Correct descriptions in mmc_of_parse() (git-fixes).
- mmc: cqhci: Add cqhci_deactivate() (git-fixes).
- mmc: mmc_spi: Drop unused NO_IRQ definition (git-fixes).
- mmc: sdhci-of-arasan: Add missed checks for devm_clk_register() (git-fixes).
- mmc: sdhci-of-dwcmshc: fix rpmb access (git-fixes).
- mmc: sdhci-of-dwcmshc: implement specific set_uhs_signaling (git-fixes).
- mmc: sdhci-of-esdhc: make sure delay chain locked for HS400 (git-fixes).
- mmc: sdhci-of-esdhc: set timeout to max before tuning (git-fixes).
- mmc: sdhci-pci: Fix SDHCI_RESET_ALL for CQHCI for Intel GLK-based controllers (git-fixes).
- mmc: sdhci: Use Auto CMD Auto Select only when v4_mode is true (git-fixes).
- mmc: uniphier-sd: Fix an error handling path in uniphier_sd_probe() (git-fixes).
- mmc: uniphier-sd: Fix a resource leak in the remove function (git-fixes).
- mm/rmap: fix potential pte_unmap on an not mapped pte (git-fixes).
- Move upstreamed i915 fix into sorted section
- mt7601u: fix always true expression (git-fixes).
- mtd: Handle possible -EPROBE_DEFER from parse_mtd_partitions() (git-fixes).
- mtd: rawnand: brcmnand: fix OOB R/W with Hamming ECC (git-fixes).
- mtd: rawnand: fsmc: Fix error code in fsmc_nand_probe() (git-fixes).
- mtd: rawnand: gpmi: Fix a double free in gpmi_nand_init (git-fixes).
- mtd: rawnand: qcom: Return actual error code instead of -ENODEV (git-fixes).
- mtd: require write permissions for locking and badblock ioctls (git-fixes).
- mtd: spinand: core: add missing MODULE_DEVICE_TABLE() (git-fixes).
- mtd: spi-nor: Rename 'n25q512a' to 'mt25qu512a (n25q512a)' (bsc#1167260).
- mtd: spi-nor: Split mt25qu512a (n25q512a) entry into two (bsc#1167260).
- nbd: fix a block_device refcount leak in nbd_release (git-fixes).
- net: atlantic: fix out of range usage of active_vlans array (git-fixes).
- net: atlantic: fix potential error handling (git-fixes).
- net: atlantic: fix use after free kasan warn (git-fixes).
- net: dsa: felix: implement port flushing on .phylink_mac_link_down (git-fixes).
- net: enetc: remove bogus write to SIRXIDR from enetc_setup_rxbdr (git-fixes).
- net: enetc: take the MDIO lock only once per NAPI poll cycle (git-fixes).
- net: geneve: check skb is large enough for IPv4/IPv6 header (git-fixes).
- net: geneve: modify IP header check in geneve6_xmit_skb and geneve_xmit_skb (git-fixes).
- net: hns3: clear VF down state bit before request link status (git-fixes).
- net: hns3: fix bug when calculating the TCAM table info (git-fixes).
- net: hns3: fix query vlan mask value error for flow director (git-fixes).
- net: hns3: Remove un-necessary 'else-if' in the hclge_reset_event() (git-fixes).
- net: ll_temac: Add more error handling of dma_map_single() calls (git-fixes).
- net: ll_temac: Fix race condition causing TX hang (git-fixes).
- net: ll_temac: Fix RX buffer descriptor handling on GFP_ATOMIC pressure (git-fixes).
- net: ll_temac: Handle DMA halt condition caused by buffer underrun (git-fixes).
- net/mlx4_core: Add missed mlx4_free_cmd_mailbox() (git-fixes).
- net/mlx5: Do not request more than supported EQs (git-fixes).
- net/mlx5e: Do not match on Geneve options in case option masks are all zero (git-fixes).
- net/mlx5e: Fix error path for ethtool set-priv-flag (git-fixes).
- net/mlx5e: Fix ethtool indication of connector type (git-fixes).
- net/mlx5e: fix ingress_ifindex check in mlx5e_flower_parse_meta (jsc#SLE-8464).
- net:nfc:digital: Fix a double free in digital_tg_recv_dep_req (git-fixes).
- net: phy: intel-xway: enable integrated led functions (git-fixes).
- net: phy: marvell: fix m88e1011_set_downshift (git-fixes).
- net: phy: marvell: fix m88e1111_set_downshift (git-fixes).
- net/qlcnic: Fix a use after free in qlcnic_83xx_get_minidump_template (git-fixes).
- net: smc911x: Adjust indentation in smc911x_phy_configure (git-fixes).
- net: stmmac: fix missing IFF_MULTICAST check in dwmac4_set_filter (git-fixes).
- net: stmmac: xgmac: fix missing IFF_MULTICAST checki in dwxgmac2_set_filter (git-fixes).
- net: tulip: Adjust indentation in {dmfe, uli526x}_init_module (git-fixes).
- nfc: pn533: prevent potential memory corruption (git-fixes).
- nfp: flower: ignore duplicate merge hints from FW (git-fixes).
- node: fix device cleanups in error handling code (git-fixes).
- null_blk: fix passing of REQ_FUA flag in null_handle_rq (git-fixes).
- nvme-fabrics: reject I/O to offline device (bsc#1181161).
- nvme-tcp: fix possible hang when failing to set io queues (bsc#1181161).
- ocfs2: fix a use after free on error (bsc#1184738).
- pata_arasan_cf: fix IRQ check (git-fixes).
- pata_ipx4xx_cf: fix IRQ check (git-fixes).
- PCI/AER: Add pcie_walk_rcec() to RCEC AER handling (bsc#1174426).
- PCI/AER: Add RCEC AER error injection support (bsc#1174426).
- PCI/AER: Clear AER status from Root Port when resetting Downstream Port (bsc#1174426).
- PCI/AER: Specify the type of Port that was reset (bsc#1174426).
- PCI/AER: Use 'aer' variable for capability offset (bsc#1174426).
- PCI/AER: Write AER Capability only when we control it (bsc#1174426).
- PCI: designware-ep: Fix the Header Type check (git-fixes).
- PCI/ERR: Add pcie_link_rcec() to associate RCiEPs (bsc#1174426).
- PCI/ERR: Add pci_walk_bridge() to pcie_do_recovery() (bsc#1174426).
- PCI/ERR: Avoid negated conditional for clarity (bsc#1174426).
- PCI/ERR: Bind RCEC devices to the Root Port driver (bsc#1174426).
- PCI/ERR: Cache RCEC EA Capability offset in pci_init_capabilities() (bsc#1174426).
- PCI/ERR: Clear AER status only when we control AER (bsc#1174426).
- PCI/ERR: Clear PCIe Device Status errors only if OS owns AER (bsc#1174426).
- PCI/ERR: Clear status of the reporting device (bsc#1174426).
- PCI/ERR: Recover from RCEC AER errors (bsc#1174426).
- PCI/ERR: Recover from RCiEP AER errors (bsc#1174426).
- PCI/ERR: Rename reset_link() to reset_subordinates() (bsc#1174426).
- PCI/ERR: Retain status from error notification (bsc#1174426).
- PCI/ERR: Simplify by computing pci_pcie_type() once (bsc#1174426).
- PCI/ERR: Simplify by using pci_upstream_bridge() (bsc#1174426).
- PCI/ERR: Use 'bridge' for clarity in pcie_do_recovery() (bsc#1174426).
- PCI/PME: Add pcie_walk_rcec() to RCEC PME handling (bsc#1174426).
- PCI/portdrv: Report reset for frozen channel (bsc#1174426).
- PCI: tegra: Fix ASPM-L1SS advertisement disable code (git-fixes).
- PCI: tegra: Move 'dbi' accesses to post common DWC initialization (git-fixes).
- phy: marvell: ARMADA375_USBCLUSTER_PHY should not default to y, unconditionally (git-fixes).
- pinctrl: core: Fix kernel doc string for pin_get_name() (git-fixes).
- pinctrl: Ingenic: Add missing pins to the JZ4770 MAC MII group (git-fixes).
- platform/x86: pmc_atom: Match all Beckhoff Automation baytrail boards with critclk_systems DMI table (git-fixes).
- PM: runtime: Add documentation for pm_runtime_resume_and_get() (git-fixes).
- powerepc/book3s64/hash: Align start/end address correctly with bolt mapping (bsc#1184957).
- powerpc/64s: Fix pte update for kernel memory on radix (bsc#1055117 git-fixes).
- powerpc/asm-offsets: GPR14 is not needed either (bsc#1065729).
- powerpc/eeh: Fix EEH handling for hugepages in ioremap space (bsc#1156395).
- powerpc/fadump: Mark fadump_calculate_reserve_size as __init (bsc#1065729).
- powerpc/mm: Add cond_resched() while removing hpte mappings (bsc#1183289 ltc#191637).
- powerpc/papr_scm: Fix build error due to wrong printf specifier (bsc#1184969).
- powerpc/papr_scm: Implement support for H_SCM_FLUSH hcall (bsc#1184969).
- powerpc/perf: Fix PMU constraint check for EBB events (bsc#1065729).
- powerpc/prom: Mark identical_pvr_fixup as __init (bsc#1065729).
- powerpc/pseries: Add shutdown() to vio_driver and vio_bus (bsc#1184209 ltc#190917).
- powerpc/time: Enable sched clock for irqtime (bsc#1156395).
- regmap: set debugfs_name to NULL after it is freed (git-fixes).
- regulator: Avoid a double 'of_node_get' in 'regulator_of_get_init_node()' (git-fixes).
- reintroduce cqhci_suspend for kABI (git-fixes).
- reiserfs: update reiserfs_xattrs_initialized() condition (bsc#1184737).
- rpm/constraints.in: bump disk space to 45GB on riscv64
- rpm/kernel-obs-build.spec.in: Include essiv with dm-crypt (boo#1183063).
- rpm/macros.kernel-source: fix KMP failure in %install (bsc#1185244)
- rpm/mkspec: Use tilde instead of dot for version string with rc (bsc#1184650)
- rsi: Use resume_noirq for SDIO (git-fixes).
- rsxx: remove extraneous 'const' qualifier (git-fixes).
- rtc: ds1307: Fix wday settings for rx8130 (git-fixes).
- rtc: fsl-ftm-alarm: add MODULE_TABLE() (bsc#1185454).
- rtc: fsl-ftm-alarm: avoid struct rtc_time conversions (bsc#1185454).
- rtc: fsl-ftm-alarm: enable acpi support (bsc#1185454).
- rtc: fsl-ftm-alarm: fix freeze(s2idle) failed to wake (bsc#1185454).
- rtc: fsl-ftm-alarm: report alarm to core (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to ktime_get_real_seconds (bsc#1185454).
- rtc: fsl-ftm-alarm: switch to rtc_time64_to_tm/rtc_tm_to_time64 (bsc#1185454).
- rtc: fsl-ftm-alarm: update acpi device id (bsc#1185454).
- rtc: pcf2127: add alarm support (bsc#1185233).
- rtc: pcf2127: add pca2129 device id (bsc#1185233).
- rtc: pcf2127: add tamper detection support (bsc#1185233).
- rtc: pcf2127: add watchdog feature support (bsc#1185233).
- rtc: pcf2127: bugfix: watchdog build dependency (bsc#1185233).
- rtc: pcf2127: cleanup register and bit defines (bsc#1185233).
- rtc: pcf2127: convert to devm_rtc_allocate_device (bsc#1185233).
- rtc: pcf2127: fix a bug when not specify interrupts property (bsc#1185233).
- rtc: pcf2127: fix alarm handling (bsc#1185233).
- rtc: pcf2127: fix pcf2127_nvmem_read/write() returns (bsc#1185233).
- rtc: pcf2127: handle boot-enabled watchdog feature (bsc#1185233).
- rtc: pcf2127: let the core handle rtc range (bsc#1185233).
- rtc: pcf2127: move watchdog initialisation to a separate function (bsc#1185233).
- rtc: pcf2127: only use watchdog when explicitly available (bsc#1185233).
- rtc: pcf2127: properly set flag WD_CD for rtc chips(pcf2129, pca2129) (bsc#1185233).
- rtc: pcf2127: remove unnecessary #ifdef (bsc#1185233).
- rtc: pcf2127: set regmap max_register (bsc#1185233).
- rtc: pcf2127: watchdog: handle nowayout feature (bsc#1185233).
- rtlwifi: 8821ae: upgrade PHY and RF parameters (git-fixes).
- rtw88: Fix array overrun in rtw_get_tx_power_params() (git-fixes).
- sata_mv: add IRQ checks (git-fixes).
- scsi: block: Fix a race in the runtime power management code (git-fixes).
- scsi: core: add scsi_host_busy_iter() (bsc#1179851).
- scsi: core: Only return started requests from scsi_host_find_tag() (bsc#1179851).
- scsi: lpfc: Copyright updates for 12.8.0.9 patches (bsc#1185472).
- scsi: lpfc: Eliminate use of LPFC_DRIVER_NAME in lpfc_attr.c (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc issues (bsc#1185472).
- scsi: lpfc: Fix a bunch of kernel-doc misdemeanours (bsc#1185472).
- scsi: lpfc: Fix a bunch of misnamed functions (bsc#1185472).
- scsi: lpfc: Fix a few incorrectly named functions (bsc#1185472).
- scsi: lpfc: Fix a typo (bsc#1185472).
- scsi: lpfc: Fix crash when a REG_RPI mailbox fails triggering a LOGO response (bsc#1185472).
- scsi: lpfc: Fix DMA virtual address ptr assignment in bsg (bsc#1185365).
- scsi: lpfc: Fix error handling for mailboxes completed in MBX_POLL mode (bsc#1185472).
- scsi: lpfc: Fix formatting and misspelling issues (bsc#1185472).
- scsi: lpfc: Fix gcc -Wstringop-overread warning (bsc#1185472).
- scsi: lpfc: Fix illegal memory access on Abort IOCBs (bsc#1183203).
- scsi: lpfc: Fix incorrectly documented function lpfc_debugfs_commonxripools_data() (bsc#1185472).
- scsi: lpfc: Fix incorrect naming of __lpfc_update_fcf_record() (bsc#1185472).
- scsi: lpfc: Fix kernel-doc formatting issue (bsc#1185472).
- scsi: lpfc: Fix lack of device removal on port swaps with PRLIs (bsc#1185472).
- scsi: lpfc: Fix lpfc_hdw_queue attribute being ignored (bsc#1185472).
- scsi: lpfc: Fix missing FDMI registrations after Mgmt Svc login (bsc#1185472).
- scsi: lpfc: Fix NMI crash during rmmod due to circular hbalock dependency (bsc#1185472).
- scsi: lpfc: Fix reference counting errors in lpfc_cmpl_els_rsp() (bsc#1185472).
- scsi: lpfc: Fix rmmod crash due to bad ring pointers to abort_iotag (bsc#1185472).
- scsi: lpfc: Fix silent memory allocation failure in lpfc_sli4_bsg_link_diag_test() (bsc#1185472).
- scsi: lpfc: Fix some error codes in debugfs (bsc#1185472).
- scsi: lpfc: Fix use-after-free on unused nodes after port swap (bsc#1185472).
- scsi: lpfc: Fix various trivial errors in comments and log messages (bsc#1185472).
- scsi: lpfc: Remove unsupported mbox PORT_CAPABILITIES logic (bsc#1185472).
- scsi: lpfc: Standardize discovery object logging format (bsc#1185472).
- scsi: lpfc: Update lpfc version to 12.8.0.9 (bsc#1185472).
- scsi: qla2xxx: Add error counters to debugfs node (bsc#1185491).
- scsi: qla2xxx: Add H:C:T info in the log message for fc ports (bsc#1185491).
- scsi: qla2xxx: Always check the return value of qla24xx_get_isp_stats() (bsc#1185491).
- scsi: qla2xxx: Assign boolean values to a bool variable (bsc#1185491).
- scsi: qla2xxx: Check kzalloc() return value (bsc#1185491).
- scsi: qla2xxx: Consolidate zio threshold setting for both FCP NVMe (bsc#1185491).
- scsi: qla2xxx: Constify struct qla_tgt_func_tmpl (bsc#1185491).
- scsi: qla2xxx: Do logout even if fabric scan retries got exhausted (bsc#1185491).
- scsi: qla2xxx: Enable NVMe CONF (BIT_7) when enabling SLER (bsc#1185491).
- scsi: qla2xxx: fc_remote_port_chkready() returns a SCSI result value (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misdocumented functions (bsc#1185491).
- scsi: qla2xxx: Fix a couple of misnamed functions (bsc#1185491).
- scsi: qla2xxx: Fix broken #endif placement (bsc#1185491).
- scsi: qla2xxx: Fix crash in PCIe error handling (bsc#1185491).
- scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() (bsc#1185491).
- scsi: qla2xxx: Fix endianness annotations (bsc#1185491).
- scsi: qla2xxx: Fix incorrectly named function qla8044_check_temp() (bsc#1185491).
- scsi: qla2xxx: Fix IOPS drop seen in some adapters (bsc#1185491).
- scsi: qla2xxx: Fix mailbox Ch erroneous error (bsc#1185491).
- scsi: qla2xxx: Fix mailbox recovery during PCIe error (bsc#1185491).
- scsi: qla2xxx: Fix RISC RESET completion polling (bsc#1185491).
- scsi: qla2xxx: Fix some incorrect formatting/spelling issues (bsc#1185491).
- scsi: qla2xxx: Fix some memory corruption (bsc#1185491).
- scsi: qla2xxx: Fix stuck session (bsc#1185491).
- scsi: qla2xxx: Fix use after free in bsg (bsc#1185491).
- scsi: qla2xxx: Implementation to get and manage host, target stats and initiator port (bsc#1185491).
- scsi: qla2xxx: Move some messages from debug to normal log level (bsc#1185491).
- scsi: qla2xxx: Remove redundant NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unnecessary NULL check (bsc#1185491).
- scsi: qla2xxx: Remove unneeded if-null-free check (bsc#1185491).
- scsi: qla2xxx: Replace __qla2x00_marker()'s missing underscores (bsc#1185491).
- scsi: qla2xxx: Reserve extra IRQ vectors (bsc#1184436).
- scsi: qla2xxx: Reuse existing error handling path (bsc#1185491).
- scsi: qla2xxx: Simplify if statement (bsc#1185491).
- scsi: qla2xxx: Simplify qla8044_minidump_process_control() (bsc#1185491).
- scsi: qla2xxx: Simplify the calculation of variables (bsc#1185491).
- scsi: qla2xxx: Suppress Coverity complaints about dseg_r* (bsc#1185491).
- scsi: qla2xxx: Update default AER debug mask (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.105-k (bsc#1185491).
- scsi: qla2xxx: Update version to 10.02.00.106-k (bsc#1185491).
- scsi: qla2xxx: Use dma_pool_zalloc() (bsc#1185491).
- scsi: qla2xxx: Wait for ABTS response on I/O timeouts for NVMe (bsc#1185491).
- scsi: smartpqi: Correct driver removal with HBA disks (bsc#1178089).
- scsi: smartpqi: Correct pqi_sas_smp_handler busy condition (bsc#1178089).
- scsi: smartpqi: Update version to 1.2.16-012 (bsc#1178089).
- selftests/powerpc: Add pkey helpers for rights (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for execute-disabled pkeys (bsc#1184934 ltc#191460).
- selftests/powerpc: Add test for pkey siginfo verification (bsc#1184934 ltc#191460).
- selftests/powerpc: Add wrapper for gettid (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix exit status of pkey tests (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix L1D flushing tests for Power10 (bsc#1184934 ltc#191460).
- selftests/powerpc: Fix pkey syscall redefinitions (bsc#1184934 ltc#191460).
- selftests/powerpc: Move pkey helpers to headers (bsc#1184934 ltc#191460).
- selftests/powerpc: refactor entry and rfi_flush tests (bsc#1184934 ltc#191460).
- soc: aspeed: fix a ternary sign expansion bug (git-fixes).
- soc: qcom: mdt_loader: Detect truncated read of segments (git-fixes).
- soc: qcom: mdt_loader: Validate that p_filesz p_memsz (git-fixes).
- soundwire: bus: Fix device found flag correctly (git-fixes).
- soundwire: stream: fix memory leak in stream config error path (git-fixes).
- spi: fsl-dspi: fix NULL pointer dereference (bsc#1167260).
- spi: fsl-dspi: fix use-after-free in remove path (bsc#1167260).
- spi: fsl-dspi: fix wrong pointer in suspend/resume (bsc#1167260).
- spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() (git-fixes).
- spi: Introduce dspi_slave_abort() function for NXP's dspi SPI driver (bsc#1167260).
- spi: spi-fsl-dspi: Accelerate transfers using larger word size if possible (bsc#1167260).
- spi: spi-fsl-dspi: Add comments around dspi_pop_tx and dspi_push_rx functions (bsc#1167260).
- spi: spi-fsl-dspi: Adding shutdown hook (bsc#1167260).
- spi: spi-fsl-dspi: Add support for LS1028A (bsc#1167260).
- spi: spi-fsl-dspi: Always use the TCFQ devices in poll mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid NULL pointer in dspi_slave_abort for non-DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Avoid reading more data than written in EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (bsc#1167260).
- spi: spi-fsl-dspi: Convert TCFQ users to XSPI FIFO mode (bsc#1167260).
- spi: spi-fsl-dspi: Convert the instantiations that support it to DMA (bsc#1167260).
- spi: spi-fsl-dspi: delete EOQ transfer mode (bsc#1167260).
- spi: spi-fsl-dspi: Demistify magic value in SPI_SR_CLEAR (bsc#1167260).
- spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (bsc#1167260).
- spi: spi-fsl-dspi: Do not mask off undefined bits (bsc#1167260).
- spi: spi-fsl-dspi: Exit the ISR with IRQ_NONE when it's not ours (bsc#1167260).
- spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix bits-per-word acceleration in DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Fix code alignment (bsc#1167260).
- spi: spi-fsl-dspi: fix DMA mapping (bsc#1167260).
- spi: spi-fsl-dspi: Fix external abort on interrupt in resume or exit paths (bsc#1167260).
- spi: spi-fsl-dspi: Fix interrupt-less DMA mode taking an XSPI code path (bsc#1167260).
- spi: spi-fsl-dspi: Fix little endian access to PUSHR CMD and TXDATA (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is removed during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: Fix lockup if device is shutdown during SPI transfer (bsc#1167260).
- spi: spi-fsl-dspi: fix native data copy (bsc#1167260).
- spi: spi-fsl-dspi: Fix race condition in TCFQ/EOQ interrupt (bsc#1167260).
- spi: spi-fsl-dspi: Fix typos (bsc#1167260).
- spi: spi-fsl-dspi: Free DMA memory with matching function (bsc#1167260).
- spi: spi-fsl-dspi: Implement .max_message_size method for EOQ mode (bsc#1167260).
- spi: spi-fsl-dspi: Initialize completion before possible interrupt (bsc#1167260).
- spi: spi-fsl-dspi: LS2080A and LX2160A support XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Make bus-num property optional (bsc#1167260).
- spi: spi-fsl-dspi: Move dspi_interrupt above dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Move invariant configs out of dspi_transfer_one_message (bsc#1167260).
- spi: spi-fsl-dspi: Optimize dspi_setup_accel for lowest interrupt count (bsc#1167260).
- spi: spi-fsl-dspi: Parameterize the FIFO size and DMA buffer size (bsc#1167260).
- spi: spi-fsl-dspi: Protect against races on dspi-&gt;words_in_flight (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation in dspi_release_dma() (bsc#1167260).
- spi: spi-fsl-dspi: Reduce indentation level in dspi_interrupt (bsc#1167260).
- spi: spi-fsl-dspi: remove git-fixes Remove git-fixes. Prepare to update the driver. References: bsc#1167260
- spi: spi-fsl-dspi: Remove impossible to reach error check (bsc#1167260).
- spi: spi-fsl-dspi: Remove pointless assignment of master-&gt;transfer to NULL (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused chip-&gt;void_write_data (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused defines and includes (bsc#1167260).
- spi: spi-fsl-dspi: Remove unused initialization of 'ret' in dspi_probe (bsc#1167260).
- spi: spi-fsl-dspi: Rename fifo_{read,write} and {tx,cmd}_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (bsc#1167260).
- spi: spi-fsl-dspi: Replace legacy spi_master names with spi_controller (bsc#1167260).
- spi: spi-fsl-dspi: set ColdFire to DMA mode (bsc#1167260).
- spi: spi-fsl-dspi: Simplify bytes_per_word gymnastics (bsc#1167260).
- spi: spi-fsl-dspi: Take software timestamp in dspi_fifo_write (bsc#1167260).
- spi: spi-fsl-dspi: Use BIT() and GENMASK() macros (bsc#1167260).
- spi: spi-fsl-dspi: Use dma_request_chan() instead dma_request_slave_channel() (bsc#1167260).
- spi: spi-fsl-dspi: Use EOQ for last word in buffer even for XSPI mode (bsc#1167260).
- spi: spi-fsl-dspi: Use poll mode in case the platform IRQ is missing (bsc#1167260).
- spi: spi-fsl-dspi: Use reverse Christmas tree declaration order (bsc#1167260).
- spi: spi-fsl-dspi: Use specific compatible strings for all SoC instantiations (bsc#1167260).
- spi: spi-fsl-dspi: use XSPI mode instead of DMA for DPAA2 SoCs (bsc#1167260).
- spi: spi-ti-qspi: Free DMA resources (git-fixes).
- staging: fwserial: fix TIOCGSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL implementation (git-fixes).
- staging: fwserial: fix TIOCSSERIAL jiffies conversions (git-fixes).
- staging: fwserial: fix TIOCSSERIAL permission check (git-fixes).
- staging: rtl8192u: Fix potential infinite loop (git-fixes).
- usb: CDC-ACM: fix poison/unpoison imbalance (bsc#1184984).
- usb: CDC-ACM: fix poison/unpoison imbalance (git-fixes).
- usb: cdc-acm: fix TIOCGSERIAL implementation (git-fixes).
- usb: cdc-acm: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: dwc2: Fix hibernation between host and device modes (git-fixes).
- usb: dwc2: Fix host mode hibernation exit with remote wakeup flow (git-fixes).
- usb: dwc2: Fix session request interrupt handler (git-fixes).
- usb: dwc3: gadget: Fix START_TRANSFER link state check (git-fixes).
- usb: dwc3: keystone: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: meson-g12a: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- usb: dwc3: Switch to use device_property_count_u32() (git-fixes).
- usb: gadget: aspeed: fix dma map failure (git-fixes).
- usb: gadget: Fix double free of device descriptor pointers (git-fixes).
- usb: gadget: pch_udc: Check for DMA mapping error (git-fixes).
- usb: gadget: pch_udc: Check if driver is present before calling -&gt;setup() (git-fixes).
- usb: gadget: pch_udc: Move pch_udc_init() to satisfy kernel doc (git-fixes).
- usb: gadget: pch_udc: Replace cpu_to_le32() by lower_32_bits() (git-fixes).
- usb: gadget: pch_udc: Revert d3cb25a12138 completely (git-fixes).
- usb: gadget: r8a66597: Add missing null check on return from platform_get_resource (git-fixes).
- usb: gadget: udc: fix wrong pointer passed to IS_ERR() and PTR_ERR() (git-fixes).
- usb: Remove dev_err() usage after platform_get_irq() (git-fixes).
- usb: serial: ark3116: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81232: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: f81534: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: fix return value for unsupported ioctls (git-fixes).
- usb: serial: mos7720: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: opticon: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: quatech2: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: ssu100: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCGSERIAL implementation (git-fixes).
- usb: serial: usb_wwan: fix TIOCSSERIAL jiffies conversions (git-fixes).
- usb: serial: usb_wwan: fix unprivileged TIOCCSERIAL (git-fixes).
- usb: typec: tcpci: Check ROLE_CONTROL while interpreting CC_STATUS (git-fixes).
- usb: typec: tcpm: Address incorrect values of tcpm psy for fixed supply (git-fixes).
- usb: typec: tcpm: Honour pSnkStdby requirement during negotiation (git-fixes).
- veth: Store queue_mapping independently of XDP prog presence (git-fixes).
- vfio/pci: Add missing range check in vfio_pci_mmap (git-fixes).
- virt_wifi: Return micros for BSS TSF values (git-fixes).
- vxlan: move debug check after netdev unregister (git-fixes).
- workqueue: Move the position of debug_work_activate() in __queue_work() (bsc#1184893).
- x86/crash: Fix crash_setup_memmap_entries() out-of-bounds access (bsc#1152489).
- x86/insn: Add some Intel instructions to the opcode map (bsc#1184760).
- x86/insn: Add some more Intel instructions to the opcode map (bsc#1184760).
- x86/microcode: Check for offline CPUs before requesting new microcode (bsc#1152489).
- x86/mm: Fix NX bit clearing issue in kernel_map_pages_in_pgd (bsc#1152489).
- x86/platform/uv: Set section block size for hubless architectures (bsc#1152489).
- x86/reboot: Force all cpus to exit VMX root if VMX is supported (bsc#1152489).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-05-12"/>
	<updated date="2021-05-12"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1043990">SUSE bug 1043990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1055117">SUSE bug 1055117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167260">SUSE bug 1167260</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168838">SUSE bug 1168838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174416">SUSE bug 1174416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174426">SUSE bug 1174426</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178089">SUSE bug 1178089</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182613">SUSE bug 1182613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183063">SUSE bug 1183063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183203">SUSE bug 1183203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183289">SUSE bug 1183289</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184208">SUSE bug 1184208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184209">SUSE bug 1184209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184436">SUSE bug 1184436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184514">SUSE bug 1184514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184650">SUSE bug 1184650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184724">SUSE bug 1184724</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184728">SUSE bug 1184728</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184730">SUSE bug 1184730</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184731">SUSE bug 1184731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184736">SUSE bug 1184736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184737">SUSE bug 1184737</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184738">SUSE bug 1184738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184740">SUSE bug 1184740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184741">SUSE bug 1184741</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184742">SUSE bug 1184742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184760">SUSE bug 1184760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184811">SUSE bug 1184811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184893">SUSE bug 1184893</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184934">SUSE bug 1184934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184942">SUSE bug 1184942</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184957">SUSE bug 1184957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184969">SUSE bug 1184969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184984">SUSE bug 1184984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185041">SUSE bug 1185041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185113">SUSE bug 1185113</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185233">SUSE bug 1185233</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185244">SUSE bug 1185244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185269">SUSE bug 1185269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185365">SUSE bug 1185365</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185454">SUSE bug 1185454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185472">SUSE bug 1185472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185491">SUSE bug 1185491</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185549">SUSE bug 1185549</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185586">SUSE bug 1185586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185587">SUSE bug 1185587</bugzilla>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29155/">CVE-2021-29155</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-29650/">CVE-2021-29650</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509387" comment="kernel-default-extra-5.3.18-24.64.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509388" comment="kernel-preempt-extra-5.3.18-24.64.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111965" version="1" class="patch">
	<metadata>
		<title>Security update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1181255" ref_url="https://bugzilla.suse.com/1181255" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3185" ref_url="https://www.suse.com/security/cve/CVE-2021-3185/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008904.html" source="SUSE-SU"/>
		<description>
This update for gstreamer, gstreamer-plugins-bad, gstreamer-plugins-base, gstreamer-plugins-good, gstreamer-plugins-ugly fixes the following issues:

gstreamer was updated to version 1.16.3 (bsc#1181255):

- delay creation of threadpools
- bin: Fix `deep-element-removed` log message
- buffer: fix meta sequence number fallback on rpi
- bufferlist: foreach: always remove as parent if buffer is changed
- bus: Make setting/replacing/clearing the sync handler thread-safe
- elementfactory: Fix missing features in case a feature moves to another filename
- element: When removing a ghost pad also unset its target
- meta: intern registered impl string
- registry: Use a toolchain-specific registry file on Windows
- systemclock: Invalid internal time calculation causes non-increasing clock time on Windows
- value: don't write to `const char *`
- value: Fix segfault comparing empty GValueArrays
- Revert floating enforcing
- aggregator: fix iteration direction in skip_buffers
- sparsefile: fix possible crash when seeking
- baseparse: cache fix
- baseparse: fix memory leak when subclass skips whole input buffer
- baseparse: Set the private duration before posting a duration-changed message
- basetransform: allow not passthrough if generate_output is implemented
- identity: Fix a minor leak using meta_str
- queue: protect against lost wakeups for iterm_del condition
- queue2: Avoid races when posting buffering messages
- queue2: Fix missing/dropped buffering messages at startup
- identity: Unblock condition variable on FLUSH_START
- check: Use `g_thread_yield()` instead of `g_usleep(1)`
- tests: use cpu_family for arch checks
- gst-launch: Follow up to missing `s/g_print/gst_print/g`
- gst-inspect: Add define guard for `g_log_writer_supports_color()`
- gst-launch: go back down to `GST_STATE_NULL` in one step.
- device-monitor: list hidden providers before listing devices
- autotools build fixes for GNU make 4.3

gstreamer-plugins-good was updated to version 1.16.3 (bsc#1181255):

- deinterlace: on-the-fly renegotiation
- flacenc: Pass audio info from set_format() to query_total_samples() explicitly
- flacparse: fix broken reordering of flac metadata
- jack: Use jack_free(3) to release ports
- jpegdec: check buffer size before dereferencing
- pulse: fix discovery of newly added devices
- qtdemux fuzzing fixes
- qtdemux: Add 'mp3 ' fourcc that VLC seems to produce now
- qtdemux: Specify REDIRECT information in error message
- rtpbin: fix shutdown crash in rtpbin
- rtpsession: rename RTCP thread
- rtpvp8pay, rtpvp9pay: fix caps leak in set_caps()
- rtpjpegdepay: outputs framed jpeg
- rtpjitterbuffer: Properly free internal packets queue in finalize()
- rtspsrc: Don't return TRUE for unhandled query
- rtspsrc: Avoid stack overflow recursing waiting for response
- rtspsrc: Use the correct type for storing the max-rtcp-rtp-time-diff property
- rtspsrc: Error out when failling to receive message response
- rtspsrc: Fix for segmentation fault when handling set/get_parameter requests
- speex: Fix crash on Windows caused by cross-CRT issue
- speexdec: Crash when stopping the pipeline
- splitmuxsrc: Properly stop the loop if no part reader is present
- use gst_element_class_set_metadata when passing dynamic strings
- v4l2videodec: Increase internal bitstream pool size
- v4l2: fix crash when handling unsupported video format
- videocrop: allow properties to be animated by GstController
- videomixer: Don't leak peer caps
- vp8enc/vp8enc: set 1 for the default value of VP8E_SET_STATIC_THRESHOLD
- wavenc: Fix writing of the channel mask with &gt;2 channels

gstreamer-plugins-bad was updated to version 1.16.3 (bsc#1181255):

- amcvideodec: fix sync meta copying not taking a reference
- audiobuffersplit: Perform discont tracking on running time
- audiobuffersplit: Specify in the template caps that only interleaved audio is supported
- audiobuffersplit: Unset DISCONT flag if not discontinuous
- autoconvert: Fix lock-less exchange or free condition
- autoconvert: fix compiler warnings with g_atomic on recent GLib versions
- avfvideosrc: element requests camera permissions even with capture-screen property is true
- codecparsers: h264parser: guard against ref_pic_markings overflow
- dtlsconnection: Avoid segmentation fault when no srtp capabilities are negotiated
- dtls/connection: fix EOF handling with openssl 1.1.1e
- fdkaacdec: add support for mpegversion=2
- hls: Check nettle version to ensure AES128 support
- ipcpipeline: Rework compiler checks
- interlace: Increment phase_index before checking if we're at the end of the phase
- lv2: Make it build with -fno-common
- h264parser: Do not allocate too large size of memory for registered user data SEI
- ladspa: fix unbounded integer properties
- modplug: avoid division by zero
- msdkdec: Fix GstMsdkContext leak
- msdkenc: fix leaks on windows
- musepackdec: Don't fail all queries if no sample rate is known yet
- openslessink: Allow openslessink to handle 48kHz streams.
- opencv: allow compilation against 4.2.x
- proxysink: event_function needs to handle the event when it is disconnecetd from proxysrc
- vulkan: Drop use of VK_RESULT_BEGIN_RANGE
- wasapi: added missing lock release in case of error in gst_wasapi_xxx_reset
- wasapi: Fix possible deadlock while downwards state change
- waylandsink: Clear window when pipeline is stopped
- webrtc: Support non-trickle ICE candidates in the SDP
- webrtc: Unmap all non-binary buffers received via the datachannel
- meson: build with neon 0.31
- Drop upstream fixed patch: gstreamer-h264parser-fix-overflow.patch

- h264parser: guard against ref_pic_markings overflow
  (bsc#1181255 CVE-2021-3185)

- Disable the kate/libtiger plugin.  Kate streams for karaoke are not
  used anymore, and the source tarball for libtiger is no longer
  available upstream. (jsc#SLE-13843)

gstreamer-plugins-ugly was updated to version 1.16.3 (bsc#1181255):

+ x264enc: corrected em_data value in CEA-708 CC SEI message

gstreamer-plugins-base was updated to version 1.16.3 (bsc#1181255):

- audioaggregator: Check all downstream allowed caps structures if they support the upstream rate
- audioaggregator: Fix negotiation with downstream if there is no peer yet
- audioencoder: fix segment event leak
- discoverer: Fix caps handling in `pad-added` signal handler
- discoverer: Start discovering next URI from right thread
- fft: Update our kiss fft version, fixes thread-safety and concurrency issues and misc other things
- gl: numerous memory fixes (use-after-free, leaks, missing NULL-ify)
- gl/display/egl: ensure debug category is initialized
- gstglwindow_x11: fix resize
- pbutils: Add latest H.264 level values
- rtpbuffer: fix header extension length validation
- video: Fix NV12_64Z32 number of component
- video-format: RGB16/15 are not 16 bit per component but only 5.333 and 5
- video: fix top/bottom field flags
- videodecoder: don't copy interlace-mode from reference state
- appsrc/appsink: Make setting/replacing callbacks thread-safe
- compositor: Fix checkerboard filling for BGRx/RGBx and UYVY/YUY2/YVYU
- decodebin3: only force streams-selected seqnum after a select-streams
- glupload: Fix fallback from direct dmabuf to dmabuf upload method
- glvideomixer: perform `_get_highest_precision()` on the GL thread
- libvisual: use `gst_element_class_set_metadata()` when passing dynamic strings
- oggstream: Workaround for broken PAR in VP8 BOS
- subparse: accept WebVTT timestamps without an hour component
- playbin: Handle error message with redirection indication
- textrender: Fix AYUV output.
- typefind: Consider MPEG-PS PSM to be a PES type
- uridecodebin3: default to non-0 buffer-size and buffer-duration, otherwise it could potentially cause big memory allocations over time
- videoaggregator: Don't configure NULL chroma-site/colorimetry
- videorate/videoscale/audioresample: Ensure that the caps returned from...
- build: Replace bashisms in configure for Wayland and GLES3
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-01"/>
	<updated date="2021-06-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181255">SUSE bug 1181255</bugzilla>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3185/">CVE-2021-3185</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509389" comment="gstreamer-plugins-ugly-1.16.3-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509390" comment="gstreamer-plugins-ugly-lang-1.16.3-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111966" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1185086" ref_url="https://bugzilla.suse.com/1185086" source="BUGZILLA"/>
		<reference ref_id="1185633" ref_url="https://bugzilla.suse.com/1185633" source="BUGZILLA"/>
		<reference ref_id="1186198" ref_url="https://bugzilla.suse.com/1186198" source="BUGZILLA"/>
		<reference ref_id="1186199" ref_url="https://bugzilla.suse.com/1186199" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29950" ref_url="https://www.suse.com/security/cve/CVE-2021-29950/" source="CVE"/>
		<reference ref_id="CVE-2021-29951" ref_url="https://www.suse.com/security/cve/CVE-2021-29951/" source="CVE"/>
		<reference ref_id="CVE-2021-29956" ref_url="https://www.suse.com/security/cve/CVE-2021-29956/" source="CVE"/>
		<reference ref_id="CVE-2021-29957" ref_url="https://www.suse.com/security/cve/CVE-2021-29957/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008933.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.10.2
- CVE-2021-29957: Fixed partial protection of inline OpenPGP message not indicated (bsc#1186198).
- CVE-2021-29956: Fixed Thunderbird stored OpenPGP secret keys without master password protection (bsc#1186199).
- CVE-2021-29951: Fixed Thunderbird Maintenance Service could have been started or stopped by domain users (bsc#1185633).
- CVE-2021-29950: Fixed logic issue potentially leaves key material unlocked (bsc#1185086).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1185086">SUSE bug 1185086</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185633">SUSE bug 1185633</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186198">SUSE bug 1186198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186199">SUSE bug 1186199</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29950/">CVE-2021-29950</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-29951/">CVE-2021-29951</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-29956/">CVE-2021-29956</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29957/">CVE-2021-29957</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509391" comment="MozillaThunderbird-78.10.2-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509392" comment="MozillaThunderbird-translations-common-78.10.2-8.27.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509393" comment="MozillaThunderbird-translations-other-78.10.2-8.27.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111967" version="1" class="patch">
	<metadata>
		<title>Security update for libwebp (Critical)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1185652" ref_url="https://bugzilla.suse.com/1185652" source="BUGZILLA"/>
		<reference ref_id="1185654" ref_url="https://bugzilla.suse.com/1185654" source="BUGZILLA"/>
		<reference ref_id="1185673" ref_url="https://bugzilla.suse.com/1185673" source="BUGZILLA"/>
		<reference ref_id="1185674" ref_url="https://bugzilla.suse.com/1185674" source="BUGZILLA"/>
		<reference ref_id="1185685" ref_url="https://bugzilla.suse.com/1185685" source="BUGZILLA"/>
		<reference ref_id="1185686" ref_url="https://bugzilla.suse.com/1185686" source="BUGZILLA"/>
		<reference ref_id="1185688" ref_url="https://bugzilla.suse.com/1185688" source="BUGZILLA"/>
		<reference ref_id="1185690" ref_url="https://bugzilla.suse.com/1185690" source="BUGZILLA"/>
		<reference ref_id="1185691" ref_url="https://bugzilla.suse.com/1185691" source="BUGZILLA"/>
		<reference ref_id="1186247" ref_url="https://bugzilla.suse.com/1186247" source="BUGZILLA"/>
		<reference ref_id="CVE-2018-25009" ref_url="https://www.suse.com/security/cve/CVE-2018-25009/" source="CVE"/>
		<reference ref_id="CVE-2018-25010" ref_url="https://www.suse.com/security/cve/CVE-2018-25010/" source="CVE"/>
		<reference ref_id="CVE-2018-25011" ref_url="https://www.suse.com/security/cve/CVE-2018-25011/" source="CVE"/>
		<reference ref_id="CVE-2018-25012" ref_url="https://www.suse.com/security/cve/CVE-2018-25012/" source="CVE"/>
		<reference ref_id="CVE-2018-25013" ref_url="https://www.suse.com/security/cve/CVE-2018-25013/" source="CVE"/>
		<reference ref_id="CVE-2020-36328" ref_url="https://www.suse.com/security/cve/CVE-2020-36328/" source="CVE"/>
		<reference ref_id="CVE-2020-36329" ref_url="https://www.suse.com/security/cve/CVE-2020-36329/" source="CVE"/>
		<reference ref_id="CVE-2020-36330" ref_url="https://www.suse.com/security/cve/CVE-2020-36330/" source="CVE"/>
		<reference ref_id="CVE-2020-36331" ref_url="https://www.suse.com/security/cve/CVE-2020-36331/" source="CVE"/>
		<reference ref_id="CVE-2020-36332" ref_url="https://www.suse.com/security/cve/CVE-2020-36332/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008936.html" source="SUSE-SU"/>
		<description>
This update for libwebp fixes the following issues:

- CVE-2018-25010: Fixed heap-based buffer overflow in ApplyFilter() (bsc#1185685).
- CVE-2020-36330: Fixed heap-based buffer overflow in ChunkVerifyAndAssign() (bsc#1185691).
- CVE-2020-36332: Fixed extreme memory allocation when reading a file (bsc#1185674).
- CVE-2020-36329: Fixed use-after-free in EmitFancyRGB() (bsc#1185652).
- CVE-2018-25012: Fixed heap-based buffer overflow in GetLE24() (bsc#1185690).
- CVE-2020-36328: Fixed heap-based buffer overflow in WebPDecode*Into functions (bsc#1185688).
- CVE-2018-25013: Fixed heap-based buffer overflow in ShiftBytes() (bsc#1185654).
- CVE-2020-36331: Fixed heap-based buffer overflow in ChunkAssignData() (bsc#1185686).
- CVE-2018-25009: Fixed heap-based buffer overflow in GetLE16() (bsc#1185673).
- CVE-2018-25011: Fixed fail on multiple image chunks (bsc#1186247).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-04"/>
	<updated date="2021-06-04"/>
	<severity>Critical</severity>
	<bugzilla href="https://bugzilla.suse.com/1185652">SUSE bug 1185652</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185654">SUSE bug 1185654</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185673">SUSE bug 1185673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185674">SUSE bug 1185674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185685">SUSE bug 1185685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185686">SUSE bug 1185686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185688">SUSE bug 1185688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185690">SUSE bug 1185690</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185691">SUSE bug 1185691</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186247">SUSE bug 1186247</bugzilla>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25009/">CVE-2018-25009</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25010/">CVE-2018-25010</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2018-25011/">CVE-2018-25011</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25012/">CVE-2018-25012</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2018-25013/">CVE-2018-25013</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36328/">CVE-2020-36328</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36329/">CVE-2020-36329</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36330/">CVE-2020-36330</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36331/">CVE-2020-36331</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36332/">CVE-2020-36332</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009505343" comment="libwebp6-0.5.0-3.5.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111968" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1087082" ref_url="https://bugzilla.suse.com/1087082" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152457" ref_url="https://bugzilla.suse.com/1152457" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1177666" ref_url="https://bugzilla.suse.com/1177666" source="BUGZILLA"/>
		<reference ref_id="1178378" ref_url="https://bugzilla.suse.com/1178378" source="BUGZILLA"/>
		<reference ref_id="1178418" ref_url="https://bugzilla.suse.com/1178418" source="BUGZILLA"/>
		<reference ref_id="1178612" ref_url="https://bugzilla.suse.com/1178612" source="BUGZILLA"/>
		<reference ref_id="1179519" ref_url="https://bugzilla.suse.com/1179519" source="BUGZILLA"/>
		<reference ref_id="1179825" ref_url="https://bugzilla.suse.com/1179825" source="BUGZILLA"/>
		<reference ref_id="1179827" ref_url="https://bugzilla.suse.com/1179827" source="BUGZILLA"/>
		<reference ref_id="1179851" ref_url="https://bugzilla.suse.com/1179851" source="BUGZILLA"/>
		<reference ref_id="1182257" ref_url="https://bugzilla.suse.com/1182257" source="BUGZILLA"/>
		<reference ref_id="1182378" ref_url="https://bugzilla.suse.com/1182378" source="BUGZILLA"/>
		<reference ref_id="1182999" ref_url="https://bugzilla.suse.com/1182999" source="BUGZILLA"/>
		<reference ref_id="1183346" ref_url="https://bugzilla.suse.com/1183346" source="BUGZILLA"/>
		<reference ref_id="1183868" ref_url="https://bugzilla.suse.com/1183868" source="BUGZILLA"/>
		<reference ref_id="1183873" ref_url="https://bugzilla.suse.com/1183873" source="BUGZILLA"/>
		<reference ref_id="1183932" ref_url="https://bugzilla.suse.com/1183932" source="BUGZILLA"/>
		<reference ref_id="1183947" ref_url="https://bugzilla.suse.com/1183947" source="BUGZILLA"/>
		<reference ref_id="1183976" ref_url="https://bugzilla.suse.com/1183976" source="BUGZILLA"/>
		<reference ref_id="1184081" ref_url="https://bugzilla.suse.com/1184081" source="BUGZILLA"/>
		<reference ref_id="1184082" ref_url="https://bugzilla.suse.com/1184082" source="BUGZILLA"/>
		<reference ref_id="1184259" ref_url="https://bugzilla.suse.com/1184259" source="BUGZILLA"/>
		<reference ref_id="1184611" ref_url="https://bugzilla.suse.com/1184611" source="BUGZILLA"/>
		<reference ref_id="1184855" ref_url="https://bugzilla.suse.com/1184855" source="BUGZILLA"/>
		<reference ref_id="1185428" ref_url="https://bugzilla.suse.com/1185428" source="BUGZILLA"/>
		<reference ref_id="1185495" ref_url="https://bugzilla.suse.com/1185495" source="BUGZILLA"/>
		<reference ref_id="1185497" ref_url="https://bugzilla.suse.com/1185497" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185606" ref_url="https://bugzilla.suse.com/1185606" source="BUGZILLA"/>
		<reference ref_id="1185642" ref_url="https://bugzilla.suse.com/1185642" source="BUGZILLA"/>
		<reference ref_id="1185645" ref_url="https://bugzilla.suse.com/1185645" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185680" ref_url="https://bugzilla.suse.com/1185680" source="BUGZILLA"/>
		<reference ref_id="1185703" ref_url="https://bugzilla.suse.com/1185703" source="BUGZILLA"/>
		<reference ref_id="1185725" ref_url="https://bugzilla.suse.com/1185725" source="BUGZILLA"/>
		<reference ref_id="1185758" ref_url="https://bugzilla.suse.com/1185758" source="BUGZILLA"/>
		<reference ref_id="1185859" ref_url="https://bugzilla.suse.com/1185859" source="BUGZILLA"/>
		<reference ref_id="1185860" ref_url="https://bugzilla.suse.com/1185860" source="BUGZILLA"/>
		<reference ref_id="1185861" ref_url="https://bugzilla.suse.com/1185861" source="BUGZILLA"/>
		<reference ref_id="1185862" ref_url="https://bugzilla.suse.com/1185862" source="BUGZILLA"/>
		<reference ref_id="1185863" ref_url="https://bugzilla.suse.com/1185863" source="BUGZILLA"/>
		<reference ref_id="1185898" ref_url="https://bugzilla.suse.com/1185898" source="BUGZILLA"/>
		<reference ref_id="1185899" ref_url="https://bugzilla.suse.com/1185899" source="BUGZILLA"/>
		<reference ref_id="1185911" ref_url="https://bugzilla.suse.com/1185911" source="BUGZILLA"/>
		<reference ref_id="1185938" ref_url="https://bugzilla.suse.com/1185938" source="BUGZILLA"/>
		<reference ref_id="1185950" ref_url="https://bugzilla.suse.com/1185950" source="BUGZILLA"/>
		<reference ref_id="1185982" ref_url="https://bugzilla.suse.com/1185982" source="BUGZILLA"/>
		<reference ref_id="1185987" ref_url="https://bugzilla.suse.com/1185987" source="BUGZILLA"/>
		<reference ref_id="1185988" ref_url="https://bugzilla.suse.com/1185988" source="BUGZILLA"/>
		<reference ref_id="1186060" ref_url="https://bugzilla.suse.com/1186060" source="BUGZILLA"/>
		<reference ref_id="1186061" ref_url="https://bugzilla.suse.com/1186061" source="BUGZILLA"/>
		<reference ref_id="1186062" ref_url="https://bugzilla.suse.com/1186062" source="BUGZILLA"/>
		<reference ref_id="1186111" ref_url="https://bugzilla.suse.com/1186111" source="BUGZILLA"/>
		<reference ref_id="1186285" ref_url="https://bugzilla.suse.com/1186285" source="BUGZILLA"/>
		<reference ref_id="1186320" ref_url="https://bugzilla.suse.com/1186320" source="BUGZILLA"/>
		<reference ref_id="1186390" ref_url="https://bugzilla.suse.com/1186390" source="BUGZILLA"/>
		<reference ref_id="1186416" ref_url="https://bugzilla.suse.com/1186416" source="BUGZILLA"/>
		<reference ref_id="1186439" ref_url="https://bugzilla.suse.com/1186439" source="BUGZILLA"/>
		<reference ref_id="1186441" ref_url="https://bugzilla.suse.com/1186441" source="BUGZILLA"/>
		<reference ref_id="1186451" ref_url="https://bugzilla.suse.com/1186451" source="BUGZILLA"/>
		<reference ref_id="1186460" ref_url="https://bugzilla.suse.com/1186460" source="BUGZILLA"/>
		<reference ref_id="1186479" ref_url="https://bugzilla.suse.com/1186479" source="BUGZILLA"/>
		<reference ref_id="1186484" ref_url="https://bugzilla.suse.com/1186484" source="BUGZILLA"/>
		<reference ref_id="1186498" ref_url="https://bugzilla.suse.com/1186498" source="BUGZILLA"/>
		<reference ref_id="1186501" ref_url="https://bugzilla.suse.com/1186501" source="BUGZILLA"/>
		<reference ref_id="1186573" ref_url="https://bugzilla.suse.com/1186573" source="BUGZILLA"/>
		<reference ref_id="1186681" ref_url="https://bugzilla.suse.com/1186681" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-24586" ref_url="https://www.suse.com/security/cve/CVE-2020-24586/" source="CVE"/>
		<reference ref_id="CVE-2020-24587" ref_url="https://www.suse.com/security/cve/CVE-2020-24587/" source="CVE"/>
		<reference ref_id="CVE-2020-24588" ref_url="https://www.suse.com/security/cve/CVE-2020-24588/" source="CVE"/>
		<reference ref_id="CVE-2020-26139" ref_url="https://www.suse.com/security/cve/CVE-2020-26139/" source="CVE"/>
		<reference ref_id="CVE-2020-26141" ref_url="https://www.suse.com/security/cve/CVE-2020-26141/" source="CVE"/>
		<reference ref_id="CVE-2020-26145" ref_url="https://www.suse.com/security/cve/CVE-2020-26145/" source="CVE"/>
		<reference ref_id="CVE-2020-26147" ref_url="https://www.suse.com/security/cve/CVE-2020-26147/" source="CVE"/>
		<reference ref_id="CVE-2021-23134" ref_url="https://www.suse.com/security/cve/CVE-2021-23134/" source="CVE"/>
		<reference ref_id="CVE-2021-32399" ref_url="https://www.suse.com/security/cve/CVE-2021-32399/" source="CVE"/>
		<reference ref_id="CVE-2021-33034" ref_url="https://www.suse.com/security/cve/CVE-2021-33034/" source="CVE"/>
		<reference ref_id="CVE-2021-33200" ref_url="https://www.suse.com/security/cve/CVE-2021-33200/" source="CVE"/>
		<reference ref_id="CVE-2021-3491" ref_url="https://www.suse.com/security/cve/CVE-2021-3491/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:1890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008947.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-33200: Enforcing incorrect limits for pointer arithmetic operations by the BPF verifier could be abused to perform out-of-bounds reads and writes in kernel memory (bsc#1186484).
- CVE-2021-33034: Fixed a use-after-free when destroying an hci_chan. This could lead to writing an arbitrary values. (bsc#1186111)
- CVE-2020-26139: Fixed a denial-of-service when an Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. (bnc#1186062)
- CVE-2021-23134: A Use After Free vulnerability in nfc sockets allowed local attackers to elevate their privileges. (bnc#1186060)
- CVE-2021-3491: Fixed a potential heap overflow in mem_rw(). This vulnerability is related to the PROVIDE_BUFFERS operation, which allowed the MAX_RW_COUNT limit to be bypassed (bsc#1185642).
- CVE-2021-32399: Fixed a race condition when removing the HCI controller (bnc#1184611).
- CVE-2020-24586: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances this can be abused to inject arbitrary network packets and/or exfiltrate user data (bnc#1185859).
- CVE-2020-24587: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed (bnc#1185859 bnc#1185862).
- CVE-2020-26147: The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments, even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used (bnc#1185859).
- CVE-2020-24588: The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (bnc#1185861)
- CVE-2020-26145: An issue was discovered with Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (bnc#1185860)
- CVE-2020-26141: An issue was discovered in the ALFA driver for AWUS036H, where the Message Integrity Check (authenticity) of fragmented TKIP frames was not verified. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. (bnc#1185987)

The following non-security bugs were fixed:

- ACPI / hotplug / PCI: Fix reference count leak in enable_slot() (git-fixes).
- ACPI: GTDT: Do not corrupt interrupt mappings on watchdow probe failure (git-fixes).
- ACPI: custom_method: fix a possible memory leak (git-fixes).
- ACPI: custom_method: fix potential use-after-free issue (git-fixes).
- ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro (git-fixes).
- ALSA: bebob: enable to deliver MIDI messages for multiple ports (git-fixes).
- ALSA: dice: fix stream format at middle sampling rate for Alesis iO 26 (git-fixes).
- ALSA: dice: fix stream format for TC Electronic Konnekt Live at high sampling transfer frequency (git-fixes).
- ALSA: firewire-lib: fix calculation for size of IR context payload (git-fixes).
- ALSA: firewire-lib: fix check for the size of isochronous packet payload (git-fixes).
- ALSA: hda/conexant: Re-order CX5066 quirk table entries (git-fixes).
- ALSA: hda/realtek: ALC285 Thinkpad jack pin quirk is unreachable (git-fixes).
- ALSA: hda/realtek: Add some CLOVE SSIDs of ALC293 (git-fixes).
- ALSA: hda/realtek: Headphone volume is controlled by Front mixer (git-fixes).
- ALSA: hda/realtek: reset eapd coeff to default value for alc287 (git-fixes).
- ALSA: hda: fixup headset for ASUS GU502 laptop (git-fixes).
- ALSA: hda: generic: change the DAC ctl name for LO+SPK or LO+HP (git-fixes).
- ALSA: hdsp: do not disable if not enabled (git-fixes).
- ALSA: hdspm: do not disable if not enabled (git-fixes).
- ALSA: intel8x0: Do not update period unless prepared (git-fixes).
- ALSA: line6: Fix racy initialization of LINE6 MIDI (git-fixes).
- ALSA: rme9652: do not disable if not enabled (git-fixes).
- ALSA: usb-audio: Validate MS endpoint descriptors (git-fixes).
- ALSA: usb-audio: fix control-request direction (git-fixes).
- ALSA: usb-audio: scarlett2: Fix device hang with ehci-pci (git-fixes).
- ALSA: usb-audio: scarlett2: Improve driver startup messages (git-fixes).
- ALSA: usb-audio: scarlett2: snd_scarlett_gen2_controls_create() can be static (git-fixes).
- ARM64: vdso32: Install vdso32 from vdso_install (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Chuwi Hi8 tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Enable jack-detect support on Asus T100TAF (git-fixes).
- ASoC: cs35l33: fix an error code in probe() (git-fixes).
- ASoC: cs42l42: Regmap must use_single_read/write (git-fixes).
- ASoC: rsnd: call rsnd_ssi_master_clk_start() from rsnd_ssi_init() (git-fixes).
- ASoC: rsnd: core: Check convert rate in rsnd_hw_params (git-fixes).
- ASoC: rt286: Generalize support for ALC3263 codec (git-fixes).
- ASoC: rt286: Make RT286_SET_GPIO_* readable and writable (git-fixes).
- Bluetooth: L2CAP: Fix handling LE modes by L2CAP_OPTIONS (git-fixes).
- Bluetooth: SMP: Fail if remote and local public keys are identical (git-fixes).
- Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default (git-fixes).
- Bluetooth: check for zapped sk before connecting (git-fixes).
- Bluetooth: initialize skb_queue_head at l2cap_chan_create() (git-fixes).
- Drivers: hv: vmbus: Fix Suspend-to-Idle for Generation-2 VM (git-fixes).
- Drivers: hv: vmbus: Increase wait time for VMbus unload (bsc#1185725).
- Drivers: hv: vmbus: Initialize unload_event statically (bsc#1185725).
- Drivers: hv: vmbus: Use after free in __vmbus_open() (git-fixes).
- Input: elants_i2c - do not bind to i2c-hid compatible ACPI instantiated devices (git-fixes).
- Input: silead - add workaround for x86 BIOS-es which bring the chip up in a stuck state (git-fixes).
- KVM: s390: fix guarded storage control register handling (bsc#1133021).
- Move upstreamed media fixes into sorted section
- NFC: nci: fix memory leak in nci_allocate_device (git-fixes).
- PCI/RCEC: Fix RCiEP device to RCEC association (git-fixes).
- PCI: Allow VPD access for QLogic ISP2722 (git-fixes).
- PCI: PM: Do not read power state in pci_enable_device_flags() (git-fixes).
- PCI: Release OF node in pci_scan_device()'s error path (git-fixes).
- PCI: endpoint: Fix missing destroy_workqueue() (git-fixes).
- PCI: iproc: Fix return value of iproc_msi_irq_domain_alloc() (git-fixes).
- PCI: thunder: Fix compile testing (git-fixes).
- PM / devfreq: Use more accurate returned new_freq as resume_freq (git-fixes).
- RDMA/addr: create addr_wq with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/core: create ib_cm with WQ_MEM_RECLAIM flag (bsc#1183346).
- RDMA/hns: Delete redundant abnormal interrupt status (git-fixes).
- RDMA/hns: Delete redundant condition judgment related to eq (git-fixes).
- RDMA/qedr: Fix error return code in qedr_iw_connect() (jsc#SLE-8215).
- RDMA/srpt: Fix error return code in srpt_cm_req_recv() (git-fixes).
- Revert 'arm64: vdso: Fix compilation with clang older than 8' (git-fixes).
- Revert 'gdrom: fix a memory leak bug' (git-fixes).
- Revert 'i3c master: fix missing destroy_workqueue() on error in i3c_master_register' (git-fixes).
- Revert 'leds: lp5523: fix a missing check of return value of lp55xx_read' (git-fixes).
- Revert 337f13046ff0 ('futex: Allow FUTEX_CLOCK_REALTIME with FUTEX_WAIT op') (git-fixes).
- SUNRPC in case of backlog, hand free slots directly to waiting task (bsc#1185428).
- SUNRPC: More fixes for backlog congestion (bsc#1185428).
- USB: Add LPM quirk for Lenovo ThinkPad USB-C Dock Gen2 Ethernet (git-fixes).
- USB: Add reset-resume quirk for WD19's Realtek Hub (git-fixes).
- USB: serial: pl2303: add support for PL2303HXN (bsc#1186320).
- USB: serial: pl2303: fix line-speed handling on newer chips (bsc#1186320).
- USB: serial: ti_usb_3410_5052: fix TIOCSSERIAL permission check (git-fixes).
- USB: trancevibrator: fix control-request direction (git-fixes).
- amdgpu: avoid incorrect %hu format string (git-fixes).
- arm64/mm: Fix pfn_valid() for ZONE_DEVICE based memory (git-fixes).
- arm64: Add missing ISB after invalidating TLB in __primary_switch (git-fixes).
- arm64: avoid -Woverride-init warning (git-fixes).
- arm64: kasan: fix page_alloc tagging with DEBUG_VIRTUAL (git-fixes).
- arm64: kdump: update ppos when reading elfcorehdr (git-fixes).
- arm64: kexec_file: fix memory leakage in create_dtb() when fdt_open_into() fails (git-fixes).
- arm64: link with -z norelro for LLD or aarch64-elf (git-fixes).
- arm64: link with -z norelro regardless of CONFIG_RELOCATABLE (git-fixes).
- arm64: ptrace: Fix seccomp of traced syscall -1 (NO_SYSCALL) (git-fixes).
- arm64: ptrace: Use NO_SYSCALL instead of -1 in syscall_trace_enter() (git-fixes).
- arm64: vdso32: make vdso32 install conditional (git-fixes).
- arm: mm: use __pfn_to_section() to get mem_section (git-fixes).
- ata: ahci: Disable SXS for Hisilicon Kunpeng920 (git-fixes).
- blk-iocost: ioc_pd_free() shouldn't assume irq disabled (git-fixes).
- blk-mq: Swap two calls in blk_mq_exit_queue() (git-fixes).
- block/genhd: use atomic_t for disk_event-&gt;block (bsc#1185497).
- block: Fix three kernel-doc warnings (git-fixes).
- block: fix get_max_io_size() (git-fixes).
- bnxt_en: Fix RX consumer index logic in the error path (git-fixes).
- bnxt_en: fix ternary sign extension bug in bnxt_show_temp() (git-fixes).
- bpf: Fix leakage of uninitialized bpf stack under speculation (bsc#1155518).
- bpf: Fix masking negation logic upon negative dst register (bsc#1155518).
- btrfs: fix race between transaction aborts and fsyncs leading to use-after-free (bsc#1186441).
- btrfs: fix race when picking most recent mod log operation for an old root (bsc#1186439).
- cdc-wdm: untangle a circular dependency between callback and softint (git-fixes).
- cdrom: gdrom: deallocate struct gdrom_unit fields in remove_gdrom (git-fixes).
- cdrom: gdrom: initialize global variable at init time (git-fixes).
- ceph: do not clobber i_snap_caps on non-I_NEW inode (bsc#1186501).
- ceph: fix inode leak on getattr error in __fh_to_dentry (bsc#1186501).
- ceph: fix up error handling with snapdirs (bsc#1186501).
- ceph: only check pool permissions for regular files (bsc#1186501).
- cfg80211: scan: drop entry from hidden_list on overflow (git-fixes).
- clk: socfpga: arria10: Fix memory leak of socfpga_clk on error return (git-fixes).
- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758).
- crypto: api - check for ERR pointers in crypto_destroy_tfm() (git-fixes).
- crypto: mips/poly1305 - enable for all MIPS processors (git-fixes).
- crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init (git-fixes).
- crypto: qat - Fix a double free in adf_create_ring (git-fixes).
- crypto: qat - do not release uninitialized resources (git-fixes).
- crypto: qat - fix error path in adf_isr_resource_alloc() (git-fixes).
- crypto: qat - fix unmap invalid dma address (git-fixes).
- crypto: stm32/cryp - Fix PM reference leak on stm32-cryp.c (git-fixes).
- crypto: stm32/hash - Fix PM reference leak on stm32-hash.c (git-fixes).
- cxgb4: Fix unintentional sign extension issues (git-fixes).
- dm: avoid filesystem lookup in dm_get_dev_t() (git-fixes).
- dmaengine: dw-edma: Fix crash on loading/unloading driver (git-fixes).
- docs: kernel-parameters: Add gpio_mockup_named_lines (git-fixes).
- docs: kernel-parameters: Move gpio-mockup for alphabetic order (git-fixes).
- drivers: hv: Fix whitespace errors (bsc#1185725).
- drm/amd/display: Fix UBSAN warning for not a valid value for type '_Bool' (git-fixes).
- drm/amd/display: Fix two cursor duplication when using overlay (git-fixes).
- drm/amd/display: Force vsync flip when reconfiguring MPCC (git-fixes).
- drm/amd/display: Reject non-zero src_y and src_x for video planes (git-fixes).
- drm/amd/display: fix dml prefetch validation (git-fixes).
- drm/amd/display: fixed divide by zero kernel crash during dsc enablement (git-fixes).
- drm/amdgpu : Fix asic reset regression issue introduce by 8f211fe8ac7c4f (git-fixes).
- drm/amdgpu: disable 3DCGCG on picasso/raven1 to avoid compute hang (git-fixes).
- drm/amdgpu: fix NULL pointer dereference (git-fixes).
- drm/amdgpu: mask the xgmi number of hops reported from psp to kfd (git-fixes).
- drm/amdkfd: Fix cat debugfs hang_hws file causes system crash bug (git-fixes).
- drm/i915: Avoid div-by-zero on gen2 (git-fixes).
- drm/meson: fix shutdown crash when component not probed (git-fixes).
- drm/msm/mdp5: Configure PP_SYNC_HEIGHT to double the vtotal (git-fixes).
- drm/msm/mdp5: Do not multiply vclk line count by 100 (git-fixes).
- drm/radeon/dpm: Disable sclk switching on Oland when two 4K 60Hz monitors are connected (git-fixes).
- drm/radeon: Avoid power table parsing memory leaks (git-fixes).
- drm/radeon: Fix off-by-one power_state index heap overwrite (git-fixes).
- drm/vkms: fix misuse of WARN_ON (git-fixes).
- drm: Added orientation quirk for OneGX1 Pro (git-fixes).
- ethernet:enic: Fix a use after free bug in enic_hard_start_xmit (git-fixes).
- extcon: arizona: Fix some issues when HPDET IRQ fires after the jack has been unplugged (git-fixes).
- extcon: arizona: Fix various races on driver unbind (git-fixes).
- fbdev: zero-fill colormap in fbcmap.c (git-fixes).
- firmware: arm_scpi: Prevent the ternary sign expansion bug (git-fixes).
- fs/epoll: restore waking from ep_done_scan() (bsc#1183868).
- ftrace: Handle commands when closing set_ftrace_filter file (git-fixes).
- futex: Change utime parameter to be 'const ... *' (git-fixes).
- futex: Do not apply time namespace adjustment on FUTEX_LOCK_PI (bsc#1164648).
- futex: Get rid of the val2 conditional dance (git-fixes).
- futex: Make syscall entry points less convoluted (git-fixes).
- genirq/irqdomain: Do not try to free an interrupt that has no (git-fixes)
- genirq: Disable interrupts for force threaded handlers (git-fixes)
- genirq: Reduce irqdebug cacheline bouncing (bsc#1185703 ltc#192641).
- gpio: xilinx: Correct kernel doc for xgpio_probe() (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on Dell Venue 10 Pro 5055 (git-fixes).
- hrtimer: Update softirq_expires_next correctly after (git-fixes)
- hwmon: (occ) Fix poll rate limiting (git-fixes).
- i2c: Add I2C_AQ_NO_REP_START adapter quirk (git-fixes).
- i2c: bail out early when RDWR parameters are wrong (git-fixes).
- i2c: i801: Do not generate an interrupt on bus reset (git-fixes).
- i2c: s3c2410: fix possible NULL pointer deref on read message after write (git-fixes).
- i2c: sh_mobile: Use new clock calculation formulas for RZ/G2E (git-fixes).
- i40e: Fix PHY type identifiers for 2.5G and 5G adapters (git-fixes).
- i40e: Fix use-after-free in i40e_client_subtask() (git-fixes).
- i40e: fix broken XDP support (git-fixes).
- i40e: fix the restart auto-negotiation after FEC modified (git-fixes).
- ibmvfc: Avoid move login if fast fail is enabled (bsc#1185938 ltc#192043).
- ibmvfc: Handle move login failure (bsc#1185938 ltc#192043).
- ibmvfc: Reinit target retries (bsc#1185938 ltc#192043).
- ibmvnic: remove default label from to_string switch (bsc#1152457 ltc#174432 git-fixes).
- ics932s401: fix broken handling of errors when word reading fails (git-fixes).
- iio: adc: ad7124: Fix missbalanced regulator enable / disable on error (git-fixes).
- iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers (git-fixes).
- iio: adc: ad7768-1: Fix too small buffer passed to iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ad7793: Add missing error code in ad7793_setup() (git-fixes).
- iio: gyro: fxas21002c: balance runtime power in error path (git-fixes).
- iio: gyro: mpu3050: Fix reported temperature value (git-fixes).
- iio: proximity: pulsedlight: Fix rumtime PM imbalance on error (git-fixes).
- iio: tsl2583: Fix division by a zero lux_val (git-fixes).
- intel_th: Consistency and off-by-one fix (git-fixes).
- iommu/amd: Add support for map/unmap_resource (jsc#ECO-3482).
- ipc/mqueue, msg, sem: Avoid relying on a stack reference past its expiry (bsc#1185988).
- ipmi/watchdog: Stop watchdog timer when the current action is 'none' (bsc#1184855).
- kernel-docs.spec.in: Build using an utf-8 locale. Sphinx cannot handle UTF-8 input in non-UTF-8 locale.
- leds: lp5523: check return value of lp5xx_read and jump to cleanup code (git-fixes).
- lpfc: Decouple port_template and vport_template (bsc#185032).
- mac80211: clear the beacon's CRC after channel switch (git-fixes).
- md-cluster: fix use-after-free issue when removing rdev (bsc#1184082).
- md/raid1: properly indicate failure when ending a failed write request (bsc#1185680).
- md: do not flush workqueue unconditionally in md_open (bsc#1184081).
- md: factor out a mddev_find_locked helper from mddev_find (bsc#1184081).
- md: md_open returns -EBUSY when entering racing area (bsc#1184081).
- md: split mddev_find (bsc#1184081).
- media: adv7604: fix possible use-after-free in adv76xx_remove() (git-fixes).
- media: drivers: media: pci: sta2x11: fix Kconfig dependency on GPIOLIB (git-fixes).
- media: dvb-usb: fix memory leak in dvb_usb_adapter_init (git-fixes).
- media: em28xx: fix memory leak (git-fixes).
- media: gspca/sq905.c: fix uninitialized variable (git-fixes).
- media: i2c: adv7511-v4l2: fix possible use-after-free in adv7511_remove() (git-fixes).
- media: i2c: adv7842: fix possible use-after-free in adv7842_remove() (git-fixes).
- media: i2c: tda1997: Fix possible use-after-free in tda1997x_remove() (git-fixes).
- media: imx: capture: Return -EPIPE from __capture_legacy_try_fmt() (git-fixes).
- media: ite-cir: check for receive overflow (git-fixes).
- media: media/saa7164: fix saa7164_encoder_register() memory leak bugs (git-fixes).
- media: platform: sti: Fix runtime PM imbalance in regs_show (git-fixes).
- media: tc358743: fix possible use-after-free in tc358743_remove() (git-fixes).
- mfd: arizona: Fix rumtime PM imbalance on error (git-fixes).
- misc/uss720: fix memory leak in uss720_probe (git-fixes).
- mlxsw: spectrum_mr: Update egress RIF list before route's action (git-fixes).
- mm: memcontrol: fix cpuhotplug statistics flushing (bsc#1185606).
- mmc: block: Update ext_csd.cache_ctrl if it was written (git-fixes).
- mmc: core: Do a power cycle when the CMD11 fails (git-fixes).
- mmc: core: Set read only for SD cards with permanent write protect bit (git-fixes).
- mmc: sdhci-pci-gli: increase 1.8V regulator wait (git-fixes).
- mmc: sdhci-pci: Add PCI IDs for Intel LKF (git-fixes).
- mmc: sdhci-pci: Fix initialization of some SD cards for Intel BYT-based controllers (git-fixes).
- mmc: sdhci: Check for reset prior to DMA address unmap (git-fixes).
- net, xdp: Update pkt_type if generic XDP changes unicast MAC (git-fixes).
- net: enetc: fix link error again (git-fixes).
- net: hns3: Fix for geneve tx checksum bug (git-fixes).
- net: hns3: add check for HNS3_NIC_STATE_INITED in hns3_reset_notify_up_enet() (git-fixes).
- net: hns3: clear unnecessary reset request in hclge_reset_rebuild (git-fixes).
- net: hns3: disable phy loopback setting in hclge_mac_start_phy (git-fixes).
- net: hns3: fix for vxlan gpe tx checksum bug (git-fixes).
- net: hns3: fix incorrect configuration for igu_egu_hw_err (git-fixes).
- net: hns3: initialize the message content in hclge_get_link_mode() (git-fixes).
- net: hns3: use netif_tx_disable to stop the transmit queue (git-fixes).
- net: thunderx: Fix unintentional sign extension issue (git-fixes).
- net: usb: fix memory leak in smsc75xx_bind (git-fixes).
- netdevice: Add missing IFF_PHONY_HEADROOM self-definition (git-fixes).
- netfilter: conntrack: add new sysctl to disable RST check (bsc#1183947 bsc#1185950).
- netfilter: conntrack: avoid misleading 'invalid' in log message (bsc#1183947 bsc#1185950).
- netfilter: conntrack: improve RST handling when tuple is re-used (bsc#1183947 bsc#1185950).
- nvme-core: add cancel tagset helpers (bsc#1183976).
- nvme-fabrics: decode host pathing error for connect (bsc#1179827).
- nvme-fc: check sgl supported by target (bsc#1179827).
- nvme-fc: clear q_live at beginning of association teardown (bsc#1186479).
- nvme-fc: return NVME_SC_HOST_ABORTED_CMD when a command has been aborted (bsc#1184259).
- nvme-fc: set NVME_REQ_CANCELLED in nvme_fc_terminate_exchange() (bsc#1184259).
- nvme-fc: short-circuit reconnect retries (bsc#1179827).
- nvme-multipath: fix double initialization of ANA state (bsc#1178612, bsc#1184259).
- nvme-multipath: reset bdev to ns head when failover (bsc#178378 bsc#1182999).
- nvme-pci: Remove tag from process cq (git-fixes).
- nvme-pci: Remove two-pass completions (git-fixes).
- nvme-pci: Simplify nvme_poll_irqdisable (git-fixes).
- nvme-pci: align io queue count with allocted nvme_queue in (git-fixes).
- nvme-pci: avoid race between nvme_reap_pending_cqes() and nvme_poll() (git-fixes).
- nvme-pci: dma read memory barrier for completions (git-fixes).
- nvme-pci: fix 'slimmer CQ head update' (git-fixes).
- nvme-pci: make sure write/poll_queues less or equal then cpu (git-fixes).
- nvme-pci: remove last_sq_tail (git-fixes).
- nvme-pci: remove volatile cqes (git-fixes).
- nvme-pci: slimmer CQ head update (git-fixes).
- nvme-pci: use simple suspend when a HMB is enabled (git-fixes).
- nvme-tcp: Fix possible race of io_work and direct send (git-fixes).
- nvme-tcp: Fix warning with CONFIG_DEBUG_PREEMPT (git-fixes).
- nvme-tcp: add clean action for failed reconnection (bsc#1183976).
- nvme-tcp: fix kconfig dependency warning when !CRYPTO (git-fixes).
- nvme-tcp: fix misuse of __smp_processor_id with preemption (git-fixes).
- nvme-tcp: fix possible hang waiting for icresp response (bsc#1179519).
- nvme-tcp: use cancel tagset helper for tear down (bsc#1183976).
- nvme: Fix NULL dereference for pci nvme controllers (bsc#1182378).
- nvme: add 'kato' sysfs attribute (bsc#1179825).
- nvme: add NVME_REQ_CANCELLED flag in nvme_cancel_request() (bsc#1184259).
- nvme: define constants for identification values (git-fixes).
- nvme: do not intialize hwmon for discovery controllers (bsc#1184259).
- nvme: do not intialize hwmon for discovery controllers (git-fixes).
- nvme: document nvme controller states (git-fixes).
- nvme: explicitly update mpath disk capacity on revalidation (git-fixes).
- nvme: expose reconnect_delay and ctrl_loss_tmo via sysfs (bsc#1182378).
- nvme: fix controller instance leak (git-fixes).
- nvme: fix deadlock in disconnect during scan_work and/or ana_work (git-fixes).
- nvme: fix possible deadlock when I/O is blocked (git-fixes).
- nvme: remove superfluous else in nvme_ctrl_loss_tmo_store (bsc#1182378).
- nvme: retrigger ANA log update if group descriptor isn't found (git-fixes)
- nvme: sanitize KATO setting (bsc#1179825).
- nvme: simplify error logic in nvme_validate_ns() (bsc#1184259).
- nvmet: fix a memory leak (git-fixes).
- nvmet: seset ns-&gt;file when open fails (bsc#1183873).
- nvmet: use new ana_log_size instead the old one (bsc#1184259).
- nxp-i2c: restore includes for kABI (bsc#1185589).
- nxp-nci: add NXP1002 id (bsc#1185589).
- phy: phy-twl4030-usb: Fix possible use-after-free in twl4030_usb_remove() (git-fixes).
- pinctrl: ingenic: Improve unreachable code generation (git-fixes).
- pinctrl: samsung: use 'int' for register masks in Exynos (git-fixes).
- platform/mellanox: mlxbf-tmfifo: Fix a memory barrier issue (git-fixes).
- platform/x86: intel_pmc_core: Do not use global pmcdev in quirks (git-fixes).
- platform/x86: thinkpad_acpi: Correct thermal sensor allocation (git-fixes).
- posix-timers: Preserve return value in clock_adjtime32() (git-fixes)
- power: supply: Use IRQF_ONESHOT (git-fixes).
- power: supply: generic-adc-battery: fix possible use-after-free in gab_remove() (git-fixes).
- power: supply: s3c_adc_battery: fix possible use-after-free in s3c_adc_bat_remove() (git-fixes).
- powerpc/64s: Fix crashes when toggling entry flush barrier (bsc#1177666 git-fixes).
- powerpc/64s: Fix crashes when toggling stf barrier (bsc#1087082 git-fixes).
- qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth (git-fixes).
- rtc: pcf2127: handle timestamp interrupts (bsc#1185495).
- s390/dasd: fix hanging DASD driver unbind (bsc#1183932 LTC#192153).
- s390/entry: save the caller of psw_idle (bsc#1185677).
- s390/kdump: fix out-of-memory with PCI (bsc#1182257 LTC#191375).
- sched/eas: Do not update misfit status if the task is pinned (git-fixes)
- sched/fair: Avoid stale CPU util_est value for schedutil in (git-fixes)
- sched/fair: Fix unfairness caused by missing load decay (git-fixes)
- scripts/git_sort/git_sort.py: add bpf git repo
- scsi: core: Run queue in case of I/O resource contention failure (bsc#1186416).
- scsi: fnic: Kill 'exclude_id' argument to fnic_cleanup_io() (bsc#1179851).
- scsi: libfc: Avoid invoking response handler twice if ep is already completed (bsc#1186573).
- scsi: lpfc: Add a option to enable interlocked ABTS before job completion (bsc#1186451).
- scsi: lpfc: Add ndlp kref accounting for resume RPI path (bsc#1186451).
- scsi: lpfc: Fix 'Unexpected timeout' error in direct attach topology (bsc#1186451).
- scsi: lpfc: Fix Node recovery when driver is handling simultaneous PLOGIs (bsc#1186451).
- scsi: lpfc: Fix bad memory access during VPD DUMP mailbox command (bsc#1186451).
- scsi: lpfc: Fix crash when lpfc_sli4_hba_setup() fails to initialize the SGLs (bsc#1186451).
- scsi: lpfc: Fix node handling for Fabric Controller and Domain Controller (bsc#1186451).
- scsi: lpfc: Fix non-optimized ERSP handling (bsc#1186451).
- scsi: lpfc: Fix unreleased RPIs when NPIV ports are created (bsc#1186451).
- scsi: lpfc: Ignore GID-FT response that may be received after a link flip (bsc#1186451).
- scsi: lpfc: Reregister FPIN types if ELS_RDF is received from fabric controller (bsc#1186451).
- scsi: lpfc: Update lpfc version to 12.8.0.10 (bsc#1186451).
- sctp: delay auto_asconf init until binding the first addr (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- serial: core: fix suspicious security_locked_down() call (git-fixes).
- serial: core: return early on unsupported ioctls (git-fixes).
- serial: sh-sci: Fix off-by-one error in FIFO threshold register setting (git-fixes).
- serial: stm32: fix incorrect characters on console (git-fixes).
- serial: stm32: fix tx_empty condition (git-fixes).
- serial: tegra: Fix a mask operation that is always true (git-fixes).
- smc: disallow TCP_ULP in smc_setsockopt() (git-fixes).
- spi: ath79: always call chipselect function (git-fixes).
- spi: ath79: remove spi-master setup and cleanup assignment (git-fixes).
- spi: dln2: Fix reference leak to master (git-fixes).
- spi: omap-100k: Fix reference leak to master (git-fixes).
- spi: qup: fix PM reference leak in spi_qup_remove() (git-fixes).
- spi: spi-fsl-dspi: Fix a resource leak in an error handling path (git-fixes).
- staging: emxx_udc: fix loop in _nbu2ss_nuke() (git-fixes).
- staging: iio: cdc: ad7746: avoid overwrite of num_channels (git-fixes).
- tcp: fix to update snd_wl1 in bulk receiver fast path (&amp;lt;cover.1620748346.git.mkubecek@suse.cz&gt;).
- thermal/drivers/ti-soc-thermal/bandgap Remove unused variable 'val' (git-fixes).
- thunderbolt: dma_port: Fix NVM read buffer bounds and offset issue (git-fixes).
- tracing: Map all PIDs to command lines (git-fixes).
- tty: amiserial: fix TIOCSSERIAL permission check (git-fixes).
- tty: fix memory leak in vc_deallocate (git-fixes).
- tty: moxa: fix TIOCSSERIAL jiffies conversions (git-fixes).
- tty: moxa: fix TIOCSSERIAL permission check (git-fixes).
- uio: uio_hv_generic: use devm_kzalloc() for private data alloc (git-fixes).
- uio_hv_generic: Fix a memory leak in error handling paths (git-fixes).
- uio_hv_generic: Fix another memory leak in error handling paths (git-fixes).
- uio_hv_generic: add missed sysfs_remove_bin_file (git-fixes).
- usb: core: hub: Fix PM reference leak in usb_port_resume() (git-fixes).
- usb: core: hub: fix race condition about TRSMRCY of resume (git-fixes).
- usb: dwc2: Fix gadget DMA unmap direction (git-fixes).
- usb: dwc3: gadget: Enable suspend events (git-fixes).
- usb: dwc3: gadget: Return success always for kick transfer in ep queue (git-fixes).
- usb: dwc3: omap: improve extcon initialization (git-fixes).
- usb: dwc3: pci: Enable usb2-gadget-lpm-disable for Intel Merrifield (git-fixes).
- usb: fotg210-hcd: Fix an error message (git-fixes).
- usb: gadget/function/f_fs string table fix for multiple languages (git-fixes).
- usb: gadget: dummy_hcd: fix gpf in gadget_setup (git-fixes).
- usb: gadget: f_uac1: validate input parameters (git-fixes).
- usb: gadget: f_uac2: validate input parameters (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix a race in usb3_start_pipen() (git-fixes).
- usb: gadget: uvc: add bInterval checking for HS mode (git-fixes).
- usb: musb: fix PM reference leak in musb_irq_work() (git-fixes).
- usb: sl811-hcd: improve misleading indentation (git-fixes).
- usb: webcam: Invalid size of Processing Unit Descriptor (git-fixes).
- usb: xhci: Fix port minor revision (git-fixes).
- usb: xhci: Increase timeout for HC halt (git-fixes).
- vgacon: Record video mode changes with VT_RESIZEX (git-fixes).
- video: hyperv_fb: Add ratelimit on error message (bsc#1185725).
- vrf: fix a comment about loopback device (git-fixes).
- watchdog/softlockup: Remove obsolete check of last reported task (bsc#1185982).
- watchdog/softlockup: report the overall time of softlockups (bsc#1185982).
- watchdog: explicitly update timestamp when reporting softlockup (bsc#1185982).
- watchdog: rename __touch_watchdog() to a better descriptive name (bsc#1185982).
- whitespace cleanup
- wl3501_cs: Fix out-of-bounds warnings in wl3501_mgmt_join (git-fixes).
- wl3501_cs: Fix out-of-bounds warnings in wl3501_send_pkt (git-fixes).
- workqueue: Minor follow-ups to the rescuer destruction change (bsc#1185911).
- workqueue: more destroy_workqueue() fixes (bsc#1185911).
- x86/cpu: Initialize MSR_TSC_AUX if RDTSCP *or* RDPID is supported (bsc#1152489).
- xhci: Do not use GFP_KERNEL in (potentially) atomic context (git-fixes).
- xhci: check control context is valid before dereferencing it (git-fixes).
- xhci: fix potential array out of bounds with several interrupters (git-fixes).
- xsk: Respect device's headroom and tailroom on generic xmit path (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-08"/>
	<updated date="2021-06-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1087082">SUSE bug 1087082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152457">SUSE bug 1152457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177666">SUSE bug 1177666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178378">SUSE bug 1178378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178418">SUSE bug 1178418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178612">SUSE bug 1178612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179519">SUSE bug 1179519</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179825">SUSE bug 1179825</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179827">SUSE bug 1179827</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179851">SUSE bug 1179851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182257">SUSE bug 1182257</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182378">SUSE bug 1182378</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182999">SUSE bug 1182999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183346">SUSE bug 1183346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183868">SUSE bug 1183868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183873">SUSE bug 1183873</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183932">SUSE bug 1183932</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183947">SUSE bug 1183947</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183976">SUSE bug 1183976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184081">SUSE bug 1184081</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184082">SUSE bug 1184082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184259">SUSE bug 1184259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184611">SUSE bug 1184611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184855">SUSE bug 1184855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185428">SUSE bug 1185428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185495">SUSE bug 1185495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185497">SUSE bug 1185497</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185606">SUSE bug 1185606</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185642">SUSE bug 1185642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185645">SUSE bug 1185645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185680">SUSE bug 1185680</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185703">SUSE bug 1185703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185725">SUSE bug 1185725</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185758">SUSE bug 1185758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185859">SUSE bug 1185859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185860">SUSE bug 1185860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185861">SUSE bug 1185861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185862">SUSE bug 1185862</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185863">SUSE bug 1185863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185898">SUSE bug 1185898</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185899">SUSE bug 1185899</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185911">SUSE bug 1185911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185938">SUSE bug 1185938</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185950">SUSE bug 1185950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185982">SUSE bug 1185982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185987">SUSE bug 1185987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185988">SUSE bug 1185988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186060">SUSE bug 1186060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186061">SUSE bug 1186061</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186062">SUSE bug 1186062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186111">SUSE bug 1186111</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186285">SUSE bug 1186285</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186320">SUSE bug 1186320</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186390">SUSE bug 1186390</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186416">SUSE bug 1186416</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186439">SUSE bug 1186439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186441">SUSE bug 1186441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186451">SUSE bug 1186451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186460">SUSE bug 1186460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186479">SUSE bug 1186479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186484">SUSE bug 1186484</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186498">SUSE bug 1186498</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186501">SUSE bug 1186501</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186573">SUSE bug 1186573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186681">SUSE bug 1186681</bugzilla>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24586/">CVE-2020-24586</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-24587/">CVE-2020-24587</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-24588/">CVE-2020-24588</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-26139/">CVE-2020-26139</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26141/">CVE-2020-26141</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26145/">CVE-2020-26145</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-26147/">CVE-2020-26147</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23134/">CVE-2021-23134</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32399/">CVE-2021-32399</cve>
	<cve impact="important" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33034/">CVE-2021-33034</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33200/">CVE-2021-33200</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3491/">CVE-2021-3491</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509394" comment="kernel-default-extra-5.3.18-24.67.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509395" comment="kernel-preempt-extra-5.3.18-24.67.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111969" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1186696" ref_url="https://bugzilla.suse.com/1186696" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29964" ref_url="https://www.suse.com/security/cve/CVE-2021-29964/" source="CVE"/>
		<reference ref_id="CVE-2021-29967" ref_url="https://www.suse.com/security/cve/CVE-2021-29967/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009028.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 78.11 (bsc#1186696)

Security issues fixed:

- CVE-2021-29964: Out of bounds-read when parsing a `WM_COPYDATA` message
- CVE-2021-29967: Memory safety bugs fixed in Thunderbird 78.11

General improvements:

- OpenPGP could not be disabled for an account if a key was previously configured
- Recipients were unable to decrypt some messages when the sender had changed the message encryption from OpenPGP to S/MIME
- Contacts moved between CardDAV address books were not synced to the new server
- CardDAV compatibility fixes for Google Contacts
- Folder pane had no clear indication of focus on macOS
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-17"/>
	<updated date="2021-06-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186696">SUSE bug 1186696</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29964/">CVE-2021-29964</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29967/">CVE-2021-29967</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509396" comment="MozillaThunderbird-78.11.0-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509397" comment="MozillaThunderbird-translations-common-78.11.0-8.30.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509398" comment="MozillaThunderbird-translations-other-78.11.0-8.30.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111970" version="1" class="patch">
	<metadata>
		<title>Security update for gupnp (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1186590" ref_url="https://bugzilla.suse.com/1186590" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-33516" ref_url="https://www.suse.com/security/cve/CVE-2021-33516/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/009082.html" source="SUSE-SU"/>
		<description>
This update for gupnp fixes the following issues:

- CVE-2021-33516: Fixed a DNS rebinding, which could trick the browser into triggering actions against local UPnP services (bsc#1186590).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-06-24"/>
	<updated date="2021-06-24"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1186590">SUSE bug 1186590</bugzilla>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-33516/">CVE-2021-33516</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509399" comment="typelib-1_0-GUPnP-1_0-1.2.2-3.3.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111971" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1172640" ref_url="https://bugzilla.suse.com/1172640" source="BUGZILLA"/>
		<reference ref_id="1186406" ref_url="https://bugzilla.suse.com/1186406" source="BUGZILLA"/>
		<reference ref_id="1186583" ref_url="https://bugzilla.suse.com/1186583" source="BUGZILLA"/>
		<reference ref_id="1186586" ref_url="https://bugzilla.suse.com/1186586" source="BUGZILLA"/>
		<reference ref_id="1186587" ref_url="https://bugzilla.suse.com/1186587" source="BUGZILLA"/>
		<reference ref_id="1186596" ref_url="https://bugzilla.suse.com/1186596" source="BUGZILLA"/>
		<reference ref_id="1186597" ref_url="https://bugzilla.suse.com/1186597" source="BUGZILLA"/>
		<reference ref_id="1186598" ref_url="https://bugzilla.suse.com/1186598" source="BUGZILLA"/>
		<reference ref_id="1186600" ref_url="https://bugzilla.suse.com/1186600" source="BUGZILLA"/>
		<reference ref_id="1186603" ref_url="https://bugzilla.suse.com/1186603" source="BUGZILLA"/>
		<reference ref_id="1186604" ref_url="https://bugzilla.suse.com/1186604" source="BUGZILLA"/>
		<reference ref_id="1186605" ref_url="https://bugzilla.suse.com/1186605" source="BUGZILLA"/>
		<reference ref_id="1186613" ref_url="https://bugzilla.suse.com/1186613" source="BUGZILLA"/>
		<reference ref_id="1186614" ref_url="https://bugzilla.suse.com/1186614" source="BUGZILLA"/>
		<reference ref_id="1186615" ref_url="https://bugzilla.suse.com/1186615" source="BUGZILLA"/>
		<reference ref_id="1186616" ref_url="https://bugzilla.suse.com/1186616" source="BUGZILLA"/>
		<reference ref_id="1186658" ref_url="https://bugzilla.suse.com/1186658" source="BUGZILLA"/>
		<reference ref_id="1186660" ref_url="https://bugzilla.suse.com/1186660" source="BUGZILLA"/>
		<reference ref_id="1186757" ref_url="https://bugzilla.suse.com/1186757" source="BUGZILLA"/>
		<reference ref_id="1186758" ref_url="https://bugzilla.suse.com/1186758" source="BUGZILLA"/>
		<reference ref_id="1186762" ref_url="https://bugzilla.suse.com/1186762" source="BUGZILLA"/>
		<reference ref_id="1186763" ref_url="https://bugzilla.suse.com/1186763" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-17539" ref_url="https://www.suse.com/security/cve/CVE-2019-17539/" source="CVE"/>
		<reference ref_id="CVE-2020-13904" ref_url="https://www.suse.com/security/cve/CVE-2020-13904/" source="CVE"/>
		<reference ref_id="CVE-2020-20448" ref_url="https://www.suse.com/security/cve/CVE-2020-20448/" source="CVE"/>
		<reference ref_id="CVE-2020-20451" ref_url="https://www.suse.com/security/cve/CVE-2020-20451/" source="CVE"/>
		<reference ref_id="CVE-2020-21041" ref_url="https://www.suse.com/security/cve/CVE-2020-21041/" source="CVE"/>
		<reference ref_id="CVE-2020-22015" ref_url="https://www.suse.com/security/cve/CVE-2020-22015/" source="CVE"/>
		<reference ref_id="CVE-2020-22016" ref_url="https://www.suse.com/security/cve/CVE-2020-22016/" source="CVE"/>
		<reference ref_id="CVE-2020-22017" ref_url="https://www.suse.com/security/cve/CVE-2020-22017/" source="CVE"/>
		<reference ref_id="CVE-2020-22019" ref_url="https://www.suse.com/security/cve/CVE-2020-22019/" source="CVE"/>
		<reference ref_id="CVE-2020-22020" ref_url="https://www.suse.com/security/cve/CVE-2020-22020/" source="CVE"/>
		<reference ref_id="CVE-2020-22021" ref_url="https://www.suse.com/security/cve/CVE-2020-22021/" source="CVE"/>
		<reference ref_id="CVE-2020-22022" ref_url="https://www.suse.com/security/cve/CVE-2020-22022/" source="CVE"/>
		<reference ref_id="CVE-2020-22023" ref_url="https://www.suse.com/security/cve/CVE-2020-22023/" source="CVE"/>
		<reference ref_id="CVE-2020-22025" ref_url="https://www.suse.com/security/cve/CVE-2020-22025/" source="CVE"/>
		<reference ref_id="CVE-2020-22026" ref_url="https://www.suse.com/security/cve/CVE-2020-22026/" source="CVE"/>
		<reference ref_id="CVE-2020-22031" ref_url="https://www.suse.com/security/cve/CVE-2020-22031/" source="CVE"/>
		<reference ref_id="CVE-2020-22032" ref_url="https://www.suse.com/security/cve/CVE-2020-22032/" source="CVE"/>
		<reference ref_id="CVE-2020-22033" ref_url="https://www.suse.com/security/cve/CVE-2020-22033/" source="CVE"/>
		<reference ref_id="CVE-2020-22034" ref_url="https://www.suse.com/security/cve/CVE-2020-22034/" source="CVE"/>
		<reference ref_id="CVE-2020-22038" ref_url="https://www.suse.com/security/cve/CVE-2020-22038/" source="CVE"/>
		<reference ref_id="CVE-2020-22039" ref_url="https://www.suse.com/security/cve/CVE-2020-22039/" source="CVE"/>
		<reference ref_id="CVE-2020-22043" ref_url="https://www.suse.com/security/cve/CVE-2020-22043/" source="CVE"/>
		<reference ref_id="CVE-2020-22044" ref_url="https://www.suse.com/security/cve/CVE-2020-22044/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009140.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-13904: Fixed use-after-free via a crafted EXTINF duration in an m3u8 file (bsc#1172640).
- CVE-2020-21041: Fixed buffer overflow vulnerability via apng_do_inverse_blend in libavcodec/pngenc.c  (bsc#1186406).
- CVE-2019-17539: Fixed NULL pointer dereference in avcodec_open2 in libavcodec/utils.c (bsc# 1154065).
- CVE-2020-22026: Fixed buffer overflow vulnerability in config_input() at libavfilter/af_tremolo.c (bsc#1186583).
- CVE-2020-22021: Fixed buffer overflow vulnerability in filter_edges function in libavfilter/vf_yadif.c (bsc#1186586).
- CVE-2020-22020: Fixed buffer overflow vulnerability in build_diff_map() in libavfilter/vf_fieldmatch.c (bsc#1186587).
- CVE-2020-22015: Fixed buffer overflow vulnerability in mov_write_video_tag() due to the out of bounds in libavformat/movenc.c (bsc#1186596).
- CVE-2020-22016: Fixed a heap-based Buffer Overflow vulnerability at libavcodec/get_bits.h when writing .mov files (bsc#1186598).
- CVE-2020-22017: Fixed a heap-based Buffer Overflow vulnerability in ff_fill_rectangle() in libavfilter/drawutils.c (bsc#1186600).
- CVE-2020-22022: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_fieldorder.c (bsc#1186603).
- CVE-2020-22023: Fixed a heap-based Buffer Overflow vulnerability in filter_frame at libavfilter/vf_bitplanenoise.c (bsc#1186604)
- CVE-2020-22025: Fixed a heap-based Buffer Overflow vulnerability in gaussian_blur at libavfilter/vf_edgedetect.c (bsc#1186605).
- CVE-2020-22031: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_w3fdif.c in filter16_complex_low() (bsc#1186613).
- CVE-2020-22032: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_edgedetect.c in gaussian_blur() (bsc#1186614).
- CVE-2020-22034: Fixed a heap-based Buffer Overflow vulnerability at libavfilter/vf_floodfill.c (bsc#1186616).
- CVE-2020-20451: Fixed denial of service issue due to resource management errors via fftools/cmdutils.c (bsc#1186658).
- CVE-2020-20448: Fixed divide by zero issue via libavcodec/ratecontrol.c (bsc#1186660).
- CVE-2020-22038: Fixed denial of service vulnerability due to a memory leak in the ff_v4l2_m2m_create_context function in v4l2_m2m.c (bsc#1186757).
- CVE-2020-22039: Fixed denial of service vulnerability due to a memory leak in the inavi_add_ientry function (bsc#1186758).
- CVE-2020-22043: Fixed denial of service vulnerability due to a memory leak at the fifo_alloc_common function in libavutil/fifo.c (bsc#1186762).
- CVE-2020-22044: Fixed denial of service vulnerability due to a memory leak in the url_open_dyn_buf_internal function in libavformat/aviobuf.c (bsc#1186763).
- CVE-2020-22033,CVE-2020-22019: Fixed a heap-based Buffer Overflow Vulnerability at libavfilter/vf_vmafmotion.c in convolution_y_8bit() and in convolution_y_10bit() in libavfilter/vf_vmafmotion.c (bsc#1186615, bsc#1186597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172640">SUSE bug 1172640</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186406">SUSE bug 1186406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186583">SUSE bug 1186583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186586">SUSE bug 1186586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186587">SUSE bug 1186587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186596">SUSE bug 1186596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186597">SUSE bug 1186597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186598">SUSE bug 1186598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186600">SUSE bug 1186600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186603">SUSE bug 1186603</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186604">SUSE bug 1186604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186605">SUSE bug 1186605</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186613">SUSE bug 1186613</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186614">SUSE bug 1186614</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186615">SUSE bug 1186615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186616">SUSE bug 1186616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186658">SUSE bug 1186658</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186660">SUSE bug 1186660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186757">SUSE bug 1186757</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186758">SUSE bug 1186758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186762">SUSE bug 1186762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186763">SUSE bug 1186763</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-17539/">CVE-2019-17539</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-13904/">CVE-2020-13904</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20448/">CVE-2020-20448</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20451/">CVE-2020-20451</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21041/">CVE-2020-21041</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22015/">CVE-2020-22015</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-22016/">CVE-2020-22016</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22017/">CVE-2020-22017</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22019/">CVE-2020-22019</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22020/">CVE-2020-22020</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22021/">CVE-2020-22021</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22022/">CVE-2020-22022</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22023/">CVE-2020-22023</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22025/">CVE-2020-22025</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22026/">CVE-2020-22026</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22031/">CVE-2020-22031</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22032/">CVE-2020-22032</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22033/">CVE-2020-22033</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22034/">CVE-2020-22034</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22038/">CVE-2020-22038</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22039/">CVE-2020-22039</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22043/">CVE-2020-22043</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-22044/">CVE-2020-22044</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009615927" comment="libavcodec-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615928" comment="libavformat-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615929" comment="libavresample-devel-3.4.2-11.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615930" comment="libavresample3-3.4.2-11.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111972" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1164648" ref_url="https://bugzilla.suse.com/1164648" source="BUGZILLA"/>
		<reference ref_id="1174978" ref_url="https://bugzilla.suse.com/1174978" source="BUGZILLA"/>
		<reference ref_id="1176771" ref_url="https://bugzilla.suse.com/1176771" source="BUGZILLA"/>
		<reference ref_id="1179610" ref_url="https://bugzilla.suse.com/1179610" source="BUGZILLA"/>
		<reference ref_id="1182470" ref_url="https://bugzilla.suse.com/1182470" source="BUGZILLA"/>
		<reference ref_id="1183712" ref_url="https://bugzilla.suse.com/1183712" source="BUGZILLA"/>
		<reference ref_id="1184212" ref_url="https://bugzilla.suse.com/1184212" source="BUGZILLA"/>
		<reference ref_id="1184685" ref_url="https://bugzilla.suse.com/1184685" source="BUGZILLA"/>
		<reference ref_id="1185195" ref_url="https://bugzilla.suse.com/1185195" source="BUGZILLA"/>
		<reference ref_id="1185486" ref_url="https://bugzilla.suse.com/1185486" source="BUGZILLA"/>
		<reference ref_id="1185589" ref_url="https://bugzilla.suse.com/1185589" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185701" ref_url="https://bugzilla.suse.com/1185701" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186463" ref_url="https://bugzilla.suse.com/1186463" source="BUGZILLA"/>
		<reference ref_id="1186666" ref_url="https://bugzilla.suse.com/1186666" source="BUGZILLA"/>
		<reference ref_id="1186672" ref_url="https://bugzilla.suse.com/1186672" source="BUGZILLA"/>
		<reference ref_id="1186752" ref_url="https://bugzilla.suse.com/1186752" source="BUGZILLA"/>
		<reference ref_id="1186949" ref_url="https://bugzilla.suse.com/1186949" source="BUGZILLA"/>
		<reference ref_id="1186950" ref_url="https://bugzilla.suse.com/1186950" source="BUGZILLA"/>
		<reference ref_id="1186951" ref_url="https://bugzilla.suse.com/1186951" source="BUGZILLA"/>
		<reference ref_id="1186952" ref_url="https://bugzilla.suse.com/1186952" source="BUGZILLA"/>
		<reference ref_id="1186953" ref_url="https://bugzilla.suse.com/1186953" source="BUGZILLA"/>
		<reference ref_id="1186954" ref_url="https://bugzilla.suse.com/1186954" source="BUGZILLA"/>
		<reference ref_id="1186955" ref_url="https://bugzilla.suse.com/1186955" source="BUGZILLA"/>
		<reference ref_id="1186956" ref_url="https://bugzilla.suse.com/1186956" source="BUGZILLA"/>
		<reference ref_id="1186957" ref_url="https://bugzilla.suse.com/1186957" source="BUGZILLA"/>
		<reference ref_id="1186958" ref_url="https://bugzilla.suse.com/1186958" source="BUGZILLA"/>
		<reference ref_id="1186959" ref_url="https://bugzilla.suse.com/1186959" source="BUGZILLA"/>
		<reference ref_id="1186960" ref_url="https://bugzilla.suse.com/1186960" source="BUGZILLA"/>
		<reference ref_id="1186961" ref_url="https://bugzilla.suse.com/1186961" source="BUGZILLA"/>
		<reference ref_id="1186962" ref_url="https://bugzilla.suse.com/1186962" source="BUGZILLA"/>
		<reference ref_id="1186963" ref_url="https://bugzilla.suse.com/1186963" source="BUGZILLA"/>
		<reference ref_id="1186964" ref_url="https://bugzilla.suse.com/1186964" source="BUGZILLA"/>
		<reference ref_id="1186965" ref_url="https://bugzilla.suse.com/1186965" source="BUGZILLA"/>
		<reference ref_id="1186966" ref_url="https://bugzilla.suse.com/1186966" source="BUGZILLA"/>
		<reference ref_id="1186967" ref_url="https://bugzilla.suse.com/1186967" source="BUGZILLA"/>
		<reference ref_id="1186968" ref_url="https://bugzilla.suse.com/1186968" source="BUGZILLA"/>
		<reference ref_id="1186969" ref_url="https://bugzilla.suse.com/1186969" source="BUGZILLA"/>
		<reference ref_id="1186970" ref_url="https://bugzilla.suse.com/1186970" source="BUGZILLA"/>
		<reference ref_id="1186971" ref_url="https://bugzilla.suse.com/1186971" source="BUGZILLA"/>
		<reference ref_id="1186972" ref_url="https://bugzilla.suse.com/1186972" source="BUGZILLA"/>
		<reference ref_id="1186973" ref_url="https://bugzilla.suse.com/1186973" source="BUGZILLA"/>
		<reference ref_id="1186974" ref_url="https://bugzilla.suse.com/1186974" source="BUGZILLA"/>
		<reference ref_id="1186976" ref_url="https://bugzilla.suse.com/1186976" source="BUGZILLA"/>
		<reference ref_id="1186977" ref_url="https://bugzilla.suse.com/1186977" source="BUGZILLA"/>
		<reference ref_id="1186978" ref_url="https://bugzilla.suse.com/1186978" source="BUGZILLA"/>
		<reference ref_id="1186979" ref_url="https://bugzilla.suse.com/1186979" source="BUGZILLA"/>
		<reference ref_id="1186980" ref_url="https://bugzilla.suse.com/1186980" source="BUGZILLA"/>
		<reference ref_id="1186981" ref_url="https://bugzilla.suse.com/1186981" source="BUGZILLA"/>
		<reference ref_id="1186982" ref_url="https://bugzilla.suse.com/1186982" source="BUGZILLA"/>
		<reference ref_id="1186983" ref_url="https://bugzilla.suse.com/1186983" source="BUGZILLA"/>
		<reference ref_id="1186984" ref_url="https://bugzilla.suse.com/1186984" source="BUGZILLA"/>
		<reference ref_id="1186985" ref_url="https://bugzilla.suse.com/1186985" source="BUGZILLA"/>
		<reference ref_id="1186986" ref_url="https://bugzilla.suse.com/1186986" source="BUGZILLA"/>
		<reference ref_id="1186987" ref_url="https://bugzilla.suse.com/1186987" source="BUGZILLA"/>
		<reference ref_id="1186988" ref_url="https://bugzilla.suse.com/1186988" source="BUGZILLA"/>
		<reference ref_id="1186989" ref_url="https://bugzilla.suse.com/1186989" source="BUGZILLA"/>
		<reference ref_id="1186990" ref_url="https://bugzilla.suse.com/1186990" source="BUGZILLA"/>
		<reference ref_id="1186991" ref_url="https://bugzilla.suse.com/1186991" source="BUGZILLA"/>
		<reference ref_id="1186992" ref_url="https://bugzilla.suse.com/1186992" source="BUGZILLA"/>
		<reference ref_id="1186993" ref_url="https://bugzilla.suse.com/1186993" source="BUGZILLA"/>
		<reference ref_id="1186994" ref_url="https://bugzilla.suse.com/1186994" source="BUGZILLA"/>
		<reference ref_id="1186995" ref_url="https://bugzilla.suse.com/1186995" source="BUGZILLA"/>
		<reference ref_id="1186996" ref_url="https://bugzilla.suse.com/1186996" source="BUGZILLA"/>
		<reference ref_id="1186997" ref_url="https://bugzilla.suse.com/1186997" source="BUGZILLA"/>
		<reference ref_id="1186998" ref_url="https://bugzilla.suse.com/1186998" source="BUGZILLA"/>
		<reference ref_id="1186999" ref_url="https://bugzilla.suse.com/1186999" source="BUGZILLA"/>
		<reference ref_id="1187000" ref_url="https://bugzilla.suse.com/1187000" source="BUGZILLA"/>
		<reference ref_id="1187001" ref_url="https://bugzilla.suse.com/1187001" source="BUGZILLA"/>
		<reference ref_id="1187002" ref_url="https://bugzilla.suse.com/1187002" source="BUGZILLA"/>
		<reference ref_id="1187003" ref_url="https://bugzilla.suse.com/1187003" source="BUGZILLA"/>
		<reference ref_id="1187038" ref_url="https://bugzilla.suse.com/1187038" source="BUGZILLA"/>
		<reference ref_id="1187050" ref_url="https://bugzilla.suse.com/1187050" source="BUGZILLA"/>
		<reference ref_id="1187067" ref_url="https://bugzilla.suse.com/1187067" source="BUGZILLA"/>
		<reference ref_id="1187068" ref_url="https://bugzilla.suse.com/1187068" source="BUGZILLA"/>
		<reference ref_id="1187069" ref_url="https://bugzilla.suse.com/1187069" source="BUGZILLA"/>
		<reference ref_id="1187072" ref_url="https://bugzilla.suse.com/1187072" source="BUGZILLA"/>
		<reference ref_id="1187143" ref_url="https://bugzilla.suse.com/1187143" source="BUGZILLA"/>
		<reference ref_id="1187144" ref_url="https://bugzilla.suse.com/1187144" source="BUGZILLA"/>
		<reference ref_id="1187171" ref_url="https://bugzilla.suse.com/1187171" source="BUGZILLA"/>
		<reference ref_id="1187263" ref_url="https://bugzilla.suse.com/1187263" source="BUGZILLA"/>
		<reference ref_id="1187356" ref_url="https://bugzilla.suse.com/1187356" source="BUGZILLA"/>
		<reference ref_id="1187402" ref_url="https://bugzilla.suse.com/1187402" source="BUGZILLA"/>
		<reference ref_id="1187403" ref_url="https://bugzilla.suse.com/1187403" source="BUGZILLA"/>
		<reference ref_id="1187404" ref_url="https://bugzilla.suse.com/1187404" source="BUGZILLA"/>
		<reference ref_id="1187407" ref_url="https://bugzilla.suse.com/1187407" source="BUGZILLA"/>
		<reference ref_id="1187408" ref_url="https://bugzilla.suse.com/1187408" source="BUGZILLA"/>
		<reference ref_id="1187409" ref_url="https://bugzilla.suse.com/1187409" source="BUGZILLA"/>
		<reference ref_id="1187410" ref_url="https://bugzilla.suse.com/1187410" source="BUGZILLA"/>
		<reference ref_id="1187411" ref_url="https://bugzilla.suse.com/1187411" source="BUGZILLA"/>
		<reference ref_id="1187412" ref_url="https://bugzilla.suse.com/1187412" source="BUGZILLA"/>
		<reference ref_id="1187413" ref_url="https://bugzilla.suse.com/1187413" source="BUGZILLA"/>
		<reference ref_id="1187452" ref_url="https://bugzilla.suse.com/1187452" source="BUGZILLA"/>
		<reference ref_id="1187554" ref_url="https://bugzilla.suse.com/1187554" source="BUGZILLA"/>
		<reference ref_id="1187595" ref_url="https://bugzilla.suse.com/1187595" source="BUGZILLA"/>
		<reference ref_id="1187601" ref_url="https://bugzilla.suse.com/1187601" source="BUGZILLA"/>
		<reference ref_id="1187795" ref_url="https://bugzilla.suse.com/1187795" source="BUGZILLA"/>
		<reference ref_id="1187867" ref_url="https://bugzilla.suse.com/1187867" source="BUGZILLA"/>
		<reference ref_id="1187883" ref_url="https://bugzilla.suse.com/1187883" source="BUGZILLA"/>
		<reference ref_id="1187886" ref_url="https://bugzilla.suse.com/1187886" source="BUGZILLA"/>
		<reference ref_id="1187927" ref_url="https://bugzilla.suse.com/1187927" source="BUGZILLA"/>
		<reference ref_id="1187972" ref_url="https://bugzilla.suse.com/1187972" source="BUGZILLA"/>
		<reference ref_id="1187980" ref_url="https://bugzilla.suse.com/1187980" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-26558" ref_url="https://www.suse.com/security/cve/CVE-2020-26558/" source="CVE"/>
		<reference ref_id="CVE-2020-36385" ref_url="https://www.suse.com/security/cve/CVE-2020-36385/" source="CVE"/>
		<reference ref_id="CVE-2020-36386" ref_url="https://www.suse.com/security/cve/CVE-2020-36386/" source="CVE"/>
		<reference ref_id="CVE-2021-0129" ref_url="https://www.suse.com/security/cve/CVE-2021-0129/" source="CVE"/>
		<reference ref_id="CVE-2021-0512" ref_url="https://www.suse.com/security/cve/CVE-2021-0512/" source="CVE"/>
		<reference ref_id="CVE-2021-0605" ref_url="https://www.suse.com/security/cve/CVE-2021-0605/" source="CVE"/>
		<reference ref_id="CVE-2021-33624" ref_url="https://www.suse.com/security/cve/CVE-2021-33624/" source="CVE"/>
		<reference ref_id="CVE-2021-34693" ref_url="https://www.suse.com/security/cve/CVE-2021-34693/" source="CVE"/>
		<reference ref_id="CVE-2021-3573" ref_url="https://www.suse.com/security/cve/CVE-2021-3573/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009131.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3573: Fixed an UAF vulnerability in function that can allow attackers to corrupt kernel heaps and adopt further exploitations. (bsc#1186666)
- CVE-2021-0605: Fixed an out-of-bounds read which could lead to local information disclosure in the kernel with System execution privileges needed. (bsc#1187601)
- CVE-2021-0512: Fixed a possible out-of-bounds write which could lead to local escalation of privilege with no additional execution privileges needed. (bsc#1187595)
- CVE-2021-33624: Fixed a bug which allows unprivileged BPF program to leak the contents of arbitrary kernel memory (and therefore, of all physical memory) via a side-channel. (bsc#1187554)
- CVE-2021-34693: Fixed a bug in net/can/bcm.c which could allow local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized. (bsc#1187452)
- CVE-2021-0129: Fixed improper access control in BlueZ that may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bnc#1186463).
- CVE-2020-36385: Fixed a use-after-free via the ctx_list in some ucma_migrate_id situations where ucma_close is called (bnc#1187050).
- CVE-2020-26558: Fixed Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 (bnc#1179610, bnc#1186463).
- CVE-2020-36386: Fixed an out-of-bounds read issue in hci_extended_inquiry_result_evt (bnc#1187038).

The following non-security bugs were fixed:

- acpica: Clean up context mutex during object deletion (git-fixes).
- alsa: hda/cirrus: Set Initial DMIC volume to -26 dB (git-fixes).
- alsa: hda: Fix for mute key LED for HP Pavilion 15-CK0xx (git-fixes).
- alsa: timer: Fix master timer notification (git-fixes).
- alx: Fix an error handling path in 'alx_probe()' (git-fixes).
- arch: Add arch-dependent support markers in supported.conf (bsc#1186672)
- arch: Add the support for kernel-FLAVOR-optional subpackage (jsc#SLE-11796)
- ASoC: Intel: bytcr_rt5640: Add quirk for the Glavey TM800A550L tablet (git-fixes).
- ASoC: Intel: bytcr_rt5640: Add quirk for the Lenovo Miix 3-830 tablet (git-fixes).
- ASoC: max98088: fix ni clock divider calculation (git-fixes).
- ASoC: rt5659: Fix the lost powers for the HDA header (git-fixes).
- ASoC: sti-sas: add missing MODULE_DEVICE_TABLE (git-fixes).
- ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd() (git-fixes).
- batman-adv: Avoid WARN_ON timing related checks (git-fixes).
- be2net: Fix an error handling path in 'be_probe()' (git-fixes).
- blk-settings: align max_sectors on 'logical_block_size' boundary (bsc#1185195).
- block: Discard page cache of zone reset target range (bsc#1187402).
- block: return the correct bvec when checking for gaps (bsc#1187143).
- block: return the correct bvec when checking for gaps (bsc#1187144).
- bluetooth: fix the erroneous flush_work() order (git-fixes).
- bluetooth: use correct lock to prevent UAF of hdev object (git-fixes).
- bnxt_en: Call bnxt_ethtool_free() in bnxt_init_one() error path (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Fix TQM fastpath ring backing store computation (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Rediscover PHY capabilities after firmware reset (jsc#SLE-8371 bsc#1153274).
- bpfilter: Specify the log level for the kmsg message (bsc#1155518).
- brcmfmac: properly check for bus register errors (git-fixes).
- btrfs: open device without device_list_mutex (bsc#1176771).
- bus: ti-sysc: Fix flakey idling of uarts and stop using swsup_sidle_act (git-fixes).
- can: mcba_usb: fix memory leak in mcba_usb (git-fixes).
- ceph: must hold snap_rwsem when filling inode for async create (bsc#1187927).
- cfg80211: avoid double free of PMSR request (git-fixes).
- cfg80211: make certificate generation more robust (git-fixes).
- cgroup1: do not allow '\n' in renaming (bsc#1187972).
- char: hpet: add checks after calling ioremap (git-fixes).
- CPU: Startup failed when SNC (sub-numa cluster) is enabled with 3 NIC add-on cards installed (bsc#1187263).
- cxgb4: avoid accessing registers when clearing filters (git-fixes).
- cxgb4: avoid link re-train during TC-MQPRIO configuration (jsc#SLE-8389).
- cxgb4: fix wrong shift (git-fixes).
- dax: Add a wakeup mode parameter to put_unlocked_entry() (bsc#1187411).
- dax: Add an enum for specifying dax wakup mode (bsc#1187411).
- dax: fix ENOMEM handling in grab_mapping_entry() (bsc#1184212).
- dax: Wake up all waiters after invalidating dax entry (bsc#1187411).
- dmaengine: ALTERA_MSGDMA depends on HAS_IOMEM (git-fixes).
- dmaengine: pl330: fix wrong usage of spinlock flags in dma_cyclc (git-fixes).
- dmaengine: qcom_hidma: comment platform_driver_register call (git-fixes).
- dmaengine: QCOM_HIDMA_MGMT depends on HAS_IOMEM (git-fixes).
- dmaengine: stedma40: add missing iounmap() on error in d40_probe() (git-fixes).
- drm/amd/amdgpu: fix a potential deadlock in gpu reset (git-fixes).
- drm/amd/amdgpu: fix refcount leak (git-fixes).
- drm/amd/display: Allow bandwidth validation for 0 streams (git-fixes).
- drm/amd/display: Disconnect non-DP with no EDID (git-fixes).
- drm/amdgpu: Fix a use-after-free (git-fixes).
- drm/amdgpu: make sure we unpin the UVD BO (git-fixes).
- drm/tegra: sor: Do not leak runtime PM reference (git-fixes).
- drm: Fix use-after-free read in drm_getunique() (git-fixes).
- drm: Lock pointer access in drm_master_release() (git-fixes).
- dt-bindings: reset: meson8b: fix duplicate reset IDs (git-fixes).
- efi: Allow EFI_MEMORY_XP and EFI_MEMORY_RO both to be cleared (git-fixes).
- efi: cper: fix snprintf() use in cper_dimm_err_location() (git-fixes).
- ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (bsc#1187408).
- ext4: fix check to prevent false positive report of incorrect used inodes (bsc#1187404).
- ext4: fix error code in ext4_commit_super (bsc#1187407).
- ext4: fix memory leak in ext4_fill_super (bsc#1187409).
- FCOE: fcoe_wwn_from_mac kABI fix (bsc#1187886).
- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).
- fs: fix reporting supported extra file attributes for statx() (bsc#1187410).
- ftrace: Do not blindly read the ip address in ftrace_bug() (git-fixes).
- ftrace: Free the trampoline when ftrace_startup() fails (git-fixes).
- fuse: BUG_ON correction in fuse_dev_splice_write() (bsc#1187356).
- gpio: cadence: Add missing MODULE_DEVICE_TABLE (git-fixes).
- gpu: Enable CONFIG_PCI_PF_STUB for Nvidia Ampere vGPU support (jsc#SLE-17882 jsc#ECO-3691)
- gve: Add NULL pointer checks when freeing irqs (git-fixes).
- gve: Correct SKB queue index validation (git-fixes).
- gve: Upgrade memory barrier in poll routine (git-fixes).
- HID: Add BUS_VIRTUAL to hid_connect logging (git-fixes).
- HID: gt683r: add missing MODULE_DEVICE_TABLE (git-fixes).
- HID: hid-input: add mapping for emoji picker key (git-fixes).
- HID: hid-sensor-hub: Return error for hid_set_field() failure (git-fixes).
- HID: i2c-hid: fix format string mismatch (git-fixes).
- HID: i2c-hid: Skip ELAN power-on command after reset (git-fixes).
- HID: magicmouse: fix NULL-deref on disconnect (git-fixes).
- HID: multitouch: require Finger field to mark Win8 reports as MT (git-fixes).
- HID: pidff: fix error return code in hid_pidff_init() (git-fixes).
- HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65 (git-fixes).
- HID: usbhid: fix info leak in hid_submit_ctrl (git-fixes).
- HID: usbhid: Fix race between usbhid_close() and usbhid_stop() (git-fixes).
- hwmon: (dell-smm-hwmon) Fix index values (git-fixes).
- hwmon: (scpi-hwmon) shows the negative temperature properly (git-fixes).
- i2c: mpc: Make use of i2c_recover_bus() (git-fixes).
- i2c: qcom-geni: Suspend and resume the bus during SYSTEM_SLEEP_PM ops (git-fixes).
- ice: add ndo_bpf callback for safe mode netdev ops (jsc#SLE-7926).
- ice: Allow all LLDP packets from PF to Tx (jsc#SLE-7926).
- ice: Fix VFR issues for AVF drivers that expect ATQLEN cleared (git-fixes).
- isdn: mISDN: correctly handle ph_info allocation failure in hfcsusb_ph_info (git-fixes).
- isdn: mISDN: netjet: Fix crash in nj_probe: (git-fixes).
- isdn: mISDNinfineon: check/cleanup ioremap failure correctly in setup_io (git-fixes).
- ixgbe: fix large MTU request from VF (git-fixes).
- kABI workaround for struct lis3lv02d change (git-fixes).
- kernel-binary.spec.in: Add Supplements: for -extra package on Leap kernel-$flavor-extra should supplement kernel-$flavor on Leap, like it does on SLED, and like the kernel-$flavor-optional package does.
- kernel-binary.spec.in: build-id check requires elfutils.
- kernel-binary.spec.in: Regenerate makefile when not using mkmakefile.
- kernel-binary.spec: Only use mkmakefile when it exists Linux 5.13 no longer had a mkmakefile script
- kernel: kexec_file: fix error return code of kexec_calculate_store_digests() (git-fixes).
- kthread: prevent deadlock when kthread_mod_delayed_work() races with kthread_cancel_delayed_work_sync() (bsc#1187867).
- kthread_worker: split code for canceling the delayed work timer (bsc#1187867).
- kyber: fix out of bounds access when preempted (bsc#1187403).
- lib: vdso: Remove CROSS_COMPILE_COMPAT_VDSO (bsc#1164648,jsc#SLE-11493).
- libertas: register sysfs groups properly (git-fixes).
- locking/mutex: clear MUTEX_FLAGS if wait_list is empty due to signal (git-fixes).
- md: Fix missing unused status line of /proc/mdstat (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: dvb: Add check on sp8870_readreg return (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: mt9m111: Check write_bridge for timeout (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: gspca: properly check for errors in po1030_probe() (git-fixes).
- media: mtk-mdp: Check return value of of_clk_get (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- mei: request autosuspend after sending rx flow control (git-fixes).
- mmc: meson-gx: use memcpy_to/fromio for dram-access-quirk (git-fixes).
- module: limit enabling module.sig_enforce (git-fixes).
- net/mlx4: Fix EEPROM dump support (git-fixes).
- net/mlx5: Consider RoCE cap before init RDMA resources (git-fixes).
- net/mlx5: DR, Create multi-destination flow table with level less than 64 (jsc#SLE-8464).
- net/mlx5: Fix PBMC register mapping (git-fixes).
- net/mlx5: Fix placement of log_max_flow_counter (git-fixes).
- net/mlx5: Fix sleep while atomic in mlx5_eswitch_get_vepa (git-fixes).
- net/mlx5e: Block offload of outer header csum for UDP tunnels (git-fixes).
- net/mlx5e: Fix multipath lag activation (git-fixes).
- net/mlx5e: Fix nullptr in add_vlan_push_action() (git-fixes).
- net/mlx5e: Fix page reclaim for dead peer hairpin (git-fixes).
- net/mlx5e: Remove dependency in IPsec initialization flows (git-fixes).
- net/nfc/rawsock.c: fix a permission check bug (git-fixes).
- net/sched: act_ct: handle DNAT tuple collision (bsc#1154353).
- net/x25: Return the correct errno code (git-fixes).
- net: bnx2: Fix error return code in bnx2_init_board() (git-fixes).
- net: fix iteration for sctp transport seq_files (git-fixes).
- net: hns3: Limiting the scope of vector_ring_chain variable (git-fixes).
- net: hns3: put off calling register_netdev() until client initialize complete (bsc#1154353).
- net: mvpp2: add mvpp2_phylink_to_port() helper (bsc#1187171).
- netxen_nic: Fix an error handling path in 'netxen_nic_probe()' (git-fixes).
- nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect (git-fixes).
- NFC: SUSE specific brutal fix for runtime PM (bsc#1185589).
- NFS: Deal correctly with attribute generation counter overflow (git-fixes).
- NFS: Do not corrupt the value of pg_bytes_written in nfs_do_recoalesce() (git-fixes).
- NFS: Do not discard pNFS layout segments that are marked for return (git-fixes).
- NFS: Do not gratuitously clear the inode cache when lookup failed (git-fixes).
- NFS: Do not revalidate the directory permissions on a lookup failure (git-fixes).
- NFS: Fix a potential NULL dereference in nfs_get_client() (git-fixes).
- NFS: fix an incorrect limit in filelayout_decode_layout() (git-fixes).
- NFS: Fix an Oopsable condition in __nfs_pageio_add_request() (git-fixes).
- NFS: Fix use-after-free in nfs4_init_client() (git-fixes).
- nfsd: register pernet ops last, unregister first (git-fixes).
- NFSD: Repair misuse of sv_lock in 5.10.16-rt30 (git-fixes).
- NFSv4.2 fix handling of sr_eof in SEEK's reply (git-fixes).
- NFSv4.2: Always flush out writes in nfs42_proc_fallocate() (git-fixes).
- NFSv4.2: fix return value of _nfs4_get_security_label() (git-fixes).
- NFSv4: Do not discard segments marked for return in _pnfs_return_layout() (git-fixes).
- NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() (git-fixes).
- NFSv4: Fix deadlock between nfs4_evict_inode() and nfs4_opendata_get_inode() (git-fixes).
- NFSv4: Fix v4.0/v4.1 SEEK_DATA return -ENOTSUPP when set NFS_V4_2 config (git-fixes).
- ocfs2: fix data corruption by fallocate (bsc#1187412).
- PCI/LINK: Remove bandwidth notification (bsc#1183712).
- PCI: aardvark: Do not rely on jiffies while holding spinlock (git-fixes).
- PCI: aardvark: Fix kernel panic during PIO transfer (git-fixes).
- PCI: Add ACS quirk for Broadcom BCM57414 NIC (git-fixes).
- PCI: Mark some NVIDIA GPUs to avoid bus reset (git-fixes).
- PCI: Mark TI C667X to avoid bus reset (git-fixes).
- PCI: Work around Huawei Intelligent NIC VF FLR erratum (git-fixes).
- perf/x86/intel/uncore: Remove uncore extra PCI dev HSWEP_PCI_PCU_3 (bsc#1184685).
- pid: take a reference when initializing `cad_pid` (bsc#1152489).
- platform/x86: hp-wireless: add AMD's hardware id to the supported list (git-fixes).
- platform/x86: hp_accel: Avoid invoking _INI to speed up resume (git-fixes).
- platform/x86: intel_punit_ipc: Append MODULE_DEVICE_TABLE for ACPI (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Mediacom Winpad 7.0 W700 tablet (git-fixes).
- PM: sleep: Add pm_debug_messages kernel command line option (bsc#1186752).
- pNFS/flexfiles: fix incorrect size check in decode_nfs_fh() (git-fixes).
- pNFS/NFSv4: Fix a layout segment leak in pnfs_layout_process() (git-fixes).
- qla2xxx: synchronize rport dev_loss_tmo setting (bsc#1182470 bsc#1185486).
- qlcnic: Fix an error handling path in 'qlcnic_probe()' (git-fixes).
- radeon: use memcpy_to/fromio for UVD fw upload (git-fixes).
- regulator: bd70528: Fix off-by-one for buck123 .n_voltages setting (git-fixes).
- regulator: core: resolve supply for boot-on/always-on regulators (git-fixes).
- regulator: max77620: Use device_set_of_node_from_dev() (git-fixes).
- Revert 'ath6kl: return error code in ath6kl_wmi_set_roam_lrssi_cmd()' (git-fixes).
- Revert 'brcmfmac: add a check for the status of usb_register' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'char: hpet: fix a missing check of ioremap' (git-fixes).
- Revert 'dmaengine: qcom_hidma: Check for driver register failure' (git-fixes).
- Revert 'ecryptfs: replace BUG_ON with error handling code' (bsc#1187413).
- Revert 'ibmvnic: simplify reset_long_term_buff function' (bsc#1186206 ltc#191041).
- Revert 'isdn: mISDN: Fix potential NULL pointer dereference of kzalloc' (git-fixes).
- Revert 'isdn: mISDNinfineon: fix potential NULL pointer dereference' (git-fixes).
- Revert 'libertas: add checks for the return value of sysfs_create_group' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: dvb: Add check on sp8870_readreg' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: Check the return value of write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: gspca: mt9m111: Check write_bridge for timeout' (git-fixes).
- Revert 'media: usb: gspca: add a missed check for goto_low_power' (git-fixes).
- Revert 'net: liquidio: fix a NULL pointer dereference' (git-fixes).
- Revert 'PCI: PM: Do not read power state in pci_enable_device_flags()' (git-fixes).
- Revert 'qlcnic: Avoid potential NULL pointer dereference' (git-fixes).
- Revert 'scsi: core: run queue if SCSI device queue isn't ready and queue is idle' (bsc#1186949).
- Revert 'serial: max310x: pass return value of spi_register_driver' (git-fixes).
- Revert 'video: hgafb: fix potential NULL pointer dereference' (git-fixes).
- Revert 'video: imsttfb: fix potential NULL pointer dereferences' (bsc#1152489)
- rpm/kernel-binary.spec.in: Correct Supplements in optional subpkg (jsc#SLE-11796)
- rpm/kernel-binary.spec.in: Fix handling of +arch marker (bsc#1186672)
- rpm/split-modules: Avoid errors even if Module.* are not present
- s390/stack: fix possible register corruption with stack switch helper (bsc#1185677).
- sched/debug: Fix cgroup_path[] serialization (git-fixes)
- sched/fair: Keep load_avg and load_sum synced (git-fixes)
- scsi: aacraid: Fix an oops in error handling (bsc#1187072).
- scsi: aacraid: Remove erroneous fallthrough annotation (bsc#1186950).
- scsi: aacraid: Use memdup_user() as a cleanup (bsc#1186951).
- scsi: acornscsi: Fix an error handling path in acornscsi_probe() (bsc#1186952).
- scsi: be2iscsi: Fix a theoretical leak in beiscsi_create_eqs() (bsc#1186953).
- scsi: be2iscsi: Revert 'Fix a theoretical leak in beiscsi_create_eqs()' (bsc#1187067).
- scsi: bfa: Fix error return in bfad_pci_init() (bsc#1186954).
- scsi: bnx2fc: Fix Kconfig warning and CNIC build errors (bsc#1186955).
- scsi: bnx2i: Requires MMU (bsc#1186956).
- scsi: core: Fix race between handling STS_RESOURCE and completion (bsc#1187883).
- scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() (bsc#1186957).
- scsi: cumana_2: Fix different dev_id between request_irq() and free_irq() (bsc#1186958).
- scsi: cxgb3i: Fix some leaks in init_act_open() (bsc#1186959).
- scsi: cxgb4i: Fix TLS dependency (bsc#1186960).
- scsi: eesox: Fix different dev_id between request_irq() and free_irq() (bsc#1186961).
- scsi: fcoe: Fix mismatched fcoe_wwn_from_mac declaration (bsc#1187886).
- scsi: fnic: Fix error return code in fnic_probe() (bsc#1186962).
- scsi: hisi_sas: Fix IRQ checks (bsc#1186963).
- scsi: hisi_sas: Remove preemptible() (bsc#1186964).
- scsi: jazz_esp: Add IRQ check (bsc#1186965).
- scsi: libfc: Fix enum-conversion warning (bsc#1186966).
- scsi: libsas: Fix error path in sas_notify_lldd_dev_found() (bsc#1186967).
- scsi: libsas: Reset num_scatter if libata marks qc as NODATA (bsc#1187068).
- scsi: libsas: Set data_dir as DMA_NONE if libata marks qc as NODATA (bsc#1186968).
- scsi: lpfc: Fix ancient double free (bsc#1186969).
- scsi: lpfc: Fix failure to transmit ABTS on FC link (git-fixes).
- scsi: megaraid_sas: Check user-provided offsets (bsc#1186970).
- scsi: megaraid_sas: Clear affinity hint (bsc#1186971).
- scsi: megaraid_sas: Do not call disable_irq from process IRQ poll (bsc#1186972).
- scsi: megaraid_sas: Fix MEGASAS_IOC_FIRMWARE regression (bsc#1186973).
- scsi: megaraid_sas: Remove undefined ENABLE_IRQ_POLL macro (bsc#1186974).
- scsi: mesh: Fix panic after host or bus reset (bsc#1186976).
- scsi: mpt3sas: Do not use GFP_KERNEL in atomic context (bsc#1186977).
- scsi: mpt3sas: Fix error return code of mpt3sas_base_attach() (bsc#1186978).
- scsi: mpt3sas: Fix ioctl timeout (bsc#1186979).
- scsi: myrs: Fix a double free in myrs_cleanup() (bsc#1186980).
- scsi: pm80xx: Fix error return in pm8001_pci_probe() (bsc#1186981).
- scsi: powertec: Fix different dev_id between request_irq() and free_irq() (bsc#1186982).
- scsi: qedi: Check for buffer overflow in qedi_set_path() (bsc#1186983).
- scsi: qedi: Fix error return code of qedi_alloc_global_queues() (bsc#1186984).
- scsi: qedi: Fix missing destroy_workqueue() on error in __qedi_probe (bsc#1186985).
- scsi: qla2xxx: Prevent PRLI in target mode (git-fixes).
- scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' (bsc#1186986).
- scsi: qla4xxx: Remove in_interrupt() (bsc#1186987).
- scsi: scsi_debug: Add check for sdebug_max_queue during module init (bsc#1186988).
- scsi: scsi_dh_alua: Retry RTPG on a different path after failure (bsc#1174978 bsc#1185701).
- scsi: sd: Fix Opal support (bsc#1186989).
- scsi: sni_53c710: Add IRQ check (bsc#1186990).
- scsi: sun3x_esp: Add IRQ check (bsc#1186991).
- scsi: ufs-qcom: Fix scheduling while atomic issue (bsc#1187002).
- scsi: ufs: Add quirk to disallow reset of interrupt aggregation (bsc#1186992).
- scsi: ufs: Add quirk to enable host controller without hce (bsc#1186993).
- scsi: ufs: Add quirk to fix abnormal ocs fatal error (bsc#1186994).
- scsi: ufs: Add quirk to fix mishandling utrlclr/utmrlclr (bsc#1186995).
- scsi: ufs: core: Narrow down fast path in system suspend path (bsc#1186996).
- scsi: ufs: Do not update urgent bkops level when toggling auto bkops (bsc#1186997).
- scsi: ufs: Fix imprecise load calculation in devfreq window (bsc#1187795).
- SCSI: ufs: fix ktime_t kabi change (bsc#1187795).
- scsi: ufs: Fix race between shutdown and runtime resume flow (bsc#1186998).
- scsi: ufs: Introduce UFSHCD_QUIRK_PRDT_BYTE_GRAN quirk (bsc#1187000).
- scsi: ufs: Make ufshcd_print_trs() consider UFSHCD_QUIRK_PRDT_BYTE_GRAN (bsc#1187069).
- scsi: ufs: Properly release resources if a task is aborted successfully (bsc#1187001).
- scsi: ufs: ufshcd-pltfrm depends on HAS_IOMEM (bsc#1187980).
- scsi: ufs: ufshcd-pltfrm: Fix deferred probing (bsc#1187003).
- scsi: ufshcd: use an enum for quirks (bsc#1186999).
- serial: max310x: unregister uart driver in case of failure and abort (git-fixes).
- serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' (git-fixes).
- spi: spi-nxp-fspi: move the register operation after the clock enable (git-fixes).
- spi: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- spi: stm32-qspi: Always wait BUSY bit to be cleared in stm32_qspi_wait_cmd() (git-fixes).
- staging: rtl8723bs: Fix uninitialized variables (git-fixes).
- sunrpc: fix refcount leak for rpc auth modules (git-fixes).
- SUNRPC: Handle major timeout in xprt_adjust_timeout() (git-fixes).
- SUNRPC: Move fault injection call sites (git-fixes).
- SUNRPC: Set memalloc_nofs_save() for sync tasks (git-fixes).
- svcrdma: disable timeouts on rdma backchannel (git-fixes).
- thermal/drivers/intel: Initialize RW trip to THERMAL_TEMP_INVALID (git-fixes).
- tpm: fix error return code in tpm2_get_cc_attrs_tbl() (git-fixes).
- tracing: Correct the length check which causes memory corruption (git-fixes).
- tracing: Do no increment trace_clock_global() by one (git-fixes).
- tracing: Do not stop recording cmdlines when tracing is off (git-fixes).
- tracing: Do not stop recording comms if the trace file is being read (git-fixes).
- tracing: Restructure trace_clock_global() to never block (git-fixes).
- ttyprintk: Add TTY hangup callback (git-fixes).
- usb: core: hub: Disable autosuspend for Cypress CY7C65632 (git-fixes).
- usb: core: reduce power-on-good delay time of root hub (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: core: fix kernel panic when do reboot (git-fixes).
- usb: dwc3: debugfs: Add and remove endpoint dirs dynamically (git-fixes).
- usb: dwc3: ep0: fix NULL pointer exception (git-fixes).
- USB: f_ncm: ncm_bitrate (speed) is unsigned (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: f_ncm: only first packet of aggregate needs to start timer (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadget panics on 10gbps cabling (git-fixes).
- usb: fix various gadgets null ptr deref on 10gbps cabling (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: eem: fix wrong eem header operation (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: gadget: f_fs: Ensure io_completion_wq is idle during unbind (git-fixes).
- usb: musb: fix MUSB_QUIRK_B_DISCONNECT_99 handling (git-fixes).
- usb: pd: Set PD_T_SINK_WAIT_CAP to 310ms (git-fixes).
- USB: serial: cp210x: fix alternate function for CP2102N QFN20 (git-fixes).
- USB: serial: ftdi_sio: add IDs for IDS GmbH Products (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: ftdi_sio: add NovaTech OrionMX product ID (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: omninet: add device id for Zyxel Omni 56K Plus (git-fixes).
- USB: serial: option: add Telit LE910-S1 compositions 0x7010, 0x7011 (git-fixes).
- USB: serial: pl2303: add device id for ADLINK ND-6530 GC (git-fixes).
- USB: serial: quatech2: fix control-request directions (git-fixes).
- USB: serial: ti_usb_3410_5052: add startech.com device id (git-fixes).
- usb: typec: mux: Fix copy-paste mistake in typec_mux_match (git-fixes).
- usb: typec: mux: Fix matching with typec_altmode_desc (git-fixes).
- usb: typec: tcpm: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- usb: typec: ucsi: Clear PPM capability data in ucsi_init() error path (git-fixes).
- usb: typec: wcove: Use LE to CPU conversion when accessing msg-&gt;header (git-fixes).
- USB: usbfs: Do not WARN about excessively large memory allocations (git-fixes).
- vfio/pci: Fix error return code in vfio_ecap_init() (git-fixes).
- vfio/pci: zap_vma_ptes() needs MMU (git-fixes).
- vfio/platform: fix module_put call in error flow (git-fixes).
- video: hgafb: correctly handle card detect failure during probe (git-fixes).
- video: hgafb: fix potential NULL pointer dereference (git-fixes).
- vmlinux.lds.h: Avoid orphan section with !SMP (git-fixes).
- vrf: fix maximum MTU (git-fixes).
- vsock/vmci: log once the failed queue pair allocation (git-fixes).
- wireguard: allowedips: initialize list head in selftest (git-fixes).
- wireguard: do not use -O3 (git-fixes).
- wireguard: peer: allocate in kmem_cache (git-fixes).
- wireguard: peer: put frequently used members above cache lines (git-fixes).
- wireguard: queueing: get rid of per-peer ring buffers (git-fixes).
- wireguard: selftests: make sure rp_filter is disabled on vethc (git-fixes).
- wireguard: selftests: remove old conntrack kconfig value (git-fixes).
- wireguard: use synchronize_net rather than synchronize_rcu (git-fixes).
- x86/apic: Mark _all_ legacy interrupts when IO/APIC is missing (bsc#1152489).
- x86/fault: Do not send SIGSEGV twice on SEGV_PKUERR (bsc#1152489).
- x86/pkru: Write hardware init value to PKRU when xstate is init (bsc#1152489).
- x86/process: Check PF_KTHREAD and not current-&gt;mm for kernel threads (bsc#1152489).
- x86: fix seq_file iteration for pat.c (git-fixes).
- xen-blkback: fix compatibility bug with single page rings (git-fixes).
- xen-pciback: reconfigure also from backend watch handler (git-fixes).
- xen-pciback: redo VF placement in the virtual topology (git-fixes).
- xen/evtchn: Change irq_info lock to raw_spinlock_t (git-fixes).
- xfrm: policy: Read seqcount outside of rcu-read side in xfrm_policy_lookup_bytype (bsc#1185675).
- xprtrdma: Avoid Receive Queue wrapping (git-fixes).
- xprtrdma: rpcrdma_mr_pop() already does list_del_init() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-14"/>
	<updated date="2021-07-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1164648">SUSE bug 1164648</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174978">SUSE bug 1174978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176771">SUSE bug 1176771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179610">SUSE bug 1179610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182470">SUSE bug 1182470</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183712">SUSE bug 1183712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184212">SUSE bug 1184212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184685">SUSE bug 1184685</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185195">SUSE bug 1185195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185486">SUSE bug 1185486</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185589">SUSE bug 1185589</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185701">SUSE bug 1185701</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186463">SUSE bug 1186463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186666">SUSE bug 1186666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186672">SUSE bug 1186672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186752">SUSE bug 1186752</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186949">SUSE bug 1186949</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186950">SUSE bug 1186950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186951">SUSE bug 1186951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186952">SUSE bug 1186952</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186953">SUSE bug 1186953</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186954">SUSE bug 1186954</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186955">SUSE bug 1186955</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186956">SUSE bug 1186956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186957">SUSE bug 1186957</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186958">SUSE bug 1186958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186959">SUSE bug 1186959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186960">SUSE bug 1186960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186961">SUSE bug 1186961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186962">SUSE bug 1186962</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186963">SUSE bug 1186963</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186964">SUSE bug 1186964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186965">SUSE bug 1186965</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186966">SUSE bug 1186966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186967">SUSE bug 1186967</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186968">SUSE bug 1186968</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186969">SUSE bug 1186969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186970">SUSE bug 1186970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186971">SUSE bug 1186971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186972">SUSE bug 1186972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186973">SUSE bug 1186973</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186974">SUSE bug 1186974</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186976">SUSE bug 1186976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186977">SUSE bug 1186977</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186978">SUSE bug 1186978</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186979">SUSE bug 1186979</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186980">SUSE bug 1186980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186981">SUSE bug 1186981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186982">SUSE bug 1186982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186983">SUSE bug 1186983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186984">SUSE bug 1186984</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186985">SUSE bug 1186985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186986">SUSE bug 1186986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186987">SUSE bug 1186987</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186988">SUSE bug 1186988</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186989">SUSE bug 1186989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186990">SUSE bug 1186990</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186991">SUSE bug 1186991</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186992">SUSE bug 1186992</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186993">SUSE bug 1186993</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186994">SUSE bug 1186994</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186995">SUSE bug 1186995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186996">SUSE bug 1186996</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186997">SUSE bug 1186997</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186998">SUSE bug 1186998</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186999">SUSE bug 1186999</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187000">SUSE bug 1187000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187001">SUSE bug 1187001</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187002">SUSE bug 1187002</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187003">SUSE bug 1187003</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187038">SUSE bug 1187038</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187050">SUSE bug 1187050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187067">SUSE bug 1187067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187068">SUSE bug 1187068</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187069">SUSE bug 1187069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187072">SUSE bug 1187072</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187143">SUSE bug 1187143</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187144">SUSE bug 1187144</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187171">SUSE bug 1187171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187263">SUSE bug 1187263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187356">SUSE bug 1187356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187402">SUSE bug 1187402</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187403">SUSE bug 1187403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187404">SUSE bug 1187404</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187407">SUSE bug 1187407</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187408">SUSE bug 1187408</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187409">SUSE bug 1187409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187410">SUSE bug 1187410</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187411">SUSE bug 1187411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187412">SUSE bug 1187412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187413">SUSE bug 1187413</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187452">SUSE bug 1187452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187554">SUSE bug 1187554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187595">SUSE bug 1187595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187601">SUSE bug 1187601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187795">SUSE bug 1187795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187867">SUSE bug 1187867</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187883">SUSE bug 1187883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187886">SUSE bug 1187886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187927">SUSE bug 1187927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187972">SUSE bug 1187972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187980">SUSE bug 1187980</bugzilla>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26558/">CVE-2020-26558</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-36385/">CVE-2020-36385</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-36386/">CVE-2020-36386</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-0129/">CVE-2021-0129</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0512/">CVE-2021-0512</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0605/">CVE-2021-0605</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-33624/">CVE-2021-33624</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34693/">CVE-2021-34693</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3573/">CVE-2021-3573</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009624292" comment="kernel-default-extra-5.3.18-24.70.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009624293" comment="kernel-preempt-extra-5.3.18-24.70.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111973" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1170511" ref_url="https://bugzilla.suse.com/1170511" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185308" ref_url="https://bugzilla.suse.com/1185308" source="BUGZILLA"/>
		<reference ref_id="1185791" ref_url="https://bugzilla.suse.com/1185791" source="BUGZILLA"/>
		<reference ref_id="1187215" ref_url="https://bugzilla.suse.com/1187215" source="BUGZILLA"/>
		<reference ref_id="1187585" ref_url="https://bugzilla.suse.com/1187585" source="BUGZILLA"/>
		<reference ref_id="1188036" ref_url="https://bugzilla.suse.com/1188036" source="BUGZILLA"/>
		<reference ref_id="1188062" ref_url="https://bugzilla.suse.com/1188062" source="BUGZILLA"/>
		<reference ref_id="1188080" ref_url="https://bugzilla.suse.com/1188080" source="BUGZILLA"/>
		<reference ref_id="1188116" ref_url="https://bugzilla.suse.com/1188116" source="BUGZILLA"/>
		<reference ref_id="1188121" ref_url="https://bugzilla.suse.com/1188121" source="BUGZILLA"/>
		<reference ref_id="1188176" ref_url="https://bugzilla.suse.com/1188176" source="BUGZILLA"/>
		<reference ref_id="1188267" ref_url="https://bugzilla.suse.com/1188267" source="BUGZILLA"/>
		<reference ref_id="1188268" ref_url="https://bugzilla.suse.com/1188268" source="BUGZILLA"/>
		<reference ref_id="1188269" ref_url="https://bugzilla.suse.com/1188269" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-22555" ref_url="https://www.suse.com/security/cve/CVE-2021-22555/" source="CVE"/>
		<reference ref_id="CVE-2021-33909" ref_url="https://www.suse.com/security/cve/CVE-2021-33909/" source="CVE"/>
		<reference ref_id="CVE-2021-35039" ref_url="https://www.suse.com/security/cve/CVE-2021-35039/" source="CVE"/>
		<reference ref_id="CVE-2021-3609" ref_url="https://www.suse.com/security/cve/CVE-2021-3609/" source="CVE"/>
		<reference ref_id="CVE-2021-3612" ref_url="https://www.suse.com/security/cve/CVE-2021-3612/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009194.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-22555: A heap out-of-bounds write was discovered in net/netfilter/x_tables.c (bnc#1188116).
- CVE-2021-33909: Extremely large seq buffer allocations in seq_file could lead to buffer underruns and code execution (bsc#1188062).
- CVE-2021-3609: A use-after-free in can/bcm could have led to privilege escalation (bsc#1187215).
- CVE-2021-3612: An out-of-bounds memory write flaw was found in the joystick devices subsystem in the way the user calls ioctl JSIOCSBTNMAP. This flaw allowed a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1187585 ).
- CVE-2021-35039: kernel/module.c mishandled Signature Verification, aka CID-0c18f29aae7c. Without CONFIG_MODULE_SIG, verification that a kernel module is signed, for loading via init_module, did not occur for a module.sig_enforce=1 command-line argument (bnc#1188080). NOTE that SUSE kernels are configured with CONFIG_MODULE_SIG=y, so are not affected.

The following non-security bugs were fixed:

- ACPI: APEI: fix synchronous external aborts in user-mode (git-fixes).
- ACPI: bus: Call kobject_put() in acpi_init() error path (git-fixes).
- ACPICA: Fix memory leak caused by _CID repair function (git-fixes).
- ACPI: EC: Make more Asus laptops use ECDT _GPE (git-fixes).
- ACPI: processor idle: Fix up C-state latency if not ordered (git-fixes).
- ACPI: property: Constify stubs for CONFIG_ACPI=n case (git-fixes).
- ACPI: resources: Add checks for ACPI IRQ override (git-fixes).
- ACPI: sysfs: Fix a buffer overrun problem with description_show() (git-fixes).
- ALSA: hda/realtek: Add another ALC236 variant support (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC mapping for Asus UM431D (git-fixes).
- ALSA: intel8x0: Fix breakage at ac97 clock measurement (git-fixes).
- ALSA: isa: Fix error return code in snd_cmi8330_probe() (git-fixes).
- ALSA: usb-audio: fix rate on Ozone Z90 USB headset (git-fixes).
- ALSA: usb-audio: scarlett2: Fix wrong resume call (git-fixes).
- ALSA: usb-audio: scarlett2: Read mixer volumes at init time (git-fixes).
- ALSA: usb-audio: scarlett2: Read mux at init time (git-fixes).
- amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create (bsc#1152472)
- ASoC: atmel-i2s: Fix usage of capture and playback at the same time (git-fixes).
- ASoC: cs42l42: Correct definition of CS42L42_ADC_PDN_MASK (git-fixes).
- ASoC: hisilicon: fix missing clk_disable_unprepare() on error in hi6210_i2s_startup() (git-fixes).
- ASoC: mediatek: mtk-btcvsd: Fix an error handling path in 'mtk_btcvsd_snd_probe()' (git-fixes).
- ASoC: rsnd: tidyup loop on rsnd_adg_clk_query() (git-fixes).
- ata: ahci_sunxi: Disable DIPM (git-fixes).
- ath10k: add missing error return code in ath10k_pci_probe() (git-fixes).
- ath10k: Fix an error code in ath10k_add_interface() (git-fixes).
- ath10k: go to path err_unsupported when chip id is not supported (git-fixes).
- ath10k: remove unused more_frags variable (git-fixes).
- ath9k: Fix kernel NULL pointer dereference during ath_reset_internal() (git-fixes).
- backlight: lm3630a_bl: Put fwnode in error case during -&gt;probe() (git-fixes).
- Bluetooth: Fix handling of HCI_LE_Advertising_Set_Terminated event (git-fixes).
- Bluetooth: mgmt: Fix slab-out-of-bounds in tlv_data_is_valid (git-fixes).
- brcmfmac: correctly report average RSSI in station info (git-fixes).
- brcmfmac: fix setting of station info chains bitmask (git-fixes).
- brcmsmac: mac80211_if: Fix a resource leak in an error handling path (git-fixes).
- can: gw: synchronize rcu operations before removing gw job entry (git-fixes).
- can: hi311x: hi3110_can_probe(): silence clang warning (git-fixes).
- can: peak_pciefd: pucan_handle_status(): fix a potential starvation issue in TX path (git-fixes).
- cfg80211: call cfg80211_leave_ocb when switching away from OCB (git-fixes).
- char: pcmcia: error out if 'num_bytes_read' is greater than 4 in set_protocol() (git-fixes).
- clk: actions: Fix bisp_factor_table based clocks on Owl S500 SoC (git-fixes).
- clk: actions: Fix SD clocks factor table on Owl S500 SoC (git-fixes).
- clk: actions: Fix UART clock dividers on Owl S500 SoC (git-fixes).
- clk: meson: g12a: fix gp0 and hifi ranges (git-fixes).
- clk: renesas: rcar-gen3: Update Z clock rate formula in comments (git-fixes).
- clk: si5341: Avoid divide errors due to bogus register contents (git-fixes).
- clk: si5341: Update initialization magic (git-fixes).
- clk: zynqmp: pll: Remove some dead code (git-fixes).
- clocksource: Retry clock read if long delays detected (git-fixes).
- cpufreq: sc520_freq: add 'fallthrough' to one case (git-fixes).
- crypto: ccp - Fix a resource leak in an error handling path (git-fixes).
- crypto: ixp4xx - dma_unmap the correct address (git-fixes).
- crypto: nitrox - fix unchecked variable in nitrox_register_interrupts (git-fixes).
- crypto: nx - add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: omap-sham - Fix PM reference leak in omap sham ops (git-fixes).
- crypto: qat - check return code of qat_hal_rd_rel_reg() (git-fixes).
- crypto: qat - remove unused macro in FW loader (git-fixes).
- crypto: ux500 - Fix error return code in hash_hw_final() (git-fixes).
- dmaengine: mediatek: do not issue a new desc if one is still current (git-fixes).
- dmaengine: mediatek: free the proper desc in desc_free handler (git-fixes).
- dmaengine: mediatek: use GFP_NOWAIT instead of GFP_ATOMIC in prep_dma (git-fixes).
- dmaengine: rcar-dmac: Fix PM reference leak in rcar_dmac_probe() (git-fixes).
- dmaengine: zynqmp_dma: Fix PM reference leak in zynqmp_dma_alloc_chan_resourc() (git-fixes).
- docs: admin-guide: update description for kernel.hotplug sysctl (git-fixes).
- dpaa2-eth: fix memory leak in XDP_REDIRECT (git-fixes).
- drm/amdgpu: Do not query CE and UE errors (bsc#1152472)
- drm: bridge/panel: Cleanup connector on bridge detach (bsc#1152489)
- drm/mcde/panel: Inverse misunderstood flag (bsc#1152472)
- drm/msm/dpu: Fix error return code in dpu_mdss_init() (git-fixes).
- drm/msm: Small msm_gem_purge() fix (bsc#1152489)
- drm/nouveau: wait for moving fence after pinning v2 (git-fixes).
- drm: qxl: ensure surf.data is ininitialized (git-fixes).
- drm/radeon: Fix a missing check bug in radeon_dp_mst_detect() (bsc#1152489)
- drm/radeon: wait for moving fence after pinning (git-fixes).
- drm/rockchip: cdn-dp-core: add missing clk_disable_unprepare() on error in cdn_dp_grf_write() (git-fixes).
- drm/rockchip: dsi: move all lane config except LCDC mux to bind() (git-fixes).
- drm/rockchip: dsi: remove extra component_del() call (git-fixes).
- drm/stm: Fix bus_flags handling (bsc#1152472)
- drm/vc4: hdmi: Make sure the controller is powered in detect (bsc#1152489)
- extcon: extcon-max8997: Fix IRQ freeing at error path (git-fixes).
- extcon: intel-mrfld: Sync hardware and software state on init (git-fixes).
- extcon: max8997: Add missing modalias string (git-fixes).
- extcon: sm5502: Drop invalid register write in sm5502_reg_data (git-fixes).
- firmware: tegra: Fix error return code in tegra210_bpmp_init() (git-fixes).
- Fix meta data in lpfc-decouple-port_template-and-vport_template.patch
- fix patches metadata
- fm10k: Fix an error handling path in 'fm10k_probe()' (git-fixes).
- fpga: machxo2-spi: Address warning about unused variable (git-fixes).
- fpga: stratix10-soc: Add missing fpga_mgr_free() call (git-fixes).
- fuse: check connected before queueing on fpq-&gt;io (bsc#1188267).
- fuse: ignore PG_workingset after stealing (bsc#1188268).
- fuse: reject internal errno (bsc#1188269).
- gpio: AMD8111 and TQMX86 require HAS_IOPORT_MAP (git-fixes).
- gve: Fix an error handling path in 'gve_probe()' (git-fixes).
- gve: Fix swapped vars when fetching max queues (git-fixes).
- HID: do not use down_interruptible() when unbinding devices (git-fixes).
- HID: wacom: Correct base usage for capacitive ExpressKey status bits (git-fixes).
- hwmon: (max31722) Remove non-standard ACPI device IDs (git-fixes).
- hwmon: (max31790) Fix fan speed reporting for fan7..12 (git-fixes).
- hwmon: (max31790) Fix pwmX_enable attributes (git-fixes).
- hwmon: (max31790) Report correct current pwm duty cycles (git-fixes).
- hwrng: exynos - Fix runtime PM imbalance on error (git-fixes).
- i2c: dev: Add __user annotation (git-fixes).
- i2c: robotfuzz-osif: fix control-request directions (git-fixes).
- ibmvnic: account for bufs already saved in indir_buf (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Allow device probe if the device is not ready at boot (bsc#1184114 ltc#192237).
- ibmvnic: clean pending indirect buffs during reset (jsc#SLE-17268 jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix kernel build warning (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warning in strncpy (bsc#1184114 ltc#192237).
- ibmvnic: fix kernel build warnings in build_hdr_descs_arr (bsc#1184114 ltc#192237).
- ibmvnic: fix send_request_map incompatible argument (bsc#1184114 ltc#192237).
- ibmvnic: free tx_pool if tso_pool alloc fails (bsc#1085224 ltc#164363).
- ibmvnic: parenthesize a check (bsc#1184114 ltc#192237 bsc#1183871 ltc#192139 git-fixes).
- ibmvnic: set ltb-&gt;buff to NULL after freeing (bsc#1094840 ltc#167098).
- ibmvnic: Use list_for_each_entry() to simplify code in ibmvnic.c (bsc#1184114 ltc#192237).
- ibmvnic: Use 'skb_frag_address()' instead of hand coding it (bsc#1184114 ltc#192237).
- ibmvnic: Use strscpy() instead of strncpy() (bsc#1184114 ltc#192237).
- iio: accel: bma180: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: bma220: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: hid: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: kxcjk-1013: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio:accel:mxc4005: Drop unnecessary explicit casts in regmap_bulk_read calls (git-fixes).
- iio: accel: mxc4005: Fix overread of data and alignment issue (git-fixes).
- iio: accel: stk8312: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: accel: stk8ba50: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: at91-sama5d2: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: hx711: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: mxs-lradc: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads1015: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: ti-ads8688: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adc: vf610: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: adis16400: do not return ints in irq handlers (git-fixes).
- iio: adis_buffer: do not return ints in irq handlers (git-fixes).
- iio: at91-sama5d2_adc: remove usage of iio_priv_to_dev() helper (git-fixes).
- iio: gyro: bmg160: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: humidity: am2315: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: isl29125: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3414: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: tcs3472: do not free unallocated IRQ (git-fixes).
- iio: light: tcs3472: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: light: vcnl4035: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: ltr501: ltr501_read_ps(): add missing endianness conversion (git-fixes).
- iio: ltr501: ltr559: fix initialization of LTR501_ALS_CONTR (git-fixes).
- iio: ltr501: mark register holding upper 8 bits of ALS_DATA{0,1} and PS_DATA as volatile, too (git-fixes).
- iio: magn: bmc150: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: hmc5843: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: magn: rm3100: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: potentiostat: lmp91000: Fix alignment of buffer in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: as3935: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: isl29501: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: pulsed-light: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: prox: srf08: Fix buffer alignment in iio_push_to_buffers_with_timestamp() (git-fixes).
- iio: si1133: fix format string warnings (git-fixes).
- Input: hil_kbd - fix error return code in hil_dev_connect() (git-fixes).
- Input: usbtouchscreen - fix control-request directions (git-fixes).
- kABI: restore struct tcpc_config definition (git-fixes).
- kernel-binary.spec: Exctract s390 decompression code (jsc#SLE-17042).
- leds: as3645a: Fix error return code in as3645a_parse_node() (git-fixes).
- leds: ktd2692: Fix an error handling path (git-fixes).
- leds: lm3532: select regmap I2C API (git-fixes).
- lib/decompressors: remove set but not used variabled 'level' (git-fixes).
- lib: vsprintf: Fix handling of number field widths in vsscanf (git-fixes).
- mac80211_hwsim: drop pending frames on stop (git-fixes).
- mac80211: remove iwlwifi specific workaround NDPs of null_response (git-fixes).
- mac80211: remove iwlwifi specific workaround that broke sta NDP tx (git-fixes).
- mac80211: remove warning in ieee80211_get_sband() (git-fixes).
- math: Export mul_u64_u64_div_u64 (git-fixes).
- media: au0828: fix a NULL vs IS_ERR() check (git-fixes).
- media: bt8xx: Fix a missing check bug in bt878_probe (git-fixes).
- media: cobalt: fix race condition in setting HPD (git-fixes).
- media: cpia2: fix memory leak in cpia2_usb_probe (git-fixes).
- media: dtv5100: fix control-request directions (git-fixes).
- media: dvb_net: avoid speculation from net slot (git-fixes).
- media: dvb-usb: fix wrong definition (git-fixes).
- media: dvd_usb: memory leak in cinergyt2_fe_attach (git-fixes).
- media: em28xx: Fix possible memory leak of em28xx struct (git-fixes).
- media: exynos4-is: Fix a use after free in isp_video_release (git-fixes).
- media: exynos-gsc: fix pm_runtime_get_sync() usage count (git-fixes).
- media: Fix Media Controller API config checks (git-fixes).
- media: gspca/gl860: fix zero-length control requests (git-fixes).
- media: gspca/sq905: fix control-request direction (git-fixes).
- media: gspca/sunplus: fix zero-length control requests (git-fixes).
- media: I2C: change 'RST' to 'RSET' to fix multiple build errors (git-fixes).
- media: imx-csi: Skip first few frames from a BT.656 source (git-fixes).
- media: imx: imx7_mipi_csis: Fix logging of only error event counters (git-fixes).
- media: mdk-mdp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: mtk-vcodec: fix PM runtime get logic (git-fixes).
- media: pvrusb2: fix warning in pvr2_i2c_core_done (git-fixes).
- media: rc: i2c: Fix an error message (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: s5p-g2d: Fix a memory leak on ctx-&gt;fh.m2m_ctx (git-fixes).
- media: s5p-jpeg: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sh_vou: fix pm_runtime_get_sync() usage count (git-fixes).
- media: siano: fix device register error path (git-fixes).
- media: siano: Fix out-of-bounds warnings in smscore_load_firmware_family2() (git-fixes).
- media: st-hva: Fix potential NULL pointer dereferences (git-fixes).
- media: sti/bdisp: fix pm_runtime_get_sync() usage count (git-fixes).
- media: sti: fix obj-$(config) targets (git-fixes).
- media: tc358743: Fix error return code in tc358743_probe_of() (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: Avoid the dangling pointer in v4l2_fh_release (git-fixes).
- media: zr364xx: fix memory leak in zr364xx_start_readpipe (git-fixes).
- memory: atmel-ebi: add missing of_node_put for loop iteration (git-fixes).
- memory: fsl_ifc: fix leak of IO mapping on probe failure (git-fixes).
- memory: fsl_ifc: fix leak of private memory on probe failure (git-fixes).
- memory: pl353: Fix error return code in pl353_smc_probe() (git-fixes).
- memstick: rtsx_usb_ms: fix UAF (git-fixes).
- mmc: block: Disable CMDQ on the ioctl path (git-fixes).
- mmc: core: clear flags before allowing to retune (git-fixes).
- mmc: sdhci-esdhc-imx: remove unused is_imx6q_usdhc (git-fixes).
- mmc: sdhci: Fix warning message when accessing RPMB in HS400 mode (git-fixes).
- mmc: sdhci-sprd: use sdhci_sprd_writew (git-fixes).
- mmc: usdhi6rol0: fix error return code in usdhi6_probe() (git-fixes).
- mmc: via-sdmmc: add a check against NULL pointer dereference (git-fixes).
- mmc: vub3000: fix control-request direction (git-fixes).
- mm, futex: fix shared futex pgoff on shmem huge page (git fixes (kernel/futex)).
- mt76: fix possible NULL pointer dereference in mt76_tx (git-fixes).
- mtd: partitions: redboot: seek fis-index-block in the right node (git-fixes).
- mtd: rawnand: marvell: add missing clk_disable_unprepare() on error in marvell_nfc_resume() (git-fixes).
- mwifiex: re-fix for unaligned accesses (git-fixes).
- nvme-rdma: fix in-casule data send for chained sgls (git-fixes).
- nvme-rdma: introduce nvme_rdma_sgl structure (git-fixes).
- nvme-tcp: rerun io_work if req_list is not empty (git-fixes).
- nvme: verify MNAN value if ANA is enabled (bsc#1185791).
- PCI: Add AMD RS690 quirk to enable 64-bit DMA (git-fixes).
- pinctrl: stm32: fix the reported number of GPIO lines per bank (git-fixes).
- platform/x86: toshiba_acpi: Fix missing error code in toshiba_acpi_setup_keyboard() (git-fixes).
- ptp_qoriq: fix overflow in ptp_qoriq_adjfine() u64 calcalation (git-fixes).
- r8152: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- r8169: Avoid memcpy() over-reading of ETH_SS_STATS (git-fixes).
- random32: Fix implicit truncation warning in prandom_seed_state() (git-fixes).
- regulator: da9052: Ensure enough delay time for .set_voltage_time_sel (git-fixes).
- regulator: hi655x: Fix pass wrong pointer to config.driver_data (git-fixes).
- regulator: uniphier: Add missing MODULE_DEVICE_TABLE (git-fixes).
- reset: a10sr: add missing of_match_table reference (git-fixes).
- reset: bail if try_module_get() fails (git-fixes).
- reset: brcmstb: Add missing MODULE_DEVICE_TABLE (git-fixes).
- Revert 'ALSA: bebob/oxfw: fix Kconfig entry for Mackie d.2 Pro' (git-fixes).
- Revert 'ibmvnic: remove duplicate napi_schedule call in open function' (bsc#1065729).
- rpm/kernel-binary.spec.in: Remove zdebug define used only once.
- rsi: Assign beacon rate settings to the correct rate_info descriptor field (git-fixes).
- rtc: fix snprintf() checking in is_rtc_hctosys() (git-fixes).
- rtc: stm32: Fix unbalanced clk_disable_unprepare() on probe error path (git-fixes).
- scsi: qedf: Do not put host in qedf_vport_create() unconditionally (bsc#1170511).
- serial: 8250: Actually allow UPF_MAGIC_MULTIPLIER baud rates (git-fixes).
- serial_cs: Add Option International GSM-Ready 56K/ISDN modem (git-fixes).
- serial_cs: remove wrong GLOBETROTTER.cis entry (git-fixes).
- serial: mvebu-uart: correctly calculate minimal possible baudrate (git-fixes).
- serial: mvebu-uart: do not allow changing baudrate when uartclk is not available (git-fixes).
- serial: mvebu-uart: fix calculation of clock divisor (git-fixes).
- serial: tegra-tcu: Reorder channel initialization (git-fixes).
- soc: fsl: qbman: Delete useless kfree code (bsc#1188176).
- soc: fsl: qbman: Ensure device cleanup is run for kexec (bsc#1188176).
- soundwire: stream: Fix test for DP prepare complete (git-fixes).
- spi: fspi: dynamically alloc AHB memory (bsc#1188121).
- spi: Make of_register_spi_device also set the fwnode (git-fixes).
- spi: nxp-fspi: Use devm API to fix missed unregistration of controller (bsc#1188121).
- spi: omap-100k: Fix the length judgment problem (git-fixes).
- spi: spi-loopback-test: Fix 'tx_buf' might be 'rx_buf' (git-fixes).
- spi: spi-nxp-fspi: Add ACPI support (bsc#1188121).
- spi: spi-nxp-fspi: Add support for IP read only (bsc#1188121).
- spi: spi-nxp-fspi: Enable the Octal Mode in MCR0 (bsc#1188121).
- spi: spi-nxp-fspi: Fix a NULL vs IS_ERR() check in probe (bsc#1188121).
- spi: spi-nxp-fspi: Implement errata workaround for LS1028A (bsc#1188121).
- spi: spi-sun6i: Fix chipselect/clock bug (git-fixes).
- spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() (git-fixes).
- spi: stm32-qspi: Remove unused qspi field of struct stm32_qspi_flash (git-fixes).
- spi: tegra114: Fix an error message (git-fixes).
- ssb: Fix error return code in ssb_bus_scan() (git-fixes).
- ssb: sdio: Do not overwrite const buffer if block_write fails (git-fixes).
- staging: gdm724x: check for buffer overflow in gdm_lte_multi_sdu_pkt() (git-fixes).
- staging: gdm724x: check for overflow in gdm_lte_netif_rx() (git-fixes).
- staging: rtl8712: fix memory leak in rtl871x_load_fw_cb (git-fixes).
- staging: rtl8712: remove redundant check in r871xu_drv_init (git-fixes).
- thermal/drivers/rcar_gen3_thermal: Fix coefficient calculations (git-fixes).
- tpm, tpm_tis: Decorate tpm_get_timeouts() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Decorate tpm_tis_gen_interrupt() with request_locality() (bsc#1188036).
- tpm, tpm_tis: Extend locality handling to TPM2 in tpm_tis_gen_interrupt() (bsc#1188036).
- tpm, tpm_tis: Reserve locality in tpm_tis_resume() (bsc#1188036).
- tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing (git-fixes).
- tracing/histograms: Fix parsing of 'sym-offset' modifier (git-fixes).
- tracing: Resize tgid_map to pid_max, not PID_MAX_DEFAULT (git-fixes).
- tracing: Simplify &amp; fix saved_tgids logic (git-fixes).
- tty: nozomi: Fix a resource leak in an error handling function (git-fixes).
- tty: nozomi: Fix the error handling path of 'nozomi_card_init()' (git-fixes).
- USB: cdc-acm: blacklist Heimann USB Appset device (git-fixes).
- usb: dwc2: Do not reset the core after setting turnaround time (git-fixes).
- usb: dwc3: Fix debugfs creation flow (git-fixes).
- usb: gadget: eem: fix echo command packet response issue (git-fixes).
- usb: gadget: f_fs: Fix setting of device and driver data cross-references (git-fixes).
- usb: typec: Add the missed altmode_id_remove() in typec_register_altmode() (git-fixes).
- usb: typec: fusb302: Always provide fwnode for the port (git-fixes).
- usb: typec: fusb302: fix 'op-sink-microwatt' default that was in mW (git-fixes).
- usb: typec: tcpm: Error handling for tcpm_register_partner_altmodes (git-fixes).
- usb: typec: tcpm: Move mod_delayed_work(&amp;port-&gt;vdm_state_machine) call into tcpm_queue_vdm() (git-fixes).
- usb: typec: tcpm: move to SNK_UNATTACHED if sink removed for DRP (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request (git-fixes).
- usb: typec: tcpm: Refactor tcpm_handle_vdm_request payload handling (git-fixes).
- usb: typec: tcpm: Remove tcpc_config configuration mechanism (git-fixes).
- usb: typec: tcpm: set correct data role for non-DRD (git-fixes).
- usb: typec: tcpm: Switch to use fwnode_property_count_uXX() (git-fixes).
- usb: typec: tcpm: update power supply once partner accepts (git-fixes).
- usb: typec: ucsi: Hold con-&gt;lock for the entire duration of ucsi_register_port() (git-fixes).
- usb: typec: ucsi: Put fwnode in any case during -&gt;probe() (git-fixes).
- usb: typec: wcove: Fx wrong kernel doc format (git-fixes).
- Use /usr/lib/modules as module dir when usermerge is active in the target distro.
- vfio/pci: Handle concurrent vma faults (git-fixes).
- vfs: Convert functionfs to use the new mount API (git -fixes).
- video: fbdev: imxfb: Fix an error message (git-fixes).
- visorbus: fix error return code in visorchipset_init() (git-fixes).
- vmxnet3: fix cksum offload issues for tunnels with non-default udp ports (git-fixes).
- watchdog: aspeed: fix hardware timeout calculation (git-fixes).
- watchdog: sp805: Fix kernel doc description (git-fixes).
- wcn36xx: Move hal_buf allocation to devm_kmalloc in probe (git-fixes).
- wireless: carl9170: fix LEDS build errors &amp; warnings (git-fixes).
- x86/kvm: Disable all PV features on crash (bsc#1185308).
- x86/kvm: Disable kvmclock on all CPUs on shutdown (bsc#1185308).
- x86/kvm: Fix pr_info() for async PF setup/teardown (bsc#1185308).
- x86/kvm: Teardown PV features on boot CPU as well (bsc#1185308).
- x86/kvm: Unify kvm_pv_guest_cpu_reboot() with kvm_guest_cpu_offline() (bsc#1185308).
- [xarray] iov_iter_fault_in_readable() should do nothing in xarray case (git-fixes).
- xhci: solve a double free problem while doing s4 (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-21"/>
	<updated date="2021-07-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170511">SUSE bug 1170511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185308">SUSE bug 1185308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185791">SUSE bug 1185791</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187215">SUSE bug 1187215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187585">SUSE bug 1187585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188036">SUSE bug 1188036</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188062">SUSE bug 1188062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188080">SUSE bug 1188080</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188116">SUSE bug 1188116</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188121">SUSE bug 1188121</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188176">SUSE bug 1188176</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188267">SUSE bug 1188267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188268">SUSE bug 1188268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188269">SUSE bug 1188269</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22555/">CVE-2021-22555</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-33909/">CVE-2021-33909</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35039/">CVE-2021-35039</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3609/">CVE-2021-3609</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3612/">CVE-2021-3612</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009626042" comment="kernel-default-extra-5.3.18-24.75.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009626043" comment="kernel-preempt-extra-5.3.18-24.75.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111974" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1143650" ref_url="https://bugzilla.suse.com/1143650" source="BUGZILLA"/>
		<reference ref_id="1159130" ref_url="https://bugzilla.suse.com/1159130" source="BUGZILLA"/>
		<reference ref_id="1159293" ref_url="https://bugzilla.suse.com/1159293" source="BUGZILLA"/>
		<reference ref_id="1161698" ref_url="https://bugzilla.suse.com/1161698" source="BUGZILLA"/>
		<reference ref_id="1186329" ref_url="https://bugzilla.suse.com/1186329" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-14275" ref_url="https://www.suse.com/security/cve/CVE-2019-14275/" source="CVE"/>
		<reference ref_id="CVE-2019-19555" ref_url="https://www.suse.com/security/cve/CVE-2019-19555/" source="CVE"/>
		<reference ref_id="CVE-2019-19746" ref_url="https://www.suse.com/security/cve/CVE-2019-19746/" source="CVE"/>
		<reference ref_id="CVE-2019-19797" ref_url="https://www.suse.com/security/cve/CVE-2019-19797/" source="CVE"/>
		<reference ref_id="CVE-2021-3561" ref_url="https://www.suse.com/security/cve/CVE-2021-3561/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2454-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009201.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to version 3.2.8, including fixes for

- CVE-2021-3561: overflow in fig2dev/read.c in function read_colordef() (bsc#1186329).
- CVE-2019-19797: out-of-bounds write in read_colordef in read.c (bsc#1159293).
- CVE-2019-19555: stack-based buffer overflow because of an incorrect sscanf (bsc#1161698).
- CVE-2019-19746: segmentation fault and out-of-bounds write because of an integer overflow via a large arrow type (bsc#1159130).
- CVE-2019-14275: stack-based buffer overflow in the calc_arrow function in bound.c (bsc#1143650).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1143650">SUSE bug 1143650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159130">SUSE bug 1159130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159293">SUSE bug 1159293</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1161698">SUSE bug 1161698</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186329">SUSE bug 1186329</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14275/">CVE-2019-14275</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19555/">CVE-2019-19555</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-19746/">CVE-2019-19746</cve>
	<cve impact="moderate" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-19797/">CVE-2019-19797</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2021-3561/">CVE-2021-3561</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009615931" comment="transfig-3.2.8a-4.12.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111975" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1188275" ref_url="https://bugzilla.suse.com/1188275" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29969" ref_url="https://www.suse.com/security/cve/CVE-2021-29969/" source="CVE"/>
		<reference ref_id="CVE-2021-29970" ref_url="https://www.suse.com/security/cve/CVE-2021-29970/" source="CVE"/>
		<reference ref_id="CVE-2021-29976" ref_url="https://www.suse.com/security/cve/CVE-2021-29976/" source="CVE"/>
		<reference ref_id="CVE-2021-30547" ref_url="https://www.suse.com/security/cve/CVE-2021-30547/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-July/009206.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 78.12

  * fixed: Sending an email containing HTML links with spaces in
    the URL sometimes resulted in broken links
  * fixed: Folder Pane display theme fixes for macOS
  * fixed: Chat account settings did not always save as expected
  * fixed: RSS feed subscriptions sometimes lost
  * fixed: Calendar: A parsing error for alarm triggers of type
    'DURATION' caused sync problems for some users
  * fixed: Various security fixes

MFSA 2021-30 (bsc#1188275)

* CVE-2021-29969: IMAP server responses sent by a MITM prior to STARTTLS could be processed
* CVE-2021-29970: Use-after-free in accessibility features of a document
* CVE-2021-30547: Out of bounds write in ANGLE
* CVE-2021-29976: Memory safety bugs fixed in Thunderbird 78.12
		</description>
<advisory from="security@suse.de">
	<issued date="2021-07-22"/>
	<updated date="2021-07-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188275">SUSE bug 1188275</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29969/">CVE-2021-29969</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29970/">CVE-2021-29970</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29976/">CVE-2021-29976</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-30547/">CVE-2021-30547</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009625437" comment="MozillaThunderbird-78.12.0-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625438" comment="MozillaThunderbird-translations-common-78.12.0-8.33.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009625439" comment="MozillaThunderbird-translations-other-78.12.0-8.33.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111976" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1181414" ref_url="https://bugzilla.suse.com/1181414" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15685" ref_url="https://www.suse.com/security/cve/CVE-2020-15685/" source="CVE"/>
		<reference ref_id="CVE-2020-26976" ref_url="https://www.suse.com/security/cve/CVE-2020-26976/" source="CVE"/>
		<reference ref_id="CVE-2021-23953" ref_url="https://www.suse.com/security/cve/CVE-2021-23953/" source="CVE"/>
		<reference ref_id="CVE-2021-23954" ref_url="https://www.suse.com/security/cve/CVE-2021-23954/" source="CVE"/>
		<reference ref_id="CVE-2021-23960" ref_url="https://www.suse.com/security/cve/CVE-2021-23960/" source="CVE"/>
		<reference ref_id="CVE-2021-23964" ref_url="https://www.suse.com/security/cve/CVE-2021-23964/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008261.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird was updated to 78.7.0 ESR  (MFSA 2021-05, bsc#1181414)
  * CVE-2021-23953: Fixed a Cross-origin information leakage via redirected PDF requests
  * CVE-2021-23954: Fixed a type confusion when using logical assignment operators in JavaScript switch statements
  * CVE-2020-26976: Fixed an issue where HTTPS pages could have been intercepted by a registered service worker when they should not have been
  * CVE-2021-23960: Fixed a use-after-poison for incorrectly redeclared JavaScript variables during GC
  * CVE-2021-23964: Fixed Memory safety bugs
  * CVE-2020-15685: Fixed an IMAP Response Injection when using STARTTLS
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-01"/>
	<updated date="2021-02-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1181414">SUSE bug 1181414</bugzilla>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-15685/">CVE-2020-15685</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-26976/">CVE-2020-26976</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23953/">CVE-2021-23953</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23954/">CVE-2021-23954</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-23960/">CVE-2021-23960</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23964/">CVE-2021-23964</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509400" comment="MozillaThunderbird-78.7.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509401" comment="MozillaThunderbird-translations-common-78.7.0-8.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509402" comment="MozillaThunderbird-translations-other-78.7.0-8.9.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111977" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085224" ref_url="https://bugzilla.suse.com/1085224" source="BUGZILLA"/>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1113295" ref_url="https://bugzilla.suse.com/1113295" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1180092" ref_url="https://bugzilla.suse.com/1180092" source="BUGZILLA"/>
		<reference ref_id="1183871" ref_url="https://bugzilla.suse.com/1183871" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184350" ref_url="https://bugzilla.suse.com/1184350" source="BUGZILLA"/>
		<reference ref_id="1184631" ref_url="https://bugzilla.suse.com/1184631" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185377" ref_url="https://bugzilla.suse.com/1185377" source="BUGZILLA"/>
		<reference ref_id="1186194" ref_url="https://bugzilla.suse.com/1186194" source="BUGZILLA"/>
		<reference ref_id="1186206" ref_url="https://bugzilla.suse.com/1186206" source="BUGZILLA"/>
		<reference ref_id="1186482" ref_url="https://bugzilla.suse.com/1186482" source="BUGZILLA"/>
		<reference ref_id="1186483" ref_url="https://bugzilla.suse.com/1186483" source="BUGZILLA"/>
		<reference ref_id="1187476" ref_url="https://bugzilla.suse.com/1187476" source="BUGZILLA"/>
		<reference ref_id="1188101" ref_url="https://bugzilla.suse.com/1188101" source="BUGZILLA"/>
		<reference ref_id="1188405" ref_url="https://bugzilla.suse.com/1188405" source="BUGZILLA"/>
		<reference ref_id="1188445" ref_url="https://bugzilla.suse.com/1188445" source="BUGZILLA"/>
		<reference ref_id="1188504" ref_url="https://bugzilla.suse.com/1188504" source="BUGZILLA"/>
		<reference ref_id="1188620" ref_url="https://bugzilla.suse.com/1188620" source="BUGZILLA"/>
		<reference ref_id="1188683" ref_url="https://bugzilla.suse.com/1188683" source="BUGZILLA"/>
		<reference ref_id="1188746" ref_url="https://bugzilla.suse.com/1188746" source="BUGZILLA"/>
		<reference ref_id="1188747" ref_url="https://bugzilla.suse.com/1188747" source="BUGZILLA"/>
		<reference ref_id="1188748" ref_url="https://bugzilla.suse.com/1188748" source="BUGZILLA"/>
		<reference ref_id="1188770" ref_url="https://bugzilla.suse.com/1188770" source="BUGZILLA"/>
		<reference ref_id="1188771" ref_url="https://bugzilla.suse.com/1188771" source="BUGZILLA"/>
		<reference ref_id="1188772" ref_url="https://bugzilla.suse.com/1188772" source="BUGZILLA"/>
		<reference ref_id="1188773" ref_url="https://bugzilla.suse.com/1188773" source="BUGZILLA"/>
		<reference ref_id="1188774" ref_url="https://bugzilla.suse.com/1188774" source="BUGZILLA"/>
		<reference ref_id="1188777" ref_url="https://bugzilla.suse.com/1188777" source="BUGZILLA"/>
		<reference ref_id="1188838" ref_url="https://bugzilla.suse.com/1188838" source="BUGZILLA"/>
		<reference ref_id="1188876" ref_url="https://bugzilla.suse.com/1188876" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188973" ref_url="https://bugzilla.suse.com/1188973" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-21781" ref_url="https://www.suse.com/security/cve/CVE-2021-21781/" source="CVE"/>
		<reference ref_id="CVE-2021-22543" ref_url="https://www.suse.com/security/cve/CVE-2021-22543/" source="CVE"/>
		<reference ref_id="CVE-2021-3659" ref_url="https://www.suse.com/security/cve/CVE-2021-3659/" source="CVE"/>
		<reference ref_id="CVE-2021-37576" ref_url="https://www.suse.com/security/cve/CVE-2021-37576/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-August/009299.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).
- CVE-2021-21781: Fixed a information disclosure vulnerability in the ARM SIGPAGE (bsc#1188445).
- CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM, which could bypass RO checks and can lead to pages being freed while still accessible by the VMM and guest. This allowed users with the ability to start and control a VM to read/write random pages of memory and can result in local privilege escalation (bsc#1186482).
- CVE-2021-37576: Fixed an issue on the powerpc platform, where a KVM guest OS user could cause host OS memory corruption via rtas_args.nargs (bsc#1188838).

The following non-security bugs were fixed:

- ACPI: AMBA: Fix resource name in /proc/iomem (git-fixes).
- ACPI: video: Add quirk for the Dell Vostro 3350 (git-fixes).
- ALSA: ac97: fix PM reference leak in ac97_bus_remove() (git-fixes).
- ALSA: bebob: add support for ToneWeal FW66 (git-fixes).
- ALSA: hda: Add IRQ check for platform_get_irq() (git-fixes).
- ALSA: hdmi: Expose all pins on MSI MS-7C94 board (git-fixes).
- ALSA: ppc: fix error return code in snd_pmac_probe() (git-fixes).
- ALSA: sb: Fix potential ABBA deadlock in CSP driver (git-fixes).
- ALSA: sb: Fix potential double-free of CSP mixer elements (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum headsets (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 18i8 Gen 2 PCM Input count (git-fixes).
- ALSA: usb-audio: scarlett2: Fix 6i6 Gen 2 line out descriptions (git-fixes).
- ALSA: usb-audio: scarlett2: Fix data_mutex lock (git-fixes).
- ALSA: usb-audio: scarlett2: Fix scarlett2_*_ctl_put() return values (git-fixes).
- ALSA: usx2y: Do not call free_pages_exact() with NULL address (git-fixes).
- ARM: ensure the signal page contains defined contents (bsc#1188445).
- ASoC: Intel: kbl_da7219_max98357a: shrink platform_id below 20 characters (git-fixes).
- ASoC: img: Fix PM reference leak in img_i2s_in_probe() (git-fixes).
- ASoC: rt5631: Fix regcache sync errors on resume (git-fixes).
- ASoC: soc-core: Fix the error return code in snd_soc_of_parse_audio_routing() (git-fixes).
- ASoC: tegra: Set driver_name=tegra for all machine drivers (git-fixes).
- Bluetooth: Fix the HCI to MGMT status conversion table (git-fixes).
- Bluetooth: Shutdown controller after workqueues are flushed or cancelled (git-fixes).
- Bluetooth: btusb: Fixed too many in-token issue for Mediatek Chip (git-fixes).
- Bluetooth: btusb: fix bt fiwmare downloading failure issue for qca btsoc (git-fixes).
- Input: hideep - fix the uninitialized use in hideep_nvm_unlock() (git-fixes).
- Input: ili210x - add missing negation for touch indication on ili210x (git-fixes).
- KVM: LAPIC: Prevent setting the tscdeadline timer if the lapic is hw disabled (bsc#1188771).
- KVM: nVMX: Consult only the 'basic' exit reason when routing nested exit (bsc#1188773).
- KVM: nVMX: Ensure 64-bit shift when checking VMFUNC bitmap (bsc#1188774).
- KVM: nVMX: Preserve exception priority irrespective of exiting behavior (bsc#1188777).
- PCI/sysfs: Fix dsm_label_utf16s_to_utf8s() buffer overrun (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: Leave Apple Thunderbolt controllers on for s2idle or standby (git-fixes).
- PCI: aardvark: Fix checking for PIO Non-posted Request (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: aardvark: Implement workaround for the readback value of VEND_ID (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Fix multi-MSI base vector number allocation (git-fixes).
- PCI: iproc: Support multi-MSI only on uniprocessor kernel (git-fixes).
- PCI: quirks: fix false kABI positive (git-fixes).
- PCI: tegra: Add missing MODULE_DEVICE_TABLE (git-fixes).
- RDMA/cma: Fix incorrect Packet Lifetime calculation (jsc#SLE-8449).
- RDMA/cma: Protect RMW with qp_mutex (git-fixes).
- Revert 'ACPI: resources: Add checks for ACPI IRQ override' (git-fixes).
- Revert 'USB: quirks: ignore remote wake-up on Fibocom L850-GL LTE modem' (git-fixes).
- Revert 'be2net: disable bh with spin_lock in be_process_mcc' (git-fixes).
- USB: serial: cp210x: add ID for CEL EM3588 USB ZigBee stick (git-fixes).
- USB: serial: cp210x: fix comments for GE CS1000 (git-fixes).
- USB: serial: option: add support for u-blox LARA-R6 family (git-fixes).
- USB: usb-storage: Add LaCie Rugged USB3-FW to IGNORE_UAS (git-fixes).
- backlight: lm3630a: Fix return code of .update_status() callback (git-fixes).
- bcache: avoid oversized read request in cache missing code path (bsc#1184631).
- bcache: remove bcache device self-defined readahead (bsc#1184631).
- blk-mq: Add blk_mq_delay_run_hw_queues() API call (bsc#1180092).
- blk-mq: In blk_mq_dispatch_rq_list() 'no budget' is a reason to kick (bsc#1180092).
- blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget (bsc#1180092).
- blk-mq: Rerun dispatching in the case of budget contention (bsc#1180092).
- blk-mq: insert flush request to the front of dispatch queue (bsc#1180092).
- blk-mq: insert passthrough request into hctx-&gt;dispatch directly (bsc#1180092).
- bnxt_en: Add missing check for BNXT_STATE_ABORT_ERR in bnxt_fw_rset_task() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Check abort error state in bnxt_half_open_nic() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: Refresh RoCE capabilities in bnxt_ulp_probe() (jsc#SLE-8371 bsc#1153274).
- bnxt_en: do not disable an already disabled PCI device (git-fixes).
- bpf: Fix integer overflow in argument calculation for bpf_map_area_alloc (bsc#1154353).
- bpftool: Properly close va_list 'ap' by va_end() on error (bsc#1155518).
- cadence: force nonlinear buffers to be cloned (git-fixes).
- can: ems_usb: fix memory leak (git-fixes).
- can: esd_usb2: fix memory leak (git-fixes).
- can: hi311x: fix a signedness bug in hi3110_cmd() (git-fixes).
- can: mcba_usb_start(): add missing urb-&gt;transfer_dma initialization (git-fixes).
- can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF (git-fixes).
- can: usb_8dev: fix memory leak (git-fixes).
- ceph: do not WARN if we're still opening a session to an MDS (bsc#1188748).
- cifs: Fix preauth hash corruption (git-fixes).
- cifs: Return correct error code from smb2_get_enc_key (git-fixes).
- cifs: do not fail __smb_send_rqst if non-fatal signals are pending (git-fixes).
- cifs: fix interrupted close commands (git-fixes).
- cifs: fix memory leak in smb2_copychunk_range (git-fixes).
- clk: renesas: r8a77995: Add ZA2 clock (git-fixes).
- clk: tegra: Ensure that PLLU configuration is applied properly (git-fixes).
- clocksource/arm_arch_timer: Improve Allwinner A64 timer workaround (git-fixes).
- cpu/hotplug: Cure the cpusets trainwreck (git fixes (sched/hotplug)).
- crypto: sun4i-ss - IV register does not work on A10 and A13 (git-fixes).
- crypto: sun4i-ss - checking sg length is not sufficient (git-fixes).
- crypto: sun4i-ss - initialize need_fallback (git-fixes).
- crypto: virtio: Fix dest length calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- crypto: virtio: Fix src/dst scatterlist calculation in __virtio_crypto_skcipher_do_req() (git-fixes).
- cw1200: add missing MODULE_DEVICE_TABLE (git-fixes).
- cxgb4: fix IRQ free race during driver unload (git-fixes).
- dma-buf/sync_file: Do not leak fences on merge failure (git-fixes).
- dmaengine: fsl-qdma: check dma_set_mask return value (git-fixes).
- drm/amd/amdgpu/sriov disable all ip hw status by default (git-fixes).
- drm/amd/display: Set DISPCLK_MAX_ERRDET_CYCLES to 7 (git-fixes).
- drm/amd/display: Update scaling settings on modeset (git-fixes).
- drm/amd/display: Verify Gamma &amp; Degamma LUT sizes in amdgpu_dm_atomic_check (git-fixes).
- drm/amd/display: fix incorrrect valid irq check (git-fixes).
- drm/amd/display: fix use_max_lb flag for 420 pixel formats (git-fixes).
- drm/amdgpu: Update NV SIMD-per-CU to 2 (git-fixes).
- drm/amdkfd: Walk through list with dqm lock hold (git-fixes).
- drm/arm/malidp: Always list modifiers (git-fixes).
- drm/bridge: cdns: Fix PM reference leak in cdns_dsi_transfer() (git-fixes).
- drm/mediatek: Fix PM reference leak in mtk_crtc_ddp_hw_init() (git-fixes).
- drm/msm/mdp4: Fix modifier support enabling (git-fixes).
- drm/mxsfb: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm/panel: raspberrypi-touchscreen: Prevent double-free (git-fixes).
- drm/radeon: Add the missed drm_gem_object_put() in radeon_user_framebuffer_create() (git-fixes).
- drm/sched: Avoid data corruptions (git-fixes).
- drm/tegra: Do not set allow_fb_modifiers explicitly (git-fixes).
- drm/vc4: fix argument ordering in vc4_crtc_get_margins() (git-fixes).
- drm/virtio: Fix double free on probe failure (git-fixes).
- drm/zte: Do not select DRM_KMS_FB_HELPER (git-fixes).
- drm: Return -ENOTTY for non-drm ioctls (git-fixes).
- e1000e: Check the PCIm state (git-fixes).
- e1000e: Fix an error handling path in 'e1000_probe()' (git-fixes).
- fbmem: Do not delete the mode that is still in use (git-fixes).
- fbmem: add margin check to fb_check_caps() (git-fixes).
- firmware/efi: Tell memblock about EFI iomem reservations (git-fixes).
- firmware: arm_scmi: Fix possible scmi_linux_errmap buffer overflow (git-fixes).
- firmware: arm_scmi: Fix range check for the maximum number of pending messages (git-fixes).
- gpio: pca953x: Add support for the On Semi pca9655 (git-fixes).
- gpio: zynq: Check return value of pm_runtime_get_sync (git-fixes).
- gtp: fix an use-before-init in gtp_newlink() (git-fixes).
- gve: Add DQO fields for core data structures (bsc#1176940).
- gve: Add Gvnic stats AQ command and ethtool show/set-priv-flags (bsc#1176940).
- gve: Add dqo descriptors (bsc#1176940).
- gve: Add stats for gve (bsc#1176940).
- gve: Add support for DQO RX PTYPE map (bsc#1176940).
- gve: Add support for raw addressing device option (bsc#1176940).
- gve: Add support for raw addressing in the tx path (bsc#1176940).
- gve: Add support for raw addressing to the rx path (bsc#1176940).
- gve: Batch AQ commands for creating and destroying queues (bsc#1176940).
- gve: Check TX QPL was actually assigned (bsc#1176940).
- gve: DQO: Add RX path (bsc#1176940).
- gve: DQO: Add TX path (bsc#1176940).
- gve: DQO: Add core netdev features (bsc#1176940).
- gve: DQO: Add ring allocation and initialization (bsc#1176940).
- gve: DQO: Configure interrupts on device up (bsc#1176940).
- gve: DQO: Fix off by one in gve_rx_dqo() (bsc#1176940).
- gve: DQO: Remove incorrect prefetch (bsc#1176940).
- gve: Enable Link Speed Reporting in the driver (bsc#1176940).
- gve: Fix warnings reported for DQO patchset (bsc#1176940).
- gve: Get and set Rx copybreak via ethtool (bsc#1176940).
- gve: Introduce a new model for device options (bsc#1176940).
- gve: Introduce per netdev `enum gve_queue_format` (bsc#1176940).
- gve: Make gve_rx_slot_page_info.page_offset an absolute offset (bsc#1176940).
- gve: Move some static functions to a common file (bsc#1176940).
- gve: NIC stats for report-stats and for ethtool (bsc#1176940).
- gve: Propagate error codes to caller (bsc#1176940).
- gve: Replace zero-length array with flexible-array member (bsc#1176940).
- gve: Rx Buffer Recycling (bsc#1176940).
- gve: Simplify code and axe the use of a deprecated API (bsc#1176940).
- gve: Update adminq commands to support DQO queues (bsc#1176940).
- gve: Use dev_info/err instead of netif_info/err (bsc#1176940).
- gve: Use link status register to report link status (bsc#1176940).
- gve: adminq: DQO specific device descriptor logic (bsc#1176940).
- gve: gve_rx_copy: Move padding to an argument (bsc#1176940).
- i2c: core: Disable client irq on reboot/shutdown (git-fixes).
- i40e: Fix autoneg disabling for non-10GBaseT links (git-fixes).
- i40e: Fix error handling in i40e_vsi_open (git-fixes).
- iavf: Fix an error handling path in 'iavf_probe()' (git-fixes).
- ibmvnic: Remove the proper scrq flush (bsc#1188504 ltc#192075).
- ibmvnic: retry reset if there are no other resets (bsc#1184350 ltc#191533).
- ice: Re-organizes reqstd/avail {R, T}XQ check/code for efficiency (jsc#SLE-7926).
- igb: Check if num of q_vectors is smaller than max before array access (git-fixes).
- igb: Fix an error handling path in 'igb_probe()' (git-fixes).
- igb: Fix position of assignment to *ring (git-fixes).
- igb: Fix use-after-free error during reset (git-fixes).
- igc: Fix an error handling path in 'igc_probe()' (git-fixes).
- igc: Fix use-after-free error during reset (git-fixes).
- igc: change default return of igc_read_phy_reg() (git-fixes).
- iio: accel: bma180: Use explicit member assignment (git-fixes).
- iio: gyro: fxa21002c: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iio: magn: bmc150: Balance runtime pm + use pm_runtime_resume_and_get() (git-fixes).
- iwlwifi: mvm: do not change band on bound PHY contexts (git-fixes).
- iwlwifi: pcie: free IML DMA memory allocation (git-fixes).
- ixgbe: Fix an error handling path in 'ixgbe_probe()' (git-fixes).
- ixgbe: Fix packet corruption due to missing DMA sync (git-fixes).
- kABI workaround for pci/quirks.c (git-fixes).
- kprobes: Do not expose probe addresses to non-CAP_SYSLOG (git-fixes).
- kprobes: Fix NULL pointer dereference at kprobe_ftrace_handler (git-fixes).
- kprobes: Fix compiler warning for !CONFIG_KPROBES_ON_FTRACE (git-fixes).
- kprobes: Fix to check probe enabled before disarm_kprobe_ftrace() (git-fixes).
- kprobes: fix kill kprobe which has been marked as gone (git-fixes).
- kvm: LAPIC: Restore guard to prevent illegal APIC register access (bsc#1188772).
- kvm: i8254: remove redundant assignment to pointer s (bsc#1188770).
- lib/decompress_unlz4.c: correctly handle zero-padding around initrds (git-fixes).
- libbpf: Fixes incorrect rx_ring_setup_done (bsc#1155518).
- liquidio: Fix unintentional sign extension issue on left shift of u16 (git-fixes).
- mISDN: fix possible use-after-free in HFC_cleanup() (git-fixes).
- media, bpf: Do not copy more entries than user space requested (git-fixes).
- media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() (git-fixes).
- media: uvcvideo: Fix pixel format change for Elgato Cam Link 4K (git-fixes).
- mfd: cpcap: Fix cpcap dmamask not set warnings (git-fixes).
- mfd: da9052/stmpe: Add and modify MODULE_DEVICE_TABLE (git-fixes).
- misc/libmasm/module: Fix two use after free in ibmasm_init_one (git-fixes).
- misc: alcor_pci: fix inverted branch condition (git-fixes).
- misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge (git-fixes).
- mmc: core: Allow UHS-I voltage switch for SDSC cards if supported (git-fixes).
- mt76: mt7603: set 0 as min coverage_class value (git-fixes).
- mt76: mt7615: fix endianness in mt7615_mcu_set_eeprom (git-fixes).
- mt76: mt7615: increase MCU command timeout (git-fixes).
- mt76: set dma-done flag for flushed descriptors (git-fixes).
- mvpp2: suppress warning (git-fixes).
- net/mlx5: Do not fail driver on failure to create debugfs (git-fixes).
- net/mlx5e: Block offload of outer header csum for GRE tunnel (git-fixes).
- net: Make PTP-specific drivers depend on PTP_1588_CLOCK (git-fixes).
- net: atlantic: fix ip dst and ipv6 address filters (git-fixes).
- net: dp83867: Fix OF_MDIO config check (git-fixes).
- net: ethernet: ti: Remove TI_CPTS_MOD workaround (git-fixes).
- net: gve: convert strlcpy to strscpy (bsc#1176940).
- net: gve: remove duplicated allowed (bsc#1176940).
- net: hns3: Clear the CMDQ registers before unmapping BAR region (git-fixes).
- net: marvell: Fix OF_MDIO config check (git-fixes).
- net: mvpp2: Put fwnode in error case during -&gt;probe() (git-fixes).
- net: phy: microchip_t1: add lan87xx_phy_init to initialize the lan87xx phy (git-fixes).
- net: usb: fix possible use-after-free in smsc75xx_bind (git-fixes).
- net: wilc1000: clean up resource in error path of init mon interface (git-fixes).
- nfc: nfcsim: fix use after free during module unload (git-fixes).
- pinctrl/amd: Add device HID for new AMD GPIO controller (git-fixes).
- pinctrl: mcp23s08: Fix missing unlock on error in mcp23s08_irq() (git-fixes).
- pinctrl: mcp23s08: fix race condition in irq handler (git-fixes).
- platform/chrome: cros_ec_lightbar: Reduce ligthbar get version command (git-fixes).
- platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios (git-fixes).
- platform/x86: intel_int0002_vgpio: Only call enable_irq_wake() when using s2idle (git-fixes).
- platform/x86: intel_int0002_vgpio: Pass irqchip when adding gpiochip (git-fixes).
- platform/x86: intel_int0002_vgpio: Remove dev_err() usage after platform_get_irq() (git-fixes).
- platform/x86: intel_int0002_vgpio: Use device_init_wakeup (git-fixes).
- power: reset: gpio-poweroff: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: ab8500: Avoid NULL pointers (git-fixes).
- power: supply: ab8500: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: charger-manager: add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: max17042: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- power: supply: sc2731_charger: Add missing MODULE_DEVICE_TABLE (git-fixes).
- power: supply: sc27xx: Add missing MODULE_DEVICE_TABLE (git-fixes).
- powerpc/64s: Move branch cache flushing bcctr variant to ppc-ops.h (bsc#1188885 ltc#193722).
- powerpc/64s: rename pnv|pseries_setup_rfi_flush to _setup_security_mitigations (bsc#1188885 ltc#193722).
- powerpc/mm: Fix lockup on kernel exec fault (bsc#1156395).
- powerpc/papr_scm: Properly handle UUID types and API (bsc#1113295, git-fixes).
- powerpc/pesries: Get STF barrier requirement from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS (bsc#1188885 ltc#193722).
- powerpc/pseries: add new branch prediction security bits for link stack (bsc#1188885 ltc#193722).
- powerpc/pseries: export LPAR security flavor in lparcfg (bsc#1188885 ltc#193722).
- powerpc/security: Add a security feature for STF barrier (bsc#1188885 ltc#193722).
- powerpc/security: Allow for processors that flush the link stack using the special bcctr (bsc#1188885 ltc#193722).
- powerpc/security: Fix link stack flush instruction (bsc#1188885 ltc#193722).
- powerpc/security: change link stack flush state to the flush type enum (bsc#1188885 ltc#193722).
- powerpc/security: make display of branch cache flush more consistent (bsc#1188885 ltc#193722).
- powerpc/security: re-name count cache flush to branch cache flush (bsc#1188885 ltc#193722).
- powerpc/security: split branch cache flush toggle from code patching (bsc#1188885 ltc#193722).
- powerpc/stacktrace: Fix spurious 'stale' traces in raise_backtrace_ipi() (bsc#1156395).
- powerpc/stacktrace: Include linux/delay.h (bsc#1156395).
- powerpc: Offline CPU in stop_this_cpu() (bsc#1156395).
- pwm: img: Fix PM reference leak in img_pwm_enable() (git-fixes).
- pwm: imx1: Do not disable clocks at device remove time (git-fixes).
- pwm: spear: Do not modify HW state in .remove callback (git-fixes).
- qemu_fw_cfg: Make fw_cfg_rev_attr a proper kobj_attribute (git-fixes).
- r8152: Fix a deadlock by doubly PM resume (bsc#1186194).
- r8152: Fix potential PM refcount imbalance (bsc#1186194).
- r8169: avoid link-up interrupt issue on RTL8106e if user enables ASPM (git-fixes).
- ravb: Fix bit fields checking in ravb_hwtstamp_get() (git-fixes).
- rbd: always kick acquire on 'acquired' and 'released' notifications (bsc#1188746).
- rbd: do not hold lock_rwsem while running_list is being drained (bsc#1188747).
- regulator: hi6421: Fix getting wrong drvdata (git-fixes).
- regulator: hi6421: Use correct variable type for regmap api val argument (git-fixes).
- replaced with upstream security mitigation cleanup
- reset: ti-syscon: fix to_ti_syscon_reset_data macro (git-fixes).
- rpm/kernel-binary.spec.in: Do not install usrmerged kernel on Leap (boo#1184804).
- rtc: max77686: Do not enforce (incorrect) interrupt trigger type (git-fixes).
- rtc: mxc_v2: add missing MODULE_DEVICE_TABLE (git-fixes).
- rtl8xxxu: Fix device info for RTL8192EU devices (git-fixes).
- scsi: fc: Add 256GBit speed setting to SCSI FC transport (bsc#1188101).
- sfp: Fix error handing in sfp_probe() (git-fixes).
- soc/tegra: fuse: Fix Tegra234-only builds (git-fixes).
- spi: cadence: Correct initialisation of runtime PM again (git-fixes).
- spi: imx: add a check for speed_hz before calculating the clock (git-fixes).
- spi: mediatek: fix fifo rx mode (git-fixes).
- staging: rtl8723bs: fix macro value for 2.4Ghz only device (git-fixes).
- thermal/core: Correct function name thermal_zone_device_unregister() (git-fixes).
- tpm: efi: Use local variable for calculating final log size (git-fixes).
- tracing: Do not reference char * as a string in histograms (git-fixes).
- tty: serial: 8250: serial_cs: Fix a memory leak in error handling path (git-fixes).
- tty: serial: fsl_lpuart: fix the potential risk of division or modulo by zero (git-fixes).
- usb: dwc2: gadget: Fix sending zero length packet in DDMA mode (git-fixes).
- usb: gadget: f_hid: fix endianness issue with descriptors (git-fixes).
- usb: gadget: hid: fix error return code in hid_bind() (git-fixes).
- usb: hub: Disable USB 3 device initiated lpm if exit latency is too high (git-fixes).
- usb: hub: Fix link power management max exit latency (MEL) calculations (git-fixes).
- usb: max-3421: Prevent corruption of freed memory (git-fixes).
- usb: renesas_usbhs: Fix superfluous irqs happen after usb_pkt_pop() (git-fixes).
- uuid: Add inline helpers to import / export UUIDs (bsc#1113295, git-fixes).
- virtio_console: Assure used length from device is limited (git-fixes).
- virtio_net: move tx vq operation under tx queue lock (git-fixes).
- vxlan: add missing rcu_read_lock() in neigh_reduce() (git-fixes).
- w1: ds2438: fixing bug that would always get page0 (git-fixes).
- watchdog: Fix possible use-after-free by calling del_timer_sync() (git-fixes).
- watchdog: Fix possible use-after-free in wdt_startup() (git-fixes).
- watchdog: iTCO_wdt: Account for rebooting on second timeout (git-fixes).
- watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() (git-fixes).
- wilc1000: write value to WILC_INTR2_ENABLE register (git-fixes).
- wireless: wext-spy: Fix out-of-bounds warning (git-fixes).
- wl1251: Fix possible buffer overflow in wl1251_cmd_scan (git-fixes).
- wlcore/wl12xx: Fix wl12xx get_mac error if device is in ELP (git-fixes).
- workqueue: fix UAF in pwq_unbound_release_workfn() (bsc#1188973).
- xen/events: reset active flag for lateeoi events later (git-fixes).
- xfrm: xfrm_state_mtu should return at least 1280 for ipv6 (bsc#1185377).
- xhci: Fix lost USB 2 remote wake (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-17"/>
	<updated date="2021-08-17"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085224">SUSE bug 1085224</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1113295">SUSE bug 1113295</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180092">SUSE bug 1180092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1183871">SUSE bug 1183871</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184350">SUSE bug 1184350</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184631">SUSE bug 1184631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185377">SUSE bug 1185377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186194">SUSE bug 1186194</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186206">SUSE bug 1186206</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186482">SUSE bug 1186482</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186483">SUSE bug 1186483</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187476">SUSE bug 1187476</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188101">SUSE bug 1188101</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188405">SUSE bug 1188405</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188445">SUSE bug 1188445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188504">SUSE bug 1188504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188620">SUSE bug 1188620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188683">SUSE bug 1188683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188746">SUSE bug 1188746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188747">SUSE bug 1188747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188748">SUSE bug 1188748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188770">SUSE bug 1188770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188771">SUSE bug 1188771</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188772">SUSE bug 1188772</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188773">SUSE bug 1188773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188774">SUSE bug 1188774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188777">SUSE bug 1188777</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188838">SUSE bug 1188838</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188876">SUSE bug 1188876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188973">SUSE bug 1188973</bugzilla>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-21781/">CVE-2021-21781</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-22543/">CVE-2021-22543</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3659/">CVE-2021-3659</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-37576/">CVE-2021-37576</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009627913" comment="kernel-default-extra-5.3.18-24.78.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009627914" comment="kernel-preempt-extra-5.3.18-24.78.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111978" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1188891" ref_url="https://bugzilla.suse.com/1188891" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29980" ref_url="https://www.suse.com/security/cve/CVE-2021-29980/" source="CVE"/>
		<reference ref_id="CVE-2021-29984" ref_url="https://www.suse.com/security/cve/CVE-2021-29984/" source="CVE"/>
		<reference ref_id="CVE-2021-29985" ref_url="https://www.suse.com/security/cve/CVE-2021-29985/" source="CVE"/>
		<reference ref_id="CVE-2021-29986" ref_url="https://www.suse.com/security/cve/CVE-2021-29986/" source="CVE"/>
		<reference ref_id="CVE-2021-29988" ref_url="https://www.suse.com/security/cve/CVE-2021-29988/" source="CVE"/>
		<reference ref_id="CVE-2021-29989" ref_url="https://www.suse.com/security/cve/CVE-2021-29989/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2874-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2021-August/019991.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

Update to version 78.13 (MFSA 2021-35, bsc#1188891)

- CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
- CVE-2021-29988: Memory corruption as a result of incorrect style treatment
- CVE-2021-29984: Incorrect instruction reordering during JIT optimization
- CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
- CVE-2021-29985: Use-after-free media channels
- CVE-2021-29989: Memory safety bugs fixed in Thunderbird 78.13
		</description>
<advisory from="security@suse.de">
	<issued date="2021-08-30"/>
	<updated date="2021-08-30"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188891">SUSE bug 1188891</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29980/">CVE-2021-29980</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29984/">CVE-2021-29984</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-29985/">CVE-2021-29985</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29986/">CVE-2021-29986</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29988/">CVE-2021-29988</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-29989/">CVE-2021-29989</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009630858" comment="MozillaThunderbird-78.13.0-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630859" comment="MozillaThunderbird-translations-common-78.13.0-8.36.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009630860" comment="MozillaThunderbird-translations-other-78.13.0-8.36.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111979" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1129714" ref_url="https://bugzilla.suse.com/1129714" source="BUGZILLA"/>
		<reference ref_id="1186849" ref_url="https://bugzilla.suse.com/1186849" source="BUGZILLA"/>
		<reference ref_id="1186859" ref_url="https://bugzilla.suse.com/1186859" source="BUGZILLA"/>
		<reference ref_id="1186861" ref_url="https://bugzilla.suse.com/1186861" source="BUGZILLA"/>
		<reference ref_id="1186863" ref_url="https://bugzilla.suse.com/1186863" source="BUGZILLA"/>
		<reference ref_id="1189142" ref_url="https://bugzilla.suse.com/1189142" source="BUGZILLA"/>
		<reference ref_id="1189348" ref_url="https://bugzilla.suse.com/1189348" source="BUGZILLA"/>
		<reference ref_id="1189350" ref_url="https://bugzilla.suse.com/1189350" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9721" ref_url="https://www.suse.com/security/cve/CVE-2019-9721/" source="CVE"/>
		<reference ref_id="CVE-2020-21688" ref_url="https://www.suse.com/security/cve/CVE-2020-21688/" source="CVE"/>
		<reference ref_id="CVE-2020-21697" ref_url="https://www.suse.com/security/cve/CVE-2020-21697/" source="CVE"/>
		<reference ref_id="CVE-2020-22046" ref_url="https://www.suse.com/security/cve/CVE-2020-22046/" source="CVE"/>
		<reference ref_id="CVE-2020-22048" ref_url="https://www.suse.com/security/cve/CVE-2020-22048/" source="CVE"/>
		<reference ref_id="CVE-2020-22049" ref_url="https://www.suse.com/security/cve/CVE-2020-22049/" source="CVE"/>
		<reference ref_id="CVE-2020-22054" ref_url="https://www.suse.com/security/cve/CVE-2020-22054/" source="CVE"/>
		<reference ref_id="CVE-2021-38114" ref_url="https://www.suse.com/security/cve/CVE-2021-38114/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009387.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2019-9721: Fix denial of service in the subtitle decoder in handle_open_brace from libavcodec/htmlsubtitles.c (bsc#1129714).
- CVE-2020-22046: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the avpriv_float_dsp_allocl function in libavutil/float_dsp.c (bsc#1186849).
- CVE-2020-22048: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the ff_frame_pool_get function in framepool.c (bsc#1186859).
- CVE-2020-22049: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the wtvfile_open_sector function in wtvdec.c (bsc#1186861).
- CVE-2020-22054: Fix a denial of service vulnerability exists in FFmpeg 4.2 due to a memory leak in the av_dict_set function in dict.c (bsc#1186863).
- CVE-2020-21688: Fixed a heap-use-after-free in the av_freep function in libavutil/mem.c (bsc#1189348).
- CVE-2020-21697: Fixed a heap-use-after-free in the mpeg_mux_write_packet function in libavformat/mpegenc.c (bsc#1189350).
- CVE-2021-38114: Fixed a not checked return value of the init_vlc function (bsc#1189142).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-02"/>
	<updated date="2021-09-02"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1129714">SUSE bug 1129714</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186849">SUSE bug 1186849</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186859">SUSE bug 1186859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186861">SUSE bug 1186861</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186863">SUSE bug 1186863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189142">SUSE bug 1189142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189348">SUSE bug 1189348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189350">SUSE bug 1189350</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9721/">CVE-2019-9721</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21688/">CVE-2020-21688</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21697/">CVE-2020-21697</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22046/">CVE-2020-22046</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22048/">CVE-2020-22048</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22049/">CVE-2020-22049</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22054/">CVE-2020-22054</cve>
	<cve impact="moderate" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-38114/">CVE-2021-38114</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009631240" comment="libavcodec-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631241" comment="libavformat-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631242" comment="libavresample-devel-3.4.2-11.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009631243" comment="libavresample3-3.4.2-11.8.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111980" version="1" class="patch">
	<metadata>
		<title>Security update for ntfs-3g_ntfsprogs (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1189720" ref_url="https://bugzilla.suse.com/1189720" source="BUGZILLA"/>
		<reference ref_id="CVE-2019-9755" ref_url="https://www.suse.com/security/cve/CVE-2019-9755/" source="CVE"/>
		<reference ref_id="CVE-2021-33285" ref_url="https://www.suse.com/security/cve/CVE-2021-33285/" source="CVE"/>
		<reference ref_id="CVE-2021-33286" ref_url="https://www.suse.com/security/cve/CVE-2021-33286/" source="CVE"/>
		<reference ref_id="CVE-2021-33287" ref_url="https://www.suse.com/security/cve/CVE-2021-33287/" source="CVE"/>
		<reference ref_id="CVE-2021-33289" ref_url="https://www.suse.com/security/cve/CVE-2021-33289/" source="CVE"/>
		<reference ref_id="CVE-2021-35266" ref_url="https://www.suse.com/security/cve/CVE-2021-35266/" source="CVE"/>
		<reference ref_id="CVE-2021-35267" ref_url="https://www.suse.com/security/cve/CVE-2021-35267/" source="CVE"/>
		<reference ref_id="CVE-2021-35268" ref_url="https://www.suse.com/security/cve/CVE-2021-35268/" source="CVE"/>
		<reference ref_id="CVE-2021-35269" ref_url="https://www.suse.com/security/cve/CVE-2021-35269/" source="CVE"/>
		<reference ref_id="CVE-2021-39251" ref_url="https://www.suse.com/security/cve/CVE-2021-39251/" source="CVE"/>
		<reference ref_id="CVE-2021-39252" ref_url="https://www.suse.com/security/cve/CVE-2021-39252/" source="CVE"/>
		<reference ref_id="CVE-2021-39253" ref_url="https://www.suse.com/security/cve/CVE-2021-39253/" source="CVE"/>
		<reference ref_id="CVE-2021-39255" ref_url="https://www.suse.com/security/cve/CVE-2021-39255/" source="CVE"/>
		<reference ref_id="CVE-2021-39256" ref_url="https://www.suse.com/security/cve/CVE-2021-39256/" source="CVE"/>
		<reference ref_id="CVE-2021-39257" ref_url="https://www.suse.com/security/cve/CVE-2021-39257/" source="CVE"/>
		<reference ref_id="CVE-2021-39258" ref_url="https://www.suse.com/security/cve/CVE-2021-39258/" source="CVE"/>
		<reference ref_id="CVE-2021-39259" ref_url="https://www.suse.com/security/cve/CVE-2021-39259/" source="CVE"/>
		<reference ref_id="CVE-2021-39260" ref_url="https://www.suse.com/security/cve/CVE-2021-39260/" source="CVE"/>
		<reference ref_id="CVE-2021-39261" ref_url="https://www.suse.com/security/cve/CVE-2021-39261/" source="CVE"/>
		<reference ref_id="CVE-2021-39262" ref_url="https://www.suse.com/security/cve/CVE-2021-39262/" source="CVE"/>
		<reference ref_id="CVE-2021-39263" ref_url="https://www.suse.com/security/cve/CVE-2021-39263/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:2971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009416.html" source="SUSE-SU"/>
		<description>
This update for ntfs-3g_ntfsprogs fixes the following issues:

Update to version 2021.8.22 (bsc#1189720):

* Fixed compile error when building with libfuse &lt; 2.8.0
* Fixed obsolete macros in configure.ac
* Signalled support of UTIME_OMIT to external libfuse2
* Fixed an improper macro usage in ntfscp.c
* Updated the repository change in the README
* Fixed vulnerability threats caused by maliciously tampered NTFS partitions
* Security fixes: CVE-2021-33285, CVE-2021-33286, CVE-2021-33287,
  CVE-2021-33289, CVE-2021-35266, CVE-2021-35267, CVE-2021-35268,
  CVE-2021-35269, CVE-2021-39251, CVE-2021-39252, CVE-2021-39253,
  CVE_2021-39254, CVE-2021-39255, CVE-2021-39256, CVE-2021-39257,
  CVE-2021-39258, CVE-2021-39259, CVE-2021-39260, CVE-2021-39261,
  CVE-2021-39262, CVE-2021-39263.

- Library soversion is now 89

* Changes in version 2017.3.23
* Delegated processing of special reparse points to external plugins
* Allowed kernel cacheing by lowntfs-3g when not using Posix ACLs
* Enabled fallback to read-only mount when the volume is hibernated
* Made a full check for whether an extended attribute is allowed
* Moved secaudit and usermap to ntfsprogs (now ntfssecaudit and ntfsusermap)
* Enabled encoding broken UTF-16 into broken UTF-8
* Autoconfigured selecting &lt;sys/sysmacros.h&gt; vs &lt;sys/mkdev&gt;
* Allowed using the full library API on systems without extended attributes support
* Fixed DISABLE_PLUGINS as the condition for not using plugins
* Corrected validation of multi sector transfer protected records
* Denied creating/removing files from $Extend
* Returned the size of locale encoded target as the size of symlinks
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-07"/>
	<updated date="2021-09-07"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189720">SUSE bug 1189720</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2019-9755/">CVE-2019-9755</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-33285/">CVE-2021-33285</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-33286/">CVE-2021-33286</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-33287/">CVE-2021-33287</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-33289/">CVE-2021-33289</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-35266/">CVE-2021-35266</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-35267/">CVE-2021-35267</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-35268/">CVE-2021-35268</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-35269/">CVE-2021-35269</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39251/">CVE-2021-39251</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39252/">CVE-2021-39252</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39253/">CVE-2021-39253</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39255/">CVE-2021-39255</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39256/">CVE-2021-39256</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39257/">CVE-2021-39257</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39258/">CVE-2021-39258</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39259/">CVE-2021-39259</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39260/">CVE-2021-39260</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39261/">CVE-2021-39261</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39262/">CVE-2021-39262</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-39263/">CVE-2021-39263</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632525" comment="libntfs-3g-devel-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632526" comment="libntfs-3g87-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632527" comment="ntfs-3g-2021.8.22-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632528" comment="ntfsprogs-2021.8.22-3.8.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111981" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1189724" ref_url="https://bugzilla.suse.com/1189724" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-38171" ref_url="https://www.suse.com/security/cve/CVE-2021-38171/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009495.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-38171: Fixed adts_decode_extradata in libavformat/adtsenc.c to check the init_get_bits return value (bsc#1189724).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189724">SUSE bug 1189724</bugzilla>
	<cve impact="important" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38171/">CVE-2021-38171</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633363" comment="libavcodec-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633364" comment="libavformat-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633365" comment="libavresample-devel-3.4.2-11.11.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633366" comment="libavresample3-3.4.2-11.11.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111982" version="1" class="patch">
	<metadata>
		<title>Security update for grilo (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1189839" ref_url="https://bugzilla.suse.com/1189839" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-39365" ref_url="https://www.suse.com/security/cve/CVE-2021-39365/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009493.html" source="SUSE-SU"/>
		<description>
This update for grilo fixes the following issues:

- CVE-2021-39365: Fixed missing TLS certificate verification (bsc#1189839).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189839">SUSE bug 1189839</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-39365/">CVE-2021-39365</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633361" comment="grilo-lang-0.3.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633362" comment="grilo-tools-0.3.12-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111983" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1040364" ref_url="https://bugzilla.suse.com/1040364" source="BUGZILLA"/>
		<reference ref_id="1127650" ref_url="https://bugzilla.suse.com/1127650" source="BUGZILLA"/>
		<reference ref_id="1135481" ref_url="https://bugzilla.suse.com/1135481" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1160010" ref_url="https://bugzilla.suse.com/1160010" source="BUGZILLA"/>
		<reference ref_id="1167032" ref_url="https://bugzilla.suse.com/1167032" source="BUGZILLA"/>
		<reference ref_id="1168202" ref_url="https://bugzilla.suse.com/1168202" source="BUGZILLA"/>
		<reference ref_id="1174969" ref_url="https://bugzilla.suse.com/1174969" source="BUGZILLA"/>
		<reference ref_id="1175052" ref_url="https://bugzilla.suse.com/1175052" source="BUGZILLA"/>
		<reference ref_id="1175543" ref_url="https://bugzilla.suse.com/1175543" source="BUGZILLA"/>
		<reference ref_id="1177399" ref_url="https://bugzilla.suse.com/1177399" source="BUGZILLA"/>
		<reference ref_id="1180141" ref_url="https://bugzilla.suse.com/1180141" source="BUGZILLA"/>
		<reference ref_id="1180347" ref_url="https://bugzilla.suse.com/1180347" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181972" ref_url="https://bugzilla.suse.com/1181972" source="BUGZILLA"/>
		<reference ref_id="1184114" ref_url="https://bugzilla.suse.com/1184114" source="BUGZILLA"/>
		<reference ref_id="1184180" ref_url="https://bugzilla.suse.com/1184180" source="BUGZILLA"/>
		<reference ref_id="1185675" ref_url="https://bugzilla.suse.com/1185675" source="BUGZILLA"/>
		<reference ref_id="1185902" ref_url="https://bugzilla.suse.com/1185902" source="BUGZILLA"/>
		<reference ref_id="1186264" ref_url="https://bugzilla.suse.com/1186264" source="BUGZILLA"/>
		<reference ref_id="1186731" ref_url="https://bugzilla.suse.com/1186731" source="BUGZILLA"/>
		<reference ref_id="1187211" ref_url="https://bugzilla.suse.com/1187211" source="BUGZILLA"/>
		<reference ref_id="1187455" ref_url="https://bugzilla.suse.com/1187455" source="BUGZILLA"/>
		<reference ref_id="1187468" ref_url="https://bugzilla.suse.com/1187468" source="BUGZILLA"/>
		<reference ref_id="1187619" ref_url="https://bugzilla.suse.com/1187619" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188172" ref_url="https://bugzilla.suse.com/1188172" source="BUGZILLA"/>
		<reference ref_id="1188418" ref_url="https://bugzilla.suse.com/1188418" source="BUGZILLA"/>
		<reference ref_id="1188439" ref_url="https://bugzilla.suse.com/1188439" source="BUGZILLA"/>
		<reference ref_id="1188616" ref_url="https://bugzilla.suse.com/1188616" source="BUGZILLA"/>
		<reference ref_id="1188780" ref_url="https://bugzilla.suse.com/1188780" source="BUGZILLA"/>
		<reference ref_id="1188781" ref_url="https://bugzilla.suse.com/1188781" source="BUGZILLA"/>
		<reference ref_id="1188782" ref_url="https://bugzilla.suse.com/1188782" source="BUGZILLA"/>
		<reference ref_id="1188783" ref_url="https://bugzilla.suse.com/1188783" source="BUGZILLA"/>
		<reference ref_id="1188784" ref_url="https://bugzilla.suse.com/1188784" source="BUGZILLA"/>
		<reference ref_id="1188786" ref_url="https://bugzilla.suse.com/1188786" source="BUGZILLA"/>
		<reference ref_id="1188787" ref_url="https://bugzilla.suse.com/1188787" source="BUGZILLA"/>
		<reference ref_id="1188788" ref_url="https://bugzilla.suse.com/1188788" source="BUGZILLA"/>
		<reference ref_id="1188790" ref_url="https://bugzilla.suse.com/1188790" source="BUGZILLA"/>
		<reference ref_id="1188878" ref_url="https://bugzilla.suse.com/1188878" source="BUGZILLA"/>
		<reference ref_id="1188885" ref_url="https://bugzilla.suse.com/1188885" source="BUGZILLA"/>
		<reference ref_id="1188924" ref_url="https://bugzilla.suse.com/1188924" source="BUGZILLA"/>
		<reference ref_id="1188982" ref_url="https://bugzilla.suse.com/1188982" source="BUGZILLA"/>
		<reference ref_id="1188983" ref_url="https://bugzilla.suse.com/1188983" source="BUGZILLA"/>
		<reference ref_id="1188985" ref_url="https://bugzilla.suse.com/1188985" source="BUGZILLA"/>
		<reference ref_id="1189021" ref_url="https://bugzilla.suse.com/1189021" source="BUGZILLA"/>
		<reference ref_id="1189057" ref_url="https://bugzilla.suse.com/1189057" source="BUGZILLA"/>
		<reference ref_id="1189077" ref_url="https://bugzilla.suse.com/1189077" source="BUGZILLA"/>
		<reference ref_id="1189153" ref_url="https://bugzilla.suse.com/1189153" source="BUGZILLA"/>
		<reference ref_id="1189197" ref_url="https://bugzilla.suse.com/1189197" source="BUGZILLA"/>
		<reference ref_id="1189209" ref_url="https://bugzilla.suse.com/1189209" source="BUGZILLA"/>
		<reference ref_id="1189210" ref_url="https://bugzilla.suse.com/1189210" source="BUGZILLA"/>
		<reference ref_id="1189212" ref_url="https://bugzilla.suse.com/1189212" source="BUGZILLA"/>
		<reference ref_id="1189213" ref_url="https://bugzilla.suse.com/1189213" source="BUGZILLA"/>
		<reference ref_id="1189214" ref_url="https://bugzilla.suse.com/1189214" source="BUGZILLA"/>
		<reference ref_id="1189215" ref_url="https://bugzilla.suse.com/1189215" source="BUGZILLA"/>
		<reference ref_id="1189216" ref_url="https://bugzilla.suse.com/1189216" source="BUGZILLA"/>
		<reference ref_id="1189217" ref_url="https://bugzilla.suse.com/1189217" source="BUGZILLA"/>
		<reference ref_id="1189218" ref_url="https://bugzilla.suse.com/1189218" source="BUGZILLA"/>
		<reference ref_id="1189219" ref_url="https://bugzilla.suse.com/1189219" source="BUGZILLA"/>
		<reference ref_id="1189220" ref_url="https://bugzilla.suse.com/1189220" source="BUGZILLA"/>
		<reference ref_id="1189221" ref_url="https://bugzilla.suse.com/1189221" source="BUGZILLA"/>
		<reference ref_id="1189222" ref_url="https://bugzilla.suse.com/1189222" source="BUGZILLA"/>
		<reference ref_id="1189229" ref_url="https://bugzilla.suse.com/1189229" source="BUGZILLA"/>
		<reference ref_id="1189262" ref_url="https://bugzilla.suse.com/1189262" source="BUGZILLA"/>
		<reference ref_id="1189291" ref_url="https://bugzilla.suse.com/1189291" source="BUGZILLA"/>
		<reference ref_id="1189292" ref_url="https://bugzilla.suse.com/1189292" source="BUGZILLA"/>
		<reference ref_id="1189298" ref_url="https://bugzilla.suse.com/1189298" source="BUGZILLA"/>
		<reference ref_id="1189301" ref_url="https://bugzilla.suse.com/1189301" source="BUGZILLA"/>
		<reference ref_id="1189305" ref_url="https://bugzilla.suse.com/1189305" source="BUGZILLA"/>
		<reference ref_id="1189323" ref_url="https://bugzilla.suse.com/1189323" source="BUGZILLA"/>
		<reference ref_id="1189384" ref_url="https://bugzilla.suse.com/1189384" source="BUGZILLA"/>
		<reference ref_id="1189385" ref_url="https://bugzilla.suse.com/1189385" source="BUGZILLA"/>
		<reference ref_id="1189392" ref_url="https://bugzilla.suse.com/1189392" source="BUGZILLA"/>
		<reference ref_id="1189399" ref_url="https://bugzilla.suse.com/1189399" source="BUGZILLA"/>
		<reference ref_id="1189400" ref_url="https://bugzilla.suse.com/1189400" source="BUGZILLA"/>
		<reference ref_id="1189427" ref_url="https://bugzilla.suse.com/1189427" source="BUGZILLA"/>
		<reference ref_id="1189449" ref_url="https://bugzilla.suse.com/1189449" source="BUGZILLA"/>
		<reference ref_id="1189503" ref_url="https://bugzilla.suse.com/1189503" source="BUGZILLA"/>
		<reference ref_id="1189504" ref_url="https://bugzilla.suse.com/1189504" source="BUGZILLA"/>
		<reference ref_id="1189505" ref_url="https://bugzilla.suse.com/1189505" source="BUGZILLA"/>
		<reference ref_id="1189506" ref_url="https://bugzilla.suse.com/1189506" source="BUGZILLA"/>
		<reference ref_id="1189507" ref_url="https://bugzilla.suse.com/1189507" source="BUGZILLA"/>
		<reference ref_id="1189562" ref_url="https://bugzilla.suse.com/1189562" source="BUGZILLA"/>
		<reference ref_id="1189563" ref_url="https://bugzilla.suse.com/1189563" source="BUGZILLA"/>
		<reference ref_id="1189564" ref_url="https://bugzilla.suse.com/1189564" source="BUGZILLA"/>
		<reference ref_id="1189565" ref_url="https://bugzilla.suse.com/1189565" source="BUGZILLA"/>
		<reference ref_id="1189566" ref_url="https://bugzilla.suse.com/1189566" source="BUGZILLA"/>
		<reference ref_id="1189567" ref_url="https://bugzilla.suse.com/1189567" source="BUGZILLA"/>
		<reference ref_id="1189568" ref_url="https://bugzilla.suse.com/1189568" source="BUGZILLA"/>
		<reference ref_id="1189569" ref_url="https://bugzilla.suse.com/1189569" source="BUGZILLA"/>
		<reference ref_id="1189573" ref_url="https://bugzilla.suse.com/1189573" source="BUGZILLA"/>
		<reference ref_id="1189574" ref_url="https://bugzilla.suse.com/1189574" source="BUGZILLA"/>
		<reference ref_id="1189575" ref_url="https://bugzilla.suse.com/1189575" source="BUGZILLA"/>
		<reference ref_id="1189576" ref_url="https://bugzilla.suse.com/1189576" source="BUGZILLA"/>
		<reference ref_id="1189577" ref_url="https://bugzilla.suse.com/1189577" source="BUGZILLA"/>
		<reference ref_id="1189579" ref_url="https://bugzilla.suse.com/1189579" source="BUGZILLA"/>
		<reference ref_id="1189581" ref_url="https://bugzilla.suse.com/1189581" source="BUGZILLA"/>
		<reference ref_id="1189582" ref_url="https://bugzilla.suse.com/1189582" source="BUGZILLA"/>
		<reference ref_id="1189583" ref_url="https://bugzilla.suse.com/1189583" source="BUGZILLA"/>
		<reference ref_id="1189585" ref_url="https://bugzilla.suse.com/1189585" source="BUGZILLA"/>
		<reference ref_id="1189586" ref_url="https://bugzilla.suse.com/1189586" source="BUGZILLA"/>
		<reference ref_id="1189587" ref_url="https://bugzilla.suse.com/1189587" source="BUGZILLA"/>
		<reference ref_id="1189706" ref_url="https://bugzilla.suse.com/1189706" source="BUGZILLA"/>
		<reference ref_id="1189760" ref_url="https://bugzilla.suse.com/1189760" source="BUGZILLA"/>
		<reference ref_id="1189832" ref_url="https://bugzilla.suse.com/1189832" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189870" ref_url="https://bugzilla.suse.com/1189870" source="BUGZILLA"/>
		<reference ref_id="1189883" ref_url="https://bugzilla.suse.com/1189883" source="BUGZILLA"/>
		<reference ref_id="1190025" ref_url="https://bugzilla.suse.com/1190025" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190117" ref_url="https://bugzilla.suse.com/1190117" source="BUGZILLA"/>
		<reference ref_id="1190131" ref_url="https://bugzilla.suse.com/1190131" source="BUGZILLA"/>
		<reference ref_id="1190181" ref_url="https://bugzilla.suse.com/1190181" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-34556" ref_url="https://www.suse.com/security/cve/CVE-2021-34556/" source="CVE"/>
		<reference ref_id="CVE-2021-35477" ref_url="https://www.suse.com/security/cve/CVE-2021-35477/" source="CVE"/>
		<reference ref_id="CVE-2021-3640" ref_url="https://www.suse.com/security/cve/CVE-2021-3640/" source="CVE"/>
		<reference ref_id="CVE-2021-3653" ref_url="https://www.suse.com/security/cve/CVE-2021-3653/" source="CVE"/>
		<reference ref_id="CVE-2021-3656" ref_url="https://www.suse.com/security/cve/CVE-2021-3656/" source="CVE"/>
		<reference ref_id="CVE-2021-3679" ref_url="https://www.suse.com/security/cve/CVE-2021-3679/" source="CVE"/>
		<reference ref_id="CVE-2021-3732" ref_url="https://www.suse.com/security/cve/CVE-2021-3732/" source="CVE"/>
		<reference ref_id="CVE-2021-3739" ref_url="https://www.suse.com/security/cve/CVE-2021-3739/" source="CVE"/>
		<reference ref_id="CVE-2021-3743" ref_url="https://www.suse.com/security/cve/CVE-2021-3743/" source="CVE"/>
		<reference ref_id="CVE-2021-3753" ref_url="https://www.suse.com/security/cve/CVE-2021-3753/" source="CVE"/>
		<reference ref_id="CVE-2021-3759" ref_url="https://www.suse.com/security/cve/CVE-2021-3759/" source="CVE"/>
		<reference ref_id="CVE-2021-38160" ref_url="https://www.suse.com/security/cve/CVE-2021-38160/" source="CVE"/>
		<reference ref_id="CVE-2021-38198" ref_url="https://www.suse.com/security/cve/CVE-2021-38198/" source="CVE"/>
		<reference ref_id="CVE-2021-38204" ref_url="https://www.suse.com/security/cve/CVE-2021-38204/" source="CVE"/>
		<reference ref_id="CVE-2021-38205" ref_url="https://www.suse.com/security/cve/CVE-2021-38205/" source="CVE"/>
		<reference ref_id="CVE-2021-38207" ref_url="https://www.suse.com/security/cve/CVE-2021-38207/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-September/009508.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).
- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-&gt;len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)
- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).
- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).
- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).
- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832 ).
- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).
- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).
- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).
- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).
- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).
- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).
- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).
- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).
- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).
- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).


The following non-security bugs were fixed:

- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).
- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Export function to claim _CST control (bsc#1175543)
- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)
- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)
- ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes).
- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).
- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).
- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).
- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).
- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).
- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).
- ALSA: seq: Fix racy deletion of subscriber (git-fixes).
- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).
- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).
- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).
- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).
- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).
- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).
- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).
- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).
- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).
- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).
- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).
- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).
- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).
- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).
- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).
- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).
- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).
- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).
- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).
- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).
- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).
- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).
- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).
- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).
- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).
- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)
- Drop watchdog iTCO_wdt patch that causes incompatible behavior (bsc#1189449) Also blacklisted
- Fix breakage of swap over NFS (bsc#1188924).
- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).
- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).
- HID: input: do not report stylus battery state as 'full' (git-fixes).
- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).
- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).
- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).
- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).
- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).
- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).
- KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783).
- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).
- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).
- Move upstreamed BT fixes into sorted section
- NFS: Correct size calculation for create reply length (bsc#1189870).
- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)
- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).
- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).
- PCI/MSI: Correct misleading comments (git-fixes).
- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).
- PCI/MSI: Enable and mask MSI-X early (git-fixes).
- PCI/MSI: Enforce MSI[X] entry updates to be visible (git-fixes).
- PCI/MSI: Enforce that MSI-X table entry is masked for update (git-fixes).
- PCI/MSI: Mask all unused MSI-X entries (git-fixes).
- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).
- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).
- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).
- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).
- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).
- README: Modernize build instructions.
- Revert 'ACPICA: Fix memory leak caused by _CID repair function' (git-fixes).
- Revert 'USB: serial: ch341: fix character loss at high transfer rates' (git-fixes).
- Revert 'dmaengine: imx-sdma: refine to load context only once' (git-fixes).
- Revert 'gpio: eic-sprd: Use devm_platform_ioremap_resource()' (git-fixes).
- Revert 'mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711' (git-fixes).
- SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924).
- SUNRPC: Fix the batch tasks count wraparound (git-fixes).
- SUNRPC: Should wake up the privileged task firstly (git-fixes).
- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).
- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).
- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).
- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).
- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).
- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).
- USB: usbtmc: Fix RCU stall warning (git-fixes).
- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).
- Update patches.suse/ibmvnic-Allow-device-probe-if-the-device-is-not-read.patch (bsc#1167032 ltc#184087 bsc#1184114 ltc#192237).
- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).
- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).
- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).
- ath: Use safer key clearing with key cache entries (git-fixes).
- bcma: Fix memory leak for internally-handled cores (git-fixes).
- bdi: Do not use freezable workqueue (bsc#1189573).
- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).
- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).
- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).
- blk-wbt: make sure throttle is enabled properly (bsc#1189504).
- block: fix trace completion for chained bio (bsc#1189505).
- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).
- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).
- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).
- btrfs: add a comment explaining the data flush steps (bsc#1135481).
- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).
- btrfs: add flushing states for handling data reservations (bsc#1135481).
- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).
- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).
- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).
- btrfs: check tickets after waiting on ordered extents (bsc#1135481).
- btrfs: do async reclaim for data reservations (bsc#1135481).
- btrfs: don't force commit if we are data (bsc#1135481).
- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).
- btrfs: factor out create_chunk() (bsc#1189077).
- btrfs: factor out decide_stripe_size() (bsc#1189077).
- btrfs: factor out gather_device_info() (bsc#1189077).
- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).
- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).
- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).
- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).
- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).
- btrfs: handle invalid profile in chunk allocation (bsc#1189077).
- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).
- btrfs: introduce alloc_chunk_ctl (bsc#1189077).
- btrfs: introduce chunk allocation policy (bsc#1189077).
- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).
- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).
- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).
- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).
- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).
- btrfs: remove orig from shrink_delalloc (bsc#1135481).
- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).
- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).
- btrfs: serialize data reservations if we are flushing (bsc#1135481).
- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).
- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).
- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).
- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).
- btrfs: use the same helper for data and metadata reservations (bsc#1135481).
- btrfs: use ticketing for data space reservations (bsc#1135481).
- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).
- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).
- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).
- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).
- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).
- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).
- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).
- cgroup: verify that source is a string (bsc#1190131).
- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).
- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).
- cifs: constify get_normalized_path() properly (bsc#1185902).
- cifs: do not cargo-cult strndup() (bsc#1185902).
- cifs: do not send tree disconnect to ipc shares (bsc#1185902).
- cifs: do not share tcp servers with dfs mounts (bsc#1185902).
- cifs: do not share tcp sessions of dfs connections (bsc#1185902).
- cifs: fix check of dfs interlinks (bsc#1185902).
- cifs: fix path comparison and hash calc (bsc#1185902).
- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).
- cifs: handle different charsets in dfs cache (bsc#1185902).
- cifs: keep referral server sessions alive (bsc#1185902).
- cifs: missing null pointer check in cifs_mount (bsc#1185902).
- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).
- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).
- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).
- clk: kirkwood: Fix a clocking boot regression (git-fixes).
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).
- cpuidle: Allow idle states to be disabled by default (bsc#1175543)
- cpuidle: Consolidate disabled state checks (bsc#1175543)
- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)
- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)
- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)
- cpuidle: cpuidle_state kABI fix (bsc#1175543)
- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).
- crypto: qat - use proper type for vf_mask (git-fixes).
- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).
- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).
- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).
- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).
- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).
- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).
- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).
- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).
- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).
- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).
- drm/amdgpu/acp: Make PM domain really work (git-fixes).
- drm/msi/mdp4: populate priv-&gt;kms in mdp4_kms_init (git-fixes).
- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).
- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).
- drm/nouveau/disp: power down unused DP links during init (git-fixes).
- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).
- drm: Copy drm_wait_vblank to user before returning (git-fixes).
- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).
- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).
- ext4: fix avefreec in find_group_orlov (bsc#1189566).
- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).
- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).
- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).
- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).
- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).
- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).
- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).
- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).
- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).
- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).
- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).
- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).
- gpio: tqmx86: really make IRQ optional (git-fixes).
- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).
- i2c: highlander: add IRQ check (git-fixes).
- i2c: iop3xx: fix deferred probing (git-fixes).
- i2c: mt65xx: fix IRQ check (git-fixes).
- i2c: s3c2410: fix IRQ check (git-fixes).
- iio: adc: Fix incorrect exit of for-loop (git-fixes).
- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).
- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).
- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)
- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)
- intel_idle: Annotate init time data structures (bsc#1175543)
- intel_idle: Customize IceLake server support (bsc#1175543)
- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)
- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)
- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)
- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)
- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)
- intel_idle: Use ACPI _CST on server systems (bsc#1175543)
- iommu/amd: Fix extended features logging (bsc#1189213).
- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).
- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).
- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).
- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).
- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).
- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).
- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).
- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).
- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).
- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).
- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).
- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).
- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).
- kABI fix of usb_dcd_config_params (git-fixes).
- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).
- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)
- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).
- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).
- lib/mpi: use kcalloc in mpi_resize (git-fixes).
- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).
- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).
- mailbox: sti: quieten kernel-doc warnings (git-fixes).
- md/raid10: properly indicate failure when ending a failed write request (git-fixes).
- media: TDA1997x: enable EDID support (git-fixes).
- media: cxd2880-spi: Fix an error handling path (git-fixes).
- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).
- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).
- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).
- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).
- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).
- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).
- media: go7007: remove redundant initialization (git-fixes).
- media: rtl28xxu: fix zero-length control request (git-fixes).
- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).
- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).
- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).
- media: zr364xx: fix memory leaks in probe() (git-fixes).
- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).
- memcg: enable accounting for file lock caches (bsc#1190115).
- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).
- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).
- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).
- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).
- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).
- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).
- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).
- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).
- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).
- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).
- mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes).
- nbd: Aovid double completion of a request (git-fixes).
- nbd: Fix NULL pointer in flush_workqueue (git-fixes).
- nbd: do not update block size after device is started (git-fixes).
- net/mlx5: Properly convey driver version to firmware (git-fixes).
- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).
- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).
- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).
- nfs: fix acl memory leak of posix_acl_create() (git-fixes).
- nvme-multipath: revalidate paths during rescan (bsc#1187211)
- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).
- nvme-pci: fix NULL req in completion handler (bsc#1181972).
- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).
- nvme-pci: use unsigned for io queue depth (bsc#1181972).
- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).
- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).
- nvme: avoid possible double fetch in handling CQE (bsc#1181972).
- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).
- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).
- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).
- ocfs2: fix snprintf() checking (bsc#1189581).
- ocfs2: fix zero out valid data (bsc#1189579).
- ocfs2: initialize ip_next_orphan (bsc#1186731).
- ocfs2: issue zeroout to EOF blocks (bsc#1189582).
- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).
- overflow: Correct check_shl_overflow() comment (git-fixes).
- ovl: allow upperdir inside lowerdir (bsc#1189323).
- ovl: expand warning in ovl_d_real() (bsc#1189323).
- ovl: fix missing revert_creds() on error path (bsc#1189323).
- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).
- ovl: skip getxattr of security labels (bsc#1189323).
- params: lift param_set_uint_minmax to common code (bsc#1181972).
- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).
- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).
- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).
- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).
- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).
- power: supply: max17042: handle fails of reading status register (git-fixes).
- powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).
- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).
- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).
- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)
- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).
- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).
- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).
- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)
- rpm: Abolish image suffix (bsc#1189841).
- rpm: Define $certs as rpm macro (bsc#1189841).
- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).
- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).
- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz.
- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).
- rsi: fix an error code in rsi_probe() (git-fixes).
- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).
- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).
- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).
- sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes)
- sched/rt: Fix RT utilization tracking during policy change (git-fixes)
- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).
- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).
- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).
- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).
- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).
- scsi: libfc: Fix array index out of bound exception (bsc#1188616).
- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).
- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).
- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).
- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).
- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).
- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).
- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).
- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).
- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).
- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).
- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).
- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).
- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).
- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).
- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).
- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).
- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).
- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).
- scsi: lpfc: Improve firmware download logging (bsc#1189385).
- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).
- scsi: lpfc: Move initialization of phba-&gt;poll_list earlier to avoid crash (git-fixes).
- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).
- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).
- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).
- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).
- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).
- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).
- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).
- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).
- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).
- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).
- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).
- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).
- scsi: qla2xxx: Add heartbeat check (bsc#1189392).
- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).
- scsi: qla2xxx: Fix spelling mistakes 'allloc' -&gt; 'alloc' (bsc#1189392).
- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).
- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).
- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).
- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).
- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).
- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).
- scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392).
- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).
- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).
- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).
- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).
- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).
- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).
- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).
- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Add key update (bsc#1189392).
- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).
- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).
- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).
- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).
- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).
- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).
- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).
- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).
- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).
- slimbus: messaging: check for valid transaction id (git-fixes).
- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).
- slimbus: ngd: reset dma setup during runtime pm (git-fixes).
- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).
- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).
- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).
- soc: ixp4xx: fix printing resources (git-fixes).
- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).
- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).
- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).
- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).
- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).
- spi: mediatek: Fix fifo transfer (git-fixes).
- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).
- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).
- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).
- spi: stm32h7: fix full duplex irq handler handling (git-fixes).
- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).
- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).
- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).
- tracing / histogram: Give calculation hist_fields a size (git-fixes).
- tracing: Reject string operand in the histogram expression (git-fixes).
- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).
- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).
- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).
- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).
- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).
- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).
- usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes).
- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).
- usb: dwc3: Separate field holding multiple properties (git-fixes).
- usb: dwc3: Stop active transfers before halting the controller (git-fixes).
- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).
- usb: dwc3: Use devres to get clocks (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).
- usb: dwc3: debug: Remove newline printout (git-fixes).
- usb: dwc3: gadget: Check MPS of the request length (git-fixes).
- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).
- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).
- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).
- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).
- usb: dwc3: gadget: Do not setup more than requested (git-fixes).
- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).
- usb: dwc3: gadget: Fix handling ZLP (git-fixes).
- usb: dwc3: gadget: Give back staled requests (git-fixes).
- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).
- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).
- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).
- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).
- usb: dwc3: gadget: Set BESL config parameter (git-fixes).
- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).
- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).
- usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes).
- usb: dwc3: meson-g12a: add IRQ check (git-fixes).
- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).
- usb: dwc3: of-simple: add a shutdown (git-fixes).
- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).
- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).
- usb: dwc3: support continuous runtime PM with dual role (git-fixes).
- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).
- usb: gadget: Export recommended BESL values (git-fixes).
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).
- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).
- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).
- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).
- usb: gadget: udc: at91: add IRQ check (git-fixes).
- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).
- usb: host: ohci-tmio: add IRQ check (git-fixes).
- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).
- usb: mtu3: fix the wrong HS mult value (git-fixes).
- usb: mtu3: use @mult for HS isoc or intr (git-fixes).
- usb: phy: fsl-usb: add IRQ check (git-fixes).
- usb: phy: tahvo: add IRQ check (git-fixes).
- usb: phy: twl6030: add IRQ checks (git-fixes).
- virt_wifi: fix error on connect (git-fixes).
- virtio_pci: Support surprise removal of virtio pci device (git-fixes).
- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).
- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).
- wireguard: allowedips: remove nodes in O(1) (git-fixes).
- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).
- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).
- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).
- x86/fpu: Reset state for all signal restore failures (bsc#1152489).
- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).
- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).
- xen/events: Fix race in set_evtchn_to_irq (git-fixes).
- xprtrdma: Pad optimization, revisited (bsc#1189760).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-23"/>
	<updated date="2021-09-23"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1040364">SUSE bug 1040364</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127650">SUSE bug 1127650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1135481">SUSE bug 1135481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1160010">SUSE bug 1160010</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167032">SUSE bug 1167032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1168202">SUSE bug 1168202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174969">SUSE bug 1174969</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175052">SUSE bug 1175052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175543">SUSE bug 1175543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177399">SUSE bug 1177399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180141">SUSE bug 1180141</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180347">SUSE bug 1180347</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181972">SUSE bug 1181972</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184114">SUSE bug 1184114</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184180">SUSE bug 1184180</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185675">SUSE bug 1185675</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185902">SUSE bug 1185902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186264">SUSE bug 1186264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186731">SUSE bug 1186731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187211">SUSE bug 1187211</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187455">SUSE bug 1187455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187468">SUSE bug 1187468</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187619">SUSE bug 1187619</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188172">SUSE bug 1188172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188418">SUSE bug 1188418</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188439">SUSE bug 1188439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188616">SUSE bug 1188616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188780">SUSE bug 1188780</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188781">SUSE bug 1188781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188782">SUSE bug 1188782</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188783">SUSE bug 1188783</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188784">SUSE bug 1188784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188786">SUSE bug 1188786</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188787">SUSE bug 1188787</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188788">SUSE bug 1188788</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188790">SUSE bug 1188790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188878">SUSE bug 1188878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188885">SUSE bug 1188885</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188924">SUSE bug 1188924</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188982">SUSE bug 1188982</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188983">SUSE bug 1188983</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188985">SUSE bug 1188985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189021">SUSE bug 1189021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189057">SUSE bug 1189057</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189077">SUSE bug 1189077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189153">SUSE bug 1189153</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189197">SUSE bug 1189197</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189209">SUSE bug 1189209</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189210">SUSE bug 1189210</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189212">SUSE bug 1189212</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189213">SUSE bug 1189213</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189214">SUSE bug 1189214</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189215">SUSE bug 1189215</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189216">SUSE bug 1189216</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189217">SUSE bug 1189217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189218">SUSE bug 1189218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189219">SUSE bug 1189219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189220">SUSE bug 1189220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189221">SUSE bug 1189221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189222">SUSE bug 1189222</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189229">SUSE bug 1189229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189262">SUSE bug 1189262</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189291">SUSE bug 1189291</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189292">SUSE bug 1189292</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189298">SUSE bug 1189298</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189301">SUSE bug 1189301</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189305">SUSE bug 1189305</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189323">SUSE bug 1189323</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189384">SUSE bug 1189384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189385">SUSE bug 1189385</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189392">SUSE bug 1189392</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189399">SUSE bug 1189399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189400">SUSE bug 1189400</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189427">SUSE bug 1189427</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189449">SUSE bug 1189449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189503">SUSE bug 1189503</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189504">SUSE bug 1189504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189505">SUSE bug 1189505</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189506">SUSE bug 1189506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189507">SUSE bug 1189507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189562">SUSE bug 1189562</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189563">SUSE bug 1189563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189564">SUSE bug 1189564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189565">SUSE bug 1189565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189566">SUSE bug 1189566</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189567">SUSE bug 1189567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189568">SUSE bug 1189568</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189569">SUSE bug 1189569</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189573">SUSE bug 1189573</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189574">SUSE bug 1189574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189575">SUSE bug 1189575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189576">SUSE bug 1189576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189577">SUSE bug 1189577</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189579">SUSE bug 1189579</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189581">SUSE bug 1189581</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189582">SUSE bug 1189582</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189583">SUSE bug 1189583</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189585">SUSE bug 1189585</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189586">SUSE bug 1189586</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189587">SUSE bug 1189587</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189706">SUSE bug 1189706</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189760">SUSE bug 1189760</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189832">SUSE bug 1189832</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189870">SUSE bug 1189870</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189883">SUSE bug 1189883</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190025">SUSE bug 1190025</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190117">SUSE bug 1190117</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190131">SUSE bug 1190131</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190181">SUSE bug 1190181</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-34556/">CVE-2021-34556</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-35477/">CVE-2021-35477</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3640/">CVE-2021-3640</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3653/">CVE-2021-3653</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3656/">CVE-2021-3656</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3679/">CVE-2021-3679</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3732/">CVE-2021-3732</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3739/">CVE-2021-3739</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3743/">CVE-2021-3743</cve>
	<cve impact="moderate" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3753/">CVE-2021-3753</cve>
	<cve impact="moderate" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3759/">CVE-2021-3759</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38160/">CVE-2021-38160</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38198/">CVE-2021-38198</cve>
	<cve impact="moderate" cvss3="4.2/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38204/">CVE-2021-38204</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-38205/">CVE-2021-38205</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38207/">CVE-2021-38207</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009633367" comment="kernel-default-extra-5.3.18-24.83.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009633368" comment="kernel-preempt-extra-5.3.18-24.83.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111984" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1186761" ref_url="https://bugzilla.suse.com/1186761" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-22042" ref_url="https://www.suse.com/security/cve/CVE-2020-22042/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009540.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2020-22042: Fixed a denial of service vulnerability led by a memory leak in the link_filter_inouts function in libavfilter/graphparser.c. (bsc#1186761)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-06"/>
	<updated date="2021-10-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186761">SUSE bug 1186761</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22042/">CVE-2020-22042</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009634476" comment="libavcodec-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634477" comment="libavformat-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634478" comment="libavresample-devel-3.4.2-11.14.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009634479" comment="libavresample3-3.4.2-11.14.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111985" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1148868" ref_url="https://bugzilla.suse.com/1148868" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1159886" ref_url="https://bugzilla.suse.com/1159886" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1170774" ref_url="https://bugzilla.suse.com/1170774" source="BUGZILLA"/>
		<reference ref_id="1173746" ref_url="https://bugzilla.suse.com/1173746" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184439" ref_url="https://bugzilla.suse.com/1184439" source="BUGZILLA"/>
		<reference ref_id="1184804" ref_url="https://bugzilla.suse.com/1184804" source="BUGZILLA"/>
		<reference ref_id="1185302" ref_url="https://bugzilla.suse.com/1185302" source="BUGZILLA"/>
		<reference ref_id="1185677" ref_url="https://bugzilla.suse.com/1185677" source="BUGZILLA"/>
		<reference ref_id="1185726" ref_url="https://bugzilla.suse.com/1185726" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188067" ref_url="https://bugzilla.suse.com/1188067" source="BUGZILLA"/>
		<reference ref_id="1188651" ref_url="https://bugzilla.suse.com/1188651" source="BUGZILLA"/>
		<reference ref_id="1188986" ref_url="https://bugzilla.suse.com/1188986" source="BUGZILLA"/>
		<reference ref_id="1189297" ref_url="https://bugzilla.suse.com/1189297" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1189884" ref_url="https://bugzilla.suse.com/1189884" source="BUGZILLA"/>
		<reference ref_id="1190023" ref_url="https://bugzilla.suse.com/1190023" source="BUGZILLA"/>
		<reference ref_id="1190062" ref_url="https://bugzilla.suse.com/1190062" source="BUGZILLA"/>
		<reference ref_id="1190115" ref_url="https://bugzilla.suse.com/1190115" source="BUGZILLA"/>
		<reference ref_id="1190159" ref_url="https://bugzilla.suse.com/1190159" source="BUGZILLA"/>
		<reference ref_id="1190358" ref_url="https://bugzilla.suse.com/1190358" source="BUGZILLA"/>
		<reference ref_id="1190406" ref_url="https://bugzilla.suse.com/1190406" source="BUGZILLA"/>
		<reference ref_id="1190432" ref_url="https://bugzilla.suse.com/1190432" source="BUGZILLA"/>
		<reference ref_id="1190467" ref_url="https://bugzilla.suse.com/1190467" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190534" ref_url="https://bugzilla.suse.com/1190534" source="BUGZILLA"/>
		<reference ref_id="1190543" ref_url="https://bugzilla.suse.com/1190543" source="BUGZILLA"/>
		<reference ref_id="1190576" ref_url="https://bugzilla.suse.com/1190576" source="BUGZILLA"/>
		<reference ref_id="1190595" ref_url="https://bugzilla.suse.com/1190595" source="BUGZILLA"/>
		<reference ref_id="1190596" ref_url="https://bugzilla.suse.com/1190596" source="BUGZILLA"/>
		<reference ref_id="1190598" ref_url="https://bugzilla.suse.com/1190598" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190626" ref_url="https://bugzilla.suse.com/1190626" source="BUGZILLA"/>
		<reference ref_id="1190679" ref_url="https://bugzilla.suse.com/1190679" source="BUGZILLA"/>
		<reference ref_id="1190705" ref_url="https://bugzilla.suse.com/1190705" source="BUGZILLA"/>
		<reference ref_id="1190717" ref_url="https://bugzilla.suse.com/1190717" source="BUGZILLA"/>
		<reference ref_id="1190746" ref_url="https://bugzilla.suse.com/1190746" source="BUGZILLA"/>
		<reference ref_id="1190758" ref_url="https://bugzilla.suse.com/1190758" source="BUGZILLA"/>
		<reference ref_id="1190784" ref_url="https://bugzilla.suse.com/1190784" source="BUGZILLA"/>
		<reference ref_id="1190785" ref_url="https://bugzilla.suse.com/1190785" source="BUGZILLA"/>
		<reference ref_id="1191172" ref_url="https://bugzilla.suse.com/1191172" source="BUGZILLA"/>
		<reference ref_id="1191193" ref_url="https://bugzilla.suse.com/1191193" source="BUGZILLA"/>
		<reference ref_id="1191240" ref_url="https://bugzilla.suse.com/1191240" source="BUGZILLA"/>
		<reference ref_id="1191292" ref_url="https://bugzilla.suse.com/1191292" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-3702" ref_url="https://www.suse.com/security/cve/CVE-2020-3702/" source="CVE"/>
		<reference ref_id="CVE-2021-3669" ref_url="https://www.suse.com/security/cve/CVE-2021-3669/" source="CVE"/>
		<reference ref_id="CVE-2021-3744" ref_url="https://www.suse.com/security/cve/CVE-2021-3744/" source="CVE"/>
		<reference ref_id="CVE-2021-3752" ref_url="https://www.suse.com/security/cve/CVE-2021-3752/" source="CVE"/>
		<reference ref_id="CVE-2021-3764" ref_url="https://www.suse.com/security/cve/CVE-2021-3764/" source="CVE"/>
		<reference ref_id="CVE-2021-40490" ref_url="https://www.suse.com/security/cve/CVE-2021-40490/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009597.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated.


The following security bugs were fixed:

- CVE-2020-3702: Fixed a bug which could be triggered with specifically timed and handcrafted traffic and cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure. (bnc#1191193)
- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel's bluetooth module. (bsc#1190023)
- CVE-2021-40490: Fixed a race condition discovered in the ext4 subsystem that could leat to local priviledge escalation. (bnc#1190159)
- CVE-2021-3744: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1189884)
- CVE-2021-3764: Fixed a bug which could allows attackers to cause a denial of service. (bsc#1190534)
- CVE-2021-3669: Fixed a bug that doesn't allow /proc/sysvipc/shm to scale with large shared memory segment counts which could lead to resource exhaustion and DoS. (bsc#1188986)

The following non-security bugs were fixed:

- ALSA: firewire-motu: fix truncated bytes in message tracepoints (git-fixes).
- apparmor: remove duplicate macro list_entry_is_head() (git-fixes).
- ASoC: fsl_micfil: register platform component before registering cpu dai (git-fixes).
- ASoC: mediatek: common: handle NULL case in suspend/resume function (git-fixes).
- ASoC: rockchip: i2s: Fix regmap_ops hang (git-fixes).
- ASoC: rockchip: i2s: Fixup config for DAIFMT_DSP_A/B (git-fixes).
- ASoC: SOF: Fix DSP oops stack dump output contents (git-fixes).
- ath9k: fix OOB read ar9300_eeprom_restore_internal (git-fixes).
- ath9k: fix sleeping in atomic context (git-fixes).
- blk-mq: do not deactivate hctx if managed irq isn't used (bsc#1185762).
- blk-mq: kABI fixes for blk_mq_queue_map (bsc#1185762).
- blk-mq: mark if one queue map uses managed irq (bsc#1185762).
- Bluetooth: skip invalid hci_sync_conn_complete_evt (git-fixes).
- bnx2x: fix an error code in bnx2x_nic_load() (git-fixes).
- bnxt_en: Add missing DMA memory barriers (git-fixes).
- bnxt_en: Disable aRFS if running on 212 firmware (git-fixes).
- bnxt_en: Do not enable legacy TX push on older firmware (git-fixes).
- bnxt_en: Store the running firmware version code (git-fixes).
- bnxt: count Tx drops (git-fixes).
- bnxt: disable napi before canceling DIM (git-fixes).
- bnxt: do not lock the tx queue from napi poll (git-fixes).
- bnxt: make sure xmit_more + errors does not miss doorbells (git-fixes).
- btrfs: prevent rename2 from exchanging a subvol with a directory from different parents (bsc#1190626).
- clk: at91: clk-generated: Limit the requested rate to our range (git-fixes).
- clk: at91: clk-generated: pass the id of changeable parent at registration (git-fixes).
- console: consume APC, DM, DCS (git-fixes).
- cuse: fix broken release (bsc#1190596).
- cxgb4: dont touch blocked freelist bitmap after free (git-fixes).
- debugfs: Return error during {full/open}_proxy_open() on rmmod (bsc#1173746).
- devlink: Break parameter notification sequence to be before/after unload/load driver (bsc#1154353).
- dmaengine: ioat: depends on !UML (git-fixes).
- dmaengine: sprd: Add missing MODULE_DEVICE_TABLE (git-fixes).
- dmaengine: xilinx_dma: Set DMA mask for coherent APIs (git-fixes).
- docs: Fix infiniband uverbs minor number (git-fixes).
- drivers: gpu: amd: Initialize amdgpu_dm_backlight_caps object to 0 in amdgpu_dm_update_backlight_caps (git-fixes).
- drm: avoid blocking in drm_clients_info's rcu section (git-fixes).
- drm/amd/amdgpu: Update debugfs link_settings output link_rate field in hex (git-fixes).
- drm/amd/display: Fix timer_per_pixel unit error (git-fixes).
- drm/amdgpu: Fix BUG_ON assert (git-fixes).
- drm/gma500: Fix end of loop tests for list_for_each_entry (git-fixes).
- drm/nouveau/nvkm: Replace -ENOSYS with -ENODEV (git-fixes).
- drm/panfrost: Clamp lock region to Bifrost minimum (git-fixes).
- e1000e: Do not take care about recovery NVM checksum (jsc#SLE-8100).
- e1000e: Fix the max snoop/no-snoop latency for 10M (git-fixes).
- EDAC/i10nm: Fix NVDIMM detection (bsc#1152489).
- EDAC/synopsys: Fix wrong value type assignment for edac_mode (bsc#1152489).
- erofs: fix up erofs_lookup tracepoint (git-fixes).
- fbmem: do not allow too huge resolutions (git-fixes).
- fpga: machxo2-spi: Fix missing error code in machxo2_write_complete() (git-fixes).
- fpga: machxo2-spi: Return an error on failure (git-fixes).
- fuse: flush extending writes (bsc#1190595).
- fuse: truncate pagecache on atomic_o_trunc (bsc#1190705).
- genirq: add device_has_managed_msi_irq (bsc#1185762).
- gpio: uniphier: Fix void functions to remove return value (git-fixes).
- gpu: drm: amd: amdgpu: amdgpu_i2c: fix possible uninitialized-variable access in amdgpu_i2c_router_select_ddc_port() (git-fixes).
- gve: fix the wrong AdminQ buffer overflow check (bsc#1176940).
- hv_netvsc: Make netvsc/VF binding check both MAC and serial number (jsc#SLE-18779, bsc#1185726).
- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185726).
- hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs (git-fixes).
- hwmon: (tmp421) fix rounding for negative values (git-fixes).
- hwmon: (tmp421) report /PVLD condition as fault (git-fixes).
- i40e: Add additional info to PHY type error (git-fixes).
- i40e: Fix firmware LLDP agent related warning (git-fixes).
- i40e: Fix log TC creation failure when max num of queues is exceeded (git-fixes).
- i40e: Fix logic of disabling queues (git-fixes).
- i40e: Fix queue-to-TC mapping on Tx (git-fixes).
- iavf: Fix ping is lost after untrusted VF had tried to change MAC (jsc#SLE-7940).
- iavf: Set RSS LUT and key in reset handle path (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: Consolidate code in replenish_rx_pool() (bsc#1190758 ltc#191943).
- ibmvnic: Fix up some comments and messages (bsc#1190758 ltc#191943).
- ibmvnic: init_tx_pools move loop-invariant code (bsc#1190758 ltc#191943).
- ibmvnic: Reuse LTB when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse rx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Reuse tx pools when possible (bsc#1190758 ltc#191943).
- ibmvnic: Use bitmap for LTB map_ids (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_rx_pools (bsc#1190758 ltc#191943).
- ibmvnic: Use/rename local vars in init_tx_pools (bsc#1190758 ltc#191943).
- ice: Prevent probing virtual functions (git-fixes).
- iio: dac: ad5624r: Fix incorrect handling of an optional regulator (git-fixes).
- include/linux/list.h: add a macro to test if entry is pointing to the head (git-fixes).
- iomap: Fix negative assignment to unsigned sis-&gt;pages in iomap_swapfile_activate (bsc#1190784).
- ionic: cleanly release devlink instance (bsc#1167773).
- ionic: count csum_none when offload enabled (bsc#1167773).
- ipc: remove memcg accounting for sops objects in do_semtimedop() (bsc#1190115).
- ipc/util.c: use binary search for max_idx (bsc#1159886).
- ipvs: allow connection reuse for unconfirmed conntrack (bsc#1190467).
- ipvs: avoid expiring many connections from timer (bsc#1190467).
- ipvs: Fix up kabi for expire_nodest_conn_work addition (bsc#1190467).
- ipvs: queue delayed work to expire no destination connections if expire_nodest_conn=1 (bsc#1190467).
- iwlwifi: mvm: fix a memory leak in iwl_mvm_mac_ctxt_beacon_changed (git-fixes).
- kernel-binary.spec: Check for no kernel signing certificates. Also remove unused variable.
- kernel-binary.spec: Do not fail silently when KMP is empty (bsc#1190358). Copy the code from kernel-module-subpackage that deals with empty KMPs.
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).
- kernel-binary.spec.in Stop templating the scriptlets for subpackages (bsc#1190358). The script part for base package case is completely separate from the part for subpackages. Remove the part for subpackages from the base package script and use the KMP scripts for subpackages instead.
- libata: fix ata_host_start() (git-fixes).
- mac80211-hwsim: fix late beacon hrtimer handling (git-fixes).
- mac80211: Fix ieee80211_amsdu_aggregate frag_tail bug (git-fixes).
- mac80211: fix use-after-free in CCMP/GCMP RX (git-fixes).
- mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (git-fixes).
- mac80211: mesh: fix potentially unaligned access (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: coda: fix frame_mem_ctrl for YUV420 and YVU420 formats (git-fixes).
- media: dib8000: rewrite the init prbs logic (git-fixes).
- media: imx258: Limit the max analogue gain to 480 (git-fixes).
- media: imx258: Rectify mismatch of VTS value (git-fixes).
- media: rc-loopback: return number of emitters rather than error (git-fixes).
- media: TDA1997x: fix tda1997x_query_dv_timings() return value (git-fixes).
- media: uvc: do not do DMA on stack (git-fixes).
- media: v4l2-dv-timings.c: fix wrong condition in two for-loops (git-fixes).
- mfd: Do not use irq_create_mapping() to resolve a mapping (git-fixes).
- mlx4: Fix missing error code in mlx4_load_one() (git-fixes).
- mm: always have io_remap_pfn_range() set pgprot_decrypted() (git-fixes).
- mm/swap: consider max pages in iomap_swapfile_add_extent (bsc#1190785).
- mmc: core: Return correct emmc response in case of ioctl error (git-fixes).
- mmc: rtsx_pci: Fix long reads when clock is prescaled (git-fixes).
- mmc: sdhci-of-arasan: Check return value of non-void funtions (git-fixes).
- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185726).
- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185726).
- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185726).
- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185726).
- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185726).
- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185726).
- net: mana: Prefer struct_size over open coded arithmetic (jsc#SLE-18779, bsc#1185726).
- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185726).
- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185726).
- net: mana: Use struct_size() in kzalloc() (jsc#SLE-18779, bsc#1185726).
- net: qlcnic: add missed unlock in qlcnic_83xx_flash_read32 (git-fixes).
- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).
- net/mlx5: E-Switch, handle devcom events only for ports on the same device (git-fixes).
- net/mlx5: Fix flow table chaining (git-fixes).
- net/mlx5: Fix return value from tracer initialization (git-fixes).
- net/mlx5: Unload device upon firmware fatal error (git-fixes).
- net/mlx5e: Avoid creating tunnel headers for local route (git-fixes).
- net/mlx5e: Fix nullptr in mlx5e_hairpin_get_mdev() (git-fixes).
- net/mlx5e: Prohibit inner indir TIRs in IPoIB (git-fixes).
- netfilter: conntrack: do not renew entry stuck in tcp SYN_SENT state (bsc#1190062).
- nfp: update ethtool reporting of pauseframe control (git-fixes).
- NFS: change nfs_access_get_cached to only report the mask (bsc#1190746).
- NFS: do not store 'struct cred *' in struct nfs_access_entry (bsc#1190746).
- NFS: pass cred explicitly for access tests (bsc#1190746).
- nvme: avoid race in shutdown namespace removal (bsc#1188067).
- nvme: fix refcounting imbalance when all paths are down (bsc#1188067).
- parport: remove non-zero check on count (git-fixes).
- PCI: aardvark: Fix checking for PIO status (git-fixes).
- PCI: aardvark: Fix masking and unmasking legacy INTx interrupts (git-fixes).
- PCI: aardvark: Increase polling delay to 1.5s while waiting for PIO response (git-fixes).
- PCI: Add ACS quirks for Cavium multi-function devices (git-fixes).
- PCI: Add ACS quirks for NXP LX2xx0 and LX2xx2 platforms (git-fixes).
- PCI: Add AMD GPU multi-function power dependencies (git-fixes).
- PCI: ibmphp: Fix double unmap of io_mem (git-fixes).
- PCI: pci-bridge-emul: Add PCIe Root Capabilities Register (git-fixes).
- PCI: pci-bridge-emul: Fix array overruns, improve safety (git-fixes).
- PCI: pci-bridge-emul: Fix big-endian support (git-fixes).
- PCI: Restrict ASMedia ASM1062 SATA Max Payload Size Supported (git-fixes).
- PCI: Use pci_update_current_state() in pci_enable_device_flags() (git-fixes).
- PM: base: power: do not try to use non-existing RTC for storing data (git-fixes).
- PM: EM: Increase energy calculation precision (git-fixes).
- power: supply: axp288_fuel_gauge: Report register-address on readb / writeb errors (git-fixes).
- power: supply: max17042_battery: fix typo in MAx17042_TOFF (git-fixes).
- powercap: intel_rapl: add support for Sapphire Rapids (jsc#SLE-15289).
- powerpc: fix function annotations to avoid section mismatch warnings with gcc-10 (bsc#1148868).
- powerpc/drmem: Make LMB walk a bit more flexible (bsc#1190543 ltc#194523).
- powerpc/perf: Drop the case of returning 0 as instruction pointer (bsc#1065729).
- powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set (bsc#1065729).
- powerpc/perf: Fix the check for SIAR value (bsc#1065729).
- powerpc/perf: Use regs-&gt;nip when SIAR is zero (bsc#1065729).
- powerpc/perf: Use stack siar instead of mfspr (bsc#1065729).
- powerpc/perf: Use the address from SIAR register to set cpumode flags (bsc#1065729).
- powerpc/perf/hv-gpci: Fix counter value parsing (bsc#1065729).
- powerpc/powernv: Fix machine check reporting of async store errors (bsc#1065729).
- powerpc/pseries: Prevent free CPU ids being reused on another node (bsc#1190620 ltc#194498).
- powerpc/pseries/dlpar: use rtas_get_sensor() (bsc#1065729).
- pseries/drmem: update LMBs after LPM (bsc#1190543 ltc#194523).
- pwm: img: Do not modify HW state in .remove() callback (git-fixes).
- pwm: rockchip: Do not modify HW state in .remove() callback (git-fixes).
- pwm: stm32-lp: Do not modify HW state in .remove() callback (git-fixes).
- qlcnic: Remove redundant unlock in qlcnic_pinit_from_rom (git-fixes).
- RDMA/bnxt_re: Remove unpaired rtnl unlock in bnxt_re_dev_init() (bsc#1170774).
- Re-enable UAS for LaCie Rugged USB3-FW with fk quirk (git-fixes).
- regmap: fix page selection for noinc reads (git-fixes).
- regmap: fix page selection for noinc writes (git-fixes).
- regmap: fix the offset of register error log (git-fixes).
- Restore kabi after NFS: pass cred explicitly for access tests (bsc#1190746).
- rpm: Abolish scritplet templating (bsc#1189841). Outsource kernel-binary and KMP scriptlets to suse-module-tools. This allows fixing bugs in the scriptlets as well as defining initrd regeneration policy independent of the kernel packages.
- rpm/kernel-binary.spec: Use only non-empty certificates.
- rpm/kernel-binary.spec.in: avoid conflicting suse-release suse-release had arbitrary values in staging, we can't use it for dependencies. The filesystem one has to be enough (boo#1184804).
- rtc: rx8010: select REGMAP_I2C (git-fixes).
- rtc: tps65910: Correct driver module alias (git-fixes).
- s390/unwind: use current_frame_address() to unwind current task (bsc#1185677).
- sched/fair: Add ancestors of unthrottled undecayed cfs_rq (bsc#1191292).
- scsi: core: Add helper to return number of logical blocks in a request (bsc#1190576).
- scsi: core: Introduce the scsi_cmd_to_rq() function (bsc#1190576).
- scsi: fc: Add EDC ELS definition (bsc#1190576).
- scsi: fc: Update formal FPIN descriptor definitions (bsc#1190576).
- scsi: lpfc: Add bsg support for retrieving adapter cmf data (bsc#1190576).
- scsi: lpfc: Add cm statistics buffer support (bsc#1190576).
- scsi: lpfc: Add cmf_info sysfs entry (bsc#1190576).
- scsi: lpfc: Add cmfsync WQE support (bsc#1190576).
- scsi: lpfc: Add debugfs support for cm framework buffers (bsc#1190576).
- scsi: lpfc: Add EDC ELS support (bsc#1190576).
- scsi: lpfc: Add MIB feature enablement support (bsc#1190576).
- scsi: lpfc: Add rx monitoring statistics (bsc#1190576).
- scsi: lpfc: Add SET_HOST_DATA mbox cmd to pass date/time info to firmware (bsc#1190576).
- scsi: lpfc: Add support for cm enablement buffer (bsc#1190576).
- scsi: lpfc: Add support for maintaining the cm statistics buffer (bsc#1190576).
- scsi: lpfc: Add support for the CM framework (bsc#1190576).
- scsi: lpfc: Adjust bytes received vales during cmf timer interval (bsc#1190576).
- scsi: lpfc: Copyright updates for 14.0.0.1 patches (bsc#1190576).
- scsi: lpfc: Do not release final kref on Fport node while ABTS outstanding (bsc#1190576).
- scsi: lpfc: Do not remove ndlp on PRLI errors in P2P mode (bsc#1190576).
- scsi: lpfc: Expand FPIN and RDF receive logging (bsc#1190576).
- scsi: lpfc: Fix compilation errors on kernels with no CONFIG_DEBUG_FS (bsc#1190576).
- scsi: lpfc: Fix CPU to/from endian warnings introduced by ELS processing (bsc#1190576).
- scsi: lpfc: Fix EEH support for NVMe I/O (bsc#1190576).
- scsi: lpfc: Fix FCP I/O flush functionality for TMF routines (bsc#1190576).
- scsi: lpfc: Fix gcc -Wstringop-overread warning, again (bsc#1190576).
- scsi: lpfc: Fix hang on unload due to stuck fport node (bsc#1190576).
- scsi: lpfc: Fix I/O block after enabling managed congestion mode (bsc#1190576).
- scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() (bsc#1190576).
- scsi: lpfc: Fix NVMe I/O failover to non-optimized path (bsc#1190576).
- scsi: lpfc: Fix premature rpi release for unsolicited TPLS and LS_RJT (bsc#1190576).
- scsi: lpfc: Fix rediscovery of tape device after LIP (bsc#1190576).
- scsi: lpfc: Fix sprintf() overflow in lpfc_display_fpin_wwpn() (bsc#1190576).
- scsi: lpfc: Improve PBDE checks during SGL processing (bsc#1190576).
- scsi: lpfc: Remove unneeded variable (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.1 (bsc#1190576).
- scsi: lpfc: Update lpfc version to 14.0.0.2 (bsc#1190576).
- scsi: lpfc: Use correct scnprintf() limit (bsc#1190576).
- scsi: lpfc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190576).
- scsi: lpfc: Use the proper SCSI midlayer interfaces for PI (bsc#1190576).
- scsi: lpfc: Zero CGN stats only during initial driver load and stat reset (bsc#1190576).
- scsi: scsi_devinfo: Add blacklist entry for HPE OPEN-V (bsc#1189297).
- serial: 8250_pci: make setup_port() parameters explicitly unsigned (git-fixes).
- serial: 8250: Define RX trigger levels for OxSemi 950 devices (git-fixes).
- serial: mvebu-uart: fix driver's tx_empty callback (git-fixes).
- serial: sh-sci: fix break handling for sysrq (git-fixes).
- spi: Fix tegra20 build with CONFIG_PM=n (git-fixes).
- staging: board: Fix uninitialized spinlock when attaching genpd (git-fixes).
- staging: ks7010: Fix the initialization of the 'sleep_status' structure (git-fixes).
- staging: rts5208: Fix get_ms_information() heap buffer size (git-fixes).
- thermal/core: Potential buffer overflow in thermal_build_list_of_policies() (git-fixes).
- time: Handle negative seconds correctly in timespec64_to_ns() (git-fixes).
- tty: Fix data race between tiocsti() and flush_to_ldisc() (git-fixes).
- tty: serial: jsm: hold port lock when reporting modem line changes (git-fixes).
- tty: synclink_gt, drop unneeded forward declarations (git-fixes).
- usb-storage: Add quirk for ScanLogic SL11R-IDE older than 2.6c (git-fixes).
- usb: core: hcd: Add support for deferring roothub registration (git-fixes).
- usb: dwc2: Add missing cleanups when usb_add_gadget_udc() fails (git-fixes).
- usb: dwc2: Avoid leaving the error_debugfs label unused (git-fixes).
- usb: dwc2: gadget: Fix ISOC flow for BDMA and Slave (git-fixes).
- usb: dwc2: gadget: Fix ISOC transfer complete handling for DDMA (git-fixes).
- usb: EHCI: ehci-mv: improve error handling in mv_ehci_enable() (git-fixes).
- usb: gadget: r8a66597: fix a loop in set_feature() (git-fixes).
- usb: gadget: u_ether: fix a potential null pointer dereference (git-fixes).
- usb: host: fotg210: fix the actual_length of an iso packet (git-fixes).
- usb: host: fotg210: fix the endpoint's transactional opportunities calculation (git-fixes).
- usb: musb: musb_dsps: request_irq() after initializing musb (git-fixes).
- usb: musb: tusb6010: uninitialized data in tusb_fifo_write_unaligned() (git-fixes).
- usb: serial: cp210x: add ID for GW Instek GDM-834x Digital Multimeter (git-fixes).
- usb: serial: option: add device id for Foxconn T99W265 (git-fixes).
- usb: serial: option: add Telit LN920 compositions (git-fixes).
- usb: serial: option: remove duplicate USB device ID (git-fixes).
- usbip: give back URBs for unsent unlink requests during cleanup (git-fixes).
- usbip:vhci_hcd USB port can get stuck in the disabled state (git-fixes).
- video: fbdev: asiliantfb: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: Error out if 'pixclock' equals zero (git-fixes).
- video: fbdev: kyro: fix a DoS bug by restricting user input (git-fixes).
- video: fbdev: riva: Error out if 'pixclock' equals zero (git-fixes).
- vmxnet3: add support for 32 Tx/Rx queues (bsc#1190406).
- vmxnet3: add support for ESP IPv6 RSS (bsc#1190406).
- vmxnet3: increase maximum configurable mtu to 9190 (bsc#1190406).
- vmxnet3: prepare for version 6 changes (bsc#1190406).
- vmxnet3: remove power of 2 limitation on the queues (bsc#1190406).
- vmxnet3: set correct hash type based on rss information (bsc#1190406).
- vmxnet3: update to version 6 (bsc#1190406).
- watchdog/sb_watchdog: fix compilation problem due to COMPILE_TEST (git-fixes).
- x86/alternatives: Teach text_poke_bp() to emulate instructions (bsc#1185302).
- x86/apic/msi: Plug non-maskable MSI affinity race (bsc#1184439).
- x86/cpu: Fix core name for Sapphire Rapids (jsc#SLE-15289).
- x86/mm: Fix kern_addr_valid() to cope with existing but not present entries (bsc#1152489).
- x86/resctrl: Fix a maybe-uninitialized build warning treated as error (bsc#1152489).
- x86/resctrl: Fix default monitoring groups reporting (bsc#1152489).
- xfs: allow mount/remount when stripe width alignment is zero (bsc#1188651).
- xfs: sync lazy sb accounting on quiesce of read-only mounts (bsc#1190679).
- xgene-v2: Fix a resource leak in the error handling path of 'xge_probe()' (git-fixes).
- xhci: Set HCD flag to defer primary roothub registration (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-15"/>
	<updated date="2021-10-15"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1148868">SUSE bug 1148868</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1159886">SUSE bug 1159886</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170774">SUSE bug 1170774</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173746">SUSE bug 1173746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184439">SUSE bug 1184439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184804">SUSE bug 1184804</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185302">SUSE bug 1185302</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185677">SUSE bug 1185677</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185726">SUSE bug 1185726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188067">SUSE bug 1188067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188651">SUSE bug 1188651</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188986">SUSE bug 1188986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189297">SUSE bug 1189297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189884">SUSE bug 1189884</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190023">SUSE bug 1190023</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190062">SUSE bug 1190062</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190115">SUSE bug 1190115</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190159">SUSE bug 1190159</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190358">SUSE bug 1190358</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190406">SUSE bug 1190406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190432">SUSE bug 1190432</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190467">SUSE bug 1190467</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190534">SUSE bug 1190534</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190543">SUSE bug 1190543</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190576">SUSE bug 1190576</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190595">SUSE bug 1190595</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190596">SUSE bug 1190596</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190598">SUSE bug 1190598</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190626">SUSE bug 1190626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190679">SUSE bug 1190679</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190705">SUSE bug 1190705</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190717">SUSE bug 1190717</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190746">SUSE bug 1190746</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190758">SUSE bug 1190758</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190784">SUSE bug 1190784</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190785">SUSE bug 1190785</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191172">SUSE bug 1191172</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191193">SUSE bug 1191193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191240">SUSE bug 1191240</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191292">SUSE bug 1191292</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-3702/">CVE-2020-3702</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3669/">CVE-2021-3669</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3744/">CVE-2021-3744</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3752/">CVE-2021-3752</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3764/">CVE-2021-3764</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-40490/">CVE-2021-40490</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652154" comment="kernel-default-extra-5.3.18-24.86.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652155" comment="kernel-preempt-extra-5.3.18-24.86.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111986" version="1" class="patch">
	<metadata>
		<title>Security update for strongswan (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1191367" ref_url="https://bugzilla.suse.com/1191367" source="BUGZILLA"/>
		<reference ref_id="1191435" ref_url="https://bugzilla.suse.com/1191435" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-41990" ref_url="https://www.suse.com/security/cve/CVE-2021-41990/" source="CVE"/>
		<reference ref_id="CVE-2021-41991" ref_url="https://www.suse.com/security/cve/CVE-2021-41991/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009613.html" source="SUSE-SU"/>
		<description>
This update for strongswan fixes the following issues:

A feature was added:

- Add auth_els plugin to support Marvell FC-SP encryption (jsc#SLE-20151)

Security issues fixed:

- CVE-2021-41991: Fixed an integer overflow when replacing certificates in cache. (bsc#1191435)
- CVE-2021-41990: Fixed an integer Overflow in the gmp Plugin. (bsc#1191367)

		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-19"/>
	<updated date="2021-10-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1191367">SUSE bug 1191367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191435">SUSE bug 1191435</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41990/">CVE-2021-41990</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-41991/">CVE-2021-41991</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652797" comment="strongswan-nm-5.8.2-11.21.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111987" version="1" class="patch">
	<metadata>
		<title>Security update for ffmpeg (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1186756" ref_url="https://bugzilla.suse.com/1186756" source="BUGZILLA"/>
		<reference ref_id="1187852" ref_url="https://bugzilla.suse.com/1187852" source="BUGZILLA"/>
		<reference ref_id="1189166" ref_url="https://bugzilla.suse.com/1189166" source="BUGZILLA"/>
		<reference ref_id="1190718" ref_url="https://bugzilla.suse.com/1190718" source="BUGZILLA"/>
		<reference ref_id="1190719" ref_url="https://bugzilla.suse.com/1190719" source="BUGZILLA"/>
		<reference ref_id="1190722" ref_url="https://bugzilla.suse.com/1190722" source="BUGZILLA"/>
		<reference ref_id="1190723" ref_url="https://bugzilla.suse.com/1190723" source="BUGZILLA"/>
		<reference ref_id="1190726" ref_url="https://bugzilla.suse.com/1190726" source="BUGZILLA"/>
		<reference ref_id="1190729" ref_url="https://bugzilla.suse.com/1190729" source="BUGZILLA"/>
		<reference ref_id="1190733" ref_url="https://bugzilla.suse.com/1190733" source="BUGZILLA"/>
		<reference ref_id="1190734" ref_url="https://bugzilla.suse.com/1190734" source="BUGZILLA"/>
		<reference ref_id="1190735" ref_url="https://bugzilla.suse.com/1190735" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-20891" ref_url="https://www.suse.com/security/cve/CVE-2020-20891/" source="CVE"/>
		<reference ref_id="CVE-2020-20892" ref_url="https://www.suse.com/security/cve/CVE-2020-20892/" source="CVE"/>
		<reference ref_id="CVE-2020-20895" ref_url="https://www.suse.com/security/cve/CVE-2020-20895/" source="CVE"/>
		<reference ref_id="CVE-2020-20896" ref_url="https://www.suse.com/security/cve/CVE-2020-20896/" source="CVE"/>
		<reference ref_id="CVE-2020-20899" ref_url="https://www.suse.com/security/cve/CVE-2020-20899/" source="CVE"/>
		<reference ref_id="CVE-2020-20902" ref_url="https://www.suse.com/security/cve/CVE-2020-20902/" source="CVE"/>
		<reference ref_id="CVE-2020-22037" ref_url="https://www.suse.com/security/cve/CVE-2020-22037/" source="CVE"/>
		<reference ref_id="CVE-2020-35965" ref_url="https://www.suse.com/security/cve/CVE-2020-35965/" source="CVE"/>
		<reference ref_id="CVE-2021-3566" ref_url="https://www.suse.com/security/cve/CVE-2021-3566/" source="CVE"/>
		<reference ref_id="CVE-2021-38092" ref_url="https://www.suse.com/security/cve/CVE-2021-38092/" source="CVE"/>
		<reference ref_id="CVE-2021-38093" ref_url="https://www.suse.com/security/cve/CVE-2021-38093/" source="CVE"/>
		<reference ref_id="CVE-2021-38094" ref_url="https://www.suse.com/security/cve/CVE-2021-38094/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009650.html" source="SUSE-SU"/>
		<description>
This update for ffmpeg fixes the following issues:

- CVE-2021-3566: Fixed information leak (bsc#1189166).
- CVE-2021-38093: Fixed integer overflow vulnerability in filter_robert() (bsc#1190734)
- CVE-2021-38092: Fixed integer overflow vulnerability in filter_prewitt() (bsc#1190733)
- CVE-2021-38094: Fixed integer overflow vulnerability in filter_sobel() (bsc#1190735)
- CVE-2020-22037: Fixed denial of service vulnerability caused by memory leak in avcodec_alloc_context3() (bsc#1186756)
- CVE-2020-35965: Fixed out-of-bounds write in decode_frame() (bsc#1187852)
- CVE-2020-20892: Fixed an issue with filter_frame() (bsc#1190719)
- CVE-2020-20891: Fixed a buffer overflow vulnerability in config_input() (bsc#1190718)
- CVE-2020-20895: Fixed a buffer overflow vulnerability in function filter_vertically_##name (bsc#1190722)
- CVE-2020-20896: Fixed an issue with latm_write_packet() (bsc#1190723)
- CVE-2020-20899: Fixed a buffer overflow vulnerability in config_props() (bsc#1190726)
- CVE-2020-20902: Fixed an out-of-bounds read vulnerabilit long_term_filter() (bsc#1190729)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-26"/>
	<updated date="2021-10-26"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1186756">SUSE bug 1186756</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187852">SUSE bug 1187852</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189166">SUSE bug 1189166</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190718">SUSE bug 1190718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190719">SUSE bug 1190719</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190722">SUSE bug 1190722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190723">SUSE bug 1190723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190726">SUSE bug 1190726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190729">SUSE bug 1190729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190733">SUSE bug 1190733</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190734">SUSE bug 1190734</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190735">SUSE bug 1190735</bugzilla>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20891/">CVE-2020-20891</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20892/">CVE-2020-20892</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20895/">CVE-2020-20895</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20896/">CVE-2020-20896</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20899/">CVE-2020-20899</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-20902/">CVE-2020-20902</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-22037/">CVE-2020-22037</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35965/">CVE-2020-35965</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3566/">CVE-2021-3566</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38092/">CVE-2021-38092</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38093/">CVE-2021-38093</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-38094/">CVE-2021-38094</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009652793" comment="libavcodec-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652794" comment="libavformat-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652795" comment="libavresample-devel-3.4.2-11.17.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009652796" comment="libavresample3-3.4.2-11.17.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111988" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1149032" ref_url="https://bugzilla.suse.com/1149032" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1153274" ref_url="https://bugzilla.suse.com/1153274" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1163930" ref_url="https://bugzilla.suse.com/1163930" source="BUGZILLA"/>
		<reference ref_id="1165545" ref_url="https://bugzilla.suse.com/1165545" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172355" ref_url="https://bugzilla.suse.com/1172355" source="BUGZILLA"/>
		<reference ref_id="1175389" ref_url="https://bugzilla.suse.com/1175389" source="BUGZILLA"/>
		<reference ref_id="1176395" ref_url="https://bugzilla.suse.com/1176395" source="BUGZILLA"/>
		<reference ref_id="1176831" ref_url="https://bugzilla.suse.com/1176831" source="BUGZILLA"/>
		<reference ref_id="1176846" ref_url="https://bugzilla.suse.com/1176846" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178631" ref_url="https://bugzilla.suse.com/1178631" source="BUGZILLA"/>
		<reference ref_id="1179142" ref_url="https://bugzilla.suse.com/1179142" source="BUGZILLA"/>
		<reference ref_id="1179396" ref_url="https://bugzilla.suse.com/1179396" source="BUGZILLA"/>
		<reference ref_id="1179508" ref_url="https://bugzilla.suse.com/1179508" source="BUGZILLA"/>
		<reference ref_id="1179509" ref_url="https://bugzilla.suse.com/1179509" source="BUGZILLA"/>
		<reference ref_id="1179567" ref_url="https://bugzilla.suse.com/1179567" source="BUGZILLA"/>
		<reference ref_id="1179572" ref_url="https://bugzilla.suse.com/1179572" source="BUGZILLA"/>
		<reference ref_id="1179575" ref_url="https://bugzilla.suse.com/1179575" source="BUGZILLA"/>
		<reference ref_id="1179878" ref_url="https://bugzilla.suse.com/1179878" source="BUGZILLA"/>
		<reference ref_id="1180008" ref_url="https://bugzilla.suse.com/1180008" source="BUGZILLA"/>
		<reference ref_id="1180130" ref_url="https://bugzilla.suse.com/1180130" source="BUGZILLA"/>
		<reference ref_id="1180264" ref_url="https://bugzilla.suse.com/1180264" source="BUGZILLA"/>
		<reference ref_id="1180412" ref_url="https://bugzilla.suse.com/1180412" source="BUGZILLA"/>
		<reference ref_id="1180759" ref_url="https://bugzilla.suse.com/1180759" source="BUGZILLA"/>
		<reference ref_id="1180765" ref_url="https://bugzilla.suse.com/1180765" source="BUGZILLA"/>
		<reference ref_id="1180773" ref_url="https://bugzilla.suse.com/1180773" source="BUGZILLA"/>
		<reference ref_id="1180809" ref_url="https://bugzilla.suse.com/1180809" source="BUGZILLA"/>
		<reference ref_id="1180812" ref_url="https://bugzilla.suse.com/1180812" source="BUGZILLA"/>
		<reference ref_id="1180848" ref_url="https://bugzilla.suse.com/1180848" source="BUGZILLA"/>
		<reference ref_id="1180859" ref_url="https://bugzilla.suse.com/1180859" source="BUGZILLA"/>
		<reference ref_id="1180889" ref_url="https://bugzilla.suse.com/1180889" source="BUGZILLA"/>
		<reference ref_id="1180891" ref_url="https://bugzilla.suse.com/1180891" source="BUGZILLA"/>
		<reference ref_id="1180971" ref_url="https://bugzilla.suse.com/1180971" source="BUGZILLA"/>
		<reference ref_id="1181014" ref_url="https://bugzilla.suse.com/1181014" source="BUGZILLA"/>
		<reference ref_id="1181018" ref_url="https://bugzilla.suse.com/1181018" source="BUGZILLA"/>
		<reference ref_id="1181077" ref_url="https://bugzilla.suse.com/1181077" source="BUGZILLA"/>
		<reference ref_id="1181104" ref_url="https://bugzilla.suse.com/1181104" source="BUGZILLA"/>
		<reference ref_id="1181148" ref_url="https://bugzilla.suse.com/1181148" source="BUGZILLA"/>
		<reference ref_id="1181158" ref_url="https://bugzilla.suse.com/1181158" source="BUGZILLA"/>
		<reference ref_id="1181161" ref_url="https://bugzilla.suse.com/1181161" source="BUGZILLA"/>
		<reference ref_id="1181169" ref_url="https://bugzilla.suse.com/1181169" source="BUGZILLA"/>
		<reference ref_id="1181203" ref_url="https://bugzilla.suse.com/1181203" source="BUGZILLA"/>
		<reference ref_id="1181217" ref_url="https://bugzilla.suse.com/1181217" source="BUGZILLA"/>
		<reference ref_id="1181218" ref_url="https://bugzilla.suse.com/1181218" source="BUGZILLA"/>
		<reference ref_id="1181219" ref_url="https://bugzilla.suse.com/1181219" source="BUGZILLA"/>
		<reference ref_id="1181220" ref_url="https://bugzilla.suse.com/1181220" source="BUGZILLA"/>
		<reference ref_id="1181237" ref_url="https://bugzilla.suse.com/1181237" source="BUGZILLA"/>
		<reference ref_id="1181318" ref_url="https://bugzilla.suse.com/1181318" source="BUGZILLA"/>
		<reference ref_id="1181335" ref_url="https://bugzilla.suse.com/1181335" source="BUGZILLA"/>
		<reference ref_id="1181346" ref_url="https://bugzilla.suse.com/1181346" source="BUGZILLA"/>
		<reference ref_id="1181349" ref_url="https://bugzilla.suse.com/1181349" source="BUGZILLA"/>
		<reference ref_id="1181425" ref_url="https://bugzilla.suse.com/1181425" source="BUGZILLA"/>
		<reference ref_id="1181494" ref_url="https://bugzilla.suse.com/1181494" source="BUGZILLA"/>
		<reference ref_id="1181504" ref_url="https://bugzilla.suse.com/1181504" source="BUGZILLA"/>
		<reference ref_id="1181511" ref_url="https://bugzilla.suse.com/1181511" source="BUGZILLA"/>
		<reference ref_id="1181538" ref_url="https://bugzilla.suse.com/1181538" source="BUGZILLA"/>
		<reference ref_id="1181553" ref_url="https://bugzilla.suse.com/1181553" source="BUGZILLA"/>
		<reference ref_id="1181584" ref_url="https://bugzilla.suse.com/1181584" source="BUGZILLA"/>
		<reference ref_id="1181645" ref_url="https://bugzilla.suse.com/1181645" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25211" ref_url="https://www.suse.com/security/cve/CVE-2020-25211/" source="CVE"/>
		<reference ref_id="CVE-2020-25639" ref_url="https://www.suse.com/security/cve/CVE-2020-25639/" source="CVE"/>
		<reference ref_id="CVE-2020-27835" ref_url="https://www.suse.com/security/cve/CVE-2020-27835/" source="CVE"/>
		<reference ref_id="CVE-2020-29568" ref_url="https://www.suse.com/security/cve/CVE-2020-29568/" source="CVE"/>
		<reference ref_id="CVE-2020-29569" ref_url="https://www.suse.com/security/cve/CVE-2020-29569/" source="CVE"/>
		<reference ref_id="CVE-2021-0342" ref_url="https://www.suse.com/security/cve/CVE-2021-0342/" source="CVE"/>
		<reference ref_id="CVE-2021-20177" ref_url="https://www.suse.com/security/cve/CVE-2021-20177/" source="CVE"/>
		<reference ref_id="CVE-2021-3347" ref_url="https://www.suse.com/security/cve/CVE-2021-3347/" source="CVE"/>
		<reference ref_id="CVE-2021-3348" ref_url="https://www.suse.com/security/cve/CVE-2021-3348/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-February/008292.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-20177: Fixed a kernel panic related to iptables string matching rules. A privileged user could insert a rule which could lead to denial of service (bnc#1180765).
- CVE-2021-0342: In tun_get_user of tun.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges required. (bnc#1180812)
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).

The following non-security bugs were fixed:

- ACPI/IORT: Do not blindly trust DMA masks from firmware (git-fixes).
- ACPI: scan: add stub acpi_create_platform_device() for !CONFIG_ACPI (git-fixes).
- ACPI: scan: Harden acpi_device_add() against device ID overflows (git-fixes).
- ACPI: scan: Make acpi_bus_get_device() clear return pointer on error (git-fixes).
- ACPI: sysfs: Prefer 'compatible' modalias (git-fixes).
- ALSA: doc: Fix reference to mixart.rst (git-fixes).
- ALSA: fireface: Fix integer overflow in transmit_midi_msg() (git-fixes).
- ALSA: firewire-tascam: Fix integer overflow in midi_port_work() (git-fixes).
- ALSA: hda: Add Cometlake-R PCI ID (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/hdmi - enable runtime pm for CI AMD display audio (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS B1400CEPE with ALC256 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machines (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Limit int mic boost on Acer Aspire E5-575T (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/tegra: fix tegra-hda on tegra30 soc (git-fixes).
- ALSA: hda/via: Add minimum mute flag (git-fixes).
- ALSA: hda/via: Apply the workaround generically for Clevo machines (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: fix hw_rule deps kABI (bsc#1181014).
- ALSA: pcm: One more dependency for hw constraints (bsc#1181014).
- ALSA: seq: oss: Fix missing error check in snd_seq_oss_synth_make_info() (git-fixes).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Always apply the hw constraints for implicit fb sync (bsc#1181014).
- ALSA: usb-audio: Annotate the endpoint index in audioformat (git-fixes).
- ALSA: usb-audio: Avoid implicit feedback on Pioneer devices (bsc#1181014).
- ALSA: usb-audio: Avoid unnecessary interface re-setup (git-fixes).
- ALSA: usb-audio: Choose audioformat of a counter-part substream (git-fixes).
- ALSA: usb-audio: Fix hw constraints dependencies (bsc#1181014).
- ALSA: usb-audio: Fix implicit feedback sync setup for Pioneer devices (git-fixes).
- ALSA: usb-audio: Fix the missing endpoints creations for quirks (git-fixes).
- ALSA: usb-audio: Fix UAC1 rate setup for secondary endpoints (bsc#1181014).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Set sample rate for all sharing EPs on UAC1 (bsc#1181014).
- arch/x86/lib/usercopy_64.c: fix __copy_user_flushcache() cache writeback (bsc#1152489).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- arm64: pgtable: Ensure dirty bit is preserved across pte_wrprotect() (bsc#1180130).
- arm64: pgtable: Fix pte_accessible() (bsc#1180130).
- ASoC: ak4458: correct reset polarity (git-fixes).
- ASoC: dapm: remove widget from dirty list on free (git-fixes).
- ASoC: Intel: fix error code cnl_set_dsp_D0() (git-fixes).
- ASoC: meson: axg-tdm-interface: fix loopback (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: revert: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- bnxt_en: Fix AER recovery (jsc#SLE-8371 bsc#1153274).
- bpf: Do not leak memory in bpf getsockopt when optlen == 0 (bsc#1155518).
- bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback (bsc#1155518).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: send: fix invalid clone operations when cloning from the same file and root (bsc#1181511).
- btrfs: send: fix wrong file path when there is an inode with a pending rmdir (bsc#1181237).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- cachefiles: Drop superfluous readpages aops NULL check (git-fixes).
- can: dev: prevent potential information leak in can_fill_info() (git-fixes).
- can: vxcan: vxcan_xmit: fix use after free bug (git-fixes).
- CDC-NCM: remove 'connected' log message (git-fixes).
- clk: tegra30: Add hda clock default rates to clock driver (git-fixes).
- crypto: asym_tpm: correct zero out potential secrets (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers/base/memory.c: indicate all memory blocks as removable (bsc#1180264).
- drivers/perf: Fix kernel panic when rmmod PMU modules during perf sampling (bsc#1180848).
- drivers/perf: hisi: Permit modular builds of HiSilicon uncore drivers (bsc#1180848). - Update config files. - supported.conf:
- drm: Added orientation quirk for ASUS tablet model T103HAF (git-fixes).
- drm/amd/display: Add missing pflip irq for dcn2.0 (git-fixes).
- drm/amd/display: Avoid MST manager resource leak (git-fixes).
- drm/amd/display: dal_ddc_i2c_payloads_create can fail causing panic (git-fixes).
- drm/amd/display: dchubbub p-state warning during surface planes switch (git-fixes).
- drm/amd/display: Do not double-buffer DTO adjustments (git-fixes).
- drm/amd/display: Do not invoke kgdb_breakpoint() unconditionally (git-fixes).
- drm/amd/display: Fix memleak in amdgpu_dm_mode_config_init (git-fixes).
- drm/amd/display: Free gamma after calculating legacy transfer function (git-fixes).
- drm/amd/display: HDMI remote sink need mode validation for Linux (git-fixes).
- drm/amd/display: Increase timeout for DP Disable (git-fixes).
- drm/amd/display: Reject overlay plane configurations in multi-display scenarios (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amd/display: Retry AUX write when fail occurs (git-fixes).
- drm/amd/display: Stop if retimer is not available (git-fixes).
- drm/amd/display: update nv1x stutter latencies (git-fixes).
- drm/amdgpu: add DID for navi10 blockchain SKU (git-fixes).
- drm/amdgpu: correct the gpu reset handling for job != NULL case (git-fixes).
- drm/amdgpu/dc: Require primary plane to be enabled whenever the CRTC is (git-fixes).
- drm/amdgpu: do not map BO in reserved region (git-fixes).
- drm/amdgpu: fix a GPU hang issue when remove device (git-fixes).
- drm/amdgpu: Fix bug in reporting voltage for CIK (git-fixes).
- drm/amdgpu: Fix bug where DPM is not enabled after hibernate and resume (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/amdgpu: fix calltrace during kmd unload(v3) (git-fixes).
- drm/amdgpu: increase atombios cmd timeout (git-fixes).
- drm/amdgpu: increase the reserved VM size to 2MB (git-fixes).
- drm/amdgpu: perform srbm soft reset always on SDMA resume (git-fixes).
- drm/amdgpu/powerplay: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu/powerplay/smu7: fix AVFS handling with custom powerplay table (git-fixes).
- drm/amdgpu: prevent double kfree ttm-&gt;sg (git-fixes).
- drm/amdgpu/psp: fix psp gfx ctrl cmds (git-fixes).
- drm/amdgpu/sriov add amdgpu_amdkfd_pre_reset in gpu reset (git-fixes).
- drm/amdkfd: fix a memory leak issue (git-fixes).
- drm/amdkfd: Fix leak in dmabuf import (git-fixes).
- drm/amdkfd: fix restore worker race condition (git-fixes).
- drm/amdkfd: Use same SQ prefetch setting as amdgpu (git-fixes).
- drm/amd/pm: avoid false alarm due to confusing softwareshutdowntemp setting (git-fixes).
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (bsc#1152472)
- drm/aspeed: Fix Kconfig warning &amp; subsequent build errors (git-fixes).
- drm/atomic: put state on error path (git-fixes).
- drm: bridge: dw-hdmi: Avoid resetting force in the detect function (bsc#1152472)
- drm/bridge/synopsys: dsi: add support for non-continuous HS clock (git-fixes).
- drm/brige/megachips: Add checking if ge_b850v3_lvds_init() is working correctly (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in (bsc#1152472)
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/etnaviv: always start/stop scheduler in timeout processing (git-fixes).
- drm/exynos: dsi: Remove bridge node reference in error handling path in probe function (git-fixes).
- drm/gma500: fix double free of gma_connector (bsc#1152472) Backporting notes: 	* context changes
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (git-fixes).
- drm/i915: Avoid memory leak with more than 16 workarounds on a list (git-fixes).
- drm/i915: Break up error capture compression loops with cond_resched() (git-fixes).
- drm/i915: Check for all subplatform bits (git-fixes).
- drm/i915: clear the gpu reloc batch (git-fixes).
- drm/i915: Correctly set SFC capability for video engines (bsc#1152489) Backporting notes: 	* context changes
- drm/i915/display/dp: Compute the correct slice count for VDSC on DP (git-fixes).
- drm/i915: Drop runtime-pm assert from vgpu io accessors (git-fixes).
- drm/i915/dsi: Use unconditional msleep for the panel_on_delay when there is no reset-deassert MIPI-sequence (git-fixes).
- drm/i915: Filter wake_flags passed to default_wake_function (git-fixes).
- drm/i915: Fix mismatch between misplaced vma check and vma insert (git-fixes).
- drm/i915: Force VT'd workarounds when running as a guest OS (git-fixes).
- drm/i915/gt: Declare gen9 has 64 mocs entries! (git-fixes).
- drm/i915/gt: Delay execlist processing for tgl (git-fixes).
- drm/i915/gt: Free stale request on destroying the virtual engine (git-fixes).
- drm/i915/gt: Prevent use of engine-&gt;wa_ctx after error (git-fixes).
- drm/i915/gt: Program mocs:63 for cache eviction on gen9 (git-fixes).
- drm/i915/gvt: return error when failing to take the module reference (git-fixes).
- drm/i915/gvt: Set ENHANCED_FRAME_CAP bit (git-fixes).
- drm/i915: Handle max_bpc==16 (git-fixes).
- drm/i915/selftests: Avoid passing a random 0 into ilog2 (git-fixes).
- drm/mcde: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/mcde: Fix handling of platform_get_irq() error (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/a5xx: Always set an OPP supported hardware value (git-fixes).
- drm/msm/a6xx: fix a potential overflow issue (git-fixes).
- drm/msm/a6xx: fix gmu start on newer firmware (git-fixes).
- drm/msm: add shutdown support for display platform_driver (git-fixes).
- drm/msm: Disable preemption on all 5xx targets (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dpu: Fix scale params in plane validation (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/msm/dsi_pll_10nm: restore VCO rate during restore_state (git-fixes).
- drm/msm: fix leaks if initialization fails (git-fixes).
- drm/nouveau/bios: fix issue shadowing expansion ROMs (git-fixes).
- drm/nouveau/debugfs: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/dispnv50: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau: fix runtime pm imbalance on error (git-fixes).
- drm/nouveau/i2c/gm200: increase width of aux semaphore owner fields (git-fixes).
- drm/nouveau/kms/nv50-: fix case where notifier buffer is at offset 0 (git-fixes).
- drm/nouveau/mem: guard against NULL pointer access in mem_del (git-fixes).
- drm/nouveau/mmu: fix vram heap sizing (git-fixes).
- drm/nouveau/nouveau: fix the start/end range for migration (git-fixes).
- drm/nouveau/privring: ack interrupts the same way as RM (git-fixes).
- drm/nouveau/svm: fail NOUVEAU_SVM_INIT ioctl on unsupported devices (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/omap: dss: Cleanup DSS ports on initialisation failure (git-fixes).
- drm/omap: fix incorrect lock state (git-fixes).
- drm/omap: fix possible object reference leak (git-fixes).
- drm/panfrost: add amlogic reset quirk callback (git-fixes).
- drm: rcar-du: Set primary plane zpos immutably at initializing (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (bsc#1152472)
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- drm/scheduler: Avoid accessing freed bad job (git-fixes).
- drm/sun4i: dw-hdmi: fix error return code in sun8i_dw_hdmi_bind() (bsc#1152472)
- drm/sun4i: frontend: Fix the scaler phase on A33 (git-fixes).
- drm/sun4i: frontend: Reuse the ch0 phase for RGB formats (git-fixes).
- drm/sun4i: frontend: Rework a bit the phase data (git-fixes).
- drm/sun4i: mixer: Extend regmap max_register (git-fixes).
- drm/syncobj: Fix use-after-free (git-fixes).
- drm/tegra: replace idr_init() by idr_init_base() (git-fixes).
- drm/tegra: sor: Disable clocks on error in tegra_sor_init() (git-fixes).
- drm/ttm: fix eviction valuable range check (git-fixes).
- drm/tve200: Fix handling of platform_get_irq() error (bsc#1152472)
- drm/tve200: Fix handling of platform_get_irq() error (git-fixes).
- drm/tve200: Stabilize enable/disable (git-fixes).
- drm/vc4: drv: Add error handding for bind (git-fixes).
- e1000e: bump up timeout to wait when ME un-configures ULP mode (jsc#SLE-8100).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- ehci: fix EHCI host controller initialization sequence (git-fixes).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')
- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).
- floppy: reintroduce O_NDELAY fix (boo#1181018).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Remove needless goto's (bsc#1149032).
- futex: Remove unused empty compat_exit_robust_list() (bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Ignore battery for Elan touchscreen on ASUS UX550 (git-fixes).
- HID: logitech-dj: add the G602 receiver (git-fixes).
- HID: multitouch: Apply MT_QUIRK_CONFIDENCE quirk for multi-input devices (git-fixes).
- HID: multitouch: do not filter mice nodes (git-fixes).
- HID: multitouch: Enable multi-input for Synaptics pointstick/touchpad device (git-fixes).
- HID: multitouch: Remove MT_CLS_WIN_8_DUAL (git-fixes).
- HID: wacom: Constify attribute_groups (git-fixes).
- HID: wacom: Correct NULL dereference on AES pen proximity (git-fixes).
- HID: wacom: do not call hid_set_drvdata(hdev, NULL) (git-fixes).
- HID: wacom: Fix memory leakage caused by kfifo_alloc (git-fixes).
- hwmon: (pwm-fan) Ensure that calculation does not discard big period values (git-fixes).
- i2c: bpmp-tegra: Ignore unknown I2C_M flags (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: octeon: check correct size of maximum RECV_LEN packet (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- ice: avoid premature Rx buffer reuse (jsc#SLE-7926).
- ice, xsk: clear the status bits for the next_to_use descriptor (jsc#SLE-7926).
- iio: ad5504: Fix setting power-down state (git-fixes).
- iomap: fix WARN_ON_ONCE() from unprivileged users (bsc#1181494).
- iommu/vt-d: Fix a bug for PDP check in prq_event_thread (bsc#1181217).
- ionic: account for vlan tag len in rx buffer len (bsc#1167773).
- kABI fixup for dwc3 introduction of DWC_usb32 (git-fixes).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- kprobes: tracing/kprobes: Fix to kill kprobes on initmem after boot (git fixes (kernel/kprobe)).
- KVM: nVMX: Reload vmcs01 if getting vmcs12's pages fails (bsc#1181218).
- KVM: s390: pv: Mark mm as protected after the set secure parameters and improve cleanup (jsc#SLE-7512 bsc#1165545).
- KVM: SVM: Initialize prev_ga_tag before use (bsc#1180809).
- leds: trigger: fix potential deadlock with libata (git-fixes).
- lib/genalloc: fix the overflow when size is too big (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- lockd: do not use interval-based rebinding over TCP (for-next).
- mac80211: check if atf has been disabled in __ieee80211_schedule_txq (git-fixes).
- mac80211: do not drop tx nulldata packets on encrypted links (git-fixes).
- md: fix a warning caused by a race between concurrent md_ioctl()s (for-next).
- media: dvb-usb: Fix memory leak at error in dvb_usb_device_init() (bsc#1181104).
- media: dvb-usb: Fix use-after-free access (bsc#1181104).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: rc: ensure that uevent can be read directly after rc device register (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- misdn: dsp: select CONFIG_BITREVERSE (git-fixes).
- mmc: core: do not initialize block size from ext_csd if not present (git-fixes).
- mmc: sdhci-xenon: fix 1.8v regulator stabilization (git-fixes).
- mm: memcontrol: fix missing wakeup polling thread (bsc#1181584).
- mm/vmalloc: Fix unlock order in s_stop() (git fixes (mm/vmalloc)).
- module: delay kobject uevent until after module init call (bsc#1178631).
- mt7601u: fix kernel crash unplugging the device (git-fixes).
- mt7601u: fix rx buffer refcounting (git-fixes).
- net/af_iucv: fix null pointer dereference on shutdown (bsc#1179567 LTC#190111).
- net/af_iucv: set correct sk_protocol for child sockets (git-fixes).
- net: fix proc_fs init handling in af_packet and tls (bsc#1154353).
- net: hns3: fix a phy loopback fail issue (bsc#1154353).
- net: hns3: remove a misused pragma packed (bsc#1154353).
- net/mlx5e: ethtool, Fix restriction of autoneg with 56G (jsc#SLE-8464).
- net: mscc: ocelot: allow offloading of bridge on top of LAG (git-fixes).
- net/smc: cancel event worker during device removal (git-fixes).
- net/smc: check for valid ib_client_data (git-fixes).
- net/smc: fix cleanup for linkgroup setup failures (git-fixes).
- net/smc: fix direct access to ib_gid_addr-&gt;ndev in smc_ib_determine_gid() (git-fixes).
- net/smc: fix dmb buffer shortage (git-fixes).
- net/smc: fix sleep bug in smc_pnet_find_roce_resource() (git-fixes).
- net/smc: fix sock refcounting in case of termination (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/smc: no peer ID in CLC decline for SMCD (git-fixes).
- net/smc: remove freed buffer from list (git-fixes).
- net/smc: reset sndbuf_desc if freed (git-fixes).
- net/smc: set rx_off for SMCR explicitly (git-fixes).
- net/smc: switch smcd_dev_list spinlock to mutex (git-fixes).
- net/smc: transfer fasync_list in case of fallback (git-fixes).
- net: sunrpc: Fix 'snprintf' return value check in 'do_xprt_debugfs' (for-next).
- net: sunrpc: interpret the return value of kstrtou32 correctly (for-next).
- net: usb: qmi_wwan: add Quectel EM160R-GL (git-fixes).
- net: vlan: avoid leaks on register_vlan_dev() failures (bsc#1154353).
- NFC: fix possible resource leak (git-fixes).
- NFC: fix resource leak when target index is invalid (git-fixes).
- NFS4: Fix use-after-free in trace_event_raw_event_nfs4_set_lock (for-next).
- nfs_common: need lock during iterate through the list (for-next).
- nfsd4: readdirplus shouldn't return parent of export (git-fixes).
- nfsd: Fix message level for normal termination (for-next).
- NFS: nfs_delegation_find_inode_server must first reference the superblock (for-next).
- NFS: nfs_igrab_and_active must first reference the superblock (for-next).
- NFS/pNFS: Fix a leak of the layout 'plh_outstanding' counter (for-next).
- NFS/pNFS: Fix a typo in ff_layout_resend_pnfs_read() (for-next).
- NFS: switch nfsiod to be an UNBOUND workqueue (for-next).
- NFSv4.2: condition READDIR's mask for security label based on LSM state (for-next).
- NFSv4: Fix the alignment of page data in the getdeviceinfo reply (for-next).
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-rdma: avoid request double completion for concurrent nvme_rdma_timeout (bsc#1181161).
- nvme-tcp: avoid request double completion for concurrent nvme_tcp_timeout (bsc#1181161).
- platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes (git-fixes).
- platform/x86: ideapad-laptop: Disable touchpad_switch for ELAN0634 (git-fixes).
- platform/x86: intel-vbtn: Drop HP Stream x360 Convertible PC 11 from allow-list (git-fixes).
- platform/x86: intel-vbtn: Fix SW_TABLET_MODE always reporting 1 on some HP x360 models (git-fixes).
- PM: hibernate: flush swap writer after marking (git-fixes).
- pNFS: Mark layout for return if return-on-close was not sent (git-fixes).
- powerpc: Fix build error in paravirt.h (bsc#1181148 ltc#190702).
- powerpc/paravirt: Use is_kvm_guest() in vcpu_is_preempted() (bsc#1181148 ltc#190702).
- powerpc: Refactor is_kvm_guest() declaration to new header (bsc#1181148 ltc#190702).
- powerpc: Reintroduce is_kvm_guest() as a fast-path check (bsc#1181148 ltc#190702).
- powerpc: Rename is_kvm_guest() to check_kvm_guest() (bsc#1181148 ltc#190702).
- power: vexpress: add suppress_bind_attrs to true (git-fixes).
- prom_init: enable verbose prints (bsc#1178142 bsc#1180759).
- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).
- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).
- r8152: Add Lenovo Powered USB-C Travel Hub (git-fixes).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- Revive usb-audio Keep Interface mixer (bsc#1181014).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/cio: fix use-after-free in ccw_device_destroy_console (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1181169 LTC#190914).
- s390/dasd: fix list corruption of lcu list (git-fixes).
- s390/dasd: fix list corruption of pavgroup group list (git-fixes).
- s390/dasd: prevent inconsistent LCU device data (git-fixes).
- s390/kexec_file: fix diag308 subcode when loading crash kernel (git-fixes).
- s390/qeth: consolidate online/offline code (git-fixes).
- s390/qeth: do not raise NETDEV_REBOOT event from L3 offline path (git-fixes).
- s390/qeth: fix deadlock during recovery (git-fixes).
- s390/qeth: fix L2 header access in qeth_l3_osa_features_check() (git-fixes).
- s390/qeth: fix locking for discipline setup / removal (git-fixes).
- s390/smp: perform initial CPU reset also for SMT siblings (git-fixes).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- scsi: ibmvfc: Set default timeout to avoid crash during migration (bsc#1181425 ltc#188252).
- scsi: lpfc: Enhancements to LOG_TRACE_EVENT for better readability (bsc#1180891).
- scsi: lpfc: Fix auto sli_mode and its effect on CONFIG_PORT for SLI3 (bsc#1180891).
- scsi: lpfc: Fix crash when a fabric node is released prematurely (bsc#1180891).
- scsi: lpfc: Fix crash when nvmet transport calls host_release (bsc#1180891).
- scsi: lpfc: Fix error log messages being logged following SCSI task mgnt (bsc#1180891).
- scsi: lpfc: Fix FW reset action if I/Os are outstanding (bsc#1180891).
- scsi: lpfc: Fix NVMe recovery after mailbox timeout (bsc#1180891).
- scsi: lpfc: Fix PLOGI S_ID of 0 on pt2pt config (bsc#1180891).
- scsi: lpfc: Fix target reset failing (bsc#1180891).
- scsi: lpfc: Fix vport create logging (bsc#1180891).
- scsi: lpfc: Implement health checking when aborting I/O (bsc#1180891).
- scsi: lpfc: Prevent duplicate requests to unregister with cpuhp framework (bsc#1180891).
- scsi: lpfc: Refresh ndlp when a new PRLI is received in the PRLI issue state (bsc#1180891).
- scsi: lpfc: Simplify bool comparison (bsc#1180891).
- scsi: lpfc: Update lpfc version to 12.8.0.7 (bsc#1180891).
- scsi: lpfc: Use the nvme-fc transport supplied timeout for LS requests (bsc#1180891).
- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).
- scsi: scsi_transport_srp: Do not block target in failfast state (bsc#1172355).
- selftests/ftrace: Select an existing function in kprobe_eventname test (bsc#1179396 ltc#185738).
- selftests: net: fib_tests: remove duplicate log test (git-fixes).
- selftests/powerpc: Add a test of bad (out-of-range) accesses (bsc#1181158 ltc#190851).
- selftests/powerpc: Add a test of spectre_v2 mitigations (bsc#1181158 ltc#190851).
- selftests/powerpc: Ignore generated files (bsc#1181158 ltc#190851).
- selftests/powerpc: Move Hash MMU check to utilities (bsc#1181158 ltc#190851).
- selftests/powerpc: Move set_dscr() into rfi_flush.c (bsc#1181158 ltc#190851).
- selftests/powerpc: Only test lwm/stmw on big endian (bsc#1180412 ltc#190579).
- selftests/powerpc: spectre_v2 test must be built 64-bit (bsc#1181158 ltc#190851).
- serial: mvebu-uart: fix tx lost characters at power off (git-fixes).
- spi: cadence: cache reference clock rate during probe (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- SUNRPC: Clean up the handling of page padding in rpc_prepare_reply_pages() (for-next).
- sunrpc: fix xs_read_xdr_buf for partial pages receive (for-next).
- SUNRPC: rpc_wake_up() should wake up tasks in the correct order (for-next).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- timers: Preserve higher bits of expiration on index calculation (bsc#1181318).
- timers: Use only bucket expiry for base-&gt;next_expiry value (bsc#1181318).
- udp: Prevent reuseport_select_sock from reading uninitialized socks (git-fixes).
- USB: cdc-acm: blacklist another IR Droid device (git-fixes).
- USB: cdc-wdm: Fix use after free in service_outstanding_interrupt() (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).
- usb: dwc3: core: Properly default unspecified speed (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: dwc3: Update soft-reset wait polling rate (git-fixes).
- USB: ehci: fix an interrupt calltrace error (git-fixes).
- usb: gadget: aspeed: fix stop dma register setting (git-fixes).
- usb: gadget: configfs: Fix use-after-free issue with udc_name (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: enable super speed plus (git-fixes).
- usb: gadget: Fix spinlock lockup on usb_function_deactivate (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: function: printer: Fix a memory leak for interface descriptor (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: option: add LongSung M5710 module support (git-fixes).
- USB: serial: option: add Quectel EM160R-GL (git-fixes).
- usb: typec: Fix copy paste error for NVIDIA alt-mode description (git-fixes).
- usb: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).
- usb: udc: core: Use lock when write to soft_connect (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- USB: usblp: fix DMA to stack (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- vfio iommu: Add dma available capability (bsc#1179572 LTC#190110).
- vfio/pci: Implement ioeventfd thread handler for contended memory lock (bsc#1181219).
- vfio-pci: Use io_remap_pfn_range() for PCI IO memory (bsc#1181220).
- video: fbdev: atmel_lcdfb: fix return error code in atmel_lcdfb_of_init() (git-fixes).
- video: fbdev: fix OOB read in vga_8planes_imageblit() (git-fixes).
- video: fbdev: pvr2fb: initialize variables (git-fixes).
- video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1152489).
- x86/cpu/amd: Call init_amd_zn() om Family 19h processors too (bsc#1181077).
- x86/cpu/amd: Set __max_die_per_package on AMD (bsc#1152489).
- x86/hyperv: Fix kexec panic/hang issues (bsc#1176831).
- x86/kprobes: Restore BTF if the single-stepping is cancelled (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/topology: Make __max_die_per_package available unconditionally (bsc#1152489).
- x86/xen: avoid warning in Xen pv guest with CONFIG_AMD_MEM_ENCRYPT enabled (bsc#1181335).
- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).
- xen/privcmd: allow fetching resource sizes (bsc#1065600).
- xfs: show the proper user quota options (bsc#1181538).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xhci: make sure TRB is fully written before giving it to the controller (git-fixes).
- xhci: tegra: Delay for disabling LFPS detector (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-09"/>
	<updated date="2021-02-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1149032">SUSE bug 1149032</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1153274">SUSE bug 1153274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163930">SUSE bug 1163930</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1165545">SUSE bug 1165545</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172355">SUSE bug 1172355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175389">SUSE bug 1175389</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176395">SUSE bug 1176395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176831">SUSE bug 1176831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176846">SUSE bug 1176846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178631">SUSE bug 1178631</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179142">SUSE bug 1179142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179396">SUSE bug 1179396</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179508">SUSE bug 1179508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179509">SUSE bug 1179509</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179567">SUSE bug 1179567</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179572">SUSE bug 1179572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179575">SUSE bug 1179575</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179878">SUSE bug 1179878</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180008">SUSE bug 1180008</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180130">SUSE bug 1180130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180264">SUSE bug 1180264</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180412">SUSE bug 1180412</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180759">SUSE bug 1180759</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180765">SUSE bug 1180765</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180773">SUSE bug 1180773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180809">SUSE bug 1180809</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180812">SUSE bug 1180812</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180848">SUSE bug 1180848</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180859">SUSE bug 1180859</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180889">SUSE bug 1180889</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180891">SUSE bug 1180891</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180971">SUSE bug 1180971</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181014">SUSE bug 1181014</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181018">SUSE bug 1181018</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181077">SUSE bug 1181077</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181104">SUSE bug 1181104</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181148">SUSE bug 1181148</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181158">SUSE bug 1181158</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181161">SUSE bug 1181161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181169">SUSE bug 1181169</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181203">SUSE bug 1181203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181217">SUSE bug 1181217</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181218">SUSE bug 1181218</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181219">SUSE bug 1181219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181220">SUSE bug 1181220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181237">SUSE bug 1181237</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181318">SUSE bug 1181318</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181335">SUSE bug 1181335</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181346">SUSE bug 1181346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181349">SUSE bug 1181349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181425">SUSE bug 1181425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181494">SUSE bug 1181494</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181504">SUSE bug 1181504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181511">SUSE bug 1181511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181538">SUSE bug 1181538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181553">SUSE bug 1181553</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181584">SUSE bug 1181584</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181645">SUSE bug 1181645</bugzilla>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2020-25211/">CVE-2020-25211</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-25639/">CVE-2020-25639</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-27835/">CVE-2020-27835</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29568/">CVE-2020-29568</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29569/">CVE-2020-29569</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-0342/">CVE-2021-0342</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-20177/">CVE-2021-20177</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3347/">CVE-2021-3347</cve>
	<cve impact="moderate" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3348/">CVE-2021-3348</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509403" comment="kernel-default-extra-5.3.18-24.49.2 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111989" version="1" class="patch">
	<metadata>
		<title>Security update for transfig (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1189325" ref_url="https://bugzilla.suse.com/1189325" source="BUGZILLA"/>
		<reference ref_id="1189343" ref_url="https://bugzilla.suse.com/1189343" source="BUGZILLA"/>
		<reference ref_id="1189345" ref_url="https://bugzilla.suse.com/1189345" source="BUGZILLA"/>
		<reference ref_id="1189346" ref_url="https://bugzilla.suse.com/1189346" source="BUGZILLA"/>
		<reference ref_id="1190607" ref_url="https://bugzilla.suse.com/1190607" source="BUGZILLA"/>
		<reference ref_id="1190611" ref_url="https://bugzilla.suse.com/1190611" source="BUGZILLA"/>
		<reference ref_id="1190612" ref_url="https://bugzilla.suse.com/1190612" source="BUGZILLA"/>
		<reference ref_id="1190615" ref_url="https://bugzilla.suse.com/1190615" source="BUGZILLA"/>
		<reference ref_id="1190616" ref_url="https://bugzilla.suse.com/1190616" source="BUGZILLA"/>
		<reference ref_id="1190617" ref_url="https://bugzilla.suse.com/1190617" source="BUGZILLA"/>
		<reference ref_id="1190618" ref_url="https://bugzilla.suse.com/1190618" source="BUGZILLA"/>
		<reference ref_id="1192019" ref_url="https://bugzilla.suse.com/1192019" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-21529" ref_url="https://www.suse.com/security/cve/CVE-2020-21529/" source="CVE"/>
		<reference ref_id="CVE-2020-21530" ref_url="https://www.suse.com/security/cve/CVE-2020-21530/" source="CVE"/>
		<reference ref_id="CVE-2020-21531" ref_url="https://www.suse.com/security/cve/CVE-2020-21531/" source="CVE"/>
		<reference ref_id="CVE-2020-21532" ref_url="https://www.suse.com/security/cve/CVE-2020-21532/" source="CVE"/>
		<reference ref_id="CVE-2020-21533" ref_url="https://www.suse.com/security/cve/CVE-2020-21533/" source="CVE"/>
		<reference ref_id="CVE-2020-21534" ref_url="https://www.suse.com/security/cve/CVE-2020-21534/" source="CVE"/>
		<reference ref_id="CVE-2020-21535" ref_url="https://www.suse.com/security/cve/CVE-2020-21535/" source="CVE"/>
		<reference ref_id="CVE-2020-21680" ref_url="https://www.suse.com/security/cve/CVE-2020-21680/" source="CVE"/>
		<reference ref_id="CVE-2020-21681" ref_url="https://www.suse.com/security/cve/CVE-2020-21681/" source="CVE"/>
		<reference ref_id="CVE-2020-21682" ref_url="https://www.suse.com/security/cve/CVE-2020-21682/" source="CVE"/>
		<reference ref_id="CVE-2020-21683" ref_url="https://www.suse.com/security/cve/CVE-2020-21683/" source="CVE"/>
		<reference ref_id="CVE-2021-32280" ref_url="https://www.suse.com/security/cve/CVE-2021-32280/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-October/009682.html" source="SUSE-SU"/>
		<description>
This update for transfig fixes the following issues:

Update to fig2dev version 3.2.8 Patchlevel 8b (Aug 2021)

- bsc#1190618, CVE-2020-21529: stack buffer overflow in the bezier_spline function in genepic.c.
- bsc#1190615, CVE-2020-21530: segmentation fault in the read_objects function in read.c.
- bsc#1190617, CVE-2020-21531: global buffer overflow in the conv_pattern_index function in gencgm.c.
- bsc#1190616, CVE-2020-21532: global buffer overflow in the setfigfont function in genepic.c.
- bsc#1190612, CVE-2020-21533: stack buffer overflow in the read_textobject function in read.c.
- bsc#1190611, CVE-2020-21534: global buffer overflow in the get_line function in read.c.
- bsc#1190607, CVE-2020-21535: segmentation fault in the gencgm_start function in gencgm.c.
- bsc#1192019, CVE-2021-32280: NULL pointer dereference in compute_closed_spline() in trans_spline.c
		</description>
<advisory from="security@suse.de">
	<issued date="2021-10-29"/>
	<updated date="2021-10-29"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1189325">SUSE bug 1189325</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189343">SUSE bug 1189343</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189345">SUSE bug 1189345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189346">SUSE bug 1189346</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190607">SUSE bug 1190607</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190611">SUSE bug 1190611</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190612">SUSE bug 1190612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190615">SUSE bug 1190615</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190616">SUSE bug 1190616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190617">SUSE bug 1190617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190618">SUSE bug 1190618</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192019">SUSE bug 1192019</bugzilla>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21529/">CVE-2020-21529</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21530/">CVE-2020-21530</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21531/">CVE-2020-21531</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21532/">CVE-2020-21532</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21533/">CVE-2020-21533</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-21534/">CVE-2020-21534</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21535/">CVE-2020-21535</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21680/">CVE-2020-21680</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21681/">CVE-2020-21681</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21682/">CVE-2020-21682</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-21683/">CVE-2020-21683</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-32280/">CVE-2021-32280</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009653526" comment="transfig-3.2.8b-4.15.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111990" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1085030" ref_url="https://bugzilla.suse.com/1085030" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1157177" ref_url="https://bugzilla.suse.com/1157177" source="BUGZILLA"/>
		<reference ref_id="1167773" ref_url="https://bugzilla.suse.com/1167773" source="BUGZILLA"/>
		<reference ref_id="1172073" ref_url="https://bugzilla.suse.com/1172073" source="BUGZILLA"/>
		<reference ref_id="1173604" ref_url="https://bugzilla.suse.com/1173604" source="BUGZILLA"/>
		<reference ref_id="1176940" ref_url="https://bugzilla.suse.com/1176940" source="BUGZILLA"/>
		<reference ref_id="1184673" ref_url="https://bugzilla.suse.com/1184673" source="BUGZILLA"/>
		<reference ref_id="1185762" ref_url="https://bugzilla.suse.com/1185762" source="BUGZILLA"/>
		<reference ref_id="1186063" ref_url="https://bugzilla.suse.com/1186063" source="BUGZILLA"/>
		<reference ref_id="1187167" ref_url="https://bugzilla.suse.com/1187167" source="BUGZILLA"/>
		<reference ref_id="1188563" ref_url="https://bugzilla.suse.com/1188563" source="BUGZILLA"/>
		<reference ref_id="1189841" ref_url="https://bugzilla.suse.com/1189841" source="BUGZILLA"/>
		<reference ref_id="1190006" ref_url="https://bugzilla.suse.com/1190006" source="BUGZILLA"/>
		<reference ref_id="1190067" ref_url="https://bugzilla.suse.com/1190067" source="BUGZILLA"/>
		<reference ref_id="1190349" ref_url="https://bugzilla.suse.com/1190349" source="BUGZILLA"/>
		<reference ref_id="1190351" ref_url="https://bugzilla.suse.com/1190351" source="BUGZILLA"/>
		<reference ref_id="1190479" ref_url="https://bugzilla.suse.com/1190479" source="BUGZILLA"/>
		<reference ref_id="1190620" ref_url="https://bugzilla.suse.com/1190620" source="BUGZILLA"/>
		<reference ref_id="1190642" ref_url="https://bugzilla.suse.com/1190642" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1190941" ref_url="https://bugzilla.suse.com/1190941" source="BUGZILLA"/>
		<reference ref_id="1191229" ref_url="https://bugzilla.suse.com/1191229" source="BUGZILLA"/>
		<reference ref_id="1191241" ref_url="https://bugzilla.suse.com/1191241" source="BUGZILLA"/>
		<reference ref_id="1191315" ref_url="https://bugzilla.suse.com/1191315" source="BUGZILLA"/>
		<reference ref_id="1191317" ref_url="https://bugzilla.suse.com/1191317" source="BUGZILLA"/>
		<reference ref_id="1191349" ref_url="https://bugzilla.suse.com/1191349" source="BUGZILLA"/>
		<reference ref_id="1191384" ref_url="https://bugzilla.suse.com/1191384" source="BUGZILLA"/>
		<reference ref_id="1191449" ref_url="https://bugzilla.suse.com/1191449" source="BUGZILLA"/>
		<reference ref_id="1191450" ref_url="https://bugzilla.suse.com/1191450" source="BUGZILLA"/>
		<reference ref_id="1191451" ref_url="https://bugzilla.suse.com/1191451" source="BUGZILLA"/>
		<reference ref_id="1191452" ref_url="https://bugzilla.suse.com/1191452" source="BUGZILLA"/>
		<reference ref_id="1191455" ref_url="https://bugzilla.suse.com/1191455" source="BUGZILLA"/>
		<reference ref_id="1191456" ref_url="https://bugzilla.suse.com/1191456" source="BUGZILLA"/>
		<reference ref_id="1191628" ref_url="https://bugzilla.suse.com/1191628" source="BUGZILLA"/>
		<reference ref_id="1191731" ref_url="https://bugzilla.suse.com/1191731" source="BUGZILLA"/>
		<reference ref_id="1191800" ref_url="https://bugzilla.suse.com/1191800" source="BUGZILLA"/>
		<reference ref_id="1191934" ref_url="https://bugzilla.suse.com/1191934" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1192040" ref_url="https://bugzilla.suse.com/1192040" source="BUGZILLA"/>
		<reference ref_id="1192041" ref_url="https://bugzilla.suse.com/1192041" source="BUGZILLA"/>
		<reference ref_id="1192107" ref_url="https://bugzilla.suse.com/1192107" source="BUGZILLA"/>
		<reference ref_id="1192145" ref_url="https://bugzilla.suse.com/1192145" source="BUGZILLA"/>
		<reference ref_id="1192267" ref_url="https://bugzilla.suse.com/1192267" source="BUGZILLA"/>
		<reference ref_id="1192549" ref_url="https://bugzilla.suse.com/1192549" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3542" ref_url="https://www.suse.com/security/cve/CVE-2021-3542/" source="CVE"/>
		<reference ref_id="CVE-2021-3655" ref_url="https://www.suse.com/security/cve/CVE-2021-3655/" source="CVE"/>
		<reference ref_id="CVE-2021-3715" ref_url="https://www.suse.com/security/cve/CVE-2021-3715/" source="CVE"/>
		<reference ref_id="CVE-2021-3760" ref_url="https://www.suse.com/security/cve/CVE-2021-3760/" source="CVE"/>
		<reference ref_id="CVE-2021-3772" ref_url="https://www.suse.com/security/cve/CVE-2021-3772/" source="CVE"/>
		<reference ref_id="CVE-2021-3896" ref_url="https://www.suse.com/security/cve/CVE-2021-3896/" source="CVE"/>
		<reference ref_id="CVE-2021-41864" ref_url="https://www.suse.com/security/cve/CVE-2021-41864/" source="CVE"/>
		<reference ref_id="CVE-2021-42008" ref_url="https://www.suse.com/security/cve/CVE-2021-42008/" source="CVE"/>
		<reference ref_id="CVE-2021-42252" ref_url="https://www.suse.com/security/cve/CVE-2021-42252/" source="CVE"/>
		<reference ref_id="CVE-2021-42739" ref_url="https://www.suse.com/security/cve/CVE-2021-42739/" source="CVE"/>
		<reference ref_id="CVE-2021-43056" ref_url="https://www.suse.com/security/cve/CVE-2021-43056/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3754-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-November/009757.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).
- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).
- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).
- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).
- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-&gt;rf_conn_info object (bsc#1190067).
- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).
- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).
- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).
- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).
- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).
- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).

The following non-security bugs were fixed:

- ACPI: bgrt: Fix CFI violation (git-fixes).
- ACPI: fix NULL pointer dereference (git-fixes).
- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).
- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).
- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).
- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).
- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).
- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).
- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).
- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).
- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).
- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).
- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).
- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).
- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).
- HID: u2fzero: ignore incomplete packets without data (git-fixes).
- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).
- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).
- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).
- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).
- Input: snvs_pwrkey - add clk handling (git-fixes).
- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).
- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).
- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).
- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).
- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).
- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).
- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).
- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).
- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).
- NFS: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself (bsc#1191628 bsc#1192549).
- NFS: Do uncached readdir when we're seeking a cookie in an empty page cache (bsc#1191628).
- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).
- USB: cdc-acm: clean up probe error labels (git-fixes).
- USB: cdc-acm: fix minor-number release (git-fixes).
- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).
- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).
- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).
- USB: serial: qcserial: add EM9191 QDL support (git-fixes).
- USB: xhci: dbc: fix tty registration race (git-fixes).
- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).
- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).
- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).
- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).
- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).
- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).
- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).
- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).
- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).
- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).
- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).
- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (git-fixes).
- can: dev: can_restart: fix use after free bug (git-fixes).
- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).
- can: peak_usb: fix use after free bugs (git-fixes).
- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).
- can: rcar_can: fix suspend/resume (git-fixes).
- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).
- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).
- cb710: avoid NULL pointer subtraction (git-fixes).
- ceph: fix handling of 'meta' errors (bsc#1192041).
- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).
- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).
- drm/amd/display: Pass PCI deviceid into DC (git-fixes).
- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).
- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).
- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).
- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).
- drm/nouveau/debugfs: fix file release memory leak (git-fixes).
- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).
- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).
- e100: fix buffer overrun in e100_get_regs (git-fixes).
- e100: fix length calculation in e100_get_regs_len (git-fixes).
- e100: handle eeprom as little endian (git-fixes).
- ext4: fix reserved space counter leakage (bsc#1191450).
- ext4: report correct st_size for encrypted symlinks (bsc#1191449).
- fs, mm: fix race in unlinking swapfile (bsc#1191455).
- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).
- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).
- gpio: pca953x: Improve bias setting (git-fixes).
- gve: Avoid freeing NULL pointer (git-fixes).
- gve: Correct available tx qpl check (git-fixes).
- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).
- gve: fix gve_get_stats() (git-fixes).
- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).
- hso: fix bailout in error case of probe (git-fixes).
- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).
- i40e: Fix ATR queue selection (git-fixes).
- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).
- i40e: fix endless loop under rtnl (git-fixes).
- iavf: fix double unlock of crit_lock (git-fixes).
- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).
- iio: adc128s052: Fix the error handling path of 'adc128_probe()' (git-fixes).
- iio: adc: aspeed: set driver data when adc probe (git-fixes).
- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).
- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).
- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).
- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).
- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).
- ionic: do not remove netdev-&gt;dev_addr when syncing uc list (bsc#1167773).
- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).
- isdn: cpai: check ctr-&gt;cnr to avoid array index out of bound (git-fixes).
- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).
- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).
- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).
- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).
- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 ('rpm: Abolish scritplet templating (bsc#1189841).')
- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229).
- lan78xx: select CRC32 (git-fixes).
- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).
- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).
- mac80211: check return value of rhashtable_init (git-fixes).
- mei: me: add Ice Lake-N device id (git-fixes).
- mlx5: count all link events (git-fixes).
- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).
- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).
- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).
- mmc: vub300: fix control-message timeouts (git-fixes).
- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).
- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).
- net/mlx4_en: Resolve bad operstate value (git-fixes).
- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).
- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).
- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).
- net: batman-adv: fix error handling (git-fixes).
- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).
- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).
- net: cdc_eem: fix tx fixup skb leak (git-fixes).
- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).
- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).
- net: hso: add failure handler for add_net_device (git-fixes).
- net: hso: fix NULL-deref on disconnect regression (git-fixes).
- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).
- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).
- net: lan78xx: fix division by zero in send path (git-fixes).
- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).
- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).
- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).
- nfc: fix error handling of nfc_proto_register() (git-fixes).
- nfc: port100: fix using -ERRNO as command type mask (git-fixes).
- nvme-fc: avoid race between time out and tear down (bsc#1185762).
- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).
- nvme-fc: update hardware queues before using them (bsc#1185762).
- nvme-pci: Fix abort command id (git-fixes).
- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).
- nvme-pci: refactor nvme_unmap_data (bsc#1191934).
- nvme: add command id quirk for apple controllers (git-fixes).
- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).
- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).
- phy: mdio: fix memory leak (git-fixes).
- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).
- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).
- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).
- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).
- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).
- powerpc/lib: Fix emulate_step() std test (bsc#1065729).
- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).
- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).
- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).
- ptp_pch: Load module automatically if ID matches (git-fixes).
- ptp_pch: Restore dependency on PCI (git-fixes).
- qed: Fix missing error code in qed_slowpath_start() (git-fixes).
- qed: Handle management FW error (git-fixes).
- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).
- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).
- rpm: fix kmp install path
- rpm: use _rpmmacrodir (boo#1191384)
- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).
- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).
- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).
- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).
- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).
- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).
- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).
- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).
- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).
- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).
- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).
- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).
- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).
- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).
- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).
- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).
- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).
- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).
- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).
- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).
- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).
- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).
- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).
- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).
- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).
- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).
- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).
- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).
- scsi: qla2xxx: Fix port type info (bsc#1190941).
- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).
- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).
- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).
- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).
- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).
- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).
- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).
- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).
- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).
- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).
- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).
- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).
- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).
- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).
- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).
- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).
- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).
- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).
- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).
- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).
- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).
- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).
- usb: hso: fix error handling code of hso_create_net_device (git-fixes).
- usb: hso: remove the bailout parameter (git-fixes).
- usb: musb: dsps: Fix the probe error path (git-fixes).
- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).
- virtio: write back F_VERSION_1 before validate (git-fixes).
- watchdog: orion: use 0 for unset heartbeat (git-fixes).
- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).
- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).
- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).
- xen: fix setting of max_pfn in shared_info (git-fixes).
- xen: reset legacy rtc flag for PV domU (git-fixes).
- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006).
- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).
- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).
- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).
- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).
- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).
- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-11-19"/>
	<updated date="2021-11-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1085030">SUSE bug 1085030</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1157177">SUSE bug 1157177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1167773">SUSE bug 1167773</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1172073">SUSE bug 1172073</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173604">SUSE bug 1173604</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176940">SUSE bug 1176940</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1184673">SUSE bug 1184673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1185762">SUSE bug 1185762</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1186063">SUSE bug 1186063</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187167">SUSE bug 1187167</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188563">SUSE bug 1188563</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189841">SUSE bug 1189841</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190006">SUSE bug 1190006</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190067">SUSE bug 1190067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190349">SUSE bug 1190349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190351">SUSE bug 1190351</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190479">SUSE bug 1190479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190620">SUSE bug 1190620</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190642">SUSE bug 1190642</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190941">SUSE bug 1190941</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191229">SUSE bug 1191229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191241">SUSE bug 1191241</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191315">SUSE bug 1191315</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191317">SUSE bug 1191317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191349">SUSE bug 1191349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191384">SUSE bug 1191384</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191449">SUSE bug 1191449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191450">SUSE bug 1191450</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191451">SUSE bug 1191451</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191452">SUSE bug 1191452</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191455">SUSE bug 1191455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191456">SUSE bug 1191456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191628">SUSE bug 1191628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191731">SUSE bug 1191731</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191800">SUSE bug 1191800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191934">SUSE bug 1191934</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192040">SUSE bug 1192040</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192041">SUSE bug 1192041</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192107">SUSE bug 1192107</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192145">SUSE bug 1192145</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192267">SUSE bug 1192267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192549">SUSE bug 1192549</bugzilla>
	<cve impact="important" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3542/">CVE-2021-3542</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-3655/">CVE-2021-3655</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3715/">CVE-2021-3715</cve>
	<cve impact="moderate" cvss3="6.4/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-3760/">CVE-2021-3760</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3772/">CVE-2021-3772</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3896/">CVE-2021-3896</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-41864/">CVE-2021-41864</cve>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42008/">CVE-2021-42008</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42252/">CVE-2021-42252</cve>
	<cve impact="important" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-42739/">CVE-2021-42739</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43056/">CVE-2021-43056</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009655939" comment="kernel-default-extra-5.3.18-24.93.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009655940" comment="kernel-preempt-extra-5.3.18-24.93.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111991" version="1" class="patch">
	<metadata>
		<title>Security update for poppler (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1092945" ref_url="https://bugzilla.suse.com/1092945" source="BUGZILLA"/>
		<reference ref_id="1102531" ref_url="https://bugzilla.suse.com/1102531" source="BUGZILLA"/>
		<reference ref_id="1107597" ref_url="https://bugzilla.suse.com/1107597" source="BUGZILLA"/>
		<reference ref_id="1114966" ref_url="https://bugzilla.suse.com/1114966" source="BUGZILLA"/>
		<reference ref_id="1115185" ref_url="https://bugzilla.suse.com/1115185" source="BUGZILLA"/>
		<reference ref_id="1115186" ref_url="https://bugzilla.suse.com/1115186" source="BUGZILLA"/>
		<reference ref_id="1115187" ref_url="https://bugzilla.suse.com/1115187" source="BUGZILLA"/>
		<reference ref_id="1115626" ref_url="https://bugzilla.suse.com/1115626" source="BUGZILLA"/>
		<reference ref_id="1120495" ref_url="https://bugzilla.suse.com/1120495" source="BUGZILLA"/>
		<reference ref_id="1120496" ref_url="https://bugzilla.suse.com/1120496" source="BUGZILLA"/>
		<reference ref_id="1120939" ref_url="https://bugzilla.suse.com/1120939" source="BUGZILLA"/>
		<reference ref_id="1120956" ref_url="https://bugzilla.suse.com/1120956" source="BUGZILLA"/>
		<reference ref_id="1124150" ref_url="https://bugzilla.suse.com/1124150" source="BUGZILLA"/>
		<reference ref_id="1127329" ref_url="https://bugzilla.suse.com/1127329" source="BUGZILLA"/>
		<reference ref_id="1129202" ref_url="https://bugzilla.suse.com/1129202" source="BUGZILLA"/>
		<reference ref_id="1130229" ref_url="https://bugzilla.suse.com/1130229" source="BUGZILLA"/>
		<reference ref_id="1131696" ref_url="https://bugzilla.suse.com/1131696" source="BUGZILLA"/>
		<reference ref_id="1131722" ref_url="https://bugzilla.suse.com/1131722" source="BUGZILLA"/>
		<reference ref_id="1142465" ref_url="https://bugzilla.suse.com/1142465" source="BUGZILLA"/>
		<reference ref_id="1143950" ref_url="https://bugzilla.suse.com/1143950" source="BUGZILLA"/>
		<reference ref_id="1179163" ref_url="https://bugzilla.suse.com/1179163" source="BUGZILLA"/>
		<reference ref_id="CVE-2017-18267" ref_url="https://www.suse.com/security/cve/CVE-2017-18267/" source="CVE"/>
		<reference ref_id="CVE-2018-13988" ref_url="https://www.suse.com/security/cve/CVE-2018-13988/" source="CVE"/>
		<reference ref_id="CVE-2018-16646" ref_url="https://www.suse.com/security/cve/CVE-2018-16646/" source="CVE"/>
		<reference ref_id="CVE-2018-18897" ref_url="https://www.suse.com/security/cve/CVE-2018-18897/" source="CVE"/>
		<reference ref_id="CVE-2018-19058" ref_url="https://www.suse.com/security/cve/CVE-2018-19058/" source="CVE"/>
		<reference ref_id="CVE-2018-19059" ref_url="https://www.suse.com/security/cve/CVE-2018-19059/" source="CVE"/>
		<reference ref_id="CVE-2018-19060" ref_url="https://www.suse.com/security/cve/CVE-2018-19060/" source="CVE"/>
		<reference ref_id="CVE-2018-19149" ref_url="https://www.suse.com/security/cve/CVE-2018-19149/" source="CVE"/>
		<reference ref_id="CVE-2018-20481" ref_url="https://www.suse.com/security/cve/CVE-2018-20481/" source="CVE"/>
		<reference ref_id="CVE-2018-20551" ref_url="https://www.suse.com/security/cve/CVE-2018-20551/" source="CVE"/>
		<reference ref_id="CVE-2018-20650" ref_url="https://www.suse.com/security/cve/CVE-2018-20650/" source="CVE"/>
		<reference ref_id="CVE-2018-20662" ref_url="https://www.suse.com/security/cve/CVE-2018-20662/" source="CVE"/>
		<reference ref_id="CVE-2019-10871" ref_url="https://www.suse.com/security/cve/CVE-2019-10871/" source="CVE"/>
		<reference ref_id="CVE-2019-10872" ref_url="https://www.suse.com/security/cve/CVE-2019-10872/" source="CVE"/>
		<reference ref_id="CVE-2019-14494" ref_url="https://www.suse.com/security/cve/CVE-2019-14494/" source="CVE"/>
		<reference ref_id="CVE-2019-7310" ref_url="https://www.suse.com/security/cve/CVE-2019-7310/" source="CVE"/>
		<reference ref_id="CVE-2019-9200" ref_url="https://www.suse.com/security/cve/CVE-2019-9200/" source="CVE"/>
		<reference ref_id="CVE-2019-9631" ref_url="https://www.suse.com/security/cve/CVE-2019-9631/" source="CVE"/>
		<reference ref_id="CVE-2019-9903" ref_url="https://www.suse.com/security/cve/CVE-2019-9903/" source="CVE"/>
		<reference ref_id="CVE-2019-9959" ref_url="https://www.suse.com/security/cve/CVE-2019-9959/" source="CVE"/>
		<reference ref_id="CVE-2020-27778" ref_url="https://www.suse.com/security/cve/CVE-2020-27778/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009785.html" source="SUSE-SU"/>
		<description>
This update for poppler fixes the following issues:

- CVE-2017-18267: Fixed an infinite recursion that would allow remote attackers to cause a denial of service (bsc#1092945).
- CVE-2018-13988: Added an improper implementation check which otherwise could allow buffer overflows, memory corruption, and denial of service (bsc#1102531).
- CVE-2018-16646: Fixed an infinite recursion which could allow a denial-of-service attack via a specially crafted PDF file (bsc#1107597).
- CVE-2018-18897: Fixed a memory leak (bsc#1114966).
- CVE-2018-19058: Fixed a bug which could allow a denial-of-service attack via a specially crafted PDF file (bsc#1115187).
- CVE-2018-19059: Fixed an out-of-bounds read access which could allow a denial-of-service attack (bsc#1115186).
- CVE-2018-19060: Fixed a NULL pointer dereference which could allow a denial-of-service attack (bsc#1115185).
- CVE-2018-19149: Fixed a NULL pointer dereference which could allow a denial-of-service attack (bsc#1115626).
- CVE-2018-20481: Fixed a NULL pointer dereference while handling unallocated XRef entries which could allow a denial-of-service attack (bsc#1120495).
- CVE-2018-20551: Fixed a reachable assertion which could allow a denial-of-service attack through specially crafted PDF files (bsc#1120496).
- CVE-2018-20650: Fixed a reachable assertion which could allow denial-of-service through specially crafted PDF files (bsc#1120939).
- CVE-2018-20662: Fixed a bug which could potentially crash the running process by SIGABRT resulting in a denial-of-service attack through a specially crafted PDF file (bsc#1120956).
- CVE-2019-10871: Fixed a heap-based buffer  over-read in the function PSOutputDev::checkPageSlice at PSOutputDev.cc (bsc#1131696).
- CVE-2019-10872: Fixed a heap-based buffer over-read in the function Splash::blitTransparent at splash/Splash.cc (bsc#1131722).
- CVE-2019-14494: Fixed a divide-by-zero error in the function SplashOutputDev::tilingPatternFill (bsc#1143950).
- CVE-2019-7310: Fixed a heap-based buffer over-read (due to an integer signedness error in the XRef::getEntry function in XRef.cc) that allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document (bsc#1124150).
- CVE-2019-9200: Fixed a heap-based buffer underwrite which could allow denial-of-service attack through a specially crafted PDF file (bsc#1127329)
- CVE-2019-9631: Fixed a heap-based buffer over-read  in the CairoRescaleBox.cc downsample_row_box_filter function (bsc#1129202).
- CVE-2019-9903: Fixed excessive stack consumption in the Dict::find() method, which can be triggered by passing a crafted pdf file to the pdfunite binary (bsc#1130229).
- CVE-2019-9959: Fixed integer overflow that made it possible to allocate a large memory chunk on the heap with a size controlled by an attacker (bsc#1142465).
- CVE-2020-27778: Fixed buffer overflow vulnerability in pdftohtml (bsc#1179163).
  		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-01"/>
	<updated date="2021-12-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1092945">SUSE bug 1092945</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1102531">SUSE bug 1102531</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1107597">SUSE bug 1107597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1114966">SUSE bug 1114966</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115185">SUSE bug 1115185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115186">SUSE bug 1115186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115187">SUSE bug 1115187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1115626">SUSE bug 1115626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120495">SUSE bug 1120495</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120496">SUSE bug 1120496</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120939">SUSE bug 1120939</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1120956">SUSE bug 1120956</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1124150">SUSE bug 1124150</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1127329">SUSE bug 1127329</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1129202">SUSE bug 1129202</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1130229">SUSE bug 1130229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131696">SUSE bug 1131696</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1131722">SUSE bug 1131722</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1142465">SUSE bug 1142465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1143950">SUSE bug 1143950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179163">SUSE bug 1179163</bugzilla>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2017-18267/">CVE-2017-18267</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2018-13988/">CVE-2018-13988</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-16646/">CVE-2018-16646</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-18897/">CVE-2018-18897</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19058/">CVE-2018-19058</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19059/">CVE-2018-19059</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19060/">CVE-2018-19060</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-19149/">CVE-2018-19149</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20481/">CVE-2018-20481</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20551/">CVE-2018-20551</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20650/">CVE-2018-20650</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-20662/">CVE-2018-20662</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-10871/">CVE-2019-10871</cve>
	<cve impact="moderate" cvss3="4.4/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-10872/">CVE-2019-10872</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-14494/">CVE-2019-14494</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2019-7310/">CVE-2019-7310</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2019-9200/">CVE-2019-9200</cve>
	<cve impact="moderate" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9631/">CVE-2019-9631</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9903/">CVE-2019-9903</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2019-9959/">CVE-2019-9959</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-27778/">CVE-2020-27778</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009658136" comment="libpoppler73-0.62.0-4.6.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111992" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1094840" ref_url="https://bugzilla.suse.com/1094840" source="BUGZILLA"/>
		<reference ref_id="1133021" ref_url="https://bugzilla.suse.com/1133021" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1169263" ref_url="https://bugzilla.suse.com/1169263" source="BUGZILLA"/>
		<reference ref_id="1170269" ref_url="https://bugzilla.suse.com/1170269" source="BUGZILLA"/>
		<reference ref_id="1188601" ref_url="https://bugzilla.suse.com/1188601" source="BUGZILLA"/>
		<reference ref_id="1190523" ref_url="https://bugzilla.suse.com/1190523" source="BUGZILLA"/>
		<reference ref_id="1190795" ref_url="https://bugzilla.suse.com/1190795" source="BUGZILLA"/>
		<reference ref_id="1191790" ref_url="https://bugzilla.suse.com/1191790" source="BUGZILLA"/>
		<reference ref_id="1191851" ref_url="https://bugzilla.suse.com/1191851" source="BUGZILLA"/>
		<reference ref_id="1191958" ref_url="https://bugzilla.suse.com/1191958" source="BUGZILLA"/>
		<reference ref_id="1191961" ref_url="https://bugzilla.suse.com/1191961" source="BUGZILLA"/>
		<reference ref_id="1191980" ref_url="https://bugzilla.suse.com/1191980" source="BUGZILLA"/>
		<reference ref_id="1192045" ref_url="https://bugzilla.suse.com/1192045" source="BUGZILLA"/>
		<reference ref_id="1192229" ref_url="https://bugzilla.suse.com/1192229" source="BUGZILLA"/>
		<reference ref_id="1192273" ref_url="https://bugzilla.suse.com/1192273" source="BUGZILLA"/>
		<reference ref_id="1192328" ref_url="https://bugzilla.suse.com/1192328" source="BUGZILLA"/>
		<reference ref_id="1192718" ref_url="https://bugzilla.suse.com/1192718" source="BUGZILLA"/>
		<reference ref_id="1192740" ref_url="https://bugzilla.suse.com/1192740" source="BUGZILLA"/>
		<reference ref_id="1192745" ref_url="https://bugzilla.suse.com/1192745" source="BUGZILLA"/>
		<reference ref_id="1192750" ref_url="https://bugzilla.suse.com/1192750" source="BUGZILLA"/>
		<reference ref_id="1192753" ref_url="https://bugzilla.suse.com/1192753" source="BUGZILLA"/>
		<reference ref_id="1192781" ref_url="https://bugzilla.suse.com/1192781" source="BUGZILLA"/>
		<reference ref_id="1192802" ref_url="https://bugzilla.suse.com/1192802" source="BUGZILLA"/>
		<reference ref_id="1192896" ref_url="https://bugzilla.suse.com/1192896" source="BUGZILLA"/>
		<reference ref_id="1192906" ref_url="https://bugzilla.suse.com/1192906" source="BUGZILLA"/>
		<reference ref_id="1192918" ref_url="https://bugzilla.suse.com/1192918" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-0941" ref_url="https://www.suse.com/security/cve/CVE-2021-0941/" source="CVE"/>
		<reference ref_id="CVE-2021-20322" ref_url="https://www.suse.com/security/cve/CVE-2021-20322/" source="CVE"/>
		<reference ref_id="CVE-2021-31916" ref_url="https://www.suse.com/security/cve/CVE-2021-31916/" source="CVE"/>
		<reference ref_id="CVE-2021-34981" ref_url="https://www.suse.com/security/cve/CVE-2021-34981/" source="CVE"/>
		<reference ref_id="CVE-2021-37159" ref_url="https://www.suse.com/security/cve/CVE-2021-37159/" source="CVE"/>
		<reference ref_id="CVE-2021-43389" ref_url="https://www.suse.com/security/cve/CVE-2021-43389/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:3933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html" source="SUSE-SU"/>
		<description>


The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.


The following security bugs were fixed:

- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)

  You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)

- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).
- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).
- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)
- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails  (bsc#1191961).
- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).
- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).

The following non-security bugs were fixed:

- ABI: sysfs-kernel-slab: Document some stats (git-fixes).
- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).
- ALSA: ua101: fix division by zero at probe (git-fixes).
- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).
- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).
- ASoC: cs42l42: Correct some register default values (git-fixes).
- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).
- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).
- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).
- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).
- ASoC: rockchip: Use generic dmaengine code (git-fixes).
- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).
- ath10k: fix control-message timeout (git-fixes).
- ath10k: fix division by zero in send path (git-fixes).
- ath10k: fix max antenna gain unit (git-fixes).
- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).
- ath6kl: fix control-message timeout (git-fixes).
- ath6kl: fix division by zero in send path (git-fixes).
- ath9k: Fix potential interrupt storm on queue reset (git-fixes).
- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).
- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).
- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).
- b43: fix a lower bounds test (git-fixes).
- b43legacy: fix a lower bounds test (git-fixes).
- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).
- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).
- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)
- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).
- bpf: Fix potential race in tail call compatibility check (git-fixes).
- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).
- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).
- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).
- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).
- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).
- config: disable unprivileged BPF by default (jsc#SLE-22573)
- crypto: caam - disable pkc for non-E SoCs (git-fixes).
- crypto: qat - detect PFVF collision after ACK (git-fixes).
- crypto: qat - disregard spurious PFVF interrupts (git-fixes).
- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).
- drm/amdgpu: fix warning for overflow check (git-fixes).
- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).
- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).
- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).
- drm/v3d: fix wait for TMU write combiner flush (git-fixes).
- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).
- exfat: fix erroneous discard when clear cluster bit (git-fixes).
- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).
- exfat: properly set s_time_gran (bsc#1192328).
- exfat: truncate atimes to 2s granularity (bsc#1192328).
- firmware/psci: fix application of sizeof to pointer (git-fixes).
- fuse: fix page stealing (bsc#1192718).
- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).
- gpio: mpc8xxx: Use 'devm_gpiochip_add_data()' to simplify the code and avoid a leak (git-fixes).
- HID: u2fzero: clarify error check and length calculations (git-fixes).
- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).
- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).
- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).
- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).
- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).
- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).
- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).
- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).
- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).
- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).
- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).
- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).
- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).
- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).
- KVM: s390: index kvm-&gt;arch.idle_mask by vcpu_idx (bsc#1133021).
- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).
- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).
- libertas: Fix possible memory leak in probe and disconnect (git-fixes).
- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).
- media: cedrus: Fix SUNXI tile size calculation (git-fixes).
- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).
- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).
- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).
- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).
- media: em28xx: add missing em28xx_close_extension (git-fixes).
- media: em28xx: Do not use ops-&gt;suspend if it is NULL (git-fixes).
- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).
- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).
- media: mtk-vpu: Fix a resource leak in the error handling path of 'mtk_vpu_probe()' (git-fixes).
- media: mxl111sf: change mutex_init() location (git-fixes).
- media: radio-wl1273: Avoid card name truncation (git-fixes).
- media: si470x: Avoid card name truncation (git-fixes).
- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).
- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).
- media: tm6000: Avoid card name truncation (git-fixes).
- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).
- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).
- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).
- memstick: avoid out-of-range warning (git-fixes).
- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).
- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).
- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).
- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).
- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).
- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).
- mwifiex: fix division by zero in fw download path (git-fixes).
- mwifiex: Send DELBA requests according to spec (git-fixes).
- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).
- net: mscc: ocelot: fix hardware timestamp dequeue logic.
- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).
- nvme-pci: set min_align_mask (bsc#1191851).
- ocfs2: do not zero pages beyond i_size (bsc#1190795).
- ocfs2: fix data corruption on truncate (bsc#1190795).
- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).
- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).
- PCI: aardvark: Do not unmask unused interrupts (git-fixes).
- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).
- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).
- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).
- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).
- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).
- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).
- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).
- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).
- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).
- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).
- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).
- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).
- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).
- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).
- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).
- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).
- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).
- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).
- printk/console: Allow to disable console output by using console='' or console=null (bsc#1192753).
- printk: handle blank console arguments passed in (bsc#1192753).
- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).
- r8152: add a helper function about setting EEE (git-fixes).
- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).
- r8152: Disable PLA MCU clock speed down (git-fixes).
- r8152: disable U2P3 for RTL8153B (git-fixes).
- r8152: divide the tx and rx bottom functions (git-fixes).
- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).
- r8152: fix runtime resume for linking change (git-fixes).
- r8152: replace array with linking list for rx information (git-fixes).
- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).
- r8152: saving the settings of EEE (git-fixes).
- r8152: separate the rx buffer size (git-fixes).
- r8152: use alloc_pages for rx buffer (git-fixes).
- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).
- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).
- Revert 'ibmvnic: check failover_pending in login response' (bsc#1190523 ltc#194510).
- Revert 'platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes' (git-fixes).
- Revert 'r8152: adjust the settings about MAC clock speed down for RTL8153' (git-fixes).
- Revert 'scsi: ufs: fix a missing check of devm_reset_control_get' (git-fixes).
- Revert 'x86/kvm: fix vcpu-id indexed array sizes' (git-fixes).
- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).
- rsi: fix control-message timeout (git-fixes).
- rsi: Fix module dev_oper_mode parameter description (git-fixes).
- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).
- rtl8187: fix control-message timeouts (git-fixes).
- s390/qeth: fix deadlock during failing recovery (git-fixes).
- s390/qeth: Fix deadlock in remove_discipline (git-fixes).
- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).
- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).
- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).
- scsi: core: Fix spelling in a source code comment (git-fixes).
- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).
- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).
- scsi: dc395: Fix error case unwinding (git-fixes).
- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).
- scsi: FlashPoint: Rename si_flags field (git-fixes).
- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).
- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).
- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).
- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).
- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).
- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).
- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).
- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).
- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).
- scsi: snic: Fix an error message (git-fixes).
- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).
- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).
- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).
- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).
- staging: r8712u: fix control-message timeout (git-fixes).
- staging: rtl8192u: fix control-message timeouts (git-fixes).
- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).
- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).
- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).
- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).
- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).
- swiotlb: factor out a nr_slots helper (bsc#1191851).
- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).
- swiotlb: respect min_align_mask (bsc#1191851).
- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).
- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).
- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).
- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set
- usb: gadget: hid: fix error code in do_config() (git-fixes).
- usb: iowarrior: fix control-message timeouts (git-fixes).
- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).
- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).
- usbnet: fix error return code in usbnet_probe() (git-fixes).
- usbnet: sanity check for maxpacket (git-fixes).
- usb: serial: keyspan: fix memleak on probe errors (git-fixes).
- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).
- virtio-gpu: fix possible memory allocation failure (git-fixes).
- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two's complement (git-fixes).
- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).
- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).
- x86/ioapic: Force affinity setup before startup (bsc#1152489).
- x86/msi: Force affinity setup before startup (bsc#1152489).
- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).
- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).
- xen: Fix implicit type conversion (git-fixes).
- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).
- xfs: do not allow log writes if the data device is readonly (bsc#1192229).
- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).
- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).
- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).
- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-06"/>
	<updated date="2021-12-06"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1094840">SUSE bug 1094840</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1133021">SUSE bug 1133021</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169263">SUSE bug 1169263</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170269">SUSE bug 1170269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188601">SUSE bug 1188601</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190523">SUSE bug 1190523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190795">SUSE bug 1190795</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191790">SUSE bug 1191790</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191851">SUSE bug 1191851</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191958">SUSE bug 1191958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191961">SUSE bug 1191961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191980">SUSE bug 1191980</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192045">SUSE bug 1192045</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192229">SUSE bug 1192229</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192273">SUSE bug 1192273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192328">SUSE bug 1192328</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192718">SUSE bug 1192718</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192740">SUSE bug 1192740</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192745">SUSE bug 1192745</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192750">SUSE bug 1192750</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192753">SUSE bug 1192753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192781">SUSE bug 1192781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192802">SUSE bug 1192802</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192896">SUSE bug 1192896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192906">SUSE bug 1192906</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192918">SUSE bug 1192918</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-0941/">CVE-2021-0941</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-20322/">CVE-2021-20322</cve>
	<cve impact="moderate" cvss3="6.8/CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31916/">CVE-2021-31916</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-34981/">CVE-2021-34981</cve>
	<cve impact="moderate" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-37159/">CVE-2021-37159</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43389/">CVE-2021-43389</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009657531" comment="kernel-default-extra-5.3.18-24.96.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009657532" comment="kernel-preempt-extra-5.3.18-24.96.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111993" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1193030" ref_url="https://bugzilla.suse.com/1193030" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4008" ref_url="https://www.suse.com/security/cve/CVE-2021-4008/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009906.html" source="SUSE-SU"/>
		<description>
This update for xorg-x11-server fixes the following issues:
	  
- CVE-2021-4008: Fixed Privilege Escalation Vulnerability via Out-Of-Bounds Access in SProcRenderCompositeGlyphs (bsc#1193030).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-14"/>
	<updated date="2021-12-14"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193030">SUSE bug 1193030</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4008/">CVE-2021-4008</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659865" comment="xorg-x11-server-wayland-1.20.3-22.5.39.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111994" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1182863" ref_url="https://bugzilla.suse.com/1182863" source="BUGZILLA"/>
		<reference ref_id="1189547" ref_url="https://bugzilla.suse.com/1189547" source="BUGZILLA"/>
		<reference ref_id="1190244" ref_url="https://bugzilla.suse.com/1190244" source="BUGZILLA"/>
		<reference ref_id="1190269" ref_url="https://bugzilla.suse.com/1190269" source="BUGZILLA"/>
		<reference ref_id="1191332" ref_url="https://bugzilla.suse.com/1191332" source="BUGZILLA"/>
		<reference ref_id="1192250" ref_url="https://bugzilla.suse.com/1192250" source="BUGZILLA"/>
		<reference ref_id="1193485" ref_url="https://bugzilla.suse.com/1193485" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-29981" ref_url="https://www.suse.com/security/cve/CVE-2021-29981/" source="CVE"/>
		<reference ref_id="CVE-2021-29982" ref_url="https://www.suse.com/security/cve/CVE-2021-29982/" source="CVE"/>
		<reference ref_id="CVE-2021-29987" ref_url="https://www.suse.com/security/cve/CVE-2021-29987/" source="CVE"/>
		<reference ref_id="CVE-2021-29991" ref_url="https://www.suse.com/security/cve/CVE-2021-29991/" source="CVE"/>
		<reference ref_id="CVE-2021-32810" ref_url="https://www.suse.com/security/cve/CVE-2021-32810/" source="CVE"/>
		<reference ref_id="CVE-2021-38492" ref_url="https://www.suse.com/security/cve/CVE-2021-38492/" source="CVE"/>
		<reference ref_id="CVE-2021-38493" ref_url="https://www.suse.com/security/cve/CVE-2021-38493/" source="CVE"/>
		<reference ref_id="CVE-2021-38495" ref_url="https://www.suse.com/security/cve/CVE-2021-38495/" source="CVE"/>
		<reference ref_id="CVE-2021-38496" ref_url="https://www.suse.com/security/cve/CVE-2021-38496/" source="CVE"/>
		<reference ref_id="CVE-2021-38497" ref_url="https://www.suse.com/security/cve/CVE-2021-38497/" source="CVE"/>
		<reference ref_id="CVE-2021-38498" ref_url="https://www.suse.com/security/cve/CVE-2021-38498/" source="CVE"/>
		<reference ref_id="CVE-2021-38500" ref_url="https://www.suse.com/security/cve/CVE-2021-38500/" source="CVE"/>
		<reference ref_id="CVE-2021-38501" ref_url="https://www.suse.com/security/cve/CVE-2021-38501/" source="CVE"/>
		<reference ref_id="CVE-2021-38502" ref_url="https://www.suse.com/security/cve/CVE-2021-38502/" source="CVE"/>
		<reference ref_id="CVE-2021-38503" ref_url="https://www.suse.com/security/cve/CVE-2021-38503/" source="CVE"/>
		<reference ref_id="CVE-2021-38504" ref_url="https://www.suse.com/security/cve/CVE-2021-38504/" source="CVE"/>
		<reference ref_id="CVE-2021-38505" ref_url="https://www.suse.com/security/cve/CVE-2021-38505/" source="CVE"/>
		<reference ref_id="CVE-2021-38506" ref_url="https://www.suse.com/security/cve/CVE-2021-38506/" source="CVE"/>
		<reference ref_id="CVE-2021-38507" ref_url="https://www.suse.com/security/cve/CVE-2021-38507/" source="CVE"/>
		<reference ref_id="CVE-2021-38508" ref_url="https://www.suse.com/security/cve/CVE-2021-38508/" source="CVE"/>
		<reference ref_id="CVE-2021-38509" ref_url="https://www.suse.com/security/cve/CVE-2021-38509/" source="CVE"/>
		<reference ref_id="CVE-2021-38510" ref_url="https://www.suse.com/security/cve/CVE-2021-38510/" source="CVE"/>
		<reference ref_id="CVE-2021-40529" ref_url="https://www.suse.com/security/cve/CVE-2021-40529/" source="CVE"/>
		<reference ref_id="CVE-2021-43528" ref_url="https://www.suse.com/security/cve/CVE-2021-43528/" source="CVE"/>
		<reference ref_id="CVE-2021-43536" ref_url="https://www.suse.com/security/cve/CVE-2021-43536/" source="CVE"/>
		<reference ref_id="CVE-2021-43537" ref_url="https://www.suse.com/security/cve/CVE-2021-43537/" source="CVE"/>
		<reference ref_id="CVE-2021-43538" ref_url="https://www.suse.com/security/cve/CVE-2021-43538/" source="CVE"/>
		<reference ref_id="CVE-2021-43539" ref_url="https://www.suse.com/security/cve/CVE-2021-43539/" source="CVE"/>
		<reference ref_id="CVE-2021-43541" ref_url="https://www.suse.com/security/cve/CVE-2021-43541/" source="CVE"/>
		<reference ref_id="CVE-2021-43542" ref_url="https://www.suse.com/security/cve/CVE-2021-43542/" source="CVE"/>
		<reference ref_id="CVE-2021-43543" ref_url="https://www.suse.com/security/cve/CVE-2021-43543/" source="CVE"/>
		<reference ref_id="CVE-2021-43545" ref_url="https://www.suse.com/security/cve/CVE-2021-43545/" source="CVE"/>
		<reference ref_id="CVE-2021-43546" ref_url="https://www.suse.com/security/cve/CVE-2021-43546/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009928.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Update to version 91.4 MFSA 2021-54 (bsc#1193485)
- CVE-2021-43536: URL leakage when navigating while executing asynchronous function
- CVE-2021-43537: Heap buffer overflow when using structured clone
- CVE-2021-43538: Missing fullscreen and pointer lock notification when requesting both
- CVE-2021-43539: GC rooting failure when calling wasm instance methods
- CVE-2021-43541: External protocol handler parameters were unescaped
- CVE-2021-43542: XMLHttpRequest error codes could have leaked the existence of an external protocol handler
- CVE-2021-43543: Bypass of CSP sandbox directive when embedding
- CVE-2021-43545: Denial of Service when using the Location API in a loop
- CVE-2021-43546: Cursor spoofing could overlay user interface when native cursor is zoomed
- CVE-2021-43528: JavaScript unexpectedly enabled for the composition area

- Update to version 91.3.2
- CVE-2021-40529: Fixed ElGamal implementation could allow plaintext recovery (bsc#1190244)

- Update to version 91.3 MFSA 2021-50 (bsc#1192250)
- CVE-2021-38503: Fixed iframe sandbox rules did not apply to XSLT stylesheets
- CVE-2021-38504: Fixed use-after-free in file picker dialog
- CVE-2021-38505: Fixed Windows 10 Cloud Clipboard may have recorded sensitive user data
- CVE-2021-38506: Fixed Thunderbird could be coaxed into going into fullscreen mode without notification or warning
- CVE-2021-38507: Fixed opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports
- CVE-2021-38508: Fixed permission Prompt could be overlaid, resulting in user confusion and potential spoofing
- CVE-2021-38509: Fixed Javascript alert box could have been spoofed onto an arbitrary domain
- CVE-2021-38510: Fixed Download Protections were bypassed by .inetloc files on Mac OS
- Fixed plain text reformatting regression (bsc#1182863)

- Update to version 91.2 MFSA 2021-47 (bsc#1191332)
- CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
- CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
- CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
- CVE-2021-32810: Data race in crossbeam-deque
- CVE-2021-38493: Memory safety bugs fixed in Thunderbird 78.14 and Thunderbird 91.1
- CVE-2021-38496: Use-after-free in MessageTask
- CVE-2021-38497: Validation message could have been overlaid on another origin
- CVE-2021-38498: Use-after-free of nsLanguageAtomService object
- CVE-2021-38500: Memory safety bugs fixed in Thunderbird 91.2
- CVE-2021-38501: Memory safety bugs fixed in Thunderbird 91.2
- CVE-2021-38502: Downgrade attack on SMTP STARTTLS connections

- Update to version 91.1.0 MFSA 2021-41 (bsc#1190269)
- CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
- CVE-2021-38495: Memory safety bugs fixed in Thunderbird 91.1

- Update to version 91.0.1 MFSA 2021-37 (bsc#1189547)
- CVE-2021-29991: Header Splitting possible with HTTP/3 Responses
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182863">SUSE bug 1182863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189547">SUSE bug 1189547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190244">SUSE bug 1190244</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190269">SUSE bug 1190269</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191332">SUSE bug 1191332</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192250">SUSE bug 1192250</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193485">SUSE bug 1193485</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29981/">CVE-2021-29981</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29982/">CVE-2021-29982</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-29987/">CVE-2021-29987</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-29991/">CVE-2021-29991</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-32810/">CVE-2021-32810</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38492/">CVE-2021-38492</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38493/">CVE-2021-38493</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38495/">CVE-2021-38495</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38496/">CVE-2021-38496</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38497/">CVE-2021-38497</cve>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38498/">CVE-2021-38498</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-38500/">CVE-2021-38500</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38501/">CVE-2021-38501</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38502/">CVE-2021-38502</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38503/">CVE-2021-38503</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38504/">CVE-2021-38504</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38505/">CVE-2021-38505</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38506/">CVE-2021-38506</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-38507/">CVE-2021-38507</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38508/">CVE-2021-38508</cve>
	<cve impact="important" href="https://www.suse.com/security/cve/CVE-2021-38509/">CVE-2021-38509</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-38510/">CVE-2021-38510</cve>
	<cve impact="low" href="https://www.suse.com/security/cve/CVE-2021-40529/">CVE-2021-40529</cve>
	<cve impact="important" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43528/">CVE-2021-43528</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43536/">CVE-2021-43536</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43537/">CVE-2021-43537</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43538/">CVE-2021-43538</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-43539/">CVE-2021-43539</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43541/">CVE-2021-43541</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43542/">CVE-2021-43542</cve>
	<cve impact="important" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-43543/">CVE-2021-43543</cve>
	<cve impact="important" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-43545/">CVE-2021-43545</cve>
	<cve impact="important" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2021-43546/">CVE-2021-43546</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009660132" comment="MozillaThunderbird-91.4.0-8.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660133" comment="MozillaThunderbird-translations-common-91.4.0-8.45.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009660134" comment="MozillaThunderbird-translations-other-91.4.0-8.45.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111995" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1194045" ref_url="https://bugzilla.suse.com/1194045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009961.html" source="SUSE-SU"/>
		<description>
This update for gegl fixes the following issues:

- CVE-2021-45463: fixed shell expansion via crafted pathname in the ImageMagick convert fallback (bsc#1194045).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-31"/>
	<updated date="2021-12-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194045">SUSE bug 1194045</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661876" comment="gegl-0_4-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661861" comment="gegl-0_4-lang-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661877" comment="gegl-devel-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661878" comment="libgegl-0_4-0-0.4.16-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661879" comment="typelib-1_0-Gegl-0_4-0.4.16-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111996" version="1" class="patch">
	<metadata>
		<title>Security update for gegl (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1194045" ref_url="https://bugzilla.suse.com/1194045" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-45463" ref_url="https://www.suse.com/security/cve/CVE-2021-45463/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:4210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-December/009960.html" source="SUSE-SU"/>
		<description>
This update for gegl fixes the following issues:

- CVE-2021-45463: fixed shell expansion via crafted pathname in the ImageMagick convert fallback (bsc#1194045).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-31"/>
	<updated date="2021-12-31"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194045">SUSE bug 1194045</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-45463/">CVE-2021-45463</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661873" comment="gegl-0_3-0.3.34-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661874" comment="libgegl-0_3-0-0.3.34-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661875" comment="typelib-1_0-Gegl-0_3-0.3.34-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111997" version="1" class="patch">
	<metadata>
		<title>Security update for MozillaThunderbird (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1182357" ref_url="https://bugzilla.suse.com/1182357" source="BUGZILLA"/>
		<reference ref_id="1182614" ref_url="https://bugzilla.suse.com/1182614" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-23968" ref_url="https://www.suse.com/security/cve/CVE-2021-23968/" source="CVE"/>
		<reference ref_id="CVE-2021-23969" ref_url="https://www.suse.com/security/cve/CVE-2021-23969/" source="CVE"/>
		<reference ref_id="CVE-2021-23973" ref_url="https://www.suse.com/security/cve/CVE-2021-23973/" source="CVE"/>
		<reference ref_id="CVE-2021-23978" ref_url="https://www.suse.com/security/cve/CVE-2021-23978/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008411.html" source="SUSE-SU"/>
		<description>
This update for MozillaThunderbird fixes the following issues:

- Mozilla Thunderbird 78.8
  * fixed: Importing an address book from a CSV file always reported an error
  * fixed: Security information for S/MIME messages was not displayed correctly prior to a draft being saved
  * fixed: Calendar: FileLink UI fixes for Caldav calendars
  * fixed: Recurring tasks were always marked incomplete; unable to use filters
  * fixed: Various UI widgets not working
  * fixed: Dark theme improvements
  * fixed: Extension manager was missing link to addon support web page
  * fixed: Various security fixes
  MFSA 2021-09 (bsc#1182614)
  * CVE-2021-23969: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23968: Content Security Policy violation report could have contained the destination of a redirect
  * CVE-2021-23973: MediaError message property could have leaked information about cross-origin resources
  * CVE-2021-23978: Memory safety bugs fixed in Thunderbird 78.8
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-01"/>
	<updated date="2021-03-01"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182357">SUSE bug 1182357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182614">SUSE bug 1182614</bugzilla>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23968/">CVE-2021-23968</cve>
	<cve impact="moderate" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23969/">CVE-2021-23969</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-23973/">CVE-2021-23973</cve>
	<cve impact="moderate" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-23978/">CVE-2021-23978</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509404" comment="MozillaThunderbird-78.8.0-8.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509405" comment="MozillaThunderbird-translations-common-78.8.0-8.15.4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509406" comment="MozillaThunderbird-translations-other-78.8.0-8.15.4 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111998" version="1" class="patch">
	<metadata>
		<title>Security update for the Linux Kernel (Important)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1065600" ref_url="https://bugzilla.suse.com/1065600" source="BUGZILLA"/>
		<reference ref_id="1065729" ref_url="https://bugzilla.suse.com/1065729" source="BUGZILLA"/>
		<reference ref_id="1078720" ref_url="https://bugzilla.suse.com/1078720" source="BUGZILLA"/>
		<reference ref_id="1081134" ref_url="https://bugzilla.suse.com/1081134" source="BUGZILLA"/>
		<reference ref_id="1084610" ref_url="https://bugzilla.suse.com/1084610" source="BUGZILLA"/>
		<reference ref_id="1132477" ref_url="https://bugzilla.suse.com/1132477" source="BUGZILLA"/>
		<reference ref_id="1151927" ref_url="https://bugzilla.suse.com/1151927" source="BUGZILLA"/>
		<reference ref_id="1152472" ref_url="https://bugzilla.suse.com/1152472" source="BUGZILLA"/>
		<reference ref_id="1152489" ref_url="https://bugzilla.suse.com/1152489" source="BUGZILLA"/>
		<reference ref_id="1154353" ref_url="https://bugzilla.suse.com/1154353" source="BUGZILLA"/>
		<reference ref_id="1155518" ref_url="https://bugzilla.suse.com/1155518" source="BUGZILLA"/>
		<reference ref_id="1156395" ref_url="https://bugzilla.suse.com/1156395" source="BUGZILLA"/>
		<reference ref_id="1163776" ref_url="https://bugzilla.suse.com/1163776" source="BUGZILLA"/>
		<reference ref_id="1169514" ref_url="https://bugzilla.suse.com/1169514" source="BUGZILLA"/>
		<reference ref_id="1170442" ref_url="https://bugzilla.suse.com/1170442" source="BUGZILLA"/>
		<reference ref_id="1176248" ref_url="https://bugzilla.suse.com/1176248" source="BUGZILLA"/>
		<reference ref_id="1176855" ref_url="https://bugzilla.suse.com/1176855" source="BUGZILLA"/>
		<reference ref_id="1177109" ref_url="https://bugzilla.suse.com/1177109" source="BUGZILLA"/>
		<reference ref_id="1177326" ref_url="https://bugzilla.suse.com/1177326" source="BUGZILLA"/>
		<reference ref_id="1177440" ref_url="https://bugzilla.suse.com/1177440" source="BUGZILLA"/>
		<reference ref_id="1177529" ref_url="https://bugzilla.suse.com/1177529" source="BUGZILLA"/>
		<reference ref_id="1178142" ref_url="https://bugzilla.suse.com/1178142" source="BUGZILLA"/>
		<reference ref_id="1178995" ref_url="https://bugzilla.suse.com/1178995" source="BUGZILLA"/>
		<reference ref_id="1179082" ref_url="https://bugzilla.suse.com/1179082" source="BUGZILLA"/>
		<reference ref_id="1179137" ref_url="https://bugzilla.suse.com/1179137" source="BUGZILLA"/>
		<reference ref_id="1179243" ref_url="https://bugzilla.suse.com/1179243" source="BUGZILLA"/>
		<reference ref_id="1179428" ref_url="https://bugzilla.suse.com/1179428" source="BUGZILLA"/>
		<reference ref_id="1179660" ref_url="https://bugzilla.suse.com/1179660" source="BUGZILLA"/>
		<reference ref_id="1179929" ref_url="https://bugzilla.suse.com/1179929" source="BUGZILLA"/>
		<reference ref_id="1180058" ref_url="https://bugzilla.suse.com/1180058" source="BUGZILLA"/>
		<reference ref_id="1180846" ref_url="https://bugzilla.suse.com/1180846" source="BUGZILLA"/>
		<reference ref_id="1180964" ref_url="https://bugzilla.suse.com/1180964" source="BUGZILLA"/>
		<reference ref_id="1180989" ref_url="https://bugzilla.suse.com/1180989" source="BUGZILLA"/>
		<reference ref_id="1181133" ref_url="https://bugzilla.suse.com/1181133" source="BUGZILLA"/>
		<reference ref_id="1181259" ref_url="https://bugzilla.suse.com/1181259" source="BUGZILLA"/>
		<reference ref_id="1181544" ref_url="https://bugzilla.suse.com/1181544" source="BUGZILLA"/>
		<reference ref_id="1181574" ref_url="https://bugzilla.suse.com/1181574" source="BUGZILLA"/>
		<reference ref_id="1181637" ref_url="https://bugzilla.suse.com/1181637" source="BUGZILLA"/>
		<reference ref_id="1181655" ref_url="https://bugzilla.suse.com/1181655" source="BUGZILLA"/>
		<reference ref_id="1181671" ref_url="https://bugzilla.suse.com/1181671" source="BUGZILLA"/>
		<reference ref_id="1181674" ref_url="https://bugzilla.suse.com/1181674" source="BUGZILLA"/>
		<reference ref_id="1181710" ref_url="https://bugzilla.suse.com/1181710" source="BUGZILLA"/>
		<reference ref_id="1181720" ref_url="https://bugzilla.suse.com/1181720" source="BUGZILLA"/>
		<reference ref_id="1181735" ref_url="https://bugzilla.suse.com/1181735" source="BUGZILLA"/>
		<reference ref_id="1181736" ref_url="https://bugzilla.suse.com/1181736" source="BUGZILLA"/>
		<reference ref_id="1181738" ref_url="https://bugzilla.suse.com/1181738" source="BUGZILLA"/>
		<reference ref_id="1181747" ref_url="https://bugzilla.suse.com/1181747" source="BUGZILLA"/>
		<reference ref_id="1181753" ref_url="https://bugzilla.suse.com/1181753" source="BUGZILLA"/>
		<reference ref_id="1181818" ref_url="https://bugzilla.suse.com/1181818" source="BUGZILLA"/>
		<reference ref_id="1181843" ref_url="https://bugzilla.suse.com/1181843" source="BUGZILLA"/>
		<reference ref_id="1181854" ref_url="https://bugzilla.suse.com/1181854" source="BUGZILLA"/>
		<reference ref_id="1181896" ref_url="https://bugzilla.suse.com/1181896" source="BUGZILLA"/>
		<reference ref_id="1181958" ref_url="https://bugzilla.suse.com/1181958" source="BUGZILLA"/>
		<reference ref_id="1181960" ref_url="https://bugzilla.suse.com/1181960" source="BUGZILLA"/>
		<reference ref_id="1181985" ref_url="https://bugzilla.suse.com/1181985" source="BUGZILLA"/>
		<reference ref_id="1182047" ref_url="https://bugzilla.suse.com/1182047" source="BUGZILLA"/>
		<reference ref_id="1182110" ref_url="https://bugzilla.suse.com/1182110" source="BUGZILLA"/>
		<reference ref_id="1182118" ref_url="https://bugzilla.suse.com/1182118" source="BUGZILLA"/>
		<reference ref_id="1182128" ref_url="https://bugzilla.suse.com/1182128" source="BUGZILLA"/>
		<reference ref_id="1182140" ref_url="https://bugzilla.suse.com/1182140" source="BUGZILLA"/>
		<reference ref_id="1182171" ref_url="https://bugzilla.suse.com/1182171" source="BUGZILLA"/>
		<reference ref_id="1182175" ref_url="https://bugzilla.suse.com/1182175" source="BUGZILLA"/>
		<reference ref_id="1182259" ref_url="https://bugzilla.suse.com/1182259" source="BUGZILLA"/>
		<reference ref_id="1182265" ref_url="https://bugzilla.suse.com/1182265" source="BUGZILLA"/>
		<reference ref_id="1182266" ref_url="https://bugzilla.suse.com/1182266" source="BUGZILLA"/>
		<reference ref_id="1182267" ref_url="https://bugzilla.suse.com/1182267" source="BUGZILLA"/>
		<reference ref_id="1182268" ref_url="https://bugzilla.suse.com/1182268" source="BUGZILLA"/>
		<reference ref_id="1182271" ref_url="https://bugzilla.suse.com/1182271" source="BUGZILLA"/>
		<reference ref_id="1182272" ref_url="https://bugzilla.suse.com/1182272" source="BUGZILLA"/>
		<reference ref_id="1182273" ref_url="https://bugzilla.suse.com/1182273" source="BUGZILLA"/>
		<reference ref_id="1182275" ref_url="https://bugzilla.suse.com/1182275" source="BUGZILLA"/>
		<reference ref_id="1182276" ref_url="https://bugzilla.suse.com/1182276" source="BUGZILLA"/>
		<reference ref_id="1182278" ref_url="https://bugzilla.suse.com/1182278" source="BUGZILLA"/>
		<reference ref_id="1182283" ref_url="https://bugzilla.suse.com/1182283" source="BUGZILLA"/>
		<reference ref_id="1182341" ref_url="https://bugzilla.suse.com/1182341" source="BUGZILLA"/>
		<reference ref_id="1182374" ref_url="https://bugzilla.suse.com/1182374" source="BUGZILLA"/>
		<reference ref_id="1182380" ref_url="https://bugzilla.suse.com/1182380" source="BUGZILLA"/>
		<reference ref_id="1182381" ref_url="https://bugzilla.suse.com/1182381" source="BUGZILLA"/>
		<reference ref_id="1182406" ref_url="https://bugzilla.suse.com/1182406" source="BUGZILLA"/>
		<reference ref_id="1182430" ref_url="https://bugzilla.suse.com/1182430" source="BUGZILLA"/>
		<reference ref_id="1182439" ref_url="https://bugzilla.suse.com/1182439" source="BUGZILLA"/>
		<reference ref_id="1182441" ref_url="https://bugzilla.suse.com/1182441" source="BUGZILLA"/>
		<reference ref_id="1182442" ref_url="https://bugzilla.suse.com/1182442" source="BUGZILLA"/>
		<reference ref_id="1182443" ref_url="https://bugzilla.suse.com/1182443" source="BUGZILLA"/>
		<reference ref_id="1182444" ref_url="https://bugzilla.suse.com/1182444" source="BUGZILLA"/>
		<reference ref_id="1182445" ref_url="https://bugzilla.suse.com/1182445" source="BUGZILLA"/>
		<reference ref_id="1182446" ref_url="https://bugzilla.suse.com/1182446" source="BUGZILLA"/>
		<reference ref_id="1182447" ref_url="https://bugzilla.suse.com/1182447" source="BUGZILLA"/>
		<reference ref_id="1182449" ref_url="https://bugzilla.suse.com/1182449" source="BUGZILLA"/>
		<reference ref_id="1182454" ref_url="https://bugzilla.suse.com/1182454" source="BUGZILLA"/>
		<reference ref_id="1182455" ref_url="https://bugzilla.suse.com/1182455" source="BUGZILLA"/>
		<reference ref_id="1182456" ref_url="https://bugzilla.suse.com/1182456" source="BUGZILLA"/>
		<reference ref_id="1182457" ref_url="https://bugzilla.suse.com/1182457" source="BUGZILLA"/>
		<reference ref_id="1182458" ref_url="https://bugzilla.suse.com/1182458" source="BUGZILLA"/>
		<reference ref_id="1182459" ref_url="https://bugzilla.suse.com/1182459" source="BUGZILLA"/>
		<reference ref_id="1182460" ref_url="https://bugzilla.suse.com/1182460" source="BUGZILLA"/>
		<reference ref_id="1182461" ref_url="https://bugzilla.suse.com/1182461" source="BUGZILLA"/>
		<reference ref_id="1182462" ref_url="https://bugzilla.suse.com/1182462" source="BUGZILLA"/>
		<reference ref_id="1182463" ref_url="https://bugzilla.suse.com/1182463" source="BUGZILLA"/>
		<reference ref_id="1182464" ref_url="https://bugzilla.suse.com/1182464" source="BUGZILLA"/>
		<reference ref_id="1182465" ref_url="https://bugzilla.suse.com/1182465" source="BUGZILLA"/>
		<reference ref_id="1182466" ref_url="https://bugzilla.suse.com/1182466" source="BUGZILLA"/>
		<reference ref_id="1182485" ref_url="https://bugzilla.suse.com/1182485" source="BUGZILLA"/>
		<reference ref_id="1182489" ref_url="https://bugzilla.suse.com/1182489" source="BUGZILLA"/>
		<reference ref_id="1182490" ref_url="https://bugzilla.suse.com/1182490" source="BUGZILLA"/>
		<reference ref_id="1182507" ref_url="https://bugzilla.suse.com/1182507" source="BUGZILLA"/>
		<reference ref_id="1182547" ref_url="https://bugzilla.suse.com/1182547" source="BUGZILLA"/>
		<reference ref_id="1182558" ref_url="https://bugzilla.suse.com/1182558" source="BUGZILLA"/>
		<reference ref_id="1182560" ref_url="https://bugzilla.suse.com/1182560" source="BUGZILLA"/>
		<reference ref_id="1182561" ref_url="https://bugzilla.suse.com/1182561" source="BUGZILLA"/>
		<reference ref_id="1182571" ref_url="https://bugzilla.suse.com/1182571" source="BUGZILLA"/>
		<reference ref_id="1182599" ref_url="https://bugzilla.suse.com/1182599" source="BUGZILLA"/>
		<reference ref_id="1182602" ref_url="https://bugzilla.suse.com/1182602" source="BUGZILLA"/>
		<reference ref_id="1182626" ref_url="https://bugzilla.suse.com/1182626" source="BUGZILLA"/>
		<reference ref_id="1182650" ref_url="https://bugzilla.suse.com/1182650" source="BUGZILLA"/>
		<reference ref_id="1182672" ref_url="https://bugzilla.suse.com/1182672" source="BUGZILLA"/>
		<reference ref_id="1182676" ref_url="https://bugzilla.suse.com/1182676" source="BUGZILLA"/>
		<reference ref_id="1182683" ref_url="https://bugzilla.suse.com/1182683" source="BUGZILLA"/>
		<reference ref_id="1182684" ref_url="https://bugzilla.suse.com/1182684" source="BUGZILLA"/>
		<reference ref_id="1182686" ref_url="https://bugzilla.suse.com/1182686" source="BUGZILLA"/>
		<reference ref_id="1182770" ref_url="https://bugzilla.suse.com/1182770" source="BUGZILLA"/>
		<reference ref_id="1182798" ref_url="https://bugzilla.suse.com/1182798" source="BUGZILLA"/>
		<reference ref_id="1182800" ref_url="https://bugzilla.suse.com/1182800" source="BUGZILLA"/>
		<reference ref_id="1182801" ref_url="https://bugzilla.suse.com/1182801" source="BUGZILLA"/>
		<reference ref_id="1182854" ref_url="https://bugzilla.suse.com/1182854" source="BUGZILLA"/>
		<reference ref_id="1182856" ref_url="https://bugzilla.suse.com/1182856" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12362" ref_url="https://www.suse.com/security/cve/CVE-2020-12362/" source="CVE"/>
		<reference ref_id="CVE-2020-12363" ref_url="https://www.suse.com/security/cve/CVE-2020-12363/" source="CVE"/>
		<reference ref_id="CVE-2020-12364" ref_url="https://www.suse.com/security/cve/CVE-2020-12364/" source="CVE"/>
		<reference ref_id="CVE-2020-12373" ref_url="https://www.suse.com/security/cve/CVE-2020-12373/" source="CVE"/>
		<reference ref_id="CVE-2020-29368" ref_url="https://www.suse.com/security/cve/CVE-2020-29368/" source="CVE"/>
		<reference ref_id="CVE-2020-29374" ref_url="https://www.suse.com/security/cve/CVE-2020-29374/" source="CVE"/>
		<reference ref_id="CVE-2021-26930" ref_url="https://www.suse.com/security/cve/CVE-2021-26930/" source="CVE"/>
		<reference ref_id="CVE-2021-26931" ref_url="https://www.suse.com/security/cve/CVE-2021-26931/" source="CVE"/>
		<reference ref_id="CVE-2021-26932" ref_url="https://www.suse.com/security/cve/CVE-2021-26932/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008452.html" source="SUSE-SU"/>
		<description>
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.

The following security bugs were fixed:

- CVE-2021-26930: Fixed an improper error handling in blkback's grant mapping (XSA-365 bsc#1181843).
- CVE-2021-26931: Fixed an issue where Linux  kernel was treating grant mapping errors as bugs (XSA-362 bsc#1181753).
- CVE-2021-26932: Fixed improper error handling issues in Linux grant mapping (XSA-361 bsc#1181747).
  by remote attackers to read or write files via directory traversal in an XCOPY request (bsc#178372).
- CVE-2020-12362: Fixed an integer overflow in the firmware which may have allowed a privileged user to potentially 
  enable an escalation of privilege via local access (bsc#1181720).
- CVE-2020-12363: Fixed an improper input validation which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181735).
- CVE-2020-12364: Fixed a null pointer reference which may have allowed a privileged user to potentially 
  enable a denial of service via local access (bsc#1181736 ).
- CVE-2020-12373: Fixed an expired pointer dereference which may have allowed a privileged user 
  to potentially enable a denial of service via local access (bsc#1181738).
- CVE-2020-29368,CVE-2020-29374: Fixed an issue in copy-on-write implementation which could have granted unintended write access 
  because of a race condition in a THP mapcount check (bsc#1179660, bsc#1179428).

The following non-security bugs were fixed:

- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).
- ACPI: property: Fix fwnode string properties matching (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).
- ACPI: property: Satisfy kernel doc validator (part 2) (git-fixes).
- ALSA: hda: Add another CometLake-H PCI ID (git-fixes).
- ALSA: hda/hdmi: Drop bogus check at closing a stream (git-fixes).
- ALSA: hda/realtek: modify EAPD in the ALC886 (git-fixes).
- ALSA: pcm: Assure sync with the pending stop operation at suspend (git-fixes).
- ALSA: pcm: Call sync_stop at disconnection (git-fixes).
- ALSA: pcm: Do not call sync_stop if it hasn't been stopped (git-fixes).
- ALSA: usb-audio: Add implicit fb quirk for BOSS GP-10 (git-fixes).
- ALSA: usb-audio: Correct document for snd_usb_endpoint_free_all() (git-fixes).
- ALSA: usb-audio: Do not avoid stopping the stream at disconnection (git-fixes).
- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).
- ALSA: usb-audio: Handle invalid running state at releasing EP (git-fixes).
- ALSA: usb-audio: More strict state change in EP (git-fixes).
- amba: Fix resource leak for drivers without .remove (git-fixes).
- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)
- ASoC: cpcap: fix microphone timeslot mask (git-fixes).
- ASoC: cs42l56: fix up error handling in probe (git-fixes).
- ASoC: simple-card-utils: Fix device module clock (git-fixes).
- ASoC: SOF: debug: Fix a potential issue on string buffer termination (git-fixes).
- ata: ahci_brcm: Add back regulators management (git-fixes).
- ata: sata_nv: Fix retrieving of active qcs (git-fixes).
- ath10k: Fix error handling in case of CE pipe init failure (git-fixes).
- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).
- bcache: fix overflow in offset_to_stripe() (git-fixes).
- blk-mq: call commit_rqs while list empty but error happen (bsc#1182442).
- blk-mq: insert request not through -&gt;queue_rq into sw/scheduler queue (bsc#1182443).
- blk-mq: move cancel of hctx-&gt;run_work to the front of blk_exit_queue (bsc#1182444).
- block: fix inflight statistics of part0 (bsc#1182445).
- block: respect queue limit of max discard segment (bsc#1182441).
- block: virtio_blk: fix handling single range discard request (bsc#1182439).
- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).
- Bluetooth: btusb: Fix memory leak in btusb_mtk_wmt_recv (git-fixes).
- Bluetooth: drop HCI device reference before return (git-fixes).
- Bluetooth: Fix initializing response id after clearing struct (git-fixes).
- Bluetooth: hci_uart: Fix a race for write_work scheduling (git-fixes).
- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).
- bnxt_en: Fix accumulation of bp-&gt;net_stats_prev (git-fixes).
- bnxt_en: fix error return code in bnxt_init_board() (git-fixes).
- bnxt_en: fix error return code in bnxt_init_one() (git-fixes).
- bnxt_en: Improve stats context resource accounting with RDMA driver loaded (git-fixes).
- bnxt_en: read EEPROM A2h address using page 0 (git-fixes).
- bnxt_en: Release PCI regions when DMA mask setup fails during probe (git-fixes).
- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).
- bonding: set dev-&gt;needed_headroom in bond_setup_by_slave() (git-fixes).
- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).
- bpf, cgroup: Fix optlen WARN_ON_ONCE toctou (bsc#1155518).
- bpf, cgroup: Fix problematic bounds check (bsc#1155518).
- btrfs: add assertion for empty list of transactions at late stage of umount (bsc#1182626).
- btrfs: Cleanup try_flush_qgroup (bsc#1182047).
- btrfs: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).
- btrfs: fix race between RO remount and the cleaner task (bsc#1182626).
- btrfs: fix transaction leak and crash after cleaning up orphans on RO mount (bsc#1182626).
- btrfs: fix transaction leak and crash after RO remount caused by qgroup rescan (bsc#1182626).
- btrfs: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: lift read-write mount setup from mount and remount (bsc#1182626).
- btrfs: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: run delayed iputs when remounting RO to avoid leaking them (bsc#1182626).
- btrfs: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).
- btrfs: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).
- caif: no need to check return value of debugfs_create functions (git-fixes).
- ceph: fix flush_snap logic after putting caps (bsc#1182854).
- cgroup: Fix memory leak when parsing multiple source parameters (bsc#1182683).
- cgroup: fix psi monitor for root cgroup (bsc#1182686).
- cgroup-v1: add disabled controller check in cgroup1_parse_param() (bsc#1182684).
- chelsio/chtls: correct function return and return type (git-fixes).
- chelsio/chtls: correct netdevice for vlan interface (git-fixes).
- chelsio/chtls: fix a double free in chtls_setkey() (git-fixes).
- chelsio/chtls: fix always leaking ctrl_skb (git-fixes).
- chelsio/chtls: fix deadlock issue (git-fixes).
- chelsio/chtls: fix memory leaks caused by a race (git-fixes).
- chelsio/chtls: fix memory leaks in CPL handlers (git-fixes).
- chelsio/chtls: fix panic during unload reload chtls (git-fixes).
- chelsio/chtls: fix socket lock (git-fixes).
- chelsio/chtls: fix tls record info to user (git-fixes).
- Cherry-pick ibmvnic patches from SP3 (jsc#SLE-17268).
- chtls: Added a check to avoid NULL pointer dereference (git-fixes).
- chtls: Fix chtls resources release sequence (git-fixes).
- chtls: Fix hardware tid leak (git-fixes).
- chtls: Fix panic when route to peer not configured (git-fixes).
- chtls: Remove invalid set_tcb call (git-fixes).
- chtls: Replace skb_dequeue with skb_peek (git-fixes).
- cifs: check all path components in resolved dfs target (bsc#1181710).
- cifs: fix nodfs mount option (bsc#1181710).
- cifs: introduce helper for finding referral server (bsc#1181710).
- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: meson: clk-pll: fix initializing the old rate (fallback) for a PLL (git-fixes).
- clk: meson: clk-pll: make 'ret' a signed integer (git-fixes).
- clk: meson: clk-pll: propagate the error from meson_clk_pll_set_rate() (git-fixes).
- clk: qcom: gcc-msm8998: Fix Alpha PLL type for all GPLLs (git-fixes).
- clk: sunxi-ng: h6: Fix CEC clock (git-fixes).
- clk: sunxi-ng: h6: Fix clock divider range on some clocks (git-fixes).
- clk: sunxi-ng: mp: fix parent rate change flag check (git-fixes).
- clocksource/drivers/ixp4xx: Select TIMER_OF when needed (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Fix resource leaks in -&gt;remove() (git-fixes).
- cpufreq: brcmstb-avs-cpufreq: Free resources in error path (git-fixes).
- cpuset: fix race between hotplug work and later CPU offline (bsc#1182676).
- crypto: ecdh_helper - Ensure 'len &gt;= secret.len' in decode_key() (git-fixes).
- crypto: talitos - Work around SEC6 ERRATA (AES-CTR mode data size error) (git-fixes).
- cxgb3: fix error return code in t3_sge_alloc_qset() (git-fixes).
- cxgb4: fix all-mask IP address comparison (git-fixes).
- cxgb4: fix checks for max queues to allocate (git-fixes).
- cxgb4: fix endian conversions for L4 ports in filters (git-fixes).
- cxgb4: fix set but unused variable when DCB is disabled (git-fixes).
- cxgb4: fix SGE queue dump destination buffer context (git-fixes).
- cxgb4: fix the panic caused by non smac rewrite (git-fixes).
- cxgb4: move DCB version extern to header file (git-fixes).
- cxgb4: move handling L2T ARP failures to caller (git-fixes).
- cxgb4: move PTP lock and unlock to caller in Tx path (git-fixes).
- cxgb4: parse TC-U32 key values and masks natively (git-fixes).
- cxgb4: remove cast when saving IPv4 partial checksum (git-fixes).
- cxgb4: set up filter action after rewrites (git-fixes).
- cxgb4: use correct type for all-mask IP address comparison (git-fixes).
- cxgb4: use unaligned conversion for fetching timestamp (git-fixes).
- dmaengine: fsldma: Fix a resource leak in an error handling path of the probe function (git-fixes).
- dmaengine: fsldma: Fix a resource leak in the remove function (git-fixes).
- dmaengine: hsu: disable spurious interrupt (git-fixes).
- dmaengine: owl-dma: Fix a resource leak in the remove function (git-fixes).
- dm crypt: avoid truncating the logical block size (git-fixes).
- dm: fix bio splitting and its bio completion order for regular IO (git-fixes).
- dm thin: fix use-after-free in metadata_pre_commit_callback (bsc#1177529).
- dm thin metadata: Avoid returning cmd-&gt;bm wild pointer on error (bsc#1177529).
- dm thin metadata: fix lockdep complaint (bsc#1177529).
- dm thin metadata: Fix use-after-free in dm_bm_set_read_only (bsc#1177529).
- dm: use noio when sending kobject event (bsc#1177529).
- docs: filesystems: vfs: correct flag name (bsc#1182856).
- dpaa2-eth: fix return codes used in ndo_setup_tc (git-fixes).
- drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).
- drivers: net: davinci_mdio: fix potential NULL dereference in davinci_mdio_probe() (git-fixes).
- drivers: soc: atmel: add null entry at the end of at91_soc_allowed_list[] (git-fixes).
- drivers: soc: atmel: Avoid calling at91_soc_init on non AT91 SoCs (git-fixes).
- drm/amd/display: Change function decide_dp_link_settings to avoid infinite looping (git-fixes).
- drm/amd/display: Decrement refcount of dc_sink before reassignment (git-fixes).
- drm/amd/display: Fix 10/12 bpc setup in DCE output bit depth reduction (git-fixes).
- drm/amd/display: Fix dc_sink kref count in emulated_link_detect (git-fixes).
- drm/amd/display: Fix HDMI deep color output for DCE 6-11 (git-fixes).
- drm/amd/display: Free atomic state after drm_atomic_commit (git-fixes).
- drm/amd/display: Revert 'Fix EDID parsing after resume from suspend' (git-fixes).
- drm/amdgpu: Fix macro name _AMDGPU_TRACE_H_ in preprocessor if condition (git-fixes).
- drm/fb-helper: Add missed unlocks in setcmap_legacy() (git-fixes).
- drm/gma500: Fix error return code in psb_driver_load() (git-fixes).
- drm/meson: Unbind all connectors on module removal (bsc#1152472)
- drm/sun4i: dw-hdmi: always set clock rate (bsc#1152472)
- drm/sun4i: dw-hdmi: Fix max. frequency for H6 (bsc#1152472)
- drm/sun4i: Fix H6 HDMI PHY configuration (bsc#1152472)
- drm/sun4i: tcon: set sync polarity for tcon1 channel (bsc#1152472)
- drm/vc4: hvs: Fix buffer overflow with the dlist handling (bsc#1152489)
- Drop HID logitech patch that caused a regression (bsc#1182259) 
- exec: Always set cap_ambient in cap_bprm_set_creds (git-fixes).
- exfat: Avoid allocating upcase table using kcalloc() (git-fixes).
- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).
- ext4: fix a memory leak of ext4_free_data (bsc#1182447).
- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).
- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).
- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).
- ext4: prevent creating duplicate encrypted filenames (bsc#1182446).
- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).
- firmware_loader: align .builtin_fw to 8 (git-fixes).
- fscrypt: add fscrypt_is_nokey_name() (bsc#1182446).
- fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME (bsc#1182446).
- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).
- gma500: clean up error handling in init (git-fixes).
- gpio: pcf857x: Fix missing first interrupt (git-fixes).
- HID: core: detect and skip invalid inputs to snto32() (git-fixes).
- HID: make arrays usage and value to be the same (git-fixes).
- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).
- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).
- i2c: brcmstb: Fix brcmstd_send_i2c_cmd condition (git-fixes).
- i2c: iproc: handle only slave interrupts which are enabled (git-fixes).
- i2c: mediatek: Move suspend and resume handling to NOIRQ phase (git-fixes).
- i2c: stm32f7: fix configuration of the digital filter (git-fixes).
- i3c: master: dw: Drop redundant disec call (git-fixes).
- i40e: acquire VSI pointer only after VF is initialized (jsc#SLE-8025).
- i40e: avoid premature Rx buffer reuse (git-fixes).
- i40e: Fix Error I40E_AQ_RC_EINVAL when removing VFs (git-fixes).
- i40e: Fix MAC address setting for a VF via Host/VM (git-fixes).
- i40e: Fix removing driver while bare-metal VFs pass traffic (git-fixes).
- i40e: Revert 'i40e: do not report link up for a VF who hasn't enabled queues' (jsc#SLE-8025).
- iavf: fix double-release of rtnl_lock (git-fixes).
- iavf: fix error return code in iavf_init_get_resources() (git-fixes).
- iavf: fix speed reporting over virtchnl (git-fixes).
- iavf: Fix updating statistics (git-fixes).
- ibmvnic: add memory barrier to protect long term buffer (bsc#1182485 ltc#191591).
- ibmvnic: change IBMVNIC_MAX_IND_DESCS to 16 (bsc#1182485 ltc#191591).
- ibmvnic: Clean up TX code and TX buffer data structure (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).
- ibmvnic: compare adapter-&gt;init_done_rc with more readable ibmvnic_rc_codes (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Correctly re-enable interrupts in NAPI polling routine (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_control_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: create send_query_ip_offload (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: device remove has higher precedence over reset (bsc#1065729).
- ibmvnic: Do not replenish RX buffers after every polling loop (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that CRQ entry read are correctly ordered (bsc#1182485 ltc#191591).
- ibmvnic: Ensure that device queue memory is cache-line aligned (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Ensure that SCRQ entry reads are correctly ordered (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).
- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).
- ibmvnic: fix NULL pointer dereference in ibmvic_reset_crq (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: fix rx buffer tracking and index management in replenish_rx_pool partial success (bsc#1179929 ltc#189960).
- ibmvnic: Fix TX completion error handling (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Fix use-after-free of VNIC login response buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: handle inconsistent login with reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Harden device Command Response Queue handshake (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: improve ibmvnic_init and ibmvnic_reset_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce batched RX buffer descriptor transmission (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce indirect subordinate Command Response Queue buffer (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Introduce xmit_more support using batched subCRQ hcalls (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: merge ibmvnic_reset_init and ibmvnic_init (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: no reset timeout for 5 seconds after reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: reduce wait for completion time (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: remove never executed if statement (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Remove send_subcrq function (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename ibmvnic_send_req_caps to send_request_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_cap_queries to send_query_cap (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: rename send_map_query to send_query_map (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: send_login should check for crq errors (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: serialize access to work queue on remove (bsc#1065729).
- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).
- ibmvnic: skip send_request_unmap for timeout reset (bsc#1182485 ltc#191591).
- ibmvnic: skip tx timeout reset while in resetting (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: stop free_all_rwi on failed reset (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: store RX and TX subCRQ handle array in ibmvnic_adapter struct (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: track pending login (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: update MAINTAINERS (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ibmvnic: Use netdev_alloc_skb instead of alloc_skb to replenish RX buffers (jsc#SLE-17043 bsc#1179243 ltc#189290).
- ice: Do not allow more channels than LAN MSI-X available (jsc#SLE-7926).
- ice: Fix MSI-X vector fallback logic (jsc#SLE-7926).
- igc: check return value of ret_val in igc_config_fc_after_link_up (git-fixes).
- igc: fix link speed advertising (git-fixes).
- igc: Fix returning wrong statistics (git-fixes).
- igc: Report speed and duplex as unknown when device is runtime suspended (git-fixes).
- igc: set the default return value to -IGC_ERR_NVM in igc_write_nvm_srwr (git-fixes).
- include/linux/memremap.h: remove stale comments (git-fixes).
- Input: elo - fix an error code in elo_connect() (git-fixes).
- Input: i8042 - unbreak Pegatron C15B (git-fixes).
- Input: joydev - prevent potential read overflow in ioctl (git-fixes).
- Input: sur40 - fix an error code in sur40_probe() (git-fixes).
- Input: xpad - sync supported devices with fork on GitHub (git-fixes).
- iwlwifi: mvm: do not send RFH_QUEUE_CONFIG_CMD with no queues (git-fixes).
- iwlwifi: mvm: guard against device removal in reprobe (git-fixes).
- iwlwifi: mvm: invalidate IDs of internal stations at mvm start (git-fixes).
- iwlwifi: mvm: skip power command when unbinding vif during CSA (git-fixes).
- iwlwifi: mvm: take mutex for calling iwl_mvm_get_sync_time() (git-fixes).
- iwlwifi: pcie: add a NULL check in iwl_pcie_txq_unmap (git-fixes).
- iwlwifi: pcie: fix context info memory leak (git-fixes).
- iwlwifi: pcie: reschedule in long-running memory reads (git-fixes).
- iwlwifi: pcie: use jiffies for memory read spin time limit (git-fixes).
- ixgbe: avoid premature Rx buffer reuse (git-fixes).
- ixgbe: Fix XDP redirect on archs with PAGE_SIZE above 4K (git-fixes).
- kABI: Fix kABI after AMD SEV PCID fixes (bsc#1178995).
- kABI: Fix kABI after modifying struct __call_single_data (bsc#1180846).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181259, jsc#ECO-3191).
- kABI: repair, after 'nVMX: Emulate MTF when performinginstruction emulation' kvm_x86_ops is part of kABI as it's used by LTTng. But it's only read and never allocated in there, so growing it (without altering existing members' offsets) is fine.
- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')
- kernel/smp: add boot parameter for controlling CSD lock debugging (bsc#1180846).
- kernel/smp: add more data to CSD lock debugging (bsc#1180846).
- kernel/smp: prepare more CSD lock debugging (bsc#1180846).
- kernel/smp: Provide CSD lock timeout diagnostics (bsc#1180846).
- KVM: arm64: Assume write fault on S1PTW permission fault on instruction fetch (bsc#1181818).
- KVM: arm64: Remove S1PTW check from kvm_vcpu_dabt_iswrite() (bsc#1181818).
- KVM: nVMX: do not clear mtf_pending when nested events are blocked (bsc#1182489).
- KVM: nVMX: Emulate MTF when performing instruction emulation (bsc#1182380).
- KVM: nVMX: Handle pending #DB when injecting INIT VM-exit. Pulling in as a dependency of: 'KVM: nVMX: Emulate MTF when performing instruction emulation' (bsc#1182380).
- KVM: SVM: Update cr3_lm_rsvd_bits for AMD SEV guests (bsc#1178995).
- KVM: tracing: Fix unmatched kvm_entry and kvm_exit events (bsc#1182770).
- KVM: VMX: Condition ENCLS-exiting enabling on CPU support for SGX1 (bsc#1182798).
- KVM: x86: Allocate new rmap and large page tracking when moving memslot (bsc#1182800).
- KVM: x86: allow KVM_STATE_NESTED_MTF_PENDING in kvm_state flags (bsc#1182490).
- KVM: x86: clear stale x86_emulate_ctxt-&gt;intercept value (bsc#1182381).
- KVM: x86: do not notify userspace IOAPIC on edge-triggered interrupt EOI (bsc#1182374).
- KVM: x86: Gracefully handle __vmalloc() failure during VM allocation (bsc#1182801).
- KVM: x86: Introduce cr3_lm_rsvd_bits in kvm_vcpu_arch (bsc#1178995).
- KVM: x86: remove stale comment from struct x86_emulate_ctxt (bsc#1182406).
- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).
- lib/vsprintf: no_hash_pointers prints all addresses as unhashed (bsc#1182599).
- linux/clk.h: use correct kernel-doc notation for 2 functions (git-fixes).
- mac80211: 160MHz with extended NSS BW in CSA (git-fixes).
- mac80211: fix fast-rx encryption check (git-fixes).
- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).
- mac80211: pause TX while changing interface type (git-fixes).
- macros.kernel-source: Use spec_install_pre for certificate installation (boo#1182672). Since rpm 4.16 files installed during build phase are lost.
- MAINTAINERS: remove John Allen from ibmvnic (jsc#SLE-17043 bsc#1179243 ltc#189290).
- matroxfb: avoid -Warray-bounds warning (bsc#1152472)
- media: aspeed: fix error return code in aspeed_video_setup_video() (git-fixes).
- media: camss: missing error code in msm_video_register() (git-fixes).
- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).
- media: em28xx: Fix use-after-free in em28xx_alloc_urbs (git-fixes).
- media: i2c: ov5670: Fix PIXEL_RATE minimum value (git-fixes).
- media: ipu3-cio2: Fix mbus_code processing in cio2_subdev_set_fmt() (git-fixes).
- media: lmedm04: Fix misuse of comma (git-fixes).
- media: media/pci: Fix memleak in empress_init (git-fixes).
- media: mt9v111: Remove unneeded device-managed puts (git-fixes).
- media: pwc: Use correct device for DMA (bsc#1181133).
- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).
- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).
- media: software_node: Fix refcounts in software_node_get_next_child() (git-fixes).
- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).
- media: vsp1: Fix an error handling path in the probe function (git-fixes).
- mei: hbm: call mei_set_devstate() on hbm stop response (git-fixes).
- memory: ti-aemif: Drop child node when jumping out loop (git-fixes).
- mfd: bd9571mwv: Use devm_mfd_add_devices() (git-fixes).
- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).
- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).
- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).
- mlxsw: core: Add validation of transceiver temperature thresholds (git-fixes).
- mlxsw: core: Fix memory leak on module removal (git-fixes).
- mlxsw: core: Fix use-after-free in mlxsw_emad_trans_finish() (git-fixes).
- mlxsw: core: Free EMAD transactions using kfree_rcu() (git-fixes).
- mlxsw: core: Increase critical threshold for ASIC thermal zone (git-fixes).
- mlxsw: core: Increase scope of RCU read-side critical section (git-fixes).
- mlxsw: core: Use variable timeout for EMAD retries (git-fixes).
- mlxsw: spectrum_acl: Fix mlxsw_sp_acl_tcam_group_add()'s error path (git-fixes).
- mlxsw: spectrum: Fix use-after-free of split/unsplit/type_set in case reload fails (git-fixes).
- mmc: core: Limit retries when analyse of SDIO tuples fails (git-fixes).
- mmc: renesas_sdhi_internal_dmac: Fix DMA buffer alignment from 8 to 128-bytes (git-fixes).
- mmc: sdhci-sprd: Fix some resource leaks in the remove function (git-fixes).
- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).
- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).
- mm: proc: Invalidate TLB after clearing soft-dirty page state (bsc#1163776 ltc#183929 git-fixes).
- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).
- mt76: dma: fix a possible memory leak in mt76_add_fragment() (git-fixes).
- net: ag71xx: add missed clk_disable_unprepare in error path of probe (git-fixes).
- net: axienet: Fix error return code in axienet_probe() (git-fixes).
- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).
- net: bcmgenet: keep MAC in reset until PHY is up (git-fixes).
- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).
- net: bcmgenet: set Rx mode before starting netif (git-fixes).
- net: bcmgenet: use hardware padding of runt frames (git-fixes).
- net: broadcom CNIC: requires MMU (git-fixes).
- net: caif: Fix debugfs on 64-bit platforms (git-fixes).
- net/cxgb4: Check the return from t4_query_params properly (git-fixes).
- net: cxgb4: fix return error value in t4_prep_fw (git-fixes).
- net: dsa: bcm_sf2: Fix overflow checks (git-fixes).
- net: dsa: lantiq_gswip: fix and improve the unsupported interface error (git-fixes).
- net: dsa: mt7530: Change the LINK bit to reflect the link status (git-fixes).
- net: dsa: mt7530: set CPU port to fallback mode (git-fixes).
- net: ena: set initial DMA width to avoid intel iommu issue (git-fixes).
- net: ethernet: ave: Fix error returns in ave_init (git-fixes).
- net: ethernet: mlx4: Avoid assigning a value to ring_cons but not used it anymore in mlx4_en_xmit() (git-fixes).
- net: ethernet: ti: ale: fix allmulti for nu type ale (git-fixes).
- net: ethernet: ti: ale: fix seeing unreg mcast packets with promisc and allmulti disabled (git-fixes).
- net: ethernet: ti: ale: modify vlan/mdb api for switchdev (git-fixes).
- net: ethernet: ti: cpsw: allow untagged traffic on host port (git-fixes).
- net: ethernet: ti: fix some return value check of cpsw_ale_create() (git-fixes).
- net: gemini: Fix missing clk_disable_unprepare() in error path of gemini_ethernet_port_probe() (git-fixes).
- net: gro: do not keep too many GRO packets in napi-&gt;rx_list (bsc#1154353).
- net: hns3: add a check for queue_id in hclge_reset_vf_queue() (git-fixes).
- net: hns3: add a missing uninit debugfs when unload driver (git-fixes).
- net: hns3: add reset check for VF updating port based VLAN (git-fixes).
- net: hns3: clear port base VLAN when unload PF (git-fixes).
- net: hns3: fix aRFS FD rules leftover after add a user FD rule (git-fixes).
- net: hns3: fix a TX timeout issue (git-fixes).
- net: hns3: fix desc filling bug when skb is expanded or lineared (git-fixes).
- net: hns3: fix for mishandle of asserting VF reset fail (git-fixes).
- net: hns3: fix for VLAN config when reset failed (git-fixes).
- net: hns3: fix RSS config lost after VF reset (git-fixes).
- net: hns3: fix set and get link ksettings issue (git-fixes).
- net: hns3: fix 'tc qdisc del' failed issue (git-fixes).
- net: hns3: fix the number of queues actually used by ARQ (git-fixes).
- net: hns3: fix use-after-free when doing self test (git-fixes).
- net: hns3: fix VF VLAN table entries inconsistent issue (git-fixes).
- net: hns: fix return value check in __lb_other_process() (git-fixes).
- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).
- net: macb: fix call to pm_runtime in the suspend/resume functions (git-fixes).
- net: macb: fix wakeup test in runtime suspend/resume routines (git-fixes).
- net: macb: mark device wake capable when 'magic-packet' property present (git-fixes).
- net/mlx4_core: fix a memory leak bug (git-fixes).
- net/mlx4_core: Fix init_hca fields offset (git-fixes).
- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854).
- net/mlx4_en: Handle TX error CQE (bsc#1181854).
- net/mlx5: Add handling of port type in rule deletion (git-fixes).
- net/mlx5: Annotate mutex destroy for root ns (git-fixes).
- net/mlx5: Clear LAG notifier pointer after unregister (git-fixes).
- net/mlx5: Disable QoS when min_rates on all VFs are zero (git-fixes).
- net/mlx5: Do not call timecounter cyc2time directly from 1PPS flow (git-fixes).
- net/mlx5: Do not maintain a case of del_sw_func being null (git-fixes).
- net/mlx5e: Correctly handle changing the number of queues when the interface is down (git-fixes).
- net/mlx5e: Do not trigger IRQ multiple times on XSK wakeup to avoid WQ overruns (git-fixes).
- net/mlx5e: en_accel, Add missing net/geneve.h include (git-fixes).
- net/mlx5e: Encapsulate updating netdev queues into a function (git-fixes).
- net/mlx5e: E-switch, Fix rate calculation for overflow (jsc#SLE-8464).
- net/mlx5e: fix bpf_prog reference count leaks in mlx5e_alloc_rq (git-fixes).
- net/mlx5e: Fix configuration of XPS cpumasks and netdev queues in corner cases (git-fixes).
- net/mlx5e: Fix endianness handling in pedit mask (git-fixes).
- net/mlx5e: Fix error path of device attach (git-fixes).
- net/mlx5e: Fix memleak in mlx5e_create_l2_table_groups (git-fixes).
- net/mlx5e: Fix two double free cases (git-fixes).
- net/mlx5e: Fix VLAN cleanup flow (git-fixes).
- net/mlx5e: Fix VLAN create flow (git-fixes).
- net/mlx5e: Get the latest values from counters in switchdev mode (git-fixes).
- net/mlx5e: IPoIB, Drop multicast packets that this interface sent (git-fixes).
- net/mlx5e: kTLS, Fix wrong value in record tracker enum (git-fixes).
- net/mlx5e: Reduce tc unsupported key print level (git-fixes).
- net/mlx5e: Rename hw_modify to preactivate (git-fixes).
- net/mlx5e: Set of completion request bit should not clear other adjacent bits (git-fixes).
- net/mlx5: E-switch, Destroy TSAR after reload interface (git-fixes).
- net/mlx5: E-Switch, Hold mutex when querying drop counter in legacy mode (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching by default (git-fixes).
- net/mlx5: E-Switch, Use vport metadata matching only when mandatory (git-fixes).
- net/mlx5e: Use preactivate hook to set the indirection table (git-fixes).
- net/mlx5e: vxlan: Use RCU for vxlan table lookup (git-fixes).
- net/mlx5: Fix a bug of using ptp channel index as pin index (git-fixes).
- net/mlx5: Fix deletion of duplicate rules (git-fixes).
- net/mlx5: Fix failing fw tracer allocation on s390 (git-fixes).
- net/mlx5: Fix memory leak on flow table creation error flow (git-fixes).
- net/mlx5: Fix request_irqs error flow (git-fixes).
- net/mlx5: Fix wrong address reclaim when command interface is down (git-fixes).
- net/mlx5: Query PPS pin operational status before registering it (git-fixes).
- net/mlx5: Verify Hardware supports requested ptp function on a given pin (git-fixes).
- net: moxa: Fix a potential double 'free_irq()' (git-fixes).
- net: mscc: ocelot: ANA_AUTOAGE_AGE_PERIOD holds a value in seconds, not ms (git-fixes).
- net: mscc: ocelot: fix address ageing time (again) (git-fixes).
- net: mscc: ocelot: properly account for VLAN header length when setting MRU (git-fixes).
- net: mvpp2: Add TCAM entry to drop flow control pause frames (git-fixes).
- net: mvpp2: disable force link UP during port init procedure (git-fixes).
- net: mvpp2: Fix error return code in mvpp2_open() (git-fixes).
- net: mvpp2: Fix GoP port 3 Networking Complex Control configurations (git-fixes).
- net: mvpp2: fix memory leak in mvpp2_rx (git-fixes).
- net: mvpp2: fix pkt coalescing int-threshold configuration (git-fixes).
- net: mvpp2: prs: fix PPPoE with ipv6 packet parse (git-fixes).
- net: mvpp2: Remove Pause and Asym_Pause support (git-fixes).
- net: mvpp2: TCAM entry enable should be written after SRAM data (git-fixes).
- net: netsec: Correct dma sync for XDP_TX frames (git-fixes).
- net: nixge: fix potential memory leak in nixge_probe() (git-fixes).
- net: octeon: mgmt: Repair filling of RX ring (git-fixes).
- net: phy: at803x: use operating parameters from PHY-specific status (git-fixes).
- net: phy: extract link partner advertisement reading (git-fixes).
- net: phy: extract pause mode (git-fixes).
- net: phy: marvell10g: fix null pointer dereference (git-fixes).
- net: phy: marvell10g: fix temperature sensor on 2110 (git-fixes).
- net: phy: read MII_CTRL1000 in genphy_read_status only if needed (git-fixes).
- net: qca_spi: fix receive buffer size check (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: qede: fix PTP initialization on recovery (git-fixes).
- net: qede: fix use-after-free on recovery and AER handling (git-fixes).
- net: qede: stop adding events on an already destroyed workqueue (git-fixes).
- net: qed: fix async event callbacks unregistering (git-fixes).
- net: qed: fix excessive QM ILT lines consumption (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (git-fixes).
- net: qed: fix NVMe login fails over VFs (git-fixes).
- net: qed: RDMA personality shouldn't fail VF load (git-fixes).
- net: re-solve some conflicts after net -&gt; net-next merge (bsc#1176855 ltc#187293).
- net: rmnet: do not allow to add multiple bridge interfaces (git-fixes).
- net: rmnet: do not allow to change mux id if mux id is duplicated (git-fixes).
- net: rmnet: fix bridge mode bugs (git-fixes).
- net: rmnet: fix lower interface leak (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_changelink() (git-fixes).
- net: rmnet: fix NULL pointer dereference in rmnet_newlink() (git-fixes).
- net: rmnet: fix packet forwarding in rmnet bridge mode (git-fixes).
- net: rmnet: fix suspicious RCU usage (git-fixes).
- net: rmnet: print error message when command fails (git-fixes).
- net: rmnet: remove rcu_read_lock in rmnet_force_unassociate_device() (git-fixes).
- net: rmnet: use upper/lower device infrastructure (git-fixes).
- net, sctp, filter: remap copy_from_user failure error (bsc#1181637).
- net: smc91x: Fix possible memory leak in smc_drv_probe() (git-fixes).
- net/sonic: Add mutual exclusion for accessing shared state (git-fixes).
- net: stmmac: 16KB buffer must be 16 byte aligned (git-fixes).
- net: stmmac: Always arm TX Timer at end of transmission start (git-fixes).
- net: stmmac: Do not accept invalid MTU values (git-fixes).
- net: stmmac: dwmac-sunxi: Provide TX and RX fifo sizes (git-fixes).
- net: stmmac: Enable 16KB buffer size (git-fixes).
- net: stmmac: fix disabling flexible PPS output (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: Fix the TX IOC in xmit path (git-fixes).
- net: stmmac: RX buffer size must be 16 byte aligned (git-fixes).
- net: stmmac: selftests: Flow Control test can also run with ASYM Pause (git-fixes).
- net: stmmac: selftests: Needs to check the number of Multicast regs (git-fixes).
- net: stmmac: xgmac: Clear previous RX buffer size (git-fixes).
- net: sun: fix missing release regions in cas_init_one() (git-fixes).
- net: team: fix memory leak in __team_options_register (git-fixes).
- net: thunderx: initialize VF's mailbox mutex before first usage (git-fixes).
- net: usb: qmi_wwan: added support for Thales Cinterion PLSx3 modem family (git-fixes).
- net: usb: qmi_wwan: Adding support for Cinterion MV31 (git-fixes).
- nvme-hwmon: rework to avoid devm allocation (bsc#1177326).
- nvme-multipath: Early exit if no path is available (bsc#1180964).
- nvme: re-read ANA log on NS CHANGED AEN (bsc#1179137).
- nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu (bsc#1182547).
- objtool: Do not fail on missing symbol table (bsc#1169514).
- perf/x86/intel/uncore: Factor out uncore_pci_find_dev_pmu() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_get_dev_die_info() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_register() (bsc#1180989).
- perf/x86/intel/uncore: Factor out uncore_pci_pmu_unregister() (bsc#1180989).
- perf/x86/intel/uncore: Generic support for the PCI sub driver (bsc#1180989).
- perf/x86/intel/uncore: Store the logical die id instead of the physical die id (bsc#1180989).
- perf/x86/intel/uncore: With &gt; 8 nodes, get pci bus die id from NUMA info (bsc#1180989).
- phy: cpcap-usb: Fix warning for missing regulator_disable (git-fixes).
- phy: rockchip-emmc: emmc_phy_init() always return 0 (git-fixes).
- platform/x86: hp-wmi: Disable tablet-mode reporting by default (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on Dell Inspiron 7352 (git-fixes).
- platform/x86: touchscreen_dmi: Add swap-x-y quirk for Goodix touchscreen on Estar Beauty HD tablet (git-fixes).
- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).
- powerpc/boot: Delete unneeded .globl _zimage_start (bsc#1156395).
- powerpc: Fix alignment bug within the init sections (bsc#1065729).
- powerpc/fpu: Drop cvt_fd() and cvt_df() (bsc#1156395).
- powerpc/hvcall: add token and codes for H_VASI_SIGNAL (bsc#1181674 ltc#189159).
- powerpc: kABI: add back suspend_disable_cpu in machdep_calls (bsc#1181674 ltc#189159).
- powerpc/machdep: remove suspend_disable_cpu() (bsc#1181674 ltc#189159).
- powerpc/mm/pkeys: Make pkey access check work on execute_only_key (bsc#1181544 ltc#191080 git-fixes).
- powerpc/numa: Fix build when CONFIG_NUMA=n (bsc#1132477 ltc#175530).
- powerpc/numa: make vphn_enabled, prrn_enabled flags const (bsc#1181674 ltc#189159).
- powerpc/numa: remove ability to enable topology updates (bsc#1181674 ltc#189159).
- powerpc/numa: remove arch_update_cpu_topology (bsc#1181674 ltc#189159).
- powerpc/numa: Remove late request for home node associativity (bsc#1181674 ltc#189159).
- powerpc/numa: remove prrn_is_enabled() (bsc#1181674 ltc#189159).
- powerpc/numa: remove start/stop_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove timed_topology_update() (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology timer code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology update code (bsc#1181674 ltc#189159).
- powerpc/numa: remove unreachable topology workqueue code (bsc#1181674 ltc#189159).
- powerpc/numa: remove vphn_enabled and prrn_enabled internal flags (bsc#1181674 ltc#189159).
- powerpc/numa: stub out numa_update_cpu_topology() (bsc#1181674 ltc#189159).
- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).
- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).
- powerpc/pkeys: Avoid using lockless page table walk (bsc#1181544 ltc#191080).
- powerpc/pkeys: Check vma before returning key fault error to the user (bsc#1181544 ltc#191080).
- powerpc/powernv/memtrace: Do not leak kernel memory to user space (bsc#1156395).
- powerpc/powernv/memtrace: Fix crashing the kernel when enabling concurrently (bsc#1156395).
- powerpc/powernv/npu: Do not attempt NPU2 setup on POWER8NVL NPU (bsc#1156395).
- powerpc/prom: Fix 'ibm,arch-vec-5-platform-support' scan (bsc#1182602 ltc#190924).
- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).
- powerpc/pseries: Do not enforce MSI affinity with kdump (bsc#1181655 ltc#190855).
- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).
- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).
- powerpc/pseries/hibernation: drop pseries_suspend_begin() from suspend ops (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: pass stream id via function arguments (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: perform post-suspend fixups later (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove prepare_late() callback (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: remove pseries_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/pseries/hibernation: switch to rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: add missing break to default case (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Add pr_debug() for device tree changes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: do not error on absence of ibm, update-nodes (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: error message improvements (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: extract VASI session polling logic (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: refactor node lookup during DT update (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: retry partition suspend after error (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: Set pr_fmt() (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: signal suspend cancellation to platform (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use rtas_activate_firmware() on resume (bsc#1181674 ltc#189159).
- powerpc/pseries/mobility: use stop_machine for join/suspend (bsc#1181674 ltc#189159).
- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).
- powerpc/pseries: remove dlpar_cpu_readd() (bsc#1181674 ltc#189159).
- powerpc/pseries: remove memory 're-add' implementation (bsc#1181674 ltc#189159).
- powerpc/pseries: remove obsolete memory hotplug DT notifier code (bsc#1181674 ltc#189159).
- powerpc/pseries: remove prrn special case from DT update path (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_activate_firmware() (bsc#1181674 ltc#189159).
- powerpc/rtas: add rtas_ibm_suspend_me() (bsc#1181674 ltc#189159).
- powerpc/rtas: complete ibm,suspend-me status codes (bsc#1181674 ltc#189159).
- powerpc/rtas: dispatch partition migration requests to pseries (bsc#1181674 ltc#189159).
- powerpc/rtasd: simplify handle_rtas_event(), emit message on events (bsc#1181674 ltc#189159).
- powerpc/rtas: prevent suspend-related sys_rtas use on LE (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_ibm_suspend_me_unsafe() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove rtas_suspend_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_last_cpu() (bsc#1181674 ltc#189159).
- powerpc/rtas: remove unused rtas_suspend_me_data (bsc#1181674 ltc#189159).
- powerpc/rtas: rtas_ibm_suspend_me -&gt; rtas_ibm_suspend_me_unsafe (bsc#1181674 ltc#189159).
- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).
- pseries/drmem: do not cache node id in drmem_lmb struct (bsc#1132477 ltc#175530).
- pseries/hotplug-memory: hot-add: skip redundant LMB lookup (bsc#1132477 ltc#175530).
- qed: fix error return code in qed_iwarp_ll2_start() (git-fixes).
- qed: Fix race condition between scheduling and destroying the slowpath workqueue (git-fixes).
- qed: Populate nvm-file attributes while reading nvm config partition (git-fixes).
- qed: select CONFIG_CRC32 (git-fixes).
- qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).
- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).
- quota: Sanity-check quota file headers on load (bsc#1182461).
- r8169: fix resuming from suspend on RTL8105e if machine runs on battery (git-fixes).
- r8169: fix WoL on shutdown if CONFIG_DEBUG_SHIRQ is set (git-fixes).
- rcu/nocb: Perform deferred wake up before last idle's (git-fixes)
- rcu/nocb: Trigger self-IPI on late deferred wake up before (git-fixes)
- rcu: Pull deferred rcuog wake up to rcu_eqs_enter() callers (git-fixes)
- RDMA/efa: Add EFA 0xefa1 PCI ID (bsc#1176248).
- RDMA/efa: Count admin commands errors (bsc#1176248).
- RDMA/efa: Count mmap failures (bsc#1176248).
- RDMA/efa: Do not delay freeing of DMA pages (bsc#1176248).
- RDMA/efa: Drop double zeroing for sg_init_table() (bsc#1176248).
- RDMA/efa: Expose maximum TX doorbell batch (bsc#1176248).
- RDMA/efa: Expose minimum SQ size (bsc#1176248).
- RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1176248).
- RDMA/efa: Properly document the interrupt mask register (bsc#1176248).
- RDMA/efa: Remove redundant udata check from alloc ucontext response (bsc#1176248).
- RDMA/efa: Report create CQ error counter (bsc#1176248).
- RDMA/efa: Report host information to the device (bsc#1176248).
- RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1176248).
- RDMA/efa: Use in-kernel offsetofend() to check field availability (bsc#1176248).
- RDMA/efa: User/kernel compatibility handshake mechanism (bsc#1176248).
- RDMA/efa: Use the correct current and new states in modify QP (git-fixes).
- regulator: axp20x: Fix reference cout leak (git-fixes).
- regulator: core: Avoid debugfs: Directory ... already present! error (git-fixes).
- regulator: core: avoid regulator_resolve_supply() race condition (git-fixes).
- regulator: Fix lockdep warning resolving supplies (git-fixes).
- regulator: s5m8767: Drop regulators OF node reference (git-fixes).
- regulator: s5m8767: Fix reference count leak (git-fixes).
- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).
- reset: hisilicon: correct vendor prefix (git-fixes).
- Revert 'ibmvnic: remove never executed if statement' (jsc#SLE-17043 bsc#1179243 ltc#189290).
- Revert 'net: bcmgenet: remove unused function in bcmgenet.c' (git-fixes).
- Revert 'platform/x86: ideapad-laptop: Switch touchpad attribute to be RO' (git-fixes).
- Revert 'RDMA/mlx5: Fix devlink deadlock on net namespace deletion' (jsc#SLE-8464).
- rpm/kernel-subpackage-build: Workaround broken bot (https://github.com/openSUSE/openSUSE-release-tools/issues/2439)
- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)
- rtc: s5m: select REGMAP_I2C (git-fixes).
- rxrpc: Fix memory leak in rxrpc_lookup_local (bsc#1154353 bnc#1151927 5.3.9).
- s390/vfio-ap: clean up vfio_ap resources when KVM pointer invalidated (git-fixes).
- s390/vfio-ap: No need to disable IRQ after queue reset (git-fixes).
- sched: Reenable interrupts in do_sched_yield() (git-fixes)
- scsi: lpfc: Fix EEH encountering oops with NVMe traffic (bsc#1181958).
- sh_eth: check sh_eth_cpu_data::cexcr when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_tx_cntrs when dumping registers (git-fixes).
- sh_eth: check sh_eth_cpu_data::no_xdfar when dumping registers (git-fixes).
- smp: Add source and destination CPUs to __call_single_data (bsc#1180846).
- smsc95xx: avoid memory leak in smsc95xx_bind (git-fixes).
- smsc95xx: check return value of smsc95xx_reset (git-fixes).
- soc: aspeed: snoop: Add clock control logic (git-fixes).
- spi: atmel: Put allocated master before return (git-fixes).
- spi: pxa2xx: Fix the controller numbering for Wildcat Point (git-fixes).
- spi: spi-synquacer: fix set_cs handling (git-fixes).
- spi: stm32: properly handle 0 byte transfer (git-fixes).
- squashfs: add more sanity checks in id lookup (git-fixes bsc#1182266).
- squashfs: add more sanity checks in inode lookup (git-fixes bsc#1182267).
- squashfs: add more sanity checks in xattr id lookup (git-fixes bsc#1182268).
- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).
- target: disallow emulate_legacy_capacity with RBD object-map (bsc#1177109).
- team: set dev-&gt;needed_headroom in team_setup_by_port() (git-fixes).
- tpm: Remove tpm_dev_wq_lock (git-fixes).
- tpm_tis: Clean up locality release (git-fixes).
- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).
- tracing: Check length before giving out the filter buffer (git-fixes).
- tracing: Do not count ftrace events in top level enable output (git-fixes).
- tracing/kprobe: Fix to support kretprobe events on unloaded modules (git-fixes).
- tracing/kprobes: Do the notrace functions check without kprobes on ftrace (git-fixes).
- tun: fix return value when the number of iovs exceeds MAX_SKB_FRAGS (git-fixes).
- ubifs: Fix error return code in ubifs_init_authentication() (bsc#1182459).
- ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans() (bsc#1182454).
- ubifs: prevent creating duplicate encrypted filenames (bsc#1182457).
- ubifs: ubifs_add_orphan: Fix a memory leak bug (bsc#1182456).
- ubifs: ubifs_jnl_write_inode: Fix a memory leak bug (bsc#1182455). 
- ubifs: wbuf: Do not leak kernel memory to flash (bsc#1182458).
- Update config files: activate CONFIG_CSD_LOCK_WAIT_DEBUG for x86 (bsc#1180846).
- Update config files: Set ledtrig-default-on as builtin (bsc#1182128)
- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).
- USB: dwc2: Fix endpoint direction check in ep_from_windex (git-fixes).
- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).
- USB: dwc3: fix clock issue during resume in OTG mode (git-fixes).
- USB: gadget: legacy: fix an error code in eth_bind() (git-fixes).
- USB: gadget: u_audio: Free requests only after callback (git-fixes).
- USB: mUSB: Fix runtime PM race in musb_queue_resume_work (git-fixes).
- USB: quirks: add quirk to start video capture on ELMO L-12F document camera reliable (git-fixes).
- USB: quirks: sort quirk entries (git-fixes).
- USB: renesas_usbhs: Clear pipe running flag in USBhs_pkt_pop() (git-fixes).
- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).
- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).
- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).
- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).
- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).
- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).
- USB: usblp: do not call usb_set_interface if there's a single alt (git-fixes).
- veth: Adjust hard_start offset on redirect XDP frames (git-fixes).
- vfs: Convert squashfs to use the new mount API (git-fixes bsc#1182265).
- virtio_net: Fix error code in probe() (git-fixes).
- virtio_net: Fix recursive call to cpus_read_lock() (git-fixes).
- virtio_net: Keep vnet header zeroed if XDP is loaded for small buffer (git-fixes).
- virt: vbox: Do not use wait_event_interruptible when called from kernel context (git-fixes).
- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).
- vxlan: fix memleak of fdb (git-fixes).
- wext: fix NULL-ptr-dereference with cfg80211's lack of commit() (git-fixes).
- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).
- x86/alternatives: Sync bp_patching update for avoiding NULL pointer exception (bsc#1152489).
- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1152489).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181259, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181259 jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181259, jsc#ECO-3191).
- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).
- xen/netback: fix spurious event detection for common event case (bsc#1182175).
- xfs: ensure inobt record walks always make forward progress (git-fixes bsc#1182272).
- xfs: fix an ABBA deadlock in xfs_rename (git-fixes bsc#1182558).
- xfs: fix parent pointer scrubber bailing out on unallocated inodes (git-fixes bsc#1182276).
- xfs: fix the forward progress assertion in xfs_iwalk_run_callbacks (git-fixes bsc#1182430).
- xfs: fix the minrecs logic when dealing with inode root child blocks (git-fixes bsc#1182273).
- xfs: ratelimit xfs_discard_page messages (bsc#1182283).
- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).
- xfs: return corresponding errcode if xfs_initialize_perag() fail (git-fixes bsc#1182275).
- xfs: scrub should mark a directory corrupt if any entries cannot be iget'd (git-fixes bsc#1182278).
- xfs: strengthen rmap record flags checking (git-fixes bsc#1182271).
- xhci: fix bounce buffer usage for non-sg list case (git-fixes).

The kernel-default-base packaging was changed:

- Added squashfs for kiwi installiso support (bsc#1182341)
- Added fuse (bsc#1182507)
- Added modules which got lost when migrating away from supported.conf (bsc#1182110):
  * am53c974 had a typo
  * cls_bpf, iscsi_ibft, libahci, libata, openvswitch, sch_ingress
- Also added vport-* modules for Open vSwitch
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-09"/>
	<updated date="2021-03-09"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1065600">SUSE bug 1065600</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1065729">SUSE bug 1065729</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1078720">SUSE bug 1078720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1081134">SUSE bug 1081134</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1084610">SUSE bug 1084610</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1132477">SUSE bug 1132477</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1151927">SUSE bug 1151927</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152472">SUSE bug 1152472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1152489">SUSE bug 1152489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1154353">SUSE bug 1154353</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1155518">SUSE bug 1155518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1156395">SUSE bug 1156395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1163776">SUSE bug 1163776</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1169514">SUSE bug 1169514</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1170442">SUSE bug 1170442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176248">SUSE bug 1176248</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176855">SUSE bug 1176855</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177109">SUSE bug 1177109</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177326">SUSE bug 1177326</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177440">SUSE bug 1177440</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177529">SUSE bug 1177529</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178142">SUSE bug 1178142</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178995">SUSE bug 1178995</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179082">SUSE bug 1179082</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179137">SUSE bug 1179137</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179243">SUSE bug 1179243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179428">SUSE bug 1179428</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179660">SUSE bug 1179660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1179929">SUSE bug 1179929</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180058">SUSE bug 1180058</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180846">SUSE bug 1180846</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180964">SUSE bug 1180964</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1180989">SUSE bug 1180989</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181133">SUSE bug 1181133</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181259">SUSE bug 1181259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181544">SUSE bug 1181544</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181574">SUSE bug 1181574</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181637">SUSE bug 1181637</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181655">SUSE bug 1181655</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181671">SUSE bug 1181671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181674">SUSE bug 1181674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181710">SUSE bug 1181710</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181720">SUSE bug 1181720</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181735">SUSE bug 1181735</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181736">SUSE bug 1181736</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181738">SUSE bug 1181738</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181747">SUSE bug 1181747</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181753">SUSE bug 1181753</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181818">SUSE bug 1181818</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181843">SUSE bug 1181843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181854">SUSE bug 1181854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181896">SUSE bug 1181896</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181958">SUSE bug 1181958</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181960">SUSE bug 1181960</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1181985">SUSE bug 1181985</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182047">SUSE bug 1182047</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182110">SUSE bug 1182110</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182118">SUSE bug 1182118</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182128">SUSE bug 1182128</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182140">SUSE bug 1182140</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182171">SUSE bug 1182171</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182175">SUSE bug 1182175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182259">SUSE bug 1182259</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182265">SUSE bug 1182265</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182266">SUSE bug 1182266</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182267">SUSE bug 1182267</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182268">SUSE bug 1182268</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182271">SUSE bug 1182271</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182272">SUSE bug 1182272</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182273">SUSE bug 1182273</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182275">SUSE bug 1182275</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182276">SUSE bug 1182276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182278">SUSE bug 1182278</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182283">SUSE bug 1182283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182341">SUSE bug 1182341</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182374">SUSE bug 1182374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182380">SUSE bug 1182380</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182381">SUSE bug 1182381</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182406">SUSE bug 1182406</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182430">SUSE bug 1182430</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182439">SUSE bug 1182439</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182441">SUSE bug 1182441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182442">SUSE bug 1182442</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182443">SUSE bug 1182443</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182444">SUSE bug 1182444</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182445">SUSE bug 1182445</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182446">SUSE bug 1182446</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182447">SUSE bug 1182447</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182449">SUSE bug 1182449</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182454">SUSE bug 1182454</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182455">SUSE bug 1182455</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182456">SUSE bug 1182456</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182457">SUSE bug 1182457</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182458">SUSE bug 1182458</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182459">SUSE bug 1182459</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182460">SUSE bug 1182460</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182461">SUSE bug 1182461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182462">SUSE bug 1182462</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182463">SUSE bug 1182463</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182464">SUSE bug 1182464</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182465">SUSE bug 1182465</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182466">SUSE bug 1182466</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182485">SUSE bug 1182485</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182489">SUSE bug 1182489</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182490">SUSE bug 1182490</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182507">SUSE bug 1182507</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182547">SUSE bug 1182547</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182558">SUSE bug 1182558</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182560">SUSE bug 1182560</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182561">SUSE bug 1182561</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182571">SUSE bug 1182571</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182599">SUSE bug 1182599</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182602">SUSE bug 1182602</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182626">SUSE bug 1182626</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182650">SUSE bug 1182650</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182672">SUSE bug 1182672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182676">SUSE bug 1182676</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182683">SUSE bug 1182683</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182684">SUSE bug 1182684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182686">SUSE bug 1182686</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182770">SUSE bug 1182770</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182798">SUSE bug 1182798</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182800">SUSE bug 1182800</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182801">SUSE bug 1182801</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182854">SUSE bug 1182854</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182856">SUSE bug 1182856</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-12362/">CVE-2020-12362</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12363/">CVE-2020-12363</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12364/">CVE-2020-12364</cve>
	<cve impact="moderate" cvss3="1.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-12373/">CVE-2020-12373</cve>
	<cve impact="important" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2020-29368/">CVE-2020-29368</cve>
	<cve impact="moderate" cvss3="6.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2020-29374/">CVE-2020-29374</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-26930/">CVE-2021-26930</cve>
	<cve impact="moderate" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26931/">CVE-2021-26931</cve>
	<cve impact="moderate" cvss3="5.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-26932/">CVE-2021-26932</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509407" comment="kernel-default-extra-5.3.18-24.52.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509408" comment="kernel-preempt-extra-5.3.18-24.52.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:111999" version="1" class="patch">
	<metadata>
		<title>Security update for evolution-data-server (Moderate)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Desktop 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server 15 SP2</platform>
			<platform>SUSE Linux Enterprise Server for SAP Applications 15 SP2</platform>
			<platform>SUSE Linux Enterprise Workstation Extension 15 SP2</platform>
		</affected>
		<reference ref_id="1173910" ref_url="https://bugzilla.suse.com/1173910" source="BUGZILLA"/>
		<reference ref_id="1174712" ref_url="https://bugzilla.suse.com/1174712" source="BUGZILLA"/>
		<reference ref_id="1182882" ref_url="https://bugzilla.suse.com/1182882" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-14928" ref_url="https://www.suse.com/security/cve/CVE-2020-14928/" source="CVE"/>
		<reference ref_id="CVE-2020-16117" ref_url="https://www.suse.com/security/cve/CVE-2020-16117/" source="CVE"/>
		<reference ref_id="SUSE-SU-2021:0949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-March/008554.html" source="SUSE-SU"/>
		<description>
This update for evolution-data-server fixes the following issues:

- CVE-2020-16117: Fix crash on malformed server response with minimal capabilities (bsc#1174712).
- CVE-2020-14928: Response injection via STARTTLS in SMTP and POP3 (bsc#1173910).
- Fix buffer overrun when parsing base64 data (bsc#1182882).

This update for evolution-ews fixes the following issue:

- Fix buffer overrun when parsing base64 data (bsc#1182882).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-03-24"/>
	<updated date="2021-03-24"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1173910">SUSE bug 1173910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174712">SUSE bug 1174712</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182882">SUSE bug 1182882</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-14928/">CVE-2020-14928</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2020-16117/">CVE-2020-16117</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sle-we:15:sp2</cpe>
		<cpe>cpe:/o:suse:sled:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles:15:sp2</cpe>
		<cpe>cpe:/o:suse:sles_sap:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009669875" comment="SUSE Linux Enterprise Desktop 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009303870" comment="SUSE Linux Enterprise Server 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659637" comment="SUSE Linux Enterprise Server for SAP Applications 15 SP2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009282578" comment="SUSE Linux Enterprise Workstation Extension 15 SP2 is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009509409" comment="evolution-data-server-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509410" comment="evolution-data-server-devel-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509411" comment="evolution-data-server-lang-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509412" comment="evolution-ews-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509413" comment="evolution-ews-lang-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509414" comment="libcamel-1_2-62-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509415" comment="libebackend-1_2-10-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509416" comment="libebook-1_2-20-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509417" comment="libebook-contacts-1_2-3-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509418" comment="libecal-2_0-1-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509419" comment="libedata-book-1_2-26-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509420" comment="libedata-cal-2_0-1-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509421" comment="libedataserver-1_2-24-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509422" comment="libedataserverui-1_2-2-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509423" comment="typelib-1_0-Camel-1_2-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509424" comment="typelib-1_0-EBook-1_2-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509425" comment="typelib-1_0-EBookContacts-1_2-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509426" comment="typelib-1_0-ECal-2_0-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509427" comment="typelib-1_0-EDataServer-1_2-3.34.4-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009509428" comment="typelib-1_0-EDataServerUI-1_2-3.34.4-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112000" version="1" class="patch">
	<metadata>
		<title>Security changes in Kubernetes, etcd, and skuba; Bugfix in cri-o package and make helm3 the default helm (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1172270" ref_url="https://bugzilla.suse.com/1172270" source="BUGZILLA"/>
		<reference ref_id="1173055" ref_url="https://bugzilla.suse.com/1173055" source="BUGZILLA"/>
		<reference ref_id="1173165" ref_url="https://bugzilla.suse.com/1173165" source="BUGZILLA"/>
		<reference ref_id="1174219" ref_url="https://bugzilla.suse.com/1174219" source="BUGZILLA"/>
		<reference ref_id="1174951" ref_url="https://bugzilla.suse.com/1174951" source="BUGZILLA"/>
		<reference ref_id="1175352" ref_url="https://bugzilla.suse.com/1175352" source="BUGZILLA"/>
		<reference ref_id="1176225" ref_url="https://bugzilla.suse.com/1176225" source="BUGZILLA"/>
		<reference ref_id="1176578" ref_url="https://bugzilla.suse.com/1176578" source="BUGZILLA"/>
		<reference ref_id="1176903" ref_url="https://bugzilla.suse.com/1176903" source="BUGZILLA"/>
		<reference ref_id="1176904" ref_url="https://bugzilla.suse.com/1176904" source="BUGZILLA"/>
		<reference ref_id="1177361" ref_url="https://bugzilla.suse.com/1177361" source="BUGZILLA"/>
		<reference ref_id="1177362" ref_url="https://bugzilla.suse.com/1177362" source="BUGZILLA"/>
		<reference ref_id="1177660" ref_url="https://bugzilla.suse.com/1177660" source="BUGZILLA"/>
		<reference ref_id="1177661" ref_url="https://bugzilla.suse.com/1177661" source="BUGZILLA"/>
		<reference ref_id="1178785" ref_url="https://bugzilla.suse.com/1178785" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-15106" ref_url="https://www.suse.com/security/cve/CVE-2020-15106/" source="CVE"/>
		<reference ref_id="CVE-2020-8029" ref_url="https://www.suse.com/security/cve/CVE-2020-8029/" source="CVE"/>
		<reference ref_id="CVE-2020-8564" ref_url="https://www.suse.com/security/cve/CVE-2020-8564/" source="CVE"/>
		<reference ref_id="CVE-2020-8565" ref_url="https://www.suse.com/security/cve/CVE-2020-8565/" source="CVE"/>
		<description>

== Kubernetes &amp; etcd (Security fixes)

This fix involves an upgrade of Kubernetes and some add-ons. See https://documentation.suse.com/suse-caasp/4.5/html/caasp-admin/_cluster_updates.html#_updating_kubernetes_components for the upgrade procedure.
   
== Skuba (Security fixes) &amp; helm3 becomes the default helm

In order to update skuba and helm or helm 3, you need to update the management workstation. See detailed instructions at https://documentation.suse.com/suse-caasp/4.5/html/caasp-admin/_cluster_updates.html#_update_management_workstation
  		</description>
<advisory from="security@suse.de">
	<issued date="2020-12-11"/>
	<updated date="2020-12-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1172270">SUSE bug 1172270</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173055">SUSE bug 1173055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1173165">SUSE bug 1173165</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174219">SUSE bug 1174219</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1174951">SUSE bug 1174951</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1175352">SUSE bug 1175352</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176225">SUSE bug 1176225</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176578">SUSE bug 1176578</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176903">SUSE bug 1176903</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1176904">SUSE bug 1176904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177361">SUSE bug 1177361</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177362">SUSE bug 1177362</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177660">SUSE bug 1177660</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177661">SUSE bug 1177661</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178785">SUSE bug 1178785</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-15106/">CVE-2020-15106</cve>
	<cve impact="moderate" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8029/">CVE-2020-8029</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8564/">CVE-2020-8564</cve>
	<cve impact="moderate" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2020-8565/">CVE-2020-8565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009601238" comment="caasp-release-4.5.2-1.8.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601239" comment="cri-o-1.18-1.18.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601240" comment="cri-o-1.18-kubeadm-criconfig-1.18.4-4.3.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601241" comment="etcdctl-3.4.13-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601242" comment="helm2-2.16.12-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601243" comment="helm3-3.3.3-3.8.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601244" comment="kubernetes-1.18-kubeadm-1.18.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601245" comment="kubernetes-1.18-kubelet-1.18.10-4.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601246" comment="patterns-caasp-Management-4.5-3.3.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601247" comment="skuba-2.1.11-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601248" comment="skuba-update-2.1.11-3.10.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601249" comment="velero-1.4.2-3.3.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112001" version="1" class="patch">
	<metadata>
		<title>Includes a kubernetes update to 1.18.20 including a backport for CVE-2021-25741 (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1182185" ref_url="https://bugzilla.suse.com/1182185" source="BUGZILLA"/>
		<reference ref_id="1189416" ref_url="https://bugzilla.suse.com/1189416" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-25741" ref_url="https://www.suse.com/security/cve/CVE-2021-25741/" source="CVE"/>
		<reference ref_id="CVE-2021-3121" ref_url="https://www.suse.com/security/cve/CVE-2021-3121/" source="CVE"/>
		<description>
 == Kubernetes
bsc#1189416 kubernetes issue is a backport of the upstream security fix (CVE-2021-25741): https://github.com/kubernetes/kubernetes/pull/104253 		</description>
<advisory from="security@suse.de">
	<issued date="2021-09-16"/>
	<updated date="2021-09-16"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1182185">SUSE bug 1182185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1189416">SUSE bug 1189416</bugzilla>
	<cve impact="important" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-25741/">CVE-2021-25741</cve>
	<cve impact="important" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2021-3121/">CVE-2021-3121</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009632895" comment="caasp-release-4.5.5-1.19.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632896" comment="kubernetes-1.18-kubeadm-1.18.20-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632897" comment="kubernetes-1.18-kubelet-1.18.20-4.11.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632898" comment="release-notes-caasp-4.5.20210907-3.22.3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632899" comment="skuba-2.1.15-3.15.13.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009632900" comment="skuba-update-2.1.15-3.15.13.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112002" version="1" class="patch">
	<metadata>
		<title>Include cilium addon security fixes and a new skuba release with updated add-ons (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1173559" ref_url="https://bugzilla.suse.com/1173559" source="BUGZILLA"/>
		<reference ref_id="1177348" ref_url="https://bugzilla.suse.com/1177348" source="BUGZILLA"/>
		<reference ref_id="1178931" ref_url="https://bugzilla.suse.com/1178931" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-12603" ref_url="https://www.suse.com/security/cve/CVE-2020-12603/" source="CVE"/>
		<reference ref_id="CVE-2020-12604" ref_url="https://www.suse.com/security/cve/CVE-2020-12604/" source="CVE"/>
		<reference ref_id="CVE-2020-12605" ref_url="https://www.suse.com/security/cve/CVE-2020-12605/" source="CVE"/>
		<reference ref_id="CVE-2020-35471" ref_url="https://www.suse.com/security/cve/CVE-2020-35471/" source="CVE"/>
		<reference ref_id="CVE-2020-8663" ref_url="https://www.suse.com/security/cve/CVE-2020-8663/" source="CVE"/>
		<description>
 == Cilium (Security fixes)
This fix involves an upgrade of cilium add-on. See https://documentation.suse.com/suse-caasp/4.5/html/caasp-admin/_cluster_updates.html#_updating_kubernetes_components for the upgrade procedure.
== Skuba
In order to update skuba you need to update the management workstation. See detailed instructions at https://documentation.suse.com/suse-caasp/4.5/html/caasp-admin/_cluster_updates.html#_update_management_workstation		</description>
<advisory from="security@suse.de">
	<issued date="2021-02-08"/>
	<updated date="2021-02-08"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1173559">SUSE bug 1173559</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1177348">SUSE bug 1177348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1178931">SUSE bug 1178931</bugzilla>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12603/">CVE-2020-12603</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12604/">CVE-2020-12604</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-12605/">CVE-2020-12605</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-35471/">CVE-2020-35471</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2020-8663/">CVE-2020-8663</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009601250" comment="caasp-release-4.5.3-1.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601251" comment="skuba-2.1.13-3.15.7.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009601252" comment="skuba-update-2.1.13-3.15.7.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112003" version="1" class="patch">
	<metadata>
		<title>Security update for xorg-x11-server (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1190487" ref_url="https://bugzilla.suse.com/1190487" source="BUGZILLA"/>
		<reference ref_id="1190488" ref_url="https://bugzilla.suse.com/1190488" source="BUGZILLA"/>
		<reference ref_id="1190489" ref_url="https://bugzilla.suse.com/1190489" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4009" ref_url="https://www.suse.com/security/cve/CVE-2021-4009/" source="CVE"/>
		<reference ref_id="CVE-2021-4010" ref_url="https://www.suse.com/security/cve/CVE-2021-4010/" source="CVE"/>
		<reference ref_id="CVE-2021-4011" ref_url="https://www.suse.com/security/cve/CVE-2021-4011/" source="CVE"/>
		<description>
This update for xorg-x11-server fixes the following issues:

- CVE-2021-4009: The handler for the CreatePointerBarrier request of the XFixes 
  extension does not properly validate the request length leading to out of 
  bounds memory write. (bsc#1190487)
- CVE-2021-4010: The handler for the Suspend request of the Screen Saver extension
  does not properly validate the request length leading to out of
  bounds memory write. (bsc#1190488)
- CVE-2021-4011: The handlers for the RecordCreateContext and RecordRegisterClients
  requests of the Record extension do not properly validate the request
  length leading to out of bounds memory write. (bsc#1190489)
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-21"/>
	<updated date="2021-12-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1190487">SUSE bug 1190487</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190488">SUSE bug 1190488</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190489">SUSE bug 1190489</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4009/">CVE-2021-4009</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4010/">CVE-2021-4010</cve>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-4011/">CVE-2021-4011</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661010" comment="xorg-x11-server-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661011" comment="xorg-x11-server-extra-1.20.3-22.5.42.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661012" comment="xorg-x11-server-sdk-1.20.3-22.5.42.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112004" version="1" class="patch">
	<metadata>
		<title>Security update for p11-kit (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1180064" ref_url="https://bugzilla.suse.com/1180064" source="BUGZILLA"/>
		<reference ref_id="1187993" ref_url="https://bugzilla.suse.com/1187993" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-29361" ref_url="https://www.suse.com/security/cve/CVE-2020-29361/" source="CVE"/>
		<description>
This update for p11-kit fixes the following issues:

- CVE-2020-29361: Fixed multiple integer overflows in rpc code (bsc#1180064)
- Add support for CKA_NSS_{SERVER,EMAIL}_DISTRUST_AFTER (bsc#1187993).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-22"/>
	<updated date="2021-12-22"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1180064">SUSE bug 1180064</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1187993">SUSE bug 1187993</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-29361/">CVE-2020-29361</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009659809" comment="libp11-kit0-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659794" comment="libp11-kit0-32bit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659810" comment="p11-kit-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659811" comment="p11-kit-devel-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659812" comment="p11-kit-nss-trust-0.23.2-4.13.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659813" comment="p11-kit-tools-0.23.2-4.13.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112005" version="1" class="patch">
	<metadata>
		<title>Security update for go1.16 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1182345" ref_url="https://bugzilla.suse.com/1182345" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
This update for go1.16 fixes the following issues:

Updated to upstream version 1.16.12 to include security fixes to the compiler,
syscall, runtime, the net/http, net/http/httptest, and time packages (bsc#1182345)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1182345">SUSE bug 1182345</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661008" comment="go1.16-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661009" comment="go1.16-doc-1.16.12-1.37.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659806" comment="go1.16-race-1.16.12-1.37.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112006" version="1" class="patch">
	<metadata>
		<title>Security update for go1.17 (Moderate)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1190649" ref_url="https://bugzilla.suse.com/1190649" source="BUGZILLA"/>
		<reference ref_id="1193597" ref_url="https://bugzilla.suse.com/1193597" source="BUGZILLA"/>
		<reference ref_id="1193598" ref_url="https://bugzilla.suse.com/1193598" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-44716" ref_url="https://www.suse.com/security/cve/CVE-2021-44716/" source="CVE"/>
		<reference ref_id="CVE-2021-44717" ref_url="https://www.suse.com/security/cve/CVE-2021-44717/" source="CVE"/>
		<description>
This update for go1.17 fixes the following issues:

Updated to upstream version 1.17.5 to include fixes to the compiler, linker,
syscall, runtime, the net/http, go/types, and time packages (bsc#1190649)

- CVE-2021-44717: syscall: don't close fd 0 on ForkExec error (bsc#1193598).
- CVE-2021-44716: net/http: limit growth of header canonicalization cache (bsc#1193597).
		</description>
<advisory from="security@suse.de">
	<issued date="2021-12-23"/>
	<updated date="2021-12-23"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1190649">SUSE bug 1190649</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193597">SUSE bug 1193597</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193598">SUSE bug 1193598</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-44716/">CVE-2021-44716</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-44717/">CVE-2021-44717</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009661006" comment="go1.17-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009661007" comment="go1.17-doc-1.17.5-1.14.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009659803" comment="go1.17-race-1.17.5-1.14.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112007" version="1" class="patch">
	<metadata>
		<title>Security update for java-1_8_0-ibm (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1185055" ref_url="https://bugzilla.suse.com/1185055" source="BUGZILLA"/>
		<reference ref_id="1188564" ref_url="https://bugzilla.suse.com/1188564" source="BUGZILLA"/>
		<reference ref_id="1188565" ref_url="https://bugzilla.suse.com/1188565" source="BUGZILLA"/>
		<reference ref_id="1191902" ref_url="https://bugzilla.suse.com/1191902" source="BUGZILLA"/>
		<reference ref_id="1191904" ref_url="https://bugzilla.suse.com/1191904" source="BUGZILLA"/>
		<reference ref_id="1191905" ref_url="https://bugzilla.suse.com/1191905" source="BUGZILLA"/>
		<reference ref_id="1191909" ref_url="https://bugzilla.suse.com/1191909" source="BUGZILLA"/>
		<reference ref_id="1191910" ref_url="https://bugzilla.suse.com/1191910" source="BUGZILLA"/>
		<reference ref_id="1191911" ref_url="https://bugzilla.suse.com/1191911" source="BUGZILLA"/>
		<reference ref_id="1191913" ref_url="https://bugzilla.suse.com/1191913" source="BUGZILLA"/>
		<reference ref_id="1191914" ref_url="https://bugzilla.suse.com/1191914" source="BUGZILLA"/>
		<reference ref_id="1192052" ref_url="https://bugzilla.suse.com/1192052" source="BUGZILLA"/>
		<reference ref_id="1194198" ref_url="https://bugzilla.suse.com/1194198" source="BUGZILLA"/>
		<reference ref_id="1194232" ref_url="https://bugzilla.suse.com/1194232" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-2163" ref_url="https://www.suse.com/security/cve/CVE-2021-2163/" source="CVE"/>
		<reference ref_id="CVE-2021-2341" ref_url="https://www.suse.com/security/cve/CVE-2021-2341/" source="CVE"/>
		<reference ref_id="CVE-2021-2369" ref_url="https://www.suse.com/security/cve/CVE-2021-2369/" source="CVE"/>
		<reference ref_id="CVE-2021-35556" ref_url="https://www.suse.com/security/cve/CVE-2021-35556/" source="CVE"/>
		<reference ref_id="CVE-2021-35559" ref_url="https://www.suse.com/security/cve/CVE-2021-35559/" source="CVE"/>
		<reference ref_id="CVE-2021-35560" ref_url="https://www.suse.com/security/cve/CVE-2021-35560/" source="CVE"/>
		<reference ref_id="CVE-2021-35564" ref_url="https://www.suse.com/security/cve/CVE-2021-35564/" source="CVE"/>
		<reference ref_id="CVE-2021-35565" ref_url="https://www.suse.com/security/cve/CVE-2021-35565/" source="CVE"/>
		<reference ref_id="CVE-2021-35578" ref_url="https://www.suse.com/security/cve/CVE-2021-35578/" source="CVE"/>
		<reference ref_id="CVE-2021-35586" ref_url="https://www.suse.com/security/cve/CVE-2021-35586/" source="CVE"/>
		<reference ref_id="CVE-2021-35588" ref_url="https://www.suse.com/security/cve/CVE-2021-35588/" source="CVE"/>
		<reference ref_id="CVE-2021-41035" ref_url="https://www.suse.com/security/cve/CVE-2021-41035/" source="CVE"/>
		<description>
This update for java-1_8_0-ibm fixes the following issues:

- Update to Java 8.0 Service Refresh 7 Fix Pack 0
- CVE-2021-41035: before version 0.29.0, the openj9 JVM does not throw IllegalAccessError for MethodHandles that invoke inaccessible interface methods. (bsc#1194198, bsc#1192052)
- CVE-2021-35586: Excessive memory allocation in BMPImageReader. (bsc#1191914)
- CVE-2021-35564: Certificates with end dates too far in the future can corrupt keystore. (bsc#1191913)
- CVE-2021-35559: Excessive memory allocation in RTFReader. (bsc#1191911)
- CVE-2021-35556: Excessive memory allocation in RTFParser. (bsc#1191910)
- CVE-2021-35565: Loop in HttpsServer triggered during TLS session close. (bsc#1191909) 
- CVE-2021-35588: Incomplete validation of inner class references in ClassFileParser. (bsc#1191905)
- CVE-2021-2341: Fixed a flaw inside the FtpClient. (bsc#1188564)
- CVE-2021-2369: JAR file handling problem containing multiple MANIFEST.MF files. (bsc#1188565)
- CVE-2021-2163: Incomplete enforcement of JAR signing disabled algorithms. (bsc#1185055)
- CVE-2021-35560: Fixed a vulnerability in the component Deployment. (bsc#1191902)
- CVE-2021-35578: Fixed unexpected exception raised during TLS handshake. (bsc#1191904)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-18"/>
	<updated date="2022-01-18"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1185055">SUSE bug 1185055</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188564">SUSE bug 1188564</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188565">SUSE bug 1188565</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191902">SUSE bug 1191902</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191904">SUSE bug 1191904</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191905">SUSE bug 1191905</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191909">SUSE bug 1191909</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191910">SUSE bug 1191910</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191911">SUSE bug 1191911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191913">SUSE bug 1191913</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191914">SUSE bug 1191914</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192052">SUSE bug 1192052</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194198">SUSE bug 1194198</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194232">SUSE bug 1194232</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-2163/">CVE-2021-2163</cve>
	<cve impact="moderate" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-2341/">CVE-2021-2341</cve>
	<cve impact="moderate" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-2369/">CVE-2021-2369</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35556/">CVE-2021-35556</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2021-35559/">CVE-2021-35559</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-35560/">CVE-2021-35560</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-35564/">CVE-2021-35564</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35565/">CVE-2021-35565</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35578/">CVE-2021-35578</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35586/">CVE-2021-35586</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-35588/">CVE-2021-35588</cve>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-41035/">CVE-2021-41035</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662468" comment="java-1_8_0-ibm-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662460" comment="java-1_8_0-ibm-alsa-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662469" comment="java-1_8_0-ibm-devel-1.8.0_sr7.0-3.53.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662462" comment="java-1_8_0-ibm-plugin-1.8.0_sr7.0-3.53.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112008" version="1" class="patch">
	<metadata>
		<title>Security update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1193930" ref_url="https://bugzilla.suse.com/1193930" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-43565" ref_url="https://www.suse.com/security/cve/CVE-2021-43565/" source="CVE"/>
		<description>
This update for kubevirt, virt-api-container, virt-controller-container, virt-handler-container, virt-launcher-container, virt-operator-container fixes the following issues:

- CVE-2021-43565: Fixes a vulnerability in the golang.org/x/crypto/ssh package which allowed unauthenticated clients to cause a panic in SSH servers. (bsc#1193930)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-19"/>
	<updated date="2022-01-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1193930">SUSE bug 1193930</bugzilla>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-43565/">CVE-2021-43565</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662451" comment="kubevirt-manifests-0.40.0-5.17.2 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662452" comment="kubevirt-virtctl-0.40.0-5.17.2 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112009" version="1" class="patch">
	<metadata>
		<title>Security update for libvirt (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1183411" ref_url="https://bugzilla.suse.com/1183411" source="BUGZILLA"/>
		<reference ref_id="1191668" ref_url="https://bugzilla.suse.com/1191668" source="BUGZILLA"/>
		<reference ref_id="1192017" ref_url="https://bugzilla.suse.com/1192017" source="BUGZILLA"/>
		<reference ref_id="1192876" ref_url="https://bugzilla.suse.com/1192876" source="BUGZILLA"/>
		<reference ref_id="1193981" ref_url="https://bugzilla.suse.com/1193981" source="BUGZILLA"/>
		<reference ref_id="1194041" ref_url="https://bugzilla.suse.com/1194041" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3975" ref_url="https://www.suse.com/security/cve/CVE-2021-3975/" source="CVE"/>
		<reference ref_id="CVE-2021-4147" ref_url="https://www.suse.com/security/cve/CVE-2021-4147/" source="CVE"/>
		<description>
This update for libvirt fixes the following issues:

- CVE-2021-4147: libxl: Fix libvirtd deadlocks and segfaults. (bsc#1194041)
- CVE-2021-3975: Add missing lock in qemuProcessHandleMonitorEOF. (bsc#1192876)
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1183411">SUSE bug 1183411</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1191668">SUSE bug 1191668</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192017">SUSE bug 1192017</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1192876">SUSE bug 1192876</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193981">SUSE bug 1193981</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1194041">SUSE bug 1194041</bugzilla>
	<cve impact="moderate" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-3975/">CVE-2021-3975</cve>
	<cve impact="important" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4147/">CVE-2021-4147</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662005" comment="libvirt-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662006" comment="libvirt-admin-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662007" comment="libvirt-bash-completion-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662008" comment="libvirt-client-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662009" comment="libvirt-daemon-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662010" comment="libvirt-daemon-config-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662011" comment="libvirt-daemon-config-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662012" comment="libvirt-daemon-driver-interface-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662013" comment="libvirt-daemon-driver-libxl-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662014" comment="libvirt-daemon-driver-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662015" comment="libvirt-daemon-driver-network-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662016" comment="libvirt-daemon-driver-nodedev-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662017" comment="libvirt-daemon-driver-nwfilter-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662018" comment="libvirt-daemon-driver-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662019" comment="libvirt-daemon-driver-secret-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662020" comment="libvirt-daemon-driver-storage-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662021" comment="libvirt-daemon-driver-storage-core-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662022" comment="libvirt-daemon-driver-storage-disk-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662023" comment="libvirt-daemon-driver-storage-iscsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662024" comment="libvirt-daemon-driver-storage-logical-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662025" comment="libvirt-daemon-driver-storage-mpath-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662026" comment="libvirt-daemon-driver-storage-rbd-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662027" comment="libvirt-daemon-driver-storage-scsi-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662028" comment="libvirt-daemon-hooks-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662029" comment="libvirt-daemon-lxc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662030" comment="libvirt-daemon-qemu-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662031" comment="libvirt-daemon-xen-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662032" comment="libvirt-devel-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662033" comment="libvirt-doc-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662034" comment="libvirt-libs-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662035" comment="libvirt-lock-sanlock-6.0.0-13.24.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662036" comment="libvirt-nss-6.0.0-13.24.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112010" version="1" class="patch">
	<metadata>
		<title>Security update for libsndfile (Important)</title>
		<affected family="unix">
			<platform>SUSE CaaS Platform 4.5</platform>
		</affected>
		<reference ref_id="1194006" ref_url="https://bugzilla.suse.com/1194006" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-4156" ref_url="https://www.suse.com/security/cve/CVE-2021-4156/" source="CVE"/>
		<description>
This update for libsndfile fixes the following issues:

- CVE-2021-4156: Fixed heap buffer overflow in flac_buffer_copy that 
could potentially lead to heap exploitation (bsc#1194006).
		</description>
<advisory from="security@suse.de">
	<issued date="2022-01-11"/>
	<updated date="2022-01-11"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1194006">SUSE bug 1194006</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2021-4156/">CVE-2021-4156</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:caasp:4.5</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009302818" comment="SUSE CaaS Platform 4.5 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009662464" comment="libsndfile-devel-1.0.28-5.15.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009662465" comment="libsndfile1-1.0.28-5.15.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112011" version="1" class="patch">
	<metadata>
		<title>Security update for apache2-mod_auth_mellon (Moderate) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1188926" ref_url="https://bugzilla.suse.com/1188926" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-3639" ref_url="https://www.suse.com/security/cve/CVE-2021-3639/" source="CVE"/>
		<description>
This update for apache2-mod_auth_mellon fixes the following issues:

- CVE-2021-3639: Fixed open Redirect vulnerability in logout URLs (bsc#1188926)

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-06"/>
	<updated date="2022-04-06"/>
	<severity>Moderate</severity>
	<bugzilla href="https://bugzilla.suse.com/1188926">SUSE bug 1188926</bugzilla>
	<cve impact="moderate" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2021-3639/">CVE-2021-3639</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009678601" comment="apache2-mod_auth_mellon-0.17.0-150200.5.7.1 is installed"/>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112012" version="1" class="patch">
	<metadata>
		<title>Security update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1177616" ref_url="https://bugzilla.suse.com/1177616" source="BUGZILLA"/>
		<reference ref_id="1182481" ref_url="https://bugzilla.suse.com/1182481" source="BUGZILLA"/>
		<reference ref_id="1197132" ref_url="https://bugzilla.suse.com/1197132" source="BUGZILLA"/>
		<reference ref_id="CVE-2020-25649" ref_url="https://www.suse.com/security/cve/CVE-2020-25649/" source="CVE"/>
		<reference ref_id="CVE-2020-28491" ref_url="https://www.suse.com/security/cve/CVE-2020-28491/" source="CVE"/>
		<reference ref_id="CVE-2020-36518" ref_url="https://www.suse.com/security/cve/CVE-2020-36518/" source="CVE"/>
		<description>
This update for jackson-databind, jackson-dataformats-binary, jackson-annotations, jackson-bom, jackson-core fixes the following issues:

Security issues fixed:

- CVE-2020-36518: Fixed a Java stack overflow exception and denial of service via a large depth of nested objects in jackson-databind. (bsc#1197132)
- CVE-2020-25649: Fixed an insecure entity expansion in jackson-databind which was vulnerable to XML external entity (XXE). (bsc#1177616)
- CVE-2020-28491: Fixed a bug which could cause `java.lang.OutOfMemoryError` exception in jackson-dataformats-binary. (bsc#1182481)

Non security fixes:

jackson-annotations - update from version 2.10.2 to version 2.13.0:

   + Build with source/target levels 8
   + Add 'mvnw' wrapper
   + 'JsonSubType.Type' should accept array of names
   + Jackson version alignment with Gradle 6
   + Add '@JsonIncludeProperties'
   + Add '@JsonTypeInfo(use=DEDUCTION)'
   + Ability to use '@JsonAnyGetter' on fields
   + Add '@JsonKey' annotation
   + Allow repeated calls to 'SimpleObjectIdResolver.bindItem()' for same mapping
   + Add 'namespace' property for '@JsonProperty' (for XML module)
   + Add target 'ElementType.ANNOTATION_TYPE' for '@JsonEnumDefaultValue'
   + 'JsonPattern.Value.pattern' retained as '', never (accidentally) exposed as 'null'
   + Rewrite to use `ant` for building in order to be able to use it in packages that have to be built before maven

jackson-bom - update from version 2.10.2 to version 2.13.0:

   + Configure moditect plugin with '&lt;jvmVersion&gt;11&lt;/jvmVersion&gt;'
   + jackson-bom manages the version of 'junit:junit'
   + Drop 'jackson-datatype-hibernate3' (support for Hibernate 3.x datatypes)
   + Removed 'jakarta' classifier variants of JAXB/JSON-P/JAX-RS modules due to the addition of new Jakarta artifacts
     (Jakarta-JSONP, Jakarta-xmlbind-annotations, Jakarta-rs-providers)
   + Add version for 'jackson-datatype-jakarta-jsonp' module (introduced after 2.12.2)
   + Add (beta) version for 'jackson-dataformat-toml'
   + Jakarta 9 artifact versions are missing from jackson-bom
   + Add default settings for 'gradle-module-metadata-maven-plugin' (gradle metadata)
   + Add default settings for 'build-helper-maven-plugin'
   + Drop 'jackson-module-scala_2.10' entry (not released for Jackson 2.12 or later)
   + Add override for 'version.plugin.bundle' (for 5.1.1) to help build on JDK 15+
   + Add missing version for jackson-datatype-eclipse-collections
    
jackson-core - update from version 2.10.2 to version 2.13.0:

   + Build with source and target levels 8
   + Misleading exception for input source when processing byte buffer with start offset
   + Escape contents of source document snippet for 'JsonLocation._appendSourceDesc()'
   + Add 'StreamWriteException' type to eventually replace 'JsonGenerationException'
   + Replace 'getCurrentLocation()'/'getTokenLocation()' with 'currentLocation()'/'currentTokenLocation()' in 
     'JsonParser'
   + Replace 'JsonGenerator.writeObject()' (and related) with 'writePOJO()'
   + Replace 'getCurrentValue()'/'setCurrentValue()' with 'currentValue()'/'assignCurrentValue()' in 
     'JsonParser'/'JsonGenerator
   + Introduce O(n^1.5) BigDecimal parser implementation
   + ByteQuadsCanonicalizer.addName(String, int, int) has incorrect handling for case of q2 == null
   + UTF32Reader ArrayIndexOutOfBoundsException
   + Improve exception/JsonLocation handling for binary content: don't show content, include byte offset
   + Fix an issue with the TokenFilter unable to ignore properties when deserializing.
   + Optimize array allocation by 'JsonStringEncoder'
   + Add 'mvnw' wrapper
   + (partial) Optimize array allocation by 'JsonStringEncoder'
   + Add back accidentally removed 'JsonStringEncoder' related methods in 'BufferRecyclers' 
     (like 'getJsonStringEncoder()')
   + 'ArrayOutOfBoundException' at 'WriterBasedJsonGenerator.writeString(Reader, int)'
   + Allow 'optional-padding' for 'Base64Variant'
   + More customizable TokenFilter inclusion (using 'Tokenfilter.Inclusion')
   + Publish Gradle Module Metadata
   + Add 'StreamReadCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.isExpectedNumberIntToken()' convenience method
   + Add 'StreamWriteCapability' for further format-based/format-agnostic handling improvements
   + Add 'JsonParser.getNumberValueExact()' to allow precision-retaining buffering
   + Limit initial allocated block size by 'ByteArrayBuilder' to max block size
   + Add 'JacksonException' as parent class of 'JsonProcessingException'
   + Make 'JsonWriteContext.reset()' and 'JsonReadContext.reset()' methods public
   + Deprecate 'JsonParser.getCurrentTokenId()' (use '#currentTokenId()' instead)
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix NPE in 'writeNumber(String)' method of 'UTF8JsonGenerator', 'WriterBasedJsonGenerator'
   + Add a String Array write method in the Streaming API
   + Synchronize variants of 'JsonGenerator#writeNumberField' with 'JsonGenerator#writeNumber'
   + Add JsonGenerator#writeNumber(char[], int, int) method
   + Do not clear aggregated contents of 'TextBuffer' when 'releaseBuffers()' called
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + Optionally allow leading decimal in float tokens
   + Rewrite to use ant for building in order to be able to use it in packages that have to be built before maven
   + Parsing JSON with 'ALLOW_MISSING_VALUE' enabled results in endless stream of 'VALUE_NULL' tokens
   + Handle case when system property access is restricted
   + 'FilteringGeneratorDelegate' does not handle 'writeString(Reader, int)'
   + DataFormatMatcher#getMatchedFormatName throws NPE when no match exists
   + 'JsonParser.getCurrentLocation()' byte/char offset update incorrectly for big payloads 

jackson-databind - update from version 2.10.5.1 to  version 2.13.0:

   + '@JsonValue' with integer for enum does not deserialize correctly
   + 'AnnotatedMethod.getValue()/setValue()' doesn't have useful exception message
   + Add 'DatabindException' as intermediate subtype of 'JsonMappingException'
   + Jackson does not support deserializing new Java 9 unmodifiable collections
   + Allocate TokenBuffer instance via context objects (to
      allow format-specific buffer types)
   + Add mechanism for setting default 'ContextAttributes' for 'ObjectMapper'
   + Add 'DeserializationContext.readTreeAsValue()' methods
      for more convenient conversions for deserializers to use
   + Clean up support of typed 'unmodifiable', 'singleton'
      Maps/Sets/Collections
   + Extend internal bitfield of 'MapperFeature' to be
      'long'
   + Add 'removeMixIn()' method in 'MapperBuilder'
   + Backport 'MapperBuilder' lambda-taking methods:
      'withConfigOverride()', 'withCoercionConfig()',
      'withCoercionConfigDefaults()'
   + configOverrides(boolean.class) silently ignored,
      whereas .configOverride(Boolean.class) works for both
      primitives and boxed boolean values
   + Dont track unknown props in buffer if
      'ignoreAllUnknown' is true
   + Should allow deserialization of java.time types via
      opaque 'JsonToken.VALUE_EMBEDDED_OBJECT'
   + Optimize 'AnnotatedConstructor.call()' case by passing
      explicit null
   + Add AnnotationIntrospector.XmlExtensions interface for
      decoupling javax dependencies
   + Custom SimpleModule not included in list returned by
      ObjectMapper.getRegisteredModuleIds() after registration
   + Use more limiting default visibility settings for JDK
      types (java.*, javax.*)
   + Deep merge for 'JsonNode' using 'ObjectReader.readTree()'
   + IllegalArgumentException: Conflicting setter
      definitions for property with more than 2 setters
   + Serializing java.lang.Thread fails on JDK 11 and above
   + String-based 'Map' key deserializer is not
      deterministic when there is no single arg constructor
   + Add ArrayNode#set(int index, primitive_type value)
   + JsonStreamContext 'currentValue' wrongly references to
      '@JsonTypeInfo' annotated object
   + DOM 'Node' serialization omits the default namespace
      declaration
   + Support 'suppressed' property when deserializing 'Throwable'
   + 'AnnotatedMember.equals()' does not work reliably
   + Add 'MapperFeature.APPLY_DEFAULT_VALUES', initially for Scala module
   + For an absent property Jackson injects 'NullNode'
      instead of 'null' to a JsonNode-typed constructor argument of
      a '@ConstructorProperties'-annotated constructor
   + 'XMLGregorianCalendar' doesn't work with default typing
   + Content 'null' handling not working for root values
   + StdDeserializer rejects blank (all-whitespace) strings
      for ints
   + 'USE_BASE_TYPE_AS_DEFAULT_IMPL' not working with
      'DefaultTypeResolverBuilder'
   + Add PropertyNamingStrategies.UpperSnakeCaseStrategy
      (and UPPER_SNAKE_CASE constant)
   + StackOverflowError when serializing JsonProcessingException
   + Support for BCP 47 'java.util.Locale' serialization/deserialization
   + String property deserializes null as 'null' for
      JsonTypeInfo.As.EXISTING_PROPERTY
   + Can not deserialize json to enum value with
      Object-/Array-valued input, '@JsonCreator'
   + Fix to avoid problem with 'BigDecimalNode', scale of
      'Integer.MIN_VALUE'
   + Extend handling of 'FAIL_ON_NULL_FOR_PRIMITIVES' to cover
      coercion from (Empty) String via 'AsNull'
   + Add 'mvnw' wrapper
   + (regression) Factory method generic type resolution
      does not use Class-bound type parameter
   + Deserialization of 'empty' subtype with DEDUCTION failed
   + Merge findInjectableValues() results in
      AnnotationIntrospectorPair
   + READ_UNKNOWN_ENUM_VALUES_USING_DEFAULT_VALUE doesn't
      work with empty strings
   + 'TypeFactory' cannot convert 'Collection' sub-type
      without type parameters to canonical form and back
    + Fix for [modules-java8#207]: prevent fail on secondary Java 8
      date/time types
   + EXTERNAL_PROPERTY does not work well with '@JsonCreator'
      and 'FAIL_ON_UNKNOWN_PROPERTIES'
   + String property deserializes null as 'null' for
     'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Property ignorals cause 'BeanDeserializer 'to forget
      how to read from arrays (not copying
      '_arrayDelegateDeserializer')
   + UntypedObjectDeserializer' mixes multiple unwrapped
      collections (related to #2733)
   + Two cases of incorrect error reporting about
      DeserializationFeature
   + Bug in polymorphic deserialization with '@JsonCreator',
      '@JsonAnySetter', 'JsonTypeInfo.As.EXTERNAL_PROPERTY'
   + Polymorphic subtype deduction ignores 'defaultImpl'
      attribute
   + MismatchedInputException: Cannot deserialize instance
      of 'com.fasterxml.jackson.databind.node.ObjectNode' out of
      VALUE_NULL token
   + Missing override for 'hasAsKey()' in
      'AnnotationIntrospectorPair'
   + Creator lookup fails with 'InvalidDefinitionException'
      for conflict between single-double/single-Double arg constructor
   + 'MapDeserializer' forcing 'JsonMappingException'
      wrapping even if WRAP_EXCEPTIONS set to false
   + Auto-detection of constructor-based creator method
      skipped if there is an annotated factory-based creator method
      (regression from 2.11)
   + 'ObjectMapper.treeToValue()' no longer invokes
      'JsonDeserializer.getNullValue()'
   + DeserializationProblemHandler is not invoked when
      trying to deserialize String
   + Fix failing 'double' JsonCreators in jackson 2.12.0
   + Conflicting in POJOPropertiesCollector when having
      namingStrategy
   + Breaking API change in 'BasicClassIntrospector' (2.12.0)
   + 'JsonNode.requiredAt()' does NOT fail on some path expressions
   + Exception thrown when 'Collections.synchronizedList()'
      is serialized with type info, deserialized
   + Add option to resolve type from multiple existing
      properties, '@JsonTypeInfo(use=DEDUCTION)'
   + '@JsonIgnoreProperties' does not prevent Exception
      Conflicting getter/setter definitions for property
   + Deserialization Not Working Right with Generic Types and
      Builders
   + Add '@JsonIncludeProperties(propertyNames)' (reverse of
      '@JsonIgnoreProperties')
   + '@JsonAnyGetter' should be allowed on a field
   + Allow handling of single-arg constructor as property
      based by default
   + Allow case insensitive deserialization of String value
      into 'boolean'/'Boolean' (esp for Excel)
   + Allow use of '@JsonFormat(with=JsonFormat.Feature
      .ACCEPT_CASE_INSENSITIVE_PROPERTIES)' on Class
   + Abstract class included as part of known type ids for
      error message   when using JsonSubTypes
   + Distinguish null from empty string for UUID
      deserialization
   + 'ReferenceType' does not expose valid containedType
   + Add 'CoercionConfig[s]' mechanism for configuring
      allowed coercions
   + 'JsonProperty.Access.READ_ONLY' does not work with
      'getter-as-setter' 'Collection's
   + Support 'BigInteger' and 'BigDecimal' creators in
      'StdValueInstantiator'
   + 'JsonProperty.Access.READ_ONLY' fails with collections
      when a property name is specified
   + 'BigDecimal' precision not retained for polymorphic
      deserialization
   + Support use of 'Void' valued properties
      ('MapperFeature.ALLOW_VOID_VALUED_PROPERTIES')
   + Explicitly fail (de)serialization of 'java.time.*'
      types in absence of registered custom (de)serializers
   + Improve description included in by
      'DeserializationContext.handleUnexpectedToken()'
   + Support for JDK 14 record types ('java.lang.Record')
   + 'PropertyNamingStrategy' class initialization depends
      on its subclass, this can lead to class loading deadlock
   + 'FAIL_ON_IGNORED_PROPERTIES' does not throw on
      'READONLY' properties with an explicit name
   + Add Gradle Module Metadata for version alignment with
      Gradle 6
   + Allow 'JsonNode' auto-convert into 'ArrayNode' if
      duplicates found (for XML)
   + Allow values of 'untyped' auto-convert into 'List' if
      duplicates found (for XML)
   + Add 'ValueInstantiator.createContextual(...)
   + Support multiple names in 'JsonSubType.Type'
   + Disabling 'FAIL_ON_INVALID_SUBTYPE' breaks polymorphic
      deserialization of Enums
   + Explicitly fail (de)serialization of 'org.joda.time.*'
      types in absence of registered custom (de)serializers
   + Trailing zeros are stripped when deserializing
      BigDecimal values inside a @JsonUnwrapped property
   + Extract getter/setter/field name mangling from
      'BeanUtil' into pluggable 'AccessorNamingStrategy'
   + Throw 'InvalidFormatException' instead of
      'MismatchedInputException' for ACCEPT_FLOAT_AS_INT coercion
      failures
   + Add '@JsonKey' annotation (similar to '@JsonValue') for
      customizable serialization of Map keys
   + 'MapperFeature.ACCEPT_CASE_INSENSITIVE_ENUMS' should
      work for enum as keys
   + Add support for disabling special handling of 'Creator
      properties' wrt alphabetic property ordering
   + Add 'JsonNode.canConvertToExactIntegral()' to indicate
      whether floating-point/BigDecimal values could be converted to
      integers losslessly
   + Improve static factory method generic type resolution
      logic
   + Allow preventing 'Enum from integer' coercion using new
      'CoercionConfig' system
   + '@JsonValue' not considered when evaluating inclusion
   + Make some java platform modules optional
   + Add support for serializing 'java.sql.Blob'
   + 'AnnotatedCreatorCollector' should avoid processing
      synthetic static (factory) methods
   + Add errorprone static analysis profile to detect bugs at build time
   + Problem with implicit creator name detection for constructor detection
   + Add 'BeanDeserializerBase.isCaseInsensitive()'
   + Refactoring of 'CollectionDeserializer' to solve CSV array handling issues
   + Full 'LICENSE' included in jar for easier access by compliancy tools
   + Fix type resolution for static methods (regression in 2.11.3)
   + '@JsonCreator' on constructor not compatible with '@JsonIdentityInfo', 
     'PropertyGenerator'
   + Add debug improvements about 'ClassUtil.getClassMethods()'
   + Cannot detect creator arguments of mixins for JDK types
   + Add 'JsonFormat.Shape' awareness for UUID serialization ('UUIDSerializer')
   + Json serialization fails or a specific case that
      contains generics and static methods with generic parameters
      (2.11.1 -&gt; 2.11.2 regression)
   + 'ObjectMapper.activateDefaultTypingAsProperty()' is not
      using parameter 'PolymorphicTypeValidator'
   + Problem deserialization 'raw generic' fields
      (like 'Map') in 2.11.2
   + Fix issues with 'MapLikeType.isTrueMapType()',
      'CollectionLikeType.isTrueCollectionType()'
   + Parser/Generator features not set when using
      'ObjectMapper.createParser()', 'createGenerator()'
   + Polymorphic subtypes not registering on copied
      ObjectMapper (2.11.1)
   + Failure to read AnnotatedField value in Jackson 2.11
   + 'TypeFactory.constructType()' does not take
      'TypeBindings' correctly
   + Builder Deserialization with JsonCreator Value vs Array
   + JsonCreator on static method in Enum and Enum used as
      key in map fails randomly
   + 'StdSubtypeResolver' is not thread safe (possibly due
      to copy not being made with 'ObjectMapper.copy()')
   + 'Conflicting setter definitions for property' exception
      for 'Map' subtype during deserialization
   + Fail to deserialize local Records
   + Rearranging of props when property-based generator is
      in use leads to incorrect output
   + Jackson doesn't respect
      'CAN_OVERRIDE_ACCESS_MODIFIERS=false' for deserializer
      properties
   + 'DeserializationFeature.UNWRAP_SINGLE_VALUE_ARRAYS'
      don't support 'Map' type field
   + JsonParser from MismatchedInputException cannot
      getText() for floating-point value
   + i-I case conversion problem in Turkish locale with
      case-insensitive deserialization
   + '@JsonInject' fails on trying to find deserializer even
      if inject-only
   + Polymorphic deserialization should handle
      case-insensitive Type Id property name if
      'MapperFeature.ACCEPT_CASE_INSENSITIVE_PROPERTIES' is enabled
   + TreeTraversingParser and UTF8StreamJsonParser create
      contexts differently
   + Support use of '@JsonAlias' for enum values
   + 'declaringClass' of 'enum-as-POJO' not removed for
      'ObjectMapper' with a naming strategy
   + Fix 'JavaType.isEnumType()' to support sub-classes
   + BeanDeserializerBuilder Protected Factory Method for Extension
   + Support '@JsonSerialize(keyUsing)' and
      '@JsonDeserialize(keyUsing)' on Key class
   + Add 'SerializationFeature.WRITE_SELF_REFERENCES_AS_NULL'
   + 'ObjectMapper.registerSubtypes(NamedType...)' doesn't
      allow registering same POJO for two different type ids
   + 'DeserializationContext.handleMissingInstantiator()'
      throws 'MismatchedInputException' for non-static inner classes
   + Incorrect 'JsonStreamContext' for 'TokenBuffer' and
      'TreeTraversingParser'
   + Add 'AnnotationIntrospector.findRenameByField()' to
      support Kotlin's 'is-getter' naming convention
   + Use '@JsonProperty(index)' for sorting properties on
      serialization
   + Java 8 'Optional' not working with '@JsonUnwrapped' on
      unwrappable type
   + Add 'MapperFeature.BLOCK_UNSAFE_POLYMORPHIC_BASE_TYPES'
      to allow blocking use of unsafe base type for polymorphic
      deserialization
   + 'ObjectMapper.setSerializationInclusion()' is ignored
      for 'JsonAnyGetter'
   + 'ValueInstantiationException' when deserializing using
      a builder and 'UNWRAP_SINGLE_VALUE_ARRAYS'
   + JsonIgnoreProperties(ignoreUnknown = true) does not
      work on field and method level
   + Failure to resolve generic type parameters on
      serialization
   + JsonParser cannot getText() for input stream on
      MismatchedInputException
   + ObjectReader readValue lacks Class&lt;T&gt; argument
   + Change default textual serialization of
      'java.util.Date'/'Calendar' to include colon in timezone
      offset
   + Add 'ObjectMapper.createParser()' and 'createGenerator()' methods
   + Allow serialization of 'Properties' with non-String values
   + Add new factory method for creating custom 'EnumValues'
      to pass to 'EnumDeserializer
   + 'IllegalArgumentException' thrown for mismatched
      subclass deserialization
   + Add convenience methods for creating 'List', 'Map'
      valued 'ObjectReader's (ObjectMapper.readerForListOf())
   + 'SerializerProvider.findContentValueSerializer()' methods
    
jackson-dataformats-binary - update from version 2.10.1 to version 2.13.0:
    
   + (cbor) Should validate UTF-8 multi-byte validity for short decode path too
   + (ion) Deprecate 'CloseSafeUTF8Writer', remove use
   + (smile) Make 'SmileFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Make 'CBORFactory' support 'JsonFactory.Feature.CANONICALIZE_FIELD_NAMES'
   + (cbor) Handle case of BigDecimal with Integer.MIN_VALUE for scale gracefully
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Another uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (smile) Add 'SmileGenerator.Feature.LENIENT_UTF_ENCODING' for lenient
     handling of broken Unicode surrogate pairs on writing
   + (avro) Add 'logicalType' support for some 'java.time' types; add 'AvroJavaTimeModule'
     for native ser/deser
   + Support base64 strings in 'getBinaryValue()' for CBOR and Smile
   + (cbor) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (avro) Generate logicalType switch
   + (smile) 'ArrayIndexOutOfBounds' for truncated UTF-8 name
   + (ion) 'jackson-dataformat-ion' does not handle
      null.struct deserialization correctly
   + 'Ion-java' dep 1.4.0 -&gt; 1.8.0
   + Minor change to Ion module registration names (fully-qualified)
   + (cbor) Uncaught exception in CBORParser._nextChunkedByte2 (by ossfuzzer)
   + (cbor) Uncaught exception in CBORParser._findDecodedFromSymbols() (by ossfuzzer)
   + (smile) Uncaught validation problem wrt Smile 'BigDecimal' type
   + (smile) ArrayIndexOutOfBoundsException for malformed Smile header
   + (cbor) Failed to handle case of alleged String with length of Integer.MAX_VALUE
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads
   + (cbor) CBORParser need to validate zero-length byte[] for BigInteger
   + (smile) Handle invalid chunked-binary-format length gracefully
   + (smile) Allocate byte[] lazily for longer Smile binary data payloads (7-bit encoded)
   + (smile)  ArrayIndexOutOfBoundsException in SmileParser._decodeShortUnicodeValue()
   + (smile) Handle sequence of Smile header markers without recursion
   + (cbor) CBOR loses 'Map' entries with specific 'long' Map key values (32-bit boundary)
   + (ion) Ion Polymorphic deserialization in 2.12 breaks wrt use of Native Type Ids 
     when upgrading from 2.8
   + (cbor) 'ArrayIndexOutOfBoundsException' in 'CBORParser' for invalid UTF-8 String
   + (cbor) Handle invalid CBOR content like '[0x84]' (incomplete array)
   + (ion) Respect 'WRITE_ENUMS_USING_TO_STRING' in 'EnumAsIonSymbolSerializer'
   + (ion) Add support for generating IonSexps
   + (ion) Add support for deserializing IonTimestamps and IonBlobs
   + (ion) Add 'IonObjectMapper.builderForBinaryWriters()' /
      '.builderforTextualWriters()' convenience methods
   + (ion) Enabling pretty-printing fails Ion serialization
   + (ion) Allow disabling native type ids in IonMapper
   + (smile) Small bug in byte-alignment for long field names
      in Smile, symbol table reuse
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (ion) Optimize 'IonParser.getNumberType()' using
      'IonReader.getIntegerSize()'
   + (cbor) Add 'CBORGenerator.Feature.LENIENT_UTF_ENCODING'
      for lenient handling of Unicode surrogate pairs on writing
   + (cbor) Add support for decoding unassigned 'simple
      values' (type 7)
   + Add Gradle Module Metadata
      (https://blog.gradle.org/alignment-with-gradle-module-metadata)
   + (avro) Cache record names to avoid hitting class loader
   + (avro) Avro null deserialization
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Add 'AvroGenerator.canWriteBinaryNatively()' to
      support binary writes, fix 'java.util.UUID' representation
   + (ion) Allow 'IonObjectMapper' with class name annotation
      introspector to deserialize generic subtypes
   + Remove dependencies upon Jackson 1.X and Avro's
      JacksonUtils
   + 'jackson-databind' should not be full dependency for
      (cbor, protobuf, smile) modules
   + 'CBORGenerator.Feature.WRITE_MINIMAL_INTS' does not
      write most compact form for all integers
   + 'AvroGenerator' overrides 'getOutputContext()' properly
   + (ion) Add 'IonFactory.getIonSystem()' accessor
   + (avro) Fix schema evolution involving maps of non-scalar
   + (protobuf) Parsing a protobuf message doesn't properly skip unknown fields
   + (ion) IonObjectMapper close()s the provided IonWriter unnecessarily
   + ion-java dependency 1.4.0 -&gt; 1.5.1  
  
This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-19"/>
	<updated date="2022-04-19"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1177616">SUSE bug 1177616</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1182481">SUSE bug 1182481</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1197132">SUSE bug 1197132</bugzilla>
	<cve impact="moderate" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2020-25649/">CVE-2020-25649</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-28491/">CVE-2020-28491</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2020-36518/">CVE-2020-36518</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009679451" comment="jackson-annotations-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679453" comment="jackson-core-2.13.0-150200.3.6.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009679455" comment="jackson-databind-2.13.0-150200.3.9.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680193" comment="jackson-dataformat-cbor-2.13.0-150200.3.3.3 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112013" version="1" class="patch">
	<metadata>
		<title>Security update for ruby2.5 (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1188160" ref_url="https://bugzilla.suse.com/1188160" source="BUGZILLA"/>
		<reference ref_id="1188161" ref_url="https://bugzilla.suse.com/1188161" source="BUGZILLA"/>
		<reference ref_id="1190375" ref_url="https://bugzilla.suse.com/1190375" source="BUGZILLA"/>
		<reference ref_id="1193035" ref_url="https://bugzilla.suse.com/1193035" source="BUGZILLA"/>
		<reference ref_id="1198441" ref_url="https://bugzilla.suse.com/1198441" source="BUGZILLA"/>
		<reference ref_id="CVE-2021-31799" ref_url="https://www.suse.com/security/cve/CVE-2021-31799/" source="CVE"/>
		<reference ref_id="CVE-2021-31810" ref_url="https://www.suse.com/security/cve/CVE-2021-31810/" source="CVE"/>
		<reference ref_id="CVE-2021-32066" ref_url="https://www.suse.com/security/cve/CVE-2021-32066/" source="CVE"/>
		<reference ref_id="CVE-2021-41817" ref_url="https://www.suse.com/security/cve/CVE-2021-41817/" source="CVE"/>
		<reference ref_id="CVE-2022-28739" ref_url="https://www.suse.com/security/cve/CVE-2022-28739/" source="CVE"/>
		<description>
This update for ruby2.5 fixes the following issues:

- CVE-2022-28739: Fixed a buffer overrun in String-to-Float conversion (bsc#1198441).
- CVE-2021-41817: Fixed a regular expression denial of service in Date Parsing Methods (bsc#1193035).
- CVE-2021-32066: Fixed a StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
- CVE-2021-31810: Fixed a trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
- CVE-2021-31799: Fixed a command injection vulnerability in RDoc (bsc#1190375). 

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1188160">SUSE bug 1188160</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1188161">SUSE bug 1188161</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1190375">SUSE bug 1190375</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1193035">SUSE bug 1193035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198441">SUSE bug 1198441</bugzilla>
	<cve impact="important" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2021-31799/">CVE-2021-31799</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2021-31810/">CVE-2021-31810</cve>
	<cve impact="important" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2021-32066/">CVE-2021-32066</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-41817/">CVE-2021-41817</cve>
	<cve impact="moderate" href="https://www.suse.com/security/cve/CVE-2022-28739/">CVE-2022-28739</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680539" comment="libruby2_5-2_5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680540" comment="ruby2.5-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680541" comment="ruby2.5-devel-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680542" comment="ruby2.5-devel-extra-2.5.9-150000.4.23.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680543" comment="ruby2.5-stdlib-2.5.9-150000.4.23.1 is installed"/>
		</criteria>
	</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:112014" version="1" class="patch">
	<metadata>
		<title>Security update for java-11-openjdk (Important) (in QA)</title>
		<affected family="unix">
			<platform>SUSE Linux Enterprise Server 15 SP2-LTSS</platform>
		</affected>
		<reference ref_id="1198671" ref_url="https://bugzilla.suse.com/1198671" source="BUGZILLA"/>
		<reference ref_id="1198672" ref_url="https://bugzilla.suse.com/1198672" source="BUGZILLA"/>
		<reference ref_id="1198673" ref_url="https://bugzilla.suse.com/1198673" source="BUGZILLA"/>
		<reference ref_id="1198674" ref_url="https://bugzilla.suse.com/1198674" source="BUGZILLA"/>
		<reference ref_id="1198675" ref_url="https://bugzilla.suse.com/1198675" source="BUGZILLA"/>
		<reference ref_id="CVE-2022-21426" ref_url="https://www.suse.com/security/cve/CVE-2022-21426/" source="CVE"/>
		<reference ref_id="CVE-2022-21434" ref_url="https://www.suse.com/security/cve/CVE-2022-21434/" source="CVE"/>
		<reference ref_id="CVE-2022-21443" ref_url="https://www.suse.com/security/cve/CVE-2022-21443/" source="CVE"/>
		<reference ref_id="CVE-2022-21476" ref_url="https://www.suse.com/security/cve/CVE-2022-21476/" source="CVE"/>
		<reference ref_id="CVE-2022-21496" ref_url="https://www.suse.com/security/cve/CVE-2022-21496/" source="CVE"/>
		<description>
This update for java-11-openjdk fixes the following issues:

- CVE-2022-21426: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198672).
- CVE-2022-21434: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198674).
- CVE-2022-21496: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198673).
- CVE-2022-21443: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198675).
- CVE-2022-21476: Fixed Oracle Java SE compromission via unauthenticated attacker with network access via multiple protocols (bsc#1198671).

This patch is currently in QA and not yet available for download.
		</description>
<advisory from="security@suse.de">
	<issued date="2022-04-21"/>
	<updated date="2022-04-21"/>
	<severity>Important</severity>
	<bugzilla href="https://bugzilla.suse.com/1198671">SUSE bug 1198671</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198672">SUSE bug 1198672</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198673">SUSE bug 1198673</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198674">SUSE bug 1198674</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1198675">SUSE bug 1198675</bugzilla>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21426/">CVE-2022-21426</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21434/">CVE-2022-21434</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2022-21443/">CVE-2022-21443</cve>
	<cve impact="important" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2022-21476/">CVE-2022-21476</cve>
	<cve impact="moderate" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2022-21496/">CVE-2022-21496</cve>
	<affected_cpe_list>
		<cpe>cpe:/o:suse:sles-ltss:15:sp2</cpe>
	</affected_cpe_list>
</advisory>
	</metadata>
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009660213" comment="SUSE Linux Enterprise Server 15 SP2-LTSS is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009680544" comment="java-11-openjdk-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680545" comment="java-11-openjdk-demo-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680546" comment="java-11-openjdk-devel-11.0.15.0-150000.3.80.1 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009680547" comment="java-11-openjdk-headless-11.0.15.0-150000.3.80.1 is installed"/>
		</criteria>
	</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481687" version="1" comment="Mesa is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481688" version="1" comment="Mesa-32bit is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481689" version="1" comment="Mesa-KHR-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481690" version="1" comment="Mesa-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481691" version="1" comment="Mesa-dri is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481692" version="1" comment="Mesa-dri-32bit is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481693" version="1" comment="Mesa-dri-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481694" version="1" comment="Mesa-gallium is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481695" version="1" comment="Mesa-gallium-32bit is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481696" version="1" comment="Mesa-libEGL-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481697" version="1" comment="Mesa-libEGL1 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481698" version="1" comment="Mesa-libEGL1-32bit is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481699" version="1" comment="Mesa-libGL-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481700" version="1" comment="Mesa-libGL1 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481701" version="1" comment="Mesa-libGL1-32bit is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481702" version="1" comment="Mesa-libGLESv1_CM-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481703" version="1" comment="Mesa-libGLESv1_CM1 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481704" version="1" comment="Mesa-libGLESv2-2 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481705" version="1" comment="Mesa-libGLESv2-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481706" version="1" comment="Mesa-libGLESv3-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481707" version="1" comment="Mesa-libVulkan-devel is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481708" version="1" comment="Mesa-libd3d is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481709" version="1" comment="Mesa-libd3d-devel is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481710" version="1" comment="Mesa-libglapi-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481711" version="1" comment="Mesa-libglapi0 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481712" version="1" comment="Mesa-libglapi0-32bit is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481713" version="1" comment="Mesa-libva is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481714" version="1" comment="libOSMesa-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481715" version="1" comment="libOSMesa8 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481716" version="1" comment="libgbm-devel is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481717" version="1" comment="libgbm1 is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481718" version="1" comment="libgbm1-32bit is &lt;19.3.4-45.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481719" version="1" comment="libvdpau_r300 is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481720" version="1" comment="libvdpau_r600 is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481721" version="1" comment="libvdpau_radeonsi is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481722" version="1" comment="libvulkan_intel is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481723" version="1" comment="libvulkan_radeon is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481724" version="1" comment="libxatracker-devel is &lt;1.0.0-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481725" version="1" comment="libxatracker2 is &lt;1.0.0-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669875" version="1" comment="sled-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479728" version="1" comment="SLE_HPC-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281315" version="1" comment="sle-module-basesystem-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009303870" version="1" comment="sles-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659637" version="1" comment="SLES_SAP-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302786" version="1" comment="ses-release is ==7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302537" version="1" comment="SUSE-Manager-Proxy-release is ==4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009074900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346072" version="1" comment="suse-manager-server-release is ==4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009074900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302605" version="1" comment="SUSE-Manager-Server-release is ==4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009074900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480984" version="1" comment="alsa is &lt;1.1.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480985" version="1" comment="alsa-devel is &lt;1.1.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480986" version="1" comment="libasound2 is &lt;1.1.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480987" version="1" comment="libasound2-32bit is &lt;1.1.5-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480988" version="1" comment="amavisd-new is &lt;2.11.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480989" version="1" comment="amavisd-new-docs is &lt;2.11.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481726" version="1" comment="apache-commons-httpclient is &lt;3.1-9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481727" version="1" comment="apache2 is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481728" version="1" comment="apache2-prefork is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481729" version="1" comment="apache2-utils is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481730" version="1" comment="apparmor-abstractions is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481731" version="1" comment="apparmor-docs is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481732" version="1" comment="apparmor-parser is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481733" version="1" comment="apparmor-parser-lang is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481734" version="1" comment="apparmor-profiles is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481735" version="1" comment="apparmor-utils is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481736" version="1" comment="apparmor-utils-lang is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481737" version="1" comment="pam_apparmor is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481738" version="1" comment="pam_apparmor-32bit is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481739" version="1" comment="perl-apparmor is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481740" version="1" comment="python3-apparmor is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481741" version="1" comment="apr-util-devel is &lt;1.6.1-10.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481742" version="1" comment="libapr-util1 is &lt;1.6.1-10.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481743" version="1" comment="audit-devel is &lt;2.8.1-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481744" version="1" comment="libaudit1 is &lt;2.8.1-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481745" version="1" comment="libaudit1-32bit is &lt;2.8.1-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481746" version="1" comment="libauparse0 is &lt;2.8.1-10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480071" version="1" comment="augeas is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480072" version="1" comment="augeas-devel is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480073" version="1" comment="augeas-lenses is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480074" version="1" comment="libaugeas0 is &lt;1.10.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481003" version="1" comment="autofs is &lt;5.1.3-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480076" version="1" comment="automake is &lt;1.15.1-2.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480077" version="1" comment="m4 is &lt;1.4.18-2.138" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481747" version="1" comment="autoyast2 is &lt;4.2.37-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481748" version="1" comment="autoyast2-installation is &lt;4.2.37-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481004" version="1" comment="avahi is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481005" version="1" comment="avahi-compat-howl-devel is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481006" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481007" version="1" comment="avahi-lang is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481008" version="1" comment="avahi-utils is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481009" version="1" comment="libavahi-client3 is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481010" version="1" comment="libavahi-client3-32bit is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481011" version="1" comment="libavahi-common3 is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481012" version="1" comment="libavahi-common3-32bit is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481013" version="1" comment="libavahi-core7 is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481014" version="1" comment="libavahi-devel is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481015" version="1" comment="libdns_sd is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481016" version="1" comment="libhowl0 is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481749" version="1" comment="axis is &lt;1.4-11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481750" version="1" comment="bash is &lt;4.4-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481751" version="1" comment="bash-devel is &lt;4.4-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481752" version="1" comment="bash-doc is &lt;4.4-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481753" version="1" comment="bash-lang is &lt;4.4-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481754" version="1" comment="libreadline7 is &lt;7.0-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481755" version="1" comment="libreadline7-32bit is &lt;7.0-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481756" version="1" comment="readline-devel is &lt;7.0-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481757" version="1" comment="readline-doc is &lt;7.0-9.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481758" version="1" comment="bind-devel is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481759" version="1" comment="bind-utils is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481760" version="1" comment="libbind9-160 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481761" version="1" comment="libdns169 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481762" version="1" comment="libirs-devel is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481763" version="1" comment="libirs160 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481764" version="1" comment="libisc166 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481765" version="1" comment="libisccc160 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481766" version="1" comment="libisccfg160 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481767" version="1" comment="liblwres160 is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481768" version="1" comment="python3-bind is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481769" version="1" comment="binutils is &lt;2.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481770" version="1" comment="binutils-devel is &lt;2.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481771" version="1" comment="bluez is &lt;5.48-11.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481772" version="1" comment="libbluetooth3 is &lt;5.48-11.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481038" version="1" comment="btrfsmaintenance is &lt;0.4.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481773" version="1" comment="bubblewrap is &lt;0.4.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481774" version="1" comment="bzip2 is &lt;1.0.6-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481775" version="1" comment="libbz2-1 is &lt;1.0.6-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481776" version="1" comment="libbz2-1-32bit is &lt;1.0.6-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481777" version="1" comment="libbz2-devel is &lt;1.0.6-5.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481778" version="1" comment="c-ares-devel is &lt;1.15.0+20200117-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481779" version="1" comment="libcares2 is &lt;1.15.0+20200117-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481780" version="1" comment="cairo-devel is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481781" version="1" comment="libcairo-gobject2 is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481782" version="1" comment="libcairo-script-interpreter2 is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481783" version="1" comment="libcairo2 is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481784" version="1" comment="ceph-common is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481785" version="1" comment="libcephfs-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481786" version="1" comment="libcephfs2 is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481787" version="1" comment="librados-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481788" version="1" comment="librados2 is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481789" version="1" comment="libradospp-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481790" version="1" comment="librbd-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481791" version="1" comment="librbd1 is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481792" version="1" comment="librgw-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481793" version="1" comment="librgw2 is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481794" version="1" comment="python3-ceph-argparse is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481795" version="1" comment="python3-ceph-common is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481796" version="1" comment="python3-cephfs is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481797" version="1" comment="python3-rados is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481798" version="1" comment="python3-rbd is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481799" version="1" comment="python3-rgw is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481800" version="1" comment="rados-objclass-devel is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481801" version="1" comment="rbd-nbd is &lt;15.2.2.18+g1dbcddb5d8-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481802" version="1" comment="chrony is &lt;3.2-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481803" version="1" comment="chrony-pool-empty is &lt;3.2-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481804" version="1" comment="chrony-pool-suse is &lt;3.2-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481805" version="1" comment="clamav is &lt;0.100.3-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481806" version="1" comment="clamav-devel is &lt;0.100.3-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481807" version="1" comment="libclamav7 is &lt;0.100.3-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481808" version="1" comment="libclammspack0 is &lt;0.100.3-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481809" version="1" comment="collectd is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481810" version="1" comment="collectd-plugin-connectivity is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481811" version="1" comment="collectd-plugin-dbi is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481812" version="1" comment="collectd-plugin-ipmi is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481813" version="1" comment="collectd-plugin-java is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481814" version="1" comment="collectd-plugin-lua is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481815" version="1" comment="collectd-plugin-mcelog is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481816" version="1" comment="collectd-plugin-memcachec is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481817" version="1" comment="collectd-plugin-mysql is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481818" version="1" comment="collectd-plugin-notify-desktop is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481819" version="1" comment="collectd-plugin-nut is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481820" version="1" comment="collectd-plugin-openldap is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481821" version="1" comment="collectd-plugin-ovs is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481822" version="1" comment="collectd-plugin-pcie is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481823" version="1" comment="collectd-plugin-pinba is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481824" version="1" comment="collectd-plugin-postgresql is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481825" version="1" comment="collectd-plugin-procevent is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481826" version="1" comment="collectd-plugin-python3 is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481827" version="1" comment="collectd-plugin-smart is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481828" version="1" comment="collectd-plugin-snmp is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481829" version="1" comment="collectd-plugin-synproxy is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481830" version="1" comment="collectd-plugin-sysevent is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481831" version="1" comment="collectd-plugin-uptime is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481832" version="1" comment="collectd-plugin-virt is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481833" version="1" comment="collectd-plugin-write_stackdriver is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481834" version="1" comment="collectd-plugin-write_syslog is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481835" version="1" comment="collectd-plugins-all is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481836" version="1" comment="collectd-spamassassin is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481837" version="1" comment="collectd-web is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481838" version="1" comment="collectd-web-js is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481839" version="1" comment="libcollectdclient-devel is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481840" version="1" comment="libcollectdclient1 is &lt;5.10.0-1.108" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481841" version="1" comment="conntrack-tools is &lt;1.4.5-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481842" version="1" comment="conntrackd is &lt;1.4.5-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480143" version="1" comment="coreutils is &lt;8.29-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480144" version="1" comment="coreutils-lang is &lt;8.29-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481843" version="1" comment="cpio is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481844" version="1" comment="cpio-lang is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481845" version="1" comment="cpio-mt is &lt;2.12-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481846" version="1" comment="cpp7 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481847" version="1" comment="gcc7 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481848" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481849" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481850" version="1" comment="libada9 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481851" version="1" comment="libada9-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481852" version="1" comment="libasan4 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481853" version="1" comment="libasan5 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481854" version="1" comment="libasan5-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481855" version="1" comment="libatomic1 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481856" version="1" comment="libatomic1-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481857" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481858" version="1" comment="libgcc_s1 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481859" version="1" comment="libgcc_s1-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481860" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481861" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481862" version="1" comment="libgfortran5 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481863" version="1" comment="libgfortran5-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481864" version="1" comment="libgo14 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481865" version="1" comment="libgo14-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481866" version="1" comment="libgomp1 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481867" version="1" comment="libgomp1-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481868" version="1" comment="libitm1 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481869" version="1" comment="libitm1-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481870" version="1" comment="liblsan0 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481871" version="1" comment="libobjc4 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481872" version="1" comment="libquadmath0 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481873" version="1" comment="libquadmath0-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481874" version="1" comment="libstdc++6 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481875" version="1" comment="libstdc++6-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481876" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481877" version="1" comment="libstdc++6-devel-gcc9 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481878" version="1" comment="libstdc++6-locale is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481879" version="1" comment="libstdc++6-pp-gcc9 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481880" version="1" comment="libstdc++6-pp-gcc9-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481881" version="1" comment="libtsan0 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481882" version="1" comment="libubsan0 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481883" version="1" comment="libubsan1 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481884" version="1" comment="libubsan1-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481885" version="1" comment="cracklib is &lt;2.9.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481886" version="1" comment="cracklib-devel is &lt;2.9.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481887" version="1" comment="cracklib-dict-small is &lt;2.9.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481888" version="1" comment="libcrack2 is &lt;2.9.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481889" version="1" comment="libcrack2-32bit is &lt;2.9.6-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481890" version="1" comment="cron is &lt;4.2-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481891" version="1" comment="cronie is &lt;1.5.1-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481892" version="1" comment="cups is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481893" version="1" comment="cups-client is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481894" version="1" comment="cups-config is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481895" version="1" comment="cups-devel is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481896" version="1" comment="libcups2 is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481897" version="1" comment="libcups2-32bit is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481898" version="1" comment="libcupscgi1 is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481899" version="1" comment="libcupsimage2 is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481900" version="1" comment="libcupsmime1 is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481901" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481902" version="1" comment="cups-filters is &lt;1.25.0-1.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481903" version="1" comment="cups-filters-devel is &lt;1.25.0-1.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481904" version="1" comment="curl is &lt;7.66.0-2.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481905" version="1" comment="libcurl-devel is &lt;7.66.0-2.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481906" version="1" comment="libcurl4 is &lt;7.66.0-2.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481907" version="1" comment="libcurl4-32bit is &lt;7.66.0-2.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481908" version="1" comment="dbus-1 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481909" version="1" comment="dbus-1-devel is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481910" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481911" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481912" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480190" version="1" comment="dbus-1-glib is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480191" version="1" comment="dbus-1-glib-32bit is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480192" version="1" comment="dbus-1-glib-devel is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480193" version="1" comment="dbus-1-glib-tool is &lt;0.108-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481913" version="1" comment="dhcp is &lt;4.3.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481914" version="1" comment="dhcp-client is &lt;4.3.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481915" version="1" comment="dhcp-devel is &lt;4.3.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481916" version="1" comment="dnsmasq is &lt;2.78-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481917" version="1" comment="dracut is &lt;049.1+suse.144.ge0eaf296-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481918" version="1" comment="dracut-fips is &lt;049.1+suse.144.ge0eaf296-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481919" version="1" comment="dracut-ima is &lt;049.1+suse.144.ge0eaf296-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480201" version="1" comment="dstat is &lt;0.7.3-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481920" version="1" comment="e2fsprogs is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481921" version="1" comment="e2fsprogs-devel is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481922" version="1" comment="libcom_err-devel is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481923" version="1" comment="libcom_err-devel-static is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481924" version="1" comment="libcom_err2 is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481925" version="1" comment="libcom_err2-32bit is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481926" version="1" comment="libext2fs-devel is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481927" version="1" comment="libext2fs-devel-static is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481928" version="1" comment="libext2fs2 is &lt;1.43.8-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480202" version="1" comment="ecryptfs-utils is &lt;111-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480203" version="1" comment="ecryptfs-utils-devel is &lt;111-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480204" version="1" comment="libecryptfs1 is &lt;111-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481929" version="1" comment="elfutils is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481930" version="1" comment="elfutils-lang is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481931" version="1" comment="libasm-devel is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481932" version="1" comment="libasm1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481933" version="1" comment="libdw-devel is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481934" version="1" comment="libdw1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481935" version="1" comment="libdw1-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481936" version="1" comment="libebl-devel is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481937" version="1" comment="libebl-plugins is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481938" version="1" comment="libebl-plugins-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481939" version="1" comment="libelf-devel is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481940" version="1" comment="libelf1 is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481941" version="1" comment="libelf1-32bit is &lt;0.168-4.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481111" version="1" comment="emacs is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481112" version="1" comment="emacs-el is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481113" version="1" comment="emacs-info is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481114" version="1" comment="emacs-nox is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481115" version="1" comment="etags is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480223" version="1" comment="enscript is &lt;1.6.6-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481942" version="1" comment="expat is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481943" version="1" comment="libexpat-devel is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481944" version="1" comment="libexpat1 is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481945" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480228" version="1" comment="fetchmail is &lt;6.3.26-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481946" version="1" comment="file is &lt;5.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481947" version="1" comment="file-devel is &lt;5.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481948" version="1" comment="file-magic is &lt;5.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481949" version="1" comment="libmagic1 is &lt;5.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481950" version="1" comment="libmagic1-32bit is &lt;5.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481121" version="1" comment="firewall-macros is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481122" version="1" comment="firewalld is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481123" version="1" comment="firewalld-lang is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481124" version="1" comment="python3-firewall is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481125" version="1" comment="flac-devel is &lt;1.3.2-3.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481126" version="1" comment="libFLAC++6 is &lt;1.3.2-3.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481127" version="1" comment="libFLAC8 is &lt;1.3.2-3.3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481951" version="1" comment="freetype2-devel is &lt;2.10.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481952" version="1" comment="libfreetype6 is &lt;2.10.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481953" version="1" comment="libfreetype6-32bit is &lt;2.10.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481128" version="1" comment="fuse is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481129" version="1" comment="fuse-devel is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481130" version="1" comment="fuse-doc is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481131" version="1" comment="libfuse2 is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481132" version="1" comment="libulockmgr1 is &lt;2.9.7-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481954" version="1" comment="g3utils is &lt;1.1.37-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481955" version="1" comment="mgetty is &lt;1.1.37-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480249" version="1" comment="gc-devel is &lt;7.6.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480250" version="1" comment="libgc1 is &lt;7.6.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481956" version="1" comment="gdk-pixbuf-devel is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481957" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481958" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481959" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481960" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481961" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481962" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481963" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.46.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481964" version="1" comment="librsvg-2-2 is &lt;2.46.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481965" version="1" comment="ghostscript is &lt;9.52-3.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481966" version="1" comment="ghostscript-devel is &lt;9.52-3.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481967" version="1" comment="ghostscript-x11 is &lt;9.52-3.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480262" version="1" comment="giflib-devel is &lt;5.1.4-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480263" version="1" comment="libgif7 is &lt;5.1.4-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481968" version="1" comment="git-core is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481969" version="1" comment="glib2-devel is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481970" version="1" comment="glib2-lang is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481971" version="1" comment="glib2-tools is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481972" version="1" comment="libgio-2_0-0 is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481973" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481974" version="1" comment="libglib-2_0-0 is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481975" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481976" version="1" comment="libgmodule-2_0-0 is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481977" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481978" version="1" comment="libgobject-2_0-0 is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481979" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481980" version="1" comment="libgthread-2_0-0 is &lt;2.62.5-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481981" version="1" comment="glibc is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481982" version="1" comment="glibc-32bit is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481983" version="1" comment="glibc-devel is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481984" version="1" comment="glibc-extra is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481985" version="1" comment="glibc-i18ndata is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481986" version="1" comment="glibc-info is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481987" version="1" comment="glibc-locale is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481988" version="1" comment="glibc-locale-base is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481989" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481990" version="1" comment="glibc-profile is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481991" version="1" comment="nscd is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481161" version="1" comment="glibc-32bit is &lt;2.26-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481162" version="1" comment="glibc-locale-32bit is &lt;2.26-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481163" version="1" comment="glibc-locale-32bit is &lt;2.26-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481992" version="1" comment="gnutls is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481993" version="1" comment="libgnutls-devel is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481994" version="1" comment="libgnutls30 is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481995" version="1" comment="libgnutls30-32bit is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481996" version="1" comment="libgnutls30-hmac is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481997" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481998" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481999" version="1" comment="libgnutlsxx28 is &lt;3.6.7-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482000" version="1" comment="gpg2 is &lt;2.2.5-4.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482001" version="1" comment="gpg2-lang is &lt;2.2.5-4.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480301" version="1" comment="graphite2-devel is &lt;1.3.11-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480302" version="1" comment="libgraphite2-3 is &lt;1.3.11-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480303" version="1" comment="libgraphite2-3-32bit is &lt;1.3.11-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482002" version="1" comment="graphviz is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482003" version="1" comment="graphviz-devel is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482004" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482005" version="1" comment="libgraphviz6 is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482006" version="1" comment="grep is &lt;3.1-4.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482007" version="1" comment="grep-lang is &lt;3.1-4.3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480306" version="1" comment="groff is &lt;1.22.3-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480307" version="1" comment="groff-full is &lt;1.22.3-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480308" version="1" comment="gxditview is &lt;1.22.3-3.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482008" version="1" comment="grub2 is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482009" version="1" comment="grub2-arm64-efi is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482010" version="1" comment="grub2-i386-pc is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482011" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482012" version="1" comment="grub2-s390x-emu is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482013" version="1" comment="grub2-snapper-plugin is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482014" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482015" version="1" comment="grub2-x86_64-efi is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482016" version="1" comment="gstreamer is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482017" version="1" comment="gstreamer-lang is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482018" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482019" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482020" version="1" comment="gstreamer-plugins-base is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482021" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482022" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482023" version="1" comment="libgstapp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482024" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482025" version="1" comment="libgstfft-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482026" version="1" comment="libgstgl-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482027" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482028" version="1" comment="libgstriff-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482029" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482030" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482031" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482032" version="1" comment="libgsttag-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482033" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482034" version="1" comment="gstreamer-plugins-good is &lt;1.16.2-1.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482035" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.2-1.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482036" version="1" comment="gtk2-devel is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482037" version="1" comment="gtk2-lang is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482038" version="1" comment="gtk2-tools is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482039" version="1" comment="libgtk-2_0-0 is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482040" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480325" version="1" comment="hardlink is &lt;1.0+git.e66999f-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482041" version="1" comment="hplip-devel is &lt;3.19.12-1.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482042" version="1" comment="hplip-hpijs is &lt;3.19.12-1.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482043" version="1" comment="hplip-sane is &lt;3.19.12-1.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482044" version="1" comment="ipmitool is &lt;1.8.18+git20200204.7ccea28-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480330" version="1" comment="ipsec-tools is &lt;0.8.2-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480331" version="1" comment="iputils is &lt;s20161105-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482045" version="1" comment="java-11-openjdk is &lt;11.0.7.0-3.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482046" version="1" comment="java-11-openjdk-demo is &lt;11.0.7.0-3.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482047" version="1" comment="java-11-openjdk-devel is &lt;11.0.7.0-3.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482048" version="1" comment="java-11-openjdk-headless is &lt;11.0.7.0-3.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482049" version="1" comment="jq is &lt;1.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482050" version="1" comment="libjq-devel is &lt;1.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482051" version="1" comment="libjq1 is &lt;1.6-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482052" version="1" comment="kdump is &lt;0.9.0-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482054" version="1" comment="kernel-default-devel is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482055" version="1" comment="kernel-devel is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482056" version="1" comment="kernel-macros is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482057" version="1" comment="kernel-preempt is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482058" version="1" comment="kernel-zfcpdump is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482059" version="1" comment="kernel-default-man is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482060" version="1" comment="kernel-firmware is &lt;20200107-3.12.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482061" version="1" comment="ucode-amd is &lt;20200107-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482062" version="1" comment="krb5 is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482063" version="1" comment="krb5-32bit is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482064" version="1" comment="krb5-client is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482065" version="1" comment="krb5-devel is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482066" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482067" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482068" version="1" comment="ldb-tools is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482069" version="1" comment="libldb-devel is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482070" version="1" comment="libldb2 is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482071" version="1" comment="libldb2-32bit is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482072" version="1" comment="python3-ldb is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482073" version="1" comment="python3-ldb-devel is &lt;2.0.10-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482074" version="1" comment="ldns-devel is &lt;1.7.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482075" version="1" comment="libldns2 is &lt;1.7.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480353" version="1" comment="less is &lt;530-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481214" version="1" comment="lftp is &lt;4.8.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480355" version="1" comment="libFS-devel is &lt;1.0.7-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480356" version="1" comment="libFS6 is &lt;1.0.7-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480357" version="1" comment="libHX-devel is &lt;3.22-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480358" version="1" comment="libHX28 is &lt;3.22-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480359" version="1" comment="libHX28-32bit is &lt;3.22-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480360" version="1" comment="libICE-devel is &lt;1.0.9-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480361" version="1" comment="libICE6 is &lt;1.0.9-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482076" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482077" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482078" version="1" comment="libQt5Core-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482079" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482080" version="1" comment="libQt5Core5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482081" version="1" comment="libQt5DBus-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482082" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482083" version="1" comment="libQt5DBus5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482084" version="1" comment="libQt5Gui-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482085" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482086" version="1" comment="libQt5Gui5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482087" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482088" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482089" version="1" comment="libQt5Network-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482090" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482091" version="1" comment="libQt5Network5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482092" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482093" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482094" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482095" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482096" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482097" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482098" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482099" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482100" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482101" version="1" comment="libQt5Sql-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482102" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482103" version="1" comment="libQt5Sql5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482104" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482105" version="1" comment="libQt5Test-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482106" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482107" version="1" comment="libQt5Test5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482108" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482109" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482110" version="1" comment="libQt5Widgets5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482111" version="1" comment="libQt5Xml-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482112" version="1" comment="libQt5Xml5 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482113" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482114" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482115" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481255" version="1" comment="libX11-6 is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481256" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481257" version="1" comment="libX11-data is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481258" version="1" comment="libX11-devel is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481259" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481260" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480408" version="1" comment="libXRes1 is &lt;1.2.0-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480409" version="1" comment="libXres-devel is &lt;1.2.0-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480410" version="1" comment="libXcursor-devel is &lt;1.1.15-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480411" version="1" comment="libXcursor1 is &lt;1.1.15-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480412" version="1" comment="libXdmcp-devel is &lt;1.1.2-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480413" version="1" comment="libXdmcp6 is &lt;1.1.2-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480414" version="1" comment="libXext-devel is &lt;1.3.3-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480415" version="1" comment="libXext6 is &lt;1.3.3-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480416" version="1" comment="libXext6-32bit is &lt;1.3.3-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480417" version="1" comment="libXfixes-devel is &lt;5.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480418" version="1" comment="libXfixes3 is &lt;5.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480419" version="1" comment="libXfixes3-32bit is &lt;5.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480420" version="1" comment="libXfont-devel is &lt;1.5.4-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480421" version="1" comment="libXfont1 is &lt;1.5.4-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480422" version="1" comment="libXfont2-2 is &lt;2.0.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480423" version="1" comment="libXfont2-devel is &lt;2.0.3-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482116" version="1" comment="libXi-devel is &lt;1.7.9-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482117" version="1" comment="libXi6 is &lt;1.7.9-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482118" version="1" comment="libXi6-32bit is &lt;1.7.9-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480426" version="1" comment="libXinerama-devel is &lt;1.1.3-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480427" version="1" comment="libXinerama1 is &lt;1.1.3-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480428" version="1" comment="libXp-devel is &lt;1.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480429" version="1" comment="libXp6 is &lt;1.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480430" version="1" comment="libXrandr-devel is &lt;1.5.1-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480431" version="1" comment="libXrandr2 is &lt;1.5.1-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480432" version="1" comment="libXrender-devel is &lt;0.9.10-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480433" version="1" comment="libXrender1 is &lt;0.9.10-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480434" version="1" comment="libXrender1-32bit is &lt;0.9.10-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480435" version="1" comment="libXt-devel is &lt;1.1.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480436" version="1" comment="libXt6 is &lt;1.1.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480437" version="1" comment="libXtst-devel is &lt;1.2.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480438" version="1" comment="libXtst6 is &lt;1.2.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480439" version="1" comment="libXtst6-32bit is &lt;1.2.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480440" version="1" comment="libXv-devel is &lt;1.0.11-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480441" version="1" comment="libXv1 is &lt;1.0.11-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480442" version="1" comment="libXvMC-devel is &lt;1.0.10-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480443" version="1" comment="libXvMC1 is &lt;1.0.10-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482119" version="1" comment="libXvnc1 is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482120" version="1" comment="tigervnc is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482121" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482122" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482123" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480448" version="1" comment="libXxf86dga-devel is &lt;1.1.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480449" version="1" comment="libXxf86dga1 is &lt;1.1.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480450" version="1" comment="libXxf86vm-devel is &lt;1.1.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480451" version="1" comment="libXxf86vm1 is &lt;1.1.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480452" version="1" comment="libXxf86vm1-32bit is &lt;1.1.4-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482124" version="1" comment="libarchive-devel is &lt;3.4.2-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482125" version="1" comment="libarchive13 is &lt;3.4.2-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482126" version="1" comment="libblkid-devel is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482127" version="1" comment="libblkid-devel-static is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482128" version="1" comment="libblkid1 is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482129" version="1" comment="libblkid1-32bit is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482130" version="1" comment="libfdisk-devel is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482131" version="1" comment="libfdisk1 is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482132" version="1" comment="libmount-devel is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482133" version="1" comment="libmount1 is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482134" version="1" comment="libmount1-32bit is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482135" version="1" comment="libsmartcols-devel is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482136" version="1" comment="libsmartcols1 is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482137" version="1" comment="libuuid-devel is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482138" version="1" comment="libuuid-devel-static is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482139" version="1" comment="libuuid1 is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482140" version="1" comment="libuuid1-32bit is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482141" version="1" comment="util-linux is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482142" version="1" comment="util-linux-lang is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482143" version="1" comment="util-linux-systemd is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482144" version="1" comment="libbsd-devel is &lt;0.8.7-3.3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482145" version="1" comment="libbsd0 is &lt;0.8.7-3.3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482146" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482147" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482148" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482149" version="1" comment="libcontainers-common is &lt;20200306-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482150" version="1" comment="libcroco is &lt;0.6.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482151" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482152" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482153" version="1" comment="libcroco-devel is &lt;0.6.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482154" version="1" comment="libdcerpc-binding0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482155" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482156" version="1" comment="libdcerpc-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482157" version="1" comment="libdcerpc-samr-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482158" version="1" comment="libdcerpc-samr0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482159" version="1" comment="libdcerpc0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482160" version="1" comment="libdcerpc0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482161" version="1" comment="libndr-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482162" version="1" comment="libndr-krb5pac-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482163" version="1" comment="libndr-krb5pac0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482164" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482165" version="1" comment="libndr-nbt-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482166" version="1" comment="libndr-nbt0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482167" version="1" comment="libndr-nbt0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482168" version="1" comment="libndr-standard-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482169" version="1" comment="libndr-standard0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482170" version="1" comment="libndr-standard0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482171" version="1" comment="libndr0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482172" version="1" comment="libndr0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482173" version="1" comment="libnetapi-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482174" version="1" comment="libnetapi0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482175" version="1" comment="libnetapi0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482176" version="1" comment="libsamba-credentials-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482177" version="1" comment="libsamba-credentials0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482178" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482179" version="1" comment="libsamba-errors-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482180" version="1" comment="libsamba-errors0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482181" version="1" comment="libsamba-errors0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482182" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482183" version="1" comment="libsamba-hostconfig0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482184" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482185" version="1" comment="libsamba-passdb-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482186" version="1" comment="libsamba-passdb0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482187" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482188" version="1" comment="libsamba-policy-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482189" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482190" version="1" comment="libsamba-policy0-python3 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482191" version="1" comment="libsamba-util-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482192" version="1" comment="libsamba-util0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482193" version="1" comment="libsamba-util0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482194" version="1" comment="libsamdb-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482195" version="1" comment="libsamdb0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482196" version="1" comment="libsamdb0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482197" version="1" comment="libsmbclient-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482198" version="1" comment="libsmbclient0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482199" version="1" comment="libsmbconf-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482200" version="1" comment="libsmbconf0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482201" version="1" comment="libsmbconf0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482202" version="1" comment="libsmbldap-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482203" version="1" comment="libsmbldap2 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482204" version="1" comment="libsmbldap2-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482205" version="1" comment="libtevent-util-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482206" version="1" comment="libtevent-util0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482207" version="1" comment="libtevent-util0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482208" version="1" comment="libwbclient-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482209" version="1" comment="libwbclient0 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482210" version="1" comment="libwbclient0-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482211" version="1" comment="samba is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482212" version="1" comment="samba-ceph is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482213" version="1" comment="samba-client is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482214" version="1" comment="samba-core-devel is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482215" version="1" comment="samba-libs is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482216" version="1" comment="samba-libs-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482217" version="1" comment="samba-libs-python3 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482218" version="1" comment="samba-python3 is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482219" version="1" comment="samba-winbind is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482220" version="1" comment="samba-winbind-32bit is &lt;4.11.5+git.161.74bc5e6ec8e-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480523" version="1" comment="libdmx-devel is &lt;1.1.3-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480524" version="1" comment="libdmx1 is &lt;1.1.3-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480525" version="1" comment="libevent-2_1-8 is &lt;2.1.8-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480526" version="1" comment="libevent-devel is &lt;2.1.8-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482221" version="1" comment="libfreebl3 is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482222" version="1" comment="libfreebl3-32bit is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482223" version="1" comment="libsoftokn3 is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482224" version="1" comment="libsoftokn3-32bit is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482225" version="1" comment="mozilla-nss is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482226" version="1" comment="mozilla-nss-32bit is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482227" version="1" comment="mozilla-nss-certs is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482228" version="1" comment="mozilla-nss-certs-32bit is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482229" version="1" comment="mozilla-nss-devel is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482230" version="1" comment="mozilla-nss-sysinit is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482231" version="1" comment="mozilla-nss-tools is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482232" version="1" comment="libgcrypt-devel is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482233" version="1" comment="libgcrypt20 is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482234" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482235" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482236" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-8.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482237" version="1" comment="libgd3 is &lt;2.2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482238" version="1" comment="libgstphotography-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482239" version="1" comment="libgtk-vnc-2_0-0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482240" version="1" comment="libgvnc-1_0-0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482241" version="1" comment="libhogweed4 is &lt;3.4.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482242" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482243" version="1" comment="libnettle-devel is &lt;3.4.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482244" version="1" comment="libnettle6 is &lt;3.4.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482245" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482246" version="1" comment="libical3 is &lt;3.0.6-2.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482247" version="1" comment="libidn-devel is &lt;1.34-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482248" version="1" comment="libidn11 is &lt;1.34-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482249" version="1" comment="libidn11-32bit is &lt;1.34-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482250" version="1" comment="libidn2-0 is &lt;2.2.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482251" version="1" comment="libidn2-0-32bit is &lt;2.2.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482252" version="1" comment="libidn2-devel is &lt;2.2.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482253" version="1" comment="libipa_hbac-devel is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482254" version="1" comment="libipa_hbac0 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482255" version="1" comment="libsss_certmap-devel is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482256" version="1" comment="libsss_certmap0 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482257" version="1" comment="libsss_idmap-devel is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482258" version="1" comment="libsss_idmap0 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482259" version="1" comment="libsss_nss_idmap-devel is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482260" version="1" comment="libsss_nss_idmap0 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482261" version="1" comment="libsss_simpleifp-devel is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482262" version="1" comment="libsss_simpleifp0 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482263" version="1" comment="python3-sssd-config is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482264" version="1" comment="sssd is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482265" version="1" comment="sssd-32bit is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482266" version="1" comment="sssd-ad is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482267" version="1" comment="sssd-dbus is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482268" version="1" comment="sssd-ipa is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482269" version="1" comment="sssd-krb5 is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482270" version="1" comment="sssd-krb5-common is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482271" version="1" comment="sssd-ldap is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482272" version="1" comment="sssd-proxy is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482273" version="1" comment="sssd-tools is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482274" version="1" comment="sssd-winbind-idmap is &lt;1.16.1-15.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480579" version="1" comment="libjansson-devel is &lt;2.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480580" version="1" comment="libjansson4 is &lt;2.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481404" version="1" comment="libjansson4-32bit is &lt;2.9-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482275" version="1" comment="libjasper4 is &lt;2.0.14-3.11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482276" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482277" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482278" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482279" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480586" version="1" comment="libjbig-devel is &lt;2.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480587" version="1" comment="libjbig2 is &lt;2.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482280" version="1" comment="libjpeg62 is &lt;62.2.0-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482281" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482282" version="1" comment="libjpeg8 is &lt;8.1.2-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482283" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482284" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480593" version="1" comment="libjson-c-devel is &lt;0.13-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480594" version="1" comment="libjson-c3 is &lt;0.13-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480595" version="1" comment="libjson-c3-32bit is &lt;0.13-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480596" version="1" comment="libksba-devel is &lt;1.3.5-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480597" version="1" comment="libksba8 is &lt;1.3.5-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481415" version="1" comment="liblcms2-2 is &lt;2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481416" version="1" comment="liblcms2-devel is &lt;2.9-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482285" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482286" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482287" version="1" comment="libldap-data is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482288" version="1" comment="openldap2 is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482289" version="1" comment="openldap2-client is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482290" version="1" comment="openldap2-devel is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482291" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482292" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480609" version="1" comment="libltdl7 is &lt;2.4.6-1.406" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480610" version="1" comment="libtool is &lt;2.4.6-1.406" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481427" version="1" comment="liblua5_3-5 is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481428" version="1" comment="liblua5_3-5-32bit is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481429" version="1" comment="lua53 is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481430" version="1" comment="lua53-devel is &lt;5.3.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482293" version="1" comment="liblz4-1 is &lt;1.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482294" version="1" comment="liblz4-1-32bit is &lt;1.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482295" version="1" comment="liblz4-devel is &lt;1.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482296" version="1" comment="lz4 is &lt;1.8.0-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480611" version="1" comment="liblzo2-2 is &lt;2.10-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480612" version="1" comment="lzo-devel is &lt;2.10-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480613" version="1" comment="lzo-devel-static is &lt;2.10-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482297" version="1" comment="libmariadb3 is &lt;3.1.8-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482298" version="1" comment="libmariadbprivate is &lt;3.1.8-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482299" version="1" comment="libmarkdown2 is &lt;2.2.4-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482300" version="1" comment="libmicrohttpd12 is &lt;0.9.57-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482301" version="1" comment="libminizip1 is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482302" version="1" comment="libz1 is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482303" version="1" comment="libz1-32bit is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482304" version="1" comment="minizip-devel is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482305" version="1" comment="zlib-devel is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482306" version="1" comment="zlib-devel-static is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482307" version="1" comment="libmp3lame0 is &lt;3.100-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480620" version="1" comment="libmpfr6 is &lt;4.0.1-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480621" version="1" comment="mpfr-devel is &lt;4.0.1-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482308" version="1" comment="libmpg123-0 is &lt;1.25.10-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482309" version="1" comment="libmspack-devel is &lt;0.6-3.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482310" version="1" comment="libmspack0 is &lt;0.6-3.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482311" version="1" comment="libncurses6 is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482312" version="1" comment="libncurses6-32bit is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482313" version="1" comment="ncurses-devel is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482314" version="1" comment="ncurses-utils is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482315" version="1" comment="tack is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482316" version="1" comment="terminfo is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482317" version="1" comment="terminfo-base is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482318" version="1" comment="terminfo-iterm is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482319" version="1" comment="terminfo-screen is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482320" version="1" comment="libnetpbm11 is &lt;10.80.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482321" version="1" comment="netpbm is &lt;10.80.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480626" version="1" comment="libnewt0_52 is &lt;0.52.20-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480627" version="1" comment="newt is &lt;0.52.20-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480628" version="1" comment="python3-newt is &lt;0.52.20-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482322" version="1" comment="libnghttp2-14 is &lt;1.40.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482323" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482324" version="1" comment="libnghttp2-devel is &lt;1.40.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482325" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482326" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482327" version="1" comment="libnm0 is &lt;1.22.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482328" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.22.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481452" version="1" comment="liboath-devel is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480636" version="1" comment="liboath0 is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480637" version="1" comment="oath-toolkit-xml is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480638" version="1" comment="libopenjp2-7 is &lt;2.3.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480639" version="1" comment="openjpeg2 is &lt;2.3.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480640" version="1" comment="openjpeg2-devel is &lt;2.3.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482329" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482330" version="1" comment="libopenssl1_1 is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482331" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482332" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482333" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482334" version="1" comment="openssl-1_1 is &lt;1.1.1d-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482335" version="1" comment="libopenssl-devel is &lt;1.1.1d-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482336" version="1" comment="openssl is &lt;1.1.1d-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482337" version="1" comment="libopus0 is &lt;1.3.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482338" version="1" comment="libosinfo is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482339" version="1" comment="libosinfo-1_0-0 is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482340" version="1" comment="libosinfo-lang is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482341" version="1" comment="libpainter0 is &lt;0.9.13-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482342" version="1" comment="librfxencode0 is &lt;0.9.13-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482343" version="1" comment="xrdp is &lt;0.9.13-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482344" version="1" comment="xrdp-devel is &lt;0.9.13-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482345" version="1" comment="libpango-1_0-0 is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482346" version="1" comment="pango-devel is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482347" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482348" version="1" comment="libpcap-devel is &lt;1.8.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482349" version="1" comment="libpcap1 is &lt;1.8.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480657" version="1" comment="libpcre1 is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480658" version="1" comment="libpcre1-32bit is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480659" version="1" comment="libpcre16-0 is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480660" version="1" comment="libpcrecpp0 is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480661" version="1" comment="libpcrecpp0-32bit is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480662" version="1" comment="libpcreposix0 is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480663" version="1" comment="pcre-devel is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480664" version="1" comment="pcre-tools is &lt;8.41-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480665" version="1" comment="libpcre2-16-0 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480666" version="1" comment="libpcre2-32-0 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480667" version="1" comment="libpcre2-8-0 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482350" version="1" comment="libpcre2-posix2 is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482351" version="1" comment="pcre2-devel is &lt;10.31-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481464" version="1" comment="libpcsclite1 is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481465" version="1" comment="libpcscspy0 is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481466" version="1" comment="pcsc-lite is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481467" version="1" comment="pcsc-lite-devel is &lt;1.8.24-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480672" version="1" comment="libpng12-0 is &lt;1.2.57-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480673" version="1" comment="libpng12-devel is &lt;1.2.57-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482352" version="1" comment="libpng16-16 is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482353" version="1" comment="libpng16-16-32bit is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482354" version="1" comment="libpng16-compat-devel is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482355" version="1" comment="libpng16-devel is &lt;1.6.34-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482356" version="1" comment="libpolkit0 is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482357" version="1" comment="polkit is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482358" version="1" comment="polkit-devel is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482359" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-1.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482360" version="1" comment="libpoppler-cpp0 is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482361" version="1" comment="libpoppler-devel is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482362" version="1" comment="libpoppler-glib-devel is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482363" version="1" comment="libpoppler-glib8 is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482364" version="1" comment="libpoppler89 is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482365" version="1" comment="poppler-tools is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482366" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.79.0-1.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482367" version="1" comment="libpq5 is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482368" version="1" comment="postgresql12 is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482369" version="1" comment="libprocps7 is &lt;3.3.15-7.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482370" version="1" comment="procps is &lt;3.3.15-7.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482371" version="1" comment="procps-devel is &lt;3.3.15-7.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480691" version="1" comment="libproxy-devel is &lt;0.4.15-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480692" version="1" comment="libproxy1 is &lt;0.4.15-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482372" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-7.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482373" version="1" comment="python is &lt;2.7.17-7.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482374" version="1" comment="python-base is &lt;2.7.17-7.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482375" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482376" version="1" comment="python3 is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482377" version="1" comment="python3-base is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482378" version="1" comment="python3-curses is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482379" version="1" comment="python3-dbm is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482380" version="1" comment="python3-devel is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482381" version="1" comment="python3-idle is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482382" version="1" comment="python3-tk is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482383" version="1" comment="libqpdf26 is &lt;9.0.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482384" version="1" comment="qpdf is &lt;9.0.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482385" version="1" comment="qpdf-devel is &lt;9.0.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480707" version="1" comment="librrd8 is &lt;1.7.0-4.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482386" version="1" comment="perl-rrdtool is &lt;1.7.0-4.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480708" version="1" comment="rrdtool is &lt;1.7.0-4.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480709" version="1" comment="rrdtool-devel is &lt;1.7.0-4.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480710" version="1" comment="librsync-devel is &lt;1.0.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480711" version="1" comment="librsync2 is &lt;1.0.0-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482387" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482388" version="1" comment="ruby2.5 is &lt;2.5.8-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482389" version="1" comment="ruby2.5-devel is &lt;2.5.8-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482390" version="1" comment="ruby2.5-devel-extra is &lt;2.5.8-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482391" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482392" version="1" comment="libseccomp-devel is &lt;2.4.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482393" version="1" comment="libseccomp2 is &lt;2.4.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482394" version="1" comment="libseccomp2-32bit is &lt;2.4.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480712" version="1" comment="libserf-1-1 is &lt;1.3.9-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480713" version="1" comment="libserf-devel is &lt;1.3.9-2.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480714" version="1" comment="libsha1detectcoll-devel is &lt;1.0.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480715" version="1" comment="libsha1detectcoll1 is &lt;1.0.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480716" version="1" comment="libsmi is &lt;0.4.8-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480717" version="1" comment="libsmi2 is &lt;0.4.8-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481480" version="1" comment="libsndfile-devel is &lt;1.0.28-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481481" version="1" comment="libsndfile1 is &lt;1.0.28-5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481482" version="1" comment="libsnmp30 is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481483" version="1" comment="net-snmp is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481484" version="1" comment="net-snmp-devel is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481485" version="1" comment="perl-SNMP is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481486" version="1" comment="snmp-mibs is &lt;5.7.3-8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482395" version="1" comment="libsolv-devel is &lt;0.7.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482396" version="1" comment="libsolv-tools is &lt;0.7.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482397" version="1" comment="python3-solv is &lt;0.7.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482398" version="1" comment="ruby-solv is &lt;0.7.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482399" version="1" comment="libsoup-2_4-1 is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482400" version="1" comment="libsoup-lang is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482401" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482402" version="1" comment="libspice-client-glib-helper is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482403" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482404" version="1" comment="libsqlite3-0 is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482405" version="1" comment="libsqlite3-0-32bit is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482406" version="1" comment="sqlite3 is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482407" version="1" comment="sqlite3-devel is &lt;3.28.0-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482408" version="1" comment="libssh-devel is &lt;0.8.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482409" version="1" comment="libssh4 is &lt;0.8.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482410" version="1" comment="libssh4-32bit is &lt;0.8.7-10.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482411" version="1" comment="libssh2-1 is &lt;1.8.0-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482412" version="1" comment="libssh2-devel is &lt;1.8.0-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482413" version="1" comment="libsystemd0 is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482414" version="1" comment="libsystemd0-32bit is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482415" version="1" comment="libudev-devel is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482416" version="1" comment="libudev1 is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482417" version="1" comment="libudev1-32bit is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482418" version="1" comment="systemd is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482419" version="1" comment="systemd-32bit is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482420" version="1" comment="systemd-bash-completion is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482421" version="1" comment="systemd-container is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482422" version="1" comment="systemd-coredump is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482423" version="1" comment="systemd-devel is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482424" version="1" comment="systemd-sysvinit is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482425" version="1" comment="udev is &lt;234-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482426" version="1" comment="libtag1 is &lt;1.11.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482427" version="1" comment="libtasn1 is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482428" version="1" comment="libtasn1-6 is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482429" version="1" comment="libtasn1-6-32bit is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482430" version="1" comment="libtasn1-devel is &lt;4.13-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480757" version="1" comment="libthai-data is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482431" version="1" comment="libthai-devel is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480758" version="1" comment="libthai0 is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482432" version="1" comment="libtidy5 is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481518" version="1" comment="libtiff-devel is &lt;4.0.9-5.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481519" version="1" comment="libtiff5 is &lt;4.0.9-5.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482433" version="1" comment="libtspi1 is &lt;0.3.14-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482434" version="1" comment="trousers is &lt;0.3.14-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482435" version="1" comment="trousers-devel is &lt;0.3.14-6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482436" version="1" comment="libu2f-host-devel is &lt;1.1.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482437" version="1" comment="libu2f-host0 is &lt;1.1.6-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482438" version="1" comment="libudisks2-0 is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482439" version="1" comment="libudisks2-0-devel is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482440" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482441" version="1" comment="udisks2 is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482442" version="1" comment="udisks2-lang is &lt;2.8.1-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481525" version="1" comment="libunbound2 is &lt;1.6.8-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481526" version="1" comment="unbound-anchor is &lt;1.6.8-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481527" version="1" comment="unbound-devel is &lt;1.6.8-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480769" version="1" comment="libunwind is &lt;1.2.1-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480770" version="1" comment="libunwind-devel is &lt;1.2.1-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482443" version="1" comment="libupsclient1 is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482444" version="1" comment="libvirt-libs is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482445" version="1" comment="libvmtools-devel is &lt;11.1.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482446" version="1" comment="libvmtools0 is &lt;11.1.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482447" version="1" comment="open-vm-tools is &lt;11.1.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481532" version="1" comment="libvorbis-devel is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481533" version="1" comment="libvorbis0 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481534" version="1" comment="libvorbisenc2 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481535" version="1" comment="libvorbisfile3 is &lt;1.3.6-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482448" version="1" comment="libvpx4 is &lt;1.6.1-6.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482449" version="1" comment="libwavpack1 is &lt;5.1.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482450" version="1" comment="libwebp7 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482451" version="1" comment="libwebpdemux2 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482452" version="1" comment="libwireshark13 is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482453" version="1" comment="libwiretap10 is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482454" version="1" comment="libwsutil11 is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482455" version="1" comment="wireshark is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482456" version="1" comment="libwscodecs1 is &lt;2.4.16-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482457" version="1" comment="libwsutil8 is &lt;2.4.16-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481542" version="1" comment="libxcb-composite0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481543" version="1" comment="libxcb-damage0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481544" version="1" comment="libxcb-devel is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481545" version="1" comment="libxcb-devel-doc is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481546" version="1" comment="libxcb-dpms0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481547" version="1" comment="libxcb-dri2-0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481548" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481549" version="1" comment="libxcb-dri3-0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481550" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481551" version="1" comment="libxcb-glx0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481552" version="1" comment="libxcb-glx0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481553" version="1" comment="libxcb-present0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481554" version="1" comment="libxcb-present0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481555" version="1" comment="libxcb-randr0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481556" version="1" comment="libxcb-record0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481557" version="1" comment="libxcb-render0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481558" version="1" comment="libxcb-res0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481559" version="1" comment="libxcb-screensaver0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481560" version="1" comment="libxcb-shape0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481561" version="1" comment="libxcb-shm0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481562" version="1" comment="libxcb-sync1 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481563" version="1" comment="libxcb-sync1-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481564" version="1" comment="libxcb-xf86dri0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481565" version="1" comment="libxcb-xfixes0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481566" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481567" version="1" comment="libxcb-xinerama0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481568" version="1" comment="libxcb-xinput0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481569" version="1" comment="libxcb-xkb1 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481570" version="1" comment="libxcb-xtest0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481571" version="1" comment="libxcb-xv0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481572" version="1" comment="libxcb-xvmc0 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481573" version="1" comment="libxcb1 is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481574" version="1" comment="libxcb1-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482458" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482459" version="1" comment="libxerces-c-devel is &lt;3.1.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481577" version="1" comment="libxkbcommon-devel is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481578" version="1" comment="libxkbcommon-x11-0 is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481579" version="1" comment="libxkbcommon-x11-devel is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481580" version="1" comment="libxkbcommon0 is &lt;0.8.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482460" version="1" comment="libxml2-2 is &lt;2.9.7-3.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482461" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482462" version="1" comment="libxml2-devel is &lt;2.9.7-3.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482463" version="1" comment="libxml2-tools is &lt;2.9.7-3.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482464" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.19.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482465" version="1" comment="libxslt-devel is &lt;1.1.32-3.8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482466" version="1" comment="libxslt-tools is &lt;1.1.32-3.8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482467" version="1" comment="libxslt1 is &lt;1.1.32-3.8.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480828" version="1" comment="libyaml-0-2 is &lt;0.1.7-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480829" version="1" comment="libyaml-devel is &lt;0.1.7-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481585" version="1" comment="libykcs11-1 is &lt;1.6.2-4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481586" version="1" comment="libykcs11-devel is &lt;1.6.2-4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481587" version="1" comment="libykpiv-devel is &lt;1.6.2-4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481588" version="1" comment="libykpiv1 is &lt;1.6.2-4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481589" version="1" comment="yubico-piv-tool is &lt;1.6.2-4.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480830" version="1" comment="libzip-devel is &lt;1.5.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480831" version="1" comment="libzip5 is &lt;1.5.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482468" version="1" comment="libzmq5 is &lt;4.2.3-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482469" version="1" comment="zeromq-devel is &lt;4.2.3-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482470" version="1" comment="libzstd-devel is &lt;1.4.4-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482471" version="1" comment="libzstd1 is &lt;1.4.4-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482472" version="1" comment="libzstd1-32bit is &lt;1.4.4-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482473" version="1" comment="zstd is &lt;1.4.4-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482474" version="1" comment="libzypp is &lt;17.23.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482475" version="1" comment="libzypp-devel is &lt;17.23.6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482476" version="1" comment="libzzip-0-13 is &lt;0.13.69-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482477" version="1" comment="zziplib-devel is &lt;0.13.69-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482478" version="1" comment="log4j12 is &lt;1.2.17-2.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481596" version="1" comment="logrotate is &lt;3.13.0-4.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480839" version="1" comment="mailx is &lt;12.5-1.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480840" version="1" comment="minicom is &lt;2.7.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480841" version="1" comment="minicom-lang is &lt;2.7.1-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482479" version="1" comment="mozilla-nspr is &lt;4.23-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482480" version="1" comment="mozilla-nspr-32bit is &lt;4.23-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482481" version="1" comment="mozilla-nspr-devel is &lt;4.23-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481600" version="1" comment="mutt is &lt;1.10.1-3.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481601" version="1" comment="mutt-doc is &lt;1.10.1-3.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481602" version="1" comment="mutt-lang is &lt;1.10.1-3.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482482" version="1" comment="nfs-client is &lt;2.1.1-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482483" version="1" comment="nfs-doc is &lt;2.1.1-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482484" version="1" comment="nfs-kernel-server is &lt;2.1.1-10.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482485" version="1" comment="nmap is &lt;7.70-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481603" version="1" comment="opensc is &lt;0.19.0-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482486" version="1" comment="openslp is &lt;2.0.0-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482487" version="1" comment="openslp-32bit is &lt;2.0.0-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482488" version="1" comment="openslp-devel is &lt;2.0.0-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482489" version="1" comment="openssh is &lt;8.1p1-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482490" version="1" comment="openssh-helpers is &lt;8.1p1-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481609" version="1" comment="openvpn is &lt;2.4.3-5.3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481610" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-5.3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481611" version="1" comment="openvpn-devel is &lt;2.4.3-5.3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480857" version="1" comment="opie-32bit is &lt;2.4-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482491" version="1" comment="p7zip is &lt;16.02-12.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482492" version="1" comment="pam is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482493" version="1" comment="pam-32bit is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482494" version="1" comment="pam-devel is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482495" version="1" comment="pam-doc is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482496" version="1" comment="pam-extra is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482497" version="1" comment="pam-extra-32bit is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480863" version="1" comment="pam_krb5 is &lt;2.4.13-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480864" version="1" comment="pam_krb5-32bit is &lt;2.4.13-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480865" version="1" comment="pam_ssh is &lt;2.1-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480866" version="1" comment="pam_ssh-32bit is &lt;2.1-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482498" version="1" comment="pam_u2f is &lt;1.0.8-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480867" version="1" comment="pam_yubico is &lt;2.26-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481616" version="1" comment="patch is &lt;2.7.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482499" version="1" comment="perl is &lt;5.26.1-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482500" version="1" comment="perl-base is &lt;5.26.1-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482501" version="1" comment="perl-base-32bit is &lt;5.26.1-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481620" version="1" comment="perl-Archive-Zip is &lt;1.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482502" version="1" comment="perl-DBD-mysql is &lt;4.046-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480873" version="1" comment="perl-HTML-Parser is &lt;3.72-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480874" version="1" comment="perl-LWP-Protocol-https is &lt;6.06-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482503" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482504" version="1" comment="spamassassin is &lt;3.4.2-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480875" version="1" comment="perl-XML-LibXML is &lt;2.0132-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482505" version="1" comment="permissions is &lt;20181224-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482506" version="1" comment="permissions-zypp-plugin is &lt;20181224-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482507" version="1" comment="policycoreutils is &lt;3.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482508" version="1" comment="policycoreutils-lang is &lt;3.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482509" version="1" comment="policycoreutils-newrole is &lt;3.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482510" version="1" comment="python3-policycoreutils is &lt;3.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482511" version="1" comment="postgresql is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482512" version="1" comment="postgresql10 is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482513" version="1" comment="powerpc-utils is &lt;1.3.7.1-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482514" version="1" comment="ppc64-diag is &lt;2.7.6-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480880" version="1" comment="procmail is &lt;3.22-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482515" version="1" comment="python3-CherryPy is &lt;18.3.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481633" version="1" comment="python3-Jinja2 is &lt;2.10.1-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482516" version="1" comment="python3-PyYAML is &lt;5.1.2-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482517" version="1" comment="python3-SQLAlchemy is &lt;1.2.14-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482518" version="1" comment="python3-Werkzeug is &lt;0.14.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482519" version="1" comment="python3-ecdsa is &lt;0.13.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482520" version="1" comment="python3-numpy is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482521" version="1" comment="python3-numpy-devel is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482522" version="1" comment="python3-paramiko is &lt;2.4.2-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480895" version="1" comment="python3-pip is &lt;10.0.1-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482523" version="1" comment="python3-python3-saml is &lt;1.7.0-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482524" version="1" comment="python3-requests is &lt;2.20.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482525" version="1" comment="python3-salt is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482526" version="1" comment="salt is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482527" version="1" comment="salt-bash-completion is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482528" version="1" comment="salt-doc is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482529" version="1" comment="salt-minion is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482530" version="1" comment="salt-zsh-completion is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482531" version="1" comment="python3-targetcli-fb is &lt;2.1.52-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482532" version="1" comment="targetcli-fb-common is &lt;2.1.52-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482533" version="1" comment="python3-urllib3 is &lt;1.24-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482534" version="1" comment="qemu-tools is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480917" version="1" comment="radvd is &lt;2.17-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482535" version="1" comment="rpcbind is &lt;0.2.3-5.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482536" version="1" comment="rpm is &lt;4.14.1-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482537" version="1" comment="rpm-32bit is &lt;4.14.1-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482538" version="1" comment="rpm-devel is &lt;4.14.1-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482539" version="1" comment="rsync is &lt;3.1.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482540" version="1" comment="rsyslog is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480921" version="1" comment="rzsz is &lt;0.12.21~rc-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480922" version="1" comment="screen is &lt;4.6.2-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482541" version="1" comment="shadow is &lt;4.6-3.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480924" version="1" comment="sharutils is &lt;4.15.2-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480925" version="1" comment="sharutils-lang is &lt;4.15.2-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482542" version="1" comment="shim is &lt;15+git47-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481656" version="1" comment="socat is &lt;1.7.3.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482543" version="1" comment="spectre-meltdown-checker is &lt;0.43-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480927" version="1" comment="squashfs is &lt;4.3-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482544" version="1" comment="strongswan is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482545" version="1" comment="strongswan-doc is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482546" version="1" comment="strongswan-hmac is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482547" version="1" comment="strongswan-ipsec is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482548" version="1" comment="strongswan-libs0 is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482549" version="1" comment="subversion is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482550" version="1" comment="subversion-devel is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482551" version="1" comment="sudo is &lt;1.8.22-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482552" version="1" comment="sudo-devel is &lt;1.8.22-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482553" version="1" comment="supportutils is &lt;3.1.9-5.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480939" version="1" comment="syslog-service is &lt;2.0-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482554" version="1" comment="sysstat is &lt;12.0.2-3.21.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480940" version="1" comment="sysvinit-tools is &lt;2.88+-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480941" version="1" comment="whois is &lt;5.3.0-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481663" version="1" comment="tar is &lt;1.30-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481664" version="1" comment="tar-lang is &lt;1.30-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481665" version="1" comment="tar-rmt is &lt;1.30-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482555" version="1" comment="tboot is &lt;20170711_1.9.8-13.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482556" version="1" comment="tcpdump is &lt;4.9.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482557" version="1" comment="tpm2.0-tools is &lt;4.1-1.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482558" version="1" comment="u-boot-rpiarm64 is &lt;2020.01-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482559" version="1" comment="u-boot-rpiarm64-doc is &lt;2020.01-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482560" version="1" comment="u-boot-tools is &lt;2020.01-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482561" version="1" comment="ucode-intel is &lt;20200602-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480950" version="1" comment="unixODBC is &lt;2.3.6-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480951" version="1" comment="unixODBC-devel is &lt;2.3.6-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481670" version="1" comment="unzip is &lt;6.00-4.8.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480953" version="1" comment="update-alternatives is &lt;1.19.0.4-2.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482562" version="1" comment="vim is &lt;8.0.1568-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482563" version="1" comment="vim-data is &lt;8.0.1568-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482564" version="1" comment="vim-data-common is &lt;8.0.1568-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480957" version="1" comment="w3m is &lt;0.5.3+git20180125-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482565" version="1" comment="wget is &lt;1.20.3-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482566" version="1" comment="wicked is &lt;0.6.63-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482567" version="1" comment="wicked-service is &lt;0.6.63-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482568" version="1" comment="wpa_supplicant is &lt;2.6-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482569" version="1" comment="xalan-j2 is &lt;2.7.2-9.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482570" version="1" comment="xdg-utils is &lt;1.1.3+20190413-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482571" version="1" comment="xen-libs is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482572" version="1" comment="xen-tools-domU is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480964" version="1" comment="xorg-x11 is &lt;7.6_1-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480965" version="1" comment="xorg-x11-essentials is &lt;7.6_1-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481675" version="1" comment="xrdb is &lt;1.1.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480967" version="1" comment="xorg-x11-devel is &lt;7.6.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480968" version="1" comment="xorg-x11-libs is &lt;7.6.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482573" version="1" comment="xorg-x11-server is &lt;1.20.3-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482574" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480971" version="1" comment="xscreensaver is &lt;5.37-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480972" version="1" comment="xscreensaver-data is &lt;5.37-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480973" version="1" comment="xscreensaver-lang is &lt;5.37-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482575" version="1" comment="yast2-buildtools is &lt;4.2.5-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482576" version="1" comment="yast2-devtools is &lt;4.2.5-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482577" version="1" comment="yast2-multipath is &lt;4.2.1-1.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482578" version="1" comment="yast2-security is &lt;4.2.12-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482579" version="1" comment="yast2-users is &lt;4.2.11-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481682" version="1" comment="yubikey-manager is &lt;2.1.0-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480979" version="1" comment="zoo is &lt;2.10-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481683" version="1" comment="zsh is &lt;5.6-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482580" version="1" comment="zypper is &lt;1.14.36-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482581" version="1" comment="zypper-log is &lt;1.14.36-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482582" version="1" comment="zypper-needs-restarting is &lt;1.14.36-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482595" version="1" comment="buildah is &lt;1.7.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287070" version="1" comment="sle-module-containers-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482596" version="1" comment="containerd is &lt;1.2.10-5.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482597" version="1" comment="docker is &lt;19.03.5_ce-6.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482598" version="1" comment="docker-bash-completion is &lt;19.03.5_ce-6.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482599" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2877_3eb39382bfa6-4.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482600" version="1" comment="helm-mirror is &lt;0.3.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482601" version="1" comment="docker-runc is &lt;1.0.0rc8+gitr3917_3e425f80a8c9-6.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482602" version="1" comment="runc is &lt;1.0.0~rc10-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482603" version="1" comment="podman is &lt;1.8.0-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482604" version="1" comment="podman-cni-config is &lt;1.8.0-4.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482605" version="1" comment="slirp4netns is &lt;0.4.5-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487172" version="1" comment="ImageMagick is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487173" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487174" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487175" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487176" version="1" comment="libMagick++-devel is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487177" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487178" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280223" version="1" comment="sle-module-desktop-applications-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487179" version="1" comment="MozillaFirefox is &lt;68.8.0-3.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487180" version="1" comment="MozillaFirefox-devel is &lt;68.8.0-3.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487181" version="1" comment="MozillaFirefox-translations-common is &lt;68.8.0-3.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487182" version="1" comment="MozillaFirefox-translations-other is &lt;68.8.0-3.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487183" version="1" comment="NetworkManager is &lt;1.22.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487184" version="1" comment="NetworkManager-devel is &lt;1.22.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487185" version="1" comment="PackageKit is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487186" version="1" comment="PackageKit-backend-zypp is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487187" version="1" comment="PackageKit-devel is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487188" version="1" comment="PackageKit-lang is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487189" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487190" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487191" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487192" version="1" comment="accountsservice is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487193" version="1" comment="accountsservice-devel is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487194" version="1" comment="accountsservice-lang is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487195" version="1" comment="libaccountsservice0 is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487196" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.55-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486590" version="1" comment="audiofile-devel is &lt;0.3.6-3.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486591" version="1" comment="libaudiofile1 is &lt;0.3.6-3.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486592" version="1" comment="avahi-autoipd is &lt;0.7-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487197" version="1" comment="bluez-devel is &lt;5.48-11.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487198" version="1" comment="conky is &lt;1.11.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487199" version="1" comment="conky-doc is &lt;1.11.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487200" version="1" comment="vim-plugin-conky is &lt;1.11.5-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482654" version="1" comment="cups-pk-helper is &lt;0.2.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482655" version="1" comment="cups-pk-helper-lang is &lt;0.2.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486596" version="1" comment="emacs-x11 is &lt;25.3-3.3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487201" version="1" comment="eog is &lt;3.34.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487202" version="1" comment="eog-devel is &lt;3.34.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487203" version="1" comment="eog-lang is &lt;3.34.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487204" version="1" comment="evince is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487205" version="1" comment="evince-devel is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487206" version="1" comment="evince-lang is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487207" version="1" comment="evince-plugin-djvudocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487208" version="1" comment="evince-plugin-dvidocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487209" version="1" comment="evince-plugin-pdfdocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487210" version="1" comment="evince-plugin-psdocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487211" version="1" comment="evince-plugin-tiffdocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487212" version="1" comment="evince-plugin-xpsdocument is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487213" version="1" comment="libevdocument3-4 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487214" version="1" comment="libevview3-3 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487215" version="1" comment="nautilus-evince is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487216" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487217" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.34.2-1.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482674" version="1" comment="fetchmailconf is &lt;6.3.26-3.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487218" version="1" comment="file-roller is &lt;3.32.5-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487219" version="1" comment="file-roller-lang is &lt;3.32.5-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486597" version="1" comment="firewall-applet is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486598" version="1" comment="firewall-config is &lt;0.5.5-4.24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487220" version="1" comment="flatpak is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487221" version="1" comment="flatpak-devel is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487222" version="1" comment="flatpak-zsh-completion is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487223" version="1" comment="libflatpak0 is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487224" version="1" comment="system-user-flatpak is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487225" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.6.3-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487226" version="1" comment="fontforge is &lt;20200314-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487227" version="1" comment="fwupd is &lt;1.2.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487228" version="1" comment="fwupd-devel is &lt;1.2.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487229" version="1" comment="fwupd-lang is &lt;1.2.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487230" version="1" comment="libfwupd2 is &lt;1.2.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487231" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.2.11-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482681" version="1" comment="gcab is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482682" version="1" comment="gcab-devel is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482683" version="1" comment="gcab-lang is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482684" version="1" comment="libgcab-1_0-0 is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482685" version="1" comment="typelib-1_0-GCab-1_0 is &lt;1.1-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487232" version="1" comment="gd is &lt;2.2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487233" version="1" comment="gd-devel is &lt;2.2.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487234" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487235" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.40.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487236" version="1" comment="gdm is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487237" version="1" comment="gdm-devel is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487238" version="1" comment="gdm-lang is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487239" version="1" comment="gdm-systemd is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487240" version="1" comment="gdmflexiserver is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487241" version="1" comment="libgdm1 is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487242" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.34.1-6.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487243" version="1" comment="gnome-desktop-lang is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487244" version="1" comment="gnome-version is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487245" version="1" comment="libgnome-desktop-3-18 is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487246" version="1" comment="libgnome-desktop-3-devel is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487247" version="1" comment="libgnome-desktop-3_0-common is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487248" version="1" comment="typelib-1_0-GnomeDesktop-3_0 is &lt;3.34.4-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487249" version="1" comment="gnome-settings-daemon is &lt;3.34.2+0-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487250" version="1" comment="gnome-settings-daemon-devel is &lt;3.34.2+0-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487251" version="1" comment="gnome-settings-daemon-lang is &lt;3.34.2+0-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487252" version="1" comment="gnome-shell is &lt;3.34.4+4-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487253" version="1" comment="gnome-shell-devel is &lt;3.34.4+4-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487254" version="1" comment="gnome-shell-lang is &lt;3.34.4+4-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487255" version="1" comment="gnome-shell-search-provider-nautilus is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487256" version="1" comment="libnautilus-extension1 is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487257" version="1" comment="nautilus is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487258" version="1" comment="nautilus-devel is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487259" version="1" comment="nautilus-lang is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487260" version="1" comment="typelib-1_0-Nautilus-3_0 is &lt;3.34.2-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487261" version="1" comment="gstreamer-devel is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487262" version="1" comment="gstreamer-utils is &lt;1.16.2-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487263" version="1" comment="gstreamer-plugins-bad is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487264" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487265" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487266" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487267" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487268" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487269" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487270" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487271" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487272" version="1" comment="libgstisoff-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487273" version="1" comment="libgstmpegts-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487274" version="1" comment="libgstplayer-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487275" version="1" comment="libgstsctp-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487276" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487277" version="1" comment="libgstwayland-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487278" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487279" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487280" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487281" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487282" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.16.2-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487283" version="1" comment="gstreamer-plugins-base-devel is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487284" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487285" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487286" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487287" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487288" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487289" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487290" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487291" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487292" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487293" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.2-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487294" version="1" comment="gtk2-data is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487295" version="1" comment="gtk2-tools-32bit is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487296" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.32+67-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487297" version="1" comment="gvfs is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487298" version="1" comment="gvfs-backend-afc is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487299" version="1" comment="gvfs-backend-samba is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487300" version="1" comment="gvfs-backends is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487301" version="1" comment="gvfs-devel is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487302" version="1" comment="gvfs-fuse is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487303" version="1" comment="gvfs-lang is &lt;1.42.2-4.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487304" version="1" comment="gvim is &lt;8.0.1568-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487305" version="1" comment="hplip is &lt;3.19.12-1.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487306" version="1" comment="ibus is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487307" version="1" comment="ibus-devel is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487308" version="1" comment="ibus-dict-emoji is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487309" version="1" comment="ibus-gtk is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487310" version="1" comment="ibus-gtk3 is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487311" version="1" comment="ibus-lang is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487312" version="1" comment="libibus-1_0-5 is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487313" version="1" comment="typelib-1_0-IBus-1_0 is &lt;1.5.22-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487314" version="1" comment="ibus-chewing is &lt;1.6.1-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486644" version="1" comment="ibus-pinyin is &lt;1.5.0-4.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487315" version="1" comment="imlib2-loaders is &lt;1.4.10-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487316" version="1" comment="libImlib2-1 is &lt;1.4.10-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482742" version="1" comment="libICE6-32bit is &lt;1.0.9-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487317" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487318" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487319" version="1" comment="openexr-devel is &lt;2.2.1-3.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487320" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487321" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487322" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487323" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487324" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486653" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486654" version="1" comment="libSDL-devel is &lt;1.2.15-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487325" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-9.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487326" version="1" comment="libSDL2-devel is &lt;2.0.8-9.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486657" version="1" comment="libSoundTouch0 is &lt;1.8.0-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486658" version="1" comment="soundtouch-devel is &lt;1.8.0-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482753" version="1" comment="libXcursor1-32bit is &lt;1.1.15-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482755" version="1" comment="libXinerama1-32bit is &lt;1.1.3-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482756" version="1" comment="libXp6-32bit is &lt;1.0.3-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482757" version="1" comment="libXrandr2-32bit is &lt;1.5.1-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482758" version="1" comment="libXt6-32bit is &lt;1.1.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487327" version="1" comment="libXvnc-devel is &lt;1.9.0-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482760" version="1" comment="libass-devel is &lt;0.14.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482761" version="1" comment="libass9 is &lt;0.14.0-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487328" version="1" comment="libavcodec57 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487329" version="1" comment="libavformat57 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487330" version="1" comment="libavutil-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487331" version="1" comment="libavutil55 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487332" version="1" comment="libpostproc-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487333" version="1" comment="libpostproc54 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487334" version="1" comment="libswresample-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487335" version="1" comment="libswresample2 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487336" version="1" comment="libswscale-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487337" version="1" comment="libswscale4 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487338" version="1" comment="libcairo2-32bit is &lt;1.16.0-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487339" version="1" comment="libcdio++0 is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487340" version="1" comment="libcdio-devel is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487341" version="1" comment="libcdio16 is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487342" version="1" comment="libiso9660-10 is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487343" version="1" comment="libudf0 is &lt;0.94-6.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482645" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482646" version="1" comment="libcolord-gtk1 is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482649" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487344" version="1" comment="libdjvulibre-devel is &lt;3.5.27-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487345" version="1" comment="libdjvulibre21 is &lt;3.5.27-9.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487346" version="1" comment="libexempi-devel is &lt;2.4.5-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487347" version="1" comment="libexempi3 is &lt;2.4.5-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487348" version="1" comment="libexif-devel is &lt;0.6.21-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487349" version="1" comment="libexif12 is &lt;0.6.21-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487350" version="1" comment="libexiv2-26 is &lt;0.26-6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487351" version="1" comment="libexiv2-devel is &lt;0.26-6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482784" version="1" comment="libgme-devel is &lt;0.6.2-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482785" version="1" comment="libgme0 is &lt;0.6.2-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486677" version="1" comment="libgxps-devel is &lt;0.3.0-4.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486678" version="1" comment="libgxps2 is &lt;0.3.0-4.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486679" version="1" comment="typelib-1_0-GXPS-0_1 is &lt;0.3.0-4.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482791" version="1" comment="libgypsy-devel is &lt;0.9-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482792" version="1" comment="libgypsy0 is &lt;0.9-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487352" version="1" comment="libical-devel is &lt;3.0.6-2.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487353" version="1" comment="libid3tag0 is &lt;0.15.1b-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487354" version="1" comment="libimobiledevice-devel is &lt;1.2.0+git20180427.26373b3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487355" version="1" comment="libimobiledevice6 is &lt;1.2.0+git20180427.26373b3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486509" version="1" comment="libusbmuxd-devel is &lt;1.0.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486510" version="1" comment="libusbmuxd4 is &lt;1.0.10-3.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487356" version="1" comment="libjasper-devel is &lt;2.0.14-3.11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482799" version="1" comment="libjbig2-32bit is &lt;2.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487357" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487358" version="1" comment="libkpathsea6 is &lt;6.2.3-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487359" version="1" comment="libptexenc1 is &lt;1.3.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487360" version="1" comment="libsynctex1 is &lt;1.18-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487361" version="1" comment="libtexlua52-5 is &lt;5.2.4-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487362" version="1" comment="libtexluajit2 is &lt;2.1.0beta2-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487363" version="1" comment="perl-biber is &lt;2017.20170520.svn30357-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487364" version="1" comment="texlive is &lt;2017.20170520-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487365" version="1" comment="texlive-a2ping-bin is &lt;2017.20170520.svn27321-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487366" version="1" comment="texlive-accfonts-bin is &lt;2017.20170520.svn12688-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487367" version="1" comment="texlive-adhocfilelist-bin is &lt;2017.20170520.svn28038-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487368" version="1" comment="texlive-afm2pl-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487369" version="1" comment="texlive-aleph-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487370" version="1" comment="texlive-amstex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487371" version="1" comment="texlive-arara-bin is &lt;2017.20170520.svn29036-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487372" version="1" comment="texlive-asymptote-bin is &lt;2017.20170520.svn43843-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487373" version="1" comment="texlive-authorindex-bin is &lt;2017.20170520.svn18790-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487374" version="1" comment="texlive-autosp-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487375" version="1" comment="texlive-biber-bin is &lt;2017.20170520.svn42679-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487376" version="1" comment="texlive-bibexport-bin is &lt;2017.20170520.svn16219-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487377" version="1" comment="texlive-bibtex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487378" version="1" comment="texlive-bibtex8-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487379" version="1" comment="texlive-bibtexu-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487380" version="1" comment="texlive-bin-devel is &lt;2017.20170520-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487381" version="1" comment="texlive-bundledoc-bin is &lt;2017.20170520.svn17794-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487382" version="1" comment="texlive-cachepic-bin is &lt;2017.20170520.svn15543-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487383" version="1" comment="texlive-checkcites-bin is &lt;2017.20170520.svn25623-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487384" version="1" comment="texlive-checklistings-bin is &lt;2017.20170520.svn38300-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487385" version="1" comment="texlive-chktex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487386" version="1" comment="texlive-cjk-gs-integrate-bin is &lt;2017.20170520.svn37223-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487387" version="1" comment="texlive-cjkutils-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487388" version="1" comment="texlive-context-bin is &lt;2017.20170520.svn34112-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487389" version="1" comment="texlive-convbkmk-bin is &lt;2017.20170520.svn30408-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487390" version="1" comment="texlive-crossrefware-bin is &lt;2017.20170520.svn43866-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487391" version="1" comment="texlive-cslatex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487392" version="1" comment="texlive-csplain-bin is &lt;2017.20170520.svn33902-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487393" version="1" comment="texlive-ctanify-bin is &lt;2017.20170520.svn24061-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487394" version="1" comment="texlive-ctanupload-bin is &lt;2017.20170520.svn23866-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487395" version="1" comment="texlive-ctie-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487396" version="1" comment="texlive-cweb-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487397" version="1" comment="texlive-cyrillic-bin-bin is &lt;2017.20170520.svn29741-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487398" version="1" comment="texlive-de-macro-bin is &lt;2017.20170520.svn17399-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487399" version="1" comment="texlive-detex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487400" version="1" comment="texlive-diadia-bin is &lt;2017.20170520.svn37645-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487401" version="1" comment="texlive-dosepsbin-bin is &lt;2017.20170520.svn24759-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487402" version="1" comment="texlive-dtl-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487403" version="1" comment="texlive-dtxgen-bin is &lt;2017.20170520.svn29031-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487404" version="1" comment="texlive-dviasm-bin is &lt;2017.20170520.svn8329-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487405" version="1" comment="texlive-dvicopy-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487406" version="1" comment="texlive-dvidvi-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487407" version="1" comment="texlive-dviinfox-bin is &lt;2017.20170520.svn44515-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487408" version="1" comment="texlive-dviljk-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487409" version="1" comment="texlive-dvipdfmx-bin is &lt;2017.20170520.svn40273-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487410" version="1" comment="texlive-dvipng-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487411" version="1" comment="texlive-dvipos-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487412" version="1" comment="texlive-dvips-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487413" version="1" comment="texlive-dvisvgm-bin is &lt;2017.20170520.svn40987-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487414" version="1" comment="texlive-ebong-bin is &lt;2017.20170520.svn21000-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487415" version="1" comment="texlive-eplain-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487416" version="1" comment="texlive-epspdf-bin is &lt;2017.20170520.svn29050-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487417" version="1" comment="texlive-epstopdf-bin is &lt;2017.20170520.svn18336-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487418" version="1" comment="texlive-exceltex-bin is &lt;2017.20170520.svn25860-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487419" version="1" comment="texlive-fig4latex-bin is &lt;2017.20170520.svn14752-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487420" version="1" comment="texlive-findhyph-bin is &lt;2017.20170520.svn14758-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487421" version="1" comment="texlive-fontinst-bin is &lt;2017.20170520.svn29741-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487422" version="1" comment="texlive-fontools-bin is &lt;2017.20170520.svn25997-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487423" version="1" comment="texlive-fontware-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487424" version="1" comment="texlive-fragmaster-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487425" version="1" comment="texlive-getmap-bin is &lt;2017.20170520.svn34971-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487426" version="1" comment="texlive-glossaries-bin is &lt;2017.20170520.svn37813-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487427" version="1" comment="texlive-gregoriotex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487428" version="1" comment="texlive-gsftopk-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487429" version="1" comment="texlive-jadetex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487430" version="1" comment="texlive-kotex-utils-bin is &lt;2017.20170520.svn32101-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487431" version="1" comment="texlive-kpathsea-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487432" version="1" comment="texlive-kpathsea-devel is &lt;6.2.3-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487433" version="1" comment="texlive-lacheck-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487434" version="1" comment="texlive-latex-bin-bin is &lt;2017.20170520.svn14050-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487435" version="1" comment="texlive-latex-git-log-bin is &lt;2017.20170520.svn30983-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487436" version="1" comment="texlive-latex-papersize-bin is &lt;2017.20170520.svn42296-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487437" version="1" comment="texlive-latex2man-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487438" version="1" comment="texlive-latex2nemeth-bin is &lt;2017.20170520.svn42300-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487439" version="1" comment="texlive-latexdiff-bin is &lt;2017.20170520.svn16420-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487440" version="1" comment="texlive-latexfileversion-bin is &lt;2017.20170520.svn25012-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487441" version="1" comment="texlive-latexindent-bin is &lt;2017.20170520.svn32150-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487442" version="1" comment="texlive-latexmk-bin is &lt;2017.20170520.svn10937-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487443" version="1" comment="texlive-latexpand-bin is &lt;2017.20170520.svn27025-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487444" version="1" comment="texlive-lcdftypetools-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487445" version="1" comment="texlive-lilyglyphs-bin is &lt;2017.20170520.svn31696-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487446" version="1" comment="texlive-listbib-bin is &lt;2017.20170520.svn26126-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487447" version="1" comment="texlive-listings-ext-bin is &lt;2017.20170520.svn15093-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487448" version="1" comment="texlive-lollipop-bin is &lt;2017.20170520.svn41465-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487449" version="1" comment="texlive-ltxfileinfo-bin is &lt;2017.20170520.svn29005-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487450" version="1" comment="texlive-ltximg-bin is &lt;2017.20170520.svn32346-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487451" version="1" comment="texlive-lua2dox-bin is &lt;2017.20170520.svn29053-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487452" version="1" comment="texlive-luaotfload-bin is &lt;2017.20170520.svn34647-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487453" version="1" comment="texlive-luatex-bin is &lt;2017.20170520.svn44549-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487454" version="1" comment="texlive-lwarp-bin is &lt;2017.20170520.svn43292-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487455" version="1" comment="texlive-m-tx-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487456" version="1" comment="texlive-make4ht-bin is &lt;2017.20170520.svn37750-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487457" version="1" comment="texlive-makedtx-bin is &lt;2017.20170520.svn38769-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487458" version="1" comment="texlive-makeindex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487459" version="1" comment="texlive-match_parens-bin is &lt;2017.20170520.svn23500-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487460" version="1" comment="texlive-mathspic-bin is &lt;2017.20170520.svn23661-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487461" version="1" comment="texlive-metafont-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487462" version="1" comment="texlive-metapost-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487463" version="1" comment="texlive-mex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487464" version="1" comment="texlive-mf2pt1-bin is &lt;2017.20170520.svn23406-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487465" version="1" comment="texlive-mflua-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487466" version="1" comment="texlive-mfware-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487467" version="1" comment="texlive-mkgrkindex-bin is &lt;2017.20170520.svn14428-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487468" version="1" comment="texlive-mkjobtexmf-bin is &lt;2017.20170520.svn8457-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487469" version="1" comment="texlive-mkpic-bin is &lt;2017.20170520.svn33688-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487470" version="1" comment="texlive-mltex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487471" version="1" comment="texlive-mptopdf-bin is &lt;2017.20170520.svn18674-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487472" version="1" comment="texlive-multibibliography-bin is &lt;2017.20170520.svn30534-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487473" version="1" comment="texlive-musixtex-bin is &lt;2017.20170520.svn37026-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487474" version="1" comment="texlive-musixtnt-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487475" version="1" comment="texlive-omegaware-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487476" version="1" comment="texlive-patgen-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487477" version="1" comment="texlive-pax-bin is &lt;2017.20170520.svn10843-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487478" version="1" comment="texlive-pdfbook2-bin is &lt;2017.20170520.svn37537-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487479" version="1" comment="texlive-pdfcrop-bin is &lt;2017.20170520.svn14387-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487480" version="1" comment="texlive-pdfjam-bin is &lt;2017.20170520.svn17868-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487481" version="1" comment="texlive-pdflatexpicscale-bin is &lt;2017.20170520.svn41779-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487482" version="1" comment="texlive-pdftex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487483" version="1" comment="texlive-pdftools-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487484" version="1" comment="texlive-pdfxup-bin is &lt;2017.20170520.svn40690-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487485" version="1" comment="texlive-pedigree-perl-bin is &lt;2017.20170520.svn25962-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487486" version="1" comment="texlive-perltex-bin is &lt;2017.20170520.svn16181-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487487" version="1" comment="texlive-petri-nets-bin is &lt;2017.20170520.svn39165-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487488" version="1" comment="texlive-pfarrei-bin is &lt;2017.20170520.svn29348-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487489" version="1" comment="texlive-pkfix-bin is &lt;2017.20170520.svn13364-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487490" version="1" comment="texlive-pkfix-helper-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487491" version="1" comment="texlive-platex-bin is &lt;2017.20170520.svn22859-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487492" version="1" comment="texlive-pmx-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487493" version="1" comment="texlive-pmxchords-bin is &lt;2017.20170520.svn32405-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487494" version="1" comment="texlive-ps2pk-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487495" version="1" comment="texlive-pst-pdf-bin is &lt;2017.20170520.svn7838-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487496" version="1" comment="texlive-pst2pdf-bin is &lt;2017.20170520.svn29333-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487497" version="1" comment="texlive-pstools-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487498" version="1" comment="texlive-ptex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487499" version="1" comment="texlive-ptex-fontmaps-bin is &lt;2017.20170520.svn44206-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487500" version="1" comment="texlive-ptex2pdf-bin is &lt;2017.20170520.svn29335-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487501" version="1" comment="texlive-ptexenc-devel is &lt;1.3.5-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487502" version="1" comment="texlive-purifyeps-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487503" version="1" comment="texlive-pygmentex-bin is &lt;2017.20170520.svn34996-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487504" version="1" comment="texlive-pythontex-bin is &lt;2017.20170520.svn31638-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487505" version="1" comment="texlive-rubik-bin is &lt;2017.20170520.svn32919-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487506" version="1" comment="texlive-seetexk-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487507" version="1" comment="texlive-splitindex-bin is &lt;2017.20170520.svn29688-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487508" version="1" comment="texlive-srcredact-bin is &lt;2017.20170520.svn38710-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487509" version="1" comment="texlive-sty2dtx-bin is &lt;2017.20170520.svn21215-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487510" version="1" comment="texlive-svn-multi-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487511" version="1" comment="texlive-synctex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487512" version="1" comment="texlive-synctex-devel is &lt;1.18-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487513" version="1" comment="texlive-tetex-bin is &lt;2017.20170520.svn43957-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487514" version="1" comment="texlive-tex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487515" version="1" comment="texlive-tex4ebook-bin is &lt;2017.20170520.svn37771-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487516" version="1" comment="texlive-tex4ht-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487517" version="1" comment="texlive-texconfig-bin is &lt;2017.20170520.svn29741-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487518" version="1" comment="texlive-texcount-bin is &lt;2017.20170520.svn13013-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487519" version="1" comment="texlive-texdef-bin is &lt;2017.20170520.svn21802-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487520" version="1" comment="texlive-texdiff-bin is &lt;2017.20170520.svn15506-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487521" version="1" comment="texlive-texdirflatten-bin is &lt;2017.20170520.svn12782-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487522" version="1" comment="texlive-texdoc-bin is &lt;2017.20170520.svn29741-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487523" version="1" comment="texlive-texfot-bin is &lt;2017.20170520.svn33155-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487524" version="1" comment="texlive-texliveonfly-bin is &lt;2017.20170520.svn24062-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487525" version="1" comment="texlive-texloganalyser-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487526" version="1" comment="texlive-texlua-devel is &lt;5.2.4-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487527" version="1" comment="texlive-texluajit-devel is &lt;2.1.0beta2-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487528" version="1" comment="texlive-texosquery-bin is &lt;2017.20170520.svn43596-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487529" version="1" comment="texlive-texsis-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487530" version="1" comment="texlive-texware-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487531" version="1" comment="texlive-thumbpdf-bin is &lt;2017.20170520.svn6898-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487532" version="1" comment="texlive-tie-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487533" version="1" comment="texlive-tpic2pdftex-bin is &lt;2017.20170520.svn29741-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487534" version="1" comment="texlive-ttfutils-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487535" version="1" comment="texlive-typeoutfileinfo-bin is &lt;2017.20170520.svn25648-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487536" version="1" comment="texlive-ulqda-bin is &lt;2017.20170520.svn13663-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487537" version="1" comment="texlive-uplatex-bin is &lt;2017.20170520.svn26326-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487538" version="1" comment="texlive-uptex-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487539" version="1" comment="texlive-urlbst-bin is &lt;2017.20170520.svn23262-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487540" version="1" comment="texlive-velthuis-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487541" version="1" comment="texlive-vlna-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487542" version="1" comment="texlive-vpe-bin is &lt;2017.20170520.svn6897-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487543" version="1" comment="texlive-web-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487544" version="1" comment="texlive-xdvi-bin is &lt;2017.20170520.svn44143-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487545" version="1" comment="texlive-xetex-bin is &lt;2017.20170520.svn44361-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487546" version="1" comment="texlive-xmltex-bin is &lt;2017.20170520.svn3006-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487547" version="1" comment="texlive-yplan-bin is &lt;2017.20170520.svn34398-19.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487548" version="1" comment="liblouis-data is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487549" version="1" comment="liblouis-devel is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487550" version="1" comment="liblouis19 is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487551" version="1" comment="python3-louis is &lt;3.11.0-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486458" version="1" comment="libmad-devel is &lt;0.15.1b-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486459" version="1" comment="libmad0 is &lt;0.15.1b-3.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486460" version="1" comment="libmicrohttpd-devel is &lt;0.9.57-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486461" version="1" comment="libmms-devel is &lt;0.6.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486462" version="1" comment="libmms0 is &lt;0.6.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487552" version="1" comment="libmodplug-devel is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487553" version="1" comment="libmodplug1 is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487554" version="1" comment="libopenmpt-devel is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487555" version="1" comment="libopenmpt0 is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487556" version="1" comment="libopenmpt_modplug1 is &lt;0.3.19-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486468" version="1" comment="libmp3lame-devel is &lt;3.100-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486473" version="1" comment="libndp-devel is &lt;1.6-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486474" version="1" comment="libndp0 is &lt;1.6-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487557" version="1" comment="libnetpbm-devel is &lt;10.80.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487558" version="1" comment="libnma-devel is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487559" version="1" comment="libnma0 is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487560" version="1" comment="nma-data is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487561" version="1" comment="typelib-1_0-NMA-1_0 is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486482" version="1" comment="libopenjpeg1 is &lt;1.5.2-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486483" version="1" comment="openjpeg-devel is &lt;1.5.2-2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487562" version="1" comment="libopus-devel is &lt;1.3.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486469" version="1" comment="libout123-0 is &lt;1.25.10-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486470" version="1" comment="mpg123 is &lt;1.25.10-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486471" version="1" comment="mpg123-devel is &lt;1.25.10-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486472" version="1" comment="mpg123-pulse is &lt;1.25.10-1.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487563" version="1" comment="libpango-1_0-0-32bit is &lt;1.44.7+11-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486486" version="1" comment="libplist++-devel is &lt;2.0.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486487" version="1" comment="libplist++3 is &lt;2.0.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486488" version="1" comment="libplist-devel is &lt;2.0.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486489" version="1" comment="libplist3 is &lt;2.0.0-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486490" version="1" comment="libpotrace0 is &lt;1.15-3.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487564" version="1" comment="libquicktime is &lt;1.2.4+git20180804.fff99cd-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487565" version="1" comment="libquicktime-devel is &lt;1.2.4+git20180804.fff99cd-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487566" version="1" comment="libquicktime0 is &lt;1.2.4+git20180804.fff99cd-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487567" version="1" comment="libraptor-devel is &lt;2.0.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487568" version="1" comment="libraptor2-0 is &lt;2.0.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487569" version="1" comment="raptor is &lt;2.0.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487570" version="1" comment="librsvg-devel is &lt;2.46.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487571" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.46.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486499" version="1" comment="libsmi-devel is &lt;0.4.8-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487572" version="1" comment="libsoup-devel is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487573" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.68.3-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487574" version="1" comment="libsrt1 is &lt;1.3.4-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486502" version="1" comment="libsrtp-devel is &lt;1.6.0-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486503" version="1" comment="libsrtp1 is &lt;1.6.0-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487575" version="1" comment="libsrtp2-1 is &lt;2.2.0-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487576" version="1" comment="libtag-devel is &lt;1.11.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487577" version="1" comment="libtag_c0 is &lt;1.11.1-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486507" version="1" comment="libthai0-32bit is &lt;0.1.27-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486885" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486511" version="1" comment="libvdpau-devel is &lt;1.1.1-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486512" version="1" comment="libvdpau1 is &lt;1.1.1-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487578" version="1" comment="libvpx-devel is &lt;1.6.1-6.6.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487579" version="1" comment="libwebp-devel is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487580" version="1" comment="libwebpdecoder3 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487581" version="1" comment="libwebpmux3 is &lt;1.0.3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486886" version="1" comment="libxcb-render0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486887" version="1" comment="libxcb-shm0-32bit is &lt;1.13-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486516" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486517" version="1" comment="yaml-cpp-devel is &lt;0.6.1-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486518" version="1" comment="newt-devel is &lt;0.52.20-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487582" version="1" comment="open-vm-tools-desktop is &lt;11.1.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486521" version="1" comment="perl-File-Path is &lt;2.150000-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486522" version="1" comment="perl-MIME-Charset is &lt;1.012.2-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487583" version="1" comment="ppp is &lt;2.4.7-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487584" version="1" comment="ppp-devel is &lt;2.4.7-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487585" version="1" comment="python-tk is &lt;2.7.17-7.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486537" version="1" comment="python3-bottle is &lt;0.12.13-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486538" version="1" comment="python3-cupshelpers is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486539" version="1" comment="system-config-printer-common is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486540" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486541" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486542" version="1" comment="udev-configure-printer is &lt;1.5.7-6.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486543" version="1" comment="rtkit is &lt;0.11+git.20130926-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486544" version="1" comment="sane-backends is &lt;1.0.27-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486545" version="1" comment="sane-backends-autoconfig is &lt;1.0.27-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486546" version="1" comment="sane-backends-devel is &lt;1.0.27-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487586" version="1" comment="spice-vdagent is &lt;0.19.0-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482808" version="1" comment="texlive-12many is &lt;2017.133.0.0.3svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482809" version="1" comment="texlive-2up is &lt;2017.133.1.2svn41578-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482810" version="1" comment="texlive-Asana-Math is &lt;2017.133.0.000.955svn37556-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482811" version="1" comment="texlive-Asana-Math-fonts is &lt;2017.133.0.000.955svn37556-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482812" version="1" comment="texlive-ESIEEcv is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482813" version="1" comment="texlive-FAQ-en is &lt;2017.133.3.28svn34303-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482814" version="1" comment="texlive-GS1 is &lt;2017.133.15svn27540-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482815" version="1" comment="texlive-HA-prosper is &lt;2017.133.4.21svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482816" version="1" comment="texlive-IEEEconf is &lt;2017.133.1.4svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482817" version="1" comment="texlive-IEEEtran is &lt;2017.133.1.8bsvn38238-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482818" version="1" comment="texlive-MemoirChapStyles is &lt;2017.133.1.7esvn25918-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482819" version="1" comment="texlive-SIstyle is &lt;2017.133.2.3asvn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482820" version="1" comment="texlive-SIunits is &lt;2017.133.1.36svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482821" version="1" comment="texlive-Tabbing is &lt;2017.133.svn17022-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482822" version="1" comment="texlive-Type1fonts is &lt;2017.133.2.14svn19603-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482823" version="1" comment="texlive-a0poster is &lt;2017.133.1.22bsvn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482824" version="1" comment="texlive-a2ping is &lt;2017.133.svn29725-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482826" version="1" comment="texlive-a4wide is &lt;2017.133.svn20943-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482827" version="1" comment="texlive-a5comb is &lt;2017.133.4svn17020-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482828" version="1" comment="texlive-aastex is &lt;2017.133.6.0svn39929-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482829" version="1" comment="texlive-abbr is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482830" version="1" comment="texlive-abc is &lt;2017.133.2.0bsvn41157-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482831" version="1" comment="texlive-abntex2 is &lt;2017.133.1.9.6svn39913-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482832" version="1" comment="texlive-abraces is &lt;2017.133.1._svn27880-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482833" version="1" comment="texlive-abstract is &lt;2017.133.1.2asvn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482834" version="1" comment="texlive-abstyles is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482835" version="1" comment="texlive-academicons is &lt;2017.133.1.8.0svn44380-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482836" version="1" comment="texlive-academicons-fonts is &lt;2017.133.1.8.0svn44380-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482837" version="1" comment="texlive-accanthis is &lt;2017.133.svn32089-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482838" version="1" comment="texlive-accanthis-fonts is &lt;2017.133.svn32089-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482839" version="1" comment="texlive-accfonts is &lt;2017.133.0.0.25svn18835-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482841" version="1" comment="texlive-achemso is &lt;2017.133.3.10isvn44425-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482842" version="1" comment="texlive-acmart is &lt;2017.133.1.39svn44367-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482843" version="1" comment="texlive-acmconf is &lt;2017.133.1.3svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482844" version="1" comment="texlive-acro is &lt;2017.133.2.7asvn43186-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482845" version="1" comment="texlive-acronym is &lt;2017.133.1.41svn36582-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482846" version="1" comment="texlive-acroterm is &lt;2017.133.0.0.1svn20498-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482847" version="1" comment="texlive-active-conf is &lt;2017.133.0.0.3asvn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482848" version="1" comment="texlive-actuarialangle is &lt;2017.133.2.0svn43751-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482849" version="1" comment="texlive-actuarialsymbol is &lt;2017.133.1.0svn43768-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482850" version="1" comment="texlive-addfont is &lt;2017.133.1svn41972-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482851" version="1" comment="texlive-addlines is &lt;2017.133.0.0.2asvn37805-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482852" version="1" comment="texlive-adfathesis is &lt;2017.133.2.42svn26048-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482853" version="1" comment="texlive-adforn is &lt;2017.133.1.001_b_2svn20019-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482854" version="1" comment="texlive-adforn-fonts is &lt;2017.133.1.001_b_2svn20019-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482855" version="1" comment="texlive-adfsymbols is &lt;2017.133.1.001svn19766-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482856" version="1" comment="texlive-adfsymbols-fonts is &lt;2017.133.1.001svn19766-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482857" version="1" comment="texlive-adhocfilelist is &lt;2017.133.svn29349-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482859" version="1" comment="texlive-adjmulticol is &lt;2017.133.1.1svn28936-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482860" version="1" comment="texlive-adjustbox is &lt;2017.133.1.0svn26555-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482861" version="1" comment="texlive-adobemapping is &lt;2017.133.svn44085-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482862" version="1" comment="texlive-adrconv is &lt;2017.133.1.3svn17683-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482863" version="1" comment="texlive-adtrees is &lt;2017.133.1.0svn39438-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482864" version="1" comment="texlive-advdate is &lt;2017.133.svn20538-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482865" version="1" comment="texlive-ae is &lt;2017.133.1.4svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482866" version="1" comment="texlive-aecc is &lt;2017.133.1.0svn28574-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482867" version="1" comment="texlive-aeguill is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482868" version="1" comment="texlive-afm2pl is &lt;2017.133.svn44166-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482870" version="1" comment="texlive-afparticle is &lt;2017.133.1.3svn35900-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482871" version="1" comment="texlive-afthesis is &lt;2017.133.2.7svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482872" version="1" comment="texlive-aguplus is &lt;2017.133.1.6bsvn17156-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482873" version="1" comment="texlive-aiaa is &lt;2017.133.3.6svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482874" version="1" comment="texlive-aichej is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482875" version="1" comment="texlive-ajl is &lt;2017.133.svn34016-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482876" version="1" comment="texlive-akktex is &lt;2017.133.0.0.3.2svn26055-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482877" version="1" comment="texlive-akletter is &lt;2017.133.1.5isvn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482878" version="1" comment="texlive-alegreya is &lt;2017.133.svn42077-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482879" version="1" comment="texlive-alegreya-fonts is &lt;2017.133.svn42077-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482880" version="1" comment="texlive-aleph is &lt;2017.133.svn44166-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482882" version="1" comment="texlive-alertmessage is &lt;2017.133.1.1svn38055-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482883" version="1" comment="texlive-alg is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482884" version="1" comment="texlive-algorithm2e is &lt;2017.133.5.1svn38805-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482885" version="1" comment="texlive-algorithmicx is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482886" version="1" comment="texlive-algorithms is &lt;2017.133.0.0.1svn42428-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482887" version="1" comment="texlive-alkalami is &lt;2017.133.1.000svn44497-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482888" version="1" comment="texlive-alkalami-fonts is &lt;2017.133.1.000svn44497-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482889" version="1" comment="texlive-allrunes is &lt;2017.133.2.1.1svn42221-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482890" version="1" comment="texlive-allrunes-fonts is &lt;2017.133.2.1.1svn42221-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482891" version="1" comment="texlive-almfixed is &lt;2017.133.0.0.92svn35065-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482892" version="1" comment="texlive-almfixed-fonts is &lt;2017.133.0.0.92svn35065-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482893" version="1" comment="texlive-alnumsec is &lt;2017.133.0.0.03svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482894" version="1" comment="texlive-alterqcm is &lt;2017.133.3.7csvn23385-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482895" version="1" comment="texlive-altfont is &lt;2017.133.1.1svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482896" version="1" comment="texlive-ametsoc is &lt;2017.133.4.3.2svn36030-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482897" version="1" comment="texlive-amiri is &lt;2017.133.0.0.109svn44303-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482898" version="1" comment="texlive-amiri-fonts is &lt;2017.133.0.0.109svn44303-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482899" version="1" comment="texlive-amsaddr is &lt;2017.133.1.1svn29630-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482900" version="1" comment="texlive-amscls is &lt;2017.133.svn36804-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482901" version="1" comment="texlive-amsfonts is &lt;2017.133.3.04svn29208-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482902" version="1" comment="texlive-amsfonts-fonts is &lt;2017.133.3.04svn29208-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482903" version="1" comment="texlive-amslatex-primer is &lt;2017.133.2.3svn28980-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482904" version="1" comment="texlive-amsldoc-it is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482905" version="1" comment="texlive-amsldoc-vn is &lt;2017.133.2.0svn21855-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482906" version="1" comment="texlive-amsmath is &lt;2017.133.svn43813-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482907" version="1" comment="texlive-amsmath-it is &lt;2017.133.svn22930-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482908" version="1" comment="texlive-amsrefs is &lt;2017.133.2.14svn30646-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482909" version="1" comment="texlive-amstex is &lt;2017.133.2.2svn44166-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482911" version="1" comment="texlive-amsthdoc-it is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482912" version="1" comment="texlive-animate is &lt;2017.133.svn44410-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482913" version="1" comment="texlive-anonchap is &lt;2017.133.1.1asvn17049-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482914" version="1" comment="texlive-anonymouspro is &lt;2017.133.2.1svn33441-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482915" version="1" comment="texlive-anonymouspro-fonts is &lt;2017.133.2.1svn33441-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482916" version="1" comment="texlive-answers is &lt;2017.133.2.16svn35032-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482917" version="1" comment="texlive-antiqua is &lt;2017.133.001.003svn24266-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482918" version="1" comment="texlive-antiqua-fonts is &lt;2017.133.001.003svn24266-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482919" version="1" comment="texlive-antomega is &lt;2017.133.0.0.8svn21933-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482920" version="1" comment="texlive-antt is &lt;2017.133.2.08svn18651-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482921" version="1" comment="texlive-antt-fonts is &lt;2017.133.2.08svn18651-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482922" version="1" comment="texlive-anufinalexam is &lt;2017.133.svn26053-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482923" version="1" comment="texlive-anyfontsize is &lt;2017.133.svn17050-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482924" version="1" comment="texlive-anysize is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482925" version="1" comment="texlive-aobs-tikz is &lt;2017.133.1.0svn32662-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482926" version="1" comment="texlive-aomart is &lt;2017.133.1.20svn44282-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482927" version="1" comment="texlive-apa is &lt;2017.133.1.3.4svn42428-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482928" version="1" comment="texlive-apa6 is &lt;2017.133.2.31svn44477-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482929" version="1" comment="texlive-apa6e is &lt;2017.133.0.0.3svn23350-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482930" version="1" comment="texlive-apacite is &lt;2017.133.6.03svn31264-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482931" version="1" comment="texlive-apalike-german is &lt;2017.133.svn42045-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482932" version="1" comment="texlive-apalike2 is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482933" version="1" comment="texlive-apnum is &lt;2017.133.1.6svn39710-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482934" version="1" comment="texlive-appendix is &lt;2017.133.1.2bsvn42428-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482935" version="1" comment="texlive-appendixnumberbeamer is &lt;2017.133.svn40322-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482936" version="1" comment="texlive-apprends-latex is &lt;2017.133.4.02svn19306-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482937" version="1" comment="texlive-apptools is &lt;2017.133.1.0svn28400-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482938" version="1" comment="texlive-apxproof is &lt;2017.133.1.0.5svn44478-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482939" version="1" comment="texlive-arabi is &lt;2017.133.1.1svn25095-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482940" version="1" comment="texlive-arabi-add is &lt;2017.133.1.0svn37709-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482941" version="1" comment="texlive-arabi-fonts is &lt;2017.133.1.1svn25095-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482942" version="1" comment="texlive-arabluatex is &lt;2017.133.1.8.4svn44241-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482943" version="1" comment="texlive-arabtex is &lt;2017.133.3.17svn25711-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482944" version="1" comment="texlive-arabtex-fonts is &lt;2017.133.3.17svn25711-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482945" version="1" comment="texlive-arabxetex is &lt;2017.133.1.2.1svn38299-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482946" version="1" comment="texlive-aramaic-serto is &lt;2017.133.1.0svn30042-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482947" version="1" comment="texlive-aramaic-serto-fonts is &lt;2017.133.1.0svn30042-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482948" version="1" comment="texlive-arara is &lt;2017.133.3.0svn29762-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482950" version="1" comment="texlive-archaeologie is &lt;2017.133.2.31svn44484-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482951" version="1" comment="texlive-archaic is &lt;2017.133.svn38005-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482952" version="1" comment="texlive-archaic-fonts is &lt;2017.133.svn38005-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482953" version="1" comment="texlive-arcs is &lt;2017.133.1svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482954" version="1" comment="texlive-arev is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482955" version="1" comment="texlive-arev-fonts is &lt;2017.133.svn15878-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482956" version="1" comment="texlive-arimo is &lt;2017.133.svn42880-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482957" version="1" comment="texlive-arimo-fonts is &lt;2017.133.svn42880-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482958" version="1" comment="texlive-armtex is &lt;2017.133.3.0_beta3svn33894-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482959" version="1" comment="texlive-armtex-fonts is &lt;2017.133.3.0_beta3svn33894-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482960" version="1" comment="texlive-around-the-bend is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482961" version="1" comment="texlive-arphic is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482962" version="1" comment="texlive-arphic-fonts is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482963" version="1" comment="texlive-arphic-ttf is &lt;2017.135.svn42675-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482964" version="1" comment="texlive-arphic-ttf-fonts is &lt;2017.135.svn42675-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482965" version="1" comment="texlive-arrayjobx is &lt;2017.135.1.04svn18125-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482966" version="1" comment="texlive-arraysort is &lt;2017.135.1.0svn31576-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482967" version="1" comment="texlive-arsclassica is &lt;2017.135.march_2017svn43509-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482968" version="1" comment="texlive-articleingud is &lt;2017.135.0.0.3svn38741-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482969" version="1" comment="texlive-arydshln is &lt;2017.135.1.73svn40847-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482970" version="1" comment="texlive-asaetr is &lt;2017.135.1.0asvn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482971" version="1" comment="texlive-asapsym is &lt;2017.135.1.0svn40201-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482972" version="1" comment="texlive-asapsym-fonts is &lt;2017.135.1.0svn40201-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482973" version="1" comment="texlive-ascelike is &lt;2017.135.2.3svn29129-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482974" version="1" comment="texlive-ascii-chart is &lt;2017.135.svn20536-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482975" version="1" comment="texlive-ascii-font is &lt;2017.135.2.0svn29989-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482976" version="1" comment="texlive-ascii-font-fonts is &lt;2017.135.2.0svn29989-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482977" version="1" comment="texlive-asciilist is &lt;2017.135.2.2svn41158-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482978" version="1" comment="texlive-askmaps is &lt;2017.135.0.0.1svn32320-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482979" version="1" comment="texlive-aspectratio is &lt;2017.135.2.0svn25243-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482980" version="1" comment="texlive-aspectratio-fonts is &lt;2017.135.2.0svn25243-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482981" version="1" comment="texlive-assignment is &lt;2017.135.svn20431-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482982" version="1" comment="texlive-assoccnt is &lt;2017.135.0.0.8svn38497-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482983" version="1" comment="texlive-astro is &lt;2017.135.2.20svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482984" version="1" comment="texlive-asyfig is &lt;2017.135.0.0.1csvn17512-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482985" version="1" comment="texlive-asymptote is &lt;2017.135.2.41svn43843-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482987" version="1" comment="texlive-asymptote-by-example-zh-cn is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482988" version="1" comment="texlive-asymptote-faq-zh-cn is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482989" version="1" comment="texlive-asymptote-manual-zh-cn is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482990" version="1" comment="texlive-asypictureb is &lt;2017.135.0.0.3svn33490-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482991" version="1" comment="texlive-attachfile is &lt;2017.135.1.9svn42099-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482992" version="1" comment="texlive-aucklandthesis is &lt;2017.135.svn41506-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482993" version="1" comment="texlive-augie is &lt;2017.135.svn18948-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482994" version="1" comment="texlive-augie-fonts is &lt;2017.135.svn18948-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482995" version="1" comment="texlive-auncial-new is &lt;2017.135.2.0svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482996" version="1" comment="texlive-auncial-new-fonts is &lt;2017.135.2.0svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482997" version="1" comment="texlive-aurical is &lt;2017.135.1.5svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482998" version="1" comment="texlive-aurical-fonts is &lt;2017.135.1.5svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482999" version="1" comment="texlive-aurl is &lt;2017.135.svn41853-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483000" version="1" comment="texlive-authoraftertitle is &lt;2017.135.0.0.9svn24863-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483001" version="1" comment="texlive-authorindex is &lt;2017.135.svn26313-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483003" version="1" comment="texlive-auto-pst-pdf is &lt;2017.135.0.0.6svn23723-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483004" version="1" comment="texlive-autoaligne is &lt;2017.135.1.3svn43195-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483005" version="1" comment="texlive-autoarea is &lt;2017.135.0.0.3asvn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483006" version="1" comment="texlive-autobreak is &lt;2017.135.0.0.3svn43337-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483007" version="1" comment="texlive-automata is &lt;2017.135.0.0.3svn19717-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483008" version="1" comment="texlive-autonum is &lt;2017.135.0.0.3.11svn36084-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483009" version="1" comment="texlive-autopdf is &lt;2017.135.1.1svn32377-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483010" version="1" comment="texlive-autosp is &lt;2017.135.svn44166-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483012" version="1" comment="texlive-avantgar is &lt;2017.135.svn31835-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483013" version="1" comment="texlive-avantgar-fonts is &lt;2017.135.svn31835-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483014" version="1" comment="texlive-avremu is &lt;2017.135.0.0.1svn35373-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483015" version="1" comment="texlive-awesomebox is &lt;2017.135.0.0.1svn44131-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483016" version="1" comment="texlive-axodraw2 is &lt;2017.135.2.1.0bsvn44396-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483017" version="1" comment="texlive-b1encoding is &lt;2017.135.1.0svn21271-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483018" version="1" comment="texlive-babel is &lt;2017.135.3.10svn44427-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483019" version="1" comment="texlive-babel-albanian is &lt;2017.135.1.0csvn30254-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483020" version="1" comment="texlive-babel-azerbaijani is &lt;2017.135.1.0asvn44197-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483021" version="1" comment="texlive-babel-basque is &lt;2017.135.1.0fsvn30256-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483022" version="1" comment="texlive-babel-belarusian is &lt;2017.135.1.3hsvn40636-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483023" version="1" comment="texlive-babel-bosnian is &lt;2017.135.1.1svn38174-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483024" version="1" comment="texlive-babel-breton is &lt;2017.135.1.0hsvn30257-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483025" version="1" comment="texlive-babel-bulgarian is &lt;2017.135.1.2gsvn31902-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483026" version="1" comment="texlive-babel-catalan is &lt;2017.135.2.2psvn30259-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483027" version="1" comment="texlive-babel-croatian is &lt;2017.135.1.3lsvn35198-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483028" version="1" comment="texlive-babel-czech is &lt;2017.135.3.1asvn30261-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483029" version="1" comment="texlive-babel-danish is &lt;2017.135.1.3rsvn30262-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483030" version="1" comment="texlive-babel-dutch is &lt;2017.135.3.8isvn30263-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483031" version="1" comment="texlive-babel-english is &lt;2017.135.3.3qsvn44495-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483032" version="1" comment="texlive-babel-esperanto is &lt;2017.135.1.4tsvn30265-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483033" version="1" comment="texlive-babel-estonian is &lt;2017.135.1.1asvn38064-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483034" version="1" comment="texlive-babel-finnish is &lt;2017.135.1.3qsvn30267-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483035" version="1" comment="texlive-babel-french is &lt;2017.135.3.3asvn44270-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483036" version="1" comment="texlive-babel-friulan is &lt;2017.135.1.3svn39861-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483037" version="1" comment="texlive-babel-galician is &lt;2017.135.4.3csvn30270-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483038" version="1" comment="texlive-babel-georgian is &lt;2017.135.2.1svn33527-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483039" version="1" comment="texlive-babel-german is &lt;2017.135.2.9svn42424-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483040" version="1" comment="texlive-babel-greek is &lt;2017.135.1.9gsvn42010-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483041" version="1" comment="texlive-babel-hebrew is &lt;2017.135.2.3hsvn30273-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483042" version="1" comment="texlive-babel-hungarian is &lt;2017.135.1.5csvn41435-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483043" version="1" comment="texlive-babel-icelandic is &lt;2017.135.1.2bsvn39387-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483044" version="1" comment="texlive-babel-indonesian is &lt;2017.135.1.0msvn43235-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483045" version="1" comment="texlive-babel-interlingua is &lt;2017.135.1.6svn30276-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483046" version="1" comment="texlive-babel-irish is &lt;2017.135.1.0hsvn30277-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483047" version="1" comment="texlive-babel-italian is &lt;2017.135.1.3nsvn36645-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483048" version="1" comment="texlive-babel-japanese is &lt;2017.135.2.1svn43145-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483049" version="1" comment="texlive-babel-kurmanji is &lt;2017.135.1.1svn30279-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483050" version="1" comment="texlive-babel-latin is &lt;2017.135.3.5svn38173-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483051" version="1" comment="texlive-babel-latvian is &lt;2017.135.2.0asvn34377-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483052" version="1" comment="texlive-babel-macedonian is &lt;2017.135.svn39587-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483053" version="1" comment="texlive-babel-malay is &lt;2017.135.1.0msvn43234-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483054" version="1" comment="texlive-babel-norsk is &lt;2017.135.2.0isvn30281-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483055" version="1" comment="texlive-babel-occitan is &lt;2017.135.0.0.2svn39608-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483056" version="1" comment="texlive-babel-piedmontese is &lt;2017.135.1.0svn30282-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483057" version="1" comment="texlive-babel-polish is &lt;2017.135.1.2lsvn30283-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483058" version="1" comment="texlive-babel-portuges is &lt;2017.135.1.2qsvn30284-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483059" version="1" comment="texlive-babel-romanian is &lt;2017.135.1.2lsvn30285-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483060" version="1" comment="texlive-babel-romansh is &lt;2017.135.svn30286-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483061" version="1" comment="texlive-babel-russian is &lt;2017.135.1.3isvn42885-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483062" version="1" comment="texlive-babel-samin is &lt;2017.135.1.0csvn30288-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483063" version="1" comment="texlive-babel-scottish is &lt;2017.135.1.0gsvn30289-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483064" version="1" comment="texlive-babel-serbian is &lt;2017.135.1.0dsvn30290-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483065" version="1" comment="texlive-babel-serbianc is &lt;2017.135.2.2svn30348-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483066" version="1" comment="texlive-babel-slovak is &lt;2017.135.3.1asvn30292-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483067" version="1" comment="texlive-babel-slovenian is &lt;2017.135.1.2isvn30351-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483068" version="1" comment="texlive-babel-sorbian is &lt;2017.135.lower_sorbian_1.0g._upper_1.0ksvn30294-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483069" version="1" comment="texlive-babel-spanglish is &lt;2017.135.0.0.3svn37629-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483070" version="1" comment="texlive-babel-spanish is &lt;2017.135.5.0psvn39920-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483071" version="1" comment="texlive-babel-swedish is &lt;2017.135.2.3dsvn30296-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483072" version="1" comment="texlive-babel-thai is &lt;2017.135.1.0.0svn30564-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483073" version="1" comment="texlive-babel-turkish is &lt;2017.135.1.3bsvn33284-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483074" version="1" comment="texlive-babel-ukrainian is &lt;2017.135.1.4svn44550-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483075" version="1" comment="texlive-babel-vietnamese is &lt;2017.135.1.4svn39246-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483076" version="1" comment="texlive-babel-welsh is &lt;2017.135.1.1asvn38372-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483077" version="1" comment="texlive-babelbib is &lt;2017.135.1.31svn25245-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483078" version="1" comment="texlive-background is &lt;2017.135.2.1svn42428-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483079" version="1" comment="texlive-backnaur is &lt;2017.135.1.1svn28513-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483080" version="1" comment="texlive-baekmuk is &lt;2017.135.2.2svn42106-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483081" version="1" comment="texlive-baekmuk-fonts is &lt;2017.135.2.2svn42106-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483082" version="1" comment="texlive-bagpipe is &lt;2017.135.3.02svn34393-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483083" version="1" comment="texlive-bangorcsthesis is &lt;2017.135.1.5.1svn41919-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483084" version="1" comment="texlive-bangorexam is &lt;2017.135.1.2.0svn43500-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483085" version="1" comment="texlive-bangtex is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483086" version="1" comment="texlive-bankstatement is &lt;2017.135.0.0.9.2svn38857-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483087" version="1" comment="texlive-barcodes is &lt;2017.135.svn15878-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483088" version="1" comment="texlive-bardiag is &lt;2017.135.0.0.4asvn22013-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483089" version="1" comment="texlive-barr is &lt;2017.135.svn38479-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483090" version="1" comment="texlive-bartel-chess-fonts is &lt;2017.135.svn20619-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483091" version="1" comment="texlive-bashful is &lt;2017.135.0.0.93svn25597-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483092" version="1" comment="texlive-basicarith is &lt;2017.135.1.1svn35460-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483093" version="1" comment="texlive-baskervald is &lt;2017.135.1.016svn19490-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483094" version="1" comment="texlive-baskervald-fonts is &lt;2017.135.1.016svn19490-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483095" version="1" comment="texlive-baskervaldx is &lt;2017.135.1.072svn43461-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483096" version="1" comment="texlive-baskervaldx-fonts is &lt;2017.135.1.072svn43461-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483097" version="1" comment="texlive-baskervillef is &lt;2017.135.1.043svn43484-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483098" version="1" comment="texlive-baskervillef-fonts is &lt;2017.135.1.043svn43484-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483099" version="1" comment="texlive-basque-book is &lt;2017.135.1.20svn32924-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483100" version="1" comment="texlive-basque-date is &lt;2017.133.1.05svn26477-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483101" version="1" comment="texlive-bbcard is &lt;2017.133.svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483102" version="1" comment="texlive-bbding is &lt;2017.133.1.01svn17186-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483103" version="1" comment="texlive-bbm is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483104" version="1" comment="texlive-bbm-macros is &lt;2017.133.svn17224-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483105" version="1" comment="texlive-bbold is &lt;2017.133.1.01svn17187-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483106" version="1" comment="texlive-bbold-type1 is &lt;2017.133.svn33143-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483107" version="1" comment="texlive-bbold-type1-fonts is &lt;2017.133.svn33143-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483108" version="1" comment="texlive-bchart is &lt;2017.133.0.0.1.3svn43928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483109" version="1" comment="texlive-bclogo is &lt;2017.133.3.1svn39364-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483110" version="1" comment="texlive-beamer is &lt;2017.133.3.41svn43073-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483111" version="1" comment="texlive-beamer-FUBerlin is &lt;2017.133.0.0.02bsvn38159-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483112" version="1" comment="texlive-beamer-tut-pt is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483113" version="1" comment="texlive-beamer-verona is &lt;2017.133.0.0.2svn39180-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483114" version="1" comment="texlive-beamer2thesis is &lt;2017.133.2.2svn27539-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483115" version="1" comment="texlive-beameraudience is &lt;2017.133.0.0.1svn23427-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483116" version="1" comment="texlive-beamercolorthemeowl is &lt;2017.133.0.0.1.1svn40105-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483117" version="1" comment="texlive-beamerdarkthemes is &lt;2017.133.0.0.4.1svn35101-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483118" version="1" comment="texlive-beamerposter is &lt;2017.133.1.12svn37009-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483119" version="1" comment="texlive-beamersubframe is &lt;2017.133.0.0.2svn23510-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483120" version="1" comment="texlive-beamerswitch is &lt;2017.133.1.2svn44568-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483121" version="1" comment="texlive-beamertheme-cuerna is &lt;2017.133.svn42161-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483122" version="1" comment="texlive-beamertheme-detlevcm is &lt;2017.133.1.02svn39048-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483123" version="1" comment="texlive-beamertheme-epyt is &lt;2017.133.1.0svn41404-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483124" version="1" comment="texlive-beamertheme-metropolis is &lt;2017.133.1.2svn43031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483125" version="1" comment="texlive-beamertheme-phnompenh is &lt;2017.133.1.0svn39100-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483126" version="1" comment="texlive-beamertheme-upenn-bc is &lt;2017.133.1.0svn29937-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483127" version="1" comment="texlive-beamerthemejltree is &lt;2017.133.1.1svn21977-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483128" version="1" comment="texlive-beamerthemenirma is &lt;2017.133.0.0.1svn20765-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483129" version="1" comment="texlive-beebe is &lt;2017.133.svn44569-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483130" version="1" comment="texlive-begingreek is &lt;2017.133.1.5svn36294-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483131" version="1" comment="texlive-begriff is &lt;2017.133.1.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483132" version="1" comment="texlive-belleek is &lt;2017.133.svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483133" version="1" comment="texlive-belleek-fonts is &lt;2017.133.svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483134" version="1" comment="texlive-bengali is &lt;2017.133.svn20987-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483135" version="1" comment="texlive-bera is &lt;2017.133.svn20031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483136" version="1" comment="texlive-bera-fonts is &lt;2017.133.svn20031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483137" version="1" comment="texlive-berenisadf is &lt;2017.133.1.004svn32215-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483138" version="1" comment="texlive-berenisadf-fonts is &lt;2017.133.1.004svn32215-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483139" version="1" comment="texlive-besjournals is &lt;2017.133.svn35428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483140" version="1" comment="texlive-bestpapers is &lt;2017.133.1.0svn38708-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483141" version="1" comment="texlive-betababel is &lt;2017.133.0.0.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483142" version="1" comment="texlive-beton is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483143" version="1" comment="texlive-beuron is &lt;2017.133.1.1svn42038-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483144" version="1" comment="texlive-beuron-fonts is &lt;2017.133.1.1svn42038-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483145" version="1" comment="texlive-bewerbung is &lt;2017.133.1.1svn37880-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483146" version="1" comment="texlive-bez123 is &lt;2017.133.1.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483147" version="1" comment="texlive-bezos is &lt;2017.133.svn25507-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483148" version="1" comment="texlive-bgreek is &lt;2017.133.0.0.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483149" version="1" comment="texlive-bgteubner is &lt;2017.133.2.11svn44205-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483150" version="1" comment="texlive-bguq is &lt;2017.133.0.0.4svn27401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483151" version="1" comment="texlive-bguq-fonts is &lt;2017.133.0.0.4svn27401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483152" version="1" comment="texlive-bhcexam is &lt;2017.133.0.0.4svn39041-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483153" version="1" comment="texlive-bib-fr is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483154" version="1" comment="texlive-bibarts is &lt;2017.133.2.1svn40096-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483155" version="1" comment="texlive-biber is &lt;2017.133.2.7svn43910-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483157" version="1" comment="texlive-bibexport is &lt;2017.133.3.02svn39928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483159" version="1" comment="texlive-bibhtml is &lt;2017.133.2.0.2svn31607-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483160" version="1" comment="texlive-biblatex is &lt;2017.133.3.7svn42680-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483161" version="1" comment="texlive-biblatex-abnt is &lt;2017.133.3.0.1svn43510-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483162" version="1" comment="texlive-biblatex-anonymous is &lt;2017.133.2.6.0svn43043-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483163" version="1" comment="texlive-biblatex-apa is &lt;2017.133.7.4svn42893-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483164" version="1" comment="texlive-biblatex-archaeology is &lt;2017.133.1.2svn44522-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483165" version="1" comment="texlive-biblatex-arthistory-bonn is &lt;2017.133.1.0svn43468-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483166" version="1" comment="texlive-biblatex-bookinarticle is &lt;2017.133.1.3.1asvn40323-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483167" version="1" comment="texlive-biblatex-bookinother is &lt;2017.133.2.3.0svn43619-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483168" version="1" comment="texlive-biblatex-bwl is &lt;2017.133.0.0.02svn26556-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483169" version="1" comment="texlive-biblatex-caspervector is &lt;2017.133.0.0.2.7svn43371-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483170" version="1" comment="texlive-biblatex-cheatsheet is &lt;2017.133.svn43650-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483171" version="1" comment="texlive-biblatex-chem is &lt;2017.133.1.1ssvn43116-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483172" version="1" comment="texlive-biblatex-chicago is &lt;2017.133.1.0rc4svn44156-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483173" version="1" comment="texlive-biblatex-claves is &lt;2017.133.1.2.0svn43723-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483174" version="1" comment="texlive-biblatex-dw is &lt;2017.133.1.7svn42649-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483175" version="1" comment="texlive-biblatex-fiwi is &lt;2017.133.1.6csvn43082-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483176" version="1" comment="texlive-biblatex-gb7714-2015 is &lt;2017.133.1.0gsvn43555-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483177" version="1" comment="texlive-biblatex-gost is &lt;2017.133.1.14svn44172-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483178" version="1" comment="texlive-biblatex-historian is &lt;2017.133.0.0.4svn19787-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483179" version="1" comment="texlive-biblatex-ieee is &lt;2017.133.1.2dsvn43620-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483180" version="1" comment="texlive-biblatex-ijsra is &lt;2017.133.0.0.1svn41634-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483181" version="1" comment="texlive-biblatex-iso690 is &lt;2017.133.0.0.3.2svn44066-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483182" version="1" comment="texlive-biblatex-juradiss is &lt;2017.133.0.0.1gsvn29252-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483183" version="1" comment="texlive-biblatex-lni is &lt;2017.133.0.0.4svn43032-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483184" version="1" comment="texlive-biblatex-luh-ipw is &lt;2017.133.0.0.3svn32180-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483185" version="1" comment="texlive-biblatex-manuscripts-philology is &lt;2017.133.1.12.2svn43108-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483186" version="1" comment="texlive-biblatex-mla is &lt;2017.133.1.9svn42445-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483187" version="1" comment="texlive-biblatex-morenames is &lt;2017.133.1.3.1svn43049-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483188" version="1" comment="texlive-biblatex-multiple-dm is &lt;2017.133.1.0.1svn37081-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483189" version="1" comment="texlive-biblatex-musuos is &lt;2017.133.1.0svn24097-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483190" version="1" comment="texlive-biblatex-nature is &lt;2017.133.1.3bsvn43382-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483191" version="1" comment="texlive-biblatex-nejm is &lt;2017.133.0.0.4svn24011-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483192" version="1" comment="texlive-biblatex-nottsclassic is &lt;2017.133.0.0.1svn41596-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483193" version="1" comment="texlive-biblatex-opcit-booktitle is &lt;2017.133.1.8.0svn43621-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483194" version="1" comment="texlive-biblatex-oxref is &lt;2017.133.0.0.10svn44385-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483195" version="1" comment="texlive-biblatex-philosophy is &lt;2017.133.1.9.5svn43860-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483196" version="1" comment="texlive-biblatex-phys is &lt;2017.133.1.0bsvn41922-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483197" version="1" comment="texlive-biblatex-publist is &lt;2017.133.1.7svn43765-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483198" version="1" comment="texlive-biblatex-realauthor is &lt;2017.133.2.7.0svn42390-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483199" version="1" comment="texlive-biblatex-sbl is &lt;2017.133.0.0.8.1svn42972-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483200" version="1" comment="texlive-biblatex-science is &lt;2017.133.1.1gsvn42147-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483201" version="1" comment="texlive-biblatex-shortfields is &lt;2017.133.1.0.0svn43738-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483202" version="1" comment="texlive-biblatex-source-division is &lt;2017.133.2.4.1svn41675-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483203" version="1" comment="texlive-biblatex-subseries is &lt;2017.133.1.2.0svn43330-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483204" version="1" comment="texlive-biblatex-swiss-legal is &lt;2017.133.1.1.2asvn32750-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483205" version="1" comment="texlive-biblatex-trad is &lt;2017.133.0.0.3svn41656-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483206" version="1" comment="texlive-biblatex-true-citepages-omit is &lt;2017.133.1.3.0svn42120-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483207" version="1" comment="texlive-bibleref is &lt;2017.133.1.16svn42162-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483208" version="1" comment="texlive-bibleref-french is &lt;2017.133.2.3.1svn35497-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483209" version="1" comment="texlive-bibleref-german is &lt;2017.133.1.0asvn21923-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483210" version="1" comment="texlive-bibleref-lds is &lt;2017.133.1.0svn25526-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483211" version="1" comment="texlive-bibleref-mouth is &lt;2017.133.1.0svn25527-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483212" version="1" comment="texlive-bibleref-parse is &lt;2017.133.1.1svn22054-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483213" version="1" comment="texlive-bibletext is &lt;2017.133.0.0.1svn39785-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483214" version="1" comment="texlive-biblist is &lt;2017.133.svn17116-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483215" version="1" comment="texlive-bibtex is &lt;2017.133.0.0.99dsvn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483217" version="1" comment="texlive-bibtex8 is &lt;2017.133.3.71svn29725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483219" version="1" comment="texlive-bibtexperllibs is &lt;2017.133.1.3svn43549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483220" version="1" comment="texlive-bibtexu is &lt;2017.133.svn29743-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483222" version="1" comment="texlive-bibtopic is &lt;2017.133.1.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483223" version="1" comment="texlive-bibtopicprefix is &lt;2017.133.1.10svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483224" version="1" comment="texlive-bibunits is &lt;2017.133.2.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483225" version="1" comment="texlive-bidi is &lt;2017.133.30.7svn44546-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483226" version="1" comment="texlive-bidi-atbegshi is &lt;2017.133.0.0.1svn35154-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483227" version="1" comment="texlive-bidicontour is &lt;2017.133.0.0.2svn34631-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483228" version="1" comment="texlive-bidihl is &lt;2017.133.0.0.1csvn37795-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483229" version="1" comment="texlive-bidipagegrid is &lt;2017.133.0.0.2svn34632-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483230" version="1" comment="texlive-bidipresentation is &lt;2017.133.0.0.3svn35267-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483231" version="1" comment="texlive-bidishadowtext is &lt;2017.133.0.0.1svn34633-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483232" version="1" comment="texlive-bigfoot is &lt;2017.133.2.1svn38248-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483233" version="1" comment="texlive-bigints is &lt;2017.133.svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483235" version="1" comment="texlive-binarytree is &lt;2017.133.1.01svn41777-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483236" version="1" comment="texlive-binomexp is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483237" version="1" comment="texlive-biochemistry-colors is &lt;2017.133.1.00svn43960-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483238" version="1" comment="texlive-biocon is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483239" version="1" comment="texlive-biolett-bst is &lt;2017.133.svn42217-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483240" version="1" comment="texlive-bitelist is &lt;2017.133.0.0.1svn25779-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483241" version="1" comment="texlive-bitpattern is &lt;2017.133.svn39073-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483242" version="1" comment="texlive-bizcard is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483243" version="1" comment="texlive-blacklettert1 is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483244" version="1" comment="texlive-blindtext is &lt;2017.133.2.0svn25039-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483245" version="1" comment="texlive-blkarray is &lt;2017.133.0.0.07svn36406-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483246" version="1" comment="texlive-blochsphere is &lt;2017.133.1.1svn38388-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483247" version="1" comment="texlive-block is &lt;2017.133.svn17209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483248" version="1" comment="texlive-blockdraw_mp is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483249" version="1" comment="texlive-bloques is &lt;2017.133.1.0svn22490-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483250" version="1" comment="texlive-blox is &lt;2017.133.2.5svn35014-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483251" version="1" comment="texlive-bnumexpr is &lt;2017.133.1.2asvn38638-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483252" version="1" comment="texlive-bodegraph is &lt;2017.133.1.4svn20047-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483253" version="1" comment="texlive-bohr is &lt;2017.133.1.0svn37657-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483254" version="1" comment="texlive-boisik is &lt;2017.133.0.0.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483255" version="1" comment="texlive-boites is &lt;2017.133.1.1svn32235-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483256" version="1" comment="texlive-bold-extra is &lt;2017.133.0.0.1svn17076-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483257" version="1" comment="texlive-boldtensors is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483258" version="1" comment="texlive-bondgraph is &lt;2017.133.1.0svn21670-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483259" version="1" comment="texlive-bondgraphs is &lt;2017.133.1.0.1svn36605-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483260" version="1" comment="texlive-bookcover is &lt;2017.133.2.1svn43861-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483261" version="1" comment="texlive-bookdb is &lt;2017.133.0.0.2svn37536-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483262" version="1" comment="texlive-bookest is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483263" version="1" comment="texlive-bookhands is &lt;2017.133.svn23609-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483264" version="1" comment="texlive-bookhands-fonts is &lt;2017.133.svn23609-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483265" version="1" comment="texlive-booklet is &lt;2017.133.0.0.7bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483266" version="1" comment="texlive-bookman is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483267" version="1" comment="texlive-bookman-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483268" version="1" comment="texlive-booktabs is &lt;2017.133.1.618033svn40846-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483269" version="1" comment="texlive-booktabs-de is &lt;2017.133.1.61803svn21907-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483270" version="1" comment="texlive-booktabs-fr is &lt;2017.133.1.00svn21948-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483271" version="1" comment="texlive-boolexpr is &lt;2017.133.3.14svn17830-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483272" version="1" comment="texlive-boondox is &lt;2017.133.1.02dsvn43344-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483273" version="1" comment="texlive-boondox-fonts is &lt;2017.133.1.02dsvn43344-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483274" version="1" comment="texlive-bophook is &lt;2017.133.0.0.02svn17062-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483275" version="1" comment="texlive-borceux is &lt;2017.133.svn21047-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483276" version="1" comment="texlive-bosisio is &lt;2017.133.svn16989-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483277" version="1" comment="texlive-boxedminipage is &lt;2017.133.2svn17087-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483278" version="1" comment="texlive-boxedminipage2e is &lt;2017.133.1.0svn36477-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483279" version="1" comment="texlive-boxhandler is &lt;2017.133.1.30svn28031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483280" version="1" comment="texlive-bpchem is &lt;2017.133.1.06svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483281" version="1" comment="texlive-bpolynomial is &lt;2017.133.0.0.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483282" version="1" comment="texlive-br-lex is &lt;2017.133.svn39701-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483283" version="1" comment="texlive-bracketkey is &lt;2017.133.1.0svn17129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483284" version="1" comment="texlive-braids is &lt;2017.133.1.0svn23790-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483285" version="1" comment="texlive-braille is &lt;2017.133.svn20655-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483286" version="1" comment="texlive-braket is &lt;2017.133.svn17127-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483287" version="1" comment="texlive-brandeis-dissertation is &lt;2017.133.2.0svn32047-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483288" version="1" comment="texlive-breakcites is &lt;2017.133.svn21014-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483289" version="1" comment="texlive-breakurl is &lt;2017.133.1.40svn29901-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483290" version="1" comment="texlive-bredzenie is &lt;2017.133.1.0svn44371-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483291" version="1" comment="texlive-breqn is &lt;2017.133.0.0.98esvn43071-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483292" version="1" comment="texlive-bropd is &lt;2017.133.1.2svn35383-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483293" version="1" comment="texlive-brushscr is &lt;2017.133.svn28363-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483294" version="1" comment="texlive-brushscr-fonts is &lt;2017.133.svn28363-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483295" version="1" comment="texlive-bullcntr is &lt;2017.133.0.0.04svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483296" version="1" comment="texlive-bundledoc is &lt;2017.133.3.2svn35041-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483298" version="1" comment="texlive-burmese is &lt;2017.133.svn25185-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483299" version="1" comment="texlive-burmese-fonts is &lt;2017.133.svn25185-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483300" version="1" comment="texlive-bussproofs is &lt;2017.133.1.1svn27488-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483301" version="1" comment="texlive-bxbase is &lt;2017.133.1.1svn44481-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483302" version="1" comment="texlive-bxcalc is &lt;2017.133.1.0svn44514-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483303" version="1" comment="texlive-bxcjkjatype is &lt;2017.133.0.0.3svn42292-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483304" version="1" comment="texlive-bxdpx-beamer is &lt;2017.133.0.0.3svn41813-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483305" version="1" comment="texlive-bxdvidriver is &lt;2017.133.0.0.2asvn43219-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483306" version="1" comment="texlive-bxeepic is &lt;2017.133.0.0.2svn30559-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483307" version="1" comment="texlive-bxenclose is &lt;2017.133.0.0.2svn40213-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483308" version="1" comment="texlive-bxjalipsum is &lt;2017.133.0.0.3asvn43369-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483309" version="1" comment="texlive-bxjaprnind is &lt;2017.133.0.0.3asvn44554-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483310" version="1" comment="texlive-bxjscls is &lt;2017.133.1.5bsvn43741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483311" version="1" comment="texlive-bxnewfont is &lt;2017.133.0.0.2bsvn44173-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483312" version="1" comment="texlive-bxorigcapt is &lt;2017.133.0.0.2asvn44195-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483313" version="1" comment="texlive-bxpapersize is &lt;2017.133.0.0.3asvn44174-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483314" version="1" comment="texlive-bxpdfver is &lt;2017.133.0.0.4svn43201-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483315" version="1" comment="texlive-bytefield is &lt;2017.133.2.3svn38736-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483316" version="1" comment="texlive-c-pascal is &lt;2017.133.1.2svn18337-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483317" version="1" comment="texlive-c90 is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483318" version="1" comment="texlive-cabin is &lt;2017.133.svn43687-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483319" version="1" comment="texlive-cabin-fonts is &lt;2017.133.svn43687-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483320" version="1" comment="texlive-cachepic is &lt;2017.133.1.0svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483322" version="1" comment="texlive-caladea is &lt;2017.133.svn34991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483323" version="1" comment="texlive-caladea-fonts is &lt;2017.133.svn34991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483324" version="1" comment="texlive-calcage is &lt;2017.133.0.0.90svn27725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483325" version="1" comment="texlive-calctab is &lt;2017.133.0.0.6.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483326" version="1" comment="texlive-calculation is &lt;2017.133.1.0svn35973-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483327" version="1" comment="texlive-calculator is &lt;2017.133.2.0svn33041-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483328" version="1" comment="texlive-calligra is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483329" version="1" comment="texlive-calligra-type1 is &lt;2017.133.001.000svn24302-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483330" version="1" comment="texlive-calligra-type1-fonts is &lt;2017.133.001.000svn24302-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483331" version="1" comment="texlive-callouts is &lt;2017.133.svn43515-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483332" version="1" comment="texlive-calrsfs is &lt;2017.133.svn17125-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483333" version="1" comment="texlive-cals is &lt;2017.133.2.4.2svn43003-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483334" version="1" comment="texlive-calxxxx-yyyy is &lt;2017.133.20.17asvn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483335" version="1" comment="texlive-cancel is &lt;2017.133.2.2svn32508-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483336" version="1" comment="texlive-canoniclayout is &lt;2017.133.0.0.4svn24523-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483337" version="1" comment="texlive-cantarell is &lt;2017.133.2.4svn27066-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483338" version="1" comment="texlive-cantarell-fonts is &lt;2017.133.2.4svn27066-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483339" version="1" comment="texlive-capt-of is &lt;2017.133.svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483340" version="1" comment="texlive-captcont is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483341" version="1" comment="texlive-captdef is &lt;2017.133.svn17353-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483342" version="1" comment="texlive-caption is &lt;2017.133.svn41409-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483343" version="1" comment="texlive-carbohydrates is &lt;2017.133.0.0.1svn39000-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483344" version="1" comment="texlive-carlisle is &lt;2017.133.svn18258-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483345" version="1" comment="texlive-carlito is &lt;2017.133.svn35002-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483346" version="1" comment="texlive-carlito-fonts is &lt;2017.133.svn35002-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483347" version="1" comment="texlive-carolmin-ps is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483348" version="1" comment="texlive-carolmin-ps-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483349" version="1" comment="texlive-cascadilla is &lt;2017.133.1.8.2svn25144-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483350" version="1" comment="texlive-cases is &lt;2017.133.2.5svn17123-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483351" version="1" comment="texlive-casyl is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483352" version="1" comment="texlive-catchfilebetweentags is &lt;2017.133.1.1svn21476-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483353" version="1" comment="texlive-catcodes is &lt;2017.133.r0.2svn38859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483354" version="1" comment="texlive-catechis is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483355" version="1" comment="texlive-catoptions is &lt;2017.133.0.0.2.7hsvn35069-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483356" version="1" comment="texlive-cbcoptic is &lt;2017.133.0.0.2svn16666-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483357" version="1" comment="texlive-cbcoptic-fonts is &lt;2017.133.0.0.2svn16666-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483358" version="1" comment="texlive-cbfonts is &lt;2017.133.svn31624-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483359" version="1" comment="texlive-cbfonts-fd is &lt;2017.133.1.1svn39936-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483360" version="1" comment="texlive-cbfonts-fonts is &lt;2017.133.svn31624-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483361" version="1" comment="texlive-cc-pl is &lt;2017.133.1.02.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483362" version="1" comment="texlive-cc-pl-fonts is &lt;2017.133.1.02.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483363" version="1" comment="texlive-ccaption is &lt;2017.133.3.2csvn23443-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483364" version="1" comment="texlive-ccfonts is &lt;2017.133.1.1svn17122-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483365" version="1" comment="texlive-ccicons is &lt;2017.133.1.5svn30020-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483366" version="1" comment="texlive-ccicons-fonts is &lt;2017.133.1.5svn30020-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483367" version="1" comment="texlive-cclicenses is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483368" version="1" comment="texlive-cd is &lt;2017.133.1.4svn34452-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483369" version="1" comment="texlive-cd-cover is &lt;2017.133.1.0svn17121-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483370" version="1" comment="texlive-cdpbundl is &lt;2017.133.0.0.36svn36697-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483371" version="1" comment="texlive-cell is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483372" version="1" comment="texlive-cellspace is &lt;2017.133.1.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483373" version="1" comment="texlive-celtic is &lt;2017.133.1.1svn39797-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483374" version="1" comment="texlive-censor is &lt;2017.133.3.21svn31332-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483375" version="1" comment="texlive-cfr-initials is &lt;2017.133.1.01svn36728-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483376" version="1" comment="texlive-cfr-lm is &lt;2017.133.1.5svn36195-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483377" version="1" comment="texlive-changebar is &lt;2017.133.3.5csvn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483378" version="1" comment="texlive-changelayout is &lt;2017.133.1.0svn16094-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483379" version="1" comment="texlive-changepage is &lt;2017.133.1.0csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483380" version="1" comment="texlive-changes is &lt;2017.133.2.0.4svn41737-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483381" version="1" comment="texlive-chappg is &lt;2017.133.2.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483382" version="1" comment="texlive-chapterfolder is &lt;2017.133.2.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483383" version="1" comment="texlive-charter is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483384" version="1" comment="texlive-charter-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483385" version="1" comment="texlive-chbibref is &lt;2017.133.1.0svn17120-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483386" version="1" comment="texlive-checkcites is &lt;2017.133.1.0isvn28572-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483388" version="1" comment="texlive-checklistings is &lt;2017.133.1.0svn38300-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483390" version="1" comment="texlive-chem-journal is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483391" version="1" comment="texlive-chemarrow is &lt;2017.133.0.0.9svn17146-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483392" version="1" comment="texlive-chemarrow-fonts is &lt;2017.133.0.0.9svn17146-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483393" version="1" comment="texlive-chembst is &lt;2017.133.0.0.2.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483394" version="1" comment="texlive-chemcompounds is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483395" version="1" comment="texlive-chemcono is &lt;2017.133.1.3svn17119-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483396" version="1" comment="texlive-chemexec is &lt;2017.133.1.0svn21632-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483397" version="1" comment="texlive-chemfig is &lt;2017.133.1.2esvn44513-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483398" version="1" comment="texlive-chemformula is &lt;2017.133.4.15esvn43583-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483399" version="1" comment="texlive-chemgreek is &lt;2017.133.1.1svn42758-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483400" version="1" comment="texlive-chemmacros is &lt;2017.133.5.8svn44023-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483401" version="1" comment="texlive-chemnum is &lt;2017.133.1.2svn40522-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483402" version="1" comment="texlive-chemschemex is &lt;2017.133.1.1svn43747-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483403" version="1" comment="texlive-chemstyle is &lt;2017.133.2.0msvn31096-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483404" version="1" comment="texlive-cherokee is &lt;2017.133.svn21046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483405" version="1" comment="texlive-chess is &lt;2017.133.1.2svn20582-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483406" version="1" comment="texlive-chess-problem-diagrams is &lt;2017.133.1.12svn39317-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483407" version="1" comment="texlive-chessboard is &lt;2017.133.1.7svn33801-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483408" version="1" comment="texlive-chessfss is &lt;2017.133.1.2asvn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483409" version="1" comment="texlive-chet is &lt;2017.133.2.1svn38161-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483410" version="1" comment="texlive-chextras is &lt;2017.133.1.01svn27118-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483411" version="1" comment="texlive-chicago is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483412" version="1" comment="texlive-chicago-annote is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483413" version="1" comment="texlive-chickenize is &lt;2017.133.0.0.2.4svn42341-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483414" version="1" comment="texlive-childdoc is &lt;2017.133.1.5svn44512-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483415" version="1" comment="texlive-chivo is &lt;2017.133.1.0svn40931-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483416" version="1" comment="texlive-chivo-fonts is &lt;2017.133.1.0svn40931-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483417" version="1" comment="texlive-chkfloat is &lt;2017.133.0.0.1svn27473-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483418" version="1" comment="texlive-chktex is &lt;2017.133.1.7.6svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483420" version="1" comment="texlive-chletter is &lt;2017.133.2.0svn20060-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483421" version="1" comment="texlive-chngcntr is &lt;2017.133.1.0asvn17157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483422" version="1" comment="texlive-chronology is &lt;2017.133.1.1.1svn37934-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483423" version="1" comment="texlive-chronosys is &lt;2017.133.1.2svn26700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483424" version="1" comment="texlive-chscite is &lt;2017.133.2.9999svn28552-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483425" version="1" comment="texlive-churchslavonic is &lt;2017.133.0.0.2.1svn42751-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483426" version="1" comment="texlive-cinzel is &lt;2017.133.svn34408-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483427" version="1" comment="texlive-cinzel-fonts is &lt;2017.133.svn34408-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483428" version="1" comment="texlive-circ is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483429" version="1" comment="texlive-circuitikz is &lt;2017.133.0.0.8.3svn44488-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483430" version="1" comment="texlive-cite is &lt;2017.133.5.5svn36428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483431" version="1" comment="texlive-citeall is &lt;2017.133.1.2svn37103-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483432" version="1" comment="texlive-cje is &lt;2017.133.1.01svn44454-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483433" version="1" comment="texlive-cjhebrew is &lt;2017.133.0.0.2asvn43444-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483434" version="1" comment="texlive-cjhebrew-fonts is &lt;2017.133.0.0.2asvn43444-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483435" version="1" comment="texlive-cjk is &lt;2017.133.4.8.4svn36951-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483436" version="1" comment="texlive-cjk-gs-integrate is &lt;2017.133.20170505.0svn44207-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483438" version="1" comment="texlive-cjk-ko is &lt;2017.133.1.8svn40373-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483439" version="1" comment="texlive-cjkpunct is &lt;2017.133.4.8.4svn41119-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483440" version="1" comment="texlive-cjkutils is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483442" version="1" comment="texlive-classics is &lt;2017.133.0.0.1svn29018-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483443" version="1" comment="texlive-classicthesis is &lt;2017.133.4.2svn38304-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483444" version="1" comment="texlive-classpack is &lt;2017.133.0.0.77svn33101-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483445" version="1" comment="texlive-cleanthesis is &lt;2017.133.0.0.3.1svn38221-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483446" version="1" comment="texlive-clearsans is &lt;2017.133.svn34405-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483447" version="1" comment="texlive-clearsans-fonts is &lt;2017.133.svn34405-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483448" version="1" comment="texlive-clefval is &lt;2017.133.0svn16549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483449" version="1" comment="texlive-cleveref is &lt;2017.133.0.0.19svn32513-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483450" version="1" comment="texlive-clipboard is &lt;2017.133.0.0.2svn28876-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483451" version="1" comment="texlive-clock is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483452" version="1" comment="texlive-cloze is &lt;2017.133.1.2svn41531-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483453" version="1" comment="texlive-clrscode is &lt;2017.133.1.7svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483454" version="1" comment="texlive-clrscode3e is &lt;2017.133.svn34887-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483455" version="1" comment="texlive-cm is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483456" version="1" comment="texlive-cm-lgc is &lt;2017.133.0.0.5svn28250-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483457" version="1" comment="texlive-cm-lgc-fonts is &lt;2017.133.0.0.5svn28250-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483458" version="1" comment="texlive-cm-super is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483459" version="1" comment="texlive-cm-super-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483460" version="1" comment="texlive-cm-unicode is &lt;2017.133.0.0.7.0svn19445-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483461" version="1" comment="texlive-cm-unicode-fonts is &lt;2017.133.0.0.7.0svn19445-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483462" version="1" comment="texlive-cmap is &lt;2017.133.1.0hsvn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483463" version="1" comment="texlive-cmarrows is &lt;2017.133.0.0.9svn24378-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483464" version="1" comment="texlive-cmbright is &lt;2017.133.8.1svn21107-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483465" version="1" comment="texlive-cmcyr is &lt;2017.133.svn39273-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483466" version="1" comment="texlive-cmcyr-fonts is &lt;2017.133.svn39273-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483467" version="1" comment="texlive-cmdstring is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483468" version="1" comment="texlive-cmdtrack is &lt;2017.133.svn28910-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483469" version="1" comment="texlive-cmexb is &lt;2017.133.svn40785-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483470" version="1" comment="texlive-cmexb-fonts is &lt;2017.133.svn40785-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483471" version="1" comment="texlive-cmextra is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483472" version="1" comment="texlive-cmll is &lt;2017.133.svn17964-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483473" version="1" comment="texlive-cmll-fonts is &lt;2017.133.svn17964-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483474" version="1" comment="texlive-cmpica is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483475" version="1" comment="texlive-cmpj is &lt;2017.133.3.01svn44283-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483476" version="1" comment="texlive-cmsd is &lt;2017.133.svn18787-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483477" version="1" comment="texlive-cmtiup is &lt;2017.133.2.1svn39728-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483478" version="1" comment="texlive-cnbwp is &lt;2017.133.svn32550-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483479" version="1" comment="texlive-cnltx is &lt;2017.133.0.0.13svn38138-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483480" version="1" comment="texlive-cns is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483481" version="1" comment="texlive-cntformats is &lt;2017.133.0.0.7svn34668-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483482" version="1" comment="texlive-cntperchap is &lt;2017.133.0.0.3svn37572-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483483" version="1" comment="texlive-cochineal is &lt;2017.133.1.042svn43462-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483484" version="1" comment="texlive-cochineal-fonts is &lt;2017.133.1.042svn43462-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483485" version="1" comment="texlive-codedoc is &lt;2017.133.0.0.3svn17630-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483486" version="1" comment="texlive-codepage is &lt;2017.133.svn21126-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483487" version="1" comment="texlive-codesection is &lt;2017.133.0.0.1svn34481-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483488" version="1" comment="texlive-codicefiscaleitaliano is &lt;2017.133.1.2svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483489" version="1" comment="texlive-collcell is &lt;2017.133.0.0.5svn21539-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483490" version="1" comment="texlive-collectbox is &lt;2017.133.0.0.4bsvn26557-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483491" version="1" comment="texlive-collref is &lt;2017.133.2.0bsvn35084-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483492" version="1" comment="texlive-colordoc is &lt;2017.133.svn18270-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483493" version="1" comment="texlive-colorinfo is &lt;2017.133.0.0.3csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483494" version="1" comment="texlive-coloring is &lt;2017.133.0.0.2svn41042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483495" version="1" comment="texlive-colorsep is &lt;2017.133.svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483496" version="1" comment="texlive-colorspace is &lt;2017.133.1.2.0svn42228-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483497" version="1" comment="texlive-colortab is &lt;2017.133.1.0svn22155-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483498" version="1" comment="texlive-colortbl is &lt;2017.133.1.0asvn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483499" version="1" comment="texlive-colorwav is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483500" version="1" comment="texlive-colorweb is &lt;2017.133.1.3svn31490-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483501" version="1" comment="texlive-colourchange is &lt;2017.133.1.22svn21741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483502" version="1" comment="texlive-combelow is &lt;2017.133.0.0.99fsvn18462-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483503" version="1" comment="texlive-combine is &lt;2017.133.0.0.7asvn19361-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483504" version="1" comment="texlive-combinedgraphics is &lt;2017.133.0.0.2.2svn27198-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483505" version="1" comment="texlive-combofont is &lt;2017.133.0.0.1svn44491-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483506" version="1" comment="texlive-comfortaa is &lt;2017.133.2.3svn27536-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483507" version="1" comment="texlive-comfortaa-fonts is &lt;2017.133.2.3svn27536-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483508" version="1" comment="texlive-comicneue is &lt;2017.133.1.1svn42851-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483509" version="1" comment="texlive-comicneue-fonts is &lt;2017.133.1.1svn42851-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483510" version="1" comment="texlive-comma is &lt;2017.133.1.2svn18259-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483511" version="1" comment="texlive-commado is &lt;2017.133.r0.11asvn38875-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483512" version="1" comment="texlive-commath is &lt;2017.133.0.0.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483513" version="1" comment="texlive-comment is &lt;2017.133.3.8svn41927-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483514" version="1" comment="texlive-compactbib is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483515" version="1" comment="texlive-complexity is &lt;2017.133.0.0.76svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483516" version="1" comment="texlive-components-of-TeX is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483517" version="1" comment="texlive-comprehensive is &lt;2017.133.12.3svn43001-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483518" version="1" comment="texlive-computational-complexity is &lt;2017.133.2.25fsvn39903-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483519" version="1" comment="texlive-concepts is &lt;2017.133.0.0.0.5_r1svn29020-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483520" version="1" comment="texlive-concmath is &lt;2017.133.svn17219-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483521" version="1" comment="texlive-concmath-fonts is &lt;2017.133.svn17218-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483522" version="1" comment="texlive-concprog is &lt;2017.133.svn18791-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483523" version="1" comment="texlive-concrete is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483524" version="1" comment="texlive-confproc is &lt;2017.133.0.0.8svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483525" version="1" comment="texlive-constants is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483526" version="1" comment="texlive-conteq is &lt;2017.133.0.0.1.1svn37868-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483527" version="1" comment="texlive-context is &lt;2017.133.svn44436-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483528" version="1" comment="texlive-context-account is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483529" version="1" comment="texlive-context-algorithmic is &lt;2017.133.svn31026-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483530" version="1" comment="texlive-context-animation is &lt;2017.133.svn36188-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483531" version="1" comment="texlive-context-annotation is &lt;2017.133.svn36188-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483533" version="1" comment="texlive-context-bnf is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483534" version="1" comment="texlive-context-chromato is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483535" version="1" comment="texlive-context-cmscbf is &lt;2017.133.svn42327-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483536" version="1" comment="texlive-context-cmttbf is &lt;2017.133.svn42328-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483537" version="1" comment="texlive-context-construction-plan is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483538" version="1" comment="texlive-context-cyrillicnumbers is &lt;2017.133.svn29905-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483539" version="1" comment="texlive-context-degrade is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483540" version="1" comment="texlive-context-fancybreak is &lt;2017.133.svn36948-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483541" version="1" comment="texlive-context-filter is &lt;2017.133.svn42326-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483542" version="1" comment="texlive-context-fonts is &lt;2017.133.svn44436-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483543" version="1" comment="texlive-context-french is &lt;2017.133.svn24582-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483544" version="1" comment="texlive-context-fullpage is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483545" version="1" comment="texlive-context-gantt is &lt;2017.133.svn27472-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483546" version="1" comment="texlive-context-gnuplot is &lt;2017.133.svn30380-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483547" version="1" comment="texlive-context-inifile is &lt;2017.133.svn42329-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483548" version="1" comment="texlive-context-layout is &lt;2017.133.svn42330-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483549" version="1" comment="texlive-context-letter is &lt;2017.133.svn38202-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483550" version="1" comment="texlive-context-lettrine is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483551" version="1" comment="texlive-context-mathsets is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483552" version="1" comment="texlive-context-notes-zh-cn is &lt;2017.133.svn23171-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483553" version="1" comment="texlive-context-rst is &lt;2017.133.0.0.6csvn33092-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483554" version="1" comment="texlive-context-ruby is &lt;2017.133.svn28434-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483555" version="1" comment="texlive-context-simplefonts is &lt;2017.133.svn29229-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483556" version="1" comment="texlive-context-simpleslides is &lt;2017.133.svn34438-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483557" version="1" comment="texlive-context-title is &lt;2017.133.svn36189-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483558" version="1" comment="texlive-context-transliterator is &lt;2017.133.svn29801-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483559" version="1" comment="texlive-context-typearea is &lt;2017.133.svn23167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483560" version="1" comment="texlive-context-typescripts is &lt;2017.133.svn25411-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483561" version="1" comment="texlive-context-vim is &lt;2017.133.svn37413-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483562" version="1" comment="texlive-context-visualcounter is &lt;2017.133.svn36190-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483563" version="1" comment="texlive-continue is &lt;2017.133.0.0.1svn39308-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483564" version="1" comment="texlive-contour is &lt;2017.133.2.14svn18950-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483565" version="1" comment="texlive-contracard is &lt;2017.133.1.0.1svn31745-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483566" version="1" comment="texlive-conv-xkv is &lt;2017.133.svn43558-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483567" version="1" comment="texlive-convbkmk is &lt;2017.133.0.0.10asvn35923-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483569" version="1" comment="texlive-cooking is &lt;2017.133.0.0.9bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483570" version="1" comment="texlive-cooking-units is &lt;2017.133.1.10svn42507-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483571" version="1" comment="texlive-cookingsymbols is &lt;2017.133.1.1svn35929-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483572" version="1" comment="texlive-cool is &lt;2017.133.1.35svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483573" version="1" comment="texlive-coollist is &lt;2017.133.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483574" version="1" comment="texlive-coolstr is &lt;2017.133.2.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483575" version="1" comment="texlive-coolthms is &lt;2017.133.1.2svn29062-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483576" version="1" comment="texlive-cooltooltips is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483577" version="1" comment="texlive-coordsys is &lt;2017.133.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483578" version="1" comment="texlive-copyedit is &lt;2017.133.1.6svn37928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483579" version="1" comment="texlive-copyrightbox is &lt;2017.133.0.0.1svn24829-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483580" version="1" comment="texlive-cormorantgaramond is &lt;2017.133.3.00svn41865-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483581" version="1" comment="texlive-cormorantgaramond-fonts is &lt;2017.133.3.00svn41865-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483582" version="1" comment="texlive-correctmathalign is &lt;2017.133.1.1svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483583" version="1" comment="texlive-coseoul is &lt;2017.133.1.1svn23862-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483584" version="1" comment="texlive-countriesofeurope is &lt;2017.133.0.0.21svn26042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483585" version="1" comment="texlive-countriesofeurope-fonts is &lt;2017.133.0.0.21svn26042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483586" version="1" comment="texlive-counttexruns is &lt;2017.133.1.00asvn27576-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483587" version="1" comment="texlive-courier is &lt;2017.133.svn35058-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483588" version="1" comment="texlive-courier-fonts is &lt;2017.133.svn35058-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483589" version="1" comment="texlive-courier-scaled is &lt;2017.133.svn24940-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483590" version="1" comment="texlive-courseoutline is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483591" version="1" comment="texlive-coursepaper is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483592" version="1" comment="texlive-coverpage is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483593" version="1" comment="texlive-covington is &lt;2017.133.1.4svn44501-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483594" version="1" comment="texlive-cprotect is &lt;2017.133.1.0esvn21209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483595" version="1" comment="texlive-cquthesis is &lt;2017.133.1.20svn44476-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483596" version="1" comment="texlive-crbox is &lt;2017.133.0.0.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483597" version="1" comment="texlive-crimson is &lt;2017.133.svn43525-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483598" version="1" comment="texlive-crimson-fonts is &lt;2017.133.svn43525-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483599" version="1" comment="texlive-crop is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483600" version="1" comment="texlive-crossreference is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483601" version="1" comment="texlive-crossrefware is &lt;2017.133.2.1asvn43993-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483603" version="1" comment="texlive-crossword is &lt;2017.133.1.9svn32657-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483604" version="1" comment="texlive-crosswrd is &lt;2017.133.3.0svn16896-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483605" version="1" comment="texlive-cryptocode is &lt;2017.133.0.0.1svn37019-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483606" version="1" comment="texlive-cryst is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483607" version="1" comment="texlive-cryst-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483608" version="1" comment="texlive-cs is &lt;2017.133.svn41553-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483609" version="1" comment="texlive-cs-fonts is &lt;2017.133.svn41553-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483610" version="1" comment="texlive-csbulletin is &lt;2017.133.1.1svn43277-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483611" version="1" comment="texlive-cslatex is &lt;2017.133.svn40855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483613" version="1" comment="texlive-csplain is &lt;2017.133.svn44321-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483615" version="1" comment="texlive-csquotes is &lt;2017.133.5.2bsvn43469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483616" version="1" comment="texlive-csquotes-de is &lt;2017.133.1.01svn23371-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483617" version="1" comment="texlive-css-colors is &lt;2017.133.1.02svn43961-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483618" version="1" comment="texlive-cstex is &lt;2017.133.svn41301-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483619" version="1" comment="texlive-cstypo is &lt;2017.133.0.0.03svn41986-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483620" version="1" comment="texlive-csvsimple is &lt;2017.133.1.20svn41597-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483621" version="1" comment="texlive-ctable is &lt;2017.133.1.31svn38672-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483622" version="1" comment="texlive-ctablestack is &lt;2017.133.1.0svn38514-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483623" version="1" comment="texlive-ctan_chk is &lt;2017.133.1.0svn36304-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483624" version="1" comment="texlive-ctanify is &lt;2017.133.1.9.1svn44129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483626" version="1" comment="texlive-ctanupload is &lt;2017.133.1.2csvn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483628" version="1" comment="texlive-ctex is &lt;2017.133.2.4.9svn43669-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483629" version="1" comment="texlive-ctex-faq is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483630" version="1" comment="texlive-ctib is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483631" version="1" comment="texlive-ctie is &lt;2017.133.1.1svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483633" version="1" comment="texlive-cuisine is &lt;2017.133.0.0.7svn34453-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483634" version="1" comment="texlive-currency is &lt;2017.133.0.0.1svn44489-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483635" version="1" comment="texlive-currfile is &lt;2017.133.0.0.7csvn40725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483636" version="1" comment="texlive-currvita is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483637" version="1" comment="texlive-cursolatex is &lt;2017.133.svn24139-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483638" version="1" comment="texlive-curve is &lt;2017.133.1.16svn20745-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483639" version="1" comment="texlive-curve2e is &lt;2017.133.1.60svn37839-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483640" version="1" comment="texlive-curves is &lt;2017.133.1.53svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483641" version="1" comment="texlive-custom-bib is &lt;2017.133.4.33svn24729-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483642" version="1" comment="texlive-cutwin is &lt;2017.133.0.0.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483643" version="1" comment="texlive-cv is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483644" version="1" comment="texlive-cv4tw is &lt;2017.133.0.0.2svn34577-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483645" version="1" comment="texlive-cweb is &lt;2017.133.3.64bsvn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483647" version="1" comment="texlive-cweb-latex is &lt;2017.133.svn28878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483648" version="1" comment="texlive-cyber is &lt;2017.133.2.1svn37658-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483649" version="1" comment="texlive-cybercic is &lt;2017.133.2.1svn37659-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483650" version="1" comment="texlive-cyklop is &lt;2017.133.0.0.915svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483651" version="1" comment="texlive-cyklop-fonts is &lt;2017.133.0.0.915svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483652" version="1" comment="texlive-cyrillic is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483653" version="1" comment="texlive-cyrillic-bin is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483655" version="1" comment="texlive-cyrplain is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483656" version="1" comment="texlive-dad is &lt;2017.133.1.1svn35362-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483657" version="1" comment="texlive-dad-fonts is &lt;2017.133.1.1svn35362-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483658" version="1" comment="texlive-dancers is &lt;2017.133.svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483659" version="1" comment="texlive-dantelogo is &lt;2017.133.0.0.03svn38599-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483660" version="1" comment="texlive-dantelogo-fonts is &lt;2017.133.0.0.03svn38599-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483661" version="1" comment="texlive-dashbox is &lt;2017.133.1.14svn23425-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483662" version="1" comment="texlive-dashrule is &lt;2017.133.1.3svn29579-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483663" version="1" comment="texlive-dashundergaps is &lt;2017.133.1.2svn23373-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483664" version="1" comment="texlive-dataref is &lt;2017.133.0.0.6svn42883-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483665" version="1" comment="texlive-datatool is &lt;2017.133.2.27svn41772-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483666" version="1" comment="texlive-dateiliste is &lt;2017.133.0.0.6svn27974-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483667" version="1" comment="texlive-datenumber is &lt;2017.133.0.0.02svn18951-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483668" version="1" comment="texlive-datetime is &lt;2017.133.2.60svn36650-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483669" version="1" comment="texlive-datetime2 is &lt;2017.133.1.5.2svn41686-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483670" version="1" comment="texlive-datetime2-bahasai is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483671" version="1" comment="texlive-datetime2-basque is &lt;2017.133.1.2svn38287-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483672" version="1" comment="texlive-datetime2-breton is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483673" version="1" comment="texlive-datetime2-bulgarian is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483674" version="1" comment="texlive-datetime2-catalan is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483675" version="1" comment="texlive-datetime2-croatian is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483676" version="1" comment="texlive-datetime2-czech is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483677" version="1" comment="texlive-datetime2-danish is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483678" version="1" comment="texlive-datetime2-dutch is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483679" version="1" comment="texlive-datetime2-en-fulltext is &lt;2017.133.1.0svn36705-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483680" version="1" comment="texlive-datetime2-english is &lt;2017.133.1.04svn39991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483681" version="1" comment="texlive-datetime2-esperanto is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483682" version="1" comment="texlive-datetime2-estonian is &lt;2017.133.1.0svn36682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483683" version="1" comment="texlive-datetime2-finnish is &lt;2017.133.1.1svn40237-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483684" version="1" comment="texlive-datetime2-french is &lt;2017.133.1.02svn43742-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483685" version="1" comment="texlive-datetime2-galician is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483686" version="1" comment="texlive-datetime2-german is &lt;2017.133.1.1svn43452-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483687" version="1" comment="texlive-datetime2-greek is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483688" version="1" comment="texlive-datetime2-hebrew is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483689" version="1" comment="texlive-datetime2-icelandic is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483690" version="1" comment="texlive-datetime2-irish is &lt;2017.133.1.0svn36635-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483691" version="1" comment="texlive-datetime2-it-fulltext is &lt;2017.133.1.6svn38093-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483692" version="1" comment="texlive-datetime2-italian is &lt;2017.133.1.3svn37146-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483693" version="1" comment="texlive-datetime2-latin is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483694" version="1" comment="texlive-datetime2-lsorbian is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483695" version="1" comment="texlive-datetime2-magyar is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483696" version="1" comment="texlive-datetime2-norsk is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483697" version="1" comment="texlive-datetime2-polish is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483698" version="1" comment="texlive-datetime2-portuges is &lt;2017.133.1.0svn36670-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483699" version="1" comment="texlive-datetime2-romanian is &lt;2017.133.1.01svn43743-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483700" version="1" comment="texlive-datetime2-russian is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483701" version="1" comment="texlive-datetime2-samin is &lt;2017.133.1.0svn36692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483702" version="1" comment="texlive-datetime2-scottish is &lt;2017.133.1.0svn36625-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483703" version="1" comment="texlive-datetime2-serbian is &lt;2017.133.1.0svn36699-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483704" version="1" comment="texlive-datetime2-slovak is &lt;2017.133.1.0svn36700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483705" version="1" comment="texlive-datetime2-slovene is &lt;2017.133.1.0svn36700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483706" version="1" comment="texlive-datetime2-spanish is &lt;2017.133.1.0svn36661-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483707" version="1" comment="texlive-datetime2-swedish is &lt;2017.133.1.0svn36700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483708" version="1" comment="texlive-datetime2-turkish is &lt;2017.133.1.0svn36700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483709" version="1" comment="texlive-datetime2-ukrainian is &lt;2017.133.1.1svn44562-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483710" version="1" comment="texlive-datetime2-usorbian is &lt;2017.133.1.0svn36700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483711" version="1" comment="texlive-datetime2-welsh is &lt;2017.133.1.0svn36636-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483712" version="1" comment="texlive-dblfloatfix is &lt;2017.133.1.0asvn28983-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483713" version="1" comment="texlive-dccpaper is &lt;2017.133.1.5svn41804-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483714" version="1" comment="texlive-dcpic is &lt;2017.133.5.0.0svn30206-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483715" version="1" comment="texlive-de-macro is &lt;2017.133.1.3svn26355-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483717" version="1" comment="texlive-decimal is &lt;2017.133.svn23374-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483718" version="1" comment="texlive-decorule is &lt;2017.133.0.0.6svn23487-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483719" version="1" comment="texlive-dehyph-exptl is &lt;2017.133.0.0.41svn43666-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483720" version="1" comment="texlive-dejavu is &lt;2017.133.2.34svn31771-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483721" version="1" comment="texlive-dejavu-fonts is &lt;2017.133.2.34svn31771-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483722" version="1" comment="texlive-delim is &lt;2017.133.1.0svn23974-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483723" version="1" comment="texlive-delimseasy is &lt;2017.133.2.0svn39589-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483724" version="1" comment="texlive-delimset is &lt;2017.133.1.0svn42415-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483725" version="1" comment="texlive-delimtxt is &lt;2017.133.svn16549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483726" version="1" comment="texlive-denisbdoc is &lt;2017.133.0.0.7svn42829-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483727" version="1" comment="texlive-detex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483729" version="1" comment="texlive-dhua is &lt;2017.133.0.0.11svn24035-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483730" version="1" comment="texlive-diadia is &lt;2017.133.1.1svn37656-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483732" version="1" comment="texlive-diagbox is &lt;2017.133.2.2svn42843-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483733" version="1" comment="texlive-diagmac2 is &lt;2017.133.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483734" version="1" comment="texlive-diagnose is &lt;2017.133.0.0.2svn19387-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483735" version="1" comment="texlive-dialogl is &lt;2017.133.svn28946-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483736" version="1" comment="texlive-dice is &lt;2017.133.svn28501-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483737" version="1" comment="texlive-dichokey is &lt;2017.133.svn17192-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483738" version="1" comment="texlive-dickimaw is &lt;2017.133.svn32925-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483739" version="1" comment="texlive-dictsym is &lt;2017.133.svn20031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483740" version="1" comment="texlive-dictsym-fonts is &lt;2017.133.svn20031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483741" version="1" comment="texlive-diffcoeff is &lt;2017.133.1.0svn41554-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483742" version="1" comment="texlive-digiconfigs is &lt;2017.133.0.0.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483743" version="1" comment="texlive-din1505 is &lt;2017.133.svn19441-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483744" version="1" comment="texlive-dinat is &lt;2017.133.2.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483745" version="1" comment="texlive-dinbrief is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483746" version="1" comment="texlive-dingbat is &lt;2017.133.1.0svn27918-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483747" version="1" comment="texlive-directory is &lt;2017.133.1.20svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483748" version="1" comment="texlive-dirtree is &lt;2017.133.0.0.32svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483749" version="1" comment="texlive-dirtytalk is &lt;2017.133.1.0svn20520-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483750" version="1" comment="texlive-disser is &lt;2017.133.1.5.0svn43417-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483751" version="1" comment="texlive-dithesis is &lt;2017.133.0.0.2svn34295-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483752" version="1" comment="texlive-dk-bib is &lt;2017.133.0.0.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483753" version="1" comment="texlive-dlfltxb is &lt;2017.133.svn17337-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483754" version="1" comment="texlive-dnaseq is &lt;2017.133.0.0.01svn17194-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483755" version="1" comment="texlive-dnp is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483756" version="1" comment="texlive-doc-pictex is &lt;2017.133.svn24927-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483757" version="1" comment="texlive-docbytex is &lt;2017.133.svn34294-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483758" version="1" comment="texlive-doclicense is &lt;2017.133.1.5.0svn40723-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483759" version="1" comment="texlive-docmfp is &lt;2017.133.1.2dsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483760" version="1" comment="texlive-docmute is &lt;2017.133.1.4svn25741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483761" version="1" comment="texlive-docsurvey is &lt;2017.133.svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483762" version="1" comment="texlive-doctools is &lt;2017.133.0.0.1svn34474-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483763" version="1" comment="texlive-documentation is &lt;2017.133.0.0.1svn34521-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483764" version="1" comment="texlive-doi is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483765" version="1" comment="texlive-doipubmed is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483766" version="1" comment="texlive-dosepsbin is &lt;2017.133.1.2svn29752-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483768" version="1" comment="texlive-dot2texi is &lt;2017.133.3.0svn26237-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483769" version="1" comment="texlive-dotarrow is &lt;2017.133.0.0.01asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483770" version="1" comment="texlive-dotseqn is &lt;2017.133.1.1svn17195-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483771" version="1" comment="texlive-dottex is &lt;2017.133.0.0.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483772" version="1" comment="texlive-doublestroke is &lt;2017.133.1.111svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483773" version="1" comment="texlive-doublestroke-fonts is &lt;2017.133.1.111svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483774" version="1" comment="texlive-dowith is &lt;2017.133.r0.32svn38860-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483775" version="1" comment="texlive-download is &lt;2017.133.1.1svn30695-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483776" version="1" comment="texlive-dox is &lt;2017.133.2.3svn43060-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483777" version="1" comment="texlive-dozenal is &lt;2017.133.7.0svn42608-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483778" version="1" comment="texlive-dozenal-fonts is &lt;2017.133.7.0svn42608-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483779" version="1" comment="texlive-dpfloat is &lt;2017.133.svn17196-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483780" version="1" comment="texlive-dprogress is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483781" version="1" comment="texlive-drac is &lt;2017.133.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483782" version="1" comment="texlive-draftcopy is &lt;2017.133.2.16svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483783" version="1" comment="texlive-draftfigure is &lt;2017.133.0.0.1svn44269-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483784" version="1" comment="texlive-draftwatermark is &lt;2017.133.1.2svn37498-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483785" version="1" comment="texlive-dramatist is &lt;2017.133.1.2esvn35866-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483786" version="1" comment="texlive-dratex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483787" version="1" comment="texlive-drawmatrix is &lt;2017.133.1.5.0svn44471-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483788" version="1" comment="texlive-drawstack is &lt;2017.133.svn28582-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483789" version="1" comment="texlive-drm is &lt;2017.133.4.4svn38157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483790" version="1" comment="texlive-drm-fonts is &lt;2017.133.4.4svn38157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483791" version="1" comment="texlive-droid is &lt;2017.133.2.1svn23912-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483792" version="1" comment="texlive-droid-fonts is &lt;2017.133.2.1svn23912-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483793" version="1" comment="texlive-droit-fr is &lt;2017.133.1.2svn39802-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483794" version="1" comment="texlive-drs is &lt;2017.133.1.1bsvn19232-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483795" version="1" comment="texlive-drv is &lt;2017.133.0.0.97svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483796" version="1" comment="texlive-dsptricks is &lt;2017.133.1.0svn34724-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483797" version="1" comment="texlive-dtk is &lt;2017.133.2.07asvn44524-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483798" version="1" comment="texlive-dtl is &lt;2017.133.0.0.6.1svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483800" version="1" comment="texlive-dtxdescribe is &lt;2017.133.0.0.10svn42661-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483801" version="1" comment="texlive-dtxgallery is &lt;2017.133.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483802" version="1" comment="texlive-dtxgen is &lt;2017.133.1.07svn38419-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483804" version="1" comment="texlive-dtxtut is &lt;2017.133.2.1svn38375-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483805" version="1" comment="texlive-duerer is &lt;2017.133.svn20741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483806" version="1" comment="texlive-duerer-latex is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483807" version="1" comment="texlive-duotenzor is &lt;2017.133.1.00svn18728-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483808" version="1" comment="texlive-dutchcal is &lt;2017.133.1.0svn23448-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483809" version="1" comment="texlive-dutchcal-fonts is &lt;2017.133.1.0svn23448-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483810" version="1" comment="texlive-dvdcoll is &lt;2017.133.1.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483811" version="1" comment="texlive-dvgloss is &lt;2017.133.0.0.1svn29103-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483812" version="1" comment="texlive-dviasm is &lt;2017.133.svn36814-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483814" version="1" comment="texlive-dvicopy is &lt;2017.133.1.5svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483816" version="1" comment="texlive-dvidvi is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483818" version="1" comment="texlive-dviincl is &lt;2017.133.1.00svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483819" version="1" comment="texlive-dviinfox is &lt;2017.133.1.04svn44515-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483821" version="1" comment="texlive-dviljk is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483823" version="1" comment="texlive-dvipdfmx is &lt;2017.133.svn44224-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483825" version="1" comment="texlive-dvipng is &lt;2017.133.1.15svn44167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483827" version="1" comment="texlive-dvipos is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483829" version="1" comment="texlive-dvips is &lt;2017.133.svn44167-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483831" version="1" comment="texlive-dvipsconfig is &lt;2017.133.1.6svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483832" version="1" comment="texlive-dvisvgm is &lt;2017.133.2.1.3svn40768-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483834" version="1" comment="texlive-dynamicnumber is &lt;2017.133.0.0.1.3svn38726-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483835" version="1" comment="texlive-dynblocks is &lt;2017.133.0.0.2bsvn35193-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483836" version="1" comment="texlive-dyntree is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483837" version="1" comment="texlive-e-french is &lt;2017.133.6.0svn38742-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483838" version="1" comment="texlive-ean is &lt;2017.133.svn20851-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483839" version="1" comment="texlive-ean13isbn is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483840" version="1" comment="texlive-easy is &lt;2017.133.0.0.99svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483841" version="1" comment="texlive-easy-todo is &lt;2017.133.svn32677-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483842" version="1" comment="texlive-easyfig is &lt;2017.133.1.2svn26424-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483843" version="1" comment="texlive-easyformat is &lt;2017.133.1.4.0svn44543-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483844" version="1" comment="texlive-easylist is &lt;2017.133.1.3svn32661-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483845" version="1" comment="texlive-easyreview is &lt;2017.133.1.0svn38352-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483846" version="1" comment="texlive-ebezier is &lt;2017.133.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483847" version="1" comment="texlive-ebgaramond is &lt;2017.133.0.0.16svn35662-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483848" version="1" comment="texlive-ebgaramond-fonts is &lt;2017.133.0.0.16svn35662-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483849" version="1" comment="texlive-ebgaramond-maths is &lt;2017.133.1.1svn35701-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483850" version="1" comment="texlive-ebong is &lt;2017.133.svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483852" version="1" comment="texlive-ebook is &lt;2017.133.svn29466-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483853" version="1" comment="texlive-ebproof is &lt;2017.133.2.0svn44392-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483854" version="1" comment="texlive-ebsthesis is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483855" version="1" comment="texlive-ec is &lt;2017.133.1.0svn25033-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483856" version="1" comment="texlive-ecc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483857" version="1" comment="texlive-ecclesiastic is &lt;2017.133.0.0.3svn38172-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483858" version="1" comment="texlive-ecgdraw is &lt;2017.133.0.0.1svn41617-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483859" version="1" comment="texlive-ecltree is &lt;2017.133.1.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483860" version="1" comment="texlive-eco is &lt;2017.133.1.3svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483861" version="1" comment="texlive-ecobiblatex is &lt;2017.133.1.0svn39233-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483862" version="1" comment="texlive-econometrics is &lt;2017.133.1.0svn39396-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483863" version="1" comment="texlive-economic is &lt;2017.133.svn32639-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483864" version="1" comment="texlive-ecv is &lt;2017.133.0.0.3svn24928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483865" version="1" comment="texlive-ed is &lt;2017.133.1.8svn25231-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483866" version="1" comment="texlive-edfnotes is &lt;2017.133.0.0.6bsvn21540-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483867" version="1" comment="texlive-edmac is &lt;2017.133.3.17svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483868" version="1" comment="texlive-edmargin is &lt;2017.133.1.2svn27599-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483869" version="1" comment="texlive-ednotes is &lt;2017.133.1.3asvn35829-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483870" version="1" comment="texlive-eemeir is &lt;2017.133.1.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483871" version="1" comment="texlive-eepic is &lt;2017.133.1.1esvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483872" version="1" comment="texlive-efbox is &lt;2017.133.1.0svn33236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483873" version="1" comment="texlive-egameps is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483874" version="1" comment="texlive-egplot is &lt;2017.133.1.02asvn20617-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483875" version="1" comment="texlive-eiad is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483876" version="1" comment="texlive-eiad-ltx is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483877" version="1" comment="texlive-eijkhout is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483878" version="1" comment="texlive-einfuehrung is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483879" version="1" comment="texlive-einfuehrung2 is &lt;2017.133.svn39153-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483880" version="1" comment="texlive-ejpecp is &lt;2017.133.1.5svn42003-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483881" version="1" comment="texlive-ekaia is &lt;2017.133.1.04svn42578-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483882" version="1" comment="texlive-elbioimp is &lt;2017.133.1.2svn21758-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483883" version="1" comment="texlive-electrum is &lt;2017.133.1.005_bsvn19705-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483884" version="1" comment="texlive-electrum-fonts is &lt;2017.133.1.005_bsvn19705-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483885" version="1" comment="texlive-eledform is &lt;2017.133.1.1asvn38114-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483886" version="1" comment="texlive-eledmac is &lt;2017.133.1.24.11svn38639-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483887" version="1" comment="texlive-elements is &lt;2017.133.0.0.2svn41161-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483888" version="1" comment="texlive-ellipse is &lt;2017.133.1.0svn39025-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483889" version="1" comment="texlive-ellipsis is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483890" version="1" comment="texlive-elmath is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483891" version="1" comment="texlive-elocalloc is &lt;2017.133.0.0.03svn42712-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483892" version="1" comment="texlive-elpres is &lt;2017.133.0.0.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483893" version="1" comment="texlive-elsarticle is &lt;2017.133.1.20svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483894" version="1" comment="texlive-elteikthesis is &lt;2017.133.1.2svn22513-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483895" version="1" comment="texlive-eltex is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483896" version="1" comment="texlive-elvish is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483897" version="1" comment="texlive-elzcards is &lt;2017.133.1.20svn37063-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483898" version="1" comment="texlive-emarks is &lt;2017.133.1.0svn24504-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483899" version="1" comment="texlive-embedall is &lt;2017.133.1.0svn31903-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483900" version="1" comment="texlive-embrac is &lt;2017.133.0.0.6dsvn39334-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483901" version="1" comment="texlive-emf is &lt;2017.133.1svn42023-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483902" version="1" comment="texlive-emisa is &lt;2017.133.2.1.1svn41731-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483903" version="1" comment="texlive-emp is &lt;2017.133.svn23483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483904" version="1" comment="texlive-emptypage is &lt;2017.133.1.2svn18064-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483905" version="1" comment="texlive-emulateapj is &lt;2017.133.svn28469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483906" version="1" comment="texlive-enctex is &lt;2017.133.svn34957-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483907" version="1" comment="texlive-encxvlna is &lt;2017.133.1.1svn34087-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483908" version="1" comment="texlive-endfloat is &lt;2017.133.2.5dsvn24962-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483909" version="1" comment="texlive-endheads is &lt;2017.133.1.6svn43750-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483910" version="1" comment="texlive-endiagram is &lt;2017.133.0.0.1dsvn34486-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483911" version="1" comment="texlive-endnotes is &lt;2017.133.svn17197-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483912" version="1" comment="texlive-engpron is &lt;2017.133.2svn16558-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483913" version="1" comment="texlive-engrec is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483914" version="1" comment="texlive-engtlc is &lt;2017.133.3.2svn28571-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483915" version="1" comment="texlive-enigma is &lt;2017.133.0.0.1svn29802-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483916" version="1" comment="texlive-enotez is &lt;2017.133.0.0.9asvn44024-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483917" version="1" comment="texlive-enumitem is &lt;2017.133.3.5.2svn24146-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483918" version="1" comment="texlive-enumitem-zref is &lt;2017.133.1.8svn21472-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483919" version="1" comment="texlive-envbig is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483920" version="1" comment="texlive-environ is &lt;2017.133.0.0.3svn33821-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483921" version="1" comment="texlive-envlab is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483922" version="1" comment="texlive-epigrafica is &lt;2017.133.1.01svn17210-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483923" version="1" comment="texlive-epigrafica-fonts is &lt;2017.133.1.01svn17210-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483924" version="1" comment="texlive-epigram is &lt;2017.133.svn20513-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483925" version="1" comment="texlive-epigraph is &lt;2017.133.1.5csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483926" version="1" comment="texlive-epiolmec is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483927" version="1" comment="texlive-epiolmec-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483928" version="1" comment="texlive-eplain is &lt;2017.133.3.8svn41154-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483930" version="1" comment="texlive-epsdice is &lt;2017.133.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483931" version="1" comment="texlive-epsf is &lt;2017.133.2.7.4svn21461-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483932" version="1" comment="texlive-epsf-dvipdfmx is &lt;2017.133.2014svn35575-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483933" version="1" comment="texlive-epsincl is &lt;2017.133.0.0.2svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483934" version="1" comment="texlive-epslatex-fr is &lt;2017.133.svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483935" version="1" comment="texlive-epspdf is &lt;2017.133.0.0.6.3svn40917-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483937" version="1" comment="texlive-epspdfconversion is &lt;2017.133.0.0.61svn18703-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483938" version="1" comment="texlive-epstopdf is &lt;2017.133.2.26svn42905-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483940" version="1" comment="texlive-eqell is &lt;2017.133.svn22931-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483941" version="1" comment="texlive-eqlist is &lt;2017.133.2.1svn32257-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483942" version="1" comment="texlive-eqnalign is &lt;2017.133.1.0asvn43278-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483943" version="1" comment="texlive-eqname is &lt;2017.133.svn20678-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483944" version="1" comment="texlive-eqnarray is &lt;2017.133.1.3svn20641-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483945" version="1" comment="texlive-eqparbox is &lt;2017.133.4.0svn29419-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483946" version="1" comment="texlive-erdc is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483947" version="1" comment="texlive-erewhon is &lt;2017.133.1.08svn43506-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483948" version="1" comment="texlive-erewhon-fonts is &lt;2017.133.1.08svn43506-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483949" version="1" comment="texlive-errata is &lt;2017.133.0.0.3svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483950" version="1" comment="texlive-es-tex-faq is &lt;2017.133.1.97svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483951" version="1" comment="texlive-esami is &lt;2017.133.2.1svn41774-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483952" version="1" comment="texlive-esdiff is &lt;2017.133.1.2svn21385-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483953" version="1" comment="texlive-esint is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483954" version="1" comment="texlive-esint-type1 is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483955" version="1" comment="texlive-esint-type1-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483956" version="1" comment="texlive-esk is &lt;2017.133.1.0svn18115-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483957" version="1" comment="texlive-eskd is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483958" version="1" comment="texlive-eskdx is &lt;2017.133.0.0.98svn29235-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483959" version="1" comment="texlive-eso-pic is &lt;2017.133.2.0gsvn37925-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483960" version="1" comment="texlive-esrelation is &lt;2017.133.svn37236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483961" version="1" comment="texlive-esrelation-fonts is &lt;2017.133.svn37236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483962" version="1" comment="texlive-esstix is &lt;2017.133.1.0svn22426-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483963" version="1" comment="texlive-esstix-fonts is &lt;2017.133.1.0svn22426-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483964" version="1" comment="texlive-estcpmm is &lt;2017.133.0.0.4svn17335-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483965" version="1" comment="texlive-esvect is &lt;2017.133.1.3svn32098-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483966" version="1" comment="texlive-esvect-fonts is &lt;2017.133.1.3svn32098-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483967" version="1" comment="texlive-etaremune is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483968" version="1" comment="texlive-etdipa is &lt;2017.133.2.6svn36354-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483969" version="1" comment="texlive-etex is &lt;2017.133.svn37057-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483970" version="1" comment="texlive-etex-pkg is &lt;2017.133.2.7svn41784-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483971" version="1" comment="texlive-etextools is &lt;2017.133.3.1415926svn20694-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483972" version="1" comment="texlive-ethiop is &lt;2017.133.0.0.7svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483973" version="1" comment="texlive-ethiop-t1 is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483974" version="1" comment="texlive-ethiop-t1-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483975" version="1" comment="texlive-etoc is &lt;2017.133.1.08isvn42182-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483976" version="1" comment="texlive-etoolbox is &lt;2017.133.2.4svn42855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483977" version="1" comment="texlive-etoolbox-de is &lt;2017.133.1svn21906-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483978" version="1" comment="texlive-euenc is &lt;2017.133.0.0.1hsvn19795-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483979" version="1" comment="texlive-eukdate is &lt;2017.133.1.04svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483980" version="1" comment="texlive-euler is &lt;2017.133.2.5svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483981" version="1" comment="texlive-eulerpx is &lt;2017.133.0.0.2.1svn43735-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483982" version="1" comment="texlive-eulervm is &lt;2017.133.4.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483983" version="1" comment="texlive-euro is &lt;2017.133.1.1svn22191-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483984" version="1" comment="texlive-euro-ce is &lt;2017.133.3.0bsvn25714-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483985" version="1" comment="texlive-europasscv is &lt;2017.133.svn43033-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483986" version="1" comment="texlive-europecv is &lt;2017.133.svn34454-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483987" version="1" comment="texlive-eurosym is &lt;2017.133.1.4_subrfixsvn17265-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483988" version="1" comment="texlive-eurosym-fonts is &lt;2017.133.1.4_subrfixsvn17265-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483989" version="1" comment="texlive-euxm is &lt;2017.133.svn20202-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483990" version="1" comment="texlive-everyhook is &lt;2017.133.1.2svn35675-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483991" version="1" comment="texlive-everypage is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483992" version="1" comment="texlive-exam is &lt;2017.133.2.5svn37279-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483993" version="1" comment="texlive-exam-n is &lt;2017.133.1.1.4svn42755-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483994" version="1" comment="texlive-examdesign is &lt;2017.133.1.101svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483995" version="1" comment="texlive-example is &lt;2017.133.svn33398-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483996" version="1" comment="texlive-examplep is &lt;2017.133.0.0.04svn16916-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483997" version="1" comment="texlive-exceltex is &lt;2017.133.0.0.5.1svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009483999" version="1" comment="texlive-excludeonly is &lt;2017.133.1.0svn17262-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484000" version="1" comment="texlive-exercise is &lt;2017.133.1.6svn35417-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484001" version="1" comment="texlive-exercises is &lt;2017.133.1.0svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484002" version="1" comment="texlive-exp-testopt is &lt;2017.133.0.0.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484003" version="1" comment="texlive-expdlist is &lt;2017.133.2.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484004" version="1" comment="texlive-expex is &lt;2017.133.5.1bsvn44499-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484005" version="1" comment="texlive-export is &lt;2017.133.1.8svn27206-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484006" version="1" comment="texlive-expressg is &lt;2017.133.1.5svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484007" version="1" comment="texlive-exsheets is &lt;2017.133.0.0.21isvn43188-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484008" version="1" comment="texlive-exsol is &lt;2017.133.1.2svn41377-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484009" version="1" comment="texlive-extarrows is &lt;2017.133.1.0bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484010" version="1" comment="texlive-exteps is &lt;2017.133.0.0.41svn19859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484011" version="1" comment="texlive-extpfeil is &lt;2017.133.0.0.4svn16243-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484012" version="1" comment="texlive-extract is &lt;2017.133.1.8svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484013" version="1" comment="texlive-extsizes is &lt;2017.133.1.4asvn17263-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484014" version="1" comment="texlive-facsimile is &lt;2017.133.1.0svn21328-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484015" version="1" comment="texlive-factura is &lt;2017.133.3.00svn43470-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484016" version="1" comment="texlive-facture is &lt;2017.133.1.2.2svn43865-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484017" version="1" comment="texlive-faktor is &lt;2017.133.0.0.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484018" version="1" comment="texlive-fancybox is &lt;2017.133.1.4svn18304-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484019" version="1" comment="texlive-fancyhdr is &lt;2017.133.3.9svn44479-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484020" version="1" comment="texlive-fancyhdr-it is &lt;2017.133.svn21912-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484021" version="1" comment="texlive-fancylabel is &lt;2017.133.1.0svn34684-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484022" version="1" comment="texlive-fancynum is &lt;2017.133.0.0.92svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484023" version="1" comment="texlive-fancypar is &lt;2017.133.1.1svn18018-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484024" version="1" comment="texlive-fancyref is &lt;2017.133.0.0.9csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484025" version="1" comment="texlive-fancyslides is &lt;2017.133.1.0svn36263-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484026" version="1" comment="texlive-fancytabs is &lt;2017.133.1.9svn41549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484027" version="1" comment="texlive-fancytooltips is &lt;2017.133.1.8svn27129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484028" version="1" comment="texlive-fancyvrb is &lt;2017.133.2.8svn18492-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484029" version="1" comment="texlive-fandol is &lt;2017.133.0.0.3svn37889-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484030" version="1" comment="texlive-fandol-fonts is &lt;2017.133.0.0.3svn37889-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484031" version="1" comment="texlive-fast-diagram is &lt;2017.133.1.1svn29264-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484032" version="1" comment="texlive-fbb is &lt;2017.133.1.12svn43464-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484033" version="1" comment="texlive-fbb-fonts is &lt;2017.133.1.12svn43464-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484034" version="1" comment="texlive-fbithesis is &lt;2017.133.1.2msvn21340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484035" version="1" comment="texlive-fbs is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484036" version="1" comment="texlive-fc is &lt;2017.133.1.4svn32796-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484037" version="1" comment="texlive-fcavtex is &lt;2017.133.1.1svn38074-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484038" version="1" comment="texlive-fcltxdoc is &lt;2017.133.1.0svn24500-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484039" version="1" comment="texlive-fcolumn is &lt;2017.133.1.1.1svn38489-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484040" version="1" comment="texlive-fdsymbol is &lt;2017.133.0.0.8svn26722-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484041" version="1" comment="texlive-fdsymbol-fonts is &lt;2017.133.0.0.8svn26722-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484042" version="1" comment="texlive-featpost is &lt;2017.133.0.0.8.8svn35346-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484043" version="1" comment="texlive-fei is &lt;2017.133.3.0.6svn43630-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484044" version="1" comment="texlive-fenixpar is &lt;2017.133.0.0.92svn24730-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484045" version="1" comment="texlive-fetamont is &lt;2017.133.svn43812-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484046" version="1" comment="texlive-fetamont-fonts is &lt;2017.133.svn43812-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484047" version="1" comment="texlive-feupphdteses is &lt;2017.133.4.0svn30962-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484048" version="1" comment="texlive-feyn is &lt;2017.133.0.0.3.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484049" version="1" comment="texlive-feynmf is &lt;2017.133.1.08svn17259-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484050" version="1" comment="texlive-feynmp-auto is &lt;2017.133.1.1svn30223-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484051" version="1" comment="texlive-ffslides is &lt;2017.133.svn38895-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484052" version="1" comment="texlive-fge is &lt;2017.133.1.25svn37628-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484053" version="1" comment="texlive-fge-fonts is &lt;2017.133.1.25svn37628-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484054" version="1" comment="texlive-fgruler is &lt;2017.133.1.0svn42966-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484055" version="1" comment="texlive-fibeamer is &lt;2017.133.1.1.7svn44239-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484056" version="1" comment="texlive-fifinddo-info is &lt;2017.133.1.1bsvn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484057" version="1" comment="texlive-fifo-stack is &lt;2017.133.1.0svn33288-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484058" version="1" comment="texlive-fig4latex is &lt;2017.133.0.0.2svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484060" version="1" comment="texlive-figbas is &lt;2017.133.1.0.3svn28943-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484061" version="1" comment="texlive-figbas-fonts is &lt;2017.133.1.0.3svn28943-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484062" version="1" comment="texlive-figbib is &lt;2017.133.svn19388-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484063" version="1" comment="texlive-figflow is &lt;2017.133.svn21462-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009043999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484064" version="1" comment="texlive-figsize is &lt;2017.133.0.0.1svn18784-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484065" version="1" comment="texlive-filecontents is &lt;2017.133.1.3svn24250-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484066" version="1" comment="texlive-filecontentsdef is &lt;2017.133.1.2svn42107-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484067" version="1" comment="texlive-filedate is &lt;2017.133.svn29529-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484068" version="1" comment="texlive-filehook is &lt;2017.133.0.0.5dsvn24280-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484069" version="1" comment="texlive-fileinfo is &lt;2017.133.0.0.81asvn28421-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484070" version="1" comment="texlive-filemod is &lt;2017.133.1.2svn24042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484071" version="1" comment="texlive-finbib is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484072" version="1" comment="texlive-findhyph is &lt;2017.133.3.4svn38674-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484074" version="1" comment="texlive-fink is &lt;2017.133.2.2.1svn24329-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484075" version="1" comment="texlive-finstrut is &lt;2017.133.0.0.5svn21719-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484076" version="1" comment="texlive-fira is &lt;2017.133.4.2svn42501-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484077" version="1" comment="texlive-fira-fonts is &lt;2017.133.4.2svn42501-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484078" version="1" comment="texlive-first-latex-doc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484079" version="1" comment="texlive-fitbox is &lt;2017.133.1.00svn38139-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484080" version="1" comment="texlive-fithesis is &lt;2017.133.0.0.3.46svn44472-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484081" version="1" comment="texlive-fix2col is &lt;2017.133.0.0.04svn38770-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484082" version="1" comment="texlive-fixcmex is &lt;2017.133.1.0svn38816-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484083" version="1" comment="texlive-fixfoot is &lt;2017.133.0.0.3asvn17131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484084" version="1" comment="texlive-fixlatvian is &lt;2017.133.1asvn21631-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484085" version="1" comment="texlive-fixltxhyph is &lt;2017.133.0.0.4svn25832-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484086" version="1" comment="texlive-fixme is &lt;2017.133.4.4svn43413-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484087" version="1" comment="texlive-fixmetodonotes is &lt;2017.133.0.0.2.2svn30168-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484088" version="1" comment="texlive-fixpdfmag is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484089" version="1" comment="texlive-fjodor is &lt;2017.133.svn20220-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484090" version="1" comment="texlive-flabels is &lt;2017.133.1.0svn17272-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484091" version="1" comment="texlive-flacards is &lt;2017.133.0.0.1.1bsvn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484092" version="1" comment="texlive-flagderiv is &lt;2017.133.0.0.10svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484093" version="1" comment="texlive-flashcards is &lt;2017.133.1.0.1svn19667-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484094" version="1" comment="texlive-flashmovie is &lt;2017.133.0.0.4svn25768-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484095" version="1" comment="texlive-flipbook is &lt;2017.133.0.0.2svn25584-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484096" version="1" comment="texlive-flippdf is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484097" version="1" comment="texlive-float is &lt;2017.133.1.3dsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484098" version="1" comment="texlive-floatrow is &lt;2017.133.0.0.3bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484099" version="1" comment="texlive-flowchart is &lt;2017.133.3.3svn36572-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484100" version="1" comment="texlive-flowfram is &lt;2017.133.1.17svn35291-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484101" version="1" comment="texlive-fltpoint is &lt;2017.133.1.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484102" version="1" comment="texlive-fmp is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484103" version="1" comment="texlive-fmtcount is &lt;2017.133.3.01svn37298-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484104" version="1" comment="texlive-fn2end is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484105" version="1" comment="texlive-fnbreak is &lt;2017.133.1.30svn25003-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484106" version="1" comment="texlive-fncychap is &lt;2017.133.1.34svn20710-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484107" version="1" comment="texlive-fncylab is &lt;2017.133.1.0svn17382-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484108" version="1" comment="texlive-fnpara is &lt;2017.133.svn25607-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484109" version="1" comment="texlive-fnpct is &lt;2017.133.0.0.4esvn40535-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484110" version="1" comment="texlive-fnspe is &lt;2017.133.1.1bsvn43380-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484111" version="1" comment="texlive-fntproof is &lt;2017.133.svn20638-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484112" version="1" comment="texlive-fnumprint is &lt;2017.133.1.1asvn29173-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484113" version="1" comment="texlive-foekfont is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484114" version="1" comment="texlive-foekfont-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484115" version="1" comment="texlive-foilhtml is &lt;2017.133.1.2svn21855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484116" version="1" comment="texlive-fonetika is &lt;2017.133.svn21326-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484117" version="1" comment="texlive-fonetika-fonts is &lt;2017.133.svn21326-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484118" version="1" comment="texlive-font-change is &lt;2017.133.2015.2svn40403-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484119" version="1" comment="texlive-font-change-xetex is &lt;2017.133.2016.1svn40404-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484120" version="1" comment="texlive-fontawesome is &lt;2017.133.4.6.3.2svn41412-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484121" version="1" comment="texlive-fontawesome-fonts is &lt;2017.133.4.6.3.2svn41412-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484122" version="1" comment="texlive-fontaxes is &lt;2017.133.1.0dsvn33276-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484123" version="1" comment="texlive-fontbook is &lt;2017.133.0.0.2svn23608-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484124" version="1" comment="texlive-fontch is &lt;2017.133.2.2svn17859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484125" version="1" comment="texlive-fontinst is &lt;2017.133.1.933svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484127" version="1" comment="texlive-fontmfizz is &lt;2017.133.svn43546-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484128" version="1" comment="texlive-fontmfizz-fonts is &lt;2017.133.svn43546-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484129" version="1" comment="texlive-fontname is &lt;2017.133.svn38345-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484130" version="1" comment="texlive-fontools is &lt;2017.133.svn43573-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484132" version="1" comment="texlive-fonts-churchslavonic is &lt;2017.133.1.1svn43121-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484133" version="1" comment="texlive-fonts-churchslavonic-fonts is &lt;2017.133.1.1svn43121-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484134" version="1" comment="texlive-fonts-tlwg is &lt;2017.133.0.0.6.3svn41366-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484135" version="1" comment="texlive-fonts-tlwg-fonts is &lt;2017.133.0.0.6.3svn41366-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484136" version="1" comment="texlive-fontspec is &lt;2017.133.2.6asvn43661-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484137" version="1" comment="texlive-fonttable is &lt;2017.133.1.6bsvn21399-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484138" version="1" comment="texlive-fontware is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484140" version="1" comment="texlive-fontwrap is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484141" version="1" comment="texlive-footbib is &lt;2017.133.2.0.7svn17115-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484142" version="1" comment="texlive-footmisc is &lt;2017.133.5.5bsvn23330-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484143" version="1" comment="texlive-footmisx is &lt;2017.133.20161201svn42621-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484144" version="1" comment="texlive-footnotebackref is &lt;2017.133.1.0svn27034-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484145" version="1" comment="texlive-footnotehyper is &lt;2017.133.1.0svn43424-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484146" version="1" comment="texlive-footnoterange is &lt;2017.133.1.0asvn25430-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484147" version="1" comment="texlive-footnpag is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484148" version="1" comment="texlive-forarray is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484149" version="1" comment="texlive-foreign is &lt;2017.133.2.7svn27819-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484150" version="1" comment="texlive-forest is &lt;2017.133.2.1.4svn43129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484151" version="1" comment="texlive-forest-quickstart is &lt;2017.133.svn42503-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484152" version="1" comment="texlive-forloop is &lt;2017.133.3.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484153" version="1" comment="texlive-formation-latex-ul is &lt;2017.133.2016.11_3svn43005-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484154" version="1" comment="texlive-formlett is &lt;2017.133.2.3svn21480-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484155" version="1" comment="texlive-formular is &lt;2017.133.1.0asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484156" version="1" comment="texlive-fouridx is &lt;2017.133.2.00svn32214-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484157" version="1" comment="texlive-fourier is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484158" version="1" comment="texlive-fourier-fonts is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484159" version="1" comment="texlive-fouriernc is &lt;2017.133.svn29646-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484160" version="1" comment="texlive-fp is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484161" version="1" comment="texlive-fpl is &lt;2017.133.1.002svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484162" version="1" comment="texlive-fpl-fonts is &lt;2017.133.1.002svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484163" version="1" comment="texlive-fragmaster is &lt;2017.133.1.6svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484165" version="1" comment="texlive-fragments is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484166" version="1" comment="texlive-frame is &lt;2017.133.1.0svn18312-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484167" version="1" comment="texlive-framed is &lt;2017.133.0.0.96svn26789-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484168" version="1" comment="texlive-francais-bst is &lt;2017.133.1.1svn38922-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484169" version="1" comment="texlive-frankenstein is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484170" version="1" comment="texlive-frcursive is &lt;2017.133.svn24559-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484171" version="1" comment="texlive-frcursive-fonts is &lt;2017.133.svn24559-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484172" version="1" comment="texlive-frederika2016 is &lt;2017.133.1.000_2016_initial_releasesvn42157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484173" version="1" comment="texlive-frederika2016-fonts is &lt;2017.133.1.000_2016_initial_releasesvn42157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484174" version="1" comment="texlive-frege is &lt;2017.133.1.3svn27417-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484175" version="1" comment="texlive-frletter is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484176" version="1" comment="texlive-frontespizio is &lt;2017.133.1.4asvn24054-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484177" version="1" comment="texlive-ftcap is &lt;2017.133.1.4svn17275-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484178" version="1" comment="texlive-ftnxtra is &lt;2017.133.0.0.1svn29652-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484179" version="1" comment="texlive-fullblck is &lt;2017.133.1.03svn25434-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484180" version="1" comment="texlive-fullminipage is &lt;2017.133.0.0.1.1svn34545-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484181" version="1" comment="texlive-fullwidth is &lt;2017.133.0.0.1svn24684-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484182" version="1" comment="texlive-functan is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484183" version="1" comment="texlive-fundus-calligra is &lt;2017.133.1.2svn26018-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484184" version="1" comment="texlive-fundus-cyr is &lt;2017.133.svn26019-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484185" version="1" comment="texlive-fundus-sueterlin is &lt;2017.133.1.2svn26030-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484186" version="1" comment="texlive-fvextra is &lt;2017.133.1.2.1svn41984-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484187" version="1" comment="texlive-fwlw is &lt;2017.133.svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484188" version="1" comment="texlive-g-brief is &lt;2017.133.4.0.2svn21140-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484189" version="1" comment="texlive-gaceta is &lt;2017.133.1.06svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484190" version="1" comment="texlive-galois is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484191" version="1" comment="texlive-gamebook is &lt;2017.133.1.0svn24714-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484192" version="1" comment="texlive-garrigues is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484193" version="1" comment="texlive-garuda-c90 is &lt;2017.133.svn37677-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484194" version="1" comment="texlive-gastex is &lt;2017.133.2.8svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484195" version="1" comment="texlive-gatech-thesis is &lt;2017.133.1.8svn19886-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484196" version="1" comment="texlive-gates is &lt;2017.133.0.0.2svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484197" version="1" comment="texlive-gauss is &lt;2017.133.svn32934-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484198" version="1" comment="texlive-gb4e is &lt;2017.133.svn19216-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484199" version="1" comment="texlive-gcard is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484200" version="1" comment="texlive-gchords is &lt;2017.133.1.20svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484201" version="1" comment="texlive-gcite is &lt;2017.133.1.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484202" version="1" comment="texlive-gender is &lt;2017.133.1.0svn36464-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484203" version="1" comment="texlive-gene-logic is &lt;2017.133.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484204" version="1" comment="texlive-genealogy is &lt;2017.133.svn25112-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484205" version="1" comment="texlive-genealogytree is &lt;2017.133.1.10svn43086-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484206" version="1" comment="texlive-genmisc is &lt;2017.133.svn27208-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484207" version="1" comment="texlive-genmpage is &lt;2017.133.0.0.3.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484208" version="1" comment="texlive-gentium-tug is &lt;2017.133.1.1svn37378-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484209" version="1" comment="texlive-gentium-tug-fonts is &lt;2017.133.1.1svn37378-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484210" version="1" comment="texlive-gentle is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484211" version="1" comment="texlive-geometry is &lt;2017.133.5.6svn19716-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484212" version="1" comment="texlive-geometry-de is &lt;2017.133.1.1svn21882-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484213" version="1" comment="texlive-german is &lt;2017.133.2.5esvn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484214" version="1" comment="texlive-germbib is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484215" version="1" comment="texlive-germkorr is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484216" version="1" comment="texlive-geschichtsfrkl is &lt;2017.133.1.4svn42121-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484217" version="1" comment="texlive-getfiledate is &lt;2017.133.1.2svn16189-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484218" version="1" comment="texlive-getitems is &lt;2017.133.1.0svn39365-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484219" version="1" comment="texlive-getmap is &lt;2017.133.1.9svn41503-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484221" version="1" comment="texlive-getoptk is &lt;2017.133.1.0svn23567-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484222" version="1" comment="texlive-gfnotation is &lt;2017.133.2.9svn37156-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484223" version="1" comment="texlive-gfsartemisia is &lt;2017.133.1.0svn19469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484224" version="1" comment="texlive-gfsartemisia-fonts is &lt;2017.133.1.0svn19469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484225" version="1" comment="texlive-gfsbaskerville is &lt;2017.133.1.0svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484226" version="1" comment="texlive-gfsbaskerville-fonts is &lt;2017.133.1.0svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484227" version="1" comment="texlive-gfsbodoni is &lt;2017.133.1.01svn28484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484228" version="1" comment="texlive-gfsbodoni-fonts is &lt;2017.133.1.01svn28484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484229" version="1" comment="texlive-gfscomplutum is &lt;2017.133.1.0svn19469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484230" version="1" comment="texlive-gfscomplutum-fonts is &lt;2017.133.1.0svn19469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484231" version="1" comment="texlive-gfsdidot is &lt;2017.133.svn31978-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484232" version="1" comment="texlive-gfsdidot-fonts is &lt;2017.133.svn31978-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484233" version="1" comment="texlive-gfsneohellenic is &lt;2017.133.svn31979-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484234" version="1" comment="texlive-gfsneohellenic-fonts is &lt;2017.133.svn31979-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484235" version="1" comment="texlive-gfsporson is &lt;2017.133.1.01svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484236" version="1" comment="texlive-gfsporson-fonts is &lt;2017.133.1.01svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484237" version="1" comment="texlive-gfssolomos is &lt;2017.133.1.0svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484238" version="1" comment="texlive-gfssolomos-fonts is &lt;2017.133.1.0svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484239" version="1" comment="texlive-ghab is &lt;2017.133.0.0.5svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484240" version="1" comment="texlive-ghsystem is &lt;2017.133.4.8svn41714-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484241" version="1" comment="texlive-gillcm is &lt;2017.133.1.1svn19878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484242" version="1" comment="texlive-gillius is &lt;2017.133.svn32068-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484243" version="1" comment="texlive-gillius-fonts is &lt;2017.133.svn32068-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484244" version="1" comment="texlive-gincltex is &lt;2017.133.0.0.3svn23835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484245" version="1" comment="texlive-ginpenc is &lt;2017.133.1.0svn24980-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484246" version="1" comment="texlive-gitfile-info is &lt;2017.133.0.0.3svn41693-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484247" version="1" comment="texlive-gitinfo is &lt;2017.133.1.0svn34049-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484248" version="1" comment="texlive-gitinfo2 is &lt;2017.133.2.0.7svn38913-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484249" version="1" comment="texlive-gitlog is &lt;2017.133.0.0.0.betasvn38932-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484250" version="1" comment="texlive-gloss is &lt;2017.133.1.5.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484251" version="1" comment="texlive-gloss-occitan is &lt;2017.133.0.0.1svn39609-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484252" version="1" comment="texlive-glossaries is &lt;2017.133.4.30svn44564-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484254" version="1" comment="texlive-glossaries-danish is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484255" version="1" comment="texlive-glossaries-dutch is &lt;2017.133.1.1svn35685-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484256" version="1" comment="texlive-glossaries-english is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484257" version="1" comment="texlive-glossaries-extra is &lt;2017.133.1.15svn44284-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484258" version="1" comment="texlive-glossaries-french is &lt;2017.133.1.1svn42873-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484259" version="1" comment="texlive-glossaries-german is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484260" version="1" comment="texlive-glossaries-irish is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484261" version="1" comment="texlive-glossaries-italian is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484262" version="1" comment="texlive-glossaries-magyar is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484263" version="1" comment="texlive-glossaries-polish is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484264" version="1" comment="texlive-glossaries-portuges is &lt;2017.133.1.1svn36064-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484265" version="1" comment="texlive-glossaries-serbian is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484266" version="1" comment="texlive-glossaries-spanish is &lt;2017.133.1.0svn35665-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484267" version="1" comment="texlive-glyphlist is &lt;2017.133.svn41545-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484268" version="1" comment="texlive-gmdoc is &lt;2017.133.0.0.993svn21292-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484269" version="1" comment="texlive-gmdoc-enhance is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484270" version="1" comment="texlive-gmiflink is &lt;2017.133.0.0.97svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484271" version="1" comment="texlive-gmp is &lt;2017.133.1.0svn21691-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484272" version="1" comment="texlive-gmutils is &lt;2017.133.0.0.996svn24287-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484273" version="1" comment="texlive-gmverb is &lt;2017.133.0.0.98svn24288-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484274" version="1" comment="texlive-gmverse is &lt;2017.133.0.0.73svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484275" version="1" comment="texlive-gnu-freefont is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484276" version="1" comment="texlive-gnu-freefont-fonts is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484277" version="1" comment="texlive-gnuplottex is &lt;2017.133.0.0.9.2svn41904-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484278" version="1" comment="texlive-go is &lt;2017.133.svn28628-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484279" version="1" comment="texlive-gobble is &lt;2017.133.0.0.1svn40936-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484280" version="1" comment="texlive-gofonts is &lt;2017.133.svn43726-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484281" version="1" comment="texlive-gofonts-fonts is &lt;2017.133.svn43726-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484282" version="1" comment="texlive-gost is &lt;2017.133.1.2isvn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484283" version="1" comment="texlive-gothic is &lt;2017.133.svn38263-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484284" version="1" comment="texlive-gotoh is &lt;2017.133.1.0svn44211-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484285" version="1" comment="texlive-gradientframe is &lt;2017.133.0.0.2svn21387-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484286" version="1" comment="texlive-gradstudentresume is &lt;2017.133.svn38832-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484287" version="1" comment="texlive-grafcet is &lt;2017.133.1.3.5svn22509-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484288" version="1" comment="texlive-grant is &lt;2017.133.0.0.0.3svn41905-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484289" version="1" comment="texlive-graphbox is &lt;2017.133.1.0svn35075-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484290" version="1" comment="texlive-graphics is &lt;2017.133.svn43813-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484291" version="1" comment="texlive-graphics-cfg is &lt;2017.133.svn41448-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484292" version="1" comment="texlive-graphics-def is &lt;2017.133.svn43025-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484293" version="1" comment="texlive-graphics-pln is &lt;2017.133.svn44567-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484294" version="1" comment="texlive-graphicx-psmin is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484295" version="1" comment="texlive-graphicxbox is &lt;2017.133.1.0svn32630-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484296" version="1" comment="texlive-graphviz is &lt;2017.133.0.0.94svn31517-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484297" version="1" comment="texlive-grayhints is &lt;2017.133.svn43561-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484298" version="1" comment="texlive-greek-fontenc is &lt;2017.133.0.0.13.2svn39606-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484299" version="1" comment="texlive-greek-inputenc is &lt;2017.133.1.6svn40613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484300" version="1" comment="texlive-greekdates is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484301" version="1" comment="texlive-greektex is &lt;2017.133.svn28327-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484302" version="1" comment="texlive-greektonoi is &lt;2017.133.svn39419-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484303" version="1" comment="texlive-greenpoint is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484304" version="1" comment="texlive-gregoriotex is &lt;2017.133.5.0.2svn44502-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484306" version="1" comment="texlive-gregoriotex-fonts is &lt;2017.133.5.0.2svn44502-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484307" version="1" comment="texlive-grfpaste is &lt;2017.133.0.0.2svn17354-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484308" version="1" comment="texlive-grid is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484309" version="1" comment="texlive-grid-system is &lt;2017.133.0.0.3.0svn32981-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484310" version="1" comment="texlive-gridset is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484311" version="1" comment="texlive-grotesq is &lt;2017.133.svn35859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484312" version="1" comment="texlive-grotesq-fonts is &lt;2017.133.svn35859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484313" version="1" comment="texlive-grundgesetze is &lt;2017.133.1.02svn34439-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484314" version="1" comment="texlive-gsemthesis is &lt;2017.133.0.0.9.4svn36244-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484315" version="1" comment="texlive-gsftopk is &lt;2017.133.1.19.2svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484317" version="1" comment="texlive-gtl is &lt;2017.133.0.0.2svn38503-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484318" version="1" comment="texlive-gtrcrd is &lt;2017.133.1.1svn32484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484319" version="1" comment="texlive-gtrlib-largetrees is &lt;2017.133.svn43279-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484320" version="1" comment="texlive-gu is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484321" version="1" comment="texlive-guide-to-latex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484322" version="1" comment="texlive-guitar is &lt;2017.133.1.6svn32258-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484323" version="1" comment="texlive-guitarchordschemes is &lt;2017.133.0.0.7svn41880-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484324" version="1" comment="texlive-guitlogo is &lt;2017.133.0.0.9.2svn27458-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484325" version="1" comment="texlive-gustlib is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484326" version="1" comment="texlive-gustprog is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484327" version="1" comment="texlive-gzt is &lt;2017.133.0.0.97svn43254-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484328" version="1" comment="texlive-h2020proposal is &lt;2017.133.1.0svn38428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484329" version="1" comment="texlive-hacm is &lt;2017.133.0.0.1svn27671-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484330" version="1" comment="texlive-hacm-fonts is &lt;2017.133.0.0.1svn27671-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484331" version="1" comment="texlive-halloweenmath is &lt;2017.133.0.0.10asvn44043-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484332" version="1" comment="texlive-handout is &lt;2017.133.1.6.0svn43962-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484333" version="1" comment="texlive-hands is &lt;2017.133.svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484334" version="1" comment="texlive-hang is &lt;2017.133.2.1svn43280-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484335" version="1" comment="texlive-hanging is &lt;2017.133.1.2bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484336" version="1" comment="texlive-hanoi is &lt;2017.133.20120101svn25019-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484337" version="1" comment="texlive-happy4th is &lt;2017.133.20120102svn25020-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484338" version="1" comment="texlive-har2nat is &lt;2017.133.1.0svn17356-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484339" version="1" comment="texlive-hardwrap is &lt;2017.133.0.0.2svn21396-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484340" version="1" comment="texlive-harmony is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484341" version="1" comment="texlive-harnon-cv is &lt;2017.133.1.0svn26543-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484342" version="1" comment="texlive-harpoon is &lt;2017.133.1.0svn21327-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484343" version="1" comment="texlive-harvard is &lt;2017.133.2.0.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484344" version="1" comment="texlive-harveyballs is &lt;2017.133.1.1svn32003-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484345" version="1" comment="texlive-harvmac is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484346" version="1" comment="texlive-hatching is &lt;2017.133.0.0.11svn23818-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484347" version="1" comment="texlive-hausarbeit-jura is &lt;2017.133.1.5svn42054-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484348" version="1" comment="texlive-havannah is &lt;2017.133.svn36348-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484349" version="1" comment="texlive-hc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484350" version="1" comment="texlive-he-she is &lt;2017.133.1.3svn41359-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484351" version="1" comment="texlive-helvetic is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484352" version="1" comment="texlive-helvetic-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484353" version="1" comment="texlive-hep is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484354" version="1" comment="texlive-hepnames is &lt;2017.133.2.0svn35722-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484355" version="1" comment="texlive-hepparticles is &lt;2017.133.2.0svn35723-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484356" version="1" comment="texlive-hepthesis is &lt;2017.133.1.5.0svn35720-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484357" version="1" comment="texlive-hepunits is &lt;2017.133.1.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484358" version="1" comment="texlive-here is &lt;2017.133.svn16135-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484359" version="1" comment="texlive-heuristica is &lt;2017.133.1.09svn43507-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484360" version="1" comment="texlive-heuristica-fonts is &lt;2017.133.1.09svn43507-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484361" version="1" comment="texlive-hexgame is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484362" version="1" comment="texlive-hf-tikz is &lt;2017.133.0.0.3asvn34733-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484363" version="1" comment="texlive-hfbright is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484364" version="1" comment="texlive-hfbright-fonts is &lt;2017.133.svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484365" version="1" comment="texlive-hfoldsty is &lt;2017.133.1.15svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484366" version="1" comment="texlive-hhtensor is &lt;2017.133.0.0.61svn24981-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484367" version="1" comment="texlive-histogr is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484368" version="1" comment="texlive-historische-zeitschrift is &lt;2017.133.1.2svn42635-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484369" version="1" comment="texlive-hitec is &lt;2017.133.0.0.0betasvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484370" version="1" comment="texlive-hletter is &lt;2017.133.4.2svn30002-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484371" version="1" comment="texlive-hlist is &lt;2017.133.0.0.1svn44158-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484372" version="1" comment="texlive-hobby is &lt;2017.133.1.8svn44474-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484373" version="1" comment="texlive-hobete is &lt;2017.133.svn27036-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484374" version="1" comment="texlive-hook-pre-commit-pkg is &lt;2017.133.1.1.2svn41378-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484375" version="1" comment="texlive-horoscop is &lt;2017.133.0.0.92svn30530-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484376" version="1" comment="texlive-hpsdiss is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484377" version="1" comment="texlive-hrefhide is &lt;2017.133.1.0fsvn22255-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484378" version="1" comment="texlive-hrlatex is &lt;2017.133.0.0.23svn18020-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484379" version="1" comment="texlive-hustthesis is &lt;2017.133.1.4svn42547-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484380" version="1" comment="texlive-hvfloat is &lt;2017.133.1.2svn43732-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484381" version="1" comment="texlive-hvindex is &lt;2017.133.0.0.02svn16136-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484382" version="1" comment="texlive-hypdvips is &lt;2017.133.3.02svn34364-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484383" version="1" comment="texlive-hyper is &lt;2017.133.4.2dsvn17357-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484384" version="1" comment="texlive-hypernat is &lt;2017.133.1.0bsvn17358-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484385" version="1" comment="texlive-hyperref is &lt;2017.133.6.85asvn43547-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484386" version="1" comment="texlive-hyperref-docsrc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484387" version="1" comment="texlive-hyperxmp is &lt;2017.133.3.2svn43316-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484388" version="1" comment="texlive-hyph-utf8 is &lt;2017.133.svn44401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484389" version="1" comment="texlive-hyphen-afrikaans is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484390" version="1" comment="texlive-hyphen-ancientgreek is &lt;2017.133.svn41189-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484391" version="1" comment="texlive-hyphen-arabic is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484392" version="1" comment="texlive-hyphen-armenian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484393" version="1" comment="texlive-hyphen-base is &lt;2017.133.svn44419-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484394" version="1" comment="texlive-hyphen-basque is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484395" version="1" comment="texlive-hyphen-belarusian is &lt;2017.133.svn44401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484396" version="1" comment="texlive-hyphen-bulgarian is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484397" version="1" comment="texlive-hyphen-catalan is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484398" version="1" comment="texlive-hyphen-chinese is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484399" version="1" comment="texlive-hyphen-churchslavonic is &lt;2017.133.svn44401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484400" version="1" comment="texlive-hyphen-coptic is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484401" version="1" comment="texlive-hyphen-croatian is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484402" version="1" comment="texlive-hyphen-czech is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484403" version="1" comment="texlive-hyphen-danish is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484404" version="1" comment="texlive-hyphen-dutch is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484405" version="1" comment="texlive-hyphen-english is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484406" version="1" comment="texlive-hyphen-esperanto is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484407" version="1" comment="texlive-hyphen-estonian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484408" version="1" comment="texlive-hyphen-ethiopic is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484409" version="1" comment="texlive-hyphen-farsi is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484410" version="1" comment="texlive-hyphen-finnish is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484411" version="1" comment="texlive-hyphen-french is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484412" version="1" comment="texlive-hyphen-friulan is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484413" version="1" comment="texlive-hyphen-galician is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484414" version="1" comment="texlive-hyphen-georgian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484415" version="1" comment="texlive-hyphen-german is &lt;2017.133.svn44401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484416" version="1" comment="texlive-hyphen-greek is &lt;2017.133.5svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484417" version="1" comment="texlive-hyphen-hungarian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484418" version="1" comment="texlive-hyphen-icelandic is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484419" version="1" comment="texlive-hyphen-indic is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484420" version="1" comment="texlive-hyphen-indonesian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484421" version="1" comment="texlive-hyphen-interlingua is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484422" version="1" comment="texlive-hyphen-irish is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484423" version="1" comment="texlive-hyphen-italian is &lt;2017.133.4.8gsvn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484424" version="1" comment="texlive-hyphen-kurmanji is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484425" version="1" comment="texlive-hyphen-latin is &lt;2017.133.3.1svn44401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484426" version="1" comment="texlive-hyphen-latvian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484427" version="1" comment="texlive-hyphen-lithuanian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484428" version="1" comment="texlive-hyphen-mongolian is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484429" version="1" comment="texlive-hyphen-norwegian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484430" version="1" comment="texlive-hyphen-occitan is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484431" version="1" comment="texlive-hyphen-piedmontese is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484432" version="1" comment="texlive-hyphen-polish is &lt;2017.133.3.0asvn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484433" version="1" comment="texlive-hyphen-portuguese is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484434" version="1" comment="texlive-hyphen-romanian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484435" version="1" comment="texlive-hyphen-romansh is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484436" version="1" comment="texlive-hyphen-russian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484437" version="1" comment="texlive-hyphen-sanskrit is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484438" version="1" comment="texlive-hyphen-serbian is &lt;2017.133.1.0asvn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484439" version="1" comment="texlive-hyphen-slovak is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484440" version="1" comment="texlive-hyphen-slovenian is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484441" version="1" comment="texlive-hyphen-spanish is &lt;2017.133.4.5svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484442" version="1" comment="texlive-hyphen-swedish is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484443" version="1" comment="texlive-hyphen-thai is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484444" version="1" comment="texlive-hyphen-turkish is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484445" version="1" comment="texlive-hyphen-turkmen is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484446" version="1" comment="texlive-hyphen-ukrainian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484447" version="1" comment="texlive-hyphen-uppersorbian is &lt;2017.133.svn40340-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484448" version="1" comment="texlive-hyphen-welsh is &lt;2017.133.svn41113-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484449" version="1" comment="texlive-hyphenat is &lt;2017.133.2.3csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484450" version="1" comment="texlive-hyphenex is &lt;2017.133.svn37354-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484451" version="1" comment="texlive-hyplain is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484452" version="1" comment="texlive-ibycus-babel is &lt;2017.133.3.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484453" version="1" comment="texlive-ibygrk is &lt;2017.133.4.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484454" version="1" comment="texlive-ibygrk-fonts is &lt;2017.133.4.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484455" version="1" comment="texlive-icsv is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484456" version="1" comment="texlive-idxcmds is &lt;2017.133.0.0.2csvn38115-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484457" version="1" comment="texlive-idxlayout is &lt;2017.133.0.0.4dsvn25821-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484458" version="1" comment="texlive-ieeepes is &lt;2017.133.4.0svn17359-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484459" version="1" comment="texlive-ietfbibs is &lt;2017.133.1.0.0svn41332-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484460" version="1" comment="texlive-ifetex is &lt;2017.133.1.2svn24853-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484461" version="1" comment="texlive-iffont is &lt;2017.133.1.0.0svn38823-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484462" version="1" comment="texlive-ifluatex is &lt;2017.133.1.4svn43610-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484463" version="1" comment="texlive-ifmslide is &lt;2017.133.0.0.47svn20727-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484464" version="1" comment="texlive-ifmtarg is &lt;2017.133.1.2asvn19363-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484465" version="1" comment="texlive-ifnextok is &lt;2017.133.0.0.3svn23379-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484466" version="1" comment="texlive-ifoddpage is &lt;2017.133.1.1svn40726-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484467" version="1" comment="texlive-ifplatform is &lt;2017.133.0.0.4svn21156-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484468" version="1" comment="texlive-ifptex is &lt;2017.133.1.1svn44194-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484469" version="1" comment="texlive-ifsym is &lt;2017.133.svn24868-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484470" version="1" comment="texlive-iftex is &lt;2017.133.0.0.2svn29654-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484471" version="1" comment="texlive-ifthenx is &lt;2017.133.0.0.1asvn25819-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484472" version="1" comment="texlive-ifxetex is &lt;2017.133.0.0.6svn19685-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484473" version="1" comment="texlive-iitem is &lt;2017.133.1.0svn29613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484474" version="1" comment="texlive-ijmart is &lt;2017.133.1.7svn30958-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484475" version="1" comment="texlive-ijqc is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484476" version="1" comment="texlive-ijsra is &lt;2017.133.1.0svn44551-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484477" version="1" comment="texlive-imac is &lt;2017.133.svn17347-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484478" version="1" comment="texlive-image-gallery is &lt;2017.133.1.0jsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484479" version="1" comment="texlive-imakeidx is &lt;2017.133.1.3esvn42287-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484480" version="1" comment="texlive-imfellenglish is &lt;2017.133.svn38547-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484481" version="1" comment="texlive-imfellenglish-fonts is &lt;2017.133.svn38547-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484482" version="1" comment="texlive-impatient is &lt;2017.133.svn35573-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484483" version="1" comment="texlive-impatient-cn is &lt;2017.133.svn35576-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484484" version="1" comment="texlive-impatient-fr is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484485" version="1" comment="texlive-impnattypo is &lt;2017.133.1.4svn36448-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484486" version="1" comment="texlive-import is &lt;2017.133.5.1svn17361-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484487" version="1" comment="texlive-imsproc is &lt;2017.133.0.0.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484488" version="1" comment="texlive-imtekda is &lt;2017.133.1.7svn17667-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484489" version="1" comment="texlive-incgraph is &lt;2017.133.1.12svn36500-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484490" version="1" comment="texlive-inconsolata is &lt;2017.133.1.112svn42871-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484491" version="1" comment="texlive-inconsolata-fonts is &lt;2017.133.1.112svn42871-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484492" version="1" comment="texlive-index is &lt;2017.133.4.1betasvn24099-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484493" version="1" comment="texlive-indextools is &lt;2017.133.1.5.1svn38931-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484494" version="1" comment="texlive-initials is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484495" version="1" comment="texlive-initials-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484496" version="1" comment="texlive-inlinebib is &lt;2017.133.svn22018-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484497" version="1" comment="texlive-inlinedef is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484498" version="1" comment="texlive-inputtrc is &lt;2017.133.0.0.3svn28019-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484499" version="1" comment="texlive-insbox is &lt;2017.133.2.2svn34299-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484500" version="1" comment="texlive-interactiveworkbook is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484501" version="1" comment="texlive-interchar is &lt;2017.133.0.0.2svn36312-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484502" version="1" comment="texlive-interfaces is &lt;2017.133.3.1svn21474-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484503" version="1" comment="texlive-interpreter is &lt;2017.133.1.2svn27232-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484504" version="1" comment="texlive-interval is &lt;2017.133.0.0.3svn34840-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484505" version="1" comment="texlive-intro-scientific is &lt;2017.133.5th_editionsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484506" version="1" comment="texlive-inversepath is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484507" version="1" comment="texlive-invoice is &lt;2017.133.svn39397-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484508" version="1" comment="texlive-ionumbers is &lt;2017.133.0.0.3.3svn33457-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484509" version="1" comment="texlive-iopart-num is &lt;2017.133.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484510" version="1" comment="texlive-ipaex is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484511" version="1" comment="texlive-ipaex-fonts is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484512" version="1" comment="texlive-ipaex-type1 is &lt;2017.133.0.0.4asvn42403-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484513" version="1" comment="texlive-ipaex-type1-fonts is &lt;2017.133.0.0.4asvn42403-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484514" version="1" comment="texlive-iscram is &lt;2017.133.1.0.2svn42604-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484515" version="1" comment="texlive-iso is &lt;2017.133.2.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484516" version="1" comment="texlive-iso10303 is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484517" version="1" comment="texlive-isodate is &lt;2017.133.2.28svn16613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484518" version="1" comment="texlive-isodoc is &lt;2017.133.1.09svn39520-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484519" version="1" comment="texlive-isomath is &lt;2017.133.0.0.6.1svn27654-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484520" version="1" comment="texlive-isonums is &lt;2017.133.1.0svn17362-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484521" version="1" comment="texlive-isorot is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484522" version="1" comment="texlive-isotope is &lt;2017.133.0.0.3svn23711-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484523" version="1" comment="texlive-issuulinks is &lt;2017.133.1.1svn25742-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484524" version="1" comment="texlive-itnumpar is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484525" version="1" comment="texlive-iwhdp is &lt;2017.133.0.0.50svn37552-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484526" version="1" comment="texlive-iwona is &lt;2017.133.0.0.995bsvn19611-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484527" version="1" comment="texlive-iwona-fonts is &lt;2017.133.0.0.995bsvn19611-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484528" version="1" comment="texlive-jablantile is &lt;2017.133.svn16364-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484529" version="1" comment="texlive-jacow is &lt;2017.133.1.95svn40523-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484530" version="1" comment="texlive-jadetex is &lt;2017.133.3.13svn41718-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484532" version="1" comment="texlive-jamtimes is &lt;2017.133.1.12svn20408-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484533" version="1" comment="texlive-japanese-otf is &lt;2017.133.1.7b6svn42950-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484534" version="1" comment="texlive-japanese-otf-uptex is &lt;2017.133.0.0.18svn43395-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484535" version="1" comment="texlive-jknapltx is &lt;2017.133.svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484536" version="1" comment="texlive-jlabels is &lt;2017.133.svn24858-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484537" version="1" comment="texlive-jlreq is &lt;2017.133.svn44563-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484538" version="1" comment="texlive-jmlr is &lt;2017.133.1.23svn43458-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484539" version="1" comment="texlive-jmn is &lt;2017.133.svn22719-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484540" version="1" comment="texlive-jmn-fonts is &lt;2017.133.svn22719-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484541" version="1" comment="texlive-jneurosci is &lt;2017.133.1.00svn17346-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484542" version="1" comment="texlive-jpsj is &lt;2017.133.1.2.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484543" version="1" comment="texlive-js-misc is &lt;2017.133.svn16211-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484544" version="1" comment="texlive-jsclasses is &lt;2017.133.svn43403-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484545" version="1" comment="texlive-jslectureplanner is &lt;2017.133.1.5svn43476-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484546" version="1" comment="texlive-jumplines is &lt;2017.133.0.0.2svn37553-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484547" version="1" comment="texlive-junicode is &lt;2017.133.0.0.7.7svn28286-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484548" version="1" comment="texlive-junicode-fonts is &lt;2017.133.0.0.7.7svn28286-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484549" version="1" comment="texlive-jura is &lt;2017.133.4.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484550" version="1" comment="texlive-juraabbrev is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484551" version="1" comment="texlive-jurabib is &lt;2017.133.0.0.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484552" version="1" comment="texlive-juramisc is &lt;2017.133.0.0.91svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484553" version="1" comment="texlive-jurarsp is &lt;2017.133.0.0.52svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484554" version="1" comment="texlive-jvlisting is &lt;2017.133.0.0.7svn24638-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484555" version="1" comment="texlive-kantlipsum is &lt;2017.133.0.0.6svn27994-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484556" version="1" comment="texlive-karnaugh is &lt;2017.133.svn21338-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484557" version="1" comment="texlive-karnaugh-map is &lt;2017.133.1.1svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484558" version="1" comment="texlive-karnaughmap is &lt;2017.133.2.0svn36989-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484559" version="1" comment="texlive-kastrup is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484560" version="1" comment="texlive-kdgdocs is &lt;2017.133.1.0svn24498-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484561" version="1" comment="texlive-kerkis is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484562" version="1" comment="texlive-kerkis-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484563" version="1" comment="texlive-kerntest is &lt;2017.133.1.32svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484564" version="1" comment="texlive-keycommand is &lt;2017.133.3.1415svn18042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484565" version="1" comment="texlive-keyfloat is &lt;2017.133.0.0.15svn44306-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484566" version="1" comment="texlive-keyreader is &lt;2017.133.0.0.5bsvn28195-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484567" version="1" comment="texlive-keystroke is &lt;2017.133.1.6svn17992-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484568" version="1" comment="texlive-keyval2e is &lt;2017.133.0.0.0.2svn23698-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484569" version="1" comment="texlive-keyvaltable is &lt;2017.133.0.0.2svn41414-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484570" version="1" comment="texlive-kix is &lt;2017.133.svn21606-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484571" version="1" comment="texlive-kixfont is &lt;2017.133.svn18488-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484572" version="1" comment="texlive-kluwer is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484573" version="1" comment="texlive-knitting is &lt;2017.133.2.0svn19595-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484574" version="1" comment="texlive-knitting-fonts is &lt;2017.133.2.0svn19595-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484575" version="1" comment="texlive-knittingpattern is &lt;2017.133.svn17205-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484576" version="1" comment="texlive-knowledge is &lt;2017.133.1.01svn44565-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484577" version="1" comment="texlive-knuth is &lt;2017.133.svn32899-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484578" version="1" comment="texlive-knuth-lib is &lt;2017.133.svn35820-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484579" version="1" comment="texlive-knuth-local is &lt;2017.133.svn38627-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484580" version="1" comment="texlive-knuthotherfonts is &lt;2017.133.svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484581" version="1" comment="texlive-koma-moderncvclassic is &lt;2017.133.0.0.5svn25025-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484582" version="1" comment="texlive-koma-script is &lt;2017.133.3.23svn44226-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484583" version="1" comment="texlive-koma-script-examples is &lt;2017.133.svn34243-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484584" version="1" comment="texlive-koma-script-sfs is &lt;2017.133.1.0svn26137-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484585" version="1" comment="texlive-komacv is &lt;2017.133.1.1.1svn43902-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484586" version="1" comment="texlive-kotex-oblivoir is &lt;2017.133.2.1.8svn43130-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484587" version="1" comment="texlive-kotex-plain is &lt;2017.133.2.1.1asvn38630-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484588" version="1" comment="texlive-kotex-utf is &lt;2017.133.2.1.2svn38558-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484589" version="1" comment="texlive-kotex-utils is &lt;2017.133.2.1.0svn38727-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484591" version="1" comment="texlive-kpathsea is &lt;2017.133.svn44223-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484594" version="1" comment="texlive-kpfonts is &lt;2017.133.3.31svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484595" version="1" comment="texlive-kpfonts-fonts is &lt;2017.133.3.31svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484596" version="1" comment="texlive-ksfh_nat is &lt;2017.133.1.1svn24825-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484597" version="1" comment="texlive-ksp-thesis is &lt;2017.133.1.0.2svn39080-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484598" version="1" comment="texlive-ktv-texdata is &lt;2017.133.05.34svn27369-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484599" version="1" comment="texlive-kurier is &lt;2017.133.0.0.995bsvn19612-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484600" version="1" comment="texlive-kurier-fonts is &lt;2017.133.0.0.995bsvn19612-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484601" version="1" comment="texlive-l2picfaq is &lt;2017.133.1.50svn19601-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484602" version="1" comment="texlive-l2tabu is &lt;2017.133.2.4svn39597-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484603" version="1" comment="texlive-l2tabu-english is &lt;2017.133.1.8.5.7svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484604" version="1" comment="texlive-l2tabu-french is &lt;2017.133.2.3svn31315-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484605" version="1" comment="texlive-l2tabu-italian is &lt;2017.133.2.3svn25218-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484606" version="1" comment="texlive-l2tabu-spanish is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484607" version="1" comment="texlive-l3build is &lt;2017.133.svn44483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484608" version="1" comment="texlive-l3experimental is &lt;2017.133.svn44483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484609" version="1" comment="texlive-l3kernel is &lt;2017.133.svn44483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484610" version="1" comment="texlive-l3packages is &lt;2017.133.svn44483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484611" version="1" comment="texlive-labbook is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484612" version="1" comment="texlive-labels is &lt;2017.133.0.0.13svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484613" version="1" comment="texlive-labyrinth is &lt;2017.133.1.0svn33454-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484614" version="1" comment="texlive-lacheck is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484616" version="1" comment="texlive-ladder is &lt;2017.133.svn44394-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484617" version="1" comment="texlive-lambda is &lt;2017.133.svn28669-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484618" version="1" comment="texlive-lambda-lists is &lt;2017.133.svn31402-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484619" version="1" comment="texlive-langcode is &lt;2017.133.0.0.2svn27764-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484620" version="1" comment="texlive-langsci is &lt;2017.133.svn44096-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484621" version="1" comment="texlive-lapdf is &lt;2017.133.1.1svn23806-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484622" version="1" comment="texlive-lastpackage is &lt;2017.133.0.0.1svn34481-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484623" version="1" comment="texlive-lastpage is &lt;2017.133.1.2msvn36680-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484624" version="1" comment="texlive-latex is &lt;2017.133.20170101_pl1svn43813-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484625" version="1" comment="texlive-latex-bib-ex is &lt;2017.133.svn25831-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484626" version="1" comment="texlive-latex-bib2-ex is &lt;2017.133.svn40098-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484627" version="1" comment="texlive-latex-bin is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484629" version="1" comment="texlive-latex-brochure is &lt;2017.133.svn40612-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484630" version="1" comment="texlive-latex-course is &lt;2017.133.2svn25505-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484631" version="1" comment="texlive-latex-doc-ptr is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484632" version="1" comment="texlive-latex-fonts is &lt;2017.133.svn28888-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484633" version="1" comment="texlive-latex-git-log is &lt;2017.133.0.0.9svn30983-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484635" version="1" comment="texlive-latex-graphics-companion is &lt;2017.133.svn29235-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484636" version="1" comment="texlive-latex-make is &lt;2017.133.2.2.3svn42914-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486890" version="1" comment="texlive-latex-notes-zh-cn is &lt;2017.137.1.20svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486891" version="1" comment="texlive-latex-papersize is &lt;2017.137.1.62svn42296-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486892" version="1" comment="texlive-latex-referenz is &lt;2017.137.2svn36671-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486893" version="1" comment="texlive-latex-tabellen is &lt;2017.137.svn16979-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486894" version="1" comment="texlive-latex-tds is &lt;2017.137.svn40613-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486895" version="1" comment="texlive-latex-veryshortguide is &lt;2017.137.svn41844-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486896" version="1" comment="texlive-latex-web-companion is &lt;2017.137.svn29349-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486897" version="1" comment="texlive-latex2e-help-texinfo is &lt;2017.137.svn38709-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486898" version="1" comment="texlive-latex2e-help-texinfo-fr is &lt;2017.137.svn42541-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486899" version="1" comment="texlive-latex2e-help-texinfo-spanish is &lt;2017.137.svn37356-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486900" version="1" comment="texlive-latex2man is &lt;2017.137.1.25svn43855-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486901" version="1" comment="texlive-latex2nemeth is &lt;2017.137.1.0svn42300-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486902" version="1" comment="texlive-latex4wp is &lt;2017.137.1.0.10svn35999-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486903" version="1" comment="texlive-latex4wp-it is &lt;2017.137.1.0.10svn36000-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486904" version="1" comment="texlive-latexbangla is &lt;2017.137.0.0.2svn42409-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486905" version="1" comment="texlive-latexbug is &lt;2017.137.1.0asvn44566-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486906" version="1" comment="texlive-latexcheat is &lt;2017.137.1.13svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486907" version="1" comment="texlive-latexcheat-de is &lt;2017.137.svn35702-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486908" version="1" comment="texlive-latexcheat-esmx is &lt;2017.137.2.00svn36866-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486909" version="1" comment="texlive-latexcheat-ptbr is &lt;2017.137.1.13svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486910" version="1" comment="texlive-latexconfig is &lt;2017.137.svn40274-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486911" version="1" comment="texlive-latexcourse-rug is &lt;2017.137.1.1svn39026-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486912" version="1" comment="texlive-latexdemo is &lt;2017.137.0.0.1svn34481-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486913" version="1" comment="texlive-latexdiff is &lt;2017.137.1.2.0svn41892-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486914" version="1" comment="texlive-latexfileinfo-pkgs is &lt;2017.137.0.0.22svn26760-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486915" version="1" comment="texlive-latexfileversion is &lt;2017.137.0.0.3svn29349-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486916" version="1" comment="texlive-latexgit is &lt;2017.137.svn41920-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486917" version="1" comment="texlive-latexindent is &lt;2017.137.3.1svn44492-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486918" version="1" comment="texlive-latexmk is &lt;2017.137.4.52csvn43099-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486919" version="1" comment="texlive-latexmp is &lt;2017.137.1.2.1svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486920" version="1" comment="texlive-latexpand is &lt;2017.137.1.3svn41873-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486921" version="1" comment="texlive-lato is &lt;2017.137.2.2svn24986-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486922" version="1" comment="texlive-lato-fonts is &lt;2017.137.2.2svn24986-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486923" version="1" comment="texlive-layaureo is &lt;2017.137.0.0.2svn19087-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486924" version="1" comment="texlive-layouts is &lt;2017.137.2.6dsvn42428-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486925" version="1" comment="texlive-lazylist is &lt;2017.137.1.0asvn17691-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486926" version="1" comment="texlive-lcd is &lt;2017.137.0.0.3svn16549-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486927" version="1" comment="texlive-lcdftypetools is &lt;2017.137.svn44166-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486928" version="1" comment="texlive-lcg is &lt;2017.137.1.3svn31474-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486929" version="1" comment="texlive-lcyw is &lt;2017.137.1.1svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486930" version="1" comment="texlive-leading is &lt;2017.137.0.0.3svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486931" version="1" comment="texlive-leadsheets is &lt;2017.137.0.0.5asvn43034-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486932" version="1" comment="texlive-leaflet is &lt;2017.137.1.1bsvn43523-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486933" version="1" comment="texlive-lecturer is &lt;2017.137.svn23916-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486934" version="1" comment="texlive-ledmac is &lt;2017.137.0.0.19.4svn41811-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486935" version="1" comment="texlive-leftidx is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486936" version="1" comment="texlive-leipzig is &lt;2017.137.1.1svn34902-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486937" version="1" comment="texlive-lengthconvert is &lt;2017.137.1.0asvn30867-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486938" version="1" comment="texlive-lettre is &lt;2017.137.2.353svn35145-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486939" version="1" comment="texlive-lettrine is &lt;2017.137.1.9svn38268-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486940" version="1" comment="texlive-levy is &lt;2017.137.svn21750-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486941" version="1" comment="texlive-lewis is &lt;2017.137.0.0.1svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486942" version="1" comment="texlive-lexikon is &lt;2017.137.1.0csvn17364-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486943" version="1" comment="texlive-lexref is &lt;2017.137.1.1asvn36026-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486944" version="1" comment="texlive-lfb is &lt;2017.137.1.0svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486945" version="1" comment="texlive-lgreek is &lt;2017.137.svn21818-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486946" version="1" comment="texlive-lh is &lt;2017.137.3.5gsvn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486947" version="1" comment="texlive-lhcyr is &lt;2017.137.svn31795-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486948" version="1" comment="texlive-lhelp is &lt;2017.137.2.0svn23638-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486949" version="1" comment="texlive-libertine is &lt;2017.137.5.3.0svn43603-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486950" version="1" comment="texlive-libertine-fonts is &lt;2017.137.5.3.0svn43603-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486951" version="1" comment="texlive-libertinegc is &lt;2017.137.1.00svn39746-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486952" version="1" comment="texlive-libertinus is &lt;2017.137.6.4svn44409-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486953" version="1" comment="texlive-libertinus-fonts is &lt;2017.137.6.4svn44409-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486954" version="1" comment="texlive-libertinust1math is &lt;2017.137.1.0.4svn44542-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486955" version="1" comment="texlive-libertinust1math-fonts is &lt;2017.137.1.0.4svn44542-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486956" version="1" comment="texlive-libgreek is &lt;2017.137.1.0svn27789-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486957" version="1" comment="texlive-librarian is &lt;2017.137.1.0svn19880-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486958" version="1" comment="texlive-librebaskerville is &lt;2017.137.svn31741-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486959" version="1" comment="texlive-librebaskerville-fonts is &lt;2017.137.svn31741-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486960" version="1" comment="texlive-librebodoni is &lt;2017.137.svn39375-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486961" version="1" comment="texlive-librebodoni-fonts is &lt;2017.137.svn39375-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486962" version="1" comment="texlive-librecaslon is &lt;2017.137.svn31929-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486963" version="1" comment="texlive-librecaslon-fonts is &lt;2017.137.svn31929-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486964" version="1" comment="texlive-libris is &lt;2017.137.1.007svn19409-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486965" version="1" comment="texlive-libris-fonts is &lt;2017.137.1.007svn19409-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486966" version="1" comment="texlive-lilyglyphs is &lt;2017.137.0.0.2.3svn33164-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486967" version="1" comment="texlive-lilyglyphs-fonts is &lt;2017.137.0.0.2.3svn33164-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486968" version="1" comment="texlive-limap is &lt;2017.137.2.1svn41390-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486969" version="1" comment="texlive-linearA is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486970" version="1" comment="texlive-linearA-fonts is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486971" version="1" comment="texlive-linegoal is &lt;2017.137.2.9svn21523-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486972" version="1" comment="texlive-lineno is &lt;2017.137.4.41svn21442-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486973" version="1" comment="texlive-ling-macros is &lt;2017.137.svn42268-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486974" version="1" comment="texlive-linguex is &lt;2017.137.4.3svn30815-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486975" version="1" comment="texlive-linop is &lt;2017.137.0.0.1svn41304-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486976" version="1" comment="texlive-lion-msc is &lt;2017.137.0.0.27svn44131-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486977" version="1" comment="texlive-lipsum is &lt;2017.137.1.3svn34800-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486978" version="1" comment="texlive-lisp-on-tex is &lt;2017.137.2.0svn38722-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486979" version="1" comment="texlive-listbib is &lt;2017.137.2.2svn29349-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486980" version="1" comment="texlive-listing is &lt;2017.137.1.2svn17373-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486981" version="1" comment="texlive-listings is &lt;2017.137.1.6svn37534-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486982" version="1" comment="texlive-listings-ext is &lt;2017.137.67svn29349-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486983" version="1" comment="texlive-listlbls is &lt;2017.137.1.03svn34893-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486984" version="1" comment="texlive-listliketab is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486985" version="1" comment="texlive-listofitems is &lt;2017.137.1.3svn42530-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486986" version="1" comment="texlive-listofsymbols is &lt;2017.137.0.0.2svn16134-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486987" version="1" comment="texlive-lithuanian is &lt;2017.137.svn22722-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486988" version="1" comment="texlive-liturg is &lt;2017.137.1.0svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486989" version="1" comment="texlive-lkproof is &lt;2017.137.3.1svn20021-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486990" version="1" comment="texlive-lm is &lt;2017.137.2.004svn28119-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486991" version="1" comment="texlive-lm-fonts is &lt;2017.137.2.004svn28119-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486992" version="1" comment="texlive-lm-math is &lt;2017.137.1.959svn36915-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486993" version="1" comment="texlive-lm-math-fonts is &lt;2017.137.1.959svn36915-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486994" version="1" comment="texlive-lmake is &lt;2017.137.1.0svn25552-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486995" version="1" comment="texlive-lni is &lt;2017.137.1.3svn44368-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486996" version="1" comment="texlive-lobster2 is &lt;2017.137.svn32617-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486997" version="1" comment="texlive-lobster2-fonts is &lt;2017.137.svn32617-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486998" version="1" comment="texlive-locality is &lt;2017.137.0.0.2svn20422-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486999" version="1" comment="texlive-localloc is &lt;2017.137.svn21934-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487000" version="1" comment="texlive-logbox is &lt;2017.137.1.0svn24499-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487001" version="1" comment="texlive-logical-markup-utils is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487002" version="1" comment="texlive-logicproof is &lt;2017.137.svn33254-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487003" version="1" comment="texlive-logicpuzzle is &lt;2017.137.2.5svn34491-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487004" version="1" comment="texlive-logpap is &lt;2017.137.0.0.6svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487005" version="1" comment="texlive-logreq is &lt;2017.137.1.0svn19640-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487006" version="1" comment="texlive-lollipop is &lt;2017.137.1.07svn41438-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487007" version="1" comment="texlive-longdivision is &lt;2017.137.1.0svn43159-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487008" version="1" comment="texlive-longfbox is &lt;2017.137.1.0svn39028-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487009" version="1" comment="texlive-longfigure is &lt;2017.137.1.0svn34302-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487010" version="1" comment="texlive-longnamefilelist is &lt;2017.137.0.0.2svn27889-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487011" version="1" comment="texlive-loops is &lt;2017.137.1.3svn30704-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487012" version="1" comment="texlive-lpform is &lt;2017.137.svn36918-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487013" version="1" comment="texlive-lpic is &lt;2017.137.0.0.8svn20843-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487014" version="1" comment="texlive-lplfitch is &lt;2017.137.0.0.9svn31077-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487015" version="1" comment="texlive-lps is &lt;2017.137.0.0.7svn21322-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487016" version="1" comment="texlive-lroundrect is &lt;2017.137.1.0svn39804-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487017" version="1" comment="texlive-lsc is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487018" version="1" comment="texlive-lshort-bulgarian is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487019" version="1" comment="texlive-lshort-chinese is &lt;2017.137.5.10svn43606-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487020" version="1" comment="texlive-lshort-czech is &lt;2017.137.4.27svn29803-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487021" version="1" comment="texlive-lshort-dutch is &lt;2017.137.1.3svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487022" version="1" comment="texlive-lshort-english is &lt;2017.137.5.0.5svn37892-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487023" version="1" comment="texlive-lshort-estonian is &lt;2017.137.5.05svn39323-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487024" version="1" comment="texlive-lshort-finnish is &lt;2017.137.svn15878-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487025" version="1" comment="texlive-lshort-french is &lt;2017.137.5.01fr_0svn23332-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487026" version="1" comment="texlive-lshort-german is &lt;2017.137.3.0bsvn42434-7.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484787" version="1" comment="texlive-lshort-italian is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484788" version="1" comment="texlive-lshort-japanese is &lt;2017.133.svn36207-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484789" version="1" comment="texlive-lshort-korean is &lt;2017.133.4.17svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484790" version="1" comment="texlive-lshort-mongol is &lt;2017.133.4.26svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484791" version="1" comment="texlive-lshort-persian is &lt;2017.133.5.01svn31296-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484792" version="1" comment="texlive-lshort-polish is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484793" version="1" comment="texlive-lshort-portuguese is &lt;2017.133.5.01.0svn22569-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484794" version="1" comment="texlive-lshort-russian is &lt;2017.133.svn18906-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484795" version="1" comment="texlive-lshort-slovak is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484796" version="1" comment="texlive-lshort-slovenian is &lt;2017.133.4.20svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484797" version="1" comment="texlive-lshort-spanish is &lt;2017.133.0.0.5svn35050-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484798" version="1" comment="texlive-lshort-thai is &lt;2017.133.1.32svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484799" version="1" comment="texlive-lshort-turkish is &lt;2017.133.4.20svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484800" version="1" comment="texlive-lshort-ukr is &lt;2017.133.4.00svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484801" version="1" comment="texlive-lshort-vietnamese is &lt;2017.133.4.00svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484802" version="1" comment="texlive-lstaddons is &lt;2017.133.0.0.1svn26196-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484803" version="1" comment="texlive-lstbayes is &lt;2017.133.svn41550-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484804" version="1" comment="texlive-lt3graph is &lt;2017.133.0.0.1.8svn42874-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484805" version="1" comment="texlive-ltablex is &lt;2017.133.1.1svn34923-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484806" version="1" comment="texlive-ltabptch is &lt;2017.133.1.74dsvn17533-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484807" version="1" comment="texlive-ltb2bib is &lt;2017.133.0.0.01svn43746-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484808" version="1" comment="texlive-ltxdockit is &lt;2017.133.1.2dsvn21869-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484809" version="1" comment="texlive-ltxfileinfo is &lt;2017.133.2.04svn38663-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484811" version="1" comment="texlive-ltximg is &lt;2017.133.1.2svn37006-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484813" version="1" comment="texlive-ltxindex is &lt;2017.133.0.0.1csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484814" version="1" comment="texlive-ltxkeys is &lt;2017.133.0.0.0.3csvn28332-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484815" version="1" comment="texlive-ltxmisc is &lt;2017.133.svn21927-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484816" version="1" comment="texlive-ltxnew is &lt;2017.133.1.3svn21586-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484817" version="1" comment="texlive-ltxtools is &lt;2017.133.0.0.0.1asvn24897-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484818" version="1" comment="texlive-lua-alt-getopt is &lt;2017.133.0.0.7.0svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484819" version="1" comment="texlive-lua-check-hyphen is &lt;2017.133.0.0.4svn40229-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484820" version="1" comment="texlive-lua-visual-debug is &lt;2017.133.0.0.5svn41387-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484821" version="1" comment="texlive-lua2dox is &lt;2017.133.0.0.2svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484823" version="1" comment="texlive-luabibentry is &lt;2017.133.0.0.1asvn31783-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484824" version="1" comment="texlive-luabidi is &lt;2017.133.0.0.2svn30790-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484825" version="1" comment="texlive-luacode is &lt;2017.133.1.2asvn25193-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484826" version="1" comment="texlive-luahyphenrules is &lt;2017.133.1.0svn42670-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484827" version="1" comment="texlive-luaindex is &lt;2017.133.0.0.1bsvn25882-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484828" version="1" comment="texlive-luainputenc is &lt;2017.133.0.0.973svn20491-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484829" version="1" comment="texlive-luaintro is &lt;2017.133.0.0.03svn35490-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484830" version="1" comment="texlive-lualatex-doc is &lt;2017.133.svn30473-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484831" version="1" comment="texlive-lualatex-doc-de is &lt;2017.133.1.0svn30474-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484832" version="1" comment="texlive-lualatex-math is &lt;2017.133.1.6svn40621-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484833" version="1" comment="texlive-lualibs is &lt;2017.133.2.5svn43153-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484834" version="1" comment="texlive-luamesh is &lt;2017.133.0.0.51svn43814-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484835" version="1" comment="texlive-luamplib is &lt;2017.133.2.12.1svn44496-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484836" version="1" comment="texlive-luaotfload is &lt;2017.133.2.8_fix_2svn43194-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484838" version="1" comment="texlive-luapackageloader is &lt;2017.133.0.0.1svn44500-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484839" version="1" comment="texlive-luasseq is &lt;2017.133.svn37877-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484840" version="1" comment="texlive-luatex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484842" version="1" comment="texlive-luatex85 is &lt;2017.133.1.4svn41456-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484843" version="1" comment="texlive-luatexbase is &lt;2017.133.1.3svn38550-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484844" version="1" comment="texlive-luatexja is &lt;2017.133.20170505.0svn44217-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484845" version="1" comment="texlive-luatexko is &lt;2017.133.1.17svn44141-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484846" version="1" comment="texlive-luatextra is &lt;2017.133.1.0.1svn20747-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484847" version="1" comment="texlive-luatodonotes is &lt;2017.133.0.0.3svn39019-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484848" version="1" comment="texlive-luaxml is &lt;2017.133.0.0.0.2svn32741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484849" version="1" comment="texlive-lwarp is &lt;2017.133.0.0.32svn44552-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484851" version="1" comment="texlive-lxfonts is &lt;2017.133.2.0bsvn32354-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484852" version="1" comment="texlive-lxfonts-fonts is &lt;2017.133.2.0bsvn32354-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484853" version="1" comment="texlive-ly1 is &lt;2017.133.svn21086-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484854" version="1" comment="texlive-m-tx is &lt;2017.133.0.0.62asvn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484856" version="1" comment="texlive-macros2e is &lt;2017.133.0.0.4svn23236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484857" version="1" comment="texlive-macroswap is &lt;2017.133.1.1svn31498-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484858" version="1" comment="texlive-mafr is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484859" version="1" comment="texlive-magaz is &lt;2017.133.0.0.4svn24694-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484860" version="1" comment="texlive-mailing is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484861" version="1" comment="texlive-mailmerge is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484862" version="1" comment="texlive-make4ht is &lt;2017.133.0.0.1csvn44079-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484864" version="1" comment="texlive-makebarcode is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484865" version="1" comment="texlive-makebase is &lt;2017.133.0.0.2svn41012-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484866" version="1" comment="texlive-makebox is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484867" version="1" comment="texlive-makecell is &lt;2017.133.0.0.1esvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484868" version="1" comment="texlive-makecirc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484869" version="1" comment="texlive-makecmds is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484870" version="1" comment="texlive-makedtx is &lt;2017.133.0.0.94bsvn38769-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484872" version="1" comment="texlive-makeglos is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484873" version="1" comment="texlive-makeindex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484875" version="1" comment="texlive-makeplot is &lt;2017.133.1.0.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484876" version="1" comment="texlive-makeshape is &lt;2017.133.2.1svn28973-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484877" version="1" comment="texlive-mandi is &lt;2017.133.2.6.1svn41598-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484878" version="1" comment="texlive-manfnt is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484879" version="1" comment="texlive-manfnt-font is &lt;2017.133.svn35799-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484880" version="1" comment="texlive-manfnt-font-fonts is &lt;2017.133.svn35799-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484881" version="1" comment="texlive-manuscript is &lt;2017.133.1.7svn36110-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484882" version="1" comment="texlive-margbib is &lt;2017.133.1.0csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484883" version="1" comment="texlive-marginfix is &lt;2017.133.1.1svn31598-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484884" version="1" comment="texlive-marginnote is &lt;2017.133.1.2bsvn43979-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484885" version="1" comment="texlive-markdown is &lt;2017.133.2.5.3svn44237-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484886" version="1" comment="texlive-marvosym is &lt;2017.133.2.2asvn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484887" version="1" comment="texlive-marvosym-fonts is &lt;2017.133.2.2asvn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484888" version="1" comment="texlive-matc3 is &lt;2017.133.1.0.1svn29845-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484889" version="1" comment="texlive-matc3mem is &lt;2017.133.1.1svn35773-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484890" version="1" comment="texlive-match_parens is &lt;2017.133.1.43svn36270-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484892" version="1" comment="texlive-math-e is &lt;2017.133.svn20062-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484893" version="1" comment="texlive-math-into-latex-4 is &lt;2017.133.svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484894" version="1" comment="texlive-mathabx is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484895" version="1" comment="texlive-mathabx-type1 is &lt;2017.133.svn21129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484896" version="1" comment="texlive-mathabx-type1-fonts is &lt;2017.133.svn21129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484897" version="1" comment="texlive-mathalfa is &lt;2017.133.1.09svn43332-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484898" version="1" comment="texlive-mathastext is &lt;2017.133.1.3rsvn42447-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484899" version="1" comment="texlive-mathcomp is &lt;2017.133.0.0.1fsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484900" version="1" comment="texlive-mathdesign is &lt;2017.133.2.31svn31639-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484901" version="1" comment="texlive-mathdesign-fonts is &lt;2017.133.2.31svn31639-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484902" version="1" comment="texlive-mathdots is &lt;2017.133.0.0.9svn34301-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484903" version="1" comment="texlive-mathexam is &lt;2017.133.1.00svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484904" version="1" comment="texlive-mathpartir is &lt;2017.133.1.3.2svn39864-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484905" version="1" comment="texlive-mathpazo is &lt;2017.133.1.003svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484906" version="1" comment="texlive-mathpazo-fonts is &lt;2017.133.1.003svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484907" version="1" comment="texlive-mathpunctspace is &lt;2017.133.1.0svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484908" version="1" comment="texlive-maths-symbols is &lt;2017.133.3.4svn37763-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484909" version="1" comment="texlive-mathspec is &lt;2017.133.0.0.2bsvn42773-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484910" version="1" comment="texlive-mathspic is &lt;2017.133.1.13svn31957-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484912" version="1" comment="texlive-mathtools is &lt;2017.133.1.19svn44504-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484913" version="1" comment="texlive-matlab-prettifier is &lt;2017.133.0.0.3svn34323-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484914" version="1" comment="texlive-mattens is &lt;2017.133.1.3svn17582-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484915" version="1" comment="texlive-maybemath is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484916" version="1" comment="texlive-mbenotes is &lt;2017.133.2svn31813-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484917" version="1" comment="texlive-mcaption is &lt;2017.133.3.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484918" version="1" comment="texlive-mceinleger is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484919" version="1" comment="texlive-mcexam is &lt;2017.133.0.0.3svn44171-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484920" version="1" comment="texlive-mcf2graph is &lt;2017.133.4.23svn44468-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484921" version="1" comment="texlive-mcite is &lt;2017.133.1.6svn18173-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484922" version="1" comment="texlive-mciteplus is &lt;2017.133.1.2svn31648-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484923" version="1" comment="texlive-mcmthesis is &lt;2017.133.6.2svn39515-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484924" version="1" comment="texlive-mdframed is &lt;2017.133.1.9bsvn31075-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484925" version="1" comment="texlive-mdputu is &lt;2017.133.1.2svn20298-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484926" version="1" comment="texlive-mdsymbol is &lt;2017.133.0.0.5svn28399-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484927" version="1" comment="texlive-mdsymbol-fonts is &lt;2017.133.0.0.5svn28399-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484928" version="1" comment="texlive-mdwtools is &lt;2017.133.1.05.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484929" version="1" comment="texlive-media9 is &lt;2017.133.0.0.79svn44045-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484930" version="1" comment="texlive-medstarbeamer is &lt;2017.133.svn38828-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484931" version="1" comment="texlive-meetingmins is &lt;2017.133.1.6svn31878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484932" version="1" comment="texlive-memdesign is &lt;2017.133.svn34157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484933" version="1" comment="texlive-memexsupp is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484934" version="1" comment="texlive-memoir is &lt;2017.133.3.7fsvn41203-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484935" version="1" comment="texlive-memory is &lt;2017.133.1.2svn30452-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484936" version="1" comment="texlive-mendex-doc is &lt;2017.133.svn42767-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484937" version="1" comment="texlive-mentis is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484938" version="1" comment="texlive-menu is &lt;2017.133.0.0.994svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484939" version="1" comment="texlive-menukeys is &lt;2017.133.1.5svn41823-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484940" version="1" comment="texlive-merriweather is &lt;2017.133.svn34315-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484941" version="1" comment="texlive-merriweather-fonts is &lt;2017.133.svn34315-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484942" version="1" comment="texlive-metafont is &lt;2017.133.2.7182818svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484943" version="1" comment="texlive-metafont-beginners is &lt;2017.133.svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484945" version="1" comment="texlive-metago is &lt;2017.133.0.0.9svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484946" version="1" comment="texlive-metalogo is &lt;2017.133.0.0.12svn18611-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484947" version="1" comment="texlive-metaobj is &lt;2017.133.0.0.93svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484948" version="1" comment="texlive-metaplot is &lt;2017.133.0.0.91svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484949" version="1" comment="texlive-metapost is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484951" version="1" comment="texlive-metapost-examples is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484952" version="1" comment="texlive-metapost-fonts is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484953" version="1" comment="texlive-metatex is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484954" version="1" comment="texlive-metatype1 is &lt;2017.133.0.0.56svn37105-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484955" version="1" comment="texlive-metauml is &lt;2017.133.0.0.2.5svn19692-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484956" version="1" comment="texlive-method is &lt;2017.133.2.0bsvn17485-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484957" version="1" comment="texlive-metre is &lt;2017.133.1.0svn18489-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484958" version="1" comment="texlive-metrix is &lt;2017.133.1.3svn40099-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484959" version="1" comment="texlive-mex is &lt;2017.133.1.05svn40855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484961" version="1" comment="texlive-mf2pt1 is &lt;2017.133.2.5asvn33802-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484963" version="1" comment="texlive-mfirstuc is &lt;2017.133.2.04svn41785-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484964" version="1" comment="texlive-mflogo is &lt;2017.133.2.0svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484965" version="1" comment="texlive-mflogo-font is &lt;2017.133.1.002svn36898-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484966" version="1" comment="texlive-mflogo-font-fonts is &lt;2017.133.1.002svn36898-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484967" version="1" comment="texlive-mflua is &lt;2017.133.svn43947-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484969" version="1" comment="texlive-mfnfss is &lt;2017.133.svn19410-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484970" version="1" comment="texlive-mfpic is &lt;2017.133.1.10svn28444-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484971" version="1" comment="texlive-mfpic4ode is &lt;2017.133.0.0.4svn17745-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484972" version="1" comment="texlive-mftinc is &lt;2017.133.1.0asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484973" version="1" comment="texlive-mfware is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484975" version="1" comment="texlive-mgltex is &lt;2017.133.4.2svn41676-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484976" version="1" comment="texlive-mhchem is &lt;2017.133.svn44451-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484977" version="1" comment="texlive-mhequ is &lt;2017.133.1.7svn38224-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484978" version="1" comment="texlive-miama is &lt;2017.133.1.0svn39837-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484979" version="1" comment="texlive-miama-fonts is &lt;2017.133.1.0svn39837-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484980" version="1" comment="texlive-microtype is &lt;2017.133.2.6asvn41127-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484981" version="1" comment="texlive-microtype-de is &lt;2017.133.2.4svn24549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484982" version="1" comment="texlive-midnight is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484983" version="1" comment="texlive-midpage is &lt;2017.133.1.1asvn17484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484984" version="1" comment="texlive-miller is &lt;2017.133.1.2svn18789-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484985" version="1" comment="texlive-milog is &lt;2017.133.1.0svn41610-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484986" version="1" comment="texlive-minibox is &lt;2017.133.0.0.2asvn30914-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484987" version="1" comment="texlive-minidocument is &lt;2017.133.1.0svn43752-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484988" version="1" comment="texlive-minifp is &lt;2017.133.0.0.96svn32559-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484989" version="1" comment="texlive-minipage-marginpar is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484990" version="1" comment="texlive-miniplot is &lt;2017.133.svn17483-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484991" version="1" comment="texlive-minitoc is &lt;2017.133.61svn37852-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484992" version="1" comment="texlive-minorrevision is &lt;2017.133.1.1svn32165-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484993" version="1" comment="texlive-minted is &lt;2017.133.2.4.1svn42418-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484994" version="1" comment="texlive-mintspirit is &lt;2017.133.svn32069-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484995" version="1" comment="texlive-mintspirit-fonts is &lt;2017.133.svn32069-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484996" version="1" comment="texlive-minutes is &lt;2017.133.1.8fsvn42186-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484997" version="1" comment="texlive-missaali is &lt;2017.133.1.004svn42810-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484998" version="1" comment="texlive-missaali-fonts is &lt;2017.133.1.004svn42810-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009484999" version="1" comment="texlive-mkgrkindex is &lt;2017.133.2.0svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485001" version="1" comment="texlive-mkjobtexmf is &lt;2017.133.0.0.8svn29725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485003" version="1" comment="texlive-mkpattern is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485004" version="1" comment="texlive-mkpic is &lt;2017.133.1.02svn33700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485006" version="1" comment="texlive-mla-paper is &lt;2017.133.svn20885-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485007" version="1" comment="texlive-mlist is &lt;2017.133.0.0.6asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485008" version="1" comment="texlive-mltex is &lt;2017.133.2.2svn39057-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485010" version="1" comment="texlive-mmap is &lt;2017.133.1.03svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485011" version="1" comment="texlive-mnotes is &lt;2017.133.0.0.8svn35521-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485012" version="1" comment="texlive-mnras is &lt;2017.133.3.0svn37579-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485013" version="1" comment="texlive-mnsymbol is &lt;2017.133.1.4svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485014" version="1" comment="texlive-mnsymbol-fonts is &lt;2017.133.1.4svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485015" version="1" comment="texlive-moderncv is &lt;2017.133.2.0.0svn37992-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485016" version="1" comment="texlive-moderntimeline is &lt;2017.133.0.0.9svn38254-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485017" version="1" comment="texlive-modiagram is &lt;2017.133.0.0.2gsvn38448-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485018" version="1" comment="texlive-modref is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485019" version="1" comment="texlive-modroman is &lt;2017.133.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485020" version="1" comment="texlive-modular is &lt;2017.133.svn44142-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485021" version="1" comment="texlive-mongolian-babel is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485022" version="1" comment="texlive-monofill is &lt;2017.133.0.0.2svn28140-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485023" version="1" comment="texlive-montex is &lt;2017.133.ivu.04.092svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485024" version="1" comment="texlive-montex-fonts is &lt;2017.133.ivu.04.092svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485025" version="1" comment="texlive-montserrat is &lt;2017.133.1.01svn43347-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485026" version="1" comment="texlive-montserrat-fonts is &lt;2017.133.1.01svn43347-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485027" version="1" comment="texlive-moodle is &lt;2017.133.0.0.5svn39367-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485028" version="1" comment="texlive-moreenum is &lt;2017.133.1.03svn24479-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485029" version="1" comment="texlive-morefloats is &lt;2017.133.1.0hsvn37927-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485030" version="1" comment="texlive-morehype is &lt;2017.133.r0.83svn38815-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485031" version="1" comment="texlive-moresize is &lt;2017.133.1.9svn17513-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485032" version="1" comment="texlive-moreverb is &lt;2017.133.2.3asvn22126-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485033" version="1" comment="texlive-morewrites is &lt;2017.133.svn43945-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485034" version="1" comment="texlive-movie15 is &lt;2017.133.svn26473-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485035" version="1" comment="texlive-mp3d is &lt;2017.133.1.34svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485036" version="1" comment="texlive-mparhack is &lt;2017.133.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485037" version="1" comment="texlive-mparrows is &lt;2017.133.0.0.1svn39729-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485038" version="1" comment="texlive-mpattern is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485039" version="1" comment="texlive-mpcolornames is &lt;2017.133.0.0.20svn23252-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485040" version="1" comment="texlive-mpgraphics is &lt;2017.133.0.0.3svn29776-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485041" version="1" comment="texlive-mpman-ru is &lt;2017.133.1.004svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485042" version="1" comment="texlive-mpostinl is &lt;2017.133.1.11svn43670-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485043" version="1" comment="texlive-mptopdf is &lt;2017.133.svn41282-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485045" version="1" comment="texlive-mptrees is &lt;2017.133.17.06svn44453-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485046" version="1" comment="texlive-ms is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485047" version="1" comment="texlive-msc is &lt;2017.133.1.16svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485048" version="1" comment="texlive-msg is &lt;2017.133.0.0.40svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485049" version="1" comment="texlive-mslapa is &lt;2017.133.svn17514-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485050" version="1" comment="texlive-msu-thesis is &lt;2017.133.2.6bsvn41345-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485051" version="1" comment="texlive-mtgreek is &lt;2017.133.1.1+svn17967-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485052" version="1" comment="texlive-mucproc is &lt;2017.133.1.02svn43445-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485053" version="1" comment="texlive-mugsthesis is &lt;2017.133.svn34878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485054" version="1" comment="texlive-multenum is &lt;2017.133.svn21775-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485055" version="1" comment="texlive-multiaudience is &lt;2017.133.1.03svn38035-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485056" version="1" comment="texlive-multibbl is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485057" version="1" comment="texlive-multibib is &lt;2017.133.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485058" version="1" comment="texlive-multibibliography is &lt;2017.133.1.03svn30939-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485060" version="1" comment="texlive-multicap is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485061" version="1" comment="texlive-multidef is &lt;2017.133.1.10svn40637-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485062" version="1" comment="texlive-multido is &lt;2017.133.1.42svn18302-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485063" version="1" comment="texlive-multienv is &lt;2017.133.1.0svn26544-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485064" version="1" comment="texlive-multiexpand is &lt;2017.133.1.4svn38416-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485065" version="1" comment="texlive-multiobjective is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485066" version="1" comment="texlive-multirow is &lt;2017.133.2.2svn42588-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485067" version="1" comment="texlive-munich is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009044999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485068" version="1" comment="texlive-musixguit is &lt;2017.133.1.2.2svn21649-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485069" version="1" comment="texlive-musixtex is &lt;2017.133.1.24svn43375-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485071" version="1" comment="texlive-musixtex-fonts is &lt;2017.133.svn37762-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485072" version="1" comment="texlive-musixtex-fonts-fonts is &lt;2017.133.svn37762-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485073" version="1" comment="texlive-musixtnt is &lt;2017.133.svn40307-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485075" version="1" comment="texlive-musuos is &lt;2017.133.1.1dsvn24857-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485076" version="1" comment="texlive-muthesis is &lt;2017.133.svn23861-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485077" version="1" comment="texlive-mversion is &lt;2017.133.1.0.1svn29370-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485078" version="1" comment="texlive-mwcls is &lt;2017.133.0.0.75svn44352-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485079" version="1" comment="texlive-mwe is &lt;2017.133.0.0.3svn26422-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485080" version="1" comment="texlive-mweights is &lt;2017.133.svn43647-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485081" version="1" comment="texlive-mxedruli is &lt;2017.133.3.3csvn30021-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485082" version="1" comment="texlive-mxedruli-fonts is &lt;2017.133.3.3csvn30021-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485083" version="1" comment="texlive-mychemistry is &lt;2017.133.1.99bsvn28611-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485084" version="1" comment="texlive-mycv is &lt;2017.133.1.5.6svn26807-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485085" version="1" comment="texlive-mylatexformat is &lt;2017.133.3.4svn21392-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485086" version="1" comment="texlive-mynsfc is &lt;2017.133.1.01svn41996-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485087" version="1" comment="texlive-nag is &lt;2017.133.0.0.7svn24741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485088" version="1" comment="texlive-nameauth is &lt;2017.133.3.2svn43586-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485089" version="1" comment="texlive-namespc is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485090" version="1" comment="texlive-nanumtype1 is &lt;2017.133.3.0svn29558-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485091" version="1" comment="texlive-nanumtype1-fonts is &lt;2017.133.3.0svn29558-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485092" version="1" comment="texlive-nar is &lt;2017.133.3.19svn38100-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485093" version="1" comment="texlive-natbib is &lt;2017.133.8.31bsvn20668-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485094" version="1" comment="texlive-natded is &lt;2017.133.0.0.1svn32693-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485095" version="1" comment="texlive-nath is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485096" version="1" comment="texlive-nature is &lt;2017.133.1.0svn21819-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485097" version="1" comment="texlive-navigator is &lt;2017.133.1.1svn41413-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485098" version="1" comment="texlive-navydocs is &lt;2017.133.1.1svn41643-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485099" version="1" comment="texlive-ncclatex is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485100" version="1" comment="texlive-ncctools is &lt;2017.133.3.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485101" version="1" comment="texlive-ncntrsbk is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485102" version="1" comment="texlive-ncntrsbk-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485103" version="1" comment="texlive-nddiss is &lt;2017.133.3.0svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485104" version="1" comment="texlive-ndsu-thesis is &lt;2017.133.svn40536-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485105" version="1" comment="texlive-needspace is &lt;2017.133.1.3dsvn29601-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485106" version="1" comment="texlive-nestquot is &lt;2017.133.svn27323-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485107" version="1" comment="texlive-neuralnetwork is &lt;2017.133.1.0svn31500-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485108" version="1" comment="texlive-nevelok is &lt;2017.133.1.03svn39029-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485109" version="1" comment="texlive-newcommand is &lt;2017.133.2.0svn18704-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485110" version="1" comment="texlive-newenviron is &lt;2017.133.1.0svn29331-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485111" version="1" comment="texlive-newfile is &lt;2017.133.1.0csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485112" version="1" comment="texlive-newlfm is &lt;2017.133.9.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485113" version="1" comment="texlive-newpx is &lt;2017.133.1.32svn44457-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485114" version="1" comment="texlive-newpx-fonts is &lt;2017.133.1.32svn44457-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485115" version="1" comment="texlive-newsletr is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485116" version="1" comment="texlive-newspaper is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485117" version="1" comment="texlive-newtx is &lt;2017.133.1.525svn44520-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485118" version="1" comment="texlive-newtx-fonts is &lt;2017.133.1.525svn44520-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485119" version="1" comment="texlive-newtxsf is &lt;2017.133.1.05svn41918-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485120" version="1" comment="texlive-newtxsf-fonts is &lt;2017.133.1.05svn41918-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485121" version="1" comment="texlive-newtxtt is &lt;2017.133.1.055svn44510-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485122" version="1" comment="texlive-newtxtt-fonts is &lt;2017.133.1.055svn44510-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485123" version="1" comment="texlive-newunicodechar is &lt;2017.133.1.1svn28253-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485124" version="1" comment="texlive-newvbtm is &lt;2017.133.1.1svn23996-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485125" version="1" comment="texlive-newverbs is &lt;2017.133.1.3asvn26258-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485126" version="1" comment="texlive-nextpage is &lt;2017.133.1.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485127" version="1" comment="texlive-nfssext-cfr is &lt;2017.133.svn43640-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485128" version="1" comment="texlive-nicefilelist is &lt;2017.133.0.0.7asvn28527-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485129" version="1" comment="texlive-niceframe is &lt;2017.133.1.1csvn36086-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485130" version="1" comment="texlive-nicetext is &lt;2017.133.r0.67svn38914-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485131" version="1" comment="texlive-nih is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485132" version="1" comment="texlive-nihbiosketch is &lt;2017.133.svn39460-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485133" version="1" comment="texlive-nimbus15 is &lt;2017.133.1.00svn39343-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485134" version="1" comment="texlive-nimbus15-fonts is &lt;2017.133.1.00svn39343-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485135" version="1" comment="texlive-nkarta is &lt;2017.133.0.0.2svn16437-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485136" version="1" comment="texlive-nlctdoc is &lt;2017.133.1.06svn44353-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485137" version="1" comment="texlive-nmbib is &lt;2017.133.1.04svn37984-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485138" version="1" comment="texlive-noconflict is &lt;2017.133.1.0svn30140-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485139" version="1" comment="texlive-nodetree is &lt;2017.133.1.2svn43011-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485140" version="1" comment="texlive-noindentafter is &lt;2017.133.0.0.2.2svn35709-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485141" version="1" comment="texlive-noitcrul is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485142" version="1" comment="texlive-nolbreaks is &lt;2017.133.1.2svn26786-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485143" version="1" comment="texlive-nomencl is &lt;2017.133.3.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485144" version="1" comment="texlive-nomentbl is &lt;2017.133.0.0.4svn16549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485145" version="1" comment="texlive-nonfloat is &lt;2017.133.1.0svn17598-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485146" version="1" comment="texlive-nonumonpart is &lt;2017.133.1svn22114-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485147" version="1" comment="texlive-nopageno is &lt;2017.133.svn18128-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485148" version="1" comment="texlive-norasi-c90 is &lt;2017.133.svn37675-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485149" version="1" comment="texlive-normalcolor is &lt;2017.133.r11svn40125-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485150" version="1" comment="texlive-nostarch is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485151" version="1" comment="texlive-notes is &lt;2017.133.1.0.1svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485152" version="1" comment="texlive-notes2bib is &lt;2017.133.2.0ksvn31162-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485153" version="1" comment="texlive-notespages is &lt;2017.133.0.0.8.1svn41906-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485154" version="1" comment="texlive-notex-bst is &lt;2017.133.svn42361-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485155" version="1" comment="texlive-noto is &lt;2017.133.svn42881-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485156" version="1" comment="texlive-noto-fonts is &lt;2017.133.svn42881-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485157" version="1" comment="texlive-notoccite is &lt;2017.133.svn18129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485158" version="1" comment="texlive-novel is &lt;2017.133.1.2svn44529-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485159" version="1" comment="texlive-novel-fonts is &lt;2017.133.1.2svn44529-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485160" version="1" comment="texlive-nowidow is &lt;2017.133.1.0svn24066-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485161" version="1" comment="texlive-nox is &lt;2017.133.1.0svn30991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485162" version="1" comment="texlive-nrc is &lt;2017.133.2.01asvn29027-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485163" version="1" comment="texlive-ntgclass is &lt;2017.133.2.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485164" version="1" comment="texlive-ntheorem is &lt;2017.133.1.33svn27609-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485165" version="1" comment="texlive-ntheorem-vn is &lt;2017.133.1.203svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485166" version="1" comment="texlive-nuc is &lt;2017.133.0.0.1svn22256-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485167" version="1" comment="texlive-nucleardata is &lt;2017.133.1.01dsvn42307-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485168" version="1" comment="texlive-numberedblock is &lt;2017.133.1.10svn33109-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485169" version="1" comment="texlive-numericplots is &lt;2017.133.2.0.2svn31729-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485170" version="1" comment="texlive-numname is &lt;2017.133.svn18130-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485171" version="1" comment="texlive-numprint is &lt;2017.133.1.39svn27498-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485172" version="1" comment="texlive-numspell is &lt;2017.133.1.0svn43189-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485173" version="1" comment="texlive-nwejm is &lt;2017.133.0.0.98dsvn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485174" version="1" comment="texlive-oberdiek is &lt;2017.133.svn43610-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485175" version="1" comment="texlive-objectz is &lt;2017.133.svn19389-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485176" version="1" comment="texlive-obnov is &lt;2017.133.0.0.11svn33355-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485177" version="1" comment="texlive-ocg-p is &lt;2017.133.0.0.4svn28803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485178" version="1" comment="texlive-ocgx is &lt;2017.133.0.0.5svn28492-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485179" version="1" comment="texlive-ocgx2 is &lt;2017.133.0.0.29svn44528-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485180" version="1" comment="texlive-ocherokee is &lt;2017.133.svn25689-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485181" version="1" comment="texlive-ocherokee-fonts is &lt;2017.133.svn25689-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485182" version="1" comment="texlive-ocr-b is &lt;2017.133.svn20852-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485183" version="1" comment="texlive-ocr-b-outline is &lt;2017.133.svn20969-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485184" version="1" comment="texlive-ocr-b-outline-fonts is &lt;2017.133.svn20969-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485185" version="1" comment="texlive-ocr-latex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485186" version="1" comment="texlive-octavo is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485187" version="1" comment="texlive-odsfile is &lt;2017.133.0.0.6svn38449-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485188" version="1" comment="texlive-ofs is &lt;2017.133.svn16991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485189" version="1" comment="texlive-ogham is &lt;2017.133.svn24876-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485190" version="1" comment="texlive-oinuit is &lt;2017.133.svn28668-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485191" version="1" comment="texlive-oinuit-fonts is &lt;2017.133.svn28668-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485192" version="1" comment="texlive-old-arrows is &lt;2017.133.2.0svn42872-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485193" version="1" comment="texlive-old-arrows-fonts is &lt;2017.133.2.0svn42872-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485194" version="1" comment="texlive-oldlatin is &lt;2017.133.1.00svn17932-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485195" version="1" comment="texlive-oldstandard is &lt;2017.133.2.2svn41735-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485196" version="1" comment="texlive-oldstandard-fonts is &lt;2017.133.2.2svn41735-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485197" version="1" comment="texlive-oldstyle is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485198" version="1" comment="texlive-olsak-misc is &lt;2017.133.svn41526-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485199" version="1" comment="texlive-omega is &lt;2017.133.svn33046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485200" version="1" comment="texlive-omega-fonts is &lt;2017.133.svn33046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485201" version="1" comment="texlive-omegaware is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485203" version="1" comment="texlive-onlyamsmath is &lt;2017.133.0.0.20svn42927-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485204" version="1" comment="texlive-onrannual is &lt;2017.133.1.1svn17474-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485205" version="1" comment="texlive-opcit is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485206" version="1" comment="texlive-opensans is &lt;2017.133.1.2svn24706-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485207" version="1" comment="texlive-opensans-fonts is &lt;2017.133.1.2svn24706-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485208" version="1" comment="texlive-oplotsymbl is &lt;2017.133.1.2svn43091-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485209" version="1" comment="texlive-opteng is &lt;2017.133.1.0svn27331-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485210" version="1" comment="texlive-optidef is &lt;2017.133.2.4svn44505-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485211" version="1" comment="texlive-optional is &lt;2017.133.2.2bsvn18131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485212" version="1" comment="texlive-options is &lt;2017.133.1.0svn39030-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485213" version="1" comment="texlive-ordinalpt is &lt;2017.133.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485214" version="1" comment="texlive-orkhun is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485215" version="1" comment="texlive-oscola is &lt;2017.133.1.5svn43599-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485216" version="1" comment="texlive-ot-tableau is &lt;2017.133.svn35095-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485217" version="1" comment="texlive-othello is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485218" version="1" comment="texlive-othelloboard is &lt;2017.133.1.2svn23714-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485219" version="1" comment="texlive-otibet is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485220" version="1" comment="texlive-oubraces is &lt;2017.133.svn21833-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485221" version="1" comment="texlive-outline is &lt;2017.133.svn18360-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485222" version="1" comment="texlive-outliner is &lt;2017.133.0.0.94svn21095-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485223" version="1" comment="texlive-outlines is &lt;2017.133.1.1svn25192-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485224" version="1" comment="texlive-overlays is &lt;2017.133.2.7svn43431-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485225" version="1" comment="texlive-overlock is &lt;2017.133.svn34409-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485226" version="1" comment="texlive-overlock-fonts is &lt;2017.133.svn34409-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485227" version="1" comment="texlive-overpic is &lt;2017.133.0.0.53svn19712-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485228" version="1" comment="texlive-pacioli is &lt;2017.133.svn24947-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485229" version="1" comment="texlive-padauk is &lt;2017.133.3.002svn42617-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485230" version="1" comment="texlive-padauk-fonts is &lt;2017.133.3.002svn42617-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485231" version="1" comment="texlive-pagecolor is &lt;2017.133.1.0isvn44487-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485232" version="1" comment="texlive-pagecont is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485233" version="1" comment="texlive-pagenote is &lt;2017.133.1.1asvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485234" version="1" comment="texlive-pagerange is &lt;2017.133.0.0.5svn16915-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485235" version="1" comment="texlive-pageslts is &lt;2017.133.1.2fsvn39164-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485236" version="1" comment="texlive-palatino is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485237" version="1" comment="texlive-palatino-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485238" version="1" comment="texlive-paper is &lt;2017.133.1.0lsvn34521-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485239" version="1" comment="texlive-papercdcase is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485240" version="1" comment="texlive-papermas is &lt;2017.133.1.0hsvn23667-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485241" version="1" comment="texlive-papertex is &lt;2017.133.1.2bsvn19230-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485242" version="1" comment="texlive-paracol is &lt;2017.133.1.32svn38621-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485243" version="1" comment="texlive-parades is &lt;2017.133.svn40042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485244" version="1" comment="texlive-paralist is &lt;2017.133.2.7svn43021-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485245" version="1" comment="texlive-parallel is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485246" version="1" comment="texlive-paratype is &lt;2017.133.svn32859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485247" version="1" comment="texlive-paratype-fonts is &lt;2017.133.svn32859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485248" version="1" comment="texlive-paresse is &lt;2017.133.4.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485249" version="1" comment="texlive-parnotes is &lt;2017.133.3svn41868-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485250" version="1" comment="texlive-parrun is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485251" version="1" comment="texlive-parselines is &lt;2017.133.1.4svn21475-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485252" version="1" comment="texlive-parskip is &lt;2017.133.2.0svn19963-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485253" version="1" comment="texlive-pas-cours is &lt;2017.133.1.6svn42036-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485254" version="1" comment="texlive-pas-crosswords is &lt;2017.133.1.03svn32313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485255" version="1" comment="texlive-pas-cv is &lt;2017.133.2.01svn32263-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485256" version="1" comment="texlive-pas-tableur is &lt;2017.133.2.01svn39542-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485257" version="1" comment="texlive-passivetex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485258" version="1" comment="texlive-patch is &lt;2017.133.svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485259" version="1" comment="texlive-patchcmd is &lt;2017.133.1.05svn41379-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485260" version="1" comment="texlive-patgen is &lt;2017.133.2.3svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485262" version="1" comment="texlive-patgen2-tutorial is &lt;2017.133.svn16490-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485263" version="1" comment="texlive-path is &lt;2017.133.3.05svn22045-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485264" version="1" comment="texlive-pauldoc is &lt;2017.133.0.0.5svn16005-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485265" version="1" comment="texlive-pawpict is &lt;2017.133.1.0svn21629-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485266" version="1" comment="texlive-pax is &lt;2017.133.0.0.1lsvn26112-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485268" version="1" comment="texlive-pb-diagram is &lt;2017.133.5.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485269" version="1" comment="texlive-pbibtex-base is &lt;2017.133.svn40986-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485270" version="1" comment="texlive-pbox is &lt;2017.133.1.2svn24807-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485271" version="1" comment="texlive-pbsheet is &lt;2017.133.0.0.1svn24830-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485272" version="1" comment="texlive-pdf-trans is &lt;2017.133.2.4svn32809-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485273" version="1" comment="texlive-pdf14 is &lt;2017.133.0.0.1svn17583-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485274" version="1" comment="texlive-pdfbook2 is &lt;2017.133.1.2svn37537-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485276" version="1" comment="texlive-pdfcomment is &lt;2017.133.2.4svn41484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485277" version="1" comment="texlive-pdfcprot is &lt;2017.133.1.7asvn18735-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485278" version="1" comment="texlive-pdfcrop is &lt;2017.133.1.37svn29348-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485280" version="1" comment="texlive-pdfjam is &lt;2017.133.2.02svn29752-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485282" version="1" comment="texlive-pdflatexpicscale is &lt;2017.133.0.0.31svn43117-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485284" version="1" comment="texlive-pdfmarginpar is &lt;2017.133.0.0.92svn23492-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485285" version="1" comment="texlive-pdfpagediff is &lt;2017.133.1.4svn37946-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485286" version="1" comment="texlive-pdfpages is &lt;2017.133.0.0.5hsvn42973-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485287" version="1" comment="texlive-pdfscreen is &lt;2017.133.1.5svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485288" version="1" comment="texlive-pdfslide is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485289" version="1" comment="texlive-pdfsync is &lt;2017.133.svn20373-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485290" version="1" comment="texlive-pdftex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485292" version="1" comment="texlive-pdftex-fonts is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485293" version="1" comment="texlive-pdftools is &lt;2017.133.0.0.86svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485295" version="1" comment="texlive-pdftricks is &lt;2017.133.1.16svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485296" version="1" comment="texlive-pdftricks2 is &lt;2017.133.1.01svn31016-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485297" version="1" comment="texlive-pdfwin is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485298" version="1" comment="texlive-pdfx is &lt;2017.133.1.5.84svn44412-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485299" version="1" comment="texlive-pdfxup is &lt;2017.133.1.30svn40690-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485301" version="1" comment="texlive-pecha is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485302" version="1" comment="texlive-pedigree-perl is &lt;2017.133.1.0svn31990-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485304" version="1" comment="texlive-perception is &lt;2017.133.svn42683-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485305" version="1" comment="texlive-perfectcut is &lt;2017.133.2.2svn44175-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485306" version="1" comment="texlive-perltex is &lt;2017.133.2.1svn38719-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485308" version="1" comment="texlive-permute is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485309" version="1" comment="texlive-persian-bib is &lt;2017.133.0.0.9svn37297-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485310" version="1" comment="texlive-petiteannonce is &lt;2017.133.1.0001svn25915-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485311" version="1" comment="texlive-petri-nets is &lt;2017.133.svn39165-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485313" version="1" comment="texlive-pfarrei is &lt;2017.133.r36svn31934-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485315" version="1" comment="texlive-pgf is &lt;2017.133.3.0.1asvn44231-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485316" version="1" comment="texlive-pgf-blur is &lt;2017.133.1.01svn31693-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485317" version="1" comment="texlive-pgf-soroban is &lt;2017.133.1.1svn32269-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485318" version="1" comment="texlive-pgf-spectra is &lt;2017.133.1.0svn42986-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485319" version="1" comment="texlive-pgf-umlcd is &lt;2017.133.0.0.2.1.1svn33307-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485320" version="1" comment="texlive-pgf-umlsd is &lt;2017.133.0.0.7svn33045-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485321" version="1" comment="texlive-pgfgantt is &lt;2017.133.4.0svn31037-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485322" version="1" comment="texlive-pgfkeyx is &lt;2017.133.0.0.0.1svn26093-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485323" version="1" comment="texlive-pgfmolbio is &lt;2017.133.0.0.21svn35152-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485324" version="1" comment="texlive-pgfopts is &lt;2017.133.2.1asvn34573-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485325" version="1" comment="texlive-pgfornament is &lt;2017.133.0.0.21svn39988-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485326" version="1" comment="texlive-pgfplots is &lt;2017.133.1.15svn44469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485327" version="1" comment="texlive-phaistos is &lt;2017.133.1.0svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485328" version="1" comment="texlive-phaistos-fonts is &lt;2017.133.1.0svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485329" version="1" comment="texlive-phffullpagefigure is &lt;2017.133.1.0svn41857-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485330" version="1" comment="texlive-phfnote is &lt;2017.133.1.0svn41858-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485331" version="1" comment="texlive-phfparen is &lt;2017.133.1.0svn41859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485332" version="1" comment="texlive-phfqit is &lt;2017.133.1.0svn41860-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485333" version="1" comment="texlive-phfquotetext is &lt;2017.133.1.0svn41869-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485334" version="1" comment="texlive-phfsvnwatermark is &lt;2017.133.1.0svn41870-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485335" version="1" comment="texlive-phfthm is &lt;2017.133.1.0svn41871-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485336" version="1" comment="texlive-philex is &lt;2017.133.1.3svn36396-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485337" version="1" comment="texlive-philokalia is &lt;2017.133.1.1svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485338" version="1" comment="texlive-philokalia-fonts is &lt;2017.133.1.1svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485339" version="1" comment="texlive-philosophersimprint is &lt;2017.133.1.4svn41788-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485340" version="1" comment="texlive-phonenumbers is &lt;2017.133.1.2.1svn43482-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485341" version="1" comment="texlive-phonetic is &lt;2017.133.svn21871-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485342" version="1" comment="texlive-phonrule is &lt;2017.133.1.3.2svn43963-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485343" version="1" comment="texlive-photo is &lt;2017.133.svn18739-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485344" version="1" comment="texlive-physics is &lt;2017.133.1.3svn28590-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485345" version="1" comment="texlive-piano is &lt;2017.133.1.0svn21574-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485346" version="1" comment="texlive-picinpar is &lt;2017.133.1.2asvn20374-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485347" version="1" comment="texlive-pict2e is &lt;2017.133.0.0.3bsvn39591-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485348" version="1" comment="texlive-pictex is &lt;2017.133.1.1svn21943-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485349" version="1" comment="texlive-pictex2 is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485350" version="1" comment="texlive-pictexsum is &lt;2017.133.svn24965-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485351" version="1" comment="texlive-piechartmp is &lt;2017.133.0.0.3.0svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485352" version="1" comment="texlive-piff is &lt;2017.133.svn21894-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485353" version="1" comment="texlive-pigpen is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485354" version="1" comment="texlive-pigpen-fonts is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485355" version="1" comment="texlive-pinlabel is &lt;2017.133.1.2svn24769-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485356" version="1" comment="texlive-pitex is &lt;2017.133.svn24731-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485357" version="1" comment="texlive-pittetd is &lt;2017.133.1.618svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485358" version="1" comment="texlive-pkfix is &lt;2017.133.1.7svn26032-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485360" version="1" comment="texlive-pkfix-helper is &lt;2017.133.1.4svn29725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485362" version="1" comment="texlive-pkgloader is &lt;2017.133.0.0.5.0svn35711-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485363" version="1" comment="texlive-pkuthss is &lt;2017.133.1.7.4svn43374-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485364" version="1" comment="texlive-pl is &lt;2017.133.1.09svn36012-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485365" version="1" comment="texlive-pl-fonts is &lt;2017.133.1.09svn36012-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485366" version="1" comment="texlive-placeat is &lt;2017.133.0.0.1svn33526-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485367" version="1" comment="texlive-placeins is &lt;2017.133.2.2svn19848-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485368" version="1" comment="texlive-placeins-plain is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485369" version="1" comment="texlive-plain is &lt;2017.133.3.141592653svn43076-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485370" version="1" comment="texlive-plain-doc is &lt;2017.133.svn28424-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485371" version="1" comment="texlive-plainpkg is &lt;2017.133.0.0.4asvn27765-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485372" version="1" comment="texlive-plantslabels is &lt;2017.133.1.0svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485373" version="1" comment="texlive-plari is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485374" version="1" comment="texlive-plates is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485375" version="1" comment="texlive-platex is &lt;2017.133.svn44209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485377" version="1" comment="texlive-platex-tools is &lt;2017.133.svn44208-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485378" version="1" comment="texlive-platexcheat is &lt;2017.133.2.0svn42918-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485379" version="1" comment="texlive-play is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485380" version="1" comment="texlive-playfair is &lt;2017.133.svn34236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485381" version="1" comment="texlive-playfair-fonts is &lt;2017.133.svn34236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485382" version="1" comment="texlive-plipsum is &lt;2017.133.4.3svn30353-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485383" version="1" comment="texlive-plnfss is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485384" version="1" comment="texlive-plstmary is &lt;2017.133.0.0.5csvn31088-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485385" version="1" comment="texlive-plweb is &lt;2017.133.3.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485386" version="1" comment="texlive-pmgraph is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485387" version="1" comment="texlive-pmx is &lt;2017.133.2.76svn43869-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485389" version="1" comment="texlive-pmxchords is &lt;2017.133.2.0.2svn39249-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485391" version="1" comment="texlive-pnas2009 is &lt;2017.133.1.0svn16287-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485392" version="1" comment="texlive-poemscol is &lt;2017.133.2.72svn40613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485393" version="1" comment="texlive-poetrytex is &lt;2017.133.3.0.1svn39921-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485394" version="1" comment="texlive-polski is &lt;2017.133.1.3.4svn44213-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485395" version="1" comment="texlive-poltawski is &lt;2017.133.1.101svn20075-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485396" version="1" comment="texlive-poltawski-fonts is &lt;2017.133.1.101svn20075-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485397" version="1" comment="texlive-polyglossia is &lt;2017.133.1.42.4svn40138-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485398" version="1" comment="texlive-polynom is &lt;2017.133.0.0.18svn42664-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485399" version="1" comment="texlive-polynomial is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485400" version="1" comment="texlive-polytable is &lt;2017.133.0.0.8.2svn31235-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485401" version="1" comment="texlive-postcards is &lt;2017.133.svn21641-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485402" version="1" comment="texlive-poster-mac is &lt;2017.133.1.1svn18305-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485403" version="1" comment="texlive-powerdot is &lt;2017.133.1.5asvn38984-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485404" version="1" comment="texlive-powerdot-FUBerlin is &lt;2017.133.0.0.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485405" version="1" comment="texlive-ppr-prv is &lt;2017.133.0.0.13csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485406" version="1" comment="texlive-pracjourn is &lt;2017.133.0.0.4nsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485407" version="1" comment="texlive-preprint is &lt;2017.133.2011svn30447-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485408" version="1" comment="texlive-prerex is &lt;2017.133.svn40613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485409" version="1" comment="texlive-present is &lt;2017.133.2.2svn25953-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485410" version="1" comment="texlive-presentations is &lt;2017.133.svn43949-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485411" version="1" comment="texlive-presentations-en is &lt;2017.133.svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485412" version="1" comment="texlive-pressrelease is &lt;2017.133.1.0svn35147-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485413" version="1" comment="texlive-prettyref is &lt;2017.133.3.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485414" version="1" comment="texlive-preview is &lt;2017.133.11.90svn44227-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485415" version="1" comment="texlive-prftree is &lt;2017.133.1.5svn41985-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485416" version="1" comment="texlive-printlen is &lt;2017.133.1.1asvn19847-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485417" version="1" comment="texlive-proba is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485418" version="1" comment="texlive-probsoln is &lt;2017.133.3.04svn29371-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485419" version="1" comment="texlive-procIAGssymp is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485420" version="1" comment="texlive-prodint is &lt;2017.133.svn21893-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485421" version="1" comment="texlive-prodint-fonts is &lt;2017.133.svn21893-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485422" version="1" comment="texlive-productbox is &lt;2017.133.1.1svn20886-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485423" version="1" comment="texlive-program is &lt;2017.133.3.3.14svn44214-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485424" version="1" comment="texlive-progress is &lt;2017.133.1.10svn19519-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485425" version="1" comment="texlive-progressbar is &lt;2017.133.1.0b_4svn33822-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485426" version="1" comment="texlive-proofread is &lt;2017.133.1.02svn43370-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485427" version="1" comment="texlive-prooftrees is &lt;2017.133.0.0.6svn43184-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485428" version="1" comment="texlive-properties is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485429" version="1" comment="texlive-proposal is &lt;2017.133.svn40538-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485430" version="1" comment="texlive-prosper is &lt;2017.133.1.0hsvn33033-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485431" version="1" comment="texlive-protex is &lt;2017.133.svn41633-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485432" version="1" comment="texlive-protocol is &lt;2017.133.1.13svn25562-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485433" version="1" comment="texlive-przechlewski-book is &lt;2017.133.svn23552-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485434" version="1" comment="texlive-ps2pk is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485436" version="1" comment="texlive-psbao is &lt;2017.133.0.0.17svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485437" version="1" comment="texlive-pseudocode is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485438" version="1" comment="texlive-psfrag is &lt;2017.133.3.04svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485439" version="1" comment="texlive-psfrag-italian is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485440" version="1" comment="texlive-psfragx is &lt;2017.133.1.1svn26243-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485441" version="1" comment="texlive-psgo is &lt;2017.133.0.0.17svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485442" version="1" comment="texlive-psizzl is &lt;2017.133.0.0.35svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485443" version="1" comment="texlive-pslatex is &lt;2017.133.svn16416-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485444" version="1" comment="texlive-psnfss is &lt;2017.133.9.2asvn33946-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485445" version="1" comment="texlive-pspicture is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485446" version="1" comment="texlive-pst-2dplot is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485447" version="1" comment="texlive-pst-3d is &lt;2017.133.1.10svn17257-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485448" version="1" comment="texlive-pst-3dplot is &lt;2017.133.2.04svn43703-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485449" version="1" comment="texlive-pst-abspos is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485450" version="1" comment="texlive-pst-am is &lt;2017.133.1.02svn19591-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485451" version="1" comment="texlive-pst-arrow is &lt;2017.133.0.0.01svn41980-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485452" version="1" comment="texlive-pst-asr is &lt;2017.133.1.3svn22138-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485453" version="1" comment="texlive-pst-bar is &lt;2017.133.0.0.92svn18734-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485454" version="1" comment="texlive-pst-barcode is &lt;2017.133.0.0.16asvn43996-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485455" version="1" comment="texlive-pst-bezier is &lt;2017.133.0.0.03svn41981-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485456" version="1" comment="texlive-pst-blur is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485457" version="1" comment="texlive-pst-bspline is &lt;2017.133.1.62svn40685-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485458" version="1" comment="texlive-pst-calendar is &lt;2017.133.0.0.47svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485459" version="1" comment="texlive-pst-cie is &lt;2017.133.1.05svn41223-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485460" version="1" comment="texlive-pst-circ is &lt;2017.133.2.14svn41901-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485461" version="1" comment="texlive-pst-coil is &lt;2017.133.1.07svn37377-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485462" version="1" comment="texlive-pst-cox is &lt;2017.133.0.0.98_betasvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485463" version="1" comment="texlive-pst-dbicons is &lt;2017.133.0.0.16svn17556-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485464" version="1" comment="texlive-pst-diffraction is &lt;2017.133.2.03svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485465" version="1" comment="texlive-pst-electricfield is &lt;2017.133.0.0.14svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485466" version="1" comment="texlive-pst-eps is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485467" version="1" comment="texlive-pst-eucl is &lt;2017.133.1.56svn43911-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485468" version="1" comment="texlive-pst-eucl-translation-bg is &lt;2017.133.1.3.2svn19296-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485469" version="1" comment="texlive-pst-exa is &lt;2017.133.0.0.05svn35248-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485470" version="1" comment="texlive-pst-fill is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485471" version="1" comment="texlive-pst-fit is &lt;2017.133.0.0.01svn28155-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485472" version="1" comment="texlive-pst-fr3d is &lt;2017.133.1.10svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485473" version="1" comment="texlive-pst-fractal is &lt;2017.133.0.0.06svn16958-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485474" version="1" comment="texlive-pst-fun is &lt;2017.133.0.0.04svn17909-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485475" version="1" comment="texlive-pst-func is &lt;2017.133.0.0.85svn43912-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485476" version="1" comment="texlive-pst-gantt is &lt;2017.133.0.0.22asvn35832-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485477" version="1" comment="texlive-pst-geo is &lt;2017.133.0.0.06svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485478" version="1" comment="texlive-pst-ghsb is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485479" version="1" comment="texlive-pst-gr3d is &lt;2017.133.1.34svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485480" version="1" comment="texlive-pst-grad is &lt;2017.133.1.06svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485481" version="1" comment="texlive-pst-graphicx is &lt;2017.133.0.0.02svn21717-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485482" version="1" comment="texlive-pst-infixplot is &lt;2017.133.0.0.11svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485483" version="1" comment="texlive-pst-intersect is &lt;2017.133.0.0.4svn33210-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485484" version="1" comment="texlive-pst-jtree is &lt;2017.133.2.6svn20946-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485485" version="1" comment="texlive-pst-knot is &lt;2017.133.0.0.2svn16033-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485486" version="1" comment="texlive-pst-labo is &lt;2017.133.2.04svn39077-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485487" version="1" comment="texlive-pst-layout is &lt;2017.133.0.0.95svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485488" version="1" comment="texlive-pst-lens is &lt;2017.133.1.02svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485489" version="1" comment="texlive-pst-light3d is &lt;2017.133.0.0.12svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485490" version="1" comment="texlive-pst-magneticfield is &lt;2017.133.1.13svn18922-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485491" version="1" comment="texlive-pst-math is &lt;2017.133.0.0.63svn34786-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485492" version="1" comment="texlive-pst-mirror is &lt;2017.133.1.01svn32997-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485493" version="1" comment="texlive-pst-node is &lt;2017.133.1.39svn43015-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485494" version="1" comment="texlive-pst-ob3d is &lt;2017.133.0.0.21svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485495" version="1" comment="texlive-pst-ode is &lt;2017.133.0.0.7svn35418-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485496" version="1" comment="texlive-pst-optexp is &lt;2017.133.5.2svn35673-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485497" version="1" comment="texlive-pst-optic is &lt;2017.133.1.02svn41999-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485498" version="1" comment="texlive-pst-osci is &lt;2017.133.2.82svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485499" version="1" comment="texlive-pst-ovl is &lt;2017.133.0.0.07svn40873-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485500" version="1" comment="texlive-pst-pad is &lt;2017.133.0.0.3bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485501" version="1" comment="texlive-pst-pdf is &lt;2017.133.1.2csvn44047-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485503" version="1" comment="texlive-pst-pdgr is &lt;2017.133.0.0.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485504" version="1" comment="texlive-pst-perspective is &lt;2017.133.1.05svn39585-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485505" version="1" comment="texlive-pst-platon is &lt;2017.133.0.0.01svn16538-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485506" version="1" comment="texlive-pst-plot is &lt;2017.133.1.79svn44511-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485507" version="1" comment="texlive-pst-poly is &lt;2017.133.1.63svn35062-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485508" version="1" comment="texlive-pst-pulley is &lt;2017.133.0.0.01svn25142-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485509" version="1" comment="texlive-pst-qtree is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485510" version="1" comment="texlive-pst-rubans is &lt;2017.133.1.2svn23464-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485511" version="1" comment="texlive-pst-shell is &lt;2017.133.0.0.03svn42840-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485512" version="1" comment="texlive-pst-sigsys is &lt;2017.133.1.4svn21667-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485513" version="1" comment="texlive-pst-slpe is &lt;2017.133.1.31svn24391-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485514" version="1" comment="texlive-pst-solarsystem is &lt;2017.133.0.0.12svn24995-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485515" version="1" comment="texlive-pst-solides3d is &lt;2017.133.4.32asvn43401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485516" version="1" comment="texlive-pst-soroban is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485517" version="1" comment="texlive-pst-spectra is &lt;2017.133.0.0.91svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485518" version="1" comment="texlive-pst-spinner is &lt;2017.133.1.02svn44507-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485519" version="1" comment="texlive-pst-spirograph is &lt;2017.133.0.0.41svn35026-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485520" version="1" comment="texlive-pst-stru is &lt;2017.133.0.0.13svn38613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485521" version="1" comment="texlive-pst-support is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485522" version="1" comment="texlive-pst-text is &lt;2017.133.1.00svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485523" version="1" comment="texlive-pst-thick is &lt;2017.133.1.0svn16369-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485524" version="1" comment="texlive-pst-tools is &lt;2017.133.0.0.06svn44320-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485525" version="1" comment="texlive-pst-tree is &lt;2017.133.1.13svn43272-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485526" version="1" comment="texlive-pst-tvz is &lt;2017.133.1.01svn23451-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485527" version="1" comment="texlive-pst-uml is &lt;2017.133.0.0.83svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485528" version="1" comment="texlive-pst-vectorian is &lt;2017.133.0.0.4svn28801-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485529" version="1" comment="texlive-pst-vehicle is &lt;2017.133.1.1svn44466-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485530" version="1" comment="texlive-pst-vowel is &lt;2017.133.1.0svn25228-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485531" version="1" comment="texlive-pst-vue3d is &lt;2017.133.1.24svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485532" version="1" comment="texlive-pst2pdf is &lt;2017.133.0.0.16svn35247-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485534" version="1" comment="texlive-pstool is &lt;2017.133.1.5csvn34015-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485535" version="1" comment="texlive-pstools is &lt;2017.133.1.68svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485537" version="1" comment="texlive-pstricks is &lt;2017.133.2.73asvn44506-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485538" version="1" comment="texlive-pstricks-add is &lt;2017.133.3.83svn44281-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485539" version="1" comment="texlive-pstricks_calcnotes is &lt;2017.133.1.2svn34363-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485540" version="1" comment="texlive-pstring is &lt;2017.133.svn42857-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485541" version="1" comment="texlive-psu-thesis is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485542" version="1" comment="texlive-ptex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485543" version="1" comment="texlive-ptex-base is &lt;2017.133.svn43899-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485545" version="1" comment="texlive-ptex-fontmaps is &lt;2017.133.20170114.0svn44206-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485547" version="1" comment="texlive-ptex-fonts is &lt;2017.133.svn42950-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485548" version="1" comment="texlive-ptex-fonts-fonts is &lt;2017.133.svn42950-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485549" version="1" comment="texlive-ptex2pdf is &lt;2017.133.20170604.0svn44470-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485552" version="1" comment="texlive-ptext is &lt;2017.133.1.1svn30171-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485553" version="1" comment="texlive-ptptex is &lt;2017.133.0.0.91svn19440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485554" version="1" comment="texlive-punk is &lt;2017.133.svn27388-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485555" version="1" comment="texlive-punk-latex is &lt;2017.133.1.1svn27389-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485556" version="1" comment="texlive-punknova is &lt;2017.133.1.003svn24649-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485557" version="1" comment="texlive-punknova-fonts is &lt;2017.133.1.003svn24649-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485558" version="1" comment="texlive-purifyeps is &lt;2017.133.1.1svn29725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485560" version="1" comment="texlive-pxbase is &lt;2017.133.1.1svn44482-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485561" version="1" comment="texlive-pxchfon is &lt;2017.133.1.0svn44459-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485562" version="1" comment="texlive-pxcjkcat is &lt;2017.133.1.0svn27780-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485563" version="1" comment="texlive-pxfonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485564" version="1" comment="texlive-pxfonts-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485565" version="1" comment="texlive-pxgreeks is &lt;2017.133.1.0svn21838-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485566" version="1" comment="texlive-pxjahyper is &lt;2017.133.0.0.3svn40612-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485567" version="1" comment="texlive-pxpgfmark is &lt;2017.133.0.0.2svn30212-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485568" version="1" comment="texlive-pxrubrica is &lt;2017.133.1.3asvn44225-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485569" version="1" comment="texlive-pxtatescale is &lt;2017.133.0.0.4svn43009-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485570" version="1" comment="texlive-pxtxalfa is &lt;2017.133.1svn23682-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485571" version="1" comment="texlive-pygmentex is &lt;2017.133.0.0.8svn34996-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485573" version="1" comment="texlive-python is &lt;2017.133.0.0.21svn27064-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485574" version="1" comment="texlive-pythonhighlight is &lt;2017.133.svn43191-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485575" version="1" comment="texlive-pythontex is &lt;2017.133.0.0.15svn41746-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485577" version="1" comment="texlive-qcircuit is &lt;2017.133.2.5.3svn42816-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485578" version="1" comment="texlive-qcm is &lt;2017.133.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485579" version="1" comment="texlive-qobitree is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485580" version="1" comment="texlive-qpxqtx is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485581" version="1" comment="texlive-qrcode is &lt;2017.133.1.51svn36065-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485582" version="1" comment="texlive-qstest is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485583" version="1" comment="texlive-qsymbols is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485584" version="1" comment="texlive-qtree is &lt;2017.133.3.1bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485585" version="1" comment="texlive-quattrocento is &lt;2017.133.svn31763-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485586" version="1" comment="texlive-quattrocento-fonts is &lt;2017.133.svn31763-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485587" version="1" comment="texlive-quicktype is &lt;2017.133.0.0.1svn42183-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485588" version="1" comment="texlive-quotchap is &lt;2017.133.1.1svn28046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485589" version="1" comment="texlive-quoting is &lt;2017.133.0.0.1csvn32818-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485590" version="1" comment="texlive-quotmark is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485591" version="1" comment="texlive-quran is &lt;2017.133.1.252svn43360-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485592" version="1" comment="texlive-r_und_s is &lt;2017.133.1.3isvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485593" version="1" comment="texlive-raleway is &lt;2017.133.1.4svn42629-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485594" version="1" comment="texlive-raleway-fonts is &lt;2017.133.1.4svn42629-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485595" version="1" comment="texlive-ran_toks is &lt;2017.133.1.1svn44429-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485596" version="1" comment="texlive-randbild is &lt;2017.133.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485597" version="1" comment="texlive-randomlist is &lt;2017.133.1.2svn41727-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485598" version="1" comment="texlive-randomwalk is &lt;2017.133.0.0.4svn38418-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485599" version="1" comment="texlive-randtext is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485600" version="1" comment="texlive-rccol is &lt;2017.133.1.2csvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485601" version="1" comment="texlive-rcs is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485602" version="1" comment="texlive-rcs-multi is &lt;2017.133.0.0.1asvn21939-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485603" version="1" comment="texlive-rcsinfo is &lt;2017.133.1.11svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485604" version="1" comment="texlive-readarray is &lt;2017.133.2.0svn42467-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485605" version="1" comment="texlive-realboxes is &lt;2017.133.0.0.2svn23581-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485606" version="1" comment="texlive-realscripts is &lt;2017.133.0.0.3dsvn39706-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485607" version="1" comment="texlive-rec-thy is &lt;2017.133.1.3svn27225-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485608" version="1" comment="texlive-recipe is &lt;2017.133.0.0.9svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485609" version="1" comment="texlive-recipebook is &lt;2017.133.svn37026-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485610" version="1" comment="texlive-recipecard is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485611" version="1" comment="texlive-rectopma is &lt;2017.133.svn19980-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485612" version="1" comment="texlive-recycle is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485613" version="1" comment="texlive-recycle-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485614" version="1" comment="texlive-refcheck is &lt;2017.133.1.9.1svn29128-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485615" version="1" comment="texlive-refenums is &lt;2017.133.1.1.2svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485616" version="1" comment="texlive-reflectgraphics is &lt;2017.133.0.0.2csvn40612-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485617" version="1" comment="texlive-refman is &lt;2017.133.2.0esvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485618" version="1" comment="texlive-refstyle is &lt;2017.133.0.0.5svn20318-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485619" version="1" comment="texlive-regcount is &lt;2017.133.1.0svn19979-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485620" version="1" comment="texlive-regexpatch is &lt;2017.133.0.0.2bsvn41204-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485621" version="1" comment="texlive-register is &lt;2017.133.1.6svn21127-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485622" version="1" comment="texlive-regstats is &lt;2017.133.1.0hsvn25050-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485623" version="1" comment="texlive-reledmac is &lt;2017.133.2.22.0svn44545-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485624" version="1" comment="texlive-relenc is &lt;2017.133.svn22050-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485625" version="1" comment="texlive-relsize is &lt;2017.133.4.1svn30707-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485626" version="1" comment="texlive-reotex is &lt;2017.133.1.1svn34924-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485627" version="1" comment="texlive-repeatindex is &lt;2017.133.0.0.01svn24305-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485628" version="1" comment="texlive-repere is &lt;2017.133.17.05svn44298-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485629" version="1" comment="texlive-repltext is &lt;2017.133.1.0svn33442-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485630" version="1" comment="texlive-resphilosophica is &lt;2017.133.1.31svn43631-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485631" version="1" comment="texlive-resumecls is &lt;2017.133.0.0.3.2svn38427-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485632" version="1" comment="texlive-resumemac is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485633" version="1" comment="texlive-reverxii is &lt;2017.133.svn24976-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485634" version="1" comment="texlive-revquantum is &lt;2017.133.0.0.11svn43505-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485635" version="1" comment="texlive-revtex is &lt;2017.133.4.1rsvn19652-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485636" version="1" comment="texlive-revtex4 is &lt;2017.133.svn16488-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485637" version="1" comment="texlive-ribbonproofs is &lt;2017.133.1.0svn31137-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485638" version="1" comment="texlive-rjlparshap is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485639" version="1" comment="texlive-rlepsf is &lt;2017.133.svn19082-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485640" version="1" comment="texlive-rmathbr is &lt;2017.133.1.0.3svn40415-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485641" version="1" comment="texlive-rmpage is &lt;2017.133.0.0.92svn20002-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485642" version="1" comment="texlive-roboto is &lt;2017.133.svn38386-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485643" version="1" comment="texlive-roboto-fonts is &lt;2017.133.svn38386-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485644" version="1" comment="texlive-robustcommand is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485645" version="1" comment="texlive-robustindex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485646" version="1" comment="texlive-roex is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485647" version="1" comment="texlive-romanbar is &lt;2017.133.1.0fsvn25005-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485648" version="1" comment="texlive-romanbarpagenumber is &lt;2017.133.1.0svn36236-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485649" version="1" comment="texlive-romande is &lt;2017.133.1.008_v7_scsvn19537-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485650" version="1" comment="texlive-romande-fonts is &lt;2017.133.1.008_v7_scsvn19537-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485651" version="1" comment="texlive-romanneg is &lt;2017.133.svn20087-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485652" version="1" comment="texlive-romannum is &lt;2017.133.1.0bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485653" version="1" comment="texlive-rosario is &lt;2017.133.1.0svn40843-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485654" version="1" comment="texlive-rosario-fonts is &lt;2017.133.1.0svn40843-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485655" version="1" comment="texlive-rotfloat is &lt;2017.133.1.2svn18292-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485656" version="1" comment="texlive-rotpages is &lt;2017.133.3.0svn18740-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485657" version="1" comment="texlive-roundbox is &lt;2017.133.0.0.2svn29675-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485658" version="1" comment="texlive-roundrect is &lt;2017.133.2.2svn39796-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485659" version="1" comment="texlive-rputover is &lt;2017.133.1.0svn43624-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485660" version="1" comment="texlive-rrgtrees is &lt;2017.133.1.1svn27322-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485661" version="1" comment="texlive-rsc is &lt;2017.133.3.1fsvn41923-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485662" version="1" comment="texlive-rsfs is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485663" version="1" comment="texlive-rsfs-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485664" version="1" comment="texlive-rsfso is &lt;2017.133.1.02svn37965-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485665" version="1" comment="texlive-rterface is &lt;2017.133.svn30084-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485666" version="1" comment="texlive-rtkinenc is &lt;2017.133.1.0svn20003-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485667" version="1" comment="texlive-rtklage is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485668" version="1" comment="texlive-rubik is &lt;2017.133.4.0svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485670" version="1" comment="texlive-ruhyphen is &lt;2017.133.1.6svn21081-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485671" version="1" comment="texlive-rulercompass is &lt;2017.133.1svn32392-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485672" version="1" comment="texlive-russ is &lt;2017.133.svn25209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485673" version="1" comment="texlive-rutitlepage is &lt;2017.133.1.0svn44485-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485674" version="1" comment="texlive-rviewport is &lt;2017.133.1.0svn23739-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485675" version="1" comment="texlive-rvwrite is &lt;2017.133.1.2svn19614-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485676" version="1" comment="texlive-ryethesis is &lt;2017.133.1.36svn33945-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485677" version="1" comment="texlive-sa-tikz is &lt;2017.133.0.0.7asvn32815-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485678" version="1" comment="texlive-sageep is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485679" version="1" comment="texlive-sanitize-umlaut is &lt;2017.133.1.00svn41365-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485680" version="1" comment="texlive-sanskrit is &lt;2017.133.2.2.1svn42925-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485681" version="1" comment="texlive-sanskrit-t1 is &lt;2017.133.svn35737-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485682" version="1" comment="texlive-sanskrit-t1-fonts is &lt;2017.133.svn35737-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485683" version="1" comment="texlive-sansmath is &lt;2017.133.1.1svn17997-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485684" version="1" comment="texlive-sansmathaccent is &lt;2017.133.svn30187-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485685" version="1" comment="texlive-sansmathfonts is &lt;2017.133.svn43252-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485686" version="1" comment="texlive-sansmathfonts-fonts is &lt;2017.133.svn43252-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485687" version="1" comment="texlive-sapthesis is &lt;2017.133.3.8svn39014-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485688" version="1" comment="texlive-sasnrdisplay is &lt;2017.133.0.0.93svn33120-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485689" version="1" comment="texlive-sauerj is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485690" version="1" comment="texlive-sauter is &lt;2017.133.2.4svn13293-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485691" version="1" comment="texlive-sauterfonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485692" version="1" comment="texlive-savefnmark is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485693" version="1" comment="texlive-savesym is &lt;2017.133.1.2svn31565-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485694" version="1" comment="texlive-savetrees is &lt;2017.133.2.4svn40525-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485695" version="1" comment="texlive-scale is &lt;2017.133.1.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485696" version="1" comment="texlive-scalebar is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485697" version="1" comment="texlive-scalerel is &lt;2017.133.1.8svn42809-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485698" version="1" comment="texlive-scanpages is &lt;2017.133.1.05asvn42633-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485699" version="1" comment="texlive-scanpages-fonts is &lt;2017.133.1.05asvn42633-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485700" version="1" comment="texlive-schemabloc is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485701" version="1" comment="texlive-schemata is &lt;2017.133.0.0.8svn39510-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485702" version="1" comment="texlive-schule is &lt;2017.133.0.0.6svn37277-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485703" version="1" comment="texlive-schulschriften is &lt;2017.133.4svn35730-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485704" version="1" comment="texlive-schwalbe-chess is &lt;2017.133.2.1svn39318-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485705" version="1" comment="texlive-sciposter is &lt;2017.133.1.18svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485706" version="1" comment="texlive-sclang-prettifier is &lt;2017.133.0.0.1svn35087-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485707" version="1" comment="texlive-scratch is &lt;2017.133.0.0.2svn44490-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485708" version="1" comment="texlive-screenplay is &lt;2017.133.1.6svn27223-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485709" version="1" comment="texlive-screenplay-pkg is &lt;2017.133.1.0svn37893-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485710" version="1" comment="texlive-scrjrnl is &lt;2017.133.0.0.1svn27810-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485711" version="1" comment="texlive-scrlttr2copy is &lt;2017.133.0.0.1dsvn39734-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485712" version="1" comment="texlive-scsnowman is &lt;2017.133.1.1svn43017-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485713" version="1" comment="texlive-sdrt is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485714" version="1" comment="texlive-sduthesis is &lt;2017.133.1.2.1svn41401-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485715" version="1" comment="texlive-secdot is &lt;2017.133.1.0svn20208-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485716" version="1" comment="texlive-section is &lt;2017.133.svn20180-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485717" version="1" comment="texlive-sectionbox is &lt;2017.133.1.01svn37749-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485718" version="1" comment="texlive-sectsty is &lt;2017.133.2.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485719" version="1" comment="texlive-seealso is &lt;2017.133.1.2svn43595-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485720" version="1" comment="texlive-seetexk is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485722" version="1" comment="texlive-selectp is &lt;2017.133.1.0svn20185-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485723" version="1" comment="texlive-selnolig is &lt;2017.133.0.0.302svn38721-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485724" version="1" comment="texlive-semantic is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485725" version="1" comment="texlive-semantic-markup is &lt;2017.133.svn42374-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485726" version="1" comment="texlive-semaphor is &lt;2017.133.svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485727" version="1" comment="texlive-semaphor-fonts is &lt;2017.133.svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485728" version="1" comment="texlive-seminar is &lt;2017.133.1.62svn34011-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485729" version="1" comment="texlive-semioneside is &lt;2017.133.0.0.41svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485730" version="1" comment="texlive-semproc is &lt;2017.133.0.0.1svn37568-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485731" version="1" comment="texlive-sepfootnotes is &lt;2017.133.0.0.3csvn41732-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485732" version="1" comment="texlive-sepnum is &lt;2017.133.2.0svn20186-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485733" version="1" comment="texlive-seqsplit is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485734" version="1" comment="texlive-serbian-apostrophe is &lt;2017.133.svn23799-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485735" version="1" comment="texlive-serbian-date-lat is &lt;2017.133.svn23446-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485736" version="1" comment="texlive-serbian-def-cyr is &lt;2017.133.svn23734-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485737" version="1" comment="texlive-serbian-lig is &lt;2017.133.svn39096-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485738" version="1" comment="texlive-sesamanuel is &lt;2017.133.0.0.6svn36613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485739" version="1" comment="texlive-sesstime is &lt;2017.133.1.0svn44157-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485740" version="1" comment="texlive-setdeck is &lt;2017.133.0.0.1svn40613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485741" version="1" comment="texlive-setspace is &lt;2017.133.6.7asvn24881-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485742" version="1" comment="texlive-seuthesis is &lt;2017.133.2.1.2svn33042-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485743" version="1" comment="texlive-seuthesix is &lt;2017.133.1.0.1svn40088-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485744" version="1" comment="texlive-sf298 is &lt;2017.133.1.3svn41653-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485745" version="1" comment="texlive-sffms is &lt;2017.133.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485746" version="1" comment="texlive-sfg is &lt;2017.133.0.0.91svn20209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485747" version="1" comment="texlive-sfmath is &lt;2017.133.0.0.8svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485748" version="1" comment="texlive-sgame is &lt;2017.133.2.15svn30959-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485749" version="1" comment="texlive-shade is &lt;2017.133.1svn22212-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485750" version="1" comment="texlive-shadethm is &lt;2017.133.svn20319-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485751" version="1" comment="texlive-shadow is &lt;2017.133.svn20312-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485752" version="1" comment="texlive-shadowtext is &lt;2017.133.0.0.3svn26522-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485753" version="1" comment="texlive-shapepar is &lt;2017.133.2.2svn30708-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485754" version="1" comment="texlive-shapes is &lt;2017.133.1.1svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485755" version="1" comment="texlive-shdoc is &lt;2017.133.2.1bsvn41991-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485756" version="1" comment="texlive-shipunov is &lt;2017.133.1.1svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485757" version="1" comment="texlive-shorttoc is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485758" version="1" comment="texlive-show2e is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485759" version="1" comment="texlive-showcharinbox is &lt;2017.133.0.0.1svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485760" version="1" comment="texlive-showdim is &lt;2017.133.1.2svn28918-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485761" version="1" comment="texlive-showexpl is &lt;2017.133.0.0.3osvn42677-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485762" version="1" comment="texlive-showhyphens is &lt;2017.133.0.0.5csvn39787-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485763" version="1" comment="texlive-showlabels is &lt;2017.133.1.8svn41322-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485764" version="1" comment="texlive-showtags is &lt;2017.133.1.05svn20336-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485765" version="1" comment="texlive-shuffle is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485766" version="1" comment="texlive-sidecap is &lt;2017.133.1.6fsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485767" version="1" comment="texlive-sidenotes is &lt;2017.133.1.00svn40658-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485768" version="1" comment="texlive-sides is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485769" version="1" comment="texlive-signchart is &lt;2017.133.1.01svn39707-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485770" version="1" comment="texlive-silence is &lt;2017.133.1.5bsvn27028-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485771" version="1" comment="texlive-simple-resume-cv is &lt;2017.133.svn43057-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485772" version="1" comment="texlive-simple-thesis-dissertation is &lt;2017.133.svn43058-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485773" version="1" comment="texlive-simplecd is &lt;2017.133.1.4svn29260-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485774" version="1" comment="texlive-simplecv is &lt;2017.133.1.6asvn35537-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485775" version="1" comment="texlive-simpler-wick is &lt;2017.133.1.0.0svn39074-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485776" version="1" comment="texlive-simplewick is &lt;2017.133.1.2asvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485777" version="1" comment="texlive-simplified-latex is &lt;2017.133.svn20620-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485778" version="1" comment="texlive-simurgh is &lt;2017.133.0.0.01bsvn31719-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485779" version="1" comment="texlive-sitem is &lt;2017.133.1.0svn22136-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485780" version="1" comment="texlive-siunitx is &lt;2017.133.2.7gsvn44428-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485781" version="1" comment="texlive-skak is &lt;2017.133.1.5.2svn32758-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485782" version="1" comment="texlive-skaknew is &lt;2017.133.svn20031-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485783" version="1" comment="texlive-skaknew-fonts is &lt;2017.133.svn20031-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485784" version="1" comment="texlive-skb is &lt;2017.133.0.0.52svn22781-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485785" version="1" comment="texlive-skdoc is &lt;2017.133.1.5svn43170-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485786" version="1" comment="texlive-skeycommand is &lt;2017.133.0.0.4svn24652-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485787" version="1" comment="texlive-skeyval is &lt;2017.133.1.3svn30560-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485788" version="1" comment="texlive-skmath is &lt;2017.133.0.0.4bsvn42902-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485789" version="1" comment="texlive-skrapport is &lt;2017.133.0.0.12gsvn42903-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485790" version="1" comment="texlive-skull is &lt;2017.133.0.0.1svn25608-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485791" version="1" comment="texlive-slantsc is &lt;2017.133.2.11svn25007-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485792" version="1" comment="texlive-slideshow is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485793" version="1" comment="texlive-smalltableof is &lt;2017.133.svn20333-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485794" version="1" comment="texlive-smartdiagram is &lt;2017.133.0.0.3bsvn42781-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485795" version="1" comment="texlive-smartref is &lt;2017.133.1.9svn20311-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485796" version="1" comment="texlive-smartunits is &lt;2017.133.1.2svn39592-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485797" version="1" comment="texlive-snapshot is &lt;2017.133.1.14svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485798" version="1" comment="texlive-snotez is &lt;2017.133.0.0.3svn30355-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485799" version="1" comment="texlive-songbook is &lt;2017.133.4.5svn18136-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485800" version="1" comment="texlive-songs is &lt;2017.133.3.0svn44553-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485801" version="1" comment="texlive-sort-by-letters is &lt;2017.133.svn27128-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485802" version="1" comment="texlive-soton is &lt;2017.133.0.0.1svn16215-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485803" version="1" comment="texlive-soul is &lt;2017.133.2.4svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485804" version="1" comment="texlive-soup is &lt;2017.133.1.0svn42992-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485805" version="1" comment="texlive-sourcecodepro is &lt;2017.133.2.6svn40597-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485806" version="1" comment="texlive-sourcecodepro-fonts is &lt;2017.133.2.6svn40597-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485807" version="1" comment="texlive-sourcesanspro is &lt;2017.133.2.6svn42852-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485808" version="1" comment="texlive-sourcesanspro-fonts is &lt;2017.133.2.6svn42852-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485809" version="1" comment="texlive-sourceserifpro is &lt;2017.133.1.2svn40598-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485810" version="1" comment="texlive-sourceserifpro-fonts is &lt;2017.133.1.2svn40598-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485811" version="1" comment="texlive-spalign is &lt;2017.133.svn42225-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485812" version="1" comment="texlive-spanish-mx is &lt;2017.133.1.1asvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485813" version="1" comment="texlive-sparklines is &lt;2017.133.1.7svn42821-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485814" version="1" comment="texlive-spath3 is &lt;2017.133.1.1svn39794-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485815" version="1" comment="texlive-spelling is &lt;2017.133.0.0.41svn30715-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485816" version="1" comment="texlive-sphdthesis is &lt;2017.133.1.0svn34374-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485817" version="1" comment="texlive-spie is &lt;2017.133.3.25svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485818" version="1" comment="texlive-splines is &lt;2017.133.0.0.2svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485819" version="1" comment="texlive-splitbib is &lt;2017.133.1.17svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485820" version="1" comment="texlive-splitindex is &lt;2017.133.1.2csvn39766-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485822" version="1" comment="texlive-spot is &lt;2017.133.1.1svn22408-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485823" version="1" comment="texlive-spotcolor is &lt;2017.133.1.2svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485824" version="1" comment="texlive-spreadtab is &lt;2017.133.0.0.4csvn35531-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485825" version="1" comment="texlive-spverbatim is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485826" version="1" comment="texlive-sr-vorl is &lt;2017.133.1.1svn39529-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485827" version="1" comment="texlive-srbook-mem is &lt;2017.133.svn23454-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485828" version="1" comment="texlive-srcltx is &lt;2017.133.1.6svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485829" version="1" comment="texlive-srcredact is &lt;2017.133.1.0svn38710-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485831" version="1" comment="texlive-sseq is &lt;2017.133.2.01svn31585-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485832" version="1" comment="texlive-sslides is &lt;2017.133.svn32293-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485833" version="1" comment="texlive-stack is &lt;2017.133.1.00svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485834" version="1" comment="texlive-stackengine is &lt;2017.133.4.01svn43221-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485835" version="1" comment="texlive-stage is &lt;2017.133.1.00svn44100-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485836" version="1" comment="texlive-standalone is &lt;2017.133.1.2svn37875-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485837" version="1" comment="texlive-stanli is &lt;2017.133.3.0svn42765-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485838" version="1" comment="texlive-starfont is &lt;2017.133.1.2svn19982-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485839" version="1" comment="texlive-starfont-fonts is &lt;2017.133.1.2svn19982-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485840" version="1" comment="texlive-startex is &lt;2017.133.1.04svn35718-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485841" version="1" comment="texlive-statex is &lt;2017.133.1.6svn20306-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485842" version="1" comment="texlive-statex2 is &lt;2017.133.2.1svn23961-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485843" version="1" comment="texlive-statistik is &lt;2017.133.0.0.03svn20334-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485844" version="1" comment="texlive-staves is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485845" version="1" comment="texlive-staves-fonts is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485846" version="1" comment="texlive-stdclsdv is &lt;2017.133.1.1asvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485847" version="1" comment="texlive-stdpage is &lt;2017.133.0.0.6svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485848" version="1" comment="texlive-steinmetz is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485849" version="1" comment="texlive-stellenbosch is &lt;2017.133.11asvn36696-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485850" version="1" comment="texlive-stex is &lt;2017.133.svn40320-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485851" version="1" comment="texlive-stix is &lt;2017.133.1.1.2svn36914-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485852" version="1" comment="texlive-stix-fonts is &lt;2017.133.1.1.2svn36914-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485853" version="1" comment="texlive-stmaryrd is &lt;2017.133.svn22027-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485854" version="1" comment="texlive-stmaryrd-fonts is &lt;2017.133.svn22027-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485855" version="1" comment="texlive-storebox is &lt;2017.133.1.3asvn24895-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485856" version="1" comment="texlive-storecmd is &lt;2017.133.0.0.0.2svn24431-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485857" version="1" comment="texlive-stringstrings is &lt;2017.133.1.23svn36203-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485858" version="1" comment="texlive-struktex is &lt;2017.133.141svn25916-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485859" version="1" comment="texlive-sttools is &lt;2017.133.2.0svn43684-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485860" version="1" comment="texlive-stubs is &lt;2017.133.0.0.1.1svn19440-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485861" version="1" comment="texlive-studenthandouts is &lt;2017.133.1.0svn43516-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485862" version="1" comment="texlive-sty2dtx is &lt;2017.133.2.3svn29743-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485864" version="1" comment="texlive-suanpan is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485865" version="1" comment="texlive-subdepth is &lt;2017.133.0.0.1svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485866" version="1" comment="texlive-subeqn is &lt;2017.133.2.0bsvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485867" version="1" comment="texlive-subeqnarray is &lt;2017.133.2.1csvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485868" version="1" comment="texlive-subfig is &lt;2017.133.1.3svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485869" version="1" comment="texlive-subfigmat is &lt;2017.133.1.0svn20308-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485870" version="1" comment="texlive-subfigure is &lt;2017.133.2.1.5svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485871" version="1" comment="texlive-subfiles is &lt;2017.133.1.1svn26645-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485872" version="1" comment="texlive-subfloat is &lt;2017.133.2.14svn29349-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485873" version="1" comment="texlive-substances is &lt;2017.133.0.0.2asvn40989-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485874" version="1" comment="texlive-substitutefont is &lt;2017.133.0.0.1.4svn32066-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485875" version="1" comment="texlive-substr is &lt;2017.133.1.2svn16117-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485876" version="1" comment="texlive-subsupscripts is &lt;2017.133.1.0svn16080-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485877" version="1" comment="texlive-sudoku is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485878" version="1" comment="texlive-sudokubundle is &lt;2017.133.1.0asvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485879" version="1" comment="texlive-suftesi is &lt;2017.133.2.9svn40238-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485880" version="1" comment="texlive-sugconf is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485881" version="1" comment="texlive-superiors is &lt;2017.133.1.05svn36422-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485882" version="1" comment="texlive-superiors-fonts is &lt;2017.133.1.05svn36422-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485883" version="1" comment="texlive-supertabular is &lt;2017.133.4.1asvn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485884" version="1" comment="texlive-susy is &lt;2017.133.svn19440-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485885" version="1" comment="texlive-svg is &lt;2017.133.2.00bsvn44503-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485886" version="1" comment="texlive-svg-inkscape is &lt;2017.133.svn32199-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485887" version="1" comment="texlive-svgcolor is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485888" version="1" comment="texlive-svn is &lt;2017.133.43svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485889" version="1" comment="texlive-svn-multi is &lt;2017.133.2.4dsvn26313-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485891" version="1" comment="texlive-svn-prov is &lt;2017.133.3.1862svn18017-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485892" version="1" comment="texlive-svninfo is &lt;2017.133.0.0.7.4svn17554-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485893" version="1" comment="texlive-svrsymbols is &lt;2017.133.2.0asvn40371-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485894" version="1" comment="texlive-svrsymbols-fonts is &lt;2017.133.2.0asvn40371-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485895" version="1" comment="texlive-swebib is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485896" version="1" comment="texlive-swimgraf is &lt;2017.133.svn25446-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485897" version="1" comment="texlive-syllogism is &lt;2017.133.1.2svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485898" version="1" comment="texlive-symbol is &lt;2017.133.svn31835-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485899" version="1" comment="texlive-symbol-fonts is &lt;2017.133.svn31835-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485900" version="1" comment="texlive-sympytexpackage is &lt;2017.133.svn41190-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485901" version="1" comment="texlive-synctex is &lt;2017.133.svn44166-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485904" version="1" comment="texlive-synproof is &lt;2017.133.1.0svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485905" version="1" comment="texlive-syntax is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485906" version="1" comment="texlive-syntrace is &lt;2017.133.1.1svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485907" version="1" comment="texlive-synttree is &lt;2017.133.1.4.2svn16252-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485908" version="1" comment="texlive-systeme is &lt;2017.133.0.0.3svn32473-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485909" version="1" comment="texlive-t-angles is &lt;2017.133.svn15878-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485910" version="1" comment="texlive-t2 is &lt;2017.133.svn39024-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485911" version="1" comment="texlive-tabfigures is &lt;2017.133.1.1svn25202-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485912" version="1" comment="texlive-table-fct is &lt;2017.133.1.1svn41849-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485913" version="1" comment="texlive-tableaux is &lt;2017.133.svn42413-4.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485914" version="1" comment="texlive-tablefootnote is &lt;2017.134.1.1csvn32804-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485915" version="1" comment="texlive-tableof is &lt;2017.134.1.4asvn36489-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485916" version="1" comment="texlive-tablestyles is &lt;2017.134.svn34495-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485917" version="1" comment="texlive-tablists is &lt;2017.134.0.0.0esvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485918" version="1" comment="texlive-tablor is &lt;2017.134.4.07_gsvn31855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485919" version="1" comment="texlive-tabls is &lt;2017.134.3.5svn17255-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485920" version="1" comment="texlive-tabriz-thesis is &lt;2017.134.1.1svn29421-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485921" version="1" comment="texlive-tabstackengine is &lt;2017.134.2.01svn42610-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485922" version="1" comment="texlive-tabto-generic is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485923" version="1" comment="texlive-tabto-ltx is &lt;2017.134.1.3svn30710-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485924" version="1" comment="texlive-tabu is &lt;2017.134.2.8svn21534-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485925" version="1" comment="texlive-tabularborder is &lt;2017.134.1.0asvn17885-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485926" version="1" comment="texlive-tabularcalc is &lt;2017.134.0.0.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485927" version="1" comment="texlive-tabularew is &lt;2017.134.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485928" version="1" comment="texlive-tabulars-e is &lt;2017.134.1.0svn21191-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485929" version="1" comment="texlive-tabulary is &lt;2017.134.0.0.10svn34368-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485930" version="1" comment="texlive-tabvar is &lt;2017.134.1.7svn28908-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485931" version="1" comment="texlive-tabvar-fonts is &lt;2017.134.1.7svn28908-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485932" version="1" comment="texlive-tagging is &lt;2017.134.svn23761-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485933" version="1" comment="texlive-tagpair is &lt;2017.134.1.1svn42138-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485934" version="1" comment="texlive-talk is &lt;2017.134.1.1svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485935" version="1" comment="texlive-tamefloats is &lt;2017.134.0.0.42svn27345-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485936" version="1" comment="texlive-tamethebeast is &lt;2017.134.1.4svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485937" version="1" comment="texlive-tap is &lt;2017.134.0.0.77svn31731-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485938" version="1" comment="texlive-tapir is &lt;2017.134.0.0.2svn20484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485939" version="1" comment="texlive-tapir-fonts is &lt;2017.134.0.0.2svn20484-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485940" version="1" comment="texlive-tasks is &lt;2017.134.0.0.12svn41851-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485941" version="1" comment="texlive-tcldoc is &lt;2017.134.2.40svn22018-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485942" version="1" comment="texlive-tcolorbox is &lt;2017.134.4.03svn44046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485943" version="1" comment="texlive-tdclock is &lt;2017.134.2.5svn33043-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485944" version="1" comment="texlive-tds is &lt;2017.134.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485945" version="1" comment="texlive-tdsfrmath is &lt;2017.134.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485946" version="1" comment="texlive-technics is &lt;2017.134.1.0svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485947" version="1" comment="texlive-ted is &lt;2017.134.1.06svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485948" version="1" comment="texlive-templates-fenn is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485949" version="1" comment="texlive-templates-sommer is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485950" version="1" comment="texlive-templatetools is &lt;2017.134.svn34495-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485951" version="1" comment="texlive-tempora is &lt;2017.134.1.05svn39596-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485952" version="1" comment="texlive-tempora-fonts is &lt;2017.134.1.05svn39596-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485953" version="1" comment="texlive-tengwarscript is &lt;2017.134.1.3.1svn34594-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485954" version="1" comment="texlive-tensor is &lt;2017.134.2.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485955" version="1" comment="texlive-termcal is &lt;2017.134.1.8svn22514-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485956" version="1" comment="texlive-termlist is &lt;2017.134.1.1svn18923-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485957" version="1" comment="texlive-termmenu is &lt;2017.134.svn37700-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485958" version="1" comment="texlive-testhyphens is &lt;2017.134.0.0.7svn38928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485959" version="1" comment="texlive-testidx is &lt;2017.134.1.0svn42294-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485960" version="1" comment="texlive-tetex is &lt;2017.134.3.0svn44331-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485962" version="1" comment="texlive-teubner is &lt;2017.134.4.8svn40197-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485963" version="1" comment="texlive-tex is &lt;2017.134.3.14159265svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485965" version="1" comment="texlive-tex-ewd is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485966" version="1" comment="texlive-tex-font-errors-cheatsheet is &lt;2017.134.0.0.1svn18314-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485967" version="1" comment="texlive-tex-gyre is &lt;2017.134.2.004svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485968" version="1" comment="texlive-tex-gyre-fonts is &lt;2017.134.2.004svn18651-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485969" version="1" comment="texlive-tex-gyre-math is &lt;2017.134.svn41264-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485970" version="1" comment="texlive-tex-gyre-math-fonts is &lt;2017.134.svn41264-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485971" version="1" comment="texlive-tex-ini-files is &lt;2017.134.svn40533-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485972" version="1" comment="texlive-tex-label is &lt;2017.134.svn16372-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485973" version="1" comment="texlive-tex-overview is &lt;2017.134.0.0.2svn41403-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485974" version="1" comment="texlive-tex-ps is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485975" version="1" comment="texlive-tex-refs is &lt;2017.134.0.0.4.8svn44131-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485976" version="1" comment="texlive-tex-virtual-academy-pl is &lt;2017.134.svn34177-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485977" version="1" comment="texlive-tex4ebook is &lt;2017.134.0.0.1esvn44103-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485979" version="1" comment="texlive-tex4ht is &lt;2017.134.svn44379-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485981" version="1" comment="texlive-texapi is &lt;2017.134.1.04svn24237-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485982" version="1" comment="texlive-texbytopic is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485983" version="1" comment="texlive-texconfig is &lt;2017.134.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485985" version="1" comment="texlive-texcount is &lt;2017.134.3.0svn31323-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485987" version="1" comment="texlive-texdef is &lt;2017.134.1.7bsvn26420-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485989" version="1" comment="texlive-texdiff is &lt;2017.134.0.0.4svn29752-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485991" version="1" comment="texlive-texdirflatten is &lt;2017.134.1.1svn29725-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485993" version="1" comment="texlive-texdoc is &lt;2017.134.svn44432-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485995" version="1" comment="texlive-texdraw is &lt;2017.134.svn31894-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485996" version="1" comment="texlive-texfot is &lt;2017.134.1.32svn39660-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485998" version="1" comment="texlive-texilikechaps is &lt;2017.134.1.0asvn28553-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009485999" version="1" comment="texlive-texilikecover is &lt;2017.134.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486000" version="1" comment="texlive-texinfo is &lt;2017.134.5.1svn43137-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486001" version="1" comment="texlive-texlive-common is &lt;2017.134.svn44191-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486002" version="1" comment="texlive-texlive-cz is &lt;2017.134.svn44347-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486003" version="1" comment="texlive-texlive-de is &lt;2017.134.svn44366-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486004" version="1" comment="texlive-texlive-en is &lt;2017.134.svn44424-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486005" version="1" comment="texlive-texlive-es is &lt;2017.134.svn44356-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486006" version="1" comment="texlive-texlive-fr is &lt;2017.134.svn44342-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486007" version="1" comment="texlive-texlive-it is &lt;2017.134.svn44357-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486008" version="1" comment="texlive-texlive-pl is &lt;2017.134.svn44343-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486009" version="1" comment="texlive-texlive-ru is &lt;2017.134.svn44444-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486010" version="1" comment="texlive-texlive-sr is &lt;2017.134.svn44341-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486011" version="1" comment="texlive-texlive-zh-cn is &lt;2017.134.svn44333-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486012" version="1" comment="texlive-texlive.infra is &lt;2017.134.svn44462-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486013" version="1" comment="texlive-texliveonfly is &lt;2017.134.svn26313-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486015" version="1" comment="texlive-texloganalyser is &lt;2017.134.0.0.9svn35584-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486017" version="1" comment="texlive-texlogos is &lt;2017.134.1.3.1svn19083-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486020" version="1" comment="texlive-texmate is &lt;2017.134.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486021" version="1" comment="texlive-texments is &lt;2017.134.0.0.2.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486022" version="1" comment="texlive-texosquery is &lt;2017.134.1.5svn44509-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486024" version="1" comment="texlive-texpower is &lt;2017.134.0.0.2svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486025" version="1" comment="texlive-texproposal is &lt;2017.134.1.4svn43151-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486026" version="1" comment="texlive-texshade is &lt;2017.134.1.24svn24716-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486027" version="1" comment="texlive-texsis is &lt;2017.134.2.18svn39057-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486029" version="1" comment="texlive-textcase is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486030" version="1" comment="texlive-textfit is &lt;2017.134.5svn20591-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486031" version="1" comment="texlive-textglos is &lt;2017.134.1.0svn30788-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486032" version="1" comment="texlive-textgreek is &lt;2017.134.0.0.7svn44192-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486033" version="1" comment="texlive-textmerg is &lt;2017.134.2.01svn20677-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486034" version="1" comment="texlive-textopo is &lt;2017.134.1.5svn23796-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486035" version="1" comment="texlive-textpath is &lt;2017.134.1.6svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486036" version="1" comment="texlive-textpos is &lt;2017.134.1.8svn41331-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486037" version="1" comment="texlive-texvc is &lt;2017.134.1.0svn38809-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486038" version="1" comment="texlive-texware is &lt;2017.134.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486040" version="1" comment="texlive-tfrupee is &lt;2017.134.1.02svn20770-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486041" version="1" comment="texlive-tfrupee-fonts is &lt;2017.134.1.02svn20770-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486042" version="1" comment="texlive-thaienum is &lt;2017.134.0.0.2svn44140-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486043" version="1" comment="texlive-thalie is &lt;2017.134.0.0.9bsvn44048-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486044" version="1" comment="texlive-theoremref is &lt;2017.134.svn30640-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486045" version="1" comment="texlive-thesis-ekf is &lt;2017.134.2.1svn43745-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486046" version="1" comment="texlive-thesis-titlepage-fhac is &lt;2017.134.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486047" version="1" comment="texlive-thinsp is &lt;2017.134.0.0.2svn39669-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486048" version="1" comment="texlive-thmbox is &lt;2017.134.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486049" version="1" comment="texlive-thmtools is &lt;2017.134.66svn33624-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486050" version="1" comment="texlive-threadcol is &lt;2017.134.1.0svn28754-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486051" version="1" comment="texlive-threeddice is &lt;2017.134.1.0svn20675-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486052" version="1" comment="texlive-threeparttable is &lt;2017.134.svn17383-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486053" version="1" comment="texlive-threeparttablex is &lt;2017.134.0.0.3svn34206-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486054" version="1" comment="texlive-thumb is &lt;2017.134.1.0svn16549-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486055" version="1" comment="texlive-thumbpdf is &lt;2017.134.3.16svn34621-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486057" version="1" comment="texlive-thumbs is &lt;2017.134.1.0qsvn33134-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486058" version="1" comment="texlive-thumby is &lt;2017.134.0.0.1svn16736-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486059" version="1" comment="texlive-thuthesis is &lt;2017.134.5.3.2svn43609-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486060" version="1" comment="texlive-ticket is &lt;2017.134.0.0.4dsvn42280-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486061" version="1" comment="texlive-ticollege is &lt;2017.134.1.0svn36306-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486062" version="1" comment="texlive-tie is &lt;2017.134.2.4svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486064" version="1" comment="texlive-tikz-3dplot is &lt;2017.133.svn25087-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486065" version="1" comment="texlive-tikz-bayesnet is &lt;2017.133.0.0.1svn38295-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486066" version="1" comment="texlive-tikz-cd is &lt;2017.133.0.0.9esvn35485-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486067" version="1" comment="texlive-tikz-dependency is &lt;2017.133.1.2svn42454-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486068" version="1" comment="texlive-tikz-dimline is &lt;2017.133.1.0svn35805-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486069" version="1" comment="texlive-tikz-feynman is &lt;2017.133.1.1.0svn39582-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009045999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486070" version="1" comment="texlive-tikz-inet is &lt;2017.133.0.0.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486071" version="1" comment="texlive-tikz-kalender is &lt;2017.133.0.0.4asvn44393-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486072" version="1" comment="texlive-tikz-opm is &lt;2017.133.0.0.1.1svn32769-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486073" version="1" comment="texlive-tikz-optics is &lt;2017.133.0.0.2.3svn43466-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486074" version="1" comment="texlive-tikz-page is &lt;2017.133.1.0svn42039-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486075" version="1" comment="texlive-tikz-palattice is &lt;2017.133.2.3svn43442-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486076" version="1" comment="texlive-tikz-qtree is &lt;2017.133.1.2svn26108-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486077" version="1" comment="texlive-tikz-timing is &lt;2017.133.0.0.7dsvn21013-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486078" version="1" comment="texlive-tikzinclude is &lt;2017.133.1.0svn28715-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486079" version="1" comment="texlive-tikzmark is &lt;2017.133.1.3svn44475-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486080" version="1" comment="texlive-tikzorbital is &lt;2017.133.svn36439-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486081" version="1" comment="texlive-tikzpagenodes is &lt;2017.133.1.1svn27723-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486082" version="1" comment="texlive-tikzpeople is &lt;2017.133.0.0.4svn43978-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486083" version="1" comment="texlive-tikzpfeile is &lt;2017.133.1.0svn25777-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486084" version="1" comment="texlive-tikzposter is &lt;2017.133.2.0svn32732-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486085" version="1" comment="texlive-tikzscale is &lt;2017.133.0.0.2.6svn30637-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486086" version="1" comment="texlive-tikzsymbols is &lt;2017.133.4.02svn44350-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486087" version="1" comment="texlive-times is &lt;2017.133.svn35058-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486088" version="1" comment="texlive-times-fonts is &lt;2017.133.svn35058-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486089" version="1" comment="texlive-timetable is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486090" version="1" comment="texlive-timing-diagrams is &lt;2017.133.svn31491-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486091" version="1" comment="texlive-tinos is &lt;2017.133.svn42882-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486092" version="1" comment="texlive-tinos-fonts is &lt;2017.133.svn42882-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486093" version="1" comment="texlive-tipa is &lt;2017.133.1.3svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486094" version="1" comment="texlive-tipa-de is &lt;2017.133.1.3svn22005-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486095" version="1" comment="texlive-tipa-fonts is &lt;2017.133.1.3svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486096" version="1" comment="texlive-tipfr is &lt;2017.133.1.5svn38646-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486097" version="1" comment="texlive-titlecaps is &lt;2017.133.1.2svn36170-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486098" version="1" comment="texlive-titlefoot is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486099" version="1" comment="texlive-titlepages is &lt;2017.133.svn19457-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486100" version="1" comment="texlive-titlepic is &lt;2017.133.1.2svn43497-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486101" version="1" comment="texlive-titleref is &lt;2017.133.3.1svn18729-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486102" version="1" comment="texlive-titlesec is &lt;2017.133.2.10.2svn40129-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486103" version="1" comment="texlive-titling is &lt;2017.133.2.1dsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486104" version="1" comment="texlive-tkz-base is &lt;2017.133.1.16svn22961-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486105" version="1" comment="texlive-tkz-berge is &lt;2017.133.1.00csvn22891-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486106" version="1" comment="texlive-tkz-doc is &lt;2017.133.1.1csvn22959-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486107" version="1" comment="texlive-tkz-euclide is &lt;2017.133.1.16csvn22830-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486108" version="1" comment="texlive-tkz-fct is &lt;2017.133.1.16csvn22831-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486109" version="1" comment="texlive-tkz-graph is &lt;2017.133.1.00svn22832-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486110" version="1" comment="texlive-tkz-kiviat is &lt;2017.133.0.0.1svn22857-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486111" version="1" comment="texlive-tkz-linknodes is &lt;2017.133.1.0csvn22833-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486112" version="1" comment="texlive-tkz-orm is &lt;2017.133.0.0.1.4svn39408-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486113" version="1" comment="texlive-tkz-tab is &lt;2017.133.1.3csvn22834-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486114" version="1" comment="texlive-tlc2 is &lt;2017.133.svn26096-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486115" version="1" comment="texlive-tocbibind is &lt;2017.133.1.5ksvn20085-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486116" version="1" comment="texlive-tocdata is &lt;2017.133.0.0.12svn42623-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486117" version="1" comment="texlive-tocloft is &lt;2017.133.2.3fsvn30209-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486118" version="1" comment="texlive-tocvsec2 is &lt;2017.133.1.3asvn33146-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486119" version="1" comment="texlive-todo is &lt;2017.133.2.142svn17746-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486120" version="1" comment="texlive-todonotes is &lt;2017.133.1.0.5svn42423-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486121" version="1" comment="texlive-tokenizer is &lt;2017.133.1.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486122" version="1" comment="texlive-toolbox is &lt;2017.133.5.1svn32260-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486123" version="1" comment="texlive-tools is &lt;2017.133.svn43813-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486124" version="1" comment="texlive-topfloat is &lt;2017.133.svn19084-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486125" version="1" comment="texlive-toptesi is &lt;2017.133.5.9.06svn42586-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486126" version="1" comment="texlive-totcount is &lt;2017.133.1.2svn21178-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486127" version="1" comment="texlive-totpages is &lt;2017.133.2.00svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486128" version="1" comment="texlive-tpic2pdftex is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486130" version="1" comment="texlive-tpslifonts is &lt;2017.133.0.0.6svn42428-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486131" version="1" comment="texlive-tqft is &lt;2017.133.2.1svn44455-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486132" version="1" comment="texlive-tracklang is &lt;2017.133.1.3.4svn43605-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486133" version="1" comment="texlive-trajan is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486134" version="1" comment="texlive-trajan-fonts is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486135" version="1" comment="texlive-tram is &lt;2017.133.0.0.2svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486136" version="1" comment="texlive-translation-array-fr is &lt;2017.133.svn24344-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486137" version="1" comment="texlive-translation-arsclassica-de is &lt;2017.133.svn23803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486138" version="1" comment="texlive-translation-biblatex-de is &lt;2017.133.2.0svn42198-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486139" version="1" comment="texlive-translation-chemsym-de is &lt;2017.133.svn23804-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486140" version="1" comment="texlive-translation-dcolumn-fr is &lt;2017.133.svn24345-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486141" version="1" comment="texlive-translation-ecv-de is &lt;2017.133.svn24754-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486142" version="1" comment="texlive-translation-enumitem-de is &lt;2017.133.svn24196-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486143" version="1" comment="texlive-translation-europecv-de is &lt;2017.133.svn23840-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486144" version="1" comment="texlive-translation-filecontents-de is &lt;2017.133.svn24010-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486145" version="1" comment="texlive-translation-moreverb-de is &lt;2017.133.svn23957-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486146" version="1" comment="texlive-translation-natbib-fr is &lt;2017.133.svn25105-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486147" version="1" comment="texlive-translation-tabbing-fr is &lt;2017.133.svn24228-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486148" version="1" comment="texlive-translations is &lt;2017.133.1.6svn44381-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486149" version="1" comment="texlive-tree-dvips is &lt;2017.133.0.0.91svn21751-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486150" version="1" comment="texlive-treetex is &lt;2017.133.svn28176-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486151" version="1" comment="texlive-trfsigns is &lt;2017.133.1.01svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486152" version="1" comment="texlive-trigonometry is &lt;2017.133.svn43006-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486153" version="1" comment="texlive-trimspaces is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486154" version="1" comment="texlive-trivfloat is &lt;2017.133.1.3bsvn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486155" version="1" comment="texlive-trsym is &lt;2017.133.1.0svn18732-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486156" version="1" comment="texlive-truncate is &lt;2017.133.3.6svn18921-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486157" version="1" comment="texlive-tsemlines is &lt;2017.133.1.0svn23440-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486158" version="1" comment="texlive-ttfutils is &lt;2017.133.svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486160" version="1" comment="texlive-tucv is &lt;2017.133.1.0svn20680-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486161" version="1" comment="texlive-tudscr is &lt;2017.133.2.05msvn44480-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486162" version="1" comment="texlive-tufte-latex is &lt;2017.133.3.5.2svn37649-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486163" version="1" comment="texlive-tugboat is &lt;2017.133.2.18svn42465-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486164" version="1" comment="texlive-tugboat-plain is &lt;2017.133.1.23svn43560-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486165" version="1" comment="texlive-tui is &lt;2017.133.1.9svn27253-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486166" version="1" comment="texlive-turabian is &lt;2017.133.0.0.1.0svn36298-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486167" version="1" comment="texlive-turabian-formatting is &lt;2017.133.svn43537-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486168" version="1" comment="texlive-turkmen is &lt;2017.133.0.0.2svn17748-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486169" version="1" comment="texlive-turnstile is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486170" version="1" comment="texlive-turnthepage is &lt;2017.133.1.3asvn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486171" version="1" comment="texlive-twoinone is &lt;2017.133.svn17024-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486172" version="1" comment="texlive-twoup is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486173" version="1" comment="texlive-txfonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486174" version="1" comment="texlive-txfonts-fonts is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486175" version="1" comment="texlive-txfontsb is &lt;2017.133.1.1svn21578-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486176" version="1" comment="texlive-txfontsb-fonts is &lt;2017.133.1.1svn21578-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486177" version="1" comment="texlive-txgreeks is &lt;2017.133.1.0svn21839-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486178" version="1" comment="texlive-txuprcal is &lt;2017.133.1.00svn43327-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486179" version="1" comment="texlive-txuprcal-fonts is &lt;2017.133.1.00svn43327-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486180" version="1" comment="texlive-type1cm is &lt;2017.133.svn21820-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486181" version="1" comment="texlive-typed-checklist is &lt;2017.133.1.4svn40389-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486182" version="1" comment="texlive-typeface is &lt;2017.133.0.0.1svn27046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486183" version="1" comment="texlive-typehtml is &lt;2017.133.svn17134-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486184" version="1" comment="texlive-typeoutfileinfo is &lt;2017.133.0.0.31svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486186" version="1" comment="texlive-typicons is &lt;2017.133.2.0.7svn37623-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486187" version="1" comment="texlive-typicons-fonts is &lt;2017.133.2.0.7svn37623-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486188" version="1" comment="texlive-typoaid is &lt;2017.133.0.0.4.7svn44238-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486189" version="1" comment="texlive-typogrid is &lt;2017.133.0.0.21svn24994-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486190" version="1" comment="texlive-uaclasses is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486191" version="1" comment="texlive-uafthesis is &lt;2017.133.12.12svn29349-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486192" version="1" comment="texlive-uantwerpendocs is &lt;2017.133.1.8svn42912-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486193" version="1" comment="texlive-uassign is &lt;2017.133.1.01svn38459-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486194" version="1" comment="texlive-ucbthesis is &lt;2017.133.3.5svn37776-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486195" version="1" comment="texlive-ucdavisthesis is &lt;2017.133.1.3svn40772-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486196" version="1" comment="texlive-ucharcat is &lt;2017.133.0.0.03svn38907-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486197" version="1" comment="texlive-ucharclasses is &lt;2017.133.2.2.1svn40854-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486198" version="1" comment="texlive-ucs is &lt;2017.133.2.2svn35853-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487027" version="1" comment="texlive-ucthesis is &lt;2017.136.3.2svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487028" version="1" comment="texlive-udesoftec is &lt;2017.136.1.6.0svn44308-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487029" version="1" comment="texlive-uebungsblatt is &lt;2017.136.1.5.0svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487030" version="1" comment="texlive-uestcthesis is &lt;2017.136.1.1.0svn36371-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487031" version="1" comment="texlive-uhc is &lt;2017.136.svn16791-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487032" version="1" comment="texlive-uhc-fonts is &lt;2017.136.svn16791-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487033" version="1" comment="texlive-uhhassignment is &lt;2017.136.1.0svn44026-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487034" version="1" comment="texlive-uhrzeit is &lt;2017.136.0.0.2csvn39570-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487035" version="1" comment="texlive-uiucredborder is &lt;2017.136.1.00svn29974-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487036" version="1" comment="texlive-uiucthesis is &lt;2017.136.2.25svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487037" version="1" comment="texlive-ukrhyph is &lt;2017.136.svn21081-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487038" version="1" comment="texlive-ulem is &lt;2017.136.svn26785-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487039" version="1" comment="texlive-ulqda is &lt;2017.136.1.1svn26313-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487040" version="1" comment="texlive-ulthese is &lt;2017.136.4.4svn44456-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487041" version="1" comment="texlive-umbclegislation is &lt;2017.136.2016_6_8svn41348-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487042" version="1" comment="texlive-umich-thesis is &lt;2017.136.1.20svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487043" version="1" comment="texlive-uml is &lt;2017.136.0.0.11svn17476-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487044" version="1" comment="texlive-umlaute is &lt;2017.136.2.1svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487045" version="1" comment="texlive-umoline is &lt;2017.136.svn19085-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487046" version="1" comment="texlive-umthesis is &lt;2017.136.0.0.2svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487047" version="1" comment="texlive-umtypewriter is &lt;2017.136.001.002svn18651-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487048" version="1" comment="texlive-umtypewriter-fonts is &lt;2017.136.001.002svn18651-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487049" version="1" comment="texlive-unamth-template is &lt;2017.136.2.0svn33625-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487050" version="1" comment="texlive-unamthesis is &lt;2017.136.2.1svn43639-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487051" version="1" comment="texlive-undergradmath is &lt;2017.136.svn42926-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487052" version="1" comment="texlive-underlin is &lt;2017.136.1.01svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487053" version="1" comment="texlive-underoverlap is &lt;2017.136.0.0.0.1_r1svn29019-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487054" version="1" comment="texlive-underscore is &lt;2017.136.svn18261-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487055" version="1" comment="texlive-undolabl is &lt;2017.136.1.0lsvn36681-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487056" version="1" comment="texlive-unfonts-core is &lt;2017.136.svn44467-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487057" version="1" comment="texlive-unfonts-core-fonts is &lt;2017.136.svn44467-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487058" version="1" comment="texlive-unfonts-extra is &lt;2017.136.svn44465-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487059" version="1" comment="texlive-unfonts-extra-fonts is &lt;2017.136.svn44465-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487060" version="1" comment="texlive-uni-wtal-ger is &lt;2017.136.0.0.2svn31541-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487061" version="1" comment="texlive-uni-wtal-lin is &lt;2017.136.0.0.2svn31409-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487062" version="1" comment="texlive-unicode-bidi is &lt;2017.136.0.0.01svn42482-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487063" version="1" comment="texlive-unicode-data is &lt;2017.136.1.5svn41521-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487064" version="1" comment="texlive-unicode-math is &lt;2017.136.0.0.8dsvn43068-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487065" version="1" comment="texlive-unisugar is &lt;2017.136.0.0.92svn22357-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487066" version="1" comment="texlive-units is &lt;2017.136.0.0.9bsvn42428-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487067" version="1" comment="texlive-unitsdef is &lt;2017.136.0.0.2svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487068" version="1" comment="texlive-universa is &lt;2017.136.2.0svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487069" version="1" comment="texlive-universalis is &lt;2017.136.svn33860-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487070" version="1" comment="texlive-universalis-fonts is &lt;2017.136.svn33860-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487071" version="1" comment="texlive-unravel is &lt;2017.136.0.0.2svn38506-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487072" version="1" comment="texlive-unswcover is &lt;2017.136.1.0svn29476-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487073" version="1" comment="texlive-uothesis is &lt;2017.136.2.5.6svn25355-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487074" version="1" comment="texlive-uowthesis is &lt;2017.136.1.0asvn19700-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487075" version="1" comment="texlive-uowthesistitlepage is &lt;2017.136.2.0svn32626-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487076" version="1" comment="texlive-upca is &lt;2017.136.svn22511-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487077" version="1" comment="texlive-updmap-map is &lt;2017.136.svn43366-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487078" version="1" comment="texlive-uplatex is &lt;2017.136.svn44210-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487079" version="1" comment="texlive-upmethodology is &lt;2017.136.svn43453-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487080" version="1" comment="texlive-uppunctlm is &lt;2017.136.0.0.1svn42334-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487081" version="1" comment="texlive-upquote is &lt;2017.136.1.3svn26059-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487082" version="1" comment="texlive-uptex is &lt;2017.136.1.20svn42950-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487083" version="1" comment="texlive-uptex-base is &lt;2017.136.svn43900-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487084" version="1" comment="texlive-uptex-fonts is &lt;2017.136.svn42853-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487085" version="1" comment="texlive-urcls is &lt;2017.136.2.0svn43734-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487086" version="1" comment="texlive-uri is &lt;2017.136.1.0asvn21608-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487087" version="1" comment="texlive-url is &lt;2017.136.3.4svn32528-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487088" version="1" comment="texlive-urlbst is &lt;2017.136.0.0.7svn29803-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487089" version="1" comment="texlive-urwchancal is &lt;2017.136.1svn21701-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487090" version="1" comment="texlive-usebib is &lt;2017.136.1.0asvn25969-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487091" version="1" comment="texlive-ushort is &lt;2017.136.2.2svn32261-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487092" version="1" comment="texlive-uspace is &lt;2017.136.0.0.04svn42456-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487093" version="1" comment="texlive-uspatent is &lt;2017.136.1.0svn27744-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487094" version="1" comment="texlive-ut-thesis is &lt;2017.136.2.1svn38269-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487095" version="1" comment="texlive-utf8mex is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487096" version="1" comment="texlive-utopia is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487097" version="1" comment="texlive-utopia-fonts is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487098" version="1" comment="texlive-uwmslide is &lt;2017.136.svn27354-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487099" version="1" comment="texlive-uwthesis is &lt;2017.136.6.13svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487100" version="1" comment="texlive-vak is &lt;2017.136.svn23431-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487101" version="1" comment="texlive-vancouver is &lt;2017.136.svn34470-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487102" version="1" comment="texlive-variablelm is &lt;2017.136.1.1.1svn43686-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487103" version="1" comment="texlive-variations is &lt;2017.136.0.0.3svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487104" version="1" comment="texlive-varindex is &lt;2017.136.2.3svn32262-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487105" version="1" comment="texlive-varisize is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487106" version="1" comment="texlive-varsfromjobname is &lt;2017.136.1.0svn44154-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487107" version="1" comment="texlive-varwidth is &lt;2017.136.0.0.92svn24104-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487108" version="1" comment="texlive-vaucanson-g is &lt;2017.136.0.0.4svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487109" version="1" comment="texlive-vdmlisting is &lt;2017.136.1.0svn29944-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487110" version="1" comment="texlive-velthuis is &lt;2017.136.2.17svn44166-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487111" version="1" comment="texlive-velthuis-fonts is &lt;2017.136.2.17svn44166-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487112" version="1" comment="texlive-venn is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487113" version="1" comment="texlive-venndiagram is &lt;2017.136.1.1svn40058-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487114" version="1" comment="texlive-venturisadf is &lt;2017.136.1.005svn19444-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487115" version="1" comment="texlive-venturisadf-fonts is &lt;2017.136.1.005svn19444-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487116" version="1" comment="texlive-verbasef is &lt;2017.136.1.1svn21922-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487117" version="1" comment="texlive-verbatimbox is &lt;2017.136.3.13svn33197-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487118" version="1" comment="texlive-verbatimcopy is &lt;2017.136.0.0.06svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487119" version="1" comment="texlive-verbdef is &lt;2017.136.0.0.2svn17177-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487120" version="1" comment="texlive-verbments is &lt;2017.136.1.2svn23670-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487121" version="1" comment="texlive-verse is &lt;2017.136.2.4bsvn34017-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487122" version="1" comment="texlive-version is &lt;2017.136.2.0svn21920-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487123" version="1" comment="texlive-versions is &lt;2017.136.0.0.55svn21921-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487124" version="1" comment="texlive-versonotes is &lt;2017.136.0.0.3svn39084-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487125" version="1" comment="texlive-vertbars is &lt;2017.136.1.0bsvn20589-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487126" version="1" comment="texlive-vgrid is &lt;2017.136.0.0.1svn32457-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487127" version="1" comment="texlive-vhistory is &lt;2017.136.1.6.1svn30080-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487128" version="1" comment="texlive-visualfaq is &lt;2017.136.svn38647-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487129" version="1" comment="texlive-visualpstricks is &lt;2017.136.2.3svn39799-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487130" version="1" comment="texlive-visualtikz is &lt;2017.136.0.0.64svn43239-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487131" version="1" comment="texlive-vlna is &lt;2017.136.svn44166-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487132" version="1" comment="texlive-vmargin is &lt;2017.136.2.5svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487133" version="1" comment="texlive-vntex is &lt;2017.136.3.2svn30579-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487134" version="1" comment="texlive-vntex-fonts is &lt;2017.136.3.2svn30579-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487135" version="1" comment="texlive-vocaltract is &lt;2017.136.1svn25629-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487136" version="1" comment="texlive-volumes is &lt;2017.136.1.0svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487137" version="1" comment="texlive-voss-mathcol is &lt;2017.136.0.0.1svn32954-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487138" version="1" comment="texlive-vpe is &lt;2017.136.0.0.2svn26039-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487139" version="1" comment="texlive-vruler is &lt;2017.136.2.3svn21598-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487140" version="1" comment="texlive-vwcol is &lt;2017.136.0.0.2svn36254-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487141" version="1" comment="texlive-wadalab is &lt;2017.136.svn42428-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487142" version="1" comment="texlive-wadalab-fonts is &lt;2017.136.svn42428-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487143" version="1" comment="texlive-wallpaper is &lt;2017.136.1.10svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487144" version="1" comment="texlive-warning is &lt;2017.136.0.0.01svn22028-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487145" version="1" comment="texlive-warpcol is &lt;2017.136.1.0csvn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487146" version="1" comment="texlive-was is &lt;2017.136.svn21439-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487147" version="1" comment="texlive-wasy is &lt;2017.136.svn35831-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487148" version="1" comment="texlive-wasy2-ps is &lt;2017.136.svn35830-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487149" version="1" comment="texlive-wasy2-ps-fonts is &lt;2017.136.svn35830-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487150" version="1" comment="texlive-wasysym is &lt;2017.136.2.0svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487151" version="1" comment="texlive-web is &lt;2017.136.4.5svn44166-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487152" version="1" comment="texlive-webguide is &lt;2017.136.svn25813-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487153" version="1" comment="texlive-widetable is &lt;2017.136.1.1svn16082-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487154" version="1" comment="texlive-williams is &lt;2017.136.svn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487155" version="1" comment="texlive-withargs is &lt;2017.136.0.0.2.0svn42756-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487156" version="1" comment="texlive-wnri is &lt;2017.136.svn22459-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487157" version="1" comment="texlive-wnri-latex is &lt;2017.136.1.0bsvn22338-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487158" version="1" comment="texlive-wordcount is &lt;2017.136.1.7svn41381-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487159" version="1" comment="texlive-wordlike is &lt;2017.136.1.2bsvn15878-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487160" version="1" comment="texlive-wrapfig is &lt;2017.136.3.6svn22048-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487161" version="1" comment="texlive-wsemclassic is &lt;2017.136.1.0.1svn31532-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486342" version="1" comment="texlive-wsuipa is &lt;2017.133.svn25469-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486343" version="1" comment="texlive-wtref is &lt;2017.133.0.0.3.2svn42981-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486344" version="1" comment="texlive-xargs is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486345" version="1" comment="texlive-xassoccnt is &lt;2017.133.1.4svn44127-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486346" version="1" comment="texlive-xcharter is &lt;2017.133.1.08svn43465-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486347" version="1" comment="texlive-xcharter-fonts is &lt;2017.133.1.08svn43465-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486348" version="1" comment="texlive-xcite is &lt;2017.133.1.0svn23783-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486349" version="1" comment="texlive-xcjk2uni is &lt;2017.133.0.0.6svn41121-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486350" version="1" comment="texlive-xcntperchap is &lt;2017.133.0.0.4svn44128-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486351" version="1" comment="texlive-xcolor is &lt;2017.133.2.12svn41044-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486352" version="1" comment="texlive-xcolor-material is &lt;2017.133.0.0.1svn42289-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486353" version="1" comment="texlive-xcolor-solarized is &lt;2017.133.0.0.4svn41809-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486354" version="1" comment="texlive-xcomment is &lt;2017.133.1.3svn20031-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486355" version="1" comment="texlive-xcookybooky is &lt;2017.133.1.5svn36435-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486356" version="1" comment="texlive-xdoc is &lt;2017.133.prot2.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486357" version="1" comment="texlive-xduthesis is &lt;2017.133.1.00svn39694-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486358" version="1" comment="texlive-xdvi is &lt;2017.133.22.87.03svn44166-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486360" version="1" comment="texlive-xebaposter is &lt;2017.133.2.51svn42046-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486361" version="1" comment="texlive-xecjk is &lt;2017.133.3.4.8svn44370-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486362" version="1" comment="texlive-xecolor is &lt;2017.133.0.0.1svn29660-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486363" version="1" comment="texlive-xecyr is &lt;2017.133.1.1svn20221-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486364" version="1" comment="texlive-xeindex is &lt;2017.133.0.0.3svn35756-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486365" version="1" comment="texlive-xellipsis is &lt;2017.133.1.2svn42764-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486366" version="1" comment="texlive-xepersian is &lt;2017.133.18.7svn44547-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486367" version="1" comment="texlive-xesearch is &lt;2017.133.svn16041-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486368" version="1" comment="texlive-xespotcolor is &lt;2017.133.2.0asvn40118-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486369" version="1" comment="texlive-xetex is &lt;2017.133.svn41438-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486371" version="1" comment="texlive-xetex-devanagari is &lt;2017.133.0.0.5svn34296-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486372" version="1" comment="texlive-xetex-itrans is &lt;2017.133.4.2svn35088-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486373" version="1" comment="texlive-xetex-pstricks is &lt;2017.133.svn17055-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486374" version="1" comment="texlive-xetex-tibetan is &lt;2017.133.0.0.1svn28847-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486375" version="1" comment="texlive-xetexconfig is &lt;2017.133.svn41133-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486376" version="1" comment="texlive-xetexfontinfo is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486377" version="1" comment="texlive-xetexko is &lt;2017.133.2.16svn43173-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486378" version="1" comment="texlive-xetexref is &lt;2017.133.svn30636-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486379" version="1" comment="texlive-xevlna is &lt;2017.133.1.1svn43864-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486380" version="1" comment="texlive-xfor is &lt;2017.133.1.05svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486381" version="1" comment="texlive-xgreek is &lt;2017.133.3.0svn43222-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486382" version="1" comment="texlive-xhfill is &lt;2017.133.1.01svn22575-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486383" version="1" comment="texlive-xifthen is &lt;2017.133.1.4.0svn38929-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486384" version="1" comment="texlive-xii is &lt;2017.133.svn31683-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486385" version="1" comment="texlive-xint is &lt;2017.133.1.2ksvn42892-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486386" version="1" comment="texlive-xits is &lt;2017.133.1.108svn32763-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486387" version="1" comment="texlive-xits-fonts is &lt;2017.133.1.108svn32763-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486388" version="1" comment="texlive-xkeyval is &lt;2017.133.2.7asvn35741-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486389" version="1" comment="texlive-xlop is &lt;2017.133.0.0.26svn42899-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486390" version="1" comment="texlive-xltxtra is &lt;2017.133.0.0.6svn39453-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486391" version="1" comment="texlive-xmltex is &lt;2017.133.0.0.8svn40855-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486393" version="1" comment="texlive-xmltexconfig is &lt;2017.133.svn35743-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486394" version="1" comment="texlive-xmpincl is &lt;2017.133.2.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486395" version="1" comment="texlive-xnewcommand is &lt;2017.133.1.2svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486396" version="1" comment="texlive-xoptarg is &lt;2017.133.1.0svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486397" version="1" comment="texlive-xpatch is &lt;2017.133.0.0.2svn27897-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486398" version="1" comment="texlive-xpeek is &lt;2017.133.0.0.2svn27442-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486399" version="1" comment="texlive-xpiano is &lt;2017.133.1.0svn37604-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486400" version="1" comment="texlive-xpicture is &lt;2017.133.1.2asvn28770-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486401" version="1" comment="texlive-xpinyin is &lt;2017.133.2.4svn41940-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486402" version="1" comment="texlive-xprintlen is &lt;2017.133.1.0svn35928-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486403" version="1" comment="texlive-xpunctuate is &lt;2017.133.1.0svn26641-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486404" version="1" comment="texlive-xq is &lt;2017.133.0.0.4svn35211-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486405" version="1" comment="texlive-xsavebox is &lt;2017.133.0.0.6svn43589-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486406" version="1" comment="texlive-xsim is &lt;2017.133.0.0.8asvn44430-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486407" version="1" comment="texlive-xskak is &lt;2017.133.1.4svn35945-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486408" version="1" comment="texlive-xstring is &lt;2017.133.1.7csvn31900-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486409" version="1" comment="texlive-xtab is &lt;2017.133.2.3fsvn23347-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486410" version="1" comment="texlive-xunicode is &lt;2017.133.0.0.981svn30466-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486411" version="1" comment="texlive-xwatermark is &lt;2017.133.1.5.2dsvn28090-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486412" version="1" comment="texlive-xyling is &lt;2017.133.1.1svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486413" version="1" comment="texlive-xymtex is &lt;2017.133.5.06svn32182-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486414" version="1" comment="texlive-xypic is &lt;2017.133.3.8.9svn31859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486415" version="1" comment="texlive-xypic-fonts is &lt;2017.133.3.8.9svn31859-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486416" version="1" comment="texlive-xypic-tut-pt is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486417" version="1" comment="texlive-xytree is &lt;2017.133.1.5svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486418" version="1" comment="texlive-yafoot is &lt;2017.133.svn19086-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486419" version="1" comment="texlive-yagusylo is &lt;2017.133.1.2svn29803-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486420" version="1" comment="texlive-yaletter is &lt;2017.133.1.1svn42830-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486421" version="1" comment="texlive-yannisgr is &lt;2017.133.svn22613-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486422" version="1" comment="texlive-yathesis is &lt;2017.133.0.0.99psvn42671-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486423" version="1" comment="texlive-yax is &lt;2017.133.1.03svn21183-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486424" version="1" comment="texlive-ycbook is &lt;2017.133.svn43171-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486425" version="1" comment="texlive-ydoc is &lt;2017.133.0.0.6alphasvn26202-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486426" version="1" comment="texlive-yfonts is &lt;2017.133.1.3svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009113184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486427" version="1" comment="texlive-yfonts-t1 is &lt;2017.133.1.0svn36013-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486428" version="1" comment="texlive-yfonts-t1-fonts is &lt;2017.133.1.0svn36013-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486429" version="1" comment="texlive-yhmath is &lt;2017.133.1.1svn31155-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486430" version="1" comment="texlive-yhmath-fonts is &lt;2017.133.1.1svn31155-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486431" version="1" comment="texlive-yinit-otf is &lt;2017.133.1.0svn40207-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486432" version="1" comment="texlive-yinit-otf-fonts is &lt;2017.133.1.0svn40207-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486433" version="1" comment="texlive-york-thesis is &lt;2017.133.3.6svn23348-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486434" version="1" comment="texlive-youngtab is &lt;2017.133.1.1svn17635-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486435" version="1" comment="texlive-yplan is &lt;2017.133.svn34398-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486437" version="1" comment="texlive-ytableau is &lt;2017.133.1.3svn27430-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486438" version="1" comment="texlive-zapfchan is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486439" version="1" comment="texlive-zapfchan-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486440" version="1" comment="texlive-zapfding is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486441" version="1" comment="texlive-zapfding-fonts is &lt;2017.133.svn31835-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486442" version="1" comment="texlive-zed-csp is &lt;2017.133.svn17258-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486443" version="1" comment="texlive-zhmetrics is &lt;2017.133.r206svn22207-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486444" version="1" comment="texlive-zhmetrics-uptex is &lt;2017.133.1.0svn40728-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486445" version="1" comment="texlive-zhnumber is &lt;2017.133.2.4svn41123-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486446" version="1" comment="texlive-zhspacing is &lt;2017.133.svn41145-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486447" version="1" comment="texlive-ziffer is &lt;2017.133.2.1svn32279-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486448" version="1" comment="texlive-zlmtt is &lt;2017.133.1.01svn34485-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486449" version="1" comment="texlive-zwgetfdate is &lt;2017.133.svn15878-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486450" version="1" comment="texlive-zwpagelayout is &lt;2017.133.1.4dsvn28846-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486451" version="1" comment="texlive-zxjafbfont is &lt;2017.133.0.0.2svn28539-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486452" version="1" comment="texlive-zxjafont is &lt;2017.133.0.0.3svn37281-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486453" version="1" comment="texlive-zxjatype is &lt;2017.133.0.0.6svn28541-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487587" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487588" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487589" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487590" version="1" comment="webkit2gtk3-devel is &lt;2.28.2-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487591" version="1" comment="vino is &lt;3.22.0-9.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487592" version="1" comment="vino-lang is &lt;3.22.0-9.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486554" version="1" comment="vorbis-tools is &lt;1.4.0-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009486555" version="1" comment="vorbis-tools-lang is &lt;1.4.0-1.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009114928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487593" version="1" comment="wavpack is &lt;5.1.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487594" version="1" comment="wavpack-devel is &lt;5.1.0-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487595" version="1" comment="wireshark-devel is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487596" version="1" comment="wireshark-ui-qt is &lt;3.2.2-3.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487597" version="1" comment="FastCGI is &lt;2.4.0-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487598" version="1" comment="FastCGI-devel is &lt;2.4.0-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487599" version="1" comment="libfcgi0 is &lt;2.4.0-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487600" version="1" comment="perl-FastCGI is &lt;2.4.0-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281318" version="1" comment="sle-module-development-tools-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487794" version="1" comment="ant is &lt;1.10.7-2.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487795" version="1" comment="ant-antlr is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487796" version="1" comment="ant-apache-bcel is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487797" version="1" comment="ant-apache-bsf is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487798" version="1" comment="ant-apache-log4j is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487799" version="1" comment="ant-apache-oro is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487800" version="1" comment="ant-apache-regexp is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487801" version="1" comment="ant-apache-resolver is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487802" version="1" comment="ant-commons-logging is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487803" version="1" comment="ant-javamail is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487804" version="1" comment="ant-jdepend is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487805" version="1" comment="ant-jmf is &lt;1.10.7-2.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487806" version="1" comment="ant-junit is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487807" version="1" comment="ant-manual is &lt;1.10.7-2.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487808" version="1" comment="ant-scripts is &lt;1.10.7-2.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487809" version="1" comment="ant-swing is &lt;1.10.7-2.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487810" version="1" comment="apache-commons-compress is &lt;1.19-1.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487811" version="1" comment="apache-pdfbox is &lt;1.8.16-1.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487812" version="1" comment="binutils-devel-32bit is &lt;2.32-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487734" version="1" comment="blktrace is &lt;1.1.0+git.20170126-3.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487813" version="1" comment="bouncycastle is &lt;1.64-1.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487814" version="1" comment="bouncycastle-pg is &lt;1.64-1.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487815" version="1" comment="bsdtar is &lt;3.4.2-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487816" version="1" comment="bsh2 is &lt;2.0.0.b6-10.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487817" version="1" comment="bsh2-classgen is &lt;2.0.0.b6-10.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487818" version="1" comment="build is &lt;20200124.1-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487819" version="1" comment="build-mkbaselibs is &lt;20200124.1-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487820" version="1" comment="cargo is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487821" version="1" comment="clippy is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487822" version="1" comment="rls is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487823" version="1" comment="rust is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487824" version="1" comment="rust-analysis is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487825" version="1" comment="rust-src is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487826" version="1" comment="rust-std-static is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487827" version="1" comment="rustfmt is &lt;1.36.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487626" version="1" comment="checkbashisms is &lt;2.15.1-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487828" version="1" comment="cpp9 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487829" version="1" comment="cross-nvptx-gcc7 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487830" version="1" comment="cross-nvptx-newlib7-devel is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487831" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487832" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487833" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487834" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487835" version="1" comment="gcc7-info is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487836" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487837" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487838" version="1" comment="gcc9 is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487839" version="1" comment="gcc9-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487840" version="1" comment="gcc9-ada is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487841" version="1" comment="gcc9-ada-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487842" version="1" comment="gcc9-c++ is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487843" version="1" comment="gcc9-c++-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487844" version="1" comment="gcc9-fortran is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487845" version="1" comment="gcc9-go is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487846" version="1" comment="gcc9-go-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487847" version="1" comment="gcc9-info is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487848" version="1" comment="gcc9-locale is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487849" version="1" comment="libada7 is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487850" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487851" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487852" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487853" version="1" comment="libstdc++6-devel-gcc9-32bit is &lt;9.3.1+git1296-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487854" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-4.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487855" version="1" comment="crash is &lt;7.2.8-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487856" version="1" comment="crash-devel is &lt;7.2.8-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487857" version="1" comment="crash-kmp-default is &lt;7.2.8_k5.3.18_22-16.19" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487630" version="1" comment="ctags is &lt;5.8-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487858" version="1" comment="cups-ddk is &lt;2.2.7-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487632" version="1" comment="cvs is &lt;1.12.12-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487859" version="1" comment="dom4j is &lt;1.6.1-10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487633" version="1" comment="dpkg is &lt;1.19.0.4-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487634" version="1" comment="dpkg-devel is &lt;1.19.0.4-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487860" version="1" comment="gdb is &lt;8.3.1-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487861" version="1" comment="gdbserver is &lt;8.3.1-8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487862" version="1" comment="git is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487863" version="1" comment="git-arch is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487864" version="1" comment="git-cvs is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487865" version="1" comment="git-daemon is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487866" version="1" comment="git-doc is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487867" version="1" comment="git-email is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487868" version="1" comment="git-gui is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487869" version="1" comment="git-svn is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487870" version="1" comment="git-web is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487871" version="1" comment="gitk is &lt;2.26.2-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487872" version="1" comment="glibc-devel-32bit is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487873" version="1" comment="glibc-devel-static is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487874" version="1" comment="glibc-utils is &lt;2.26-13.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487760" version="1" comment="glibc-devel-32bit is &lt;2.26-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487875" version="1" comment="gradle is &lt;4.4.1-1.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487876" version="1" comment="graphviz-perl is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487763" version="1" comment="guile is &lt;2.0.14-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487764" version="1" comment="guile-devel is &lt;2.0.14-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487765" version="1" comment="guile-modules-2_0 is &lt;2.0.14-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487766" version="1" comment="libguile-2_0-22 is &lt;2.0.14-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487767" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.14-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487877" version="1" comment="jackson-databind is &lt;2.10.2-1.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487878" version="1" comment="jcl-over-slf4j is &lt;1.7.30-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487879" version="1" comment="jul-to-slf4j is &lt;1.7.30-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487880" version="1" comment="log4j-over-slf4j is &lt;1.7.30-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487881" version="1" comment="slf4j is &lt;1.7.30-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487882" version="1" comment="jython is &lt;2.2.1-11.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487883" version="1" comment="kernel-docs is &lt;5.3.18-22.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487884" version="1" comment="kernel-obs-build is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487885" version="1" comment="kernel-preempt-devel is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487886" version="1" comment="kernel-source is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487887" version="1" comment="kernel-syms is &lt;5.3.18-22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487772" version="1" comment="libgit2-26 is &lt;0.26.8-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487888" version="1" comment="libgit2-28 is &lt;0.28.4-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487889" version="1" comment="libgit2-devel is &lt;0.28.4-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487890" version="1" comment="libpcp-devel is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487891" version="1" comment="libpcp3 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487892" version="1" comment="libpcp_gui2 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487893" version="1" comment="libpcp_import1 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487894" version="1" comment="libpcp_mmv1 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487895" version="1" comment="libpcp_trace2 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487896" version="1" comment="libpcp_web1 is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487897" version="1" comment="pcp is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487898" version="1" comment="pcp-conf is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487899" version="1" comment="pcp-devel is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487900" version="1" comment="pcp-doc is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487901" version="1" comment="pcp-import-iostat2pcp is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487902" version="1" comment="pcp-import-mrtg2pcp is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487903" version="1" comment="pcp-import-sar2pcp is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487904" version="1" comment="pcp-pmda-perfevent is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487905" version="1" comment="pcp-system-tools is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487906" version="1" comment="perl-PCP-LogImport is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487907" version="1" comment="perl-PCP-LogSummary is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487908" version="1" comment="perl-PCP-MMV is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487909" version="1" comment="perl-PCP-PMDA is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487910" version="1" comment="python3-pcp is &lt;4.3.1-3.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487911" version="1" comment="libtidy-devel is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487912" version="1" comment="tidy is &lt;5.4.0-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487683" version="1" comment="libtool-32bit is &lt;2.4.6-1.406" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487913" version="1" comment="log4j12-javadoc is &lt;1.2.17-2.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487914" version="1" comment="log4j12-manual is &lt;1.2.17-2.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487685" version="1" comment="nasm is &lt;2.13.02-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487915" version="1" comment="ncurses-devel-32bit is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487916" version="1" comment="ocaml is &lt;4.05.0-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487917" version="1" comment="ocaml-compiler-libs is &lt;4.05.0-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487918" version="1" comment="ocaml-compiler-libs-devel is &lt;4.05.0-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487919" version="1" comment="ocaml-ocamldoc is &lt;4.05.0-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487920" version="1" comment="ocaml-runtime is &lt;4.05.0-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487921" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487922" version="1" comment="osc is &lt;0.168.2-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487923" version="1" comment="pam-devel-32bit is &lt;1.3.0-6.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487694" version="1" comment="perl-Archive-Extract is &lt;0.80-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487695" version="1" comment="perl-ExtUtils-MakeMaker is &lt;7.30-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487696" version="1" comment="perl-Module-Load-Conditional is &lt;0.68-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487697" version="1" comment="perl-Config-IniFiles is &lt;2.94-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487924" version="1" comment="perl-DNS-LDNS is &lt;1.7.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487925" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487699" version="1" comment="perl-Net-Libproxy is &lt;0.4.15-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487926" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487702" version="1" comment="perl-YAML-LibYAML is &lt;0.59-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487927" version="1" comment="perl-doc is &lt;5.26.1-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487928" version="1" comment="perl-solv is &lt;0.7.14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487929" version="1" comment="policycoreutils-devel is &lt;3.0-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487930" version="1" comment="python3-tools is &lt;3.6.10-3.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487931" version="1" comment="rpm-build is &lt;4.14.1-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487932" version="1" comment="subversion-bash-completion is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487933" version="1" comment="subversion-perl is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487934" version="1" comment="subversion-python is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487935" version="1" comment="subversion-tools is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487936" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487937" version="1" comment="zlib-devel-32bit is &lt;1.2.11-3.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487988" version="1" comment="libmunge2 is &lt;0.5.14-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487989" version="1" comment="munge is &lt;0.5.14-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487990" version="1" comment="munge-devel is &lt;0.5.14-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009299864" version="1" comment="sle-module-hpc-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487991" version="1" comment="libnss_slurm2 is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487992" version="1" comment="libpmi0 is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487993" version="1" comment="libslurm35 is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487994" version="1" comment="perl-slurm is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487995" version="1" comment="slurm is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487996" version="1" comment="slurm-auth-none is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487997" version="1" comment="slurm-config is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487998" version="1" comment="slurm-config-man is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009487999" version="1" comment="slurm-devel is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488000" version="1" comment="slurm-doc is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488001" version="1" comment="slurm-lua is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488002" version="1" comment="slurm-munge is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488003" version="1" comment="slurm-node is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488004" version="1" comment="slurm-pam_slurm is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488005" version="1" comment="slurm-plugins is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488006" version="1" comment="slurm-slurmdbd is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488007" version="1" comment="slurm-sql is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488008" version="1" comment="slurm-sview is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488009" version="1" comment="slurm-torque is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488010" version="1" comment="slurm-webdoc is &lt;20.02.3-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488011" version="1" comment="python2-numpy-gnu-hpc is &lt;1.16.5-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488012" version="1" comment="python2-numpy-gnu-hpc-devel is &lt;1.16.5-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488013" version="1" comment="python2-numpy_1_16_5-gnu-hpc is &lt;1.16.5-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488014" version="1" comment="python2-numpy_1_16_5-gnu-hpc-devel is &lt;1.16.5-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488015" version="1" comment="python3-numpy-gnu-hpc is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488016" version="1" comment="python3-numpy-gnu-hpc-devel is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488017" version="1" comment="python3-numpy_1_17_3-gnu-hpc is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488018" version="1" comment="python3-numpy_1_17_3-gnu-hpc-devel is &lt;1.17.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488019" version="1" comment="gv is &lt;3.7.4-1.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285886" version="1" comment="sle-module-legacy-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488062" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.5-3.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488063" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.5-3.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488064" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.5-3.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488065" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.5-3.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488066" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.242-3.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488067" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.242-3.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488068" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.242-3.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488069" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.242-3.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488070" version="1" comment="libcgroup-devel is &lt;0.41.rc1-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488071" version="1" comment="libcgroup-tools is &lt;0.41.rc1-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488072" version="1" comment="libcgroup1 is &lt;0.41.rc1-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488073" version="1" comment="libcgroup1-32bit is &lt;0.41.rc1-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488074" version="1" comment="libncurses5 is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488075" version="1" comment="libncurses5-32bit is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488076" version="1" comment="ncurses5-devel is &lt;6.1-5.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488077" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488078" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488079" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488057" version="1" comment="ntp is &lt;4.2.8p13-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488080" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488081" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488036" version="1" comment="pam-modules is &lt;12.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488037" version="1" comment="pam-modules-32bit is &lt;12.1-3.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488082" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488084" version="1" comment="apache2-mod_wsgi is &lt;4.5.18-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287160" version="1" comment="sle-module-public-cloud-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488090" version="1" comment="aws-cli is &lt;1.18.38-8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488091" version="1" comment="cloud-init is &lt;19.4-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488092" version="1" comment="cloud-init-config-suse is &lt;19.4-8.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488093" version="1" comment="kernel-azure is &lt;5.3.18-16.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488094" version="1" comment="kernel-azure-devel is &lt;5.3.18-16.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488095" version="1" comment="kernel-devel-azure is &lt;5.3.18-16.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488096" version="1" comment="kernel-source-azure is &lt;5.3.18-16.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488097" version="1" comment="kernel-syms-azure is &lt;5.3.18-16.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488098" version="1" comment="kernel-azure-base is &lt;4.12.14-8.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488099" version="1" comment="kernel-devel-azure is &lt;4.12.14-5.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488100" version="1" comment="kernel-source-azure is &lt;4.12.14-5.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488101" version="1" comment="python-azure-agent is &lt;2.2.45-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488086" version="1" comment="python3-keystoneclient is &lt;3.15.0-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488102" version="1" comment="rmt-server-pubcloud is &lt;2.5.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488103" version="1" comment="terraform is &lt;0.12.19-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488104" version="1" comment="clamsap is &lt;0.99.25-2.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009301516" version="1" comment="sle-module-sap-applications-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488458" version="1" comment="389-ds is &lt;1.4.3.9~git0.3eb8617f6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488459" version="1" comment="389-ds-devel is &lt;1.4.3.9~git0.3eb8617f6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488460" version="1" comment="lib389 is &lt;1.4.3.9~git0.3eb8617f6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488461" version="1" comment="libsvrcore0 is &lt;1.4.3.9~git0.3eb8617f6-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282369" version="1" comment="sle-module-server-applications-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488462" version="1" comment="apache2-devel is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488463" version="1" comment="apache2-doc is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488464" version="1" comment="apache2-worker is &lt;2.4.43-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488465" version="1" comment="apache2-mod_apparmor is &lt;2.13.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488466" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488467" version="1" comment="apache2-mod_jk is &lt;1.2.43-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488468" version="1" comment="apache2-mod_nss is &lt;1.0.17-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488116" version="1" comment="apache2-mod_security2 is &lt;2.9.2-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488085" version="1" comment="apache2-mod_wsgi-python3 is &lt;4.5.18-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488469" version="1" comment="bind is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488470" version="1" comment="bind-chrootenv is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488471" version="1" comment="bind-doc is &lt;9.11.2-12.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488121" version="1" comment="davfs2 is &lt;1.5.4-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488472" version="1" comment="dhcp-relay is &lt;4.3.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488473" version="1" comment="dhcp-server is &lt;4.3.5-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488474" version="1" comment="dovecot23 is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488475" version="1" comment="dovecot23-backend-mysql is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488476" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488477" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488478" version="1" comment="dovecot23-devel is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488479" version="1" comment="dovecot23-fts is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488480" version="1" comment="dovecot23-fts-lucene is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488481" version="1" comment="dovecot23-fts-solr is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488482" version="1" comment="dovecot23-fts-squat is &lt;2.3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488483" version="1" comment="dpdk is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488484" version="1" comment="dpdk-devel is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488485" version="1" comment="dpdk-kmp-default is &lt;19.11.1_k5.3.18_22-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488486" version="1" comment="dpdk-thunderx is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488487" version="1" comment="dpdk-thunderx-devel is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488488" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.1_k5.3.18_22-1.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488489" version="1" comment="dpdk-tools is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488490" version="1" comment="libdpdk-20_0 is &lt;19.11.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488491" version="1" comment="erlang-rabbitmq-client is &lt;3.8.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488492" version="1" comment="rabbitmq-server is &lt;3.8.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488493" version="1" comment="rabbitmq-server-plugins is &lt;3.8.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488494" version="1" comment="freeradius-server is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488495" version="1" comment="freeradius-server-devel is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488496" version="1" comment="freeradius-server-krb5 is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488497" version="1" comment="freeradius-server-ldap is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488498" version="1" comment="freeradius-server-libs is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488499" version="1" comment="freeradius-server-mysql is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488500" version="1" comment="freeradius-server-perl is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488501" version="1" comment="freeradius-server-postgresql is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488502" version="1" comment="freeradius-server-python3 is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488503" version="1" comment="freeradius-server-sqlite is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488504" version="1" comment="freeradius-server-utils is &lt;3.0.21-1.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488340" version="1" comment="gnuplot is &lt;5.2.2-3.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488341" version="1" comment="gnuplot-doc is &lt;5.2.2-3.3.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488505" version="1" comment="graphviz-tcl is &lt;2.40.1-6.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488506" version="1" comment="grub2-x86_64-xen is &lt;2.04-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488507" version="1" comment="gtk-vnc-devel is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488508" version="1" comment="libgvncpulse-1_0-0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488509" version="1" comment="typelib-1_0-GVnc-1_0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488510" version="1" comment="typelib-1_0-GVncPulse-1_0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488156" version="1" comment="typelib-1_0-GtkVnc-1_0 is &lt;0.7.2-1.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488511" version="1" comment="typelib-1_0-GtkVnc-2_0 is &lt;1.0.0-2.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488512" version="1" comment="ipmitool-bmc-snmp-proxy is &lt;1.8.18+git20200204.7ccea28-1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488513" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488514" version="1" comment="krb5-server is &lt;1.16.3-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488515" version="1" comment="libapr-util1-dbd-mysql is &lt;1.6.1-10.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488516" version="1" comment="libapr-util1-dbd-pgsql is &lt;1.6.1-10.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488517" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.6.1-10.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488172" version="1" comment="libcacard-devel is &lt;2.5.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488173" version="1" comment="libcacard0 is &lt;2.5.3-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488518" version="1" comment="libct4 is &lt;1.1.36-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488519" version="1" comment="libecpg6 is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488520" version="1" comment="postgresql12-contrib is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488521" version="1" comment="postgresql12-devel is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488522" version="1" comment="postgresql12-docs is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488523" version="1" comment="postgresql12-plperl is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488524" version="1" comment="postgresql12-plpython is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488525" version="1" comment="postgresql12-pltcl is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488526" version="1" comment="postgresql12-server is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488527" version="1" comment="postgresql12-server-devel is &lt;12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488182" version="1" comment="libfpm_pb0 is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488183" version="1" comment="libospf0 is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488184" version="1" comment="libospfapiclient0 is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488185" version="1" comment="libquagga_pb0 is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488186" version="1" comment="libzebra1 is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488187" version="1" comment="quagga is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488188" version="1" comment="quagga-devel is &lt;1.1.1-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488528" version="1" comment="libfreebl3-hmac is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488529" version="1" comment="libsoftokn3-hmac is &lt;3.47.1-3.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488530" version="1" comment="libicu60_2 is &lt;60.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488531" version="1" comment="libicu60_2-bedata is &lt;60.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488532" version="1" comment="libicu60_2-ledata is &lt;60.2-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488533" version="1" comment="libmariadb-devel is &lt;3.1.8-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488534" version="1" comment="libmariadb_plugins is &lt;3.1.8-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488535" version="1" comment="libmariadbd-devel is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488536" version="1" comment="libmariadbd19 is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488537" version="1" comment="mariadb is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488538" version="1" comment="mariadb-client is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488539" version="1" comment="mariadb-errormessages is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488540" version="1" comment="mariadb-tools is &lt;10.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488541" version="1" comment="libosinfo-devel is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488542" version="1" comment="typelib-1_0-Libosinfo-1_0 is &lt;1.7.1-1.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488198" version="1" comment="librelp-devel is &lt;1.2.15-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488199" version="1" comment="librelp0 is &lt;1.2.15-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488200" version="1" comment="libsaml-devel is &lt;2.6.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488201" version="1" comment="libsaml9 is &lt;2.6.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488202" version="1" comment="opensaml-schemas is &lt;2.6.1-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488543" version="1" comment="libshibsp-lite7 is &lt;2.6.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488544" version="1" comment="libshibsp7 is &lt;2.6.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488545" version="1" comment="shibboleth-sp is &lt;2.6.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488546" version="1" comment="shibboleth-sp-devel is &lt;2.6.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488547" version="1" comment="libspice-server-devel is &lt;0.14.2-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488548" version="1" comment="libspice-server1 is &lt;0.14.2-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488549" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488550" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488551" version="1" comment="libvirt is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488552" version="1" comment="libvirt-admin is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488553" version="1" comment="libvirt-bash-completion is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488554" version="1" comment="libvirt-client is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488555" version="1" comment="libvirt-daemon is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488556" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488557" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488558" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488559" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488560" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488561" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488562" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488563" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488564" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488565" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488566" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488567" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488568" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488569" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488570" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488571" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488572" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488573" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488574" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488575" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488576" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488577" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488578" version="1" comment="libvirt-devel is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488579" version="1" comment="libvirt-doc is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488580" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488581" version="1" comment="libvirt-nss is &lt;6.0.0-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488582" version="1" comment="libwsman-devel is &lt;2.6.7-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488583" version="1" comment="libwsman3 is &lt;2.6.7-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488584" version="1" comment="openwsman-server is &lt;2.6.7-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488400" version="1" comment="libxmltooling-devel is &lt;1.6.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488401" version="1" comment="libxmltooling7 is &lt;1.6.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488402" version="1" comment="xmltooling-schemas is &lt;1.6.4-3.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488585" version="1" comment="memcached is &lt;1.5.6-4.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488586" version="1" comment="memcached-devel is &lt;1.5.6-4.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488587" version="1" comment="nginx is &lt;1.16.1-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488588" version="1" comment="nginx-source is &lt;1.16.1-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488209" version="1" comment="nut is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488210" version="1" comment="nut-devel is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488211" version="1" comment="nut-drivers-net is &lt;2.7.4-4.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488589" version="1" comment="openslp-server is &lt;2.0.0-6.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488590" version="1" comment="openssh-fips is &lt;8.1p1-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488591" version="1" comment="ovmf is &lt;201911-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488592" version="1" comment="ovmf-tools is &lt;201911-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488593" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488594" version="1" comment="qemu-uefi-aarch64 is &lt;201911-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488595" version="1" comment="postgresql-contrib is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488596" version="1" comment="postgresql-devel is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488597" version="1" comment="postgresql-docs is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488598" version="1" comment="postgresql-plperl is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488599" version="1" comment="postgresql-plpython is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488600" version="1" comment="postgresql-pltcl is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488601" version="1" comment="postgresql-server is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488602" version="1" comment="postgresql-server-devel is &lt;12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488603" version="1" comment="postgresql10-contrib is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488604" version="1" comment="postgresql10-devel is &lt;10.12-8.13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488605" version="1" comment="postgresql10-docs is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488606" version="1" comment="postgresql10-plperl is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488607" version="1" comment="postgresql10-plpython is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488608" version="1" comment="postgresql10-pltcl is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488609" version="1" comment="postgresql10-server is &lt;10.12-8.13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488262" version="1" comment="python3-pywbem is &lt;0.11.0-2.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488610" version="1" comment="qemu is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488611" version="1" comment="qemu-arm is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488612" version="1" comment="qemu-audio-alsa is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488613" version="1" comment="qemu-audio-pa is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488614" version="1" comment="qemu-block-curl is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488615" version="1" comment="qemu-block-iscsi is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488616" version="1" comment="qemu-block-rbd is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488617" version="1" comment="qemu-block-ssh is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488618" version="1" comment="qemu-guest-agent is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488619" version="1" comment="qemu-ipxe is &lt;1.0.0+-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488620" version="1" comment="qemu-kvm is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488621" version="1" comment="qemu-lang is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488622" version="1" comment="qemu-microvm is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488623" version="1" comment="qemu-ppc is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488624" version="1" comment="qemu-s390 is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488625" version="1" comment="qemu-seabios is &lt;1.12.1+-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009232226" version="1" comment="qemu-sgabios is &lt;8-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009065329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488626" version="1" comment="qemu-ui-curses is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488627" version="1" comment="qemu-ui-gtk is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488628" version="1" comment="qemu-ui-spice-app is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488629" version="1" comment="qemu-vgabios is &lt;1.12.1+-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488630" version="1" comment="qemu-x86 is &lt;4.2.0-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488631" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-9.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488276" version="1" comment="rarpd is &lt;s20161105-6.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488632" version="1" comment="rmt-server is &lt;2.5.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488633" version="1" comment="rmt-server-config is &lt;2.5.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488634" version="1" comment="rsyslog-module-gssapi is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488635" version="1" comment="rsyslog-module-gtls is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488636" version="1" comment="rsyslog-module-mysql is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488637" version="1" comment="rsyslog-module-pgsql is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488638" version="1" comment="rsyslog-module-relp is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488639" version="1" comment="rsyslog-module-snmp is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488640" version="1" comment="rsyslog-module-udpspoof is &lt;8.39.0-2.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488641" version="1" comment="salt-api is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488642" version="1" comment="salt-cloud is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488643" version="1" comment="salt-fish-completion is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488644" version="1" comment="salt-master is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488645" version="1" comment="salt-proxy is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488646" version="1" comment="salt-ssh is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488647" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488648" version="1" comment="salt-syndic is &lt;3000-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488290" version="1" comment="sblim-sfcb is &lt;1.4.9-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488649" version="1" comment="skopeo is &lt;0.1.41-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488650" version="1" comment="spice-gtk-devel is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488651" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488652" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.37-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488653" version="1" comment="squid is &lt;4.11-5.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488654" version="1" comment="subversion-server is &lt;1.10.6-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488655" version="1" comment="sysstat-isag is &lt;12.0.2-3.21.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488656" version="1" comment="uuidd is &lt;2.33.1-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488657" version="1" comment="virt-install is &lt;2.2.1-8.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488658" version="1" comment="virt-manager is &lt;2.2.1-8.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488659" version="1" comment="virt-manager-common is &lt;2.2.1-8.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488453" version="1" comment="vsftpd is &lt;3.0.3-7.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488660" version="1" comment="xen is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488661" version="1" comment="xen-devel is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488662" version="1" comment="xen-tools is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488663" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_02-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488664" version="1" comment="yast2-rmt is &lt;1.3.0-1.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488798" version="1" comment="apache-commons-beanutils is &lt;1.9.4-1.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009285093" version="1" comment="sle-module-web-scripting-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488799" version="1" comment="apache-commons-fileupload is &lt;1.4-1.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488800" version="1" comment="apache2-mod_php7 is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488801" version="1" comment="php7 is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488802" version="1" comment="php7-bcmath is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488803" version="1" comment="php7-bz2 is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488804" version="1" comment="php7-calendar is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488805" version="1" comment="php7-ctype is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488806" version="1" comment="php7-curl is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488807" version="1" comment="php7-dba is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488808" version="1" comment="php7-devel is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488809" version="1" comment="php7-dom is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488810" version="1" comment="php7-enchant is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488811" version="1" comment="php7-exif is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488812" version="1" comment="php7-fastcgi is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488813" version="1" comment="php7-fileinfo is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488814" version="1" comment="php7-fpm is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488815" version="1" comment="php7-ftp is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488816" version="1" comment="php7-gd is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488817" version="1" comment="php7-gettext is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488818" version="1" comment="php7-gmp is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488819" version="1" comment="php7-iconv is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488820" version="1" comment="php7-intl is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488821" version="1" comment="php7-json is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488822" version="1" comment="php7-ldap is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488823" version="1" comment="php7-mbstring is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488824" version="1" comment="php7-mysql is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488825" version="1" comment="php7-odbc is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488826" version="1" comment="php7-opcache is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488827" version="1" comment="php7-openssl is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488828" version="1" comment="php7-pcntl is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488829" version="1" comment="php7-pdo is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488830" version="1" comment="php7-pgsql is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488831" version="1" comment="php7-phar is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488832" version="1" comment="php7-posix is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488833" version="1" comment="php7-readline is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488834" version="1" comment="php7-shmop is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488835" version="1" comment="php7-snmp is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488836" version="1" comment="php7-soap is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488837" version="1" comment="php7-sockets is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488838" version="1" comment="php7-sodium is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488839" version="1" comment="php7-sqlite is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488840" version="1" comment="php7-sysvmsg is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488841" version="1" comment="php7-sysvsem is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488842" version="1" comment="php7-sysvshm is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488843" version="1" comment="php7-tidy is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488844" version="1" comment="php7-tokenizer is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488845" version="1" comment="php7-xmlreader is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488846" version="1" comment="php7-xmlrpc is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488847" version="1" comment="php7-xmlwriter is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488848" version="1" comment="php7-xsl is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488849" version="1" comment="php7-zip is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488850" version="1" comment="php7-zlib is &lt;7.4.6-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488719" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488851" version="1" comment="nodejs10 is &lt;10.19.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488852" version="1" comment="nodejs10-devel is &lt;10.19.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488853" version="1" comment="nodejs10-docs is &lt;10.19.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488854" version="1" comment="npm10 is &lt;10.19.0-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488855" version="1" comment="nodejs12 is &lt;12.18.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488856" version="1" comment="nodejs12-devel is &lt;12.18.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488857" version="1" comment="nodejs12-docs is &lt;12.18.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488858" version="1" comment="npm12 is &lt;12.18.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488859" version="1" comment="nodejs8 is &lt;8.17.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488860" version="1" comment="nodejs8-devel is &lt;8.17.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488861" version="1" comment="nodejs8-docs is &lt;8.17.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488862" version="1" comment="npm8 is &lt;8.17.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488863" version="1" comment="tomcat is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488864" version="1" comment="tomcat-admin-webapps is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488865" version="1" comment="tomcat-el-3_0-api is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488866" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488867" version="1" comment="tomcat-lib is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488868" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488869" version="1" comment="tomcat-webapps is &lt;9.0.35-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489171" version="1" comment="Mesa-dri-nouveau is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489172" version="1" comment="libXvMC_nouveau is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489173" version="1" comment="libvdpau_nouveau is &lt;19.3.4-45.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282578" version="1" comment="sle-we-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489174" version="1" comment="MozillaThunderbird is &lt;68.8.0-3.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489175" version="1" comment="MozillaThunderbird-translations-common is &lt;68.8.0-3.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489176" version="1" comment="MozillaThunderbird-translations-other is &lt;68.8.0-3.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489177" version="1" comment="NetworkManager-applet is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489178" version="1" comment="NetworkManager-applet-lang is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489179" version="1" comment="NetworkManager-connection-editor is &lt;1.8.24-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489180" version="1" comment="NetworkManager-lang is &lt;1.22.6-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489181" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489182" version="1" comment="PackageKit-gtk3-module is &lt;1.1.13-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488880" version="1" comment="argyllcms is &lt;1.9.2-2.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489183" version="1" comment="bluez-cups is &lt;5.48-11.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488882" version="1" comment="bogofilter-common is &lt;1.2.4-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488883" version="1" comment="bogofilter-db is &lt;1.2.4-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488885" version="1" comment="colord-gtk-lang is &lt;0.1.26-1.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489184" version="1" comment="dia is &lt;0.97.3-4.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489185" version="1" comment="dia-lang is &lt;0.97.3-4.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489186" version="1" comment="enigmail is &lt;2.1.5-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489187" version="1" comment="evolution is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489188" version="1" comment="evolution-devel is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489189" version="1" comment="evolution-lang is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489190" version="1" comment="evolution-plugin-bogofilter is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489191" version="1" comment="evolution-plugin-pst-import is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489192" version="1" comment="evolution-plugin-spamassassin is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489193" version="1" comment="evolution-plugin-text-highlight is &lt;3.34.4-1.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489194" version="1" comment="freerdp is &lt;2.0.0~rc4-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489195" version="1" comment="freerdp-devel is &lt;2.0.0~rc4-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489196" version="1" comment="libfreerdp2 is &lt;2.0.0~rc4-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489197" version="1" comment="libwinpr2 is &lt;2.0.0~rc4-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489198" version="1" comment="winpr2-devel is &lt;2.0.0~rc4-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488895" version="1" comment="gegl-0_3 is &lt;0.3.34-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489199" version="1" comment="gegl-0_4 is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489200" version="1" comment="gegl-0_4-lang is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489201" version="1" comment="gegl-devel is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488898" version="1" comment="libgegl-0_3-0 is &lt;0.3.34-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489202" version="1" comment="libgegl-0_4-0 is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488899" version="1" comment="typelib-1_0-Gegl-0_3 is &lt;0.3.34-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489203" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.16-1.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489204" version="1" comment="gimp is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489205" version="1" comment="gimp-devel is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489206" version="1" comment="gimp-lang is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489207" version="1" comment="gimp-plugins-python is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489208" version="1" comment="libgimp-2_0-0 is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489209" version="1" comment="libgimpui-2_0-0 is &lt;2.10.12-1.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489210" version="1" comment="gnome-photos is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489211" version="1" comment="gnome-photos-lang is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489212" version="1" comment="gnome-shell-search-provider-gnome-photos is &lt;3.34.1-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489213" version="1" comment="gnome-shell-calendar is &lt;3.34.4+4-1.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489214" version="1" comment="gstreamer-plugins-ugly is &lt;1.16.2-1.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489215" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.16.2-1.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489065" version="1" comment="icedtea-web is &lt;1.7.1-5.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489216" version="1" comment="imobiledevice-tools is &lt;1.2.0+git20180427.26373b3-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489217" version="1" comment="kernel-default-extra is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489218" version="1" comment="libavcodec-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489219" version="1" comment="libavformat-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489220" version="1" comment="libavresample-devel is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489221" version="1" comment="libavresample3 is &lt;3.4.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488922" version="1" comment="libgadu-devel is &lt;1.12.2-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488923" version="1" comment="libgadu3 is &lt;1.12.2-1.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489222" version="1" comment="libical-glib-devel is &lt;3.0.6-2.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489223" version="1" comment="libical-glib3 is &lt;3.0.6-2.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489224" version="1" comment="typelib-1_0-ICal-3_0 is &lt;3.0.6-2.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489225" version="1" comment="typelib-1_0-ICalGLib-3_0 is &lt;3.0.6-2.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489226" version="1" comment="libmwaw-0_3-3 is &lt;0.3.15-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489227" version="1" comment="libntfs-3g-devel is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489228" version="1" comment="libntfs-3g87 is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489229" version="1" comment="ntfs-3g is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489230" version="1" comment="ntfsprogs is &lt;2016.2.22-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489231" version="1" comment="libopencv3_3 is &lt;3.3.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489232" version="1" comment="opencv is &lt;3.3.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489233" version="1" comment="opencv-devel is &lt;3.3.1-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488928" version="1" comment="libotr-devel is &lt;4.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488929" version="1" comment="libotr5 is &lt;4.1.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480686" version="1" comment="libpoppler73 is &lt;0.62.0-2.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488930" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488931" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488932" version="1" comment="libpskc-devel is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009488933" version="1" comment="libpskc0 is &lt;2.6.2-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489234" version="1" comment="libpurple is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489235" version="1" comment="libpurple-branding-upstream is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489236" version="1" comment="libpurple-devel is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489237" version="1" comment="libpurple-lang is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489238" version="1" comment="libpurple-plugin-sametime is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489239" version="1" comment="pidgin is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489240" version="1" comment="pidgin-devel is &lt;2.13.0-10.105" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489076" version="1" comment="libraw-devel is &lt;0.18.9-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489077" version="1" comment="libraw16 is &lt;0.18.9-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489241" version="1" comment="libreoffice is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489242" version="1" comment="libreoffice-base is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489243" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489244" version="1" comment="libreoffice-branding-upstream is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489245" version="1" comment="libreoffice-calc is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489246" version="1" comment="libreoffice-calc-extensions is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489247" version="1" comment="libreoffice-draw is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489248" version="1" comment="libreoffice-filters-optional is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489249" version="1" comment="libreoffice-gnome is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489250" version="1" comment="libreoffice-gtk3 is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489251" version="1" comment="libreoffice-icon-themes is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489252" version="1" comment="libreoffice-impress is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489253" version="1" comment="libreoffice-l10n-af is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489254" version="1" comment="libreoffice-l10n-ar is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489255" version="1" comment="libreoffice-l10n-as is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489256" version="1" comment="libreoffice-l10n-bg is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489257" version="1" comment="libreoffice-l10n-bn is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489258" version="1" comment="libreoffice-l10n-br is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489259" version="1" comment="libreoffice-l10n-ca is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489260" version="1" comment="libreoffice-l10n-cs is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489261" version="1" comment="libreoffice-l10n-cy is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489262" version="1" comment="libreoffice-l10n-da is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489263" version="1" comment="libreoffice-l10n-de is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489264" version="1" comment="libreoffice-l10n-dz is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489265" version="1" comment="libreoffice-l10n-el is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489266" version="1" comment="libreoffice-l10n-en is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489267" version="1" comment="libreoffice-l10n-eo is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489268" version="1" comment="libreoffice-l10n-es is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489269" version="1" comment="libreoffice-l10n-et is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489270" version="1" comment="libreoffice-l10n-eu is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489271" version="1" comment="libreoffice-l10n-fa is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489272" version="1" comment="libreoffice-l10n-fi is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489273" version="1" comment="libreoffice-l10n-fr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489274" version="1" comment="libreoffice-l10n-ga is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489275" version="1" comment="libreoffice-l10n-gl is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489276" version="1" comment="libreoffice-l10n-gu is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489277" version="1" comment="libreoffice-l10n-he is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489278" version="1" comment="libreoffice-l10n-hi is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489279" version="1" comment="libreoffice-l10n-hr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489280" version="1" comment="libreoffice-l10n-hu is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489281" version="1" comment="libreoffice-l10n-it is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489282" version="1" comment="libreoffice-l10n-ja is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489283" version="1" comment="libreoffice-l10n-kk is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489284" version="1" comment="libreoffice-l10n-kn is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489285" version="1" comment="libreoffice-l10n-ko is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489286" version="1" comment="libreoffice-l10n-lt is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489287" version="1" comment="libreoffice-l10n-lv is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489288" version="1" comment="libreoffice-l10n-mai is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489289" version="1" comment="libreoffice-l10n-ml is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489290" version="1" comment="libreoffice-l10n-mr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489291" version="1" comment="libreoffice-l10n-nb is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489292" version="1" comment="libreoffice-l10n-nl is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489293" version="1" comment="libreoffice-l10n-nn is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489294" version="1" comment="libreoffice-l10n-nr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489295" version="1" comment="libreoffice-l10n-nso is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489296" version="1" comment="libreoffice-l10n-or is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489297" version="1" comment="libreoffice-l10n-pa is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489298" version="1" comment="libreoffice-l10n-pl is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489299" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489300" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489301" version="1" comment="libreoffice-l10n-ro is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489302" version="1" comment="libreoffice-l10n-ru is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489303" version="1" comment="libreoffice-l10n-si is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489304" version="1" comment="libreoffice-l10n-sk is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489305" version="1" comment="libreoffice-l10n-sl is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489306" version="1" comment="libreoffice-l10n-sr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489307" version="1" comment="libreoffice-l10n-ss is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489308" version="1" comment="libreoffice-l10n-st is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489309" version="1" comment="libreoffice-l10n-sv is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489310" version="1" comment="libreoffice-l10n-ta is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489311" version="1" comment="libreoffice-l10n-te is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489312" version="1" comment="libreoffice-l10n-th is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489313" version="1" comment="libreoffice-l10n-tn is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489314" version="1" comment="libreoffice-l10n-tr is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489315" version="1" comment="libreoffice-l10n-ts is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489316" version="1" comment="libreoffice-l10n-uk is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489317" version="1" comment="libreoffice-l10n-ve is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489318" version="1" comment="libreoffice-l10n-xh is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489319" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489320" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489321" version="1" comment="libreoffice-l10n-zu is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489322" version="1" comment="libreoffice-mailmerge is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489323" version="1" comment="libreoffice-math is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489324" version="1" comment="libreoffice-officebean is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489325" version="1" comment="libreoffice-pyuno is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489326" version="1" comment="libreoffice-writer is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489327" version="1" comment="libreoffice-writer-extensions is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489328" version="1" comment="libreofficekit is &lt;6.4.4.2-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489166" version="1" comment="libstaroffice-0_0-0 is &lt;0.0.6-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489329" version="1" comment="libvncclient0 is &lt;0.9.10-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489330" version="1" comment="libvncserver0 is &lt;0.9.10-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489034" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489035" version="1" comment="libwmf-devel is &lt;0.2.8.4-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489036" version="1" comment="libwmf-gnome is &lt;0.2.8.4-2.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489168" version="1" comment="libwpd-0_10-10 is &lt;0.10.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489169" version="1" comment="libwpd-devel is &lt;0.10.2-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489331" version="1" comment="openconnect is &lt;7.08-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489332" version="1" comment="openconnect-devel is &lt;7.08-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489333" version="1" comment="openconnect-lang is &lt;7.08-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489042" version="1" comment="pidgin-plugin-otr is &lt;4.0.2-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489043" version="1" comment="pidgin-plugin-otr-lang is &lt;4.0.2-1.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489334" version="1" comment="strongswan-nm is &lt;5.8.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489335" version="1" comment="transfig is &lt;3.2.6a-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489336" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009112066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492022" version="1" comment="libvpx4 is &lt;1.6.1-6.6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492053" version="1" comment="libjasper4 is &lt;2.0.14-3.11.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492063" version="1" comment="libxml2-2 is &lt;2.9.7-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492064" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492065" version="1" comment="libxml2-devel is &lt;2.9.7-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492066" version="1" comment="libxml2-tools is &lt;2.9.7-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492067" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492072" version="1" comment="vim is &lt;8.0.1568-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492073" version="1" comment="vim-data is &lt;8.0.1568-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492074" version="1" comment="vim-data-common is &lt;8.0.1568-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492075" version="1" comment="ruby2.5-rubygem-bundler is &lt;1.16.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492093" version="1" comment="libfreebl3 is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492094" version="1" comment="libfreebl3-32bit is &lt;3.53-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492095" version="1" comment="libsoftokn3 is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492096" version="1" comment="libsoftokn3-32bit is &lt;3.53-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492097" version="1" comment="mozilla-nspr is &lt;4.25-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492098" version="1" comment="mozilla-nspr-32bit is &lt;4.25-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492099" version="1" comment="mozilla-nspr-devel is &lt;4.25-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492100" version="1" comment="mozilla-nss is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492101" version="1" comment="mozilla-nss-32bit is &lt;3.53-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492102" version="1" comment="mozilla-nss-certs is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492103" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492104" version="1" comment="mozilla-nss-devel is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492105" version="1" comment="mozilla-nss-sysinit is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492106" version="1" comment="mozilla-nss-tools is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492107" version="1" comment="perl is &lt;5.26.1-7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492108" version="1" comment="perl-base is &lt;5.26.1-7.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492109" version="1" comment="perl-base-32bit is &lt;5.26.1-7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493166" version="1" comment="curl is &lt;7.66.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493167" version="1" comment="libcurl-devel is &lt;7.66.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493168" version="1" comment="libcurl4 is &lt;7.66.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493169" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492127" version="1" comment="mutt is &lt;1.10.1-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492128" version="1" comment="mutt-doc is &lt;1.10.1-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492129" version="1" comment="mutt-lang is &lt;1.10.1-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492130" version="1" comment="libunbound2 is &lt;1.6.8-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492131" version="1" comment="unbound-anchor is &lt;1.6.8-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492132" version="1" comment="unbound-devel is &lt;1.6.8-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492137" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492138" version="1" comment="python3 is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492139" version="1" comment="python3-base is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492140" version="1" comment="python3-curses is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492141" version="1" comment="python3-dbm is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492142" version="1" comment="python3-devel is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492143" version="1" comment="python3-idle is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492145" version="1" comment="python3-tk is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490719" version="1" comment="libjpeg62 is &lt;62.2.0-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490720" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490721" version="1" comment="libjpeg8 is &lt;8.1.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490722" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490723" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492146" version="1" comment="libfreebl3 is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492147" version="1" comment="libfreebl3-32bit is &lt;3.53.1-3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492148" version="1" comment="libsoftokn3 is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492149" version="1" comment="libsoftokn3-32bit is &lt;3.53.1-3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492150" version="1" comment="mozilla-nss is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492151" version="1" comment="mozilla-nss-32bit is &lt;3.53.1-3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492152" version="1" comment="mozilla-nss-certs is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492153" version="1" comment="mozilla-nss-certs-32bit is &lt;3.53.1-3.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492154" version="1" comment="mozilla-nss-devel is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492155" version="1" comment="mozilla-nss-sysinit is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492156" version="1" comment="mozilla-nss-tools is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492157" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492158" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492159" version="1" comment="libldap-data is &lt;2.4.46-9.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493170" version="1" comment="openldap2 is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492160" version="1" comment="openldap2-client is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492161" version="1" comment="openldap2-devel is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492162" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492163" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490495" version="1" comment="nmap is &lt;7.70-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009491754" version="1" comment="python3-ecdsa is &lt;0.13.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490077" version="1" comment="graphviz is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490078" version="1" comment="graphviz-devel is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490079" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009490080" version="1" comment="libgraphviz6 is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493171" version="1" comment="xen-libs is &lt;4.13.1_04-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493172" version="1" comment="xen-tools-domU is &lt;4.13.1_04-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493173" version="1" comment="ldb-tools is &lt;2.0.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493174" version="1" comment="libdcerpc-binding0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493175" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493176" version="1" comment="libdcerpc-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493177" version="1" comment="libdcerpc-samr-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493178" version="1" comment="libdcerpc-samr0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493179" version="1" comment="libdcerpc0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493180" version="1" comment="libdcerpc0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493181" version="1" comment="libldb-devel is &lt;2.0.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493182" version="1" comment="libldb2 is &lt;2.0.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493183" version="1" comment="libldb2-32bit is &lt;2.0.12-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493184" version="1" comment="libndr-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493185" version="1" comment="libndr-krb5pac-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493186" version="1" comment="libndr-krb5pac0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493187" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493188" version="1" comment="libndr-nbt-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493189" version="1" comment="libndr-nbt0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493190" version="1" comment="libndr-nbt0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493191" version="1" comment="libndr-standard-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493192" version="1" comment="libndr-standard0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493193" version="1" comment="libndr-standard0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493194" version="1" comment="libndr0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493195" version="1" comment="libndr0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493196" version="1" comment="libnetapi-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493197" version="1" comment="libnetapi0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493198" version="1" comment="libnetapi0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493199" version="1" comment="libsamba-credentials-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493200" version="1" comment="libsamba-credentials0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493201" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493202" version="1" comment="libsamba-errors-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493203" version="1" comment="libsamba-errors0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493204" version="1" comment="libsamba-errors0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493205" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493206" version="1" comment="libsamba-hostconfig0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493207" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493208" version="1" comment="libsamba-passdb-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493209" version="1" comment="libsamba-passdb0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493210" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493211" version="1" comment="libsamba-policy-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493212" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493213" version="1" comment="libsamba-policy0-python3 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493214" version="1" comment="libsamba-util-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493215" version="1" comment="libsamba-util0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493216" version="1" comment="libsamba-util0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493217" version="1" comment="libsamdb-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493218" version="1" comment="libsamdb0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493219" version="1" comment="libsamdb0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493220" version="1" comment="libsmbclient-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493221" version="1" comment="libsmbclient0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493222" version="1" comment="libsmbconf-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493223" version="1" comment="libsmbconf0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493224" version="1" comment="libsmbconf0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493225" version="1" comment="libsmbldap-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493226" version="1" comment="libsmbldap2 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493227" version="1" comment="libsmbldap2-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493228" version="1" comment="libtevent-util-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493229" version="1" comment="libtevent-util0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493230" version="1" comment="libtevent-util0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493231" version="1" comment="libwbclient-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493232" version="1" comment="libwbclient0 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493233" version="1" comment="libwbclient0-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493234" version="1" comment="python3-ldb is &lt;2.0.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493235" version="1" comment="python3-ldb-devel is &lt;2.0.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493236" version="1" comment="samba is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493237" version="1" comment="samba-ceph is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493238" version="1" comment="samba-client is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493239" version="1" comment="samba-core-devel is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493240" version="1" comment="samba-libs is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493241" version="1" comment="samba-libs-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493242" version="1" comment="samba-libs-python3 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493243" version="1" comment="samba-python3 is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493244" version="1" comment="samba-winbind is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493245" version="1" comment="samba-winbind-32bit is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493246" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493247" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493248" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493249" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493250" version="1" comment="qemu-tools is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493251" version="1" comment="grub2 is &lt;2.04-9.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493252" version="1" comment="grub2-arm64-efi is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493253" version="1" comment="grub2-i386-pc is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493254" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493255" version="1" comment="grub2-s390x-emu is &lt;2.04-9.7.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493256" version="1" comment="grub2-snapper-plugin is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493257" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493258" version="1" comment="grub2-x86_64-efi is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492268" version="1" comment="ghostscript is &lt;9.52-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492269" version="1" comment="ghostscript-devel is &lt;9.52-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492270" version="1" comment="ghostscript-x11 is &lt;9.52-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493259" version="1" comment="python3-targetcli-fb is &lt;2.1.52-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493260" version="1" comment="targetcli-fb-common is &lt;2.1.52-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493261" version="1" comment="kernel-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493262" version="1" comment="kernel-default-base is &lt;5.3.18-24.9.1.9.2.6 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493263" version="1" comment="kernel-default-devel is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493264" version="1" comment="kernel-devel is &lt;5.3.18-24.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493265" version="1" comment="kernel-macros is &lt;5.3.18-24.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493266" version="1" comment="kernel-preempt is &lt;5.3.18-24.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493267" version="1" comment="python3-rtslib-fb is &lt;2.1.73-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492277" version="1" comment="libX11-6 is &lt;1.6.5-3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492278" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492279" version="1" comment="libX11-data is &lt;1.6.5-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492280" version="1" comment="libX11-devel is &lt;1.6.5-3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492281" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492282" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.6.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492283" version="1" comment="libxcb-composite0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492284" version="1" comment="libxcb-damage0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492285" version="1" comment="libxcb-devel is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492286" version="1" comment="libxcb-devel-doc is &lt;1.13-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492287" version="1" comment="libxcb-dpms0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492288" version="1" comment="libxcb-dri2-0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492289" version="1" comment="libxcb-dri2-0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492290" version="1" comment="libxcb-dri3-0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492291" version="1" comment="libxcb-dri3-0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492292" version="1" comment="libxcb-glx0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492293" version="1" comment="libxcb-glx0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492294" version="1" comment="libxcb-present0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492295" version="1" comment="libxcb-present0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492296" version="1" comment="libxcb-randr0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492297" version="1" comment="libxcb-record0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492298" version="1" comment="libxcb-render0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492299" version="1" comment="libxcb-res0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492300" version="1" comment="libxcb-screensaver0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492301" version="1" comment="libxcb-shape0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492302" version="1" comment="libxcb-shm0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492303" version="1" comment="libxcb-sync1 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492304" version="1" comment="libxcb-sync1-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492305" version="1" comment="libxcb-xf86dri0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492306" version="1" comment="libxcb-xfixes0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492307" version="1" comment="libxcb-xfixes0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492308" version="1" comment="libxcb-xinerama0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492309" version="1" comment="libxcb-xinput0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492310" version="1" comment="libxcb-xkb1 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492311" version="1" comment="libxcb-xtest0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492312" version="1" comment="libxcb-xv0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492313" version="1" comment="libxcb-xvmc0 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492314" version="1" comment="libxcb1 is &lt;1.13-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492315" version="1" comment="libxcb1-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493268" version="1" comment="libpainter0 is &lt;0.9.13.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493269" version="1" comment="librfxencode0 is &lt;0.9.13.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493270" version="1" comment="xrdp is &lt;0.9.13.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493271" version="1" comment="xrdp-devel is &lt;0.9.13.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492316" version="1" comment="java-11-openjdk is &lt;11.0.8.0-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492317" version="1" comment="java-11-openjdk-demo is &lt;11.0.8.0-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492318" version="1" comment="java-11-openjdk-devel is &lt;11.0.8.0-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492319" version="1" comment="java-11-openjdk-headless is &lt;11.0.8.0-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492320" version="1" comment="libwireshark13 is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492321" version="1" comment="libwiretap10 is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492322" version="1" comment="libwsutil11 is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492323" version="1" comment="wireshark is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493272" version="1" comment="xen-libs is &lt;4.13.1_06-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493273" version="1" comment="xen-tools-domU is &lt;4.13.1_06-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492330" version="1" comment="perl-XML-Twig is &lt;3.52-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492331" version="1" comment="libX11-6 is &lt;1.6.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492332" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492333" version="1" comment="libX11-data is &lt;1.6.5-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492334" version="1" comment="libX11-devel is &lt;1.6.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492335" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492336" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493274" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493275" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493276" version="1" comment="libwebkit2gtk3-lang is &lt;2.28.4-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493277" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493278" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493279" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493280" version="1" comment="libpq5 is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493281" version="1" comment="libpq5-32bit is &lt;12.4-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493282" version="1" comment="postgresql12 is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493283" version="1" comment="libvirt-libs is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492413" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492414" version="1" comment="python is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492415" version="1" comment="python-base is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492416" version="1" comment="libpython3_6m1_0 is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492417" version="1" comment="python3 is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492418" version="1" comment="python3-base is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492419" version="1" comment="python3-curses is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492420" version="1" comment="python3-dbm is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492421" version="1" comment="python3-devel is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492422" version="1" comment="python3-idle is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492424" version="1" comment="python3-tk is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492425" version="1" comment="gettext-runtime is &lt;0.19.8.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492426" version="1" comment="gettext-runtime-32bit is &lt;0.19.8.1-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492427" version="1" comment="gettext-tools is &lt;0.19.8.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493284" version="1" comment="grub2 is &lt;2.04-9.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493285" version="1" comment="grub2-arm64-efi is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493286" version="1" comment="grub2-i386-pc is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493287" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493288" version="1" comment="grub2-s390x-emu is &lt;2.04-9.15.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493289" version="1" comment="grub2-snapper-plugin is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493290" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493291" version="1" comment="grub2-x86_64-efi is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493292" version="1" comment="apache2 is &lt;2.4.43-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493293" version="1" comment="apache2-prefork is &lt;2.4.43-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493294" version="1" comment="apache2-utils is &lt;2.4.43-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492440" version="1" comment="postgresql10 is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493295" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493296" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493297" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493298" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493299" version="1" comment="libQt5Core5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493300" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493301" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493302" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493303" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493304" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493305" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493306" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493307" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493308" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493309" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493310" version="1" comment="libQt5Network5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493311" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493312" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493313" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493314" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493315" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493316" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493317" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493318" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493319" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493320" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493321" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493322" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493323" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493324" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493325" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493326" version="1" comment="libQt5Test5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493327" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493328" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493329" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493330" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493331" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493332" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493333" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493334" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493335" version="1" comment="curl is &lt;7.66.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493336" version="1" comment="libcurl-devel is &lt;7.66.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493337" version="1" comment="libcurl4 is &lt;7.66.0-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493338" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493339" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493340" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492445" version="1" comment="libX11-6 is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492446" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492447" version="1" comment="libX11-data is &lt;1.6.5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492448" version="1" comment="libX11-devel is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492449" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492450" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493341" version="1" comment="kernel-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493342" version="1" comment="kernel-default-base is &lt;5.3.18-24.12.1.9.4.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493343" version="1" comment="kernel-default-devel is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493344" version="1" comment="kernel-devel is &lt;5.3.18-24.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493345" version="1" comment="kernel-macros is &lt;5.3.18-24.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493346" version="1" comment="kernel-preempt is &lt;5.3.18-24.12.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492453" version="1" comment="libjpeg62 is &lt;62.2.0-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492454" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492455" version="1" comment="libjpeg8 is &lt;8.1.2-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492456" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492457" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493347" version="1" comment="kernel-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493348" version="1" comment="kernel-default-devel is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493349" version="1" comment="kernel-devel is &lt;5.3.18-24.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493350" version="1" comment="kernel-macros is &lt;5.3.18-24.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493351" version="1" comment="kernel-preempt is &lt;5.3.18-24.15.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492464" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492465" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492466" version="1" comment="libldap-data is &lt;2.4.46-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492467" version="1" comment="openldap2-client is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492468" version="1" comment="openldap2-devel is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492469" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492470" version="1" comment="libxml2-2 is &lt;2.9.7-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492471" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492472" version="1" comment="libxml2-devel is &lt;2.9.7-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492473" version="1" comment="libxml2-tools is &lt;2.9.7-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492474" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492475" version="1" comment="shim is &lt;15+git47-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493352" version="1" comment="perl-DBI is &lt;1.642-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492479" version="1" comment="libjasper4 is &lt;2.0.14-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492480" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492481" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492482" version="1" comment="libldap-data is &lt;2.4.46-9.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492483" version="1" comment="openldap2-client is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492484" version="1" comment="openldap2-devel is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492485" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492552" version="1" comment="cifs-utils is &lt;6.9-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492553" version="1" comment="cifs-utils-devel is &lt;6.9-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493353" version="1" comment="libdcerpc-binding0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493354" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493355" version="1" comment="libdcerpc-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493356" version="1" comment="libdcerpc-samr-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493357" version="1" comment="libdcerpc-samr0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493358" version="1" comment="libdcerpc0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493359" version="1" comment="libdcerpc0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493360" version="1" comment="libndr-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493361" version="1" comment="libndr-krb5pac-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493362" version="1" comment="libndr-krb5pac0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493363" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493364" version="1" comment="libndr-nbt-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493365" version="1" comment="libndr-nbt0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493366" version="1" comment="libndr-nbt0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493367" version="1" comment="libndr-standard-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493368" version="1" comment="libndr-standard0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493369" version="1" comment="libndr-standard0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493370" version="1" comment="libndr0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493371" version="1" comment="libndr0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493372" version="1" comment="libnetapi-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493373" version="1" comment="libnetapi0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493374" version="1" comment="libnetapi0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493375" version="1" comment="libsamba-credentials-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493376" version="1" comment="libsamba-credentials0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493377" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493378" version="1" comment="libsamba-errors-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493379" version="1" comment="libsamba-errors0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493380" version="1" comment="libsamba-errors0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493381" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493382" version="1" comment="libsamba-hostconfig0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493383" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493384" version="1" comment="libsamba-passdb-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493385" version="1" comment="libsamba-passdb0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493386" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493387" version="1" comment="libsamba-policy-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493388" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493389" version="1" comment="libsamba-policy0-python3 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493390" version="1" comment="libsamba-util-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493391" version="1" comment="libsamba-util0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493392" version="1" comment="libsamba-util0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493393" version="1" comment="libsamdb-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493394" version="1" comment="libsamdb0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493395" version="1" comment="libsamdb0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493396" version="1" comment="libsmbclient-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493397" version="1" comment="libsmbclient0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493398" version="1" comment="libsmbconf-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493399" version="1" comment="libsmbconf0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493400" version="1" comment="libsmbconf0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493401" version="1" comment="libsmbldap-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493402" version="1" comment="libsmbldap2 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493403" version="1" comment="libsmbldap2-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493404" version="1" comment="libtevent-util-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493405" version="1" comment="libtevent-util0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493406" version="1" comment="libtevent-util0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493407" version="1" comment="libwbclient-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493408" version="1" comment="libwbclient0 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493409" version="1" comment="libwbclient0-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493410" version="1" comment="samba is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493411" version="1" comment="samba-ceph is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493412" version="1" comment="samba-client is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493413" version="1" comment="samba-core-devel is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493414" version="1" comment="samba-libs is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493415" version="1" comment="samba-libs-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493416" version="1" comment="samba-libs-python3 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493417" version="1" comment="samba-python3 is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493418" version="1" comment="samba-winbind is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493419" version="1" comment="samba-winbind-32bit is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492554" version="1" comment="libcontainers-common is &lt;20200727-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493420" version="1" comment="bcm43xx-firmware is &lt;20180314-15.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493421" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493422" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493423" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493424" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493425" version="1" comment="libQt5Core5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493426" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493427" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493428" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493429" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493430" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493431" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493432" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493433" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493434" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493435" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493436" version="1" comment="libQt5Network5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493437" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493438" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493439" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493440" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493441" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493442" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493443" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493444" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493445" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493446" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493447" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493448" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493449" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493450" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493451" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493452" version="1" comment="libQt5Test5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493453" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493454" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493455" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493456" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493457" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493458" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493459" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493460" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492595" version="1" comment="libtiff-devel is &lt;4.0.9-5.30.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492596" version="1" comment="libtiff5 is &lt;4.0.9-5.30.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492597" version="1" comment="python3-pip is &lt;10.0.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493461" version="1" comment="xen-libs is &lt;4.13.1_08-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493462" version="1" comment="xen-tools-domU is &lt;4.13.1_08-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493463" version="1" comment="perl-DBI is &lt;1.642-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493464" version="1" comment="gnutls is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493465" version="1" comment="libgnutls-devel is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493466" version="1" comment="libgnutls30 is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493467" version="1" comment="libgnutls30-32bit is &lt;3.6.7-14.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493468" version="1" comment="libgnutls30-hmac is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493469" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-14.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493470" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493471" version="1" comment="libgnutlsxx28 is &lt;3.6.7-14.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493472" version="1" comment="qemu-tools is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493473" version="1" comment="kernel-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493474" version="1" comment="kernel-default-base is &lt;5.3.18-24.24.1.9.7.6 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493475" version="1" comment="kernel-default-devel is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493476" version="1" comment="kernel-devel is &lt;5.3.18-24.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493477" version="1" comment="kernel-macros is &lt;5.3.18-24.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493478" version="1" comment="kernel-preempt is &lt;5.3.18-24.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492604" version="1" comment="libXvnc1 is &lt;1.9.0-19.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492605" version="1" comment="tigervnc is &lt;1.9.0-19.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492606" version="1" comment="xorg-x11-Xvnc is &lt;1.9.0-19.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492607" version="1" comment="xorg-x11-Xvnc-module is &lt;1.9.0-19.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492608" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.9.0-19.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492609" version="1" comment="libproxy-devel is &lt;0.4.15-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492610" version="1" comment="libproxy1 is &lt;0.4.15-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492617" version="1" comment="bind-devel is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492618" version="1" comment="bind-utils is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492619" version="1" comment="libbind9-1600 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492620" version="1" comment="libdns1605 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492621" version="1" comment="libirs-devel is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492622" version="1" comment="libirs1601 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492623" version="1" comment="libisc1606 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492624" version="1" comment="libisccc1600 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492625" version="1" comment="libisccfg1600 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492626" version="1" comment="libns1604 is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492627" version="1" comment="python3-bind is &lt;9.16.6-12.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492628" version="1" comment="sysuser-shadow is &lt;2.0-4.2.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492630" version="1" comment="libada10 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493479" version="1" comment="libada10-32bit is &lt;10.2.1+git583-1.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492632" version="1" comment="libasan6 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492633" version="1" comment="libasan6-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492634" version="1" comment="libatomic1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492635" version="1" comment="libatomic1-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492636" version="1" comment="libgcc_s1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492637" version="1" comment="libgcc_s1-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492638" version="1" comment="libgfortran5 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492639" version="1" comment="libgfortran5-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492640" version="1" comment="libgo16 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492641" version="1" comment="libgo16-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492642" version="1" comment="libgomp1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492643" version="1" comment="libgomp1-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492644" version="1" comment="libitm1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492645" version="1" comment="libitm1-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492646" version="1" comment="liblsan0 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492647" version="1" comment="libobjc4 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492648" version="1" comment="libquadmath0 is &lt;10.2.1+git583-1.3.4 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492649" version="1" comment="libquadmath0-32bit is &lt;10.2.1+git583-1.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492650" version="1" comment="libstdc++6 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492651" version="1" comment="libstdc++6-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492652" version="1" comment="libstdc++6-devel-gcc10 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492653" version="1" comment="libstdc++6-locale is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492654" version="1" comment="libstdc++6-pp-gcc10 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492655" version="1" comment="libstdc++6-pp-gcc10-32bit is &lt;10.2.1+git583-1.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492656" version="1" comment="libtsan0 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492657" version="1" comment="libubsan1 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492658" version="1" comment="libubsan1-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492675" version="1" comment="hunspell is &lt;1.6.2-3.3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492676" version="1" comment="hunspell-devel is &lt;1.6.2-3.3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492677" version="1" comment="hunspell-tools is &lt;1.6.2-3.3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492678" version="1" comment="libhunspell-1_6-0 is &lt;1.6.2-3.3.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493480" version="1" comment="libvirt-libs is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493481" version="1" comment="kernel-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493482" version="1" comment="kernel-default-base is &lt;5.3.18-24.29.2.9.9.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493483" version="1" comment="kernel-default-devel is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493484" version="1" comment="kernel-devel is &lt;5.3.18-24.29.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493485" version="1" comment="kernel-macros is &lt;5.3.18-24.29.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493486" version="1" comment="kernel-preempt is &lt;5.3.18-24.29.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492693" version="1" comment="freetype2-devel is &lt;2.10.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492694" version="1" comment="libfreetype6 is &lt;2.10.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492695" version="1" comment="libfreetype6-32bit is &lt;2.10.1-4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493487" version="1" comment="bluez is &lt;5.48-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493488" version="1" comment="libbluetooth3 is &lt;5.48-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493489" version="1" comment="xen-libs is &lt;4.13.1_10-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493490" version="1" comment="xen-tools-domU is &lt;4.13.1_10-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492699" version="1" comment="binutils is &lt;2.35-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492700" version="1" comment="binutils-devel is &lt;2.35-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492701" version="1" comment="libctf-nobfd0 is &lt;2.35-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492702" version="1" comment="libctf0 is &lt;2.35-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493491" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493492" version="1" comment="libspice-client-glib-helper is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493493" version="1" comment="libspice-client-gtk-3_0-5 is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493494" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493495" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493496" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493497" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493498" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493499" version="1" comment="libdcerpc0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493500" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493501" version="1" comment="libndr-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493502" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493503" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493504" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493505" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493506" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493507" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493508" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493509" version="1" comment="libndr-standard0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493510" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493511" version="1" comment="libndr0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493512" version="1" comment="libndr0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493513" version="1" comment="libnetapi-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493514" version="1" comment="libnetapi0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493515" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493516" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493517" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493518" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493519" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493520" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493521" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493522" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493523" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493524" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493525" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493526" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493527" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493528" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493529" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493530" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493531" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493532" version="1" comment="libsamba-util0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493533" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493534" version="1" comment="libsamdb-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493535" version="1" comment="libsamdb0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493536" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493537" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493538" version="1" comment="libsmbclient0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493539" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493540" version="1" comment="libsmbconf0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493541" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493542" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493543" version="1" comment="libsmbldap2 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493544" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493545" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493546" version="1" comment="libtevent-util0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493547" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493548" version="1" comment="libwbclient-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493549" version="1" comment="libwbclient0 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493550" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493551" version="1" comment="samba is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493552" version="1" comment="samba-ceph is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493553" version="1" comment="samba-client is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493554" version="1" comment="samba-core-devel is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493555" version="1" comment="samba-libs is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493556" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493557" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493558" version="1" comment="samba-python3 is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493559" version="1" comment="samba-winbind is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493560" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.202.344b137b75d-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492703" version="1" comment="mozilla-nspr is &lt;4.25.1-3.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492704" version="1" comment="mozilla-nspr-32bit is &lt;4.25.1-3.15.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492705" version="1" comment="mozilla-nspr-devel is &lt;4.25.1-3.15.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492772" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-7.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492773" version="1" comment="python is &lt;2.7.17-7.44.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492774" version="1" comment="python-base is &lt;2.7.17-7.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493561" version="1" comment="kernel-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493562" version="1" comment="kernel-default-base is &lt;5.3.18-24.34.1.9.11.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493563" version="1" comment="kernel-default-devel is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493564" version="1" comment="kernel-devel is &lt;5.3.18-24.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493565" version="1" comment="kernel-macros is &lt;5.3.18-24.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493566" version="1" comment="kernel-preempt is &lt;5.3.18-24.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493567" version="1" comment="apache-commons-httpclient is &lt;3.1-11.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493568" version="1" comment="python3-salt is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493569" version="1" comment="salt is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493570" version="1" comment="salt-bash-completion is &lt;3000-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493571" version="1" comment="salt-doc is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493572" version="1" comment="salt-minion is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493573" version="1" comment="salt-zsh-completion is &lt;3000-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493574" version="1" comment="u-boot-rpiarm64 is &lt;2020.01-10.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493575" version="1" comment="u-boot-rpiarm64-doc is &lt;2020.01-10.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493576" version="1" comment="u-boot-tools is &lt;2020.01-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492777" version="1" comment="libwireshark13 is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492778" version="1" comment="libwiretap10 is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492779" version="1" comment="libwsutil11 is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492780" version="1" comment="wireshark is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492787" version="1" comment="libunwind is &lt;1.2.1-4.2.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492788" version="1" comment="libunwind-32bit is &lt;1.2.1-4.2.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492789" version="1" comment="libunwind-devel is &lt;1.2.1-4.2.3 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492790" version="1" comment="libzmq5 is &lt;4.2.3-3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492791" version="1" comment="libzmq5-32bit is &lt;4.2.3-3.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492792" version="1" comment="zeromq-devel is &lt;4.2.3-3.15.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492793" version="1" comment="python3-waitress is &lt;1.4.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493577" version="1" comment="ucode-intel is &lt;20201027-2.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493578" version="1" comment="kernel-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493579" version="1" comment="kernel-default-base is &lt;5.3.18-24.37.1.9.13.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493580" version="1" comment="kernel-default-devel is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493581" version="1" comment="kernel-devel is &lt;5.3.18-24.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493582" version="1" comment="kernel-macros is &lt;5.3.18-24.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493583" version="1" comment="kernel-preempt is &lt;5.3.18-24.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492803" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492804" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492805" version="1" comment="libldap-data is &lt;2.4.46-9.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492806" version="1" comment="openldap2-client is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492807" version="1" comment="openldap2-devel is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492808" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492809" version="1" comment="kernel-firmware is &lt;20200107-3.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492810" version="1" comment="ucode-amd is &lt;20200107-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492811" version="1" comment="tcpdump is &lt;4.9.2-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492812" version="1" comment="java-11-openjdk is &lt;11.0.9.0-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492813" version="1" comment="java-11-openjdk-demo is &lt;11.0.9.0-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492814" version="1" comment="java-11-openjdk-devel is &lt;11.0.9.0-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492815" version="1" comment="java-11-openjdk-headless is &lt;11.0.9.0-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493584" version="1" comment="ucode-intel is &lt;20201110-2.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492817" version="1" comment="libwireshark13 is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492818" version="1" comment="libwiretap10 is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492819" version="1" comment="libwsutil11 is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492820" version="1" comment="wireshark is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492821" version="1" comment="krb5 is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492822" version="1" comment="krb5-32bit is &lt;1.16.3-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492823" version="1" comment="krb5-client is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492824" version="1" comment="krb5-devel is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492825" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492826" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492827" version="1" comment="wpa_supplicant is &lt;2.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493585" version="1" comment="perl-DBI is &lt;1.642-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493586" version="1" comment="xen-libs is &lt;4.13.2_02-3.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493587" version="1" comment="xen-tools-domU is &lt;4.13.2_02-3.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493588" version="1" comment="libpq5 is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493589" version="1" comment="libpq5-32bit is &lt;12.5-8.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493590" version="1" comment="postgresql12 is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493591" version="1" comment="ceph-common is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493592" version="1" comment="libcephfs-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493593" version="1" comment="libcephfs2 is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493594" version="1" comment="librados-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493595" version="1" comment="librados2 is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493596" version="1" comment="libradospp-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493597" version="1" comment="librbd-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493598" version="1" comment="librbd1 is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493599" version="1" comment="librgw-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493600" version="1" comment="librgw2 is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493601" version="1" comment="python3-ceph-argparse is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493602" version="1" comment="python3-ceph-common is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493603" version="1" comment="python3-cephfs is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493604" version="1" comment="python3-rados is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493605" version="1" comment="python3-rbd is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493606" version="1" comment="python3-rgw is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493607" version="1" comment="rados-objclass-devel is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493608" version="1" comment="rbd-nbd is &lt;15.2.5.667+g1a579d5bf2-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492892" version="1" comment="postgresql10 is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492893" version="1" comment="c-ares-devel is &lt;1.17.0-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492894" version="1" comment="libcares2 is &lt;1.17.0-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492895" version="1" comment="libmariadb3 is &lt;3.1.11-3.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492896" version="1" comment="libmariadbprivate is &lt;3.1.11-3.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492903" version="1" comment="libssh2-1 is &lt;1.9.0-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492904" version="1" comment="libssh2-1-32bit is &lt;1.9.0-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492905" version="1" comment="libssh2-devel is &lt;1.9.0-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492906" version="1" comment="python3-pip is &lt;10.0.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492907" version="1" comment="python3-setuptools is &lt;40.5.0-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492908" version="1" comment="mutt is &lt;1.10.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492909" version="1" comment="mutt-doc is &lt;1.10.1-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492910" version="1" comment="mutt-lang is &lt;1.10.1-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493609" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493610" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493611" version="1" comment="python3-cryptography is &lt;2.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492913" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492914" version="1" comment="python3 is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492915" version="1" comment="python3-base is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492916" version="1" comment="python3-curses is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492917" version="1" comment="python3-dbm is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492918" version="1" comment="python3-devel is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492919" version="1" comment="python3-idle is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492921" version="1" comment="python3-tk is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492922" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492923" version="1" comment="python is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492924" version="1" comment="python-base is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493612" version="1" comment="xen-libs is &lt;4.13.2_04-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493613" version="1" comment="xen-tools-domU is &lt;4.13.2_04-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493614" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493615" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493616" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493617" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493618" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493619" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492940" version="1" comment="python3-urllib3 is &lt;1.24-9.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493620" version="1" comment="curl is &lt;7.66.0-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493621" version="1" comment="libcurl-devel is &lt;7.66.0-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493622" version="1" comment="libcurl4 is &lt;7.66.0-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493623" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493624" version="1" comment="openssh is &lt;8.1p1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493625" version="1" comment="openssh-helpers is &lt;8.1p1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492945" version="1" comment="python3-pip is &lt;20.0.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493626" version="1" comment="kernel-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493627" version="1" comment="kernel-default-base is &lt;5.3.18-24.43.2.9.17.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493628" version="1" comment="kernel-default-devel is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493629" version="1" comment="kernel-devel is &lt;5.3.18-24.43.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493630" version="1" comment="kernel-macros is &lt;5.3.18-24.43.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493631" version="1" comment="kernel-preempt is &lt;5.3.18-24.43.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492946" version="1" comment="cpp7 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492947" version="1" comment="gcc7 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492948" version="1" comment="gcc7-c++ is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492949" version="1" comment="gcc7-fortran is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492950" version="1" comment="libasan4 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492951" version="1" comment="libcilkrts5 is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492952" version="1" comment="libgfortran4 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492953" version="1" comment="libgfortran4-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492954" version="1" comment="libstdc++6-devel-gcc7 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492955" version="1" comment="libubsan0 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492956" version="1" comment="clamav is &lt;0.103.0-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492957" version="1" comment="clamav-devel is &lt;0.103.0-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492958" version="1" comment="libclamav9 is &lt;0.103.0-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492959" version="1" comment="libfreshclam2 is &lt;0.103.0-3.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493632" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493633" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493634" version="1" comment="libwebkit2gtk3-lang is &lt;2.30.3-3.9.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493635" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493636" version="1" comment="ceph-common is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493637" version="1" comment="libcephfs-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493638" version="1" comment="libcephfs2 is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493639" version="1" comment="librados-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493640" version="1" comment="librados2 is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493641" version="1" comment="libradospp-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493642" version="1" comment="librbd-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493643" version="1" comment="librbd1 is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493644" version="1" comment="librgw-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493645" version="1" comment="librgw2 is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493646" version="1" comment="python3-ceph-argparse is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493647" version="1" comment="python3-ceph-common is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493648" version="1" comment="python3-cephfs is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493649" version="1" comment="python3-rados is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493650" version="1" comment="python3-rbd is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493651" version="1" comment="python3-rgw is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493652" version="1" comment="rados-objclass-devel is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493653" version="1" comment="rbd-nbd is &lt;15.2.8.80+g1f4b6229ca-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493654" version="1" comment="xen-libs is &lt;4.13.2_06-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493655" version="1" comment="xen-tools-domU is &lt;4.13.2_06-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492968" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492969" version="1" comment="python3 is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492970" version="1" comment="python3-base is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492971" version="1" comment="python3-curses is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492972" version="1" comment="python3-dbm is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492973" version="1" comment="python3-devel is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492974" version="1" comment="python3-idle is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492976" version="1" comment="python3-tk is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492977" version="1" comment="flac-devel is &lt;1.3.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492978" version="1" comment="libFLAC++6 is &lt;1.3.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492979" version="1" comment="libFLAC8 is &lt;1.3.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493656" version="1" comment="curl is &lt;7.66.0-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493657" version="1" comment="libcurl-devel is &lt;7.66.0-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493658" version="1" comment="libcurl4 is &lt;7.66.0-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493659" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493660" version="1" comment="mozilla-nspr is &lt;4.25.1-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493661" version="1" comment="mozilla-nspr-32bit is &lt;4.25.1-3.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493662" version="1" comment="mozilla-nspr-devel is &lt;4.25.1-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493663" version="1" comment="OpenIPMI is &lt;2.0.25-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493664" version="1" comment="OpenIPMI-devel is &lt;2.0.25-7.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493665" version="1" comment="xen-libs is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493666" version="1" comment="xen-tools-domU is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493667" version="1" comment="gssproxy is &lt;0.8.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489348" version="1" comment="libzypp is &lt;17.25.5-3.25.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493668" version="1" comment="libzypp-devel is &lt;17.25.5-3.25.6 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489349" version="1" comment="yast2-installation is &lt;4.2.48-3.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493669" version="1" comment="zypper is &lt;1.14.41-3.14.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493670" version="1" comment="zypper-log is &lt;1.14.41-3.14.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493671" version="1" comment="zypper-needs-restarting is &lt;1.14.41-3.14.10 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493672" version="1" comment="libostree-1-1 is &lt;2020.8-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493673" version="1" comment="fwupdate is &lt;12-11.8.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493674" version="1" comment="fwupdate-devel is &lt;12-11.8.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493675" version="1" comment="fwupdate-efi is &lt;12-11.8.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493676" version="1" comment="libfwup1 is &lt;12-11.8.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493137" version="1" comment="libzstd-devel is &lt;1.4.4-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009489337" version="1" comment="libzstd1 is &lt;1.4.4-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493138" version="1" comment="libzstd1-32bit is &lt;1.4.4-1.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493139" version="1" comment="zstd is &lt;1.4.4-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493677" version="1" comment="ceph-common is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493678" version="1" comment="libcephfs-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493679" version="1" comment="libcephfs2 is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493680" version="1" comment="librados-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493681" version="1" comment="librados2 is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493682" version="1" comment="libradospp-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493683" version="1" comment="librbd-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493684" version="1" comment="librbd1 is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493685" version="1" comment="librgw-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493686" version="1" comment="librgw2 is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493687" version="1" comment="python3-ceph-argparse is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493688" version="1" comment="python3-ceph-common is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493689" version="1" comment="python3-cephfs is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493690" version="1" comment="python3-rados is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493691" version="1" comment="python3-rbd is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493692" version="1" comment="python3-rgw is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493693" version="1" comment="rados-objclass-devel is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493694" version="1" comment="rbd-nbd is &lt;15.2.9.83+g4275378de0-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493695" version="1" comment="tpm2-tss-engine is &lt;1.0.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493696" version="1" comment="tpm2-tss-engine-bash-completion is &lt;1.0.1-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493697" version="1" comment="tpm2-tss-engine-devel is &lt;1.0.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493698" version="1" comment="cifs-utils is &lt;6.9-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493699" version="1" comment="cifs-utils-devel is &lt;6.9-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493700" version="1" comment="perl-Mail-SpamAssassin is &lt;3.4.5-12.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493701" version="1" comment="spamassassin is &lt;3.4.5-12.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493702" version="1" comment="wpa_supplicant is &lt;2.9-4.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493703" version="1" comment="opensc is &lt;0.19.0-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493704" version="1" comment="kernel-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493705" version="1" comment="kernel-default-base is &lt;5.3.18-24.46.1.9.19.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493706" version="1" comment="kernel-default-devel is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493707" version="1" comment="kernel-devel is &lt;5.3.18-24.46.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493708" version="1" comment="kernel-macros is &lt;5.3.18-24.46.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493709" version="1" comment="kernel-preempt is &lt;5.3.18-24.46.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493710" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493711" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493712" version="1" comment="clamav is &lt;0.103.2-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493713" version="1" comment="clamav-devel is &lt;0.103.2-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493714" version="1" comment="libclamav9 is &lt;0.103.2-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493715" version="1" comment="libfreshclam2 is &lt;0.103.2-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493716" version="1" comment="kernel-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493717" version="1" comment="kernel-default-base is &lt;5.3.18-24.61.1.9.26.4 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493718" version="1" comment="kernel-default-devel is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493719" version="1" comment="kernel-devel is &lt;5.3.18-24.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493720" version="1" comment="kernel-macros is &lt;5.3.18-24.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493721" version="1" comment="kernel-preempt is &lt;5.3.18-24.61.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493722" version="1" comment="qemu-tools is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493723" version="1" comment="iscsiuio is &lt;0.7.8.6-22.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493724" version="1" comment="libopeniscsiusr0_2_0 is &lt;2.1.3-22.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493725" version="1" comment="open-iscsi is &lt;2.1.3-22.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493726" version="1" comment="open-iscsi-devel is &lt;2.1.3-22.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493727" version="1" comment="sudo is &lt;1.8.22-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493728" version="1" comment="sudo-devel is &lt;1.8.22-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493729" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493730" version="1" comment="ruby2.5 is &lt;2.5.9-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493731" version="1" comment="ruby2.5-devel is &lt;2.5.9-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493732" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493733" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493734" version="1" comment="apache-commons-io is &lt;2.6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493735" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493736" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493737" version="1" comment="libldap-data is &lt;2.4.46-9.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493738" version="1" comment="openldap2-client is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493739" version="1" comment="openldap2-devel is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493740" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493741" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.46.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493742" version="1" comment="librsvg-2-2 is &lt;2.46.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493743" version="1" comment="giflib-devel is &lt;5.1.4-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493744" version="1" comment="libgif7 is &lt;5.1.4-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493745" version="1" comment="libhogweed4 is &lt;3.4.1-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493746" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493747" version="1" comment="libnettle-devel is &lt;3.4.1-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493748" version="1" comment="libnettle6 is &lt;3.4.1-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493749" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493750" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493751" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493752" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.0-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493753" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493754" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493755" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493756" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493757" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493758" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493759" version="1" comment="libdcerpc0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493760" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493761" version="1" comment="libndr-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493762" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493763" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493764" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493765" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493766" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493767" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493768" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493769" version="1" comment="libndr-standard0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493770" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493771" version="1" comment="libndr0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493772" version="1" comment="libndr0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493773" version="1" comment="libnetapi-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493774" version="1" comment="libnetapi0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493775" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493776" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493777" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493778" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493779" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493780" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493781" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493782" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493783" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493784" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493785" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493786" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493787" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493788" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493789" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493790" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493791" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493792" version="1" comment="libsamba-util0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493793" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493794" version="1" comment="libsamdb-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493795" version="1" comment="libsamdb0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493796" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493797" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493798" version="1" comment="libsmbclient0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493799" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493800" version="1" comment="libsmbconf0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493801" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493802" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493803" version="1" comment="libsmbldap2 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493804" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493805" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493806" version="1" comment="libtevent-util0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493807" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493808" version="1" comment="libwbclient-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493809" version="1" comment="libwbclient0 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493810" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493811" version="1" comment="samba is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493812" version="1" comment="samba-ceph is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493813" version="1" comment="samba-client is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493814" version="1" comment="samba-core-devel is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493815" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493816" version="1" comment="samba-libs is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493817" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493818" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493819" version="1" comment="samba-python3 is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493820" version="1" comment="samba-winbind is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493821" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493822" version="1" comment="cups is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493823" version="1" comment="cups-client is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493824" version="1" comment="cups-config is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493825" version="1" comment="cups-devel is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493826" version="1" comment="libcups2 is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493827" version="1" comment="libcups2-32bit is &lt;2.2.7-3.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493828" version="1" comment="libcupscgi1 is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493829" version="1" comment="libcupsimage2 is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493830" version="1" comment="libcupsmime1 is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493831" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493832" version="1" comment="permissions is &lt;20181225-23.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493833" version="1" comment="permissions-zypp-plugin is &lt;20181225-23.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493834" version="1" comment="bind-devel is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493835" version="1" comment="bind-utils is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493836" version="1" comment="libbind9-1600 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493837" version="1" comment="libdns1605 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493838" version="1" comment="libirs-devel is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493839" version="1" comment="libirs1601 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493840" version="1" comment="libisc1606 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493841" version="1" comment="libisccc1600 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493842" version="1" comment="libisccfg1600 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493843" version="1" comment="libns1604 is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493844" version="1" comment="python3-bind is &lt;9.16.6-12.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493845" version="1" comment="ceph-common is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493846" version="1" comment="libcephfs-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493847" version="1" comment="libcephfs2 is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493848" version="1" comment="librados-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493849" version="1" comment="librados2 is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493850" version="1" comment="libradospp-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493851" version="1" comment="librbd-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493852" version="1" comment="librbd1 is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493853" version="1" comment="librgw-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493854" version="1" comment="librgw2 is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493855" version="1" comment="python3-ceph-argparse is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493856" version="1" comment="python3-ceph-common is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493857" version="1" comment="python3-cephfs is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493858" version="1" comment="python3-rados is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493859" version="1" comment="python3-rbd is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493860" version="1" comment="python3-rgw is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493861" version="1" comment="rados-objclass-devel is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493862" version="1" comment="rbd-nbd is &lt;15.2.11.83+g8a15f484c2-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493863" version="1" comment="p7zip is &lt;16.02-14.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493864" version="1" comment="p7zip-full is &lt;16.02-14.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493865" version="1" comment="avahi is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493866" version="1" comment="avahi-compat-howl-devel is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493867" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493868" version="1" comment="avahi-lang is &lt;0.7-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493869" version="1" comment="avahi-utils is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493870" version="1" comment="libavahi-client3 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493871" version="1" comment="libavahi-client3-32bit is &lt;0.7-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493872" version="1" comment="libavahi-common3 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493873" version="1" comment="libavahi-common3-32bit is &lt;0.7-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493874" version="1" comment="libavahi-core7 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493875" version="1" comment="libavahi-devel is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493876" version="1" comment="libavahi-glib-devel is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493877" version="1" comment="libavahi-glib1 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493878" version="1" comment="libavahi-gobject0 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493879" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493880" version="1" comment="libavahi-ui0 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493881" version="1" comment="libdns_sd is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493882" version="1" comment="libhowl0 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493883" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493884" version="1" comment="libxml2-2 is &lt;2.9.7-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493885" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493886" version="1" comment="libxml2-devel is &lt;2.9.7-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493887" version="1" comment="libxml2-tools is &lt;2.9.7-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493888" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493889" version="1" comment="java-11-openjdk is &lt;11.0.11.0-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493890" version="1" comment="java-11-openjdk-demo is &lt;11.0.11.0-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493891" version="1" comment="java-11-openjdk-devel is &lt;11.0.11.0-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493892" version="1" comment="java-11-openjdk-headless is &lt;11.0.11.0-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493893" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-3.81.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493894" version="1" comment="python3 is &lt;3.6.13-3.81.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493895" version="1" comment="python3-base is &lt;3.6.13-3.81.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493896" version="1" comment="python3-curses is &lt;3.6.13-3.81.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493897" version="1" comment="python3-dbm is &lt;3.6.13-3.81.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493898" version="1" comment="python3-devel is &lt;3.6.13-3.81.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493899" version="1" comment="python3-idle is &lt;3.6.13-3.81.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493900" version="1" comment="python3-tk is &lt;3.6.13-3.81.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493901" version="1" comment="shim is &lt;15.4-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493902" version="1" comment="kernel-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493903" version="1" comment="kernel-default-base is &lt;5.3.18-24.64.1.9.28.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493904" version="1" comment="kernel-default-devel is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493905" version="1" comment="kernel-devel is &lt;5.3.18-24.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493906" version="1" comment="kernel-macros is &lt;5.3.18-24.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493907" version="1" comment="kernel-preempt is &lt;5.3.18-24.64.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493908" version="1" comment="openvpn is &lt;2.4.3-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493909" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493910" version="1" comment="openvpn-devel is &lt;2.4.3-5.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493911" version="1" comment="libfdt-devel is &lt;1.5.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493912" version="1" comment="libfdt1 is &lt;1.5.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493913" version="1" comment="ipvsadm is &lt;1.29-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493146" version="1" comment="dnsmasq is &lt;2.78-7.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493914" version="1" comment="grub2 is &lt;2.04-9.45.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493915" version="1" comment="grub2-arm64-efi is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493916" version="1" comment="grub2-i386-pc is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493917" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493918" version="1" comment="grub2-s390x-emu is &lt;2.04-9.45.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493919" version="1" comment="grub2-snapper-plugin is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493920" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493921" version="1" comment="grub2-x86_64-efi is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493922" version="1" comment="liblz4-1 is &lt;1.8.0-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493923" version="1" comment="liblz4-1-32bit is &lt;1.8.0-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493924" version="1" comment="liblz4-devel is &lt;1.8.0-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493925" version="1" comment="lz4 is &lt;1.8.0-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493926" version="1" comment="graphviz is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493927" version="1" comment="graphviz-devel is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493928" version="1" comment="graphviz-plugins-core is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493929" version="1" comment="libgraphviz6 is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493930" version="1" comment="libxml2-2 is &lt;2.9.7-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493931" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493932" version="1" comment="libxml2-devel is &lt;2.9.7-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493933" version="1" comment="libxml2-tools is &lt;2.9.7-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493934" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493935" version="1" comment="fribidi is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493936" version="1" comment="fribidi-devel is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493937" version="1" comment="libfribidi0 is &lt;1.0.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493938" version="1" comment="libpq5 is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493939" version="1" comment="libpq5-32bit is &lt;13.1-5.3.15 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493940" version="1" comment="postgresql is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493941" version="1" comment="postgresql13 is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493942" version="1" comment="libu2f-host-devel is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493943" version="1" comment="libu2f-host0 is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493944" version="1" comment="u2f-host is &lt;1.1.10-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493945" version="1" comment="hivex-devel is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493946" version="1" comment="libhivex0 is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493947" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493948" version="1" comment="curl is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493949" version="1" comment="libcurl-devel is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493950" version="1" comment="libcurl4 is &lt;7.66.0-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493951" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493952" version="1" comment="libX11-6 is &lt;1.6.5-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493953" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493954" version="1" comment="libX11-data is &lt;1.6.5-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493955" version="1" comment="libX11-devel is &lt;1.6.5-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493956" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493957" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493958" version="1" comment="libpq5 is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493959" version="1" comment="libpq5-32bit is &lt;13.3-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493960" version="1" comment="postgresql13 is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493961" version="1" comment="python3-httplib2 is &lt;0.19.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493962" version="1" comment="gstreamer is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493963" version="1" comment="gstreamer-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493964" version="1" comment="gstreamer-plugins-base is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493965" version="1" comment="gstreamer-plugins-base-lang is &lt;1.16.3-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493966" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493967" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493968" version="1" comment="libgstallocators-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493969" version="1" comment="libgstapp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493970" version="1" comment="libgstaudio-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493971" version="1" comment="libgstfft-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493972" version="1" comment="libgstgl-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493973" version="1" comment="libgstpbutils-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493974" version="1" comment="libgstphotography-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493975" version="1" comment="libgstreamer-1_0-0 is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493976" version="1" comment="libgstriff-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493977" version="1" comment="libgstrtp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493978" version="1" comment="libgstrtsp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493979" version="1" comment="libgstsdp-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493980" version="1" comment="libgsttag-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493981" version="1" comment="libgstvideo-1_0-0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493982" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493147" version="1" comment="perl-Convert-ASN1 is &lt;0.27-1.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493983" version="1" comment="ceph-common is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493984" version="1" comment="libcephfs-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493985" version="1" comment="libcephfs2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493986" version="1" comment="librados-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493987" version="1" comment="librados2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493988" version="1" comment="libradospp-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493989" version="1" comment="librbd-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493990" version="1" comment="librbd1 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493991" version="1" comment="librgw-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493992" version="1" comment="librgw2 is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493993" version="1" comment="python3-ceph-argparse is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493994" version="1" comment="python3-ceph-common is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493995" version="1" comment="python3-cephfs is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493996" version="1" comment="python3-rados is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493997" version="1" comment="python3-rbd is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493998" version="1" comment="python3-rgw is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493999" version="1" comment="rados-objclass-devel is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494000" version="1" comment="rbd-nbd is &lt;15.2.12.83+g528da226523-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494001" version="1" comment="gdk-pixbuf-devel is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494002" version="1" comment="gdk-pixbuf-lang is &lt;2.40.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494003" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494004" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494005" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494006" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494007" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.40.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494008" version="1" comment="dhcp is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494009" version="1" comment="dhcp-client is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494010" version="1" comment="dhcp-devel is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494011" version="1" comment="libpolkit0 is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494012" version="1" comment="polkit is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494013" version="1" comment="polkit-devel is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494014" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494015" version="1" comment="python3-py is &lt;1.8.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494016" version="1" comment="libwavpack1 is &lt;5.4.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494017" version="1" comment="kernel-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494018" version="1" comment="kernel-default-base is &lt;5.3.18-24.67.3.9.30.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494019" version="1" comment="kernel-default-devel is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494020" version="1" comment="kernel-devel is &lt;5.3.18-24.67.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494021" version="1" comment="kernel-macros is &lt;5.3.18-24.67.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494022" version="1" comment="kernel-preempt is &lt;5.3.18-24.67.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494023" version="1" comment="qemu-tools is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494024" version="1" comment="libX11-6 is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494025" version="1" comment="libX11-6-32bit is &lt;1.6.5-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494026" version="1" comment="libX11-data is &lt;1.6.5-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494027" version="1" comment="libX11-devel is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494028" version="1" comment="libX11-xcb1 is &lt;1.6.5-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494029" version="1" comment="libX11-xcb1-32bit is &lt;1.6.5-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494030" version="1" comment="libxml2-2 is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494031" version="1" comment="libxml2-2-32bit is &lt;2.9.7-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494032" version="1" comment="libxml2-devel is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494033" version="1" comment="libxml2-tools is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494034" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494035" version="1" comment="ucode-intel is &lt;20210525-7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494036" version="1" comment="mutt is &lt;1.10.1-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494037" version="1" comment="mutt-doc is &lt;1.10.1-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494038" version="1" comment="mutt-lang is &lt;1.10.1-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494039" version="1" comment="libjpeg62 is &lt;62.2.0-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494040" version="1" comment="libjpeg62-devel is &lt;62.2.0-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494041" version="1" comment="libjpeg8 is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494042" version="1" comment="libjpeg8-devel is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494043" version="1" comment="libturbojpeg0 is &lt;8.1.2-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494044" version="1" comment="permissions is &lt;20181224-23.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494045" version="1" comment="permissions-zypp-plugin is &lt;20181224-23.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494046" version="1" comment="postgresql10 is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494047" version="1" comment="postgresql12 is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494052" version="1" comment="tpm2.0-tools is &lt;4.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494053" version="1" comment="python3-rsa is &lt;3.4.2-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494054" version="1" comment="xterm is &lt;330-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494055" version="1" comment="xterm-bin is &lt;330-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494057" version="1" comment="python3-distro is &lt;1.5.0-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494058" version="1" comment="python3-salt is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494059" version="1" comment="salt is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494060" version="1" comment="salt-bash-completion is &lt;3002.2-37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494061" version="1" comment="salt-doc is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494062" version="1" comment="salt-minion is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494063" version="1" comment="salt-zsh-completion is &lt;3002.2-37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494064" version="1" comment="libsbc1 is &lt;1.3-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494065" version="1" comment="libwireshark14 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494066" version="1" comment="libwiretap11 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494067" version="1" comment="libwsutil12 is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494068" version="1" comment="wireshark is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494069" version="1" comment="apache2 is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494070" version="1" comment="apache2-prefork is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494071" version="1" comment="apache2-utils is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494072" version="1" comment="cryptctl is &lt;2.4-4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494073" version="1" comment="libhogweed4 is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494074" version="1" comment="libhogweed4-32bit is &lt;3.4.1-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494075" version="1" comment="libnettle-devel is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494076" version="1" comment="libnettle6 is &lt;3.4.1-4.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494077" version="1" comment="libnettle6-32bit is &lt;3.4.1-4.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494078" version="1" comment="libgcrypt-devel is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494079" version="1" comment="libgcrypt20 is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494080" version="1" comment="libgcrypt20-32bit is &lt;1.8.2-8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494081" version="1" comment="libgcrypt20-hmac is &lt;1.8.2-8.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494082" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.8.2-8.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615873" version="1" comment="arpwatch is &lt;2.1a15-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494048" version="1" comment="liblua5_3-5 is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494049" version="1" comment="liblua5_3-5-32bit is &lt;5.3.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494050" version="1" comment="lua53 is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494051" version="1" comment="lua53-devel is &lt;5.3.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494056" version="1" comment="qemu-tools is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493148" version="1" comment="sudo is &lt;1.8.22-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493149" version="1" comment="sudo-devel is &lt;1.8.22-4.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615791" version="1" comment="dbus-1 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615792" version="1" comment="dbus-1-devel is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615793" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615794" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615795" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624163" version="1" comment="libsqlite3-0 is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624164" version="1" comment="libsqlite3-0-32bit is &lt;3.36.0-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624165" version="1" comment="sqlite3 is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624166" version="1" comment="sqlite3-devel is &lt;3.36.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624267" version="1" comment="kernel-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624268" version="1" comment="kernel-default-base is &lt;5.3.18-24.70.1.9.32.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624269" version="1" comment="kernel-default-devel is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624270" version="1" comment="kernel-devel is &lt;5.3.18-24.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624271" version="1" comment="kernel-macros is &lt;5.3.18-24.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624272" version="1" comment="kernel-preempt is &lt;5.3.18-24.70.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625549" version="1" comment="libsystemd0 is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625550" version="1" comment="libsystemd0-32bit is &lt;234-24.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625551" version="1" comment="libudev-devel is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625552" version="1" comment="libudev1 is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625553" version="1" comment="libudev1-32bit is &lt;234-24.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625554" version="1" comment="systemd is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625555" version="1" comment="systemd-32bit is &lt;234-24.90.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625556" version="1" comment="systemd-bash-completion is &lt;234-24.90.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625557" version="1" comment="systemd-container is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625558" version="1" comment="systemd-coredump is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625559" version="1" comment="systemd-devel is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625560" version="1" comment="systemd-sysvinit is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625561" version="1" comment="udev is &lt;234-24.90.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625978" version="1" comment="kernel-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625979" version="1" comment="kernel-default-base is &lt;5.3.18-24.75.3.9.34.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625980" version="1" comment="kernel-default-devel is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625546" version="1" comment="kernel-devel is &lt;5.3.18-24.75.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625547" version="1" comment="kernel-macros is &lt;5.3.18-24.75.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625981" version="1" comment="kernel-preempt is &lt;5.3.18-24.75.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625982" version="1" comment="curl is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625983" version="1" comment="libcurl-devel is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625984" version="1" comment="libcurl4 is &lt;7.66.0-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625985" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624701" version="1" comment="libwireshark14 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624702" version="1" comment="libwiretap11 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624703" version="1" comment="libwsutil12 is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624704" version="1" comment="wireshark is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624887" version="1" comment="libvirt-libs is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626209" version="1" comment="qemu-tools is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626880" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626881" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626882" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.3-9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626883" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630557" version="1" comment="cpio is &lt;2.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630558" version="1" comment="cpio-lang is &lt;2.12-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630559" version="1" comment="cpio-mt is &lt;2.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627850" version="1" comment="kernel-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627851" version="1" comment="kernel-default-base is &lt;5.3.18-24.78.1.9.36.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627852" version="1" comment="kernel-default-devel is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627853" version="1" comment="kernel-devel is &lt;5.3.18-24.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627854" version="1" comment="kernel-macros is &lt;5.3.18-24.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627855" version="1" comment="kernel-preempt is &lt;5.3.18-24.78.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630341" version="1" comment="c-ares-devel is &lt;1.17.1+20200724-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630342" version="1" comment="libcares2 is &lt;1.17.1+20200724-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626824" version="1" comment="libsndfile-devel is &lt;1.0.28-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626825" version="1" comment="libsndfile1 is &lt;1.0.28-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630343" version="1" comment="qemu-tools is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628201" version="1" comment="fetchmail is &lt;6.3.26-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627846" version="1" comment="aspell is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627847" version="1" comment="aspell-devel is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627848" version="1" comment="libaspell15 is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627849" version="1" comment="libpspell15 is &lt;0.60.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626699" version="1" comment="krb5 is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626700" version="1" comment="krb5-32bit is &lt;1.16.3-3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626701" version="1" comment="krb5-client is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626702" version="1" comment="krb5-devel is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626703" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626704" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625976" version="1" comment="libmspack-devel is &lt;0.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625977" version="1" comment="libmspack0 is &lt;0.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626210" version="1" comment="dbus-1 is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626211" version="1" comment="dbus-1-devel is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626212" version="1" comment="dbus-1-x11 is &lt;1.12.2-8.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626213" version="1" comment="libdbus-1-3 is &lt;1.12.2-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626214" version="1" comment="libdbus-1-3-32bit is &lt;1.12.2-8.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626945" version="1" comment="python3-asn1crypto is &lt;0.24.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626946" version="1" comment="python3-boto3 is &lt;1.17.9-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626947" version="1" comment="python3-botocore is &lt;1.20.9-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626948" version="1" comment="python3-cffi is &lt;1.13.2-3.2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626949" version="1" comment="python3-cryptography is &lt;2.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626950" version="1" comment="python3-pyOpenSSL is &lt;17.5.0-8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626951" version="1" comment="python3-pyasn1 is &lt;0.4.2-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626952" version="1" comment="python3-pycparser is &lt;2.17-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626953" version="1" comment="python3-urllib3 is &lt;1.25.10-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631622" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631623" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631624" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631625" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631626" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631627" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494083" version="1" comment="cups is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494084" version="1" comment="cups-client is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494085" version="1" comment="cups-config is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494086" version="1" comment="cups-devel is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494087" version="1" comment="libcups2 is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494088" version="1" comment="libcups2-32bit is &lt;2.2.7-3.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494089" version="1" comment="libcupscgi1 is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494090" version="1" comment="libcupsimage2 is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494091" version="1" comment="libcupsmime1 is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494092" version="1" comment="libcupsppdc1 is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631131" version="1" comment="spectre-meltdown-checker is &lt;0.44-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628037" version="1" comment="gstreamer-plugins-good is &lt;1.16.3-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628038" version="1" comment="gstreamer-plugins-good-lang is &lt;1.16.3-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632243" version="1" comment="xen-libs is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632244" version="1" comment="xen-tools-domU is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629426" version="1" comment="libesmtp is &lt;1.0.6-150.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009629427" version="1" comment="libesmtp-devel is &lt;1.0.6-150.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626380" version="1" comment="java-11-openjdk is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626381" version="1" comment="java-11-openjdk-demo is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626382" version="1" comment="java-11-openjdk-devel is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626383" version="1" comment="java-11-openjdk-headless is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631128" version="1" comment="apache2 is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631129" version="1" comment="apache2-prefork is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631130" version="1" comment="apache2-utils is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631810" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631811" version="1" comment="libxerces-c-devel is &lt;3.1.4-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632506" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632507" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632508" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632509" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632510" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632511" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632014" version="1" comment="libwireshark14 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632015" version="1" comment="libwiretap11 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632016" version="1" comment="libwsutil12 is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632017" version="1" comment="wireshark is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632741" version="1" comment="ghostscript is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632742" version="1" comment="ghostscript-devel is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632743" version="1" comment="ghostscript-x11 is &lt;9.52-155.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631871" version="1" comment="libcroco is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631872" version="1" comment="libcroco-0_6-3 is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631873" version="1" comment="libcroco-0_6-3-32bit is &lt;0.6.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631874" version="1" comment="libcroco-devel is &lt;0.6.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633428" version="1" comment="xen-libs is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633429" version="1" comment="xen-tools-domU is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632563" version="1" comment="hivex-devel is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632564" version="1" comment="libhivex0 is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632565" version="1" comment="perl-Win-Hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633201" version="1" comment="kernel-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633202" version="1" comment="kernel-default-base is &lt;5.3.18-24.83.2.9.38.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633203" version="1" comment="kernel-default-devel is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633204" version="1" comment="kernel-devel is &lt;5.3.18-24.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633205" version="1" comment="kernel-macros is &lt;5.3.18-24.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633206" version="1" comment="kernel-preempt is &lt;5.3.18-24.83.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633463" version="1" comment="libgd3 is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632654" version="1" comment="libpq5 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632655" version="1" comment="libpq5-32bit is &lt;13.4-5.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632656" version="1" comment="postgresql13 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632657" version="1" comment="postgresql12 is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633973" version="1" comment="curl is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633974" version="1" comment="libcurl-devel is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633975" version="1" comment="libcurl4 is &lt;7.66.0-4.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633976" version="1" comment="libcurl4-32bit is &lt;7.66.0-4.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633879" version="1" comment="git-core is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633461" version="1" comment="libcryptopp-devel is &lt;5.6.5-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633462" version="1" comment="libcryptopp5_6_5 is &lt;5.6.5-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634043" version="1" comment="libsystemd0 is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634044" version="1" comment="libsystemd0-32bit is &lt;234-24.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634045" version="1" comment="libudev-devel is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634046" version="1" comment="libudev1 is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634047" version="1" comment="libudev1-32bit is &lt;234-24.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634048" version="1" comment="systemd is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634049" version="1" comment="systemd-32bit is &lt;234-24.93.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634050" version="1" comment="systemd-bash-completion is &lt;234-24.93.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634051" version="1" comment="systemd-container is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634052" version="1" comment="systemd-coredump is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634053" version="1" comment="systemd-devel is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634054" version="1" comment="systemd-sysvinit is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634055" version="1" comment="udev is &lt;234-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634056" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634057" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634058" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634059" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634554" version="1" comment="libQt5Svg5 is &lt;5.12.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634555" version="1" comment="libqt5-qtsvg-devel is &lt;5.12.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634543" version="1" comment="glibc is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634544" version="1" comment="glibc-32bit is &lt;2.26-13.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634545" version="1" comment="glibc-devel is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634546" version="1" comment="glibc-extra is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634547" version="1" comment="glibc-i18ndata is &lt;2.26-13.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634548" version="1" comment="glibc-info is &lt;2.26-13.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634549" version="1" comment="glibc-locale is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634550" version="1" comment="glibc-locale-base is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634551" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634552" version="1" comment="glibc-profile is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634553" version="1" comment="nscd is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652117" version="1" comment="python3-rpm is &lt;4.14.1-22.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652118" version="1" comment="rpm is &lt;4.14.1-22.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652119" version="1" comment="rpm-32bit is &lt;4.14.1-22.4.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652120" version="1" comment="rpm-devel is &lt;4.14.1-22.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652099" version="1" comment="kernel-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652100" version="1" comment="kernel-default-base is &lt;5.3.18-24.86.2.9.40.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652101" version="1" comment="kernel-default-devel is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652102" version="1" comment="kernel-devel is &lt;5.3.18-24.86.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652103" version="1" comment="kernel-macros is &lt;5.3.18-24.86.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652104" version="1" comment="kernel-preempt is &lt;5.3.18-24.86.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652105" version="1" comment="kmod is &lt;25-6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652106" version="1" comment="kmod-bash-completion is &lt;25-6.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652107" version="1" comment="kmod-compat is &lt;25-6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652108" version="1" comment="libkmod-devel is &lt;25-6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652109" version="1" comment="libkmod2 is &lt;25-6.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652110" version="1" comment="perl-Bootloader is &lt;0.931-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632226" version="1" comment="krb5 is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632227" version="1" comment="krb5-32bit is &lt;1.16.3-3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632228" version="1" comment="krb5-client is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632229" version="1" comment="krb5-devel is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632230" version="1" comment="krb5-plugin-preauth-otp is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632231" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652739" version="1" comment="strongswan is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652740" version="1" comment="strongswan-doc is &lt;5.8.2-11.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652741" version="1" comment="strongswan-hmac is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652742" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652743" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652625" version="1" comment="python3-Pygments is &lt;2.6.1-7.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651614" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651615" version="1" comment="python is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651616" version="1" comment="python-base is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652191" version="1" comment="libncurses6 is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652192" version="1" comment="libncurses6-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652193" version="1" comment="ncurses-devel is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652194" version="1" comment="ncurses-utils is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652195" version="1" comment="tack is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652196" version="1" comment="terminfo is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652197" version="1" comment="terminfo-base is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652198" version="1" comment="terminfo-iterm is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652199" version="1" comment="terminfo-screen is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651617" version="1" comment="fetchmail is &lt;6.3.26-20.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494093" version="1" comment="java-11-openjdk is &lt;11.0.10.0-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494094" version="1" comment="java-11-openjdk-demo is &lt;11.0.10.0-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494095" version="1" comment="java-11-openjdk-devel is &lt;11.0.10.0-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494096" version="1" comment="java-11-openjdk-headless is &lt;11.0.10.0-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652736" version="1" comment="apache2 is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652737" version="1" comment="apache2-prefork is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652738" version="1" comment="apache2-utils is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651382" version="1" comment="libblkid-devel is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651383" version="1" comment="libblkid-devel-static is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651384" version="1" comment="libblkid1 is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651385" version="1" comment="libblkid1-32bit is &lt;2.33.2-4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651386" version="1" comment="libfdisk-devel is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651387" version="1" comment="libfdisk1 is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651388" version="1" comment="libmount-devel is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651389" version="1" comment="libmount1 is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651390" version="1" comment="libmount1-32bit is &lt;2.33.2-4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651391" version="1" comment="libsmartcols-devel is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651392" version="1" comment="libsmartcols1 is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651393" version="1" comment="libuuid-devel is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651394" version="1" comment="libuuid-devel-static is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651395" version="1" comment="libuuid1 is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651396" version="1" comment="libuuid1-32bit is &lt;2.33.2-4.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651397" version="1" comment="util-linux is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651398" version="1" comment="util-linux-lang is &lt;2.33.2-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651399" version="1" comment="util-linux-systemd is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652624" version="1" comment="wireguard-tools is &lt;1.0.20200827-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652864" version="1" comment="libpcre1 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652865" version="1" comment="libpcre1-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652866" version="1" comment="libpcre16-0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652867" version="1" comment="libpcrecpp0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652868" version="1" comment="libpcrecpp0-32bit is &lt;8.45-20.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652869" version="1" comment="libpcreposix0 is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652870" version="1" comment="pcre-devel is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652871" version="1" comment="pcre-tools is &lt;8.45-20.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653308" version="1" comment="dnsmasq is &lt;2.86-7.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652734" version="1" comment="busybox is &lt;1.26.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652735" version="1" comment="busybox-static is &lt;1.26.2-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494097" version="1" comment="kernel-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494098" version="1" comment="kernel-default-base is &lt;5.3.18-24.49.2.9.21.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494099" version="1" comment="kernel-default-devel is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494100" version="1" comment="kernel-devel is &lt;5.3.18-24.49.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494101" version="1" comment="kernel-macros is &lt;5.3.18-24.49.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494102" version="1" comment="kernel-preempt is &lt;5.3.18-24.49.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494103" version="1" comment="libpython2_7-1_0 is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494104" version="1" comment="python is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494105" version="1" comment="python-base is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652111" version="1" comment="python3-salt is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652112" version="1" comment="salt is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652113" version="1" comment="salt-bash-completion is &lt;3002.2-49.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652114" version="1" comment="salt-doc is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652115" version="1" comment="salt-minion is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652116" version="1" comment="salt-zsh-completion is &lt;3002.2-49.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652304" version="1" comment="libvirt-libs is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653649" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653650" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653651" version="1" comment="libwebkit2gtk3-lang is &lt;2.32.4-15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653652" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652930" version="1" comment="qemu-tools is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653451" version="1" comment="binutils is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653452" version="1" comment="binutils-devel is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653453" version="1" comment="libctf-nobfd0 is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653454" version="1" comment="libctf0 is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654299" version="1" comment="binutils is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654300" version="1" comment="binutils-devel is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654301" version="1" comment="libctf-nobfd0 is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654302" version="1" comment="libctf0 is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654670" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654671" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654672" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654673" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654674" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654675" version="1" comment="libdcerpc0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654676" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654677" version="1" comment="libndr-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654678" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654679" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654680" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654681" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654682" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654683" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654684" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654685" version="1" comment="libndr-standard0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654686" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654687" version="1" comment="libndr0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654688" version="1" comment="libndr0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654689" version="1" comment="libnetapi-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654690" version="1" comment="libnetapi0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654691" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654692" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654693" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654694" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654695" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654696" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654697" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654698" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654699" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654700" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654701" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654702" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654703" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654704" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654705" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654706" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654707" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654708" version="1" comment="libsamba-util0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654709" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654710" version="1" comment="libsamdb-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654711" version="1" comment="libsamdb0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654712" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654713" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654714" version="1" comment="libsmbclient0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654715" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654716" version="1" comment="libsmbconf0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654717" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654718" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654719" version="1" comment="libsmbldap2 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654720" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654721" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654722" version="1" comment="libtevent-util0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654723" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654724" version="1" comment="libwbclient-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654725" version="1" comment="libwbclient0 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654726" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654727" version="1" comment="samba is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654728" version="1" comment="samba-ceph is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654729" version="1" comment="samba-client is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654730" version="1" comment="samba-core-devel is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654731" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654732" version="1" comment="samba-libs is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654733" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654734" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654735" version="1" comment="samba-python3 is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654736" version="1" comment="samba-winbind is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654737" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653309" version="1" comment="java-11-openjdk is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653310" version="1" comment="java-11-openjdk-demo is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653311" version="1" comment="java-11-openjdk-devel is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653312" version="1" comment="java-11-openjdk-headless is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655808" version="1" comment="kernel-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655809" version="1" comment="kernel-default-base is &lt;5.3.18-24.93.1.9.42.5 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655810" version="1" comment="kernel-default-devel is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655811" version="1" comment="kernel-devel is &lt;5.3.18-24.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655812" version="1" comment="kernel-macros is &lt;5.3.18-24.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655813" version="1" comment="kernel-preempt is &lt;5.3.18-24.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656735" version="1" comment="postgresql12 is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656417" version="1" comment="libpq5 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656418" version="1" comment="libpq5-32bit is &lt;14.1-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656419" version="1" comment="postgresql14 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655814" version="1" comment="postgresql13 is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654079" version="1" comment="bind-devel is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654080" version="1" comment="bind-utils is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654081" version="1" comment="libbind9-1600 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654082" version="1" comment="libdns1605 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654083" version="1" comment="libirs-devel is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654084" version="1" comment="libirs1601 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654085" version="1" comment="libisc1606 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654086" version="1" comment="libisccc1600 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654087" version="1" comment="libisccfg1600 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654088" version="1" comment="libns1604 is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654089" version="1" comment="python3-bind is &lt;9.16.6-12.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654288" version="1" comment="glibc is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654289" version="1" comment="glibc-32bit is &lt;2.26-13.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654290" version="1" comment="glibc-devel is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654291" version="1" comment="glibc-extra is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654292" version="1" comment="glibc-i18ndata is &lt;2.26-13.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654293" version="1" comment="glibc-info is &lt;2.26-13.62.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654294" version="1" comment="glibc-locale is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654295" version="1" comment="glibc-locale-base is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654296" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654297" version="1" comment="glibc-profile is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654298" version="1" comment="nscd is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657430" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657431" version="1" comment="ruby2.5 is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657432" version="1" comment="ruby2.5-devel is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657433" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657434" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657672" version="1" comment="python3-Pygments is &lt;2.6.1-7.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656414" version="1" comment="libspeex1 is &lt;1.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656415" version="1" comment="speex-devel is &lt;1.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657441" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657442" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657443" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.1-18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657444" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658528" version="1" comment="xen-libs is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658529" version="1" comment="xen-tools-domU is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658779" version="1" comment="aaa_base is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658780" version="1" comment="aaa_base-extras is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657435" version="1" comment="kernel-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657436" version="1" comment="kernel-default-base is &lt;5.3.18-24.96.1.9.44.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657437" version="1" comment="kernel-default-devel is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657438" version="1" comment="kernel-devel is &lt;5.3.18-24.96.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657439" version="1" comment="kernel-macros is &lt;5.3.18-24.96.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657440" version="1" comment="kernel-preempt is &lt;5.3.18-24.96.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659026" version="1" comment="libfreebl3 is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659027" version="1" comment="libfreebl3-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659028" version="1" comment="libfreebl3-hmac is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659029" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659030" version="1" comment="libsoftokn3 is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659031" version="1" comment="libsoftokn3-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659032" version="1" comment="libsoftokn3-hmac is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659033" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659034" version="1" comment="mozilla-nss is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659035" version="1" comment="mozilla-nss-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659036" version="1" comment="mozilla-nss-certs is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659037" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.1-3.61.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659038" version="1" comment="mozilla-nss-devel is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659039" version="1" comment="mozilla-nss-sysinit is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659040" version="1" comment="mozilla-nss-tools is &lt;3.68.1-3.61.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658079" version="1" comment="libwireshark14 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658080" version="1" comment="libwiretap11 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658081" version="1" comment="libwsutil12 is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658082" version="1" comment="wireshark is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658531" version="1" comment="libbrotli-devel is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658532" version="1" comment="libbrotlicommon1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658533" version="1" comment="libbrotlidec1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658534" version="1" comment="libbrotlienc1 is &lt;1.0.7-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658878" version="1" comment="glib-networking is &lt;2.62.4-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658879" version="1" comment="glib-networking-lang is &lt;2.62.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658530" version="1" comment="python3-Babel is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656938" version="1" comment="gmp-devel is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656939" version="1" comment="libgmp10 is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656940" version="1" comment="libgmp10-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656941" version="1" comment="libgmpxx4 is &lt;6.1.2-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656934" version="1" comment="clamav is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656935" version="1" comment="clamav-devel is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656936" version="1" comment="libclamav9 is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656937" version="1" comment="libfreshclam2 is &lt;0.103.4-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659025" version="1" comment="python3-pip is &lt;20.0.2-6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659016" version="1" comment="libpython3_6m1_0 is &lt;3.6.15-3.91.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659017" version="1" comment="python3 is &lt;3.6.15-3.91.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659018" version="1" comment="python3-base is &lt;3.6.15-3.91.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659019" version="1" comment="python3-curses is &lt;3.6.15-3.91.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659020" version="1" comment="python3-dbm is &lt;3.6.15-3.91.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659021" version="1" comment="python3-devel is &lt;3.6.15-3.91.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659022" version="1" comment="python3-idle is &lt;3.6.15-3.91.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659023" version="1" comment="python3-tk is &lt;3.6.15-3.91.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657429" version="1" comment="fetchmail is &lt;6.4.22-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656416" version="1" comment="postgresql10 is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659799" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659800" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660087" version="1" comment="log4j12 is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659793" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659794" version="1" comment="libp11-kit0-32bit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659795" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659796" version="1" comment="p11-kit-devel is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659797" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659798" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661025" version="1" comment="permissions is &lt;20181225-23.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661026" version="1" comment="permissions-zypp-plugin is &lt;20181225-23.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658281" version="1" comment="kernel-firmware is &lt;20200107-3.23.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658282" version="1" comment="ucode-amd is &lt;20200107-3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494106" version="1" comment="subversion is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494107" version="1" comment="subversion-devel is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494108" version="1" comment="wpa_supplicant is &lt;2.9-4.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494109" version="1" comment="libjasper4 is &lt;2.0.14-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494110" version="1" comment="screen is &lt;4.6.2-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494111" version="1" comment="bind-devel is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494112" version="1" comment="bind-utils is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494113" version="1" comment="libbind9-1600 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494114" version="1" comment="libdns1605 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494115" version="1" comment="libirs-devel is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494116" version="1" comment="libirs1601 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494117" version="1" comment="libisc1606 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494118" version="1" comment="libisccc1600 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494119" version="1" comment="libisccfg1600 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494120" version="1" comment="libns1604 is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494121" version="1" comment="python3-bind is &lt;9.16.6-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494122" version="1" comment="qemu-tools is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494123" version="1" comment="libpython3_6m1_0 is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494124" version="1" comment="python3 is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494125" version="1" comment="python3-base is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494126" version="1" comment="python3-curses is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494127" version="1" comment="python3-dbm is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494128" version="1" comment="python3-devel is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494129" version="1" comment="python3-idle is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494130" version="1" comment="python3-tk is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494131" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494132" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494133" version="1" comment="libwebkit2gtk3-lang is &lt;2.30.5-3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494134" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494135" version="1" comment="libpq5 is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494136" version="1" comment="libpq5-32bit is &lt;13.2-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494137" version="1" comment="postgresql13 is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494138" version="1" comment="postgresql12 is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494139" version="1" comment="avahi is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494140" version="1" comment="avahi-compat-howl-devel is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494141" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494142" version="1" comment="avahi-lang is &lt;0.7-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494143" version="1" comment="avahi-utils is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494144" version="1" comment="libavahi-client3 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494145" version="1" comment="libavahi-client3-32bit is &lt;0.7-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494146" version="1" comment="libavahi-common3 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494147" version="1" comment="libavahi-common3-32bit is &lt;0.7-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494148" version="1" comment="libavahi-core7 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494149" version="1" comment="libavahi-devel is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494150" version="1" comment="libavahi-glib-devel is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494151" version="1" comment="libavahi-glib1 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494152" version="1" comment="libavahi-gobject0 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494153" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494154" version="1" comment="libavahi-ui0 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494155" version="1" comment="libdns_sd is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494156" version="1" comment="libhowl0 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494157" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494158" version="1" comment="python3-cryptography is &lt;2.8-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494159" version="1" comment="python3-salt is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494160" version="1" comment="salt is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494161" version="1" comment="salt-bash-completion is &lt;3000-24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494162" version="1" comment="salt-doc is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494163" version="1" comment="salt-minion is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494164" version="1" comment="salt-zsh-completion is &lt;3000-24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494165" version="1" comment="glibc is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494166" version="1" comment="glibc-32bit is &lt;2.26-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494167" version="1" comment="glibc-devel is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494168" version="1" comment="glibc-extra is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494169" version="1" comment="glibc-i18ndata is &lt;2.26-13.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494170" version="1" comment="glibc-info is &lt;2.26-13.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494171" version="1" comment="glibc-locale is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494172" version="1" comment="glibc-locale-base is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494173" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494174" version="1" comment="glibc-profile is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494175" version="1" comment="nscd is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494176" version="1" comment="python3-Jinja2 is &lt;2.10.1-3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494177" version="1" comment="grub2 is &lt;2.04-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494178" version="1" comment="grub2-arm64-efi is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494179" version="1" comment="grub2-i386-pc is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494180" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494181" version="1" comment="grub2-s390x-emu is &lt;2.04-9.34.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494182" version="1" comment="grub2-snapper-plugin is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494183" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494184" version="1" comment="grub2-x86_64-efi is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494185" version="1" comment="bind-devel is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494186" version="1" comment="bind-utils is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494187" version="1" comment="libbind9-1600 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494188" version="1" comment="libdns1605 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494189" version="1" comment="libirs-devel is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494190" version="1" comment="libirs1601 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494191" version="1" comment="libisc1606 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494192" version="1" comment="libisccc1600 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494193" version="1" comment="libisccfg1600 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494194" version="1" comment="libns1604 is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494195" version="1" comment="python3-bind is &lt;9.16.6-12.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494196" version="1" comment="kernel-firmware is &lt;20200107-3.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494197" version="1" comment="ucode-amd is &lt;20200107-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494198" version="1" comment="wpa_supplicant is &lt;2.9-4.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494199" version="1" comment="libldap-2_4-2 is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494200" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.46-9.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494201" version="1" comment="libldap-data is &lt;2.4.46-9.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494202" version="1" comment="openldap2-client is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494203" version="1" comment="openldap2-devel is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494204" version="1" comment="openldap2-devel-static is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494205" version="1" comment="kernel-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494206" version="1" comment="kernel-default-base is &lt;5.3.18-24.52.1.9.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494207" version="1" comment="kernel-default-devel is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494208" version="1" comment="kernel-devel is &lt;5.3.18-24.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494209" version="1" comment="kernel-macros is &lt;5.3.18-24.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494210" version="1" comment="kernel-preempt is &lt;5.3.18-24.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494211" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494212" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494213" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494214" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494215" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494216" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494217" version="1" comment="git-core is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494218" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494219" version="1" comment="python is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494220" version="1" comment="python-base is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494221" version="1" comment="osasnmpd is &lt;2.11.0-9.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494222" version="1" comment="s390-tools is &lt;2.11.0-9.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494223" version="1" comment="s390-tools-hmcdrvfs is &lt;2.11.0-9.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494224" version="1" comment="s390-tools-zdsfs is &lt;2.11.0-9.20.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494225" version="1" comment="glib2-devel is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494226" version="1" comment="glib2-lang is &lt;2.62.6-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494227" version="1" comment="glib2-tools is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494228" version="1" comment="libgio-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494229" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494230" version="1" comment="libglib-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494231" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494232" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494233" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494234" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494235" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.6-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494236" version="1" comment="libgthread-2_0-0 is &lt;2.62.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494237" version="1" comment="libnghttp2-14 is &lt;1.40.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494238" version="1" comment="libnghttp2-14-32bit is &lt;1.40.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494239" version="1" comment="libnghttp2-devel is &lt;1.40.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494240" version="1" comment="libnghttp2_asio-devel is &lt;1.40.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494241" version="1" comment="libnghttp2_asio1 is &lt;1.40.0-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494242" version="1" comment="libruby2_5-2_5 is &lt;2.5.8-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494243" version="1" comment="ruby2.5 is &lt;2.5.8-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494244" version="1" comment="ruby2.5-devel is &lt;2.5.8-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494245" version="1" comment="ruby2.5-devel-extra is &lt;2.5.8-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494246" version="1" comment="ruby2.5-stdlib is &lt;2.5.8-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494247" version="1" comment="gnutls is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494248" version="1" comment="libgnutls-devel is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494249" version="1" comment="libgnutls30 is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494250" version="1" comment="libgnutls30-32bit is &lt;3.6.7-14.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494251" version="1" comment="libgnutls30-hmac is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494252" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-14.10.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494253" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494254" version="1" comment="libgnutlsxx28 is &lt;3.6.7-14.10.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494255" version="1" comment="ldb-tools is &lt;2.0.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494256" version="1" comment="libldb-devel is &lt;2.0.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494257" version="1" comment="libldb2 is &lt;2.0.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494258" version="1" comment="libldb2-32bit is &lt;2.0.12-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494259" version="1" comment="python3-ldb is &lt;2.0.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494260" version="1" comment="python3-ldb-devel is &lt;2.0.12-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494261" version="1" comment="libpython3_6m1_0 is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494262" version="1" comment="python3 is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494263" version="1" comment="python3-base is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494264" version="1" comment="python3-curses is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494265" version="1" comment="python3-dbm is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494266" version="1" comment="python3-devel is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494267" version="1" comment="python3-idle is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494268" version="1" comment="python3-tk is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494269" version="1" comment="libzstd-devel is &lt;1.4.4-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494270" version="1" comment="libzstd1 is &lt;1.4.4-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494271" version="1" comment="libzstd1-32bit is &lt;1.4.4-1.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494272" version="1" comment="zstd is &lt;1.4.4-1.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494273" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494274" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494275" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494276" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494277" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494278" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494279" version="1" comment="tar is &lt;1.30-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494280" version="1" comment="tar-lang is &lt;1.30-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494281" version="1" comment="tar-rmt is &lt;1.30-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662900" version="1" comment="apache2 is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662901" version="1" comment="apache2-prefork is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662902" version="1" comment="apache2-utils is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494392" version="1" comment="containerd is &lt;1.2.13-5.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494393" version="1" comment="docker is &lt;19.03.11_ce-6.34.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494394" version="1" comment="docker-bash-completion is &lt;19.03.11_ce-6.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494395" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2902_153d0769a118-4.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494396" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-6.38.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494397" version="1" comment="slirp4netns is &lt;0.4.7-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494398" version="1" comment="cni-plugins is &lt;0.8.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494399" version="1" comment="conmon is &lt;2.0.20-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494400" version="1" comment="fuse-overlayfs is &lt;1.1.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494401" version="1" comment="podman is &lt;2.0.6-4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494402" version="1" comment="podman-cni-config is &lt;2.0.6-4.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494403" version="1" comment="podman is &lt;2.1.1-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494404" version="1" comment="podman-cni-config is &lt;2.1.1-4.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494405" version="1" comment="buildah is &lt;1.17.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494420" version="1" comment="umoci is &lt;0.4.6-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494421" version="1" comment="umoci is &lt;0.4.7-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494422" version="1" comment="containerd is &lt;1.4.4-5.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494423" version="1" comment="docker is &lt;20.10.6_ce-6.49.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494424" version="1" comment="docker-bash-completion is &lt;20.10.6_ce-6.49.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494425" version="1" comment="runc is &lt;1.0.0~rc93-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624333" version="1" comment="containerized-data-importer-manifests is &lt;1.30.0-5.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624273" version="1" comment="kubevirt-manifests is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494426" version="1" comment="kubevirt-virtctl is &lt;0.40.0-5.11.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625590" version="1" comment="containerd is &lt;1.4.4-5.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651637" version="1" comment="containerd is &lt;1.4.11-56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651638" version="1" comment="docker is &lt;20.10.9_ce-156.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651639" version="1" comment="docker-bash-completion is &lt;20.10.9_ce-156.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651640" version="1" comment="runc is &lt;1.0.2-23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659247" version="1" comment="runc is &lt;1.0.3-27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494427" version="1" comment="containerd is &lt;1.3.9-5.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494428" version="1" comment="docker is &lt;19.03.15_ce-6.43.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494429" version="1" comment="docker-bash-completion is &lt;19.03.15_ce-6.43.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494430" version="1" comment="docker-libnetwork is &lt;0.7.0.1+gitr2908_55e924b8a842-4.28.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494431" version="1" comment="docker-runc is &lt;1.0.0rc10+gitr3981_dc9208a3303f-6.45.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495157" version="1" comment="libvpx-devel is &lt;1.6.1-6.6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495170" version="1" comment="libjasper-devel is &lt;2.0.14-3.11.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495171" version="1" comment="gvim is &lt;8.0.1568-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495172" version="1" comment="libexif-devel is &lt;0.6.22-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495173" version="1" comment="libexif12 is &lt;0.6.22-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495174" version="1" comment="MozillaFirefox is &lt;68.9.0-3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495175" version="1" comment="MozillaFirefox-devel is &lt;68.9.0-3.91.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495176" version="1" comment="MozillaFirefox-translations-common is &lt;68.9.0-3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495177" version="1" comment="MozillaFirefox-translations-other is &lt;68.9.0-3.91.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495210" version="1" comment="texlive-collection-basic is &lt;2017.135.svn41616-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495211" version="1" comment="texlive-collection-bibtexextra is &lt;2017.135.svn44385-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495212" version="1" comment="texlive-collection-binextra is &lt;2017.135.svn44515-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495213" version="1" comment="texlive-collection-context is &lt;2017.135.svn42330-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495214" version="1" comment="texlive-collection-fontsextra is &lt;2017.135.svn43356-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495215" version="1" comment="texlive-collection-fontsrecommended is &lt;2017.135.svn35830-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495216" version="1" comment="texlive-collection-fontutils is &lt;2017.135.svn37105-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495217" version="1" comment="texlive-collection-formatsextra is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495218" version="1" comment="texlive-collection-games is &lt;2017.135.svn42992-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495219" version="1" comment="texlive-collection-humanities is &lt;2017.135.svn42268-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495220" version="1" comment="texlive-collection-langarabic is &lt;2017.135.svn44496-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495221" version="1" comment="texlive-collection-langchinese is &lt;2017.135.svn42675-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495222" version="1" comment="texlive-collection-langcjk is &lt;2017.135.svn43009-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495223" version="1" comment="texlive-collection-langcyrillic is &lt;2017.135.svn44401-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495224" version="1" comment="texlive-collection-langczechslovak is &lt;2017.135.svn32550-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495225" version="1" comment="texlive-collection-langenglish is &lt;2017.135.svn43650-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495226" version="1" comment="texlive-collection-langeuropean is &lt;2017.135.svn44414-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495227" version="1" comment="texlive-collection-langfrench is &lt;2017.135.svn40375-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495228" version="1" comment="texlive-collection-langgerman is &lt;2017.135.svn42045-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495229" version="1" comment="texlive-collection-langgreek is &lt;2017.135.svn44192-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495230" version="1" comment="texlive-collection-langitalian is &lt;2017.135.svn30372-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495231" version="1" comment="texlive-collection-langjapanese is &lt;2017.135.svn44554-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495232" version="1" comment="texlive-collection-langkorean is &lt;2017.135.svn42106-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495233" version="1" comment="texlive-collection-langother is &lt;2017.135.svn44414-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495234" version="1" comment="texlive-collection-langpolish is &lt;2017.135.svn44371-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495235" version="1" comment="texlive-collection-langportuguese is &lt;2017.135.svn30962-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495236" version="1" comment="texlive-collection-langspanish is &lt;2017.135.svn40587-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495237" version="1" comment="texlive-collection-latex is &lt;2017.135.svn41614-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495238" version="1" comment="texlive-collection-latexextra is &lt;2017.135.svn44544-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495239" version="1" comment="texlive-collection-latexrecommended is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495240" version="1" comment="texlive-collection-luatex is &lt;2017.135.svn44500-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495241" version="1" comment="texlive-collection-mathscience is &lt;2017.135.svn44396-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495242" version="1" comment="texlive-collection-metapost is &lt;2017.135.svn44297-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495243" version="1" comment="texlive-collection-music is &lt;2017.135.svn40561-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495244" version="1" comment="texlive-collection-pictures is &lt;2017.135.svn44395-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495245" version="1" comment="texlive-collection-plaingeneric is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495246" version="1" comment="texlive-collection-pstricks is &lt;2017.135.svn44460-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495247" version="1" comment="texlive-collection-publishers is &lt;2017.135.svn44485-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495248" version="1" comment="texlive-collection-xetex is &lt;2017.135.svn43059-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495261" version="1" comment="texlive-devel is &lt;2017.135-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495281" version="1" comment="texlive-extratools is &lt;2017.135-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495283" version="1" comment="texlive-filesystem is &lt;2017.135-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495370" version="1" comment="texlive-scheme-basic is &lt;2017.135.svn25923-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495371" version="1" comment="texlive-scheme-context is &lt;2017.135.svn35799-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495372" version="1" comment="texlive-scheme-full is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495373" version="1" comment="texlive-scheme-gust is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495374" version="1" comment="texlive-scheme-infraonly is &lt;2017.135.svn41515-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495375" version="1" comment="texlive-scheme-medium is &lt;2017.135.svn44177-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495376" version="1" comment="texlive-scheme-minimal is &lt;2017.135.svn13822-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495377" version="1" comment="texlive-scheme-small is &lt;2017.135.svn41825-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495378" version="1" comment="texlive-scheme-tetex is &lt;2017.135.svn44187-9.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494989" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495426" version="1" comment="MozillaFirefox is &lt;78.0.1-3.94.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495427" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495428" version="1" comment="MozillaFirefox-devel is &lt;78.0.1-3.94.2 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495429" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.1-3.94.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495430" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.1-3.94.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495431" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495432" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495433" version="1" comment="openexr-devel is &lt;2.2.1-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495435" version="1" comment="MozillaFirefox is &lt;78.0.2-3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495436" version="1" comment="MozillaFirefox-devel is &lt;78.0.2-3.97.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495437" version="1" comment="MozillaFirefox-translations-common is &lt;78.0.2-3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495438" version="1" comment="MozillaFirefox-translations-other is &lt;78.0.2-3.97.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495635" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495636" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495637" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495638" version="1" comment="webkit2gtk3-devel is &lt;2.28.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495445" version="1" comment="libxcb-render0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495446" version="1" comment="libxcb-shm0-32bit is &lt;1.13-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495451" version="1" comment="wireshark-devel is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495452" version="1" comment="wireshark-ui-qt is &lt;3.2.5-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495639" version="1" comment="MozillaFirefox is &lt;78.1.0-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495640" version="1" comment="MozillaFirefox-branding-SLE is &lt;78-9.2.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495641" version="1" comment="MozillaFirefox-devel is &lt;78.1.0-8.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495642" version="1" comment="MozillaFirefox-translations-common is &lt;78.1.0-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495643" version="1" comment="MozillaFirefox-translations-other is &lt;78.1.0-8.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495644" version="1" comment="libpipewire-0_3-0 is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495645" version="1" comment="pipewire is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495646" version="1" comment="pipewire-modules is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495647" version="1" comment="pipewire-spa-plugins-0_2 is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495648" version="1" comment="pipewire-spa-tools is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495649" version="1" comment="pipewire-tools is &lt;0.3.6-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495650" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495651" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495652" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495653" version="1" comment="webkit2gtk3-devel is &lt;2.28.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495654" version="1" comment="fwupd is &lt;1.2.11-5.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495655" version="1" comment="fwupd-devel is &lt;1.2.11-5.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495656" version="1" comment="fwupd-lang is &lt;1.2.11-5.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495657" version="1" comment="libfwupd2 is &lt;1.2.11-5.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495658" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.2.11-5.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495462" version="1" comment="python-tk is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495659" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495660" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495661" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495662" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495663" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495467" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.15.7 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495468" version="1" comment="libjasper-devel is &lt;2.0.14-3.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495664" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495665" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495666" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495667" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495668" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495474" version="1" comment="libtiff5-32bit is &lt;4.0.9-5.30.28 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495669" version="1" comment="MozillaFirefox is &lt;78.3.0-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495670" version="1" comment="MozillaFirefox-devel is &lt;78.3.0-8.6.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495671" version="1" comment="MozillaFirefox-translations-common is &lt;78.3.0-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495672" version="1" comment="MozillaFirefox-translations-other is &lt;78.3.0-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495479" version="1" comment="libXvnc-devel is &lt;1.9.0-19.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495673" version="1" comment="ftdump is &lt;2.10.1-4.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495674" version="1" comment="MozillaFirefox is &lt;78.4.0-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495675" version="1" comment="MozillaFirefox-devel is &lt;78.4.0-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495676" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.0-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495677" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.0-8.11.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495678" version="1" comment="bluez-devel is &lt;5.48-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495484" version="1" comment="sane-backends is &lt;1.0.31-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495485" version="1" comment="sane-backends-autoconfig is &lt;1.0.31-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495486" version="1" comment="sane-backends-devel is &lt;1.0.31-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495487" version="1" comment="python-tk is &lt;2.7.17-7.44.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495679" version="1" comment="gnome-settings-daemon is &lt;3.34.2+0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495680" version="1" comment="gnome-settings-daemon-devel is &lt;3.34.2+0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495681" version="1" comment="gnome-settings-daemon-lang is &lt;3.34.2+0-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495682" version="1" comment="gnome-shell is &lt;3.34.5-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495683" version="1" comment="gnome-shell-devel is &lt;3.34.5-3.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495684" version="1" comment="gnome-shell-lang is &lt;3.34.5-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495685" version="1" comment="ImageMagick is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495686" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495687" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495688" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495689" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495690" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495691" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495497" version="1" comment="wireshark-devel is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495498" version="1" comment="wireshark-ui-qt is &lt;3.2.7-3.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495499" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-3.12.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495500" version="1" comment="libSDL-devel is &lt;1.2.15-3.12.73 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495692" version="1" comment="spice-vdagent is &lt;0.19.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495693" version="1" comment="MozillaFirefox is &lt;78.4.1-8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495694" version="1" comment="MozillaFirefox-devel is &lt;78.4.1-8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495695" version="1" comment="MozillaFirefox-translations-common is &lt;78.4.1-8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495696" version="1" comment="MozillaFirefox-translations-other is &lt;78.4.1-8.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495697" version="1" comment="gdm is &lt;3.34.1-8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495698" version="1" comment="gdm-devel is &lt;3.34.1-8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495699" version="1" comment="gdm-lang is &lt;3.34.1-8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495700" version="1" comment="gdm-systemd is &lt;3.34.1-8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495701" version="1" comment="gdmflexiserver is &lt;3.34.1-8.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495702" version="1" comment="libgdm1 is &lt;3.34.1-8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495703" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.34.1-8.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495704" version="1" comment="libraptor-devel is &lt;2.0.15-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495705" version="1" comment="libraptor2-0 is &lt;2.0.15-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495706" version="1" comment="raptor is &lt;2.0.15-9.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495508" version="1" comment="wireshark-devel is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495509" version="1" comment="wireshark-ui-qt is &lt;3.2.8-3.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495707" version="1" comment="MozillaFirefox is &lt;78.5.0-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495708" version="1" comment="MozillaFirefox-devel is &lt;78.5.0-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495709" version="1" comment="MozillaFirefox-translations-common is &lt;78.5.0-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495710" version="1" comment="MozillaFirefox-translations-other is &lt;78.5.0-8.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495519" version="1" comment="python-tk is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495711" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495712" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495713" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495714" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495715" version="1" comment="webkit2gtk3-devel is &lt;2.30.3-3.9.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495716" version="1" comment="MozillaFirefox is &lt;78.6.0-8.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495717" version="1" comment="MozillaFirefox-devel is &lt;78.6.0-8.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495718" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.0-8.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495719" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.0-8.20.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495720" version="1" comment="PackageKit is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495721" version="1" comment="PackageKit-backend-zypp is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495722" version="1" comment="PackageKit-devel is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495723" version="1" comment="PackageKit-lang is &lt;1.1.13-4.14.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495724" version="1" comment="libpackagekit-glib2-18 is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495725" version="1" comment="libpackagekit-glib2-devel is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495726" version="1" comment="typelib-1_0-PackageKitGlib-1_0 is &lt;1.1.13-4.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495543" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495544" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495545" version="1" comment="openexr-devel is &lt;2.2.1-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495727" version="1" comment="flatpak is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495728" version="1" comment="flatpak-devel is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495729" version="1" comment="flatpak-zsh-completion is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495730" version="1" comment="libflatpak0 is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495731" version="1" comment="libostree is &lt;2020.8-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495732" version="1" comment="libostree-devel is &lt;2020.8-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495733" version="1" comment="system-user-flatpak is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495734" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.2-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495735" version="1" comment="typelib-1_0-OSTree-1_0 is &lt;2020.8-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495736" version="1" comment="xdg-desktop-portal is &lt;1.8.0-5.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495737" version="1" comment="xdg-desktop-portal-devel is &lt;1.8.0-5.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495738" version="1" comment="xdg-desktop-portal-gtk is &lt;1.8.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495739" version="1" comment="xdg-desktop-portal-gtk-lang is &lt;1.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495740" version="1" comment="xdg-desktop-portal-lang is &lt;1.8.0-5.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495741" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495742" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495743" version="1" comment="openexr-devel is &lt;2.2.1-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495744" version="1" comment="fwupd is &lt;1.2.14-5.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495745" version="1" comment="fwupd-devel is &lt;1.2.14-5.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495746" version="1" comment="fwupd-lang is &lt;1.2.14-5.8.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495747" version="1" comment="libfwupd2 is &lt;1.2.14-5.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495748" version="1" comment="typelib-1_0-Fwupd-2_0 is &lt;1.2.14-5.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495749" version="1" comment="ImageMagick is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495750" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495751" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495752" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495753" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495754" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495755" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495756" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495757" version="1" comment="MozillaFirefox is &lt;78.10.0-8.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495758" version="1" comment="MozillaFirefox-devel is &lt;78.10.0-8.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495759" version="1" comment="MozillaFirefox-translations-common is &lt;78.10.0-8.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495760" version="1" comment="MozillaFirefox-translations-other is &lt;78.10.0-8.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495761" version="1" comment="librsvg-devel is &lt;2.46.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495762" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.46.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495763" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495764" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495765" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495766" version="1" comment="webkit2gtk3-devel is &lt;2.32.0-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495767" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495768" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495769" version="1" comment="openexr-devel is &lt;2.2.1-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495770" version="1" comment="avahi-autoipd is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495771" version="1" comment="avahi-utils-gtk is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495772" version="1" comment="libavahi-gobject-devel is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495773" version="1" comment="ImageMagick is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495774" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495775" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495776" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495777" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495778" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495779" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495780" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495781" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495782" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495783" version="1" comment="libfribidi0-32bit is &lt;1.0.5-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495784" version="1" comment="libass-devel is &lt;0.14.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495785" version="1" comment="libass9 is &lt;0.14.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494282" version="1" comment="gstreamer-devel is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495786" version="1" comment="gstreamer-plugins-bad is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495787" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495788" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495789" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.16.3-4.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494283" version="1" comment="gstreamer-plugins-base-devel is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494284" version="1" comment="gstreamer-utils is &lt;1.16.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495790" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495791" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495792" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495793" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495794" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495795" version="1" comment="libgstisoff-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495796" version="1" comment="libgstmpegts-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495797" version="1" comment="libgstplayer-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495798" version="1" comment="libgstsctp-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495799" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495800" version="1" comment="libgstwayland-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495801" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494285" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494286" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494287" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494288" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495802" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495803" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494289" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495804" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494290" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494291" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494292" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494293" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009494294" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.16.3-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495805" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.16.3-4.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495806" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.40.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495807" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.40.0-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495808" version="1" comment="wavpack is &lt;5.4.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495809" version="1" comment="wavpack-devel is &lt;5.4.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495810" version="1" comment="MozillaFirefox is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495811" version="1" comment="MozillaFirefox-devel is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495812" version="1" comment="MozillaFirefox-translations-common is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495813" version="1" comment="MozillaFirefox-translations-other is &lt;78.11.0-8.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495814" version="1" comment="libmodplug-devel is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495815" version="1" comment="libmodplug1 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495816" version="1" comment="libopenmpt-devel is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495817" version="1" comment="libopenmpt0 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495818" version="1" comment="libopenmpt_modplug1 is &lt;0.3.28-2.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495819" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495820" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495821" version="1" comment="libjpeg8-32bit is &lt;8.1.2-5.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495822" version="1" comment="sbc-devel is &lt;1.3-3.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495823" version="1" comment="wireshark-devel is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495824" version="1" comment="wireshark-ui-qt is &lt;3.4.5-3.53.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495825" version="1" comment="libgupnp-1_2-0 is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495826" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495827" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495828" version="1" comment="openexr-devel is &lt;2.2.1-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615885" version="1" comment="libavcodec57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615886" version="1" comment="libavformat57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615887" version="1" comment="libavutil-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615888" version="1" comment="libavutil55 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615889" version="1" comment="libpostproc-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615890" version="1" comment="libpostproc54 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615891" version="1" comment="libswresample-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615892" version="1" comment="libswresample2 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615893" version="1" comment="libswscale-devel is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615894" version="1" comment="libswscale4 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625193" version="1" comment="MozillaFirefox is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625194" version="1" comment="MozillaFirefox-devel is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625195" version="1" comment="MozillaFirefox-translations-common is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625196" version="1" comment="MozillaFirefox-translations-other is &lt;78.12.0-8.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624118" version="1" comment="caribou is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624119" version="1" comment="caribou-common is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624120" version="1" comment="caribou-devel is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624121" version="1" comment="caribou-gtk-module-common is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624122" version="1" comment="caribou-gtk2-module is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624123" version="1" comment="caribou-gtk3-module is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624124" version="1" comment="caribou-lang is &lt;0.4.21-12.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624125" version="1" comment="libcaribou0 is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624126" version="1" comment="typelib-1_0-Caribou-1_0 is &lt;0.4.21-12.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624706" version="1" comment="wireshark-devel is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624707" version="1" comment="wireshark-ui-qt is &lt;3.4.6-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495829" version="1" comment="MozillaFirefox is &lt;78.7.0-8.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495830" version="1" comment="MozillaFirefox-devel is &lt;78.7.0-8.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495831" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.0-8.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495832" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.0-8.26.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626884" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626885" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626886" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626887" version="1" comment="webkit2gtk3-devel is &lt;2.32.3-9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627351" version="1" comment="libdjvulibre-devel is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627352" version="1" comment="libdjvulibre21 is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630560" version="1" comment="MozillaFirefox is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630561" version="1" comment="MozillaFirefox-devel is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630562" version="1" comment="MozillaFirefox-translations-common is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630563" version="1" comment="MozillaFirefox-translations-other is &lt;78.13.0-8.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628202" version="1" comment="fetchmailconf is &lt;6.3.26-20.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628040" version="1" comment="libass-devel is &lt;0.14.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628041" version="1" comment="libass9 is &lt;0.14.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627865" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627866" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627867" version="1" comment="openexr-devel is &lt;2.2.1-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631132" version="1" comment="libavcodec57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631133" version="1" comment="libavformat57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631134" version="1" comment="libavresample-devel is &lt;3.4.2-11.8.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631135" version="1" comment="libavresample3 is &lt;3.4.2-11.8.2 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631136" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631137" version="1" comment="libavutil-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631138" version="1" comment="libavutil55 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631139" version="1" comment="libpostproc-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631140" version="1" comment="libpostproc54 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631141" version="1" comment="libswresample-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631142" version="1" comment="libswresample2 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631143" version="1" comment="libswscale-devel is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631144" version="1" comment="libswscale4 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632524" version="1" comment="libaom0 is &lt;1.0.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632018" version="1" comment="wireshark-devel is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632019" version="1" comment="wireshark-ui-qt is &lt;3.4.7-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632744" version="1" comment="libspectre-devel is &lt;0.2.8-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632745" version="1" comment="libspectre1 is &lt;0.2.8-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633282" version="1" comment="libavcodec57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633283" version="1" comment="libavformat57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633284" version="1" comment="libavresample-devel is &lt;3.4.2-11.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633285" version="1" comment="libavresample3 is &lt;3.4.2-11.11.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633286" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633287" version="1" comment="libavutil-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633288" version="1" comment="libavutil55 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633289" version="1" comment="libpostproc-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633290" version="1" comment="libpostproc54 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633291" version="1" comment="libswresample-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633292" version="1" comment="libswresample2 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633293" version="1" comment="libswscale-devel is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633294" version="1" comment="libswscale4 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633275" version="1" comment="grilo-devel is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633276" version="1" comment="libgrilo-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633277" version="1" comment="libgrlnet-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633278" version="1" comment="libgrlpls-0_3-0 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633279" version="1" comment="typelib-1_0-Grl-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633280" version="1" comment="typelib-1_0-GrlNet-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633281" version="1" comment="typelib-1_0-GrlPls-0_3 is &lt;0.3.12-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633466" version="1" comment="gd is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633464" version="1" comment="gd-devel is &lt;2.2.5-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634415" version="1" comment="libavcodec57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634416" version="1" comment="libavformat57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634417" version="1" comment="libavresample-devel is &lt;3.4.2-11.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634418" version="1" comment="libavresample3 is &lt;3.4.2-11.14.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634419" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634420" version="1" comment="libavutil-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634421" version="1" comment="libavutil55 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634422" version="1" comment="libpostproc-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634423" version="1" comment="libpostproc54 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634424" version="1" comment="libswresample-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634425" version="1" comment="libswresample2 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634426" version="1" comment="libswscale-devel is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634427" version="1" comment="libswscale4 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633465" version="1" comment="libaom0 is &lt;1.0.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634060" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634061" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634062" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634063" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-12.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634568" version="1" comment="libqt5-qtsvg-private-headers-devel is &lt;5.12.7-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651642" version="1" comment="MozillaFirefox is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651643" version="1" comment="MozillaFirefox-branding-SLE is &lt;91-9.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651644" version="1" comment="MozillaFirefox-devel is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651645" version="1" comment="MozillaFirefox-translations-common is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651646" version="1" comment="MozillaFirefox-translations-other is &lt;91.2.0-8.54.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651649" version="1" comment="flatpak is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651650" version="1" comment="flatpak-devel is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651651" version="1" comment="flatpak-zsh-completion is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651652" version="1" comment="libflatpak0 is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651653" version="1" comment="system-user-flatpak is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651654" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.5-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651647" version="1" comment="python-tk is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651648" version="1" comment="fetchmailconf is &lt;6.3.26-20.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652744" version="1" comment="libavcodec57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652745" version="1" comment="libavformat57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652746" version="1" comment="libavresample-devel is &lt;3.4.2-11.17.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652747" version="1" comment="libavresample3 is &lt;3.4.2-11.17.1 for aarch64,i586,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652748" version="1" comment="libavresample3-32bit is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652749" version="1" comment="libavutil-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652750" version="1" comment="libavutil55 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652751" version="1" comment="libpostproc-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652752" version="1" comment="libpostproc54 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652753" version="1" comment="libswresample-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652754" version="1" comment="libswresample2 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652755" version="1" comment="libswscale-devel is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652756" version="1" comment="libswscale4 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495833" version="1" comment="python-tk is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653653" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653654" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653655" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653656" version="1" comment="webkit2gtk3-devel is &lt;2.32.4-15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654090" version="1" comment="MozillaFirefox is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654091" version="1" comment="MozillaFirefox-devel is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654092" version="1" comment="MozillaFirefox-translations-common is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654093" version="1" comment="MozillaFirefox-translations-other is &lt;91.3.0-152.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656737" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656738" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656739" version="1" comment="openexr-devel is &lt;2.2.1-3.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657446" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657447" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657448" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657449" version="1" comment="webkit2gtk3-devel is &lt;2.34.1-18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658091" version="1" comment="wireshark-devel is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658092" version="1" comment="wireshark-ui-qt is &lt;3.4.10-3.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659329" version="1" comment="MozillaFirefox is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659330" version="1" comment="MozillaFirefox-devel is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659331" version="1" comment="MozillaFirefox-translations-common is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659332" version="1" comment="MozillaFirefox-translations-other is &lt;91.4.0-152.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659295" version="1" comment="ImageMagick is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659296" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659297" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659298" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659299" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659300" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659301" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659302" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657445" version="1" comment="fetchmailconf is &lt;6.4.22-20.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659303" version="1" comment="libaom0 is &lt;1.0.0-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495834" version="1" comment="MozillaFirefox is &lt;78.7.1-8.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495835" version="1" comment="MozillaFirefox-devel is &lt;78.7.1-8.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495836" version="1" comment="MozillaFirefox-translations-common is &lt;78.7.1-8.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495837" version="1" comment="MozillaFirefox-translations-other is &lt;78.7.1-8.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495838" version="1" comment="python3-bottle is &lt;0.12.13-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495839" version="1" comment="libjasper-devel is &lt;2.0.14-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495840" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495841" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495842" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495843" version="1" comment="webkit2gtk3-devel is &lt;2.30.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495844" version="1" comment="avahi-autoipd is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495845" version="1" comment="avahi-utils-gtk is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495846" version="1" comment="libavahi-gobject-devel is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495847" version="1" comment="ImageMagick is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495848" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495849" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495850" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495851" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495852" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495853" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495854" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495855" version="1" comment="MozillaFirefox is &lt;78.8.0-8.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495856" version="1" comment="MozillaFirefox-devel is &lt;78.8.0-8.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495857" version="1" comment="MozillaFirefox-translations-common is &lt;78.8.0-8.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495858" version="1" comment="MozillaFirefox-translations-other is &lt;78.8.0-8.32.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495859" version="1" comment="gnome-autoar-devel is &lt;0.2.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495860" version="1" comment="libgnome-autoar-0-0 is &lt;0.2.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495861" version="1" comment="libgnome-autoar-gtk-0-0 is &lt;0.2.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495862" version="1" comment="typelib-1_0-GnomeAutoar-0_1 is &lt;0.2.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495863" version="1" comment="typelib-1_0-GnomeAutoarGtk-0_1 is &lt;0.2.3-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495864" version="1" comment="MozillaFirefox is &lt;78.6.1-8.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495865" version="1" comment="MozillaFirefox-devel is &lt;78.6.1-8.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495866" version="1" comment="MozillaFirefox-translations-common is &lt;78.6.1-8.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495867" version="1" comment="MozillaFirefox-translations-other is &lt;78.6.1-8.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495868" version="1" comment="python-tk is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495869" version="1" comment="ImageMagick is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495870" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495871" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495872" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495873" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495874" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495875" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495876" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495877" version="1" comment="libass-devel is &lt;0.14.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495878" version="1" comment="libass9 is &lt;0.14.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495879" version="1" comment="MozillaFirefox is &lt;78.9.0-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495880" version="1" comment="MozillaFirefox-devel is &lt;78.9.0-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495881" version="1" comment="MozillaFirefox-translations-common is &lt;78.9.0-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009495882" version="1" comment="MozillaFirefox-translations-other is &lt;78.9.0-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496291" version="1" comment="perl-doc is &lt;5.26.1-7.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496292" version="1" comment="osc is &lt;0.169.1-3.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496293" version="1" comment="python3-tools is &lt;3.6.10-3.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496294" version="1" comment="nasm is &lt;2.14.02-3.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496295" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496033" version="1" comment="graphviz-perl is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496450" version="1" comment="ant is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496451" version="1" comment="ant-antlr is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496452" version="1" comment="ant-apache-bcel is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496453" version="1" comment="ant-apache-bsf is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496454" version="1" comment="ant-apache-log4j is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496455" version="1" comment="ant-apache-oro is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496456" version="1" comment="ant-apache-regexp is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496457" version="1" comment="ant-apache-resolver is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496458" version="1" comment="ant-commons-logging is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496459" version="1" comment="ant-javamail is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496460" version="1" comment="ant-jdepend is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496461" version="1" comment="ant-jmf is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496462" version="1" comment="ant-junit is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496463" version="1" comment="ant-manual is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496464" version="1" comment="ant-scripts is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496465" version="1" comment="ant-swing is &lt;1.10.7-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496296" version="1" comment="perl-YAML-LibYAML is &lt;0.69-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496297" version="1" comment="cargo is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496298" version="1" comment="clippy is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496299" version="1" comment="rls is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496300" version="1" comment="rust is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496301" version="1" comment="rust-analysis is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496302" version="1" comment="rust-src is &lt;1.43.1-12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496303" version="1" comment="rust-std-static is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496304" version="1" comment="rustfmt is &lt;1.43.1-12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496466" version="1" comment="kernel-docs is &lt;5.3.18-24.9.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496467" version="1" comment="kernel-obs-build is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496468" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496469" version="1" comment="kernel-source is &lt;5.3.18-24.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496470" version="1" comment="kernel-syms is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496471" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496310" version="1" comment="python3-tools is &lt;3.6.10-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496472" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496473" version="1" comment="kernel-docs is &lt;5.3.18-24.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496474" version="1" comment="kernel-obs-build is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496475" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.12.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496476" version="1" comment="kernel-source is &lt;5.3.18-24.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496477" version="1" comment="kernel-syms is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496313" version="1" comment="go1.14 is &lt;1.14.7-1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496314" version="1" comment="go1.14-doc is &lt;1.14.7-1.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496478" version="1" comment="kernel-docs is &lt;5.3.18-24.15.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496479" version="1" comment="kernel-obs-build is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496480" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.15.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496481" version="1" comment="kernel-source is &lt;5.3.18-24.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496482" version="1" comment="kernel-syms is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496319" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496320" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496321" version="1" comment="go1.14 is &lt;1.14.9-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496322" version="1" comment="go1.14-doc is &lt;1.14.9-1.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496323" version="1" comment="go1.15 is &lt;1.15.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496324" version="1" comment="go1.15-doc is &lt;1.15.2-1.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496483" version="1" comment="kernel-docs is &lt;5.3.18-24.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496484" version="1" comment="kernel-obs-build is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496485" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.24.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496486" version="1" comment="kernel-source is &lt;5.3.18-24.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496487" version="1" comment="kernel-syms is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496325" version="1" comment="perl-Net-Libproxy is &lt;0.4.15-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009492629" version="1" comment="sysuser-tools is &lt;2.0-4.2.8 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496330" version="1" comment="cpp10 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496488" version="1" comment="cross-nvptx-gcc10 is &lt;10.2.1+git583-1.3.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496489" version="1" comment="cross-nvptx-newlib10-devel is &lt;10.2.1+git583-1.3.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496333" version="1" comment="gcc10 is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496334" version="1" comment="gcc10-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496335" version="1" comment="gcc10-ada is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496490" version="1" comment="gcc10-ada-32bit is &lt;10.2.1+git583-1.3.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496337" version="1" comment="gcc10-c++ is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496338" version="1" comment="gcc10-c++-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496339" version="1" comment="gcc10-fortran is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496340" version="1" comment="gcc10-fortran-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496341" version="1" comment="gcc10-go is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496342" version="1" comment="gcc10-go-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496343" version="1" comment="gcc10-info is &lt;10.2.1+git583-1.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496344" version="1" comment="gcc10-locale is &lt;10.2.1+git583-1.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496346" version="1" comment="libstdc++6-devel-gcc10-32bit is &lt;10.2.1+git583-1.3.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496350" version="1" comment="nvptx-tools is &lt;1.0-4.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496491" version="1" comment="kernel-docs is &lt;5.3.18-24.29.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496492" version="1" comment="kernel-obs-build is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496493" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.29.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496494" version="1" comment="kernel-source is &lt;5.3.18-24.29.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496495" version="1" comment="kernel-syms is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496355" version="1" comment="binutils-devel-32bit is &lt;2.35-7.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496496" version="1" comment="kernel-docs is &lt;5.3.18-24.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496497" version="1" comment="kernel-obs-build is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496498" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.34.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496499" version="1" comment="kernel-source is &lt;5.3.18-24.34.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496500" version="1" comment="kernel-syms is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496501" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496502" version="1" comment="kernel-docs is &lt;5.3.18-24.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496503" version="1" comment="kernel-obs-build is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496504" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.37.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496505" version="1" comment="kernel-source is &lt;5.3.18-24.37.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496506" version="1" comment="kernel-syms is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496361" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496362" version="1" comment="go1.15 is &lt;1.15.5-1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496363" version="1" comment="go1.15-doc is &lt;1.15.5-1.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496364" version="1" comment="go1.14 is &lt;1.14.12-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496365" version="1" comment="go1.14-doc is &lt;1.14.12-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496366" version="1" comment="dash is &lt;0.5.11.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496507" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496393" version="1" comment="python3-tools is &lt;3.6.12-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496394" version="1" comment="rpmlint is &lt;1.10-7.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496508" version="1" comment="kernel-docs is &lt;5.3.18-24.43.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496509" version="1" comment="kernel-obs-build is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496510" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.43.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496511" version="1" comment="kernel-source is &lt;5.3.18-24.43.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496512" version="1" comment="kernel-syms is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496399" version="1" comment="cross-nvptx-gcc7 is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496400" version="1" comment="cross-nvptx-newlib7-devel is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496401" version="1" comment="gcc7-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496402" version="1" comment="gcc7-ada is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496403" version="1" comment="gcc7-c++-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496404" version="1" comment="gcc7-fortran-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496405" version="1" comment="gcc7-info is &lt;7.5.0+r278197-4.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496406" version="1" comment="gcc7-locale is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496407" version="1" comment="gcc7-objc is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496408" version="1" comment="libada7 is &lt;7.5.0+r278197-4.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496409" version="1" comment="libasan4-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496410" version="1" comment="libcilkrts5-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496411" version="1" comment="libstdc++6-devel-gcc7-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496412" version="1" comment="libubsan0-32bit is &lt;7.5.0+r278197-4.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496513" version="1" comment="groovy-lib is &lt;2.4.21-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496514" version="1" comment="jetty-http is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496515" version="1" comment="jetty-io is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496516" version="1" comment="jetty-security is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496517" version="1" comment="jetty-server is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496518" version="1" comment="jetty-servlet is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496519" version="1" comment="jetty-util is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496520" version="1" comment="jetty-util-ajax is &lt;9.4.35-3.3.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496413" version="1" comment="python3-tools is &lt;3.6.12-3.67.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496521" version="1" comment="bcc-devel is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496522" version="1" comment="bcc-docs is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496523" version="1" comment="bcc-examples is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496524" version="1" comment="bcc-tools is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496525" version="1" comment="libbcc0 is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496526" version="1" comment="python3-bcc is &lt;0.12.0-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496527" version="1" comment="perl-Mail-SpamAssassin-Plugin-iXhash2 is &lt;2.05-12.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496528" version="1" comment="kernel-docs is &lt;5.3.18-24.46.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496529" version="1" comment="kernel-obs-build is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496530" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.46.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496531" version="1" comment="kernel-source is &lt;5.3.18-24.46.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496532" version="1" comment="kernel-syms is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496533" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496534" version="1" comment="kernel-docs is &lt;5.3.18-24.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496535" version="1" comment="kernel-obs-build is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496536" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.61.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496537" version="1" comment="kernel-source is &lt;5.3.18-24.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496538" version="1" comment="kernel-syms is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496539" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496540" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.45.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496541" version="1" comment="cups-ddk is &lt;2.2.7-3.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496542" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496543" version="1" comment="python3-tools is &lt;3.6.13-3.81.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496544" version="1" comment="kernel-docs is &lt;5.3.18-24.64.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496545" version="1" comment="kernel-obs-build is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496546" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.64.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496547" version="1" comment="kernel-source is &lt;5.3.18-24.64.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496548" version="1" comment="kernel-syms is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496549" version="1" comment="dtc is &lt;1.5.1-4.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496550" version="1" comment="graphviz-perl is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496551" version="1" comment="xstream is &lt;1.4.15-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496552" version="1" comment="ocaml-hivex is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496553" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-5.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496554" version="1" comment="xstream is &lt;1.4.16-3.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496555" version="1" comment="snakeyaml is &lt;1.28-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496556" version="1" comment="kernel-docs is &lt;5.3.18-24.67.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496557" version="1" comment="kernel-obs-build is &lt;5.3.18-24.67.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496558" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.67.4 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496559" version="1" comment="kernel-source is &lt;5.3.18-24.67.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496560" version="1" comment="kernel-syms is &lt;5.3.18-24.67.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496563" version="1" comment="xstream is &lt;1.4.17-3.11.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496564" version="1" comment="jetty-http is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496565" version="1" comment="jetty-io is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496566" version="1" comment="jetty-security is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496567" version="1" comment="jetty-server is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496568" version="1" comment="jetty-servlet is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496569" version="1" comment="jetty-util is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496570" version="1" comment="jetty-util-ajax is &lt;9.4.42-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496571" version="1" comment="go1.15 is &lt;1.15.12-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496572" version="1" comment="go1.15-doc is &lt;1.15.12-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496573" version="1" comment="go1.15-race is &lt;1.15.12-1.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496574" version="1" comment="go1.16 is &lt;1.16.4-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496575" version="1" comment="go1.16-doc is &lt;1.16.4-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496576" version="1" comment="go1.16-race is &lt;1.16.4-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496561" version="1" comment="bouncycastle is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496562" version="1" comment="bouncycastle-pg is &lt;1.64-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615799" version="1" comment="go1.16 is &lt;1.16.5-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615800" version="1" comment="go1.16-doc is &lt;1.16.5-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615801" version="1" comment="go1.16-race is &lt;1.16.5-1.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615796" version="1" comment="go1.15 is &lt;1.15.13-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615797" version="1" comment="go1.15-doc is &lt;1.15.13-1.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615798" version="1" comment="go1.15-race is &lt;1.15.13-1.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009145981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496577" version="1" comment="go1.14 is &lt;1.14.14-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496578" version="1" comment="go1.14-doc is &lt;1.14.14-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496579" version="1" comment="go1.15 is &lt;1.15.7-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496580" version="1" comment="go1.15-doc is &lt;1.15.7-1.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496581" version="1" comment="go1.15-race is &lt;1.15.7-1.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615896" version="1" comment="jdom2 is &lt;2.0.6-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624274" version="1" comment="kernel-docs is &lt;5.3.18-24.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624275" version="1" comment="kernel-obs-build is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624276" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.70.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624277" version="1" comment="kernel-source is &lt;5.3.18-24.70.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624278" version="1" comment="kernel-syms is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624708" version="1" comment="go1.16 is &lt;1.16.6-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624709" version="1" comment="go1.16-doc is &lt;1.16.6-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624710" version="1" comment="go1.16-race is &lt;1.16.6-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624711" version="1" comment="go1.15 is &lt;1.15.14-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624712" version="1" comment="go1.15-doc is &lt;1.15.14-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624713" version="1" comment="go1.15-race is &lt;1.15.14-1.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496582" version="1" comment="jackson-databind is &lt;2.10.5.1-3.3.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625592" version="1" comment="kernel-docs is &lt;5.3.18-24.75.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625987" version="1" comment="kernel-obs-build is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625988" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.75.3 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625595" version="1" comment="kernel-source is &lt;5.3.18-24.75.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625989" version="1" comment="kernel-syms is &lt;5.3.18-24.75.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625986" version="1" comment="apache-commons-compress is &lt;1.21-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627868" version="1" comment="kernel-docs is &lt;5.3.18-24.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627869" version="1" comment="kernel-obs-build is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627870" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.78.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627871" version="1" comment="kernel-source is &lt;5.3.18-24.78.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627872" version="1" comment="kernel-syms is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630565" version="1" comment="go1.15 is &lt;1.15.15-1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630566" version="1" comment="go1.15-doc is &lt;1.15.15-1.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630567" version="1" comment="go1.15-race is &lt;1.15.15-1.39.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630568" version="1" comment="go1.16 is &lt;1.16.7-1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630569" version="1" comment="go1.16-doc is &lt;1.16.7-1.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630570" version="1" comment="go1.16-race is &lt;1.16.7-1.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626232" version="1" comment="jetty-http is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626233" version="1" comment="jetty-io is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626234" version="1" comment="jetty-security is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626235" version="1" comment="jetty-server is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626236" version="1" comment="jetty-servlet is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626237" version="1" comment="jetty-util is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626238" version="1" comment="jetty-util-ajax is &lt;9.4.43-3.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496583" version="1" comment="cups-ddk is &lt;2.2.7-3.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632566" version="1" comment="ocaml-hivex is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632567" version="1" comment="ocaml-hivex-devel is &lt;1.3.14-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633298" version="1" comment="kernel-docs is &lt;5.3.18-24.83.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633299" version="1" comment="kernel-obs-build is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633300" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.83.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633301" version="1" comment="kernel-source is &lt;5.3.18-24.83.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633302" version="1" comment="kernel-syms is &lt;5.3.18-24.83.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634431" version="1" comment="go1.16 is &lt;1.16.8-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634432" version="1" comment="go1.16-doc is &lt;1.16.8-1.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634433" version="1" comment="go1.16-race is &lt;1.16.8-1.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633883" version="1" comment="git is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633884" version="1" comment="git-arch is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633885" version="1" comment="git-cvs is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633886" version="1" comment="git-daemon is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633887" version="1" comment="git-doc is &lt;2.26.2-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633888" version="1" comment="git-email is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633889" version="1" comment="git-gui is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633890" version="1" comment="git-svn is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633891" version="1" comment="git-web is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633892" version="1" comment="gitk is &lt;2.26.2-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634569" version="1" comment="glibc-devel-32bit is &lt;2.26-13.59.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634570" version="1" comment="glibc-devel-static is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634571" version="1" comment="glibc-utils is &lt;2.26-13.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652127" version="1" comment="rpm-build is &lt;4.14.1-22.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652121" version="1" comment="kernel-docs is &lt;5.3.18-24.86.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652122" version="1" comment="kernel-obs-build is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652123" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.86.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652124" version="1" comment="kernel-source is &lt;5.3.18-24.86.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652125" version="1" comment="kernel-syms is &lt;5.3.18-24.86.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652126" version="1" comment="perl-Bootloader-YAML is &lt;0.931-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634572" version="1" comment="xstream is &lt;1.4.18-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651656" version="1" comment="go1.16 is &lt;1.16.9-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651657" version="1" comment="go1.16-doc is &lt;1.16.9-1.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651658" version="1" comment="go1.16-race is &lt;1.16.9-1.29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652128" version="1" comment="go1.17 is &lt;1.17.2-1.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652129" version="1" comment="go1.17-doc is &lt;1.17.2-1.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652130" version="1" comment="go1.17-race is &lt;1.17.2-1.6.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652200" version="1" comment="ncurses-devel-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496584" version="1" comment="kernel-docs is &lt;5.3.18-24.49.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496585" version="1" comment="kernel-obs-build is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496586" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.49.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496587" version="1" comment="kernel-source is &lt;5.3.18-24.49.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496588" version="1" comment="kernel-syms is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653455" version="1" comment="binutils-devel-32bit is &lt;2.37-7.21.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654320" version="1" comment="binutils-devel-32bit is &lt;2.37-7.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655886" version="1" comment="kernel-docs is &lt;5.3.18-24.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655887" version="1" comment="kernel-obs-build is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655888" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.93.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655889" version="1" comment="kernel-source is &lt;5.3.18-24.93.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655890" version="1" comment="kernel-syms is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654317" version="1" comment="glibc-devel-32bit is &lt;2.26-13.62.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654318" version="1" comment="glibc-devel-static is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654319" version="1" comment="glibc-utils is &lt;2.26-13.62.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654576" version="1" comment="go1.17 is &lt;1.17.3-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654577" version="1" comment="go1.17-doc is &lt;1.17.3-1.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654578" version="1" comment="go1.17-race is &lt;1.17.3-1.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654573" version="1" comment="go1.16 is &lt;1.16.10-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654574" version="1" comment="go1.16-doc is &lt;1.16.10-1.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654575" version="1" comment="go1.16-race is &lt;1.16.10-1.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658789" version="1" comment="aaa_base-malloccheck is &lt;84.87+git20180409.04c9dae-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657450" version="1" comment="kernel-docs is &lt;5.3.18-24.96.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657451" version="1" comment="kernel-obs-build is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657452" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.96.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657453" version="1" comment="kernel-source is &lt;5.3.18-24.96.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657454" version="1" comment="kernel-syms is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656942" version="1" comment="gmp-devel-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656943" version="1" comment="libgmpxx4-32bit is &lt;6.1.2-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659304" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659024" version="1" comment="python3-tools is &lt;3.6.15-3.91.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659807" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.39.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660089" version="1" comment="log4j12-javadoc is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660090" version="1" comment="log4j12-manual is &lt;1.2.17-4.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659804" version="1" comment="go1.16 is &lt;1.16.12-1.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659805" version="1" comment="go1.16-doc is &lt;1.16.12-1.37.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659806" version="1" comment="go1.16-race is &lt;1.16.12-1.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659801" version="1" comment="go1.17 is &lt;1.17.5-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659802" version="1" comment="go1.17-doc is &lt;1.17.5-1.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659803" version="1" comment="go1.17-race is &lt;1.17.5-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496589" version="1" comment="subversion-bash-completion is &lt;1.10.6-3.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496590" version="1" comment="subversion-perl is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496591" version="1" comment="subversion-python is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496592" version="1" comment="subversion-tools is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496593" version="1" comment="python3-tools is &lt;3.6.12-3.75.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496594" version="1" comment="libpcp-devel is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496595" version="1" comment="libpcp3 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496596" version="1" comment="libpcp_gui2 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496597" version="1" comment="libpcp_import1 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496598" version="1" comment="libpcp_mmv1 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496599" version="1" comment="libpcp_trace2 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496600" version="1" comment="libpcp_web1 is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496601" version="1" comment="pcp is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496602" version="1" comment="pcp-conf is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496603" version="1" comment="pcp-devel is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496604" version="1" comment="pcp-doc is &lt;4.3.1-3.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496605" version="1" comment="pcp-import-iostat2pcp is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496606" version="1" comment="pcp-import-mrtg2pcp is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496607" version="1" comment="pcp-import-sar2pcp is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496608" version="1" comment="pcp-pmda-perfevent is &lt;4.3.1-3.11.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496609" version="1" comment="pcp-system-tools is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496610" version="1" comment="perl-PCP-LogImport is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496611" version="1" comment="perl-PCP-LogSummary is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496612" version="1" comment="perl-PCP-MMV is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496613" version="1" comment="perl-PCP-PMDA is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496614" version="1" comment="python3-pcp is &lt;4.3.1-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496615" version="1" comment="rpmlint-mini is &lt;1.10-13.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496616" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496617" version="1" comment="glibc-devel-32bit is &lt;2.26-13.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496618" version="1" comment="glibc-devel-static is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496619" version="1" comment="glibc-utils is &lt;2.26-13.56.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496620" version="1" comment="openldap2-devel-32bit is &lt;2.4.46-9.48.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496621" version="1" comment="kernel-docs is &lt;5.3.18-24.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496622" version="1" comment="kernel-obs-build is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496623" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.52.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496624" version="1" comment="kernel-source is &lt;5.3.18-24.52.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496625" version="1" comment="kernel-syms is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496626" version="1" comment="git is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496627" version="1" comment="git-arch is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496628" version="1" comment="git-cvs is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496629" version="1" comment="git-daemon is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496630" version="1" comment="git-doc is &lt;2.26.2-3.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496631" version="1" comment="git-email is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496632" version="1" comment="git-gui is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496633" version="1" comment="git-svn is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496634" version="1" comment="git-web is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496635" version="1" comment="gitk is &lt;2.26.2-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496636" version="1" comment="velocity is &lt;1.7-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496637" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.6.13 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496638" version="1" comment="go1.16 is &lt;1.16.2-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496639" version="1" comment="go1.16-doc is &lt;1.16.2-1.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496640" version="1" comment="go1.16-race is &lt;1.16.2-1.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496641" version="1" comment="go1.15 is &lt;1.15.10-1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496642" version="1" comment="go1.15-doc is &lt;1.15.10-1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496643" version="1" comment="go1.15-race is &lt;1.15.10-1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496644" version="1" comment="jetty-http is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496645" version="1" comment="jetty-io is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496646" version="1" comment="jetty-security is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496647" version="1" comment="jetty-server is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496648" version="1" comment="jetty-servlet is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496649" version="1" comment="jetty-util is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496650" version="1" comment="jetty-util-ajax is &lt;9.4.38-3.6.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496651" version="1" comment="python3-tools is &lt;3.6.13-3.78.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496874" version="1" comment="libnss_slurm2 is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496875" version="1" comment="libpmi0 is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496876" version="1" comment="libslurm35 is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496877" version="1" comment="perl-slurm is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496878" version="1" comment="slurm is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496879" version="1" comment="slurm-auth-none is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496880" version="1" comment="slurm-config is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496881" version="1" comment="slurm-config-man is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496882" version="1" comment="slurm-devel is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496883" version="1" comment="slurm-doc is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496884" version="1" comment="slurm-lua is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496885" version="1" comment="slurm-munge is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496886" version="1" comment="slurm-node is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496887" version="1" comment="slurm-pam_slurm is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496888" version="1" comment="slurm-plugins is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496889" version="1" comment="slurm-slurmdbd is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496890" version="1" comment="slurm-sql is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496891" version="1" comment="slurm-sview is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496892" version="1" comment="slurm-torque is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496893" version="1" comment="slurm-webdoc is &lt;20.02.6-3.3.4 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496894" version="1" comment="libnss_slurm2 is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496895" version="1" comment="libpmi0 is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496896" version="1" comment="libslurm35 is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496897" version="1" comment="perl-slurm is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496898" version="1" comment="slurm is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496899" version="1" comment="slurm-auth-none is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496900" version="1" comment="slurm-config is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496901" version="1" comment="slurm-config-man is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496902" version="1" comment="slurm-devel is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496903" version="1" comment="slurm-doc is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496904" version="1" comment="slurm-lua is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496905" version="1" comment="slurm-munge is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496906" version="1" comment="slurm-node is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496907" version="1" comment="slurm-pam_slurm is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496908" version="1" comment="slurm-plugins is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496909" version="1" comment="slurm-slurmdbd is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496910" version="1" comment="slurm-sql is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496911" version="1" comment="slurm-sview is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496912" version="1" comment="slurm-torque is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496913" version="1" comment="slurm-webdoc is &lt;20.02.7-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496914" version="1" comment="libnss_slurm2_20_11 is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496915" version="1" comment="libpmi0_20_11 is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496916" version="1" comment="libslurm36 is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496917" version="1" comment="perl-slurm_20_11 is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496918" version="1" comment="slurm_20_11 is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496919" version="1" comment="slurm_20_11-auth-none is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496920" version="1" comment="slurm_20_11-config is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496921" version="1" comment="slurm_20_11-config-man is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496922" version="1" comment="slurm_20_11-devel is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496923" version="1" comment="slurm_20_11-doc is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496924" version="1" comment="slurm_20_11-lua is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496925" version="1" comment="slurm_20_11-munge is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496926" version="1" comment="slurm_20_11-node is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496927" version="1" comment="slurm_20_11-pam_slurm is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496928" version="1" comment="slurm_20_11-plugins is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496929" version="1" comment="slurm_20_11-slurmdbd is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496930" version="1" comment="slurm_20_11-sql is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496931" version="1" comment="slurm_20_11-sview is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496932" version="1" comment="slurm_20_11-torque is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009496933" version="1" comment="slurm_20_11-webdoc is &lt;20.11.7-6.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657455" version="1" comment="libnetcdf-gnu-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657456" version="1" comment="libnetcdf-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657457" version="1" comment="libnetcdf-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657458" version="1" comment="libnetcdf-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657459" version="1" comment="libnetcdf-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657460" version="1" comment="libnetcdf_4_7_3-gnu-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657461" version="1" comment="libnetcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657462" version="1" comment="libnetcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657463" version="1" comment="libnetcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657464" version="1" comment="libnetcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657465" version="1" comment="netcdf-gnu-hpc is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657466" version="1" comment="netcdf-gnu-hpc-devel is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657467" version="1" comment="netcdf-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657468" version="1" comment="netcdf-gnu-mpich-hpc-devel is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657469" version="1" comment="netcdf-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657470" version="1" comment="netcdf-gnu-mvapich2-hpc-devel is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657471" version="1" comment="netcdf-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657472" version="1" comment="netcdf-gnu-openmpi2-hpc-devel is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657473" version="1" comment="netcdf-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657474" version="1" comment="netcdf-gnu-openmpi3-hpc-devel is &lt;4.7.3-3.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657475" version="1" comment="netcdf_4_7_3-gnu-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657476" version="1" comment="netcdf_4_7_3-gnu-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657477" version="1" comment="netcdf_4_7_3-gnu-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657478" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657479" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657480" version="1" comment="netcdf_4_7_3-gnu-mpich-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657481" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657482" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657483" version="1" comment="netcdf_4_7_3-gnu-mvapich2-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657484" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657485" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657486" version="1" comment="netcdf_4_7_3-gnu-openmpi2-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657487" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657488" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657489" version="1" comment="netcdf_4_7_3-gnu-openmpi3-hpc-devel-static is &lt;4.7.3-3.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497056" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.252-3.35.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497057" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.252-3.35.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497058" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.252-3.35.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497059" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.252-3.35.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497061" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.10-3.38.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497062" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.10-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497063" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.10-3.38.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497064" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.10-3.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497065" version="1" comment="ntp is &lt;4.2.8p15-4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497066" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497067" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497109" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497069" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.15-3.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497070" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.15-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497071" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.15-3.41.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497072" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.15-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497110" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497111" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497074" version="1" comment="openldap2 is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497075" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497076" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497077" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497078" version="1" comment="openldap2 is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497079" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497080" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497081" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497112" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497113" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497114" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497115" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497085" version="1" comment="openldap2 is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497086" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497087" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497088" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497089" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.272-3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497090" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.272-3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497091" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.272-3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497092" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.272-3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497094" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.275-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497095" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.275-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497096" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.275-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497097" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.275-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497116" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497099" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497100" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497101" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497102" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.20-3.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497103" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.20-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497104" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.20-3.47.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497105" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.20-3.47.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497117" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497118" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497119" version="1" comment="openldap2 is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497120" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497121" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497122" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497123" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497124" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497125" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497126" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497127" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497128" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.292-3.52.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624279" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625990" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627878" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627144" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627145" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627146" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627147" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.302-3.55.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631628" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631629" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631630" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.40.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632344" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632345" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632346" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633303" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652131" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652201" version="1" comment="libncurses5 is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652202" version="1" comment="libncurses5-32bit is &lt;6.1-5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652203" version="1" comment="ncurses5-devel is &lt;6.1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497129" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655891" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656976" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656977" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656978" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656979" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.312-3.58.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657490" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497130" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.282-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497131" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.282-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497132" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.282-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497133" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.282-3.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497134" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr6.25-3.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497135" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr6.25-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497136" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr6.25-3.50.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497137" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr6.25-3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497138" version="1" comment="openldap2 is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497139" version="1" comment="openldap2-back-meta is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497140" version="1" comment="openldap2-back-perl is &lt;2.4.46-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497141" version="1" comment="openldap2-ppolicy-check-password is &lt;1.2-9.48.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497142" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497143" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497144" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497145" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497648" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497649" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.9.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497650" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;1-5.3.6 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009288462" version="1" comment="sle-module-live-patching-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497651" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.12.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497652" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.12.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497653" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497654" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;2-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497655" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;2-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497656" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.15.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497657" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.15.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497658" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497659" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.24.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497660" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.24.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497661" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;1-5.3.6 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497662" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.29.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497663" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.29.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497664" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;1-5.3.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497665" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.34.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497666" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.34.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497667" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;1-5.3.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497668" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497669" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497670" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497671" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497672" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;3-8.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497673" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.37.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497674" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.37.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497675" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497676" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497677" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497678" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497679" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497680" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;4-11.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497681" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;5-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497682" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497683" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497684" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497685" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497686" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497687" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497688" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497689" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.43.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497690" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.43.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497691" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;1-5.3.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497692" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;6-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497693" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497694" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497695" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;2-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497696" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497697" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497698" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497699" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497700" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497701" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497702" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497703" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;9-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497704" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497705" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.46.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497706" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.46.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497707" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497708" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.61.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497709" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.61.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497710" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;1-5.3.4 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497711" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497712" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497713" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;10-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497714" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497715" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497716" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497717" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497718" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497719" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497720" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497721" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497722" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497723" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.64.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497724" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.64.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497725" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497726" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497727" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497728" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497729" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497730" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497731" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497732" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497733" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497734" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497736" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497737" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;11-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497738" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.67.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497739" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.67.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497740" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;1-5.3.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497741" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497742" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497743" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497744" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497745" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497746" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497747" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497748" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497749" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497750" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497751" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497752" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497753" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497754" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;12-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624280" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.70.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624281" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.70.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624282" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625198" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;13-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624734" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625991" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.75.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625992" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.75.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625993" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;1-5.3.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626419" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626417" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626416" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626415" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626414" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626410" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626409" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626408" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626407" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626406" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626404" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626403" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;14-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626411" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626412" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626413" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626418" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630688" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630687" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630686" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630685" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630684" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630683" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630682" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630681" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630680" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630679" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630678" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630677" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630676" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630675" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630674" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630673" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627880" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.78.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627881" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.78.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627882" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632837" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;14-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632838" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;14-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632839" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;12-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632840" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;12-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632841" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;12-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632842" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;11-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632843" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;11-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632844" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;10-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632845" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;9-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632846" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;6-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632847" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;6-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632848" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;4-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632849" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;4-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632850" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;4-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632851" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;3-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632852" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;2-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633304" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.83.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633305" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.83.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633306" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;1-5.3.4 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651489" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651488" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651487" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651486" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651485" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651484" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;7-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651483" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;7-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651528" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651527" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651530" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651529" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651526" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651525" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651524" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;15-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651531" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652132" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.86.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652133" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.86.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652134" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;1-5.3.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497755" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.49.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497756" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.49.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497757" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;1-5.3.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497758" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497759" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497760" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497761" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497762" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497763" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497764" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497765" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497766" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;6-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497767" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;7-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656440" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;14-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656441" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656442" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656444" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656445" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656446" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656447" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656448" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656449" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656450" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656451" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656452" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;2-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656443" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656748" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;2-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655892" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.93.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655893" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.93.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655894" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;1-5.3.5 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657491" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.96.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657492" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.96.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657493" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659405" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659406" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659404" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659403" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659402" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;6-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659401" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;7-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659400" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;7-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659399" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;7-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659398" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;9-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659396" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;12-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659394" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;14-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659393" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;14-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659395" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659397" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;9-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497768" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.52.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497769" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.52.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497770" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497771" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497772" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497773" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497774" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497775" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497776" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497777" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497778" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497779" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497780" version="1" comment="kernel-livepatch-5_3_18-22-default is &lt;8-5.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497781" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;2-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676919" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;7-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676915" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;11-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676913" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;13-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676912" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;13-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679055" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;10-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679057" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;8-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679151" version="1" comment="kernel-default-livepatch is &lt;5.3.18-150200.24.112.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679152" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-150200.24.112.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679153" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &lt;1-150200.5.5.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679056" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;8-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679052" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;12-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679050" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;14-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679054" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;11-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679058" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;7-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679060" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;5-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679061" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &lt;4-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679062" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &lt;3-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679059" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;6-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679049" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;14-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679051" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;12-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679053" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;12-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680227" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &lt;5-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680225" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;7-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680228" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &lt;4-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680216" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;15-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680222" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;9-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680224" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;8-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680226" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;6-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680217" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;13-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680218" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;13-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680219" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;13-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680220" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;12-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680221" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;11-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680223" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;9-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680215" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;15-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664515" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.99.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664516" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.99.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664517" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665163" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;4-2.3 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665164" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665161" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;6-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665162" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665165" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;2-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665160" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665159" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665157" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665158" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665155" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665153" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &lt;14-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665154" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;13-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009123618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665156" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;10-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667457" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.102.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667458" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.102.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667459" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &lt;1-5.3.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667876" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667877" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;11-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667878" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667879" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667880" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;9-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667881" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;8-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667882" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;7-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667883" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667884" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;5-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667885" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;4-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667886" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;3-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667887" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;2-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667875" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;14-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669950" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &lt;2-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669951" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;3-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669952" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;4-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669953" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;5-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669954" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;6-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669955" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &lt;6-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669956" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;8-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669957" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;9-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669958" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;10-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669959" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &lt;10-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669960" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;10-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669961" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &lt;12-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669962" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &lt;12-2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669963" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &lt;15-2.2 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671402" version="1" comment="kernel-default-livepatch is &lt;5.3.18-24.107.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671403" version="1" comment="kernel-default-livepatch-devel is &lt;5.3.18-24.107.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671404" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &lt;1-5.5.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676918" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &lt;9-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676916" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &lt;11-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676914" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &lt;11-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676917" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &lt;10-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676920" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &lt;7-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676921" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &lt;6-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676922" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &lt;5-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676923" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &lt;4-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676924" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &lt;3-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676925" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &lt;2-150200.2.1 for ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497858" version="1" comment="vpx-tools is &lt;1.6.1-6.6.8 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009282574" version="1" comment="sle-module-packagehub-subpackages-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497862" version="1" comment="libsybdb5 is &lt;1.1.36-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497865" version="1" comment="libexif12-32bit is &lt;0.6.22-5.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497867" version="1" comment="perl-32bit is &lt;5.26.1-7.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497831" version="1" comment="libjpeg-turbo is &lt;1.5.3-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497869" version="1" comment="libvncserver0 is &lt;0.9.10-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497822" version="1" comment="nping is &lt;7.70-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497837" version="1" comment="python2-opencv is &lt;3.3.1-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497838" version="1" comment="python3-opencv is &lt;3.3.1-6.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497830" version="1" comment="python2-ecdsa is &lt;0.13.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497804" version="1" comment="graphviz-gnome is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497870" version="1" comment="libvncserver0 is &lt;0.9.10-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497871" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.8.0-3.45.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497889" version="1" comment="php7-embed is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497874" version="1" comment="libjpeg-turbo is &lt;1.5.3-5.15.7 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497876" version="1" comment="tiff is &lt;4.0.9-5.30.28 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497890" version="1" comment="libdpdk-20_0 is &lt;19.11.4-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497891" version="1" comment="php7-embed is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497878" version="1" comment="binutils-gold is &lt;2.35-7.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497879" version="1" comment="sane-backends-32bit is &lt;1.0.31-6.3.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497880" version="1" comment="python2-waitress is &lt;1.4.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497881" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.9.0-3.48.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497882" version="1" comment="libvncserver0 is &lt;0.9.10-4.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497883" version="1" comment="flac is &lt;1.3.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497884" version="1" comment="libFLAC8-32bit is &lt;1.3.2-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497887" version="1" comment="rsvg-view is &lt;2.42.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497892" version="1" comment="php7-embed is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497893" version="1" comment="rsvg-view is &lt;2.42.9-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497894" version="1" comment="python3-avahi is &lt;0.7-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497895" version="1" comment="python2-Pygments is &lt;2.2.0-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497896" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.11.0-3.56.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497897" version="1" comment="djvulibre is &lt;3.5.27-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497898" version="1" comment="graphviz-gnome is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497899" version="1" comment="postgresql-test is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497900" version="1" comment="postgresql13-test is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497901" version="1" comment="postgresql13-test is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497902" version="1" comment="python2-httplib2 is &lt;0.19.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497903" version="1" comment="gstreamer-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497904" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497905" version="1" comment="libgstreamer-1_0-0-32bit is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497906" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497907" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.16.3-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497908" version="1" comment="libwebp6-32bit is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497909" version="1" comment="djvulibre is &lt;3.5.27-11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497910" version="1" comment="libjpeg-turbo is &lt;1.5.3-5.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497911" version="1" comment="python2-rsa is &lt;3.4.2-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497912" version="1" comment="libgupnp-devel is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497913" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.2.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615906" version="1" comment="ffmpeg is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615907" version="1" comment="libavdevice57 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615908" version="1" comment="libavfilter6 is &lt;3.4.2-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497914" version="1" comment="libopenvswitch-2_13-0 is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497915" version="1" comment="python3-ovs is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627353" version="1" comment="djvulibre is &lt;3.5.27-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627354" version="1" comment="php7-embed is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626848" version="1" comment="libsndfile1-32bit is &lt;1.0.28-5.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626954" version="1" comment="python2-boto3 is &lt;1.17.9-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626955" version="1" comment="python2-botocore is &lt;1.20.9-33.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631148" version="1" comment="ffmpeg is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631149" version="1" comment="libavdevice57 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631150" version="1" comment="libavfilter6 is &lt;3.4.2-11.8.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626424" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.12.0-3.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626425" version="1" comment="java-11-openjdk-jmods is &lt;11.0.12.0-3.59.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497916" version="1" comment="python2-ovs is &lt;2.11.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633307" version="1" comment="ffmpeg is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633308" version="1" comment="libavdevice57 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633309" version="1" comment="libavfilter6 is &lt;3.4.2-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633477" version="1" comment="libgd3-32bit is &lt;2.2.5-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632666" version="1" comment="postgresql13-test is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634434" version="1" comment="ffmpeg is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634435" version="1" comment="libavdevice57 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634436" version="1" comment="libavfilter6 is &lt;3.4.2-11.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652763" version="1" comment="strongswan-nm is &lt;5.8.2-11.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497917" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.10.0-3.53.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652760" version="1" comment="ffmpeg is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652761" version="1" comment="libavdevice57 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652762" version="1" comment="libavfilter6 is &lt;3.4.2-11.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653458" version="1" comment="binutils-gold is &lt;2.37-7.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654334" version="1" comment="binutils-gold is &lt;2.37-7.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653313" version="1" comment="java-11-openjdk-javadoc is &lt;11.0.13.0-3.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653314" version="1" comment="java-11-openjdk-jmods is &lt;11.0.13.0-3.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656750" version="1" comment="postgresql12-llvmjit is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656751" version="1" comment="postgresql12-test is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656462" version="1" comment="postgresql14-llvmjit is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656463" version="1" comment="postgresql14-test is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655895" version="1" comment="postgresql13-llvmjit is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655896" version="1" comment="postgresql13-test is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658099" version="1" comment="python2-Pygments is &lt;2.2.0-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656461" version="1" comment="libspeex1-32bit is &lt;1.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658537" version="1" comment="php7-embed is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659808" version="1" comment="p11-kit-32bit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497918" version="1" comment="libopenvswitch-2_13-0 is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497919" version="1" comment="python3-ovs is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497920" version="1" comment="python2-ovs is &lt;2.11.5-3.15.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497921" version="1" comment="php7-embed is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497922" version="1" comment="postgresql13-test is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497923" version="1" comment="python3-avahi is &lt;0.7-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662937" version="1" comment="apache2-event is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498051" version="1" comment="google-compute-engine-init is &lt;20190801-4.38.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498052" version="1" comment="google-compute-engine-oslogin is &lt;20190801-4.38.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498112" version="1" comment="kernel-azure is &lt;5.3.18-18.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498113" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498114" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498115" version="1" comment="kernel-source-azure is &lt;5.3.18-18.5.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498116" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498117" version="1" comment="kernel-azure is &lt;5.3.18-18.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498118" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498119" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498120" version="1" comment="kernel-source-azure is &lt;5.3.18-18.12.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498121" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498122" version="1" comment="kernel-azure is &lt;5.3.18-18.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498123" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498124" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498125" version="1" comment="kernel-source-azure is &lt;5.3.18-18.15.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498126" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498127" version="1" comment="kernel-azure is &lt;5.3.18-18.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498128" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498129" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498130" version="1" comment="kernel-source-azure is &lt;5.3.18-18.18.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498131" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.18.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498132" version="1" comment="kernel-azure is &lt;5.3.18-18.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498133" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498134" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498135" version="1" comment="kernel-source-azure is &lt;5.3.18-18.21.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498136" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.21.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498137" version="1" comment="rmt-server-pubcloud is &lt;2.6.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498138" version="1" comment="kernel-azure is &lt;5.3.18-18.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498139" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498140" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498141" version="1" comment="kernel-source-azure is &lt;5.3.18-18.24.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498142" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498143" version="1" comment="kernel-azure is &lt;5.3.18-18.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498144" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498145" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498146" version="1" comment="kernel-source-azure is &lt;5.3.18-18.29.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498147" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.29.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498148" version="1" comment="kernel-azure is &lt;5.3.18-18.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498149" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498150" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498151" version="1" comment="kernel-source-azure is &lt;5.3.18-18.41.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498152" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.41.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498153" version="1" comment="kernel-azure is &lt;5.3.18-18.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498154" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498155" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498156" version="1" comment="kernel-source-azure is &lt;5.3.18-18.44.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498157" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.44.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498104" version="1" comment="python-aiohttp-doc is &lt;3.4.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498105" version="1" comment="python3-aiohttp is &lt;3.4.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498158" version="1" comment="kernel-azure is &lt;5.3.18-18.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498159" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.47.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498160" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498161" version="1" comment="kernel-source-azure is &lt;5.3.18-18.47.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498162" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.47.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498163" version="1" comment="kernel-azure is &lt;5.3.18-18.50.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498164" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.50.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498165" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.50.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498166" version="1" comment="kernel-source-azure is &lt;5.3.18-18.50.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498167" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.50.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624283" version="1" comment="kernel-azure is &lt;5.3.18-18.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624284" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624285" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624286" version="1" comment="kernel-source-azure is &lt;5.3.18-18.53.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624287" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.53.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625625" version="1" comment="kernel-azure is &lt;5.3.18-18.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625626" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625627" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.58.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625628" version="1" comment="kernel-source-azure is &lt;5.3.18-18.58.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625629" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.58.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498168" version="1" comment="terraform is &lt;0.13.4-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498169" version="1" comment="terraform-provider-aws is &lt;3.11.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498170" version="1" comment="terraform-provider-azurerm is &lt;2.32.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498171" version="1" comment="terraform-provider-external is &lt;2.0.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498172" version="1" comment="terraform-provider-google is &lt;3.43.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498173" version="1" comment="terraform-provider-helm is &lt;1.3.2-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498174" version="1" comment="terraform-provider-kubernetes is &lt;1.13.2-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498175" version="1" comment="terraform-provider-local is &lt;2.0.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498176" version="1" comment="terraform-provider-null is &lt;3.0.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498177" version="1" comment="terraform-provider-random is &lt;3.0.0-6.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498178" version="1" comment="terraform-provider-tls is &lt;3.0.0-5.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627886" version="1" comment="kernel-azure is &lt;5.3.18-18.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627887" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627888" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627889" version="1" comment="kernel-source-azure is &lt;5.3.18-18.61.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627890" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626957" version="1" comment="aws-cli is &lt;1.19.9-26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633310" version="1" comment="kernel-azure is &lt;5.3.18-18.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633311" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.66.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633312" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.66.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633313" version="1" comment="kernel-source-azure is &lt;5.3.18-18.66.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633314" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.66.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651669" version="1" comment="kernel-azure is &lt;5.3.18-18.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651670" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651671" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651672" version="1" comment="kernel-source-azure is &lt;5.3.18-18.69.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651673" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.69.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652136" version="1" comment="rpm-ndb is &lt;4.14.1-22.4.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498179" version="1" comment="kernel-azure is &lt;5.3.18-18.35.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498180" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.35.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498181" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.35.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498182" version="1" comment="kernel-source-azure is &lt;5.3.18-18.35.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498183" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.35.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654335" version="1" comment="kernel-azure is &lt;5.3.18-18.72.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654336" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.72.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654337" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.72.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654338" version="1" comment="kernel-source-azure is &lt;5.3.18-18.72.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654339" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.72.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657752" version="1" comment="kernel-azure is &lt;5.3.18-18.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657753" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657754" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657755" version="1" comment="kernel-source-azure is &lt;5.3.18-18.75.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657756" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.75.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498184" version="1" comment="kernel-azure is &lt;5.3.18-18.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498185" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498186" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498187" version="1" comment="kernel-source-azure is &lt;5.3.18-18.38.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498188" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.38.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498189" version="1" comment="kernel-azure is &lt;5.3.18-18.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498190" version="1" comment="kernel-azure-devel is &lt;5.3.18-18.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498191" version="1" comment="kernel-devel-azure is &lt;5.3.18-18.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498192" version="1" comment="kernel-source-azure is &lt;5.3.18-18.32.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498193" version="1" comment="kernel-syms-azure is &lt;5.3.18-18.32.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672751" version="1" comment="python3-protobuf is &lt;3.9.2-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681167" version="1" comment="amazon-ssm-agent is &lt;3.1.1260.0-150000.5.9.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498234" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287164" version="1" comment="sle-module-python2-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498235" version="1" comment="mercurial is &lt;4.5.2-3.9.44 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498241" version="1" comment="python-ipaddress is &lt;1.0.18-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498286" version="1" comment="samba-ad-dc is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498287" version="1" comment="samba-dsdb-modules is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498288" version="1" comment="python2-targetcli-fb is &lt;2.1.52-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498289" version="1" comment="python2-rtslib-fb is &lt;2.1.73-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498251" version="1" comment="python-curses is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498252" version="1" comment="python-devel is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498253" version="1" comment="python-gdbm is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498254" version="1" comment="python-xml is &lt;2.7.17-7.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498255" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498290" version="1" comment="samba-ad-dc is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498291" version="1" comment="samba-dsdb-modules is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498261" version="1" comment="python2-pip is &lt;10.0.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498292" version="1" comment="samba-ad-dc is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498293" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498267" version="1" comment="python-curses is &lt;2.7.17-7.44.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498268" version="1" comment="python-devel is &lt;2.7.17-7.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498269" version="1" comment="python-gdbm is &lt;2.7.17-7.44.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498270" version="1" comment="python-xml is &lt;2.7.17-7.44.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498294" version="1" comment="python2-salt is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498272" version="1" comment="python2-pip is &lt;10.0.1-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498273" version="1" comment="python2-setuptools is &lt;40.5.0-6.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498295" version="1" comment="python2-cryptography is &lt;2.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498274" version="1" comment="python-curses is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498275" version="1" comment="python-devel is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498276" version="1" comment="python-gdbm is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498277" version="1" comment="python-xml is &lt;2.7.17-7.47.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498278" version="1" comment="python2-urllib3 is &lt;1.24-9.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498279" version="1" comment="python2-pip is &lt;20.0.2-6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498296" version="1" comment="samba-ad-dc is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498297" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498298" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.34.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498299" version="1" comment="python2-py is &lt;1.8.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498300" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498301" version="1" comment="python2-distro is &lt;1.5.0-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626960" version="1" comment="python2-asn1crypto is &lt;0.24.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626961" version="1" comment="python2-cffi is &lt;1.13.2-3.2.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626962" version="1" comment="python2-cryptography is &lt;2.8-10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626963" version="1" comment="python2-pyOpenSSL is &lt;17.5.0-8.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626964" version="1" comment="python2-pyasn1 is &lt;0.4.2-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626965" version="1" comment="python2-pycparser is &lt;2.17-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626966" version="1" comment="python2-urllib3 is &lt;1.25.10-9.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652137" version="1" comment="python2-rpm is &lt;4.14.1-22.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651680" version="1" comment="python-curses is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651681" version="1" comment="python-devel is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651682" version="1" comment="python-gdbm is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651683" version="1" comment="python-xml is &lt;2.7.18-33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498302" version="1" comment="python-curses is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498303" version="1" comment="python-devel is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498304" version="1" comment="python-gdbm is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498305" version="1" comment="python-xml is &lt;2.7.17-7.52.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654814" version="1" comment="samba-ad-dc is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658538" version="1" comment="python2-Babel is &lt;2.8.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659041" version="1" comment="python2-pip is &lt;20.0.2-6.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498306" version="1" comment="python2-bottle is &lt;0.12.13-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498307" version="1" comment="python2-cryptography is &lt;2.8-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498308" version="1" comment="python2-salt is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498309" version="1" comment="python2-Jinja2 is &lt;2.10.1-3.10.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498310" version="1" comment="python-curses is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498311" version="1" comment="python-devel is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498312" version="1" comment="python-gdbm is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498313" version="1" comment="python-xml is &lt;2.7.18-7.55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498314" version="1" comment="libldb1 is &lt;1.4.6-3.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498448" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498449" version="1" comment="dlm-kmp-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498450" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498451" version="1" comment="kernel-devel-rt is &lt;5.3.18-13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498452" version="1" comment="kernel-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498453" version="1" comment="kernel-rt-devel is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498454" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498455" version="1" comment="kernel-source-rt is &lt;5.3.18-13.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498456" version="1" comment="kernel-syms-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498457" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-13.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009298381" version="1" comment="sle-module-rt-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664578" version="1" comment="SLE_RT-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498458" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498459" version="1" comment="dlm-kmp-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498460" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498461" version="1" comment="kernel-devel-rt is &lt;5.3.18-16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498462" version="1" comment="kernel-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498463" version="1" comment="kernel-rt-devel is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498464" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498465" version="1" comment="kernel-source-rt is &lt;5.3.18-16.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498466" version="1" comment="kernel-syms-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498467" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-16.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498468" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498469" version="1" comment="dlm-kmp-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498470" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498471" version="1" comment="kernel-devel-rt is &lt;5.3.18-19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498472" version="1" comment="kernel-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498473" version="1" comment="kernel-rt-devel is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498474" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498475" version="1" comment="kernel-source-rt is &lt;5.3.18-19.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498476" version="1" comment="kernel-syms-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498477" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-19.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498478" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498479" version="1" comment="dlm-kmp-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498480" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498481" version="1" comment="kernel-devel-rt is &lt;5.3.18-22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498482" version="1" comment="kernel-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498483" version="1" comment="kernel-rt-devel is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498484" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498485" version="1" comment="kernel-source-rt is &lt;5.3.18-22.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498486" version="1" comment="kernel-syms-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498487" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-22.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498488" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498489" version="1" comment="dlm-kmp-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498490" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498491" version="1" comment="kernel-devel-rt is &lt;5.3.18-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498492" version="1" comment="kernel-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498493" version="1" comment="kernel-rt-devel is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498494" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498495" version="1" comment="kernel-source-rt is &lt;5.3.18-33.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498496" version="1" comment="kernel-syms-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498497" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-33.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498498" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498499" version="1" comment="dlm-kmp-rt is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498500" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498501" version="1" comment="kernel-devel-rt is &lt;5.3.18-36.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498502" version="1" comment="kernel-rt is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498503" version="1" comment="kernel-rt-devel is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498504" version="1" comment="kernel-rt_debug is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498505" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498506" version="1" comment="kernel-source-rt is &lt;5.3.18-36.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498507" version="1" comment="kernel-syms-rt is &lt;5.3.18-36.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498508" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-36.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498509" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498510" version="1" comment="dlm-kmp-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498511" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498512" version="1" comment="kernel-devel-rt is &lt;5.3.18-39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498513" version="1" comment="kernel-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498514" version="1" comment="kernel-rt-devel is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498515" version="1" comment="kernel-rt_debug is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498516" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498517" version="1" comment="kernel-source-rt is &lt;5.3.18-39.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498518" version="1" comment="kernel-syms-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498519" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-39.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625454" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625455" version="1" comment="dlm-kmp-rt is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625456" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625457" version="1" comment="kernel-devel-rt is &lt;5.3.18-42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625458" version="1" comment="kernel-rt is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625459" version="1" comment="kernel-rt-devel is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625460" version="1" comment="kernel-rt_debug is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625461" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625462" version="1" comment="kernel-source-rt is &lt;5.3.18-42.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625463" version="1" comment="kernel-syms-rt is &lt;5.3.18-42.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625464" version="1" comment="lttng-modules-kmp-rt is &lt;2.10.10_k5.3.18_42-1.5.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625465" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-42.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625466" version="1" comment="oracleasm-kmp-rt is &lt;2.0.8_k5.3.18_42-1.3.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626888" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626889" version="1" comment="dlm-kmp-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626890" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626891" version="1" comment="kernel-devel-rt is &lt;5.3.18-45.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626892" version="1" comment="kernel-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626893" version="1" comment="kernel-rt-devel is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626894" version="1" comment="kernel-rt_debug is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626895" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626896" version="1" comment="kernel-source-rt is &lt;5.3.18-45.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626897" version="1" comment="kernel-syms-rt is &lt;5.3.18-45.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626898" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-45.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628042" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628043" version="1" comment="dlm-kmp-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628044" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628045" version="1" comment="kernel-devel-rt is &lt;5.3.18-48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628046" version="1" comment="kernel-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628047" version="1" comment="kernel-rt-devel is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628048" version="1" comment="kernel-rt_debug is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628049" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628050" version="1" comment="kernel-source-rt is &lt;5.3.18-48.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628051" version="1" comment="kernel-syms-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628052" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633316" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633317" version="1" comment="dlm-kmp-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633318" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633319" version="1" comment="kernel-devel-rt is &lt;5.3.18-51.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633320" version="1" comment="kernel-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633321" version="1" comment="kernel-rt-devel is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633322" version="1" comment="kernel-rt_debug is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633323" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633324" version="1" comment="kernel-source-rt is &lt;5.3.18-51.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633325" version="1" comment="kernel-syms-rt is &lt;5.3.18-51.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633326" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-51.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651685" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651686" version="1" comment="dlm-kmp-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651687" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651688" version="1" comment="kernel-devel-rt is &lt;5.3.18-54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651689" version="1" comment="kernel-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651690" version="1" comment="kernel-rt-devel is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651691" version="1" comment="kernel-rt_debug is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651692" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651693" version="1" comment="kernel-source-rt is &lt;5.3.18-54.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651694" version="1" comment="kernel-syms-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651695" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-54.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651696" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651697" version="1" comment="dlm-kmp-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651698" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651699" version="1" comment="kernel-devel-rt is &lt;5.3.18-57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651700" version="1" comment="kernel-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651701" version="1" comment="kernel-rt-devel is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654345" version="1" comment="kernel-rt_debug is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651702" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651703" version="1" comment="kernel-source-rt is &lt;5.3.18-57.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651704" version="1" comment="kernel-syms-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651705" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-57.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658970" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658971" version="1" comment="dlm-kmp-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658972" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658973" version="1" comment="kernel-devel-rt is &lt;5.3.18-62.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658974" version="1" comment="kernel-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658975" version="1" comment="kernel-rt-devel is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658976" version="1" comment="kernel-rt_debug is &lt;5.3.18-62.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658977" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-62.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658978" version="1" comment="kernel-source-rt is &lt;5.3.18-62.3 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658979" version="1" comment="kernel-syms-rt is &lt;5.3.18-62.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658980" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-62.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498520" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498521" version="1" comment="dlm-kmp-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498522" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498523" version="1" comment="kernel-devel-rt is &lt;5.3.18-25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498524" version="1" comment="kernel-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498525" version="1" comment="kernel-rt-devel is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498526" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498527" version="1" comment="kernel-source-rt is &lt;5.3.18-25.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498528" version="1" comment="kernel-syms-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498529" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-25.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498530" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498531" version="1" comment="dlm-kmp-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498532" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498533" version="1" comment="kernel-devel-rt is &lt;5.3.18-28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498534" version="1" comment="kernel-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498535" version="1" comment="kernel-rt-devel is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498536" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498537" version="1" comment="kernel-source-rt is &lt;5.3.18-28.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498538" version="1" comment="kernel-syms-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498539" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-28.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679471" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679472" version="1" comment="dlm-kmp-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679473" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679474" version="1" comment="kernel-devel-rt is &lt;5.3.18-150200.79.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679475" version="1" comment="kernel-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679476" version="1" comment="kernel-rt-devel is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679477" version="1" comment="kernel-rt_debug is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679478" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679479" version="1" comment="kernel-source-rt is &lt;5.3.18-150200.79.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679480" version="1" comment="kernel-syms-rt is &lt;5.3.18-150200.79.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679481" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-150200.79.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658981" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658982" version="1" comment="dlm-kmp-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658983" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658984" version="1" comment="kernel-devel-rt is &lt;5.3.18-65.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658985" version="1" comment="kernel-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658986" version="1" comment="kernel-rt-devel is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664526" version="1" comment="kernel-rt_debug is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658987" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658988" version="1" comment="kernel-source-rt is &lt;5.3.18-65.2 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658989" version="1" comment="kernel-syms-rt is &lt;5.3.18-65.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658990" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-65.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662943" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662944" version="1" comment="dlm-kmp-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662945" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662946" version="1" comment="kernel-devel-rt is &lt;5.3.18-68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662947" version="1" comment="kernel-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662948" version="1" comment="kernel-rt-devel is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666523" version="1" comment="kernel-rt_debug is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662949" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662950" version="1" comment="kernel-source-rt is &lt;5.3.18-68.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662951" version="1" comment="kernel-syms-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662952" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-68.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668282" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668283" version="1" comment="dlm-kmp-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668284" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668285" version="1" comment="kernel-devel-rt is &lt;5.3.18-73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668286" version="1" comment="kernel-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668287" version="1" comment="kernel-rt-devel is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668288" version="1" comment="kernel-rt_debug is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668289" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668290" version="1" comment="kernel-source-rt is &lt;5.3.18-73.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668291" version="1" comment="kernel-syms-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668292" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-73.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671413" version="1" comment="cluster-md-kmp-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671414" version="1" comment="dlm-kmp-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671415" version="1" comment="gfs2-kmp-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671416" version="1" comment="kernel-devel-rt is &lt;5.3.18-76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671417" version="1" comment="kernel-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671418" version="1" comment="kernel-rt-devel is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671419" version="1" comment="kernel-rt_debug is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671420" version="1" comment="kernel-rt_debug-devel is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671421" version="1" comment="kernel-source-rt is &lt;5.3.18-76.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671422" version="1" comment="kernel-syms-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671423" version="1" comment="ocfs2-kmp-rt is &lt;5.3.18-76.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499317" version="1" comment="libct4 is &lt;1.1.36-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499345" version="1" comment="libfreebl3-hmac is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499346" version="1" comment="libsoftokn3-hmac is &lt;3.53-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499353" version="1" comment="squid is &lt;4.12-5.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499354" version="1" comment="libfreebl3-hmac is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499355" version="1" comment="libsoftokn3-hmac is &lt;3.53.1-3.45.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009498738" version="1" comment="graphviz-tcl is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499629" version="1" comment="xen is &lt;4.13.1_04-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499630" version="1" comment="xen-devel is &lt;4.13.1_04-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499631" version="1" comment="xen-tools is &lt;4.13.1_04-3.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499632" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_04-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499633" version="1" comment="qemu is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499634" version="1" comment="qemu-arm is &lt;4.2.1-11.4.4 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499635" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499636" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499637" version="1" comment="qemu-block-curl is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499638" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499639" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499640" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499641" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499642" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499643" version="1" comment="qemu-kvm is &lt;4.2.1-11.4.4 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499644" version="1" comment="qemu-lang is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499645" version="1" comment="qemu-microvm is &lt;4.2.1-11.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499646" version="1" comment="qemu-ppc is &lt;4.2.1-11.4.4 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499647" version="1" comment="qemu-s390 is &lt;4.2.1-11.4.4 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499648" version="1" comment="qemu-seabios is &lt;1.12.1+-11.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499649" version="1" comment="qemu-sgabios is &lt;8-11.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499650" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499651" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499652" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.4.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499653" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.4.4 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499654" version="1" comment="qemu-x86 is &lt;4.2.1-11.4.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499655" version="1" comment="grub2-x86_64-xen is &lt;2.04-9.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499656" version="1" comment="xen is &lt;4.13.1_06-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499657" version="1" comment="xen-devel is &lt;4.13.1_06-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499658" version="1" comment="xen-tools is &lt;4.13.1_06-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499659" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_06-3.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499660" version="1" comment="libecpg6 is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499661" version="1" comment="postgresql12-contrib is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499662" version="1" comment="postgresql12-devel is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499663" version="1" comment="postgresql12-docs is &lt;12.4-8.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499664" version="1" comment="postgresql12-plperl is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499665" version="1" comment="postgresql12-plpython is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499666" version="1" comment="postgresql12-pltcl is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499667" version="1" comment="postgresql12-server is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499668" version="1" comment="postgresql12-server-devel is &lt;12.4-8.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499669" version="1" comment="libvirt is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499670" version="1" comment="libvirt-admin is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499671" version="1" comment="libvirt-bash-completion is &lt;6.0.0-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499672" version="1" comment="libvirt-client is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499673" version="1" comment="libvirt-daemon is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499674" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499675" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499676" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499677" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499678" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499679" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499680" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499681" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499682" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499683" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499684" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499685" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499686" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499687" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499688" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499689" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499690" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499691" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499692" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499693" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499694" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499695" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499696" version="1" comment="libvirt-devel is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499697" version="1" comment="libvirt-doc is &lt;6.0.0-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499698" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499699" version="1" comment="libvirt-nss is &lt;6.0.0-13.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499700" version="1" comment="grub2-x86_64-xen is &lt;2.04-9.15.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499701" version="1" comment="apache2-devel is &lt;2.4.43-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499702" version="1" comment="apache2-doc is &lt;2.4.43-3.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499703" version="1" comment="apache2-worker is &lt;2.4.43-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499445" version="1" comment="postgresql10-contrib is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499446" version="1" comment="postgresql10-devel is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499447" version="1" comment="postgresql10-docs is &lt;10.14-8.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499448" version="1" comment="postgresql10-plperl is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499449" version="1" comment="postgresql10-plpython is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499450" version="1" comment="postgresql10-pltcl is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499451" version="1" comment="postgresql10-server is &lt;10.14-8.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499452" version="1" comment="squid is &lt;4.13-5.23.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499704" version="1" comment="ovmf is &lt;201911-7.5.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499705" version="1" comment="ovmf-tools is &lt;201911-7.5.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499706" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-7.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499707" version="1" comment="qemu-uefi-aarch64 is &lt;201911-7.5.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499708" version="1" comment="dpdk is &lt;19.11.4-3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499709" version="1" comment="dpdk-devel is &lt;19.11.4-3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499710" version="1" comment="dpdk-kmp-default is &lt;19.11.4_k5.3.18_24.15-3.9.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499711" version="1" comment="dpdk-thunderx is &lt;19.11.4-3.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499712" version="1" comment="dpdk-thunderx-devel is &lt;19.11.4-3.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499713" version="1" comment="dpdk-thunderx-kmp-default is &lt;19.11.4_k5.3.18_24.15-3.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499714" version="1" comment="dpdk-tools is &lt;19.11.4-3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499715" version="1" comment="libdpdk-20_0 is &lt;19.11.4-3.9.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499716" version="1" comment="xen is &lt;4.13.1_08-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499717" version="1" comment="xen-devel is &lt;4.13.1_08-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499718" version="1" comment="xen-tools is &lt;4.13.1_08-3.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499719" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_08-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499720" version="1" comment="qemu is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499721" version="1" comment="qemu-arm is &lt;4.2.1-11.10.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499722" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499723" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499724" version="1" comment="qemu-block-curl is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499725" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499726" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499727" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499728" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499729" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499730" version="1" comment="qemu-kvm is &lt;4.2.1-11.10.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499731" version="1" comment="qemu-lang is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499732" version="1" comment="qemu-microvm is &lt;4.2.1-11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499733" version="1" comment="qemu-ppc is &lt;4.2.1-11.10.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499734" version="1" comment="qemu-s390 is &lt;4.2.1-11.10.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499735" version="1" comment="qemu-seabios is &lt;1.12.1+-11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499736" version="1" comment="qemu-sgabios is &lt;8-11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499737" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499738" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499739" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499740" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499741" version="1" comment="qemu-x86 is &lt;4.2.1-11.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499467" version="1" comment="bind is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499468" version="1" comment="bind-chrootenv is &lt;9.16.6-12.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499469" version="1" comment="bind-doc is &lt;9.16.6-12.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499742" version="1" comment="libvirt is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499743" version="1" comment="libvirt-admin is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499744" version="1" comment="libvirt-bash-completion is &lt;6.0.0-13.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499745" version="1" comment="libvirt-client is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499746" version="1" comment="libvirt-daemon is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499747" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499748" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499749" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499750" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-13.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499751" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499752" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499753" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499754" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499755" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499756" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499757" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499758" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499759" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499760" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499761" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499762" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499763" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499764" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499765" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499766" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499767" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499768" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-13.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499769" version="1" comment="libvirt-devel is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499770" version="1" comment="libvirt-doc is &lt;6.0.0-13.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499771" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499772" version="1" comment="libvirt-nss is &lt;6.0.0-13.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499773" version="1" comment="rmt-server is &lt;2.6.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499774" version="1" comment="rmt-server-config is &lt;2.6.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499501" version="1" comment="python3-virt-bootstrap is &lt;1.0.0-5.3.124 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499775" version="1" comment="xen is &lt;4.13.1_10-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499776" version="1" comment="xen-devel is &lt;4.13.1_10-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499777" version="1" comment="xen-tools is &lt;4.13.1_10-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499778" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.1_10-3.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499779" version="1" comment="libspice-server-devel is &lt;0.14.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499780" version="1" comment="libspice-server1 is &lt;0.14.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499781" version="1" comment="spice-gtk-devel is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499782" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499783" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.37-3.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499784" version="1" comment="salt-api is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499785" version="1" comment="salt-cloud is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499786" version="1" comment="salt-fish-completion is &lt;3000-4.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499787" version="1" comment="salt-master is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499788" version="1" comment="salt-proxy is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499789" version="1" comment="salt-ssh is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499790" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499791" version="1" comment="salt-syndic is &lt;3000-4.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499521" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499522" version="1" comment="krb5-server is &lt;1.16.3-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499792" version="1" comment="xen is &lt;4.13.2_02-3.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499793" version="1" comment="xen-devel is &lt;4.13.2_02-3.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499794" version="1" comment="xen-tools is &lt;4.13.2_02-3.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499795" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_02-3.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499796" version="1" comment="libecpg6 is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499797" version="1" comment="postgresql12-contrib is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499798" version="1" comment="postgresql12-devel is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499799" version="1" comment="postgresql12-docs is &lt;12.5-8.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499800" version="1" comment="postgresql12-plperl is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499801" version="1" comment="postgresql12-plpython is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499802" version="1" comment="postgresql12-pltcl is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499803" version="1" comment="postgresql12-server is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499804" version="1" comment="postgresql12-server-devel is &lt;12.5-8.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499535" version="1" comment="postgresql10-contrib is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499536" version="1" comment="postgresql10-devel is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499537" version="1" comment="postgresql10-docs is &lt;10.15-8.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499538" version="1" comment="postgresql10-plperl is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499539" version="1" comment="postgresql10-plpython is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499540" version="1" comment="postgresql10-pltcl is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499541" version="1" comment="postgresql10-server is &lt;10.15-8.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499544" version="1" comment="libmariadb-devel is &lt;3.1.11-3.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499545" version="1" comment="libmariadb_plugins is &lt;3.1.11-3.22.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499805" version="1" comment="libmariadbd-devel is &lt;10.4.17-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499806" version="1" comment="libmariadbd19 is &lt;10.4.17-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499807" version="1" comment="mariadb is &lt;10.4.17-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499808" version="1" comment="mariadb-client is &lt;10.4.17-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499809" version="1" comment="mariadb-errormessages is &lt;10.4.17-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499810" version="1" comment="mariadb-tools is &lt;10.4.17-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499811" version="1" comment="xen is &lt;4.13.2_04-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499812" version="1" comment="xen-devel is &lt;4.13.2_04-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499813" version="1" comment="xen-tools is &lt;4.13.2_04-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499814" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_04-3.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499815" version="1" comment="openssh-fips is &lt;8.1p1-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499816" version="1" comment="ovmf is &lt;201911-7.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499817" version="1" comment="ovmf-tools is &lt;201911-7.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499818" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-7.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499819" version="1" comment="qemu-uefi-aarch64 is &lt;201911-7.8.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499820" version="1" comment="xen is &lt;4.13.2_06-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499821" version="1" comment="xen-devel is &lt;4.13.2_06-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499822" version="1" comment="xen-tools is &lt;4.13.2_06-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499823" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_06-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493068" version="1" comment="libicu60_2 is &lt;60.2-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493069" version="1" comment="libicu60_2-bedata is &lt;60.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009493070" version="1" comment="libicu60_2-ledata is &lt;60.2-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499824" version="1" comment="xen is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499825" version="1" comment="xen-devel is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499826" version="1" comment="xen-tools is &lt;4.13.2_08-3.25.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499827" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.2_08-3.25.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499828" version="1" comment="qemu is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499829" version="1" comment="qemu-arm is &lt;4.2.1-11.16.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499830" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499831" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499832" version="1" comment="qemu-block-curl is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499833" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499834" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499835" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499836" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499837" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499838" version="1" comment="qemu-kvm is &lt;4.2.1-11.16.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499839" version="1" comment="qemu-lang is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499840" version="1" comment="qemu-microvm is &lt;4.2.1-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499841" version="1" comment="qemu-ppc is &lt;4.2.1-11.16.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499842" version="1" comment="qemu-s390 is &lt;4.2.1-11.16.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499843" version="1" comment="qemu-seabios is &lt;1.12.1+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499844" version="1" comment="qemu-sgabios is &lt;8-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499845" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499846" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499847" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.16.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499848" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.16.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499849" version="1" comment="qemu-x86 is &lt;4.2.1-11.16.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499850" version="1" comment="bind is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499851" version="1" comment="bind-chrootenv is &lt;9.16.6-12.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499852" version="1" comment="bind-doc is &lt;9.16.6-12.49.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499853" version="1" comment="sca-patterns-sle11 is &lt;1.3.1-7.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499854" version="1" comment="ibutils is &lt;1.5.7.0.2-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499855" version="1" comment="ibutils-devel is &lt;1.5.7.0.2-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499856" version="1" comment="ibutils-ui is &lt;1.5.7.0.2-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499857" version="1" comment="libibdm1 is &lt;1.5.7.0.2-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499858" version="1" comment="ibsim is &lt;0.8-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499859" version="1" comment="grub2-x86_64-xen is &lt;2.04-9.45.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499860" version="1" comment="graphviz-tcl is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499861" version="1" comment="redis is &lt;6.0.13-1.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499862" version="1" comment="libecpg6 is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499863" version="1" comment="postgresql-contrib is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499864" version="1" comment="postgresql-devel is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499865" version="1" comment="postgresql-docs is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499866" version="1" comment="postgresql-plperl is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499867" version="1" comment="postgresql-plpython is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499868" version="1" comment="postgresql-pltcl is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499869" version="1" comment="postgresql-server is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499870" version="1" comment="postgresql-server-devel is &lt;13-4.6.7 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499871" version="1" comment="postgresql13-contrib is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499872" version="1" comment="postgresql13-devel is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499873" version="1" comment="postgresql13-docs is &lt;13.1-5.3.15 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499874" version="1" comment="postgresql13-plperl is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499875" version="1" comment="postgresql13-plpython is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499876" version="1" comment="postgresql13-pltcl is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499877" version="1" comment="postgresql13-server is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499878" version="1" comment="postgresql13-server-devel is &lt;13.1-5.3.15 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499879" version="1" comment="libecpg6 is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499880" version="1" comment="postgresql13-contrib is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499881" version="1" comment="postgresql13-devel is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499882" version="1" comment="postgresql13-docs is &lt;13.3-5.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499883" version="1" comment="postgresql13-plperl is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499884" version="1" comment="postgresql13-plpython is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499885" version="1" comment="postgresql13-pltcl is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499886" version="1" comment="postgresql13-server is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499887" version="1" comment="postgresql13-server-devel is &lt;13.3-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499888" version="1" comment="nginx is &lt;1.16.1-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499889" version="1" comment="nginx-source is &lt;1.16.1-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499890" version="1" comment="dhcp-relay is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499891" version="1" comment="dhcp-server is &lt;4.3.6.P1-6.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499892" version="1" comment="389-ds is &lt;1.4.3.23~git0.f53d0132b-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499893" version="1" comment="389-ds-devel is &lt;1.4.3.23~git0.f53d0132b-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499894" version="1" comment="lib389 is &lt;1.4.3.23~git0.f53d0132b-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499895" version="1" comment="libsvrcore0 is &lt;1.4.3.23~git0.f53d0132b-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499896" version="1" comment="qemu is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499897" version="1" comment="qemu-arm is &lt;4.2.1-11.19.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499898" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499899" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499900" version="1" comment="qemu-block-curl is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499901" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499902" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499903" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499904" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499905" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499906" version="1" comment="qemu-kvm is &lt;4.2.1-11.19.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499907" version="1" comment="qemu-lang is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499908" version="1" comment="qemu-microvm is &lt;4.2.1-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499909" version="1" comment="qemu-ppc is &lt;4.2.1-11.19.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499910" version="1" comment="qemu-s390 is &lt;4.2.1-11.19.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499911" version="1" comment="qemu-seabios is &lt;1.12.1+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499912" version="1" comment="qemu-sgabios is &lt;8-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499913" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499914" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499915" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499916" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499917" version="1" comment="qemu-x86 is &lt;4.2.1-11.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499918" version="1" comment="pam_radius is &lt;1.4.0-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499919" version="1" comment="qemu-audio-oss is &lt;3.1.1.1-9.27.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499920" version="1" comment="libspice-server-devel is &lt;0.14.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499921" version="1" comment="libspice-server1 is &lt;0.14.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499922" version="1" comment="stunnel is &lt;5.57-3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499923" version="1" comment="squid is &lt;4.15-5.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497146" version="1" comment="postgresql10-contrib is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497147" version="1" comment="postgresql10-devel is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499924" version="1" comment="postgresql10-docs is &lt;10.17-8.35.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497148" version="1" comment="postgresql10-plperl is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497149" version="1" comment="postgresql10-plpython is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497150" version="1" comment="postgresql10-pltcl is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497151" version="1" comment="postgresql10-server is &lt;10.17-8.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497153" version="1" comment="postgresql12-contrib is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497154" version="1" comment="postgresql12-devel is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497155" version="1" comment="postgresql12-docs is &lt;12.7-8.20.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009117869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497156" version="1" comment="postgresql12-plperl is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497157" version="1" comment="postgresql12-plpython is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497158" version="1" comment="postgresql12-pltcl is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497159" version="1" comment="postgresql12-server is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009497160" version="1" comment="postgresql12-server-devel is &lt;12.7-8.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499947" version="1" comment="salt-api is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499948" version="1" comment="salt-cloud is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499949" version="1" comment="salt-fish-completion is &lt;3002.2-37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499950" version="1" comment="salt-master is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499951" version="1" comment="salt-proxy is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499952" version="1" comment="salt-ssh is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499953" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499954" version="1" comment="salt-syndic is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499955" version="1" comment="dovecot23 is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499956" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499957" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499958" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499959" version="1" comment="dovecot23-devel is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499960" version="1" comment="dovecot23-fts is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499961" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499962" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499963" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-55.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499964" version="1" comment="apache2-devel is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499965" version="1" comment="apache2-doc is &lt;2.4.43-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499966" version="1" comment="apache2-worker is &lt;2.4.43-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499967" version="1" comment="freeradius-server is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499968" version="1" comment="freeradius-server-devel is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499969" version="1" comment="freeradius-server-krb5 is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499970" version="1" comment="freeradius-server-ldap is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499971" version="1" comment="freeradius-server-libs is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499972" version="1" comment="freeradius-server-mysql is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499973" version="1" comment="freeradius-server-perl is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499974" version="1" comment="freeradius-server-postgresql is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499975" version="1" comment="freeradius-server-python3 is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499976" version="1" comment="freeradius-server-sqlite is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499977" version="1" comment="freeradius-server-utils is &lt;3.0.21-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499978" version="1" comment="ovmf is &lt;201911-7.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499979" version="1" comment="ovmf-tools is &lt;201911-7.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499980" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-7.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499981" version="1" comment="qemu-uefi-aarch64 is &lt;201911-7.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499925" version="1" comment="qemu is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499926" version="1" comment="qemu-arm is &lt;4.2.1-11.22.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499927" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499928" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499929" version="1" comment="qemu-block-curl is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499930" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499931" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499932" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499933" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499934" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499935" version="1" comment="qemu-kvm is &lt;4.2.1-11.22.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499936" version="1" comment="qemu-lang is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499937" version="1" comment="qemu-microvm is &lt;4.2.1-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499938" version="1" comment="qemu-ppc is &lt;4.2.1-11.22.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499939" version="1" comment="qemu-s390 is &lt;4.2.1-11.22.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499940" version="1" comment="qemu-seabios is &lt;1.12.1+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499941" version="1" comment="qemu-sgabios is &lt;8-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499942" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499943" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499944" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499945" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499946" version="1" comment="qemu-x86 is &lt;4.2.1-11.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624065" version="1" comment="redis is &lt;6.0.14-6.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624889" version="1" comment="libvirt is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624890" version="1" comment="libvirt-admin is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624891" version="1" comment="libvirt-bash-completion is &lt;6.0.0-13.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624892" version="1" comment="libvirt-client is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624893" version="1" comment="libvirt-daemon is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624894" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624895" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624896" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624897" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-13.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624898" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624899" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624900" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624901" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624902" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624903" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624904" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624905" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624906" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624907" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624908" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624909" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624910" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.16.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624911" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624912" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624913" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624914" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624915" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-13.16.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624916" version="1" comment="libvirt-devel is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624917" version="1" comment="libvirt-doc is &lt;6.0.0-13.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624918" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624919" version="1" comment="libvirt-nss is &lt;6.0.0-13.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625994" version="1" comment="linuxptp is &lt;1.8+git65.g303b08c-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626239" version="1" comment="qemu is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626240" version="1" comment="qemu-arm is &lt;4.2.1-11.25.2 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626241" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626242" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626243" version="1" comment="qemu-block-curl is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626244" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626245" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626246" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626247" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626248" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626249" version="1" comment="qemu-kvm is &lt;4.2.1-11.25.2 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626250" version="1" comment="qemu-lang is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626251" version="1" comment="qemu-microvm is &lt;4.2.1-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626252" version="1" comment="qemu-ppc is &lt;4.2.1-11.25.2 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626253" version="1" comment="qemu-s390 is &lt;4.2.1-11.25.2 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626254" version="1" comment="qemu-seabios is &lt;1.12.1+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626255" version="1" comment="qemu-sgabios is &lt;8-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626256" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626257" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626258" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.25.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626259" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.25.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626260" version="1" comment="qemu-x86 is &lt;4.2.1-11.25.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499982" version="1" comment="libovn-20_03-0 is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499983" version="1" comment="openvswitch is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499984" version="1" comment="openvswitch-devel is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499985" version="1" comment="openvswitch-ipsec is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499986" version="1" comment="openvswitch-pki is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499987" version="1" comment="openvswitch-test is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499988" version="1" comment="openvswitch-vtep is &lt;2.13.2-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499989" version="1" comment="ovn is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499990" version="1" comment="ovn-central is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499991" version="1" comment="ovn-devel is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499992" version="1" comment="ovn-docker is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499993" version="1" comment="ovn-host is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499994" version="1" comment="ovn-vtep is &lt;20.03.1-9.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626426" version="1" comment="libmariadbd-devel is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626427" version="1" comment="libmariadbd19 is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626428" version="1" comment="mariadb is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626429" version="1" comment="mariadb-client is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626430" version="1" comment="mariadb-errormessages is &lt;10.4.20-3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626431" version="1" comment="mariadb-tools is &lt;10.4.20-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630344" version="1" comment="qemu is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630345" version="1" comment="qemu-arm is &lt;4.2.1-11.28.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630346" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630347" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630348" version="1" comment="qemu-block-curl is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630349" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630350" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630351" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630352" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630353" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630354" version="1" comment="qemu-kvm is &lt;4.2.1-11.28.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630355" version="1" comment="qemu-lang is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630356" version="1" comment="qemu-microvm is &lt;4.2.1-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630357" version="1" comment="qemu-ppc is &lt;4.2.1-11.28.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630358" version="1" comment="qemu-s390 is &lt;4.2.1-11.28.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630359" version="1" comment="qemu-seabios is &lt;1.12.1+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630360" version="1" comment="qemu-sgabios is &lt;8-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630361" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630362" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630363" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630364" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.28.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630365" version="1" comment="qemu-x86 is &lt;4.2.1-11.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499995" version="1" comment="dovecot23 is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499996" version="1" comment="dovecot23-backend-mysql is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499997" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499998" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009499999" version="1" comment="dovecot23-devel is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500000" version="1" comment="dovecot23-fts is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500001" version="1" comment="dovecot23-fts-lucene is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500002" version="1" comment="dovecot23-fts-solr is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500003" version="1" comment="dovecot23-fts-squat is &lt;2.3.11.3-17.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626716" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626717" version="1" comment="krb5-server is &lt;1.16.3-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630839" version="1" comment="libmariadbd-devel is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630840" version="1" comment="libmariadbd19 is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630841" version="1" comment="mariadb is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630842" version="1" comment="mariadb-client is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630843" version="1" comment="mariadb-errormessages is &lt;10.4.21-3.14.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630844" version="1" comment="mariadb-tools is &lt;10.4.21-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626968" version="1" comment="389-ds is &lt;1.4.3.24~git13.7b705e743-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626969" version="1" comment="389-ds-devel is &lt;1.4.3.24~git13.7b705e743-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626970" version="1" comment="lib389 is &lt;1.4.3.24~git13.7b705e743-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626971" version="1" comment="libsvrcore0 is &lt;1.4.3.24~git13.7b705e743-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632141" version="1" comment="dovecot23 is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632142" version="1" comment="dovecot23-backend-mysql is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632143" version="1" comment="dovecot23-backend-pgsql is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632144" version="1" comment="dovecot23-backend-sqlite is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632145" version="1" comment="dovecot23-devel is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632146" version="1" comment="dovecot23-fts is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632147" version="1" comment="dovecot23-fts-lucene is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632148" version="1" comment="dovecot23-fts-solr is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632149" version="1" comment="dovecot23-fts-squat is &lt;2.3.15-58.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632247" version="1" comment="xen is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632248" version="1" comment="xen-devel is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632249" version="1" comment="xen-tools is &lt;4.13.3_02-3.34.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632250" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.3_02-3.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631152" version="1" comment="apache2-devel is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631153" version="1" comment="apache2-doc is &lt;2.4.43-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631154" version="1" comment="apache2-worker is &lt;2.4.43-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626967" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633432" version="1" comment="xen is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633433" version="1" comment="xen-devel is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633434" version="1" comment="xen-tools is &lt;4.13.3_04-3.37.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633435" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.3_04-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632234" version="1" comment="erlang-rabbitmq-client is &lt;3.8.3-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632235" version="1" comment="rabbitmq-server is &lt;3.8.3-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632236" version="1" comment="rabbitmq-server-plugins is &lt;3.8.3-3.3.4 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632667" version="1" comment="libecpg6 is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632668" version="1" comment="postgresql13-contrib is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632669" version="1" comment="postgresql13-devel is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632670" version="1" comment="postgresql13-docs is &lt;13.4-5.16.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632671" version="1" comment="postgresql13-plperl is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632672" version="1" comment="postgresql13-plpython is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632673" version="1" comment="postgresql13-pltcl is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632674" version="1" comment="postgresql13-server is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632675" version="1" comment="postgresql13-server-devel is &lt;13.4-5.16.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632658" version="1" comment="postgresql12-contrib is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632659" version="1" comment="postgresql12-devel is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632660" version="1" comment="postgresql12-docs is &lt;12.8-8.23.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632661" version="1" comment="postgresql12-plperl is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632662" version="1" comment="postgresql12-plpython is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632663" version="1" comment="postgresql12-pltcl is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632664" version="1" comment="postgresql12-server is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632665" version="1" comment="postgresql12-server-devel is &lt;12.8-8.23.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632232" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632233" version="1" comment="krb5-server is &lt;1.16.3-3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651418" version="1" comment="squid is &lt;4.17-5.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652765" version="1" comment="apache2-devel is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652766" version="1" comment="apache2-doc is &lt;2.4.43-3.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652767" version="1" comment="apache2-worker is &lt;2.4.43-3.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651419" version="1" comment="uuidd is &lt;2.33.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652141" version="1" comment="salt-api is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652142" version="1" comment="salt-cloud is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652143" version="1" comment="salt-fish-completion is &lt;3002.2-49.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652144" version="1" comment="salt-master is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652145" version="1" comment="salt-proxy is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652146" version="1" comment="salt-ssh is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652147" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652148" version="1" comment="salt-syndic is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652305" version="1" comment="libvirt is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652306" version="1" comment="libvirt-admin is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652307" version="1" comment="libvirt-bash-completion is &lt;6.0.0-13.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652308" version="1" comment="libvirt-client is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652309" version="1" comment="libvirt-daemon is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652310" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652311" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652312" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652313" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-13.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652314" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652315" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652316" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652317" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652318" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652319" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652320" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652321" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652322" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652323" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652324" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652325" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652326" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652327" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652328" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652329" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652330" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652331" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-13.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652332" version="1" comment="libvirt-devel is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652333" version="1" comment="libvirt-doc is &lt;6.0.0-13.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652334" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652335" version="1" comment="libvirt-nss is &lt;6.0.0-13.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652932" version="1" comment="qemu is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652933" version="1" comment="qemu-arm is &lt;4.2.1-11.31.3 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652934" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652935" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652936" version="1" comment="qemu-block-curl is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652937" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652938" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652939" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652940" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652941" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652942" version="1" comment="qemu-kvm is &lt;4.2.1-11.31.3 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652943" version="1" comment="qemu-lang is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652944" version="1" comment="qemu-microvm is &lt;4.2.1-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652945" version="1" comment="qemu-ppc is &lt;4.2.1-11.31.3 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652946" version="1" comment="qemu-s390 is &lt;4.2.1-11.31.3 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652947" version="1" comment="qemu-seabios is &lt;1.12.1+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652948" version="1" comment="qemu-sgabios is &lt;8-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652949" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652950" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652951" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.31.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652952" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.31.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652953" version="1" comment="qemu-x86 is &lt;4.2.1-11.31.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656740" version="1" comment="postgresql12-contrib is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656741" version="1" comment="postgresql12-devel is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656742" version="1" comment="postgresql12-docs is &lt;12.9-8.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656743" version="1" comment="postgresql12-plperl is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656744" version="1" comment="postgresql12-plpython is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656745" version="1" comment="postgresql12-pltcl is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656746" version="1" comment="postgresql12-server is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656747" version="1" comment="postgresql12-server-devel is &lt;12.9-8.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656466" version="1" comment="libecpg6 is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656467" version="1" comment="postgresql14-contrib is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656468" version="1" comment="postgresql14-devel is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656469" version="1" comment="postgresql14-docs is &lt;14.1-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656470" version="1" comment="postgresql14-plperl is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656471" version="1" comment="postgresql14-plpython is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656472" version="1" comment="postgresql14-pltcl is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656473" version="1" comment="postgresql14-server is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656474" version="1" comment="postgresql14-server-devel is &lt;14.1-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655905" version="1" comment="postgresql13-contrib is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655906" version="1" comment="postgresql13-devel is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655907" version="1" comment="postgresql13-docs is &lt;13.5-5.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655908" version="1" comment="postgresql13-plperl is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655909" version="1" comment="postgresql13-plpython is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655910" version="1" comment="postgresql13-pltcl is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655911" version="1" comment="postgresql13-server is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655912" version="1" comment="postgresql13-server-devel is &lt;13.5-5.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655898" version="1" comment="redis is &lt;6.0.14-6.8.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654095" version="1" comment="bind is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654096" version="1" comment="bind-chrootenv is &lt;9.16.6-12.57.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654097" version="1" comment="bind-doc is &lt;9.16.6-12.57.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657274" version="1" comment="libmariadbd-devel is &lt;10.4.22-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657275" version="1" comment="libmariadbd19 is &lt;10.4.22-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657276" version="1" comment="mariadb is &lt;10.4.22-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657277" version="1" comment="mariadb-client is &lt;10.4.22-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657278" version="1" comment="mariadb-errormessages is &lt;10.4.22-3.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657279" version="1" comment="mariadb-tools is &lt;10.4.22-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658539" version="1" comment="xen is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658540" version="1" comment="xen-devel is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658541" version="1" comment="xen-tools is &lt;4.13.4_02-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658542" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.4_02-3.40.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656420" version="1" comment="postgresql10-contrib is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656421" version="1" comment="postgresql10-devel is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656465" version="1" comment="postgresql10-docs is &lt;10.19-8.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656422" version="1" comment="postgresql10-plperl is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656423" version="1" comment="postgresql10-plpython is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656424" version="1" comment="postgresql10-pltcl is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009656425" version="1" comment="postgresql10-server is &lt;10.19-8.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500004" version="1" comment="subversion-server is &lt;1.10.6-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500005" version="1" comment="libovn-20_03-0 is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500006" version="1" comment="openvswitch is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500007" version="1" comment="openvswitch-devel is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500008" version="1" comment="openvswitch-ipsec is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500009" version="1" comment="openvswitch-pki is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500010" version="1" comment="openvswitch-test is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500011" version="1" comment="openvswitch-vtep is &lt;2.13.2-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500012" version="1" comment="ovn is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500013" version="1" comment="ovn-central is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500014" version="1" comment="ovn-devel is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500015" version="1" comment="ovn-docker is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500016" version="1" comment="ovn-host is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500017" version="1" comment="ovn-vtep is &lt;20.03.1-9.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500018" version="1" comment="bind is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500019" version="1" comment="bind-chrootenv is &lt;9.16.6-12.41.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500020" version="1" comment="bind-doc is &lt;9.16.6-12.41.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500021" version="1" comment="qemu is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500022" version="1" comment="qemu-arm is &lt;4.2.1-11.13.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500023" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500024" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500025" version="1" comment="qemu-block-curl is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500026" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500027" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500028" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500029" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500030" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500031" version="1" comment="qemu-kvm is &lt;4.2.1-11.13.1 for s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500032" version="1" comment="qemu-lang is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500033" version="1" comment="qemu-microvm is &lt;4.2.1-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500034" version="1" comment="qemu-ppc is &lt;4.2.1-11.13.1 for ppc64le" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500035" version="1" comment="qemu-s390 is &lt;4.2.1-11.13.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500036" version="1" comment="qemu-seabios is &lt;1.12.1+-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500037" version="1" comment="qemu-sgabios is &lt;8-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500038" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500039" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500040" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.13.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500041" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500042" version="1" comment="qemu-x86 is &lt;4.2.1-11.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500043" version="1" comment="libecpg6 is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500044" version="1" comment="postgresql13-contrib is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500045" version="1" comment="postgresql13-devel is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500046" version="1" comment="postgresql13-docs is &lt;13.2-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500047" version="1" comment="postgresql13-plperl is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500048" version="1" comment="postgresql13-plpython is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500049" version="1" comment="postgresql13-pltcl is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500050" version="1" comment="postgresql13-server is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500051" version="1" comment="postgresql13-server-devel is &lt;13.2-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500052" version="1" comment="postgresql12-contrib is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500053" version="1" comment="postgresql12-devel is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500054" version="1" comment="postgresql12-docs is &lt;12.6-8.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500055" version="1" comment="postgresql12-plperl is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500056" version="1" comment="postgresql12-plpython is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500057" version="1" comment="postgresql12-pltcl is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500058" version="1" comment="postgresql12-server is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500059" version="1" comment="postgresql12-server-devel is &lt;12.6-8.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500060" version="1" comment="gnuplot is &lt;5.2.2-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500061" version="1" comment="gnuplot-doc is &lt;5.2.2-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500062" version="1" comment="salt-api is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500063" version="1" comment="salt-cloud is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500064" version="1" comment="salt-fish-completion is &lt;3000-24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500065" version="1" comment="salt-master is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500066" version="1" comment="salt-proxy is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500067" version="1" comment="salt-ssh is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500068" version="1" comment="salt-standalone-formulas-configuration is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500069" version="1" comment="salt-syndic is &lt;3000-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500070" version="1" comment="grub2-x86_64-xen is &lt;2.04-9.34.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500071" version="1" comment="bind is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500072" version="1" comment="bind-chrootenv is &lt;9.16.6-12.44.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500073" version="1" comment="bind-doc is &lt;9.16.6-12.44.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500074" version="1" comment="freeradius-server is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500075" version="1" comment="freeradius-server-devel is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500076" version="1" comment="freeradius-server-krb5 is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500077" version="1" comment="freeradius-server-ldap is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500078" version="1" comment="freeradius-server-libs is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500079" version="1" comment="freeradius-server-mysql is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500080" version="1" comment="freeradius-server-perl is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500081" version="1" comment="freeradius-server-postgresql is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500082" version="1" comment="freeradius-server-python3 is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500083" version="1" comment="freeradius-server-sqlite is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500084" version="1" comment="freeradius-server-utils is &lt;3.0.21-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500085" version="1" comment="389-ds is &lt;1.4.3.19~git0.bef0b5bed-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500086" version="1" comment="389-ds-devel is &lt;1.4.3.19~git0.bef0b5bed-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500087" version="1" comment="lib389 is &lt;1.4.3.19~git0.bef0b5bed-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500088" version="1" comment="libsvrcore0 is &lt;1.4.3.19~git0.bef0b5bed-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500089" version="1" comment="stunnel is &lt;5.57-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500090" version="1" comment="libtcmu2 is &lt;1.5.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500091" version="1" comment="tcmu-runner is &lt;1.5.2-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500092" version="1" comment="ovmf is &lt;201911-7.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500093" version="1" comment="ovmf-tools is &lt;201911-7.11.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500094" version="1" comment="qemu-ovmf-x86_64 is &lt;201911-7.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500095" version="1" comment="qemu-uefi-aarch64 is &lt;201911-7.11.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662953" version="1" comment="apache2-devel is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662954" version="1" comment="apache2-doc is &lt;2.4.51-3.37.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662955" version="1" comment="apache2-worker is &lt;2.4.51-3.37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500181" version="1" comment="salt-transactional-update is &lt;3002.2-37.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009475291" version="1" comment="sle-module-transactional-server-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652149" version="1" comment="salt-transactional-update is &lt;3002.2-49.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500804" version="1" comment="nodejs10 is &lt;10.21.0-1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500805" version="1" comment="nodejs10-devel is &lt;10.21.0-1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500806" version="1" comment="nodejs10-docs is &lt;10.21.0-1.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500807" version="1" comment="npm10 is &lt;10.21.0-1.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501087" version="1" comment="tomcat is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501088" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501089" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501090" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501091" version="1" comment="tomcat-lib is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501092" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501093" version="1" comment="tomcat-webapps is &lt;9.0.36-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501094" version="1" comment="tomcat is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501095" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501096" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501097" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501098" version="1" comment="tomcat-lib is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501099" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501100" version="1" comment="tomcat-webapps is &lt;9.0.36-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501101" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501102" version="1" comment="php7 is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501103" version="1" comment="php7-bcmath is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501104" version="1" comment="php7-bz2 is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501105" version="1" comment="php7-calendar is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501106" version="1" comment="php7-ctype is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501107" version="1" comment="php7-curl is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501108" version="1" comment="php7-dba is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501109" version="1" comment="php7-devel is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501110" version="1" comment="php7-dom is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501111" version="1" comment="php7-enchant is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501112" version="1" comment="php7-exif is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501113" version="1" comment="php7-fastcgi is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501114" version="1" comment="php7-fileinfo is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501115" version="1" comment="php7-fpm is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501116" version="1" comment="php7-ftp is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501117" version="1" comment="php7-gd is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501118" version="1" comment="php7-gettext is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501119" version="1" comment="php7-gmp is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501120" version="1" comment="php7-iconv is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501121" version="1" comment="php7-intl is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501122" version="1" comment="php7-json is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501123" version="1" comment="php7-ldap is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501124" version="1" comment="php7-mbstring is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501125" version="1" comment="php7-mysql is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501126" version="1" comment="php7-odbc is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501127" version="1" comment="php7-opcache is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501128" version="1" comment="php7-openssl is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501129" version="1" comment="php7-pcntl is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501130" version="1" comment="php7-pdo is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501131" version="1" comment="php7-pgsql is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501132" version="1" comment="php7-phar is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501133" version="1" comment="php7-posix is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501134" version="1" comment="php7-readline is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501135" version="1" comment="php7-shmop is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501136" version="1" comment="php7-snmp is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501137" version="1" comment="php7-soap is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501138" version="1" comment="php7-sockets is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501139" version="1" comment="php7-sodium is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501140" version="1" comment="php7-sqlite is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501141" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501142" version="1" comment="php7-sysvsem is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501143" version="1" comment="php7-sysvshm is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501144" version="1" comment="php7-tidy is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501145" version="1" comment="php7-tokenizer is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501146" version="1" comment="php7-xmlreader is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501147" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501148" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501149" version="1" comment="php7-xsl is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501150" version="1" comment="php7-zip is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501151" version="1" comment="php7-zlib is &lt;7.4.6-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501152" version="1" comment="nodejs8 is &lt;8.17.0-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501153" version="1" comment="nodejs8-devel is &lt;8.17.0-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501154" version="1" comment="nodejs8-docs is &lt;8.17.0-10.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501155" version="1" comment="npm8 is &lt;8.17.0-10.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501156" version="1" comment="nodejs12 is &lt;12.18.4-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501157" version="1" comment="nodejs12-devel is &lt;12.18.4-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501158" version="1" comment="nodejs12-docs is &lt;12.18.4-4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501159" version="1" comment="npm12 is &lt;12.18.4-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500941" version="1" comment="nodejs10 is &lt;10.22.1-1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500942" version="1" comment="nodejs10-devel is &lt;10.22.1-1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500943" version="1" comment="nodejs10-docs is &lt;10.22.1-1.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009500944" version="1" comment="npm10 is &lt;10.22.1-1.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501160" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501161" version="1" comment="php7 is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501162" version="1" comment="php7-bcmath is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501163" version="1" comment="php7-bz2 is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501164" version="1" comment="php7-calendar is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501165" version="1" comment="php7-ctype is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501166" version="1" comment="php7-curl is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501167" version="1" comment="php7-dba is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501168" version="1" comment="php7-devel is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501169" version="1" comment="php7-dom is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501170" version="1" comment="php7-enchant is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501171" version="1" comment="php7-exif is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501172" version="1" comment="php7-fastcgi is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501173" version="1" comment="php7-fileinfo is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501174" version="1" comment="php7-fpm is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501175" version="1" comment="php7-ftp is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501176" version="1" comment="php7-gd is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501177" version="1" comment="php7-gettext is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501178" version="1" comment="php7-gmp is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501179" version="1" comment="php7-iconv is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501180" version="1" comment="php7-intl is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501181" version="1" comment="php7-json is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501182" version="1" comment="php7-ldap is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501183" version="1" comment="php7-mbstring is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501184" version="1" comment="php7-mysql is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501185" version="1" comment="php7-odbc is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501186" version="1" comment="php7-opcache is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501187" version="1" comment="php7-openssl is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501188" version="1" comment="php7-pcntl is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501189" version="1" comment="php7-pdo is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501190" version="1" comment="php7-pgsql is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501191" version="1" comment="php7-phar is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501192" version="1" comment="php7-posix is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501193" version="1" comment="php7-readline is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501194" version="1" comment="php7-shmop is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501195" version="1" comment="php7-snmp is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501196" version="1" comment="php7-soap is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501197" version="1" comment="php7-sockets is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501198" version="1" comment="php7-sodium is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501199" version="1" comment="php7-sqlite is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501200" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501201" version="1" comment="php7-sysvsem is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501202" version="1" comment="php7-sysvshm is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501203" version="1" comment="php7-tidy is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501204" version="1" comment="php7-tokenizer is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501205" version="1" comment="php7-xmlreader is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501206" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501207" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501208" version="1" comment="php7-xsl is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501209" version="1" comment="php7-zip is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501210" version="1" comment="php7-zlib is &lt;7.4.6-3.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501211" version="1" comment="tomcat is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501212" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501213" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501214" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501215" version="1" comment="tomcat-lib is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501216" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501217" version="1" comment="tomcat-webapps is &lt;9.0.36-3.12.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501218" version="1" comment="tomcat is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501219" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501220" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501221" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501222" version="1" comment="tomcat-lib is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501223" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501224" version="1" comment="tomcat-webapps is &lt;9.0.36-3.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501225" version="1" comment="nodejs8 is &lt;8.17.0-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501226" version="1" comment="nodejs8-devel is &lt;8.17.0-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501227" version="1" comment="nodejs8-docs is &lt;8.17.0-10.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501228" version="1" comment="npm8 is &lt;8.17.0-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501229" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501230" version="1" comment="php7 is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501231" version="1" comment="php7-bcmath is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501232" version="1" comment="php7-bz2 is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501233" version="1" comment="php7-calendar is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501234" version="1" comment="php7-ctype is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501235" version="1" comment="php7-curl is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501236" version="1" comment="php7-dba is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501237" version="1" comment="php7-devel is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501238" version="1" comment="php7-dom is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501239" version="1" comment="php7-enchant is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501240" version="1" comment="php7-exif is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501241" version="1" comment="php7-fastcgi is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501242" version="1" comment="php7-fileinfo is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501243" version="1" comment="php7-fpm is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501244" version="1" comment="php7-ftp is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501245" version="1" comment="php7-gd is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501246" version="1" comment="php7-gettext is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501247" version="1" comment="php7-gmp is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501248" version="1" comment="php7-iconv is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501249" version="1" comment="php7-intl is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501250" version="1" comment="php7-json is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501251" version="1" comment="php7-ldap is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501252" version="1" comment="php7-mbstring is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501253" version="1" comment="php7-mysql is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501254" version="1" comment="php7-odbc is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501255" version="1" comment="php7-opcache is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501256" version="1" comment="php7-openssl is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501257" version="1" comment="php7-pcntl is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501258" version="1" comment="php7-pdo is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501259" version="1" comment="php7-pgsql is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501260" version="1" comment="php7-phar is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501261" version="1" comment="php7-posix is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501262" version="1" comment="php7-readline is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501263" version="1" comment="php7-shmop is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501264" version="1" comment="php7-snmp is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501265" version="1" comment="php7-soap is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501266" version="1" comment="php7-sockets is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501267" version="1" comment="php7-sodium is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501268" version="1" comment="php7-sqlite is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501269" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501270" version="1" comment="php7-sysvsem is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501271" version="1" comment="php7-sysvshm is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501272" version="1" comment="php7-tidy is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501273" version="1" comment="php7-tokenizer is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501274" version="1" comment="php7-xmlreader is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501275" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501276" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501277" version="1" comment="php7-xsl is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501278" version="1" comment="php7-zip is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501279" version="1" comment="php7-zlib is &lt;7.4.6-3.14.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624229" version="1" comment="nodejs12 is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624230" version="1" comment="nodejs12-devel is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624231" version="1" comment="nodejs12-docs is &lt;12.22.2-4.16.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624232" version="1" comment="npm12 is &lt;12.22.2-4.16.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624544" version="1" comment="nodejs10 is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624545" version="1" comment="nodejs10-devel is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624546" version="1" comment="nodejs10-docs is &lt;10.24.1-1.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624547" version="1" comment="npm10 is &lt;10.24.1-1.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624540" version="1" comment="nodejs14 is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624541" version="1" comment="nodejs14-devel is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624542" version="1" comment="nodejs14-docs is &lt;14.17.2-5.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624543" version="1" comment="npm14 is &lt;14.17.2-5.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626297" version="1" comment="nodejs8 is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626298" version="1" comment="nodejs8-devel is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626299" version="1" comment="nodejs8-docs is &lt;8.17.0-10.12.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626300" version="1" comment="npm8 is &lt;8.17.0-10.12.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626438" version="1" comment="nodejs-common is &lt;2.0-3.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627355" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627356" version="1" comment="php7 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627357" version="1" comment="php7-bcmath is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627358" version="1" comment="php7-bz2 is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627359" version="1" comment="php7-calendar is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627360" version="1" comment="php7-ctype is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627361" version="1" comment="php7-curl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627362" version="1" comment="php7-dba is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627363" version="1" comment="php7-devel is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627364" version="1" comment="php7-dom is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627365" version="1" comment="php7-enchant is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627366" version="1" comment="php7-exif is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627367" version="1" comment="php7-fastcgi is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627368" version="1" comment="php7-fileinfo is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627369" version="1" comment="php7-fpm is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627370" version="1" comment="php7-ftp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627371" version="1" comment="php7-gd is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627372" version="1" comment="php7-gettext is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627373" version="1" comment="php7-gmp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627374" version="1" comment="php7-iconv is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627375" version="1" comment="php7-intl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627376" version="1" comment="php7-json is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627377" version="1" comment="php7-ldap is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627378" version="1" comment="php7-mbstring is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627379" version="1" comment="php7-mysql is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627380" version="1" comment="php7-odbc is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627381" version="1" comment="php7-opcache is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627382" version="1" comment="php7-openssl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627383" version="1" comment="php7-pcntl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627384" version="1" comment="php7-pdo is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627385" version="1" comment="php7-pgsql is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627386" version="1" comment="php7-phar is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627387" version="1" comment="php7-posix is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627388" version="1" comment="php7-readline is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627389" version="1" comment="php7-shmop is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627390" version="1" comment="php7-snmp is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627391" version="1" comment="php7-soap is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627392" version="1" comment="php7-sockets is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627393" version="1" comment="php7-sodium is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627394" version="1" comment="php7-sqlite is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627395" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627396" version="1" comment="php7-sysvsem is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627397" version="1" comment="php7-sysvshm is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627398" version="1" comment="php7-tidy is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627399" version="1" comment="php7-tokenizer is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627400" version="1" comment="php7-xmlreader is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627401" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627402" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627403" version="1" comment="php7-xsl is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627404" version="1" comment="php7-zip is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627405" version="1" comment="php7-zlib is &lt;7.4.6-3.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630851" version="1" comment="nodejs12 is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630852" version="1" comment="nodejs12-devel is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630853" version="1" comment="nodejs12-docs is &lt;12.22.5-4.19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630854" version="1" comment="npm12 is &lt;12.22.5-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631155" version="1" comment="nodejs10 is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631156" version="1" comment="nodejs10-devel is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631157" version="1" comment="nodejs10-docs is &lt;10.24.1-1.39.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631158" version="1" comment="npm10 is &lt;10.24.1-1.39.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632020" version="1" comment="php7-pear is &lt;1.10.21-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632021" version="1" comment="php7-pecl is &lt;1.10.21-3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633327" version="1" comment="nodejs14 is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633328" version="1" comment="nodejs14-devel is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633329" version="1" comment="nodejs14-docs is &lt;14.17.5-5.15.5 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633330" version="1" comment="npm14 is &lt;14.17.5-5.15.5 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634437" version="1" comment="nodejs8 is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634438" version="1" comment="nodejs8-devel is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634439" version="1" comment="nodejs8-docs is &lt;8.17.0-10.15.11 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634440" version="1" comment="npm8 is &lt;8.17.0-10.15.11 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653657" version="1" comment="tomcat is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653658" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653659" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653660" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653661" version="1" comment="tomcat-lib is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653662" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653663" version="1" comment="tomcat-webapps is &lt;9.0.36-13.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658598" version="1" comment="nodejs12 is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658599" version="1" comment="nodejs12-devel is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658600" version="1" comment="nodejs12-docs is &lt;12.22.7-4.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658601" version="1" comment="npm12 is &lt;12.22.7-4.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658547" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658548" version="1" comment="php7 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658549" version="1" comment="php7-bcmath is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658550" version="1" comment="php7-bz2 is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658551" version="1" comment="php7-calendar is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658552" version="1" comment="php7-ctype is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658553" version="1" comment="php7-curl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658554" version="1" comment="php7-dba is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658555" version="1" comment="php7-devel is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658556" version="1" comment="php7-dom is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658557" version="1" comment="php7-enchant is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658558" version="1" comment="php7-exif is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658559" version="1" comment="php7-fastcgi is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658560" version="1" comment="php7-fileinfo is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658561" version="1" comment="php7-fpm is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658562" version="1" comment="php7-ftp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658563" version="1" comment="php7-gd is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658564" version="1" comment="php7-gettext is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658565" version="1" comment="php7-gmp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658566" version="1" comment="php7-iconv is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658567" version="1" comment="php7-intl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658568" version="1" comment="php7-json is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658569" version="1" comment="php7-ldap is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658570" version="1" comment="php7-mbstring is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658571" version="1" comment="php7-mysql is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658572" version="1" comment="php7-odbc is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658573" version="1" comment="php7-opcache is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658574" version="1" comment="php7-openssl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658575" version="1" comment="php7-pcntl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658576" version="1" comment="php7-pdo is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658577" version="1" comment="php7-pgsql is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658578" version="1" comment="php7-phar is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658579" version="1" comment="php7-posix is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658580" version="1" comment="php7-readline is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658581" version="1" comment="php7-shmop is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658582" version="1" comment="php7-snmp is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658583" version="1" comment="php7-soap is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658584" version="1" comment="php7-sockets is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658585" version="1" comment="php7-sodium is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658586" version="1" comment="php7-sqlite is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658587" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658588" version="1" comment="php7-sysvsem is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658589" version="1" comment="php7-sysvshm is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658590" version="1" comment="php7-tidy is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658591" version="1" comment="php7-tokenizer is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658592" version="1" comment="php7-xmlreader is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658593" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658594" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658595" version="1" comment="php7-xsl is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658596" version="1" comment="php7-zip is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658597" version="1" comment="php7-zlib is &lt;7.4.6-3.29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658791" version="1" comment="nodejs14 is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658792" version="1" comment="nodejs14-devel is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658793" version="1" comment="nodejs14-docs is &lt;14.18.1-15.21.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658794" version="1" comment="npm14 is &lt;14.18.1-15.21.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501280" version="1" comment="tomcat is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501281" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501282" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501283" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501284" version="1" comment="tomcat-lib is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501285" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501286" version="1" comment="tomcat-webapps is &lt;9.0.36-3.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501287" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501288" version="1" comment="php7 is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501289" version="1" comment="php7-bcmath is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501290" version="1" comment="php7-bz2 is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501291" version="1" comment="php7-calendar is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501292" version="1" comment="php7-ctype is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501293" version="1" comment="php7-curl is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501294" version="1" comment="php7-dba is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501295" version="1" comment="php7-devel is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501296" version="1" comment="php7-dom is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501297" version="1" comment="php7-enchant is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501298" version="1" comment="php7-exif is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501299" version="1" comment="php7-fastcgi is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501300" version="1" comment="php7-fileinfo is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501301" version="1" comment="php7-fpm is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501302" version="1" comment="php7-ftp is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501303" version="1" comment="php7-gd is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501304" version="1" comment="php7-gettext is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501305" version="1" comment="php7-gmp is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501306" version="1" comment="php7-iconv is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501307" version="1" comment="php7-intl is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501308" version="1" comment="php7-json is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501309" version="1" comment="php7-ldap is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501310" version="1" comment="php7-mbstring is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501311" version="1" comment="php7-mysql is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501312" version="1" comment="php7-odbc is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501313" version="1" comment="php7-opcache is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501314" version="1" comment="php7-openssl is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501315" version="1" comment="php7-pcntl is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501316" version="1" comment="php7-pdo is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501317" version="1" comment="php7-pgsql is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501318" version="1" comment="php7-phar is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501319" version="1" comment="php7-posix is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501320" version="1" comment="php7-readline is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501321" version="1" comment="php7-shmop is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501322" version="1" comment="php7-snmp is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501323" version="1" comment="php7-soap is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501324" version="1" comment="php7-sockets is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501325" version="1" comment="php7-sodium is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501326" version="1" comment="php7-sqlite is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501327" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501328" version="1" comment="php7-sysvsem is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501329" version="1" comment="php7-sysvshm is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501330" version="1" comment="php7-tidy is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501331" version="1" comment="php7-tokenizer is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501332" version="1" comment="php7-xmlreader is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501333" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501334" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501335" version="1" comment="php7-xsl is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501336" version="1" comment="php7-zip is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501337" version="1" comment="php7-zlib is &lt;7.4.6-3.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501338" version="1" comment="tomcat is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501339" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501340" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501341" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501342" version="1" comment="tomcat-lib is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501343" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501344" version="1" comment="tomcat-webapps is &lt;9.0.36-3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501083" version="1" comment="nodejs10 is &lt;10.23.1-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501084" version="1" comment="nodejs10-devel is &lt;10.23.1-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501085" version="1" comment="nodejs10-docs is &lt;10.23.1-1.30.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501086" version="1" comment="npm10 is &lt;10.23.1-1.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501345" version="1" comment="nodejs14 is &lt;14.15.4-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501346" version="1" comment="nodejs14-devel is &lt;14.15.4-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501347" version="1" comment="nodejs14-docs is &lt;14.15.4-5.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501348" version="1" comment="npm14 is &lt;14.15.4-5.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501349" version="1" comment="nodejs12 is &lt;12.20.1-4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501350" version="1" comment="nodejs12-devel is &lt;12.20.1-4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501351" version="1" comment="nodejs12-docs is &lt;12.20.1-4.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501352" version="1" comment="npm12 is &lt;12.20.1-4.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501353" version="1" comment="nodejs14 is &lt;14.16.0-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501354" version="1" comment="nodejs14-devel is &lt;14.16.0-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501355" version="1" comment="nodejs14-docs is &lt;14.16.0-5.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501356" version="1" comment="npm14 is &lt;14.16.0-5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501357" version="1" comment="nodejs12 is &lt;12.21.0-4.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501358" version="1" comment="nodejs12-devel is &lt;12.21.0-4.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501359" version="1" comment="nodejs12-docs is &lt;12.21.0-4.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501360" version="1" comment="npm12 is &lt;12.21.0-4.13.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501361" version="1" comment="nodejs10 is &lt;10.24.0-1.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501362" version="1" comment="nodejs10-devel is &lt;10.24.0-1.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501363" version="1" comment="nodejs10-docs is &lt;10.24.0-1.33.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501364" version="1" comment="npm10 is &lt;10.24.0-1.33.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501365" version="1" comment="nodejs8 is &lt;8.17.0-10.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501366" version="1" comment="nodejs8-devel is &lt;8.17.0-10.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501367" version="1" comment="nodejs8-docs is &lt;8.17.0-10.9.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501368" version="1" comment="npm8 is &lt;8.17.0-10.9.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501417" version="1" comment="graphviz-gd is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501418" version="1" comment="graphviz-python is &lt;2.40.1-6.3.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009115936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287170" version="1" comment="sle-ha-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501474" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.5-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501667" version="1" comment="ctdb is &lt;4.11.11+git.180.2cf3b203f07-4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501668" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501669" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501670" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501671" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501672" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501673" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501674" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501675" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.12.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501676" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501677" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501678" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501679" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.15.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501487" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501680" version="1" comment="ctdb is &lt;4.11.13+git.189.e9bd318cd13-4.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501681" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501682" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501683" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501684" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.24.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501489" version="1" comment="ruby2.5-rubygem-activesupport-5_1 is &lt;5.1.4-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501685" version="1" comment="crmsh is &lt;4.2.0+git.1602225426.5f84efb5-5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501686" version="1" comment="crmsh-scripts is &lt;4.2.0+git.1602225426.5f84efb5-5.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501687" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501688" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501689" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501690" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.29.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501691" version="1" comment="libpacemaker-devel is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501692" version="1" comment="libpacemaker3 is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501693" version="1" comment="pacemaker is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501694" version="1" comment="pacemaker-cli is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501695" version="1" comment="pacemaker-cts is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501696" version="1" comment="pacemaker-remote is &lt;2.0.4+20200616.2deceaa3a-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501697" version="1" comment="ctdb is &lt;4.11.14+git.202.344b137b75d-4.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501698" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501699" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501700" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501701" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.34.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501702" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501703" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501704" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501705" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.37.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501706" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501707" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501708" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501709" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.43.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501710" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501711" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501712" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501713" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501714" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501715" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501716" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501717" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.61.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501718" version="1" comment="ctdb is &lt;4.11.14+git.247.8c858f7ee14-4.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501719" version="1" comment="drbd-utils is &lt;9.13.0-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501720" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501721" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501722" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501723" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.64.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501511" version="1" comment="graphviz-gd is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501512" version="1" comment="graphviz-python is &lt;2.40.1-6.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501513" version="1" comment="ruby2.5-rubygem-actionpack-5_1 is &lt;5.1.4-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501514" version="1" comment="csync2 is &lt;2.0+git.1461714863.10636a4-4.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501724" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501725" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501726" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501727" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.67.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501515" version="1" comment="hawk2 is &lt;2.4.0+git.1611141202.2fe6369e-3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624288" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624289" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624290" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624291" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.70.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624130" version="1" comment="crmsh is &lt;4.3.1+20210702.4e0ee8fb-5.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624131" version="1" comment="crmsh-scripts is &lt;4.3.1+20210702.4e0ee8fb-5.59.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625999" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626000" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626001" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626002" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.75.3 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501518" version="1" comment="ruby2.5-rubygem-nokogiri is &lt;1.8.5-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627896" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627897" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627898" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627899" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.78.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630857" version="1" comment="haproxy is &lt;2.0.14-11.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632571" version="1" comment="haproxy is &lt;2.0.14-11.11.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633331" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633332" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633333" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633334" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.83.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652150" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652151" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652152" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652153" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.86.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501730" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501731" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501732" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501733" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.49.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652336" version="1" comment="ruby2.5-rubygem-activerecord-5_1 is &lt;5.1.4-5.3.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009654903" version="1" comment="ctdb is &lt;4.11.14+git.308.666c63d4eea-4.28.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655919" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655920" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655921" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655922" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.93.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657499" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657500" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657501" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657502" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.96.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501734" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501735" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501736" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501737" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.52.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501738" version="1" comment="crmsh is &lt;4.3.0+20210305.9db5c9a8-5.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501739" version="1" comment="crmsh-scripts is &lt;4.3.0+20210305.9db5c9a8-5.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501740" version="1" comment="crmsh is &lt;4.2.0+git.1607075079.a25648d8-5.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501741" version="1" comment="crmsh-scripts is &lt;4.2.0+git.1607075079.a25648d8-5.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501531" version="1" comment="hawk2 is &lt;2.3.0+git.1603969748.10468582-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009501532" version="1" comment="hawk2 is &lt;2.6.3+git.1614684118.af555ad9-3.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679173" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679174" version="1" comment="dlm-kmp-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679175" version="1" comment="gfs2-kmp-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679176" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664527" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664528" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664529" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664530" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680815" version="1" comment="ruby2.5-rubygem-puma is &lt;4.3.11-150000.3.6.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665451" version="1" comment="ctdb is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667476" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667477" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667478" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667479" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671442" version="1" comment="cluster-md-kmp-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671443" version="1" comment="dlm-kmp-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671444" version="1" comment="gfs2-kmp-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671445" version="1" comment="ocfs2-kmp-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661010" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661011" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661012" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661005" version="1" comment="SLE_HPC-ESPOS-release is ==2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659809" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659810" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659811" version="1" comment="p11-kit-devel is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659812" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659813" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661008" version="1" comment="go1.16 is &lt;1.16.12-1.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661009" version="1" comment="go1.16-doc is &lt;1.16.12-1.37.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661006" version="1" comment="go1.17 is &lt;1.17.5-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661007" version="1" comment="go1.17-doc is &lt;1.17.5-1.14.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676860" version="1" comment="openvpn is &lt;2.4.3-150000.5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676861" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-150000.5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676862" version="1" comment="openvpn-devel is &lt;2.4.3-150000.5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674246" version="1" comment="apache2 is &lt;2.4.51-150200.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674247" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673675" version="1" comment="apache2-doc is &lt;2.4.51-150200.3.42.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674248" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674249" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009674250" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.42.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663320" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663321" version="1" comment="libSDL2-devel is &lt;2.0.8-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677322" version="1" comment="python3-salt is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677323" version="1" comment="salt is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677324" version="1" comment="salt-api is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677325" version="1" comment="salt-bash-completion is &lt;3002.2-150200.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677326" version="1" comment="salt-cloud is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677327" version="1" comment="salt-doc is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677328" version="1" comment="salt-fish-completion is &lt;3002.2-150200.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677329" version="1" comment="salt-master is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677330" version="1" comment="salt-minion is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677331" version="1" comment="salt-proxy is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677332" version="1" comment="salt-ssh is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677333" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677334" version="1" comment="salt-syndic is &lt;3002.2-150200.58.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677335" version="1" comment="salt-zsh-completion is &lt;3002.2-150200.58.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676997" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676998" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676992" version="1" comment="libz1-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676999" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677000" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676996" version="1" comment="zlib-devel-32bit is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677001" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.30.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677336" version="1" comment="389-ds is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677337" version="1" comment="389-ds-devel is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677338" version="1" comment="lib389 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677339" version="1" comment="libsvrcore0 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678651" version="1" comment="MozillaFirefox is &lt;91.8.0-150200.152.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678652" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-150200.152.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678653" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-150200.152.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678654" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-150200.152.26.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677295" version="1" comment="libexif-devel is &lt;0.6.22-150000.5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677296" version="1" comment="libexif12 is &lt;0.6.22-150000.5.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678060" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678030" version="1" comment="libfreebl3-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678061" version="1" comment="libfreebl3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678032" version="1" comment="libfreebl3-hmac-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678062" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678034" version="1" comment="libsoftokn3-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678063" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678036" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678064" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678038" version="1" comment="mozilla-nss-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678065" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678040" version="1" comment="mozilla-nss-certs-32bit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678066" version="1" comment="mozilla-nss-devel is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678067" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678068" version="1" comment="mozilla-nss-tools is &lt;3.68.3-150000.3.67.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677340" version="1" comment="libsolv-devel is &lt;0.7.22-150200.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677341" version="1" comment="libsolv-tools is &lt;0.7.22-150200.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677342" version="1" comment="libzypp is &lt;17.30.0-150200.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677343" version="1" comment="libzypp-devel is &lt;17.30.0-150200.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677344" version="1" comment="perl-solv is &lt;0.7.22-150200.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677345" version="1" comment="python3-solv is &lt;0.7.22-150200.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677346" version="1" comment="ruby-solv is &lt;0.7.22-150200.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677347" version="1" comment="zypper is &lt;1.14.52-150200.30.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677224" version="1" comment="zypper-log is &lt;1.14.52-150200.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677225" version="1" comment="zypper-needs-restarting is &lt;1.14.52-150200.30.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679181" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679124" version="1" comment="liblzma5-32bit is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679182" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679183" version="1" comment="xz-devel is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679127" version="1" comment="xz-lang is &lt;5.2.3-150000.4.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679184" version="1" comment="xz-static-devel is &lt;5.2.3-150000.4.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679185" version="1" comment="subversion is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679186" version="1" comment="subversion-bash-completion is &lt;1.10.6-150000.3.21.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679187" version="1" comment="subversion-devel is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679188" version="1" comment="subversion-perl is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679189" version="1" comment="subversion-python is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679190" version="1" comment="subversion-server is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679191" version="1" comment="subversion-tools is &lt;1.10.6-150000.3.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678467" version="1" comment="go1.16 is &lt;1.16.15-150000.1.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678468" version="1" comment="go1.16-doc is &lt;1.16.15-150000.1.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678461" version="1" comment="go1.16-race is &lt;1.16.15-150000.1.46.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678655" version="1" comment="go1.17 is &lt;1.17.8-150000.1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678656" version="1" comment="go1.17-doc is &lt;1.17.8-150000.1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678639" version="1" comment="go1.17-race is &lt;1.17.8-150000.1.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679192" version="1" comment="kernel-default is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679193" version="1" comment="kernel-default-base is &lt;5.3.18-150200.24.112.1.150200.9.52.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679194" version="1" comment="kernel-default-devel is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679195" version="1" comment="kernel-devel is &lt;5.3.18-150200.24.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679196" version="1" comment="kernel-docs is &lt;5.3.18-150200.24.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679197" version="1" comment="kernel-macros is &lt;5.3.18-150200.24.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679198" version="1" comment="kernel-obs-build is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679199" version="1" comment="kernel-preempt is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679200" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679201" version="1" comment="kernel-source is &lt;5.3.18-150200.24.112.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679202" version="1" comment="kernel-syms is &lt;5.3.18-150200.24.112.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678657" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-150200.11.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678658" version="1" comment="libSDL2-devel is &lt;2.0.8-150200.11.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677921" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677922" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677923" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679850" version="1" comment="git is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679851" version="1" comment="git-arch is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679852" version="1" comment="git-core is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679853" version="1" comment="git-cvs is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679854" version="1" comment="git-daemon is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679855" version="1" comment="git-doc is &lt;2.26.2-150000.36.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679856" version="1" comment="git-email is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679857" version="1" comment="git-gui is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679858" version="1" comment="git-svn is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679859" version="1" comment="git-web is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679860" version="1" comment="gitk is &lt;2.26.2-150000.36.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678640" version="1" comment="jsoup is &lt;1.14.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678641" version="1" comment="jsr-305 is &lt;3.0.2-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679483" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-150000.3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679484" version="1" comment="libSDL-devel is &lt;1.2.15-150000.3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679723" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679724" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662451" version="1" comment="kubevirt-manifests is &lt;0.40.0-5.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662452" version="1" comment="kubevirt-virtctl is &lt;0.40.0-5.17.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680340" version="1" comment="xen is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680341" version="1" comment="xen-devel is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680342" version="1" comment="xen-libs is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680343" version="1" comment="xen-tools is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680344" version="1" comment="xen-tools-domU is &lt;4.13.4_08-150200.3.50.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680345" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.4_08-150200.3.50.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679716" version="1" comment="tomcat is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679717" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679718" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679719" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679720" version="1" comment="tomcat-lib is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679721" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679722" version="1" comment="tomcat-webapps is &lt;9.0.36-150200.22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680285" version="1" comment="libinput-devel is &lt;1.10.5-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680286" version="1" comment="libinput-tools is &lt;1.10.5-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680287" version="1" comment="libinput-udev is &lt;1.10.5-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680288" version="1" comment="libinput10 is &lt;1.10.5-150000.3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679488" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663736" version="1" comment="busybox is &lt;1.34.1-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663741" version="1" comment="busybox-static is &lt;1.34.1-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663742" version="1" comment="MozillaFirefox is &lt;91.5.0-152.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663743" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-152.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663744" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-152.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663745" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-152.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681178" version="1" comment="cifs-utils is &lt;6.9-150100.5.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681179" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680346" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680347" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680166" version="1" comment="libwebkit2gtk3-lang is &lt;2.36.0-150200.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680348" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680349" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680350" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680351" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680352" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-150200.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681183" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681184" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681174" version="1" comment="nodejs12-docs is &lt;12.22.12-150200.4.32.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681185" version="1" comment="npm12 is &lt;12.22.12-150200.4.32.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681180" version="1" comment="nodejs14 is &lt;14.19.1-150200.15.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681181" version="1" comment="nodejs14-devel is &lt;14.19.1-150200.15.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681170" version="1" comment="nodejs14-docs is &lt;14.19.1-150200.15.31.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681182" version="1" comment="npm14 is &lt;14.19.1-150200.15.31.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664168" version="1" comment="aide is &lt;0.16-24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664308" version="1" comment="libunbound2 is &lt;1.6.8-10.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664309" version="1" comment="unbound-anchor is &lt;1.6.8-10.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664310" version="1" comment="unbound-devel is &lt;1.6.8-10.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664060" version="1" comment="expat is &lt;2.2.5-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664061" version="1" comment="libexpat-devel is &lt;2.2.5-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664062" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664063" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664311" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664312" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664285" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.3-23.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664313" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664314" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664315" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664316" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664317" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-23.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664166" version="1" comment="libjson-c-devel is &lt;0.13-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664167" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664150" version="1" comment="libjson-c3-32bit is &lt;0.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664559" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664560" version="1" comment="polkit is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664561" version="1" comment="polkit-devel is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664562" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664563" version="1" comment="kernel-default is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664564" version="1" comment="kernel-default-base is &lt;5.3.18-24.99.1.9.46.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664565" version="1" comment="kernel-default-devel is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664566" version="1" comment="kernel-devel is &lt;5.3.18-24.99.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664567" version="1" comment="kernel-docs is &lt;5.3.18-24.99.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664568" version="1" comment="kernel-macros is &lt;5.3.18-24.99.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664569" version="1" comment="kernel-obs-build is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664570" version="1" comment="kernel-preempt is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664571" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664572" version="1" comment="kernel-source is &lt;5.3.18-24.99.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664573" version="1" comment="kernel-syms is &lt;5.3.18-24.99.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664290" version="1" comment="log4j12 is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664306" version="1" comment="log4j12-javadoc is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664307" version="1" comment="log4j12-manual is &lt;1.2.17-4.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678578" version="1" comment="apache2-mod_auth_mellon is &lt;0.17.0-150200.5.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679451" version="1" comment="jackson-annotations is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679453" version="1" comment="jackson-core is &lt;2.13.0-150200.3.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679455" version="1" comment="jackson-databind is &lt;2.13.0-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680193" version="1" comment="jackson-dataformat-cbor is &lt;2.13.0-150200.3.3.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680329" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680330" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680331" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680332" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680333" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680334" version="1" comment="java-11-openjdk is &lt;11.0.15.0-150000.3.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680335" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-150000.3.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680336" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-150000.3.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680337" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-150000.3.80.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665610" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665611" version="1" comment="libdcerpc-binding0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665612" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665613" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665614" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665615" version="1" comment="libdcerpc0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665616" version="1" comment="libdcerpc0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665617" version="1" comment="libndr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665618" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665619" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665620" version="1" comment="libndr-krb5pac0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665621" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665622" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665623" version="1" comment="libndr-nbt0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665624" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665625" version="1" comment="libndr-standard0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665626" version="1" comment="libndr-standard0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665627" version="1" comment="libndr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665628" version="1" comment="libndr0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665629" version="1" comment="libnetapi-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665630" version="1" comment="libnetapi0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665631" version="1" comment="libnetapi0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665632" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665633" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665634" version="1" comment="libsamba-credentials0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665635" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665636" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665637" version="1" comment="libsamba-errors0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665638" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665639" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665640" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665641" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665642" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665643" version="1" comment="libsamba-passdb0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665644" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665645" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665646" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665647" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665648" version="1" comment="libsamba-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665649" version="1" comment="libsamba-util0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665650" version="1" comment="libsamdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665651" version="1" comment="libsamdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665652" version="1" comment="libsamdb0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665653" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665654" version="1" comment="libsmbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665655" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665656" version="1" comment="libsmbconf0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665657" version="1" comment="libsmbconf0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665658" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665659" version="1" comment="libsmbldap2 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665660" version="1" comment="libsmbldap2-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665661" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665662" version="1" comment="libtevent-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665663" version="1" comment="libtevent-util0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665664" version="1" comment="libwbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665665" version="1" comment="libwbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665666" version="1" comment="libwbclient0-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665667" version="1" comment="samba is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665668" version="1" comment="samba-ad-dc is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665669" version="1" comment="samba-ceph is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665670" version="1" comment="samba-client is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665671" version="1" comment="samba-core-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665672" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665673" version="1" comment="samba-libs is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665674" version="1" comment="samba-libs-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665675" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665676" version="1" comment="samba-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665677" version="1" comment="samba-winbind is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665678" version="1" comment="samba-winbind-32bit is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667498" version="1" comment="kernel-default is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667499" version="1" comment="kernel-default-base is &lt;5.3.18-24.102.1.9.48.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667500" version="1" comment="kernel-default-devel is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667501" version="1" comment="kernel-devel is &lt;5.3.18-24.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667502" version="1" comment="kernel-docs is &lt;5.3.18-24.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667503" version="1" comment="kernel-macros is &lt;5.3.18-24.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667504" version="1" comment="kernel-obs-build is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667505" version="1" comment="kernel-preempt is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667506" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667507" version="1" comment="kernel-source is &lt;5.3.18-24.102.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667508" version="1" comment="kernel-syms is &lt;5.3.18-24.102.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663932" version="1" comment="libwireshark15 is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663933" version="1" comment="libwiretap12 is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663934" version="1" comment="libwsutil13 is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663935" version="1" comment="wireshark is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663936" version="1" comment="wireshark-devel is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663937" version="1" comment="wireshark-ui-qt is &lt;3.6.1-3.68.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662005" version="1" comment="libvirt is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662006" version="1" comment="libvirt-admin is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662007" version="1" comment="libvirt-bash-completion is &lt;6.0.0-13.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662008" version="1" comment="libvirt-client is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662009" version="1" comment="libvirt-daemon is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662010" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662011" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662012" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662013" version="1" comment="libvirt-daemon-driver-libxl is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662014" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662015" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662016" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662017" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662018" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662019" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662020" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662021" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662022" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662023" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662024" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662025" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662026" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662027" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662028" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662029" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662030" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662031" version="1" comment="libvirt-daemon-xen is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662032" version="1" comment="libvirt-devel is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662033" version="1" comment="libvirt-doc is &lt;6.0.0-13.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662034" version="1" comment="libvirt-libs is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662035" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662036" version="1" comment="libvirt-nss is &lt;6.0.0-13.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665604" version="1" comment="xen is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665605" version="1" comment="xen-devel is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665606" version="1" comment="xen-libs is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665607" version="1" comment="xen-tools is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665608" version="1" comment="xen-tools-domU is &lt;4.13.4_04-3.43.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665609" version="1" comment="xen-tools-xendomains-wait-disk is &lt;4.13.4_04-3.43.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667314" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667315" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665458" version="1" comment="libtiff-devel is &lt;4.0.9-45.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665459" version="1" comment="libtiff5 is &lt;4.0.9-45.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665439" version="1" comment="libtiff5-32bit is &lt;4.0.9-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664554" version="1" comment="cargo is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664555" version="1" comment="rls is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664556" version="1" comment="rust is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664557" version="1" comment="rust-analysis is &lt;1.53.0-22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664558" version="1" comment="rust-src is &lt;1.53.0-22.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664864" version="1" comment="strongswan is &lt;5.8.2-11.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664853" version="1" comment="strongswan-doc is &lt;5.8.2-11.24.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664865" version="1" comment="strongswan-hmac is &lt;5.8.2-11.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664866" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664867" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.24.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664539" version="1" comment="clamav is &lt;0.103.5-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664540" version="1" comment="clamav-devel is &lt;0.103.5-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664541" version="1" comment="libclamav9 is &lt;0.103.5-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664542" version="1" comment="libfreshclam2 is &lt;0.103.5-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665460" version="1" comment="expat is &lt;2.2.5-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665461" version="1" comment="libexpat-devel is &lt;2.2.5-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665462" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665436" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667819" version="1" comment="python3-Twisted is &lt;19.10.0-3.6.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661269" version="1" comment="libsnmp30 is &lt;5.7.3-10.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661270" version="1" comment="net-snmp is &lt;5.7.3-10.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661271" version="1" comment="net-snmp-devel is &lt;5.7.3-10.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661272" version="1" comment="perl-SNMP is &lt;5.7.3-10.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661273" version="1" comment="snmp-mibs is &lt;5.7.3-10.9.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667862" version="1" comment="xerces-j2 is &lt;2.12.0-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662464" version="1" comment="libsndfile-devel is &lt;1.0.28-5.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662465" version="1" comment="libsndfile1 is &lt;1.0.28-5.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667863" version="1" comment="ucode-intel is &lt;20220207-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668587" version="1" comment="nodejs12 is &lt;12.22.10-4.29.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668588" version="1" comment="nodejs12-devel is &lt;12.22.10-4.29.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668510" version="1" comment="nodejs12-docs is &lt;12.22.10-4.29.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668589" version="1" comment="npm12 is &lt;12.22.10-4.29.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668204" version="1" comment="MozillaFirefox is &lt;91.6.0-152.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668205" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-152.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668206" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-152.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668207" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-152.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669200" version="1" comment="cyrus-sasl is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669201" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669202" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669203" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669204" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669205" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669206" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669207" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669208" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669209" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669210" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669211" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669212" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669213" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669214" version="1" comment="libsasl2-3 is &lt;2.1.26-5.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669215" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669756" version="1" comment="nodejs-common is &lt;2.0-3.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669766" version="1" comment="nodejs8 is &lt;8.17.0-10.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669767" version="1" comment="nodejs8-devel is &lt;8.17.0-10.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669768" version="1" comment="nodejs8-docs is &lt;8.17.0-10.19.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669769" version="1" comment="npm8 is &lt;8.17.0-10.19.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670700" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670701" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670665" version="1" comment="libwebkit2gtk3-lang is &lt;2.34.6-29.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670702" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670703" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670704" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670705" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670706" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-29.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669995" version="1" comment="flatpak is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669996" version="1" comment="flatpak-devel is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669997" version="1" comment="flatpak-zsh-completion is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669998" version="1" comment="libflatpak0 is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669999" version="1" comment="system-user-flatpak is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670000" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.7-4.12.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669763" version="1" comment="expat is &lt;2.2.5-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669764" version="1" comment="libexpat-devel is &lt;2.2.5-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669765" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669165" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669216" version="1" comment="nodejs14 is &lt;14.19.0-15.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669217" version="1" comment="nodejs14-devel is &lt;14.19.0-15.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669196" version="1" comment="nodejs14-docs is &lt;14.19.0-15.27.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669218" version="1" comment="npm14 is &lt;14.19.0-15.27.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669199" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669993" version="1" comment="kernel-firmware is &lt;20200107-3.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669994" version="1" comment="ucode-amd is &lt;20200107-3.26.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669985" version="1" comment="libwireshark15 is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669986" version="1" comment="libwiretap12 is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669987" version="1" comment="libwsutil13 is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669988" version="1" comment="wireshark is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669989" version="1" comment="wireshark-devel is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669990" version="1" comment="wireshark-ui-qt is &lt;3.6.2-3.71.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669583" version="1" comment="go1.17 is &lt;1.17.7-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669584" version="1" comment="go1.17-doc is &lt;1.17.7-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669572" version="1" comment="go1.17-race is &lt;1.17.7-1.20.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669581" version="1" comment="go1.16 is &lt;1.16.14-1.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669582" version="1" comment="go1.16-doc is &lt;1.16.14-1.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669569" version="1" comment="go1.16-race is &lt;1.16.14-1.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669770" version="1" comment="libmariadbd-devel is &lt;10.4.24-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669771" version="1" comment="libmariadbd19 is &lt;10.4.24-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669772" version="1" comment="mariadb is &lt;10.4.24-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669773" version="1" comment="mariadb-client is &lt;10.4.24-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669774" version="1" comment="mariadb-errormessages is &lt;10.4.24-3.25.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669775" version="1" comment="mariadb-tools is &lt;10.4.24-3.25.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670478" version="1" comment="zsh is &lt;5.6-7.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669991" version="1" comment="gvim is &lt;8.0.1568-5.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669992" version="1" comment="vim is &lt;8.0.1568-5.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669882" version="1" comment="vim-data is &lt;8.0.1568-5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669883" version="1" comment="vim-data-common is &lt;8.0.1568-5.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671505" version="1" comment="kernel-default is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671506" version="1" comment="kernel-default-base is &lt;5.3.18-24.107.1.9.50.2 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671507" version="1" comment="kernel-default-devel is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671508" version="1" comment="kernel-devel is &lt;5.3.18-24.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671509" version="1" comment="kernel-docs is &lt;5.3.18-24.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671510" version="1" comment="kernel-macros is &lt;5.3.18-24.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671511" version="1" comment="kernel-obs-build is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671512" version="1" comment="kernel-preempt is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671513" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671514" version="1" comment="kernel-source is &lt;5.3.18-24.107.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671515" version="1" comment="kernel-syms is &lt;5.3.18-24.107.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670697" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670698" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670699" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668002" version="1" comment="tcpdump is &lt;4.9.2-3.18.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671501" version="1" comment="MozillaFirefox is &lt;91.6.1-152.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671502" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-152.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671503" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-152.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671504" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.1-152.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670476" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670477" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667494" version="1" comment="python2-lxml is &lt;4.7.1-3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667495" version="1" comment="python2-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667496" version="1" comment="python3-lxml is &lt;4.7.1-3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667497" version="1" comment="python3-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671497" version="1" comment="openssh is &lt;8.1p1-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671498" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671499" version="1" comment="openssh-fips is &lt;8.1p1-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671500" version="1" comment="openssh-helpers is &lt;8.1p1-5.21.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671229" version="1" comment="tomcat is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671230" version="1" comment="tomcat-admin-webapps is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671231" version="1" comment="tomcat-el-3_0-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671232" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671233" version="1" comment="tomcat-lib is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671234" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671235" version="1" comment="tomcat-webapps is &lt;9.0.36-19.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672163" version="1" comment="MozillaFirefox is &lt;91.7.0-152.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672164" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-152.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672165" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-152.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672166" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-152.22.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669024" version="1" comment="glibc is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669025" version="1" comment="glibc-32bit is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669026" version="1" comment="glibc-devel is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669027" version="1" comment="glibc-devel-32bit is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669028" version="1" comment="glibc-devel-static is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669029" version="1" comment="glibc-extra is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669030" version="1" comment="glibc-i18ndata is &lt;2.26-13.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669031" version="1" comment="glibc-info is &lt;2.26-13.65.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669032" version="1" comment="glibc-locale is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669033" version="1" comment="glibc-locale-base is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669034" version="1" comment="glibc-locale-base-32bit is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669035" version="1" comment="glibc-profile is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669036" version="1" comment="glibc-utils is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669037" version="1" comment="nscd is &lt;2.26-13.65.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672079" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672080" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672081" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671974" version="1" comment="libQt5Core-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672082" version="1" comment="libQt5Core5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672083" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671977" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672084" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672085" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671980" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672086" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672087" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671983" version="1" comment="libQt5KmsSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672088" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671985" version="1" comment="libQt5Network-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672089" version="1" comment="libQt5Network5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672090" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671988" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672091" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672092" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672093" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672094" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671992" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672095" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671994" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672096" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672097" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671997" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672098" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672099" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672100" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672101" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672102" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672103" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672001" version="1" comment="libQt5Test-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672104" version="1" comment="libQt5Test5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672105" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672004" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672106" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672107" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672108" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672109" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672110" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672111" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.17.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672010" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.12.7-4.17.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671236" version="1" comment="expat is &lt;2.2.5-3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671237" version="1" comment="libexpat-devel is &lt;2.2.5-3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671238" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671084" version="1" comment="libexpat1-32bit is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672112" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672113" version="1" comment="php7 is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672114" version="1" comment="php7-bcmath is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672115" version="1" comment="php7-bz2 is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672116" version="1" comment="php7-calendar is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672117" version="1" comment="php7-ctype is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672118" version="1" comment="php7-curl is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672119" version="1" comment="php7-dba is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672120" version="1" comment="php7-devel is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672121" version="1" comment="php7-dom is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672122" version="1" comment="php7-enchant is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672123" version="1" comment="php7-exif is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672124" version="1" comment="php7-fastcgi is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672125" version="1" comment="php7-fileinfo is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672126" version="1" comment="php7-fpm is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672127" version="1" comment="php7-ftp is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672128" version="1" comment="php7-gd is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672129" version="1" comment="php7-gettext is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672130" version="1" comment="php7-gmp is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672131" version="1" comment="php7-iconv is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672132" version="1" comment="php7-intl is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672133" version="1" comment="php7-json is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672134" version="1" comment="php7-ldap is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672135" version="1" comment="php7-mbstring is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672136" version="1" comment="php7-mysql is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672137" version="1" comment="php7-odbc is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672138" version="1" comment="php7-opcache is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672139" version="1" comment="php7-openssl is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672140" version="1" comment="php7-pcntl is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672141" version="1" comment="php7-pdo is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672142" version="1" comment="php7-pgsql is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672143" version="1" comment="php7-phar is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672144" version="1" comment="php7-posix is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672145" version="1" comment="php7-readline is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672146" version="1" comment="php7-shmop is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672147" version="1" comment="php7-snmp is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672148" version="1" comment="php7-soap is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672149" version="1" comment="php7-sockets is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672150" version="1" comment="php7-sodium is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672151" version="1" comment="php7-sqlite is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672152" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672153" version="1" comment="php7-sysvsem is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672154" version="1" comment="php7-sysvshm is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672155" version="1" comment="php7-tidy is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672156" version="1" comment="php7-tokenizer is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672157" version="1" comment="php7-xmlreader is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672158" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672159" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672160" version="1" comment="php7-xsl is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672161" version="1" comment="php7-zip is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672162" version="1" comment="php7-zlib is &lt;7.4.6-3.35.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673262" version="1" comment="libminizip1 is &lt;1.2.11-3.26.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673278" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673279" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673203" version="1" comment="libopenssl1_1-32bit is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673280" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673205" version="1" comment="libopenssl1_1-hmac-32bit is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673263" version="1" comment="libz1 is &lt;1.2.11-3.26.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673208" version="1" comment="libz1-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673281" version="1" comment="linux-glibc-devel is &lt;5.3-3.2.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673264" version="1" comment="minizip-devel is &lt;1.2.11-3.26.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673282" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673265" version="1" comment="zlib-devel is &lt;1.2.11-3.26.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673222" version="1" comment="zlib-devel-32bit is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673266" version="1" comment="zlib-devel-static is &lt;1.2.11-3.26.10 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672635" version="1" comment="stunnel is &lt;5.62-3.14.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673904" version="1" comment="bind is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673905" version="1" comment="bind-chrootenv is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673906" version="1" comment="bind-devel is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673907" version="1" comment="bind-doc is &lt;9.16.6-150000.12.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673908" version="1" comment="bind-utils is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673909" version="1" comment="libbind9-1600 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673910" version="1" comment="libdns1605 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673911" version="1" comment="libirs-devel is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673912" version="1" comment="libirs1601 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673913" version="1" comment="libisc1606 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673914" version="1" comment="libisccc1600 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673915" version="1" comment="libisccfg1600 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673916" version="1" comment="libns1604 is &lt;9.16.6-150000.12.60.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673917" version="1" comment="python3-bind is &lt;9.16.6-150000.12.60.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661013" version="1" comment="SLE_HPC-LTSS-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676863" version="1" comment="openvpn is &lt;2.4.3-150000.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676864" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-150000.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676865" version="1" comment="openvpn-devel is &lt;2.4.3-150000.5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673683" version="1" comment="apache2 is &lt;2.4.51-150200.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673684" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673685" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673686" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673687" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663377" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663378" version="1" comment="libSDL2-devel is &lt;2.0.8-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672752" version="1" comment="libprotobuf-lite20 is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672753" version="1" comment="libprotobuf20 is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672754" version="1" comment="libprotoc20 is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672755" version="1" comment="protobuf-devel is &lt;3.9.2-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677348" version="1" comment="python3-salt is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677349" version="1" comment="salt is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677350" version="1" comment="salt-api is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677351" version="1" comment="salt-cloud is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677352" version="1" comment="salt-doc is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677353" version="1" comment="salt-master is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677354" version="1" comment="salt-minion is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677355" version="1" comment="salt-proxy is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677356" version="1" comment="salt-ssh is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677357" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677358" version="1" comment="salt-syndic is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677002" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677003" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677004" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677005" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677006" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671516" version="1" comment="libyaml-cpp0_6 is &lt;0.6.1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671517" version="1" comment="yaml-cpp-devel is &lt;0.6.1-4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677094" version="1" comment="libpython2_7-1_0 is &lt;2.7.18-150000.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677095" version="1" comment="python is &lt;2.7.18-150000.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677096" version="1" comment="python-base is &lt;2.7.18-150000.38.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677097" version="1" comment="python-tk is &lt;2.7.18-150000.38.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677359" version="1" comment="389-ds is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677360" version="1" comment="389-ds-devel is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677361" version="1" comment="lib389 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677362" version="1" comment="libsvrcore0 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678659" version="1" comment="MozillaFirefox is &lt;91.8.0-150200.152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678660" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-150200.152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678661" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-150200.152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678662" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-150200.152.26.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677371" version="1" comment="libexif-devel is &lt;0.6.22-150000.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677372" version="1" comment="libexif12 is &lt;0.6.22-150000.5.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678098" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678099" version="1" comment="libfreebl3-hmac is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678100" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678101" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678102" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678103" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678104" version="1" comment="mozilla-nss-devel is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678105" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678106" version="1" comment="mozilla-nss-tools is &lt;3.68.3-150000.3.67.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677093" version="1" comment="opensc is &lt;0.19.0-150100.3.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677363" version="1" comment="libsolv-devel is &lt;0.7.22-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677364" version="1" comment="libsolv-tools is &lt;0.7.22-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677365" version="1" comment="libzypp is &lt;17.30.0-150200.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677366" version="1" comment="libzypp-devel is &lt;17.30.0-150200.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677367" version="1" comment="perl-solv is &lt;0.7.22-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677368" version="1" comment="python3-solv is &lt;0.7.22-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677369" version="1" comment="ruby-solv is &lt;0.7.22-150200.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677370" version="1" comment="zypper is &lt;1.14.52-150200.30.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679203" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679204" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679205" version="1" comment="xz-devel is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679206" version="1" comment="xz-static-devel is &lt;5.2.3-150000.4.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679207" version="1" comment="subversion is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679208" version="1" comment="subversion-devel is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679209" version="1" comment="subversion-perl is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679210" version="1" comment="subversion-python is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679211" version="1" comment="subversion-server is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679212" version="1" comment="subversion-tools is &lt;1.10.6-150000.3.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678472" version="1" comment="go1.16 is &lt;1.16.15-150000.1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678473" version="1" comment="go1.16-doc is &lt;1.16.15-150000.1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678474" version="1" comment="go1.16-race is &lt;1.16.15-150000.1.46.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678663" version="1" comment="go1.17 is &lt;1.17.8-150000.1.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678664" version="1" comment="go1.17-doc is &lt;1.17.8-150000.1.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678665" version="1" comment="go1.17-race is &lt;1.17.8-150000.1.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679213" version="1" comment="kernel-default is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679214" version="1" comment="kernel-default-base is &lt;5.3.18-150200.24.112.1.150200.9.52.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679215" version="1" comment="kernel-default-devel is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679216" version="1" comment="kernel-obs-build is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679217" version="1" comment="kernel-preempt is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679218" version="1" comment="kernel-preempt-devel is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679219" version="1" comment="kernel-syms is &lt;5.3.18-150200.24.112.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678666" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678667" version="1" comment="libSDL2-devel is &lt;2.0.8-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677924" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677925" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677926" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679873" version="1" comment="git is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679874" version="1" comment="git-arch is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679875" version="1" comment="git-core is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679876" version="1" comment="git-cvs is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679877" version="1" comment="git-daemon is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679878" version="1" comment="git-email is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679879" version="1" comment="git-gui is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679880" version="1" comment="git-svn is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679881" version="1" comment="git-web is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679882" version="1" comment="gitk is &lt;2.26.2-150000.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679489" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-150000.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679490" version="1" comment="libSDL-devel is &lt;1.2.15-150000.3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679725" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679726" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680353" version="1" comment="libinput-devel is &lt;1.10.5-150000.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680354" version="1" comment="libinput-tools is &lt;1.10.5-150000.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680355" version="1" comment="libinput-udev is &lt;1.10.5-150000.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680356" version="1" comment="libinput10 is &lt;1.10.5-150000.3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679493" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667519" version="1" comment="python3-numpy is &lt;1.17.3-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667520" version="1" comment="python3-numpy-devel is &lt;1.17.3-10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663750" version="1" comment="busybox is &lt;1.34.1-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663751" version="1" comment="busybox-static is &lt;1.34.1-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679891" version="1" comment="mutt is &lt;1.10.1-150000.3.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679817" version="1" comment="mutt-doc is &lt;1.10.1-150000.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679818" version="1" comment="mutt-lang is &lt;1.10.1-150000.3.23.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667517" version="1" comment="permissions is &lt;20181225-23.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663723" version="1" comment="permissions-zypp-plugin is &lt;20181225-23.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667518" version="1" comment="rpmlint-mini is &lt;1.10-13.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679655" version="1" comment="go1.17 is &lt;1.17.9-150000.1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679656" version="1" comment="go1.17-doc is &lt;1.17.9-150000.1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679657" version="1" comment="go1.17-race is &lt;1.17.9-150000.1.28.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677230" version="1" comment="ant is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677231" version="1" comment="ant-antlr is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677232" version="1" comment="ant-apache-bcel is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677233" version="1" comment="ant-apache-bsf is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677234" version="1" comment="ant-apache-log4j is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677235" version="1" comment="ant-apache-oro is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677236" version="1" comment="ant-apache-regexp is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677237" version="1" comment="ant-apache-resolver is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677238" version="1" comment="ant-commons-logging is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677239" version="1" comment="ant-javamail is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677240" version="1" comment="ant-jdepend is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677241" version="1" comment="ant-jmf is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677242" version="1" comment="ant-junit is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677243" version="1" comment="ant-manual is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677244" version="1" comment="ant-scripts is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677245" version="1" comment="ant-swing is &lt;1.10.7-150200.4.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681186" version="1" comment="cifs-utils is &lt;6.9-150100.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681187" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680357" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680358" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680359" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680360" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680361" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680362" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680363" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-150200.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677373" version="1" comment="libaom0 is &lt;1.0.0-150200.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680181" version="1" comment="python3-paramiko is &lt;2.4.2-150100.6.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680168" version="1" comment="python3-pip is &lt;20.0.2-150100.6.18.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679884" version="1" comment="glib2-devel is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679805" version="1" comment="glib2-lang is &lt;2.62.6-150200.3.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679885" version="1" comment="glib2-tools is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679886" version="1" comment="libgio-2_0-0 is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679808" version="1" comment="libgio-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679887" version="1" comment="libglib-2_0-0 is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679810" version="1" comment="libglib-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679888" version="1" comment="libgmodule-2_0-0 is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679812" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679889" version="1" comment="libgobject-2_0-0 is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679814" version="1" comment="libgobject-2_0-0-32bit is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679890" version="1" comment="libgthread-2_0-0 is &lt;2.62.6-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664186" version="1" comment="aide is &lt;0.16-24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664318" version="1" comment="libunbound2 is &lt;1.6.8-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664319" version="1" comment="unbound-anchor is &lt;1.6.8-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664320" version="1" comment="unbound-devel is &lt;1.6.8-10.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664324" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664325" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664326" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664327" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664328" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664329" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664330" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-23.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664184" version="1" comment="libjson-c-devel is &lt;0.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664185" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667521" version="1" comment="qemu is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667522" version="1" comment="qemu-audio-alsa is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667523" version="1" comment="qemu-audio-pa is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667524" version="1" comment="qemu-block-curl is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667525" version="1" comment="qemu-block-iscsi is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667526" version="1" comment="qemu-block-rbd is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667527" version="1" comment="qemu-block-ssh is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667528" version="1" comment="qemu-guest-agent is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667529" version="1" comment="qemu-ipxe is &lt;1.0.0+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667530" version="1" comment="qemu-kvm is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667531" version="1" comment="qemu-lang is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667532" version="1" comment="qemu-microvm is &lt;4.2.1-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667533" version="1" comment="qemu-seabios is &lt;1.12.1+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667534" version="1" comment="qemu-sgabios is &lt;8-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667535" version="1" comment="qemu-tools is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667536" version="1" comment="qemu-ui-curses is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667537" version="1" comment="qemu-ui-gtk is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667538" version="1" comment="qemu-ui-spice-app is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667539" version="1" comment="qemu-vgabios is &lt;1.12.1+-11.34.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667540" version="1" comment="qemu-x86 is &lt;4.2.1-11.34.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678579" version="1" comment="apache2-mod_auth_mellon is &lt;0.17.0-150200.5.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679149" version="1" comment="netty3 is &lt;3.10.6-150200.3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679491" version="1" comment="tar is &lt;1.34-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679458" version="1" comment="tar-lang is &lt;1.34-150000.3.12.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679492" version="1" comment="tar-rmt is &lt;1.34-150000.3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679658" version="1" comment="apache2-mod_auth_openidc is &lt;2.3.8-150100.3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679727" version="1" comment="giflib-devel is &lt;5.2.1-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679728" version="1" comment="libgif7 is &lt;5.2.1-150000.4.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680364" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680365" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680366" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680367" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680368" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680369" version="1" comment="java-11-openjdk is &lt;11.0.15.0-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680370" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680371" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680372" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-150000.3.80.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680373" version="1" comment="libjasper-devel is &lt;2.0.14-150000.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680374" version="1" comment="libjasper4 is &lt;2.0.14-150000.3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680817" version="1" comment="python3-Twisted is &lt;19.10.0-150200.3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681188" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681189" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681190" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-150200.11.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665679" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665680" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665681" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665682" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665683" version="1" comment="libdcerpc0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665684" version="1" comment="libndr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665685" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665686" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665687" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665688" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665689" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665690" version="1" comment="libndr-standard0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665691" version="1" comment="libndr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665692" version="1" comment="libnetapi-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665693" version="1" comment="libnetapi0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665694" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665695" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665696" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665697" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665698" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665699" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665700" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665701" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665702" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665703" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665704" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665705" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665706" version="1" comment="libsamba-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665707" version="1" comment="libsamdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665708" version="1" comment="libsamdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665709" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665710" version="1" comment="libsmbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665711" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665712" version="1" comment="libsmbconf0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665713" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665714" version="1" comment="libsmbldap2 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665715" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665716" version="1" comment="libtevent-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665717" version="1" comment="libwbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665718" version="1" comment="libwbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665719" version="1" comment="samba is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665720" version="1" comment="samba-ceph is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665721" version="1" comment="samba-client is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665722" version="1" comment="samba-core-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665723" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665724" version="1" comment="samba-libs is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665725" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665726" version="1" comment="samba-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665727" version="1" comment="samba-winbind is &lt;4.11.14+git.319.91d693db37c-4.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667559" version="1" comment="kernel-default is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667560" version="1" comment="kernel-default-base is &lt;5.3.18-24.102.1.9.48.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667561" version="1" comment="kernel-default-devel is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667562" version="1" comment="kernel-obs-build is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667563" version="1" comment="kernel-preempt is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667564" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667565" version="1" comment="kernel-syms is &lt;5.3.18-24.102.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662065" version="1" comment="libvirt is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662066" version="1" comment="libvirt-admin is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662067" version="1" comment="libvirt-client is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662068" version="1" comment="libvirt-daemon is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662069" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662070" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662071" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662072" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662073" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662074" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662075" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662076" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662077" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662078" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662079" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662080" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662081" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662082" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662083" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662084" version="1" comment="libvirt-daemon-driver-storage-rbd is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662085" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662086" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662087" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662088" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662089" version="1" comment="libvirt-devel is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662090" version="1" comment="libvirt-libs is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662091" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662092" version="1" comment="libvirt-nss is &lt;6.0.0-13.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660305" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660306" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660307" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.42.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667316" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667317" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665728" version="1" comment="libtiff-devel is &lt;4.0.9-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665729" version="1" comment="libtiff5 is &lt;4.0.9-45.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664579" version="1" comment="cargo is &lt;1.53.0-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664580" version="1" comment="rls is &lt;1.53.0-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664581" version="1" comment="rust is &lt;1.53.0-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664582" version="1" comment="rust-analysis is &lt;1.53.0-22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664868" version="1" comment="strongswan is &lt;5.8.2-11.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664869" version="1" comment="strongswan-hmac is &lt;5.8.2-11.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664870" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664871" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.24.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664574" version="1" comment="clamav is &lt;0.103.5-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664575" version="1" comment="clamav-devel is &lt;0.103.5-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664576" version="1" comment="libclamav9 is &lt;0.103.5-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664577" version="1" comment="libfreshclam2 is &lt;0.103.5-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665730" version="1" comment="expat is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665731" version="1" comment="libexpat-devel is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665732" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667820" version="1" comment="python3-Twisted is &lt;19.10.0-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661279" version="1" comment="libsnmp30 is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661280" version="1" comment="net-snmp is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661281" version="1" comment="net-snmp-devel is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661282" version="1" comment="perl-SNMP is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661283" version="1" comment="snmp-mibs is &lt;5.7.3-10.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662466" version="1" comment="libsndfile-devel is &lt;1.0.28-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662467" version="1" comment="libsndfile1 is &lt;1.0.28-5.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668309" version="1" comment="libpolkit0 is &lt;0.116-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668310" version="1" comment="polkit is &lt;0.116-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668311" version="1" comment="polkit-devel is &lt;0.116-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668312" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667550" version="1" comment="ImageMagick is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667551" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667552" version="1" comment="ImageMagick-config-7-upstream is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667553" version="1" comment="ImageMagick-devel is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667554" version="1" comment="libMagick++-7_Q16HDRI4 is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667555" version="1" comment="libMagick++-devel is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667556" version="1" comment="libMagickCore-7_Q16HDRI6 is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667557" version="1" comment="libMagickWand-7_Q16HDRI6 is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667558" version="1" comment="perl-PerlMagick is &lt;7.0.7.34-10.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668307" version="1" comment="libjasper-devel is &lt;2.0.14-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668308" version="1" comment="libjasper4 is &lt;2.0.14-3.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667511" version="1" comment="libIlmImf-2_2-23 is &lt;2.2.1-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667512" version="1" comment="libIlmImfUtil-2_2-23 is &lt;2.2.1-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667513" version="1" comment="openexr-devel is &lt;2.2.1-3.41.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667547" version="1" comment="ldns-devel is &lt;1.7.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667548" version="1" comment="libldns2 is &lt;1.7.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667549" version="1" comment="perl-DNS-LDNS is &lt;1.7.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667509" version="1" comment="libmspack-devel is &lt;0.6-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667510" version="1" comment="libmspack0 is &lt;0.6-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668197" version="1" comment="MozillaFirefox is &lt;91.6.0-152.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668198" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-152.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668199" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-152.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668200" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-152.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669223" version="1" comment="cyrus-sasl is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669224" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669225" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669226" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669227" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669228" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669229" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669230" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669231" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669232" version="1" comment="libsasl2-3 is &lt;2.1.26-5.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670710" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670711" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670712" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670713" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670714" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670715" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670716" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-29.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670036" version="1" comment="flatpak is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670037" version="1" comment="flatpak-devel is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670038" version="1" comment="flatpak-zsh-completion is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670039" version="1" comment="libflatpak0 is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670040" version="1" comment="system-user-flatpak is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670041" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.7-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669220" version="1" comment="expat is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669221" version="1" comment="libexpat-devel is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669222" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669219" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669041" version="1" comment="gnutls is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669042" version="1" comment="libgnutls-devel is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669043" version="1" comment="libgnutls30 is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669017" version="1" comment="libgnutls30-32bit is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669044" version="1" comment="libgnutls30-hmac is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669019" version="1" comment="libgnutls30-hmac-32bit is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669045" version="1" comment="libgnutlsxx-devel is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669046" version="1" comment="libgnutlsxx28 is &lt;3.6.7-14.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669038" version="1" comment="wireshark is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669039" version="1" comment="wireshark-devel is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669040" version="1" comment="wireshark-ui-qt is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669588" version="1" comment="go1.17 is &lt;1.17.7-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669589" version="1" comment="go1.17-doc is &lt;1.17.7-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669590" version="1" comment="go1.17-race is &lt;1.17.7-1.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669585" version="1" comment="go1.16 is &lt;1.16.14-1.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669586" version="1" comment="go1.16-doc is &lt;1.16.14-1.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669587" version="1" comment="go1.16-race is &lt;1.16.14-1.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669776" version="1" comment="libmariadbd-devel is &lt;10.4.24-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669777" version="1" comment="libmariadbd19 is &lt;10.4.24-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669778" version="1" comment="mariadb is &lt;10.4.24-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669779" version="1" comment="mariadb-client is &lt;10.4.24-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669780" version="1" comment="mariadb-tools is &lt;10.4.24-3.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670479" version="1" comment="zsh is &lt;5.6-7.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670034" version="1" comment="gvim is &lt;8.0.1568-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670035" version="1" comment="vim is &lt;8.0.1568-5.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671526" version="1" comment="kernel-default is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671527" version="1" comment="kernel-default-base is &lt;5.3.18-24.107.1.9.50.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671528" version="1" comment="kernel-default-devel is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671529" version="1" comment="kernel-obs-build is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671530" version="1" comment="kernel-preempt is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671531" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671532" version="1" comment="kernel-syms is &lt;5.3.18-24.107.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670707" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670708" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670709" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668003" version="1" comment="tcpdump is &lt;4.9.2-3.18.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671522" version="1" comment="MozillaFirefox is &lt;91.6.1-152.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671523" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-152.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671524" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-152.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671525" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.1-152.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670489" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.40.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667545" version="1" comment="python3-lxml is &lt;4.7.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667546" version="1" comment="python3-lxml-devel is &lt;4.7.1-3.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671518" version="1" comment="openssh is &lt;8.1p1-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671519" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671520" version="1" comment="openssh-fips is &lt;8.1p1-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671521" version="1" comment="openssh-helpers is &lt;8.1p1-5.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671013" version="1" comment="flac-devel is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671014" version="1" comment="libFLAC++6 is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671015" version="1" comment="libFLAC8 is &lt;1.3.2-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667541" version="1" comment="java-11-openjdk is &lt;11.0.14.0-3.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667542" version="1" comment="java-11-openjdk-demo is &lt;11.0.14.0-3.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667543" version="1" comment="java-11-openjdk-devel is &lt;11.0.14.0-3.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667544" version="1" comment="java-11-openjdk-headless is &lt;11.0.14.0-3.74.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667358" version="1" comment="xstream is &lt;1.4.19-3.18.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672204" version="1" comment="MozillaFirefox is &lt;91.7.0-152.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672205" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-152.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672206" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-152.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672207" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-152.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669047" version="1" comment="glibc is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669048" version="1" comment="glibc-devel is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669049" version="1" comment="glibc-devel-static is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669050" version="1" comment="glibc-extra is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669051" version="1" comment="glibc-locale is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669052" version="1" comment="glibc-locale-base is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669053" version="1" comment="glibc-profile is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669054" version="1" comment="glibc-utils is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669055" version="1" comment="nscd is &lt;2.26-13.65.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672167" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672168" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672169" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672170" version="1" comment="libQt5Core5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672171" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672172" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672173" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672174" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672175" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672176" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672177" version="1" comment="libQt5Network5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672178" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672179" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672180" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672181" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672182" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672183" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672184" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672185" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672186" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672187" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672188" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672189" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672190" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672191" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672192" version="1" comment="libQt5Test5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672193" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672194" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672195" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672196" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672197" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672198" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672199" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671239" version="1" comment="expat is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671240" version="1" comment="libexpat-devel is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671241" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672200" version="1" comment="augeas is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672201" version="1" comment="augeas-devel is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672202" version="1" comment="augeas-lenses is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672203" version="1" comment="libaugeas0 is &lt;1.10.1-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673286" version="1" comment="libminizip1 is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673287" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673288" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673289" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673290" version="1" comment="libz1 is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673291" version="1" comment="linux-glibc-devel is &lt;5.3-3.2.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673292" version="1" comment="minizip-devel is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673293" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673294" version="1" comment="zlib-devel is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673295" version="1" comment="zlib-devel-static is &lt;1.2.11-3.26.10 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672636" version="1" comment="stunnel is &lt;5.62-3.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667514" version="1" comment="ghostscript is &lt;9.52-161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667515" version="1" comment="ghostscript-devel is &lt;9.52-161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667516" version="1" comment="ghostscript-x11 is &lt;9.52-161.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670480" version="1" comment="blas-devel is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670481" version="1" comment="lapack-devel is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670482" version="1" comment="libblas3 is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670483" version="1" comment="liblapack3 is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670484" version="1" comment="liblapacke3 is &lt;3.5.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673552" version="1" comment="bsdtar is &lt;3.4.2-150200.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673553" version="1" comment="libarchive-devel is &lt;3.4.2-150200.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673554" version="1" comment="libarchive13 is &lt;3.4.2-150200.4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673918" version="1" comment="bind is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673919" version="1" comment="bind-chrootenv is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673920" version="1" comment="bind-devel is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673921" version="1" comment="bind-utils is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673922" version="1" comment="libbind9-1600 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673923" version="1" comment="libdns1605 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673924" version="1" comment="libirs-devel is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673925" version="1" comment="libirs1601 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673926" version="1" comment="libisc1606 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673927" version="1" comment="libisccc1600 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673928" version="1" comment="libisccfg1600 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673929" version="1" comment="libns1604 is &lt;9.16.6-150000.12.60.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673283" version="1" comment="libwavpack1 is &lt;5.4.0-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673284" version="1" comment="wavpack is &lt;5.4.0-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673285" version="1" comment="wavpack-devel is &lt;5.4.0-4.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659823" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659824" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659825" version="1" comment="p11-kit-devel is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659826" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659827" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659853" version="1" comment="go1.16 is &lt;1.16.12-1.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659854" version="1" comment="go1.16-doc is &lt;1.16.12-1.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659855" version="1" comment="go1.16-race is &lt;1.16.12-1.37.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659850" version="1" comment="go1.17 is &lt;1.17.5-1.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659851" version="1" comment="go1.17-doc is &lt;1.17.5-1.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659852" version="1" comment="go1.17-race is &lt;1.17.5-1.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677440" version="1" comment="salt-transactional-update is &lt;3002.2-150200.58.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663762" version="1" comment="MozillaFirefox is &lt;91.5.0-152.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663763" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-152.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663764" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-152.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663765" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-152.12.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681196" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681197" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681198" version="1" comment="npm12 is &lt;12.22.12-150200.4.32.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681193" version="1" comment="nodejs14 is &lt;14.19.1-150200.15.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681194" version="1" comment="nodejs14-devel is &lt;14.19.1-150200.15.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681195" version="1" comment="npm14 is &lt;14.19.1-150200.15.31.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664091" version="1" comment="expat is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664092" version="1" comment="libexpat-devel is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664093" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664603" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664604" version="1" comment="polkit is &lt;0.116-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664605" version="1" comment="polkit-devel is &lt;0.116-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664606" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664607" version="1" comment="kernel-default is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664608" version="1" comment="kernel-default-base is &lt;5.3.18-24.99.1.9.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664609" version="1" comment="kernel-default-devel is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664610" version="1" comment="kernel-obs-build is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664611" version="1" comment="kernel-preempt is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664612" version="1" comment="kernel-preempt-devel is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664613" version="1" comment="kernel-syms is &lt;5.3.18-24.99.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663938" version="1" comment="libwireshark15 is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663939" version="1" comment="libwiretap12 is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663940" version="1" comment="libwsutil13 is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663941" version="1" comment="wireshark is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663942" version="1" comment="wireshark-devel is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663943" version="1" comment="wireshark-ui-qt is &lt;3.6.1-3.68.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668752" version="1" comment="nodejs12 is &lt;12.22.10-4.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668753" version="1" comment="nodejs12-devel is &lt;12.22.10-4.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668754" version="1" comment="npm12 is &lt;12.22.10-4.29.3 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669799" version="1" comment="nodejs8 is &lt;8.17.0-10.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669800" version="1" comment="nodejs8-devel is &lt;8.17.0-10.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669801" version="1" comment="npm8 is &lt;8.17.0-10.19.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669254" version="1" comment="nodejs14 is &lt;14.19.0-15.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669255" version="1" comment="nodejs14-devel is &lt;14.19.0-15.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669256" version="1" comment="npm14 is &lt;14.19.0-15.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670075" version="1" comment="libwireshark15 is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670076" version="1" comment="libwiretap12 is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670077" version="1" comment="libwsutil13 is &lt;3.6.2-3.71.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672208" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672209" version="1" comment="php7 is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672210" version="1" comment="php7-bcmath is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672211" version="1" comment="php7-bz2 is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672212" version="1" comment="php7-calendar is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672213" version="1" comment="php7-ctype is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672214" version="1" comment="php7-curl is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672215" version="1" comment="php7-dba is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672216" version="1" comment="php7-devel is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672217" version="1" comment="php7-dom is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672218" version="1" comment="php7-enchant is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672219" version="1" comment="php7-exif is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672220" version="1" comment="php7-fastcgi is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672221" version="1" comment="php7-fileinfo is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672222" version="1" comment="php7-fpm is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672223" version="1" comment="php7-ftp is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672224" version="1" comment="php7-gd is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672225" version="1" comment="php7-gettext is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672226" version="1" comment="php7-gmp is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672227" version="1" comment="php7-iconv is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672228" version="1" comment="php7-intl is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672229" version="1" comment="php7-json is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672230" version="1" comment="php7-ldap is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672231" version="1" comment="php7-mbstring is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672232" version="1" comment="php7-mysql is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672233" version="1" comment="php7-odbc is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672234" version="1" comment="php7-opcache is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672235" version="1" comment="php7-openssl is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672236" version="1" comment="php7-pcntl is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672237" version="1" comment="php7-pdo is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672238" version="1" comment="php7-pgsql is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672239" version="1" comment="php7-phar is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672240" version="1" comment="php7-posix is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672241" version="1" comment="php7-readline is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672242" version="1" comment="php7-shmop is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672243" version="1" comment="php7-snmp is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672244" version="1" comment="php7-soap is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672245" version="1" comment="php7-sockets is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672246" version="1" comment="php7-sodium is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672247" version="1" comment="php7-sqlite is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672248" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672249" version="1" comment="php7-sysvsem is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672250" version="1" comment="php7-sysvshm is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672251" version="1" comment="php7-tidy is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672252" version="1" comment="php7-tokenizer is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672253" version="1" comment="php7-xmlreader is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672254" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672255" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672256" version="1" comment="php7-xsl is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672257" version="1" comment="php7-zip is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672258" version="1" comment="php7-zlib is &lt;7.4.6-3.35.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660281" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660282" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660283" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660213" version="1" comment="sles-ltss-release is ==15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009071779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673897" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673898" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673899" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673900" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.5-150000.3.56.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676844" version="1" comment="openvpn is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676845" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676846" version="1" comment="openvpn-devel is &lt;2.4.3-150000.5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673667" version="1" comment="apache2 is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673674" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673668" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673669" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673676" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.42.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663285" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663286" version="1" comment="libSDL2-devel is &lt;2.0.8-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677441" version="1" comment="python3-salt is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677442" version="1" comment="salt is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677443" version="1" comment="salt-api is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677444" version="1" comment="salt-cloud is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677445" version="1" comment="salt-doc is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677446" version="1" comment="salt-master is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677447" version="1" comment="salt-minion is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677448" version="1" comment="salt-proxy is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677449" version="1" comment="salt-ssh is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677450" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677451" version="1" comment="salt-syndic is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677452" version="1" comment="salt-transactional-update is &lt;3002.2-150200.58.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676990" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676991" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676993" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676994" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676995" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.30.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662459" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662460" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662461" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662462" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678152" version="1" comment="389-ds is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678153" version="1" comment="389-ds-devel is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678154" version="1" comment="lib389 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678155" version="1" comment="libsvrcore0 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678631" version="1" comment="MozillaFirefox is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678688" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678633" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678634" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-150200.152.26.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677226" version="1" comment="libexif-devel is &lt;0.6.22-150000.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677227" version="1" comment="libexif12 is &lt;0.6.22-150000.5.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678029" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678031" version="1" comment="libfreebl3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678033" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678035" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678037" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678039" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678041" version="1" comment="mozilla-nss-devel is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678042" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678043" version="1" comment="mozilla-nss-tools is &lt;3.68.3-150000.3.67.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677217" version="1" comment="libsolv-devel is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677218" version="1" comment="libsolv-tools is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677219" version="1" comment="libzypp is &lt;17.30.0-150200.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677220" version="1" comment="libzypp-devel is &lt;17.30.0-150200.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677229" version="1" comment="perl-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677221" version="1" comment="python3-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677222" version="1" comment="ruby-solv is &lt;0.7.22-150200.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677223" version="1" comment="zypper is &lt;1.14.52-150200.30.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679123" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679125" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679126" version="1" comment="xz-devel is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679128" version="1" comment="xz-static-devel is &lt;5.2.3-150000.4.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679220" version="1" comment="subversion is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679221" version="1" comment="subversion-devel is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679222" version="1" comment="subversion-perl is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679223" version="1" comment="subversion-python is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679224" version="1" comment="subversion-server is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679225" version="1" comment="subversion-tools is &lt;1.10.6-150000.3.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678459" version="1" comment="go1.16 is &lt;1.16.15-150000.1.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678460" version="1" comment="go1.16-doc is &lt;1.16.15-150000.1.46.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678637" version="1" comment="go1.17 is &lt;1.17.8-150000.1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678638" version="1" comment="go1.17-doc is &lt;1.17.8-150000.1.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679659" version="1" comment="kernel-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679660" version="1" comment="kernel-default-base is &lt;5.3.18-150200.24.112.1.150200.9.52.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679661" version="1" comment="kernel-default-devel is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679662" version="1" comment="kernel-obs-build is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679663" version="1" comment="kernel-syms is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679664" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150200.24.112.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678635" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678636" version="1" comment="libSDL2-devel is &lt;2.0.8-150200.11.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677917" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677918" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677919" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679900" version="1" comment="git is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679901" version="1" comment="git-arch is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679902" version="1" comment="git-core is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679903" version="1" comment="git-cvs is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679904" version="1" comment="git-daemon is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679905" version="1" comment="git-email is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679906" version="1" comment="git-gui is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679907" version="1" comment="git-svn is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679908" version="1" comment="git-web is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679909" version="1" comment="gitk is &lt;2.26.2-150000.36.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679467" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-150000.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679468" version="1" comment="libSDL-devel is &lt;1.2.15-150000.3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679714" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679715" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680157" version="1" comment="libinput-devel is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680158" version="1" comment="libinput-tools is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680159" version="1" comment="libinput-udev is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680160" version="1" comment="libinput10 is &lt;1.10.5-150000.3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679466" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663720" version="1" comment="busybox is &lt;1.34.1-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663721" version="1" comment="busybox-static is &lt;1.34.1-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663724" version="1" comment="MozillaFirefox is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663827" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663726" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663727" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-152.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681162" version="1" comment="cifs-utils is &lt;6.9-150100.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681163" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680164" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680165" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680186" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680187" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680188" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680167" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680189" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-150200.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681172" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681173" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681175" version="1" comment="npm12 is &lt;12.22.12-150200.4.32.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681168" version="1" comment="nodejs14 is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681169" version="1" comment="nodejs14-devel is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681171" version="1" comment="npm14 is &lt;14.19.1-150200.15.31.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664151" version="1" comment="aide is &lt;0.16-24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664287" version="1" comment="libunbound2 is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664288" version="1" comment="unbound-anchor is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664289" version="1" comment="unbound-devel is &lt;1.6.8-10.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664152" version="1" comment="expat is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664153" version="1" comment="libexpat-devel is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664154" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664283" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664284" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664296" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664297" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664298" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664286" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664299" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-23.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664148" version="1" comment="libjson-c-devel is &lt;0.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664149" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664492" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664493" version="1" comment="polkit is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664494" version="1" comment="polkit-devel is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664495" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664884" version="1" comment="kernel-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664885" version="1" comment="kernel-default-base is &lt;5.3.18-24.99.1.9.46.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664886" version="1" comment="kernel-default-devel is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664887" version="1" comment="kernel-obs-build is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664888" version="1" comment="kernel-syms is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664889" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.99.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666586" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666587" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666588" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666589" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666590" version="1" comment="libdcerpc0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666591" version="1" comment="libndr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666592" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666593" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666594" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666595" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666596" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666597" version="1" comment="libndr-standard0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666598" version="1" comment="libndr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666599" version="1" comment="libnetapi-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666600" version="1" comment="libnetapi0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666601" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666602" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666603" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666604" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666605" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666606" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666607" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666608" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666609" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666610" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666611" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666612" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666613" version="1" comment="libsamba-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666614" version="1" comment="libsamdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666615" version="1" comment="libsamdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666616" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666617" version="1" comment="libsmbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666618" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666619" version="1" comment="libsmbconf0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666620" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666621" version="1" comment="libsmbldap2 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666622" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666623" version="1" comment="libtevent-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666624" version="1" comment="libwbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666625" version="1" comment="libwbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666626" version="1" comment="samba is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666627" version="1" comment="samba-ad-dc is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666628" version="1" comment="samba-client is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666629" version="1" comment="samba-core-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666630" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666631" version="1" comment="samba-libs is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666632" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666633" version="1" comment="samba-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666634" version="1" comment="samba-winbind is &lt;4.11.14+git.319.91d693db37c-4.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667580" version="1" comment="kernel-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667581" version="1" comment="kernel-default-base is &lt;5.3.18-24.102.1.9.48.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667582" version="1" comment="kernel-default-devel is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667583" version="1" comment="kernel-obs-build is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667584" version="1" comment="kernel-syms is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667585" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.102.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663839" version="1" comment="libwireshark15 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663840" version="1" comment="libwiretap12 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663841" version="1" comment="libwsutil13 is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663842" version="1" comment="wireshark is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663857" version="1" comment="wireshark-devel is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663858" version="1" comment="wireshark-ui-qt is &lt;3.6.1-3.68.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662981" version="1" comment="libvirt is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662982" version="1" comment="libvirt-admin is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662983" version="1" comment="libvirt-client is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662984" version="1" comment="libvirt-daemon is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662985" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662986" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662987" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662988" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662989" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662990" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662991" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662992" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662993" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662994" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662995" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662996" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662997" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662998" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662999" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663000" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663001" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663002" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663003" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663004" version="1" comment="libvirt-devel is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663005" version="1" comment="libvirt-libs is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663006" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663007" version="1" comment="libvirt-nss is &lt;6.0.0-13.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667312" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667313" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665431" version="1" comment="libtiff-devel is &lt;4.0.9-45.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665432" version="1" comment="libtiff5 is &lt;4.0.9-45.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668322" version="1" comment="cargo is &lt;1.53.0-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668323" version="1" comment="rust is &lt;1.53.0-22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664852" version="1" comment="strongswan is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664854" version="1" comment="strongswan-hmac is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664855" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664856" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.24.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664496" version="1" comment="clamav is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664497" version="1" comment="clamav-devel is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664498" version="1" comment="libclamav9 is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664499" version="1" comment="libfreshclam2 is &lt;0.103.5-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665433" version="1" comment="expat is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665434" version="1" comment="libexpat-devel is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665435" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667814" version="1" comment="python3-Twisted is &lt;19.10.0-3.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661027" version="1" comment="libsnmp30 is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661028" version="1" comment="net-snmp is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661029" version="1" comment="net-snmp-devel is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661030" version="1" comment="perl-SNMP is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661031" version="1" comment="snmp-mibs is &lt;5.7.3-10.9.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662457" version="1" comment="libsndfile-devel is &lt;1.0.28-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662458" version="1" comment="libsndfile1 is &lt;1.0.28-5.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668508" version="1" comment="nodejs12 is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668509" version="1" comment="nodejs12-devel is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668511" version="1" comment="npm12 is &lt;12.22.10-4.29.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668193" version="1" comment="MozillaFirefox is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668251" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668195" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668196" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-152.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669233" version="1" comment="cyrus-sasl is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669234" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669235" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669236" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669237" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669238" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669239" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669240" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669241" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669242" version="1" comment="libsasl2-3 is &lt;2.1.26-5.10.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669854" version="1" comment="nodejs8 is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669855" version="1" comment="nodejs8-devel is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669856" version="1" comment="npm8 is &lt;8.17.0-10.19.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670663" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670664" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670668" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670669" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670670" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670666" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670671" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-29.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669930" version="1" comment="flatpak is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669931" version="1" comment="flatpak-devel is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669932" version="1" comment="flatpak-zsh-completion is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669933" version="1" comment="libflatpak0 is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669934" version="1" comment="system-user-flatpak is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669935" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.7-4.12.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669162" version="1" comment="expat is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669163" version="1" comment="libexpat-devel is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669164" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669194" version="1" comment="nodejs14 is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669195" version="1" comment="nodejs14-devel is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669197" version="1" comment="npm14 is &lt;14.19.0-15.27.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669161" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669010" version="1" comment="libwireshark15 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669011" version="1" comment="libwiretap12 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669012" version="1" comment="libwsutil13 is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669013" version="1" comment="wireshark is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669022" version="1" comment="wireshark-devel is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669023" version="1" comment="wireshark-ui-qt is &lt;3.6.2-3.71.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669570" version="1" comment="go1.17 is &lt;1.17.7-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669571" version="1" comment="go1.17-doc is &lt;1.17.7-1.20.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669567" version="1" comment="go1.16 is &lt;1.16.14-1.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669568" version="1" comment="go1.16-doc is &lt;1.16.14-1.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670737" version="1" comment="libmariadbd-devel is &lt;10.4.24-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670738" version="1" comment="libmariadbd19 is &lt;10.4.24-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670739" version="1" comment="mariadb is &lt;10.4.24-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670740" version="1" comment="mariadb-client is &lt;10.4.24-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670741" version="1" comment="mariadb-tools is &lt;10.4.24-3.25.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670453" version="1" comment="zsh is &lt;5.6-7.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669929" version="1" comment="gvim is &lt;8.0.1568-5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669881" version="1" comment="vim is &lt;8.0.1568-5.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671634" version="1" comment="kernel-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671635" version="1" comment="kernel-default-base is &lt;5.3.18-24.107.1.9.50.2 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671636" version="1" comment="kernel-default-devel is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671637" version="1" comment="kernel-obs-build is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671638" version="1" comment="kernel-syms is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671639" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.107.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670660" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670661" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670662" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-11.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667949" version="1" comment="tcpdump is &lt;4.9.2-3.18.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671381" version="1" comment="MozillaFirefox is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671898" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671383" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671384" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.1-152.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670467" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670465" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.40.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667470" version="1" comment="python2-lxml is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667471" version="1" comment="python2-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667411" version="1" comment="python3-lxml is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667412" version="1" comment="python3-lxml-devel is &lt;4.7.1-3.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672538" version="1" comment="openssh is &lt;8.1p1-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672539" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672540" version="1" comment="openssh-fips is &lt;8.1p1-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672541" version="1" comment="openssh-helpers is &lt;8.1p1-5.21.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672020" version="1" comment="MozillaFirefox is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672510" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672022" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672023" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-152.22.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669056" version="1" comment="glibc is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669057" version="1" comment="glibc-devel is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669058" version="1" comment="glibc-devel-static is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669059" version="1" comment="glibc-extra is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669060" version="1" comment="glibc-locale is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669061" version="1" comment="glibc-locale-base is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669062" version="1" comment="glibc-profile is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669063" version="1" comment="glibc-utils is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669064" version="1" comment="nscd is &lt;2.26-13.65.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671971" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671972" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671973" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671975" version="1" comment="libQt5Core5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671976" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671978" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671979" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671981" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671982" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671984" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671986" version="1" comment="libQt5Network5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671987" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671989" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672015" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671990" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671991" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671993" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671995" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671996" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671998" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672016" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672017" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671999" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672018" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672000" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672002" version="1" comment="libQt5Test5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672003" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672005" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672006" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672007" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672008" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672009" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672019" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.17.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671081" version="1" comment="expat is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671082" version="1" comment="libexpat-devel is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671083" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672028" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672029" version="1" comment="php7 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672030" version="1" comment="php7-bcmath is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672031" version="1" comment="php7-bz2 is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672032" version="1" comment="php7-calendar is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672033" version="1" comment="php7-ctype is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672034" version="1" comment="php7-curl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672035" version="1" comment="php7-dba is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672036" version="1" comment="php7-devel is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672037" version="1" comment="php7-dom is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672038" version="1" comment="php7-enchant is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672039" version="1" comment="php7-exif is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672040" version="1" comment="php7-fastcgi is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672041" version="1" comment="php7-fileinfo is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672042" version="1" comment="php7-fpm is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672043" version="1" comment="php7-ftp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672044" version="1" comment="php7-gd is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672045" version="1" comment="php7-gettext is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672046" version="1" comment="php7-gmp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672047" version="1" comment="php7-iconv is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672048" version="1" comment="php7-intl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672049" version="1" comment="php7-json is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672050" version="1" comment="php7-ldap is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672051" version="1" comment="php7-mbstring is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672052" version="1" comment="php7-mysql is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672053" version="1" comment="php7-odbc is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672054" version="1" comment="php7-opcache is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672055" version="1" comment="php7-openssl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672056" version="1" comment="php7-pcntl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672057" version="1" comment="php7-pdo is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672058" version="1" comment="php7-pgsql is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672059" version="1" comment="php7-phar is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672060" version="1" comment="php7-posix is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672061" version="1" comment="php7-readline is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672062" version="1" comment="php7-shmop is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672063" version="1" comment="php7-snmp is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672064" version="1" comment="php7-soap is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672065" version="1" comment="php7-sockets is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672066" version="1" comment="php7-sodium is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672067" version="1" comment="php7-sqlite is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672068" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672069" version="1" comment="php7-sysvsem is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672070" version="1" comment="php7-sysvshm is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672071" version="1" comment="php7-tidy is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672072" version="1" comment="php7-tokenizer is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672073" version="1" comment="php7-xmlreader is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672074" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672075" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672076" version="1" comment="php7-xsl is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672077" version="1" comment="php7-zip is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672078" version="1" comment="php7-zlib is &lt;7.4.6-3.35.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672865" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672867" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672868" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.49.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673200" version="1" comment="libminizip1 is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673201" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673202" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673204" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673207" version="1" comment="libz1 is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673209" version="1" comment="linux-glibc-devel is &lt;5.3-3.2.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673210" version="1" comment="minizip-devel is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673212" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673213" version="1" comment="zlib-devel is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673214" version="1" comment="zlib-devel-static is &lt;1.2.11-3.26.10 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672634" version="1" comment="stunnel is &lt;5.62-3.14.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672630" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672631" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672632" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672633" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-3.64.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673930" version="1" comment="bind is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673931" version="1" comment="bind-chrootenv is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673932" version="1" comment="bind-devel is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673933" version="1" comment="bind-utils is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673934" version="1" comment="libbind9-1600 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673935" version="1" comment="libdns1605 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673936" version="1" comment="libirs-devel is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673937" version="1" comment="libirs1601 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673938" version="1" comment="libisc1606 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673939" version="1" comment="libisccc1600 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673940" version="1" comment="libisccfg1600 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673941" version="1" comment="libns1604 is &lt;9.16.6-150000.12.60.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661014" version="1" comment="xorg-x11-server is &lt;1.20.3-22.5.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661015" version="1" comment="xorg-x11-server-extra is &lt;1.20.3-22.5.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661016" version="1" comment="xorg-x11-server-sdk is &lt;1.20.3-22.5.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659842" version="1" comment="libp11-kit0 is &lt;0.23.2-4.13.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659843" version="1" comment="p11-kit is &lt;0.23.2-4.13.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659844" version="1" comment="p11-kit-devel is &lt;0.23.2-4.13.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659845" version="1" comment="p11-kit-nss-trust is &lt;0.23.2-4.13.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659846" version="1" comment="p11-kit-tools is &lt;0.23.2-4.13.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661298" version="1" comment="go1.16 is &lt;1.16.12-1.37.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661299" version="1" comment="go1.16-doc is &lt;1.16.12-1.37.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661300" version="1" comment="go1.17 is &lt;1.17.5-1.14.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661301" version="1" comment="go1.17-doc is &lt;1.17.5-1.14.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673970" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673971" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.5-150000.3.56.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676869" version="1" comment="openvpn is &lt;2.4.3-150000.5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676870" version="1" comment="openvpn-auth-pam-plugin is &lt;2.4.3-150000.5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676871" version="1" comment="openvpn-devel is &lt;2.4.3-150000.5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677101" version="1" comment="apache2 is &lt;2.4.51-150200.3.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677102" version="1" comment="apache2-devel is &lt;2.4.51-150200.3.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677103" version="1" comment="apache2-prefork is &lt;2.4.51-150200.3.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677104" version="1" comment="apache2-utils is &lt;2.4.51-150200.3.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677105" version="1" comment="apache2-worker is &lt;2.4.51-150200.3.42.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663956" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-11.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663957" version="1" comment="libSDL2-devel is &lt;2.0.8-11.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677488" version="1" comment="python3-salt is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677489" version="1" comment="salt is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677490" version="1" comment="salt-api is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677491" version="1" comment="salt-cloud is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677492" version="1" comment="salt-doc is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677493" version="1" comment="salt-master is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677494" version="1" comment="salt-minion is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677495" version="1" comment="salt-proxy is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677496" version="1" comment="salt-ssh is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677497" version="1" comment="salt-standalone-formulas-configuration is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677498" version="1" comment="salt-syndic is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677499" version="1" comment="salt-transactional-update is &lt;3002.2-150200.58.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677012" version="1" comment="libminizip1 is &lt;1.2.11-150000.3.30.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677013" version="1" comment="libz1 is &lt;1.2.11-150000.3.30.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677014" version="1" comment="minizip-devel is &lt;1.2.11-150000.3.30.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677015" version="1" comment="zlib-devel is &lt;1.2.11-150000.3.30.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677016" version="1" comment="zlib-devel-static is &lt;1.2.11-150000.3.30.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662476" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662477" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-3.53.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678192" version="1" comment="389-ds is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678193" version="1" comment="389-ds-devel is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678194" version="1" comment="lib389 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678195" version="1" comment="libsvrcore0 is &lt;1.4.3.29~git18.3fcd3b1bd-150200.3.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678705" version="1" comment="MozillaFirefox is &lt;91.8.0-150200.152.26.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678706" version="1" comment="MozillaFirefox-devel is &lt;91.8.0-150200.152.26.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678707" version="1" comment="MozillaFirefox-translations-common is &lt;91.8.0-150200.152.26.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678708" version="1" comment="MozillaFirefox-translations-other is &lt;91.8.0-150200.152.26.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677486" version="1" comment="libexif-devel is &lt;0.6.22-150000.5.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677487" version="1" comment="libexif12 is &lt;0.6.22-150000.5.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678171" version="1" comment="libfreebl3 is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678172" version="1" comment="libfreebl3-hmac is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678173" version="1" comment="libsoftokn3 is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678174" version="1" comment="libsoftokn3-hmac is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678175" version="1" comment="mozilla-nss is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678176" version="1" comment="mozilla-nss-certs is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678177" version="1" comment="mozilla-nss-devel is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678178" version="1" comment="mozilla-nss-sysinit is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678179" version="1" comment="mozilla-nss-tools is &lt;3.68.3-150000.3.67.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679236" version="1" comment="libsolv-devel is &lt;0.7.22-150200.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679237" version="1" comment="libsolv-tools is &lt;0.7.22-150200.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679238" version="1" comment="libzypp is &lt;17.30.0-150200.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679239" version="1" comment="libzypp-devel is &lt;17.30.0-150200.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679240" version="1" comment="perl-solv is &lt;0.7.22-150200.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679241" version="1" comment="python3-solv is &lt;0.7.22-150200.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679242" version="1" comment="ruby-solv is &lt;0.7.22-150200.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679243" version="1" comment="zypper is &lt;1.14.52-150200.30.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679226" version="1" comment="liblzma5 is &lt;5.2.3-150000.4.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679227" version="1" comment="xz is &lt;5.2.3-150000.4.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679228" version="1" comment="xz-devel is &lt;5.2.3-150000.4.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679229" version="1" comment="xz-static-devel is &lt;5.2.3-150000.4.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679230" version="1" comment="subversion is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679231" version="1" comment="subversion-devel is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679232" version="1" comment="subversion-perl is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679233" version="1" comment="subversion-python is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679234" version="1" comment="subversion-server is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679235" version="1" comment="subversion-tools is &lt;1.10.6-150000.3.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679244" version="1" comment="go1.16 is &lt;1.16.15-150000.1.46.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679245" version="1" comment="go1.16-doc is &lt;1.16.15-150000.1.46.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679246" version="1" comment="go1.17 is &lt;1.17.8-150000.1.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679247" version="1" comment="go1.17-doc is &lt;1.17.8-150000.1.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679665" version="1" comment="kernel-default is &lt;5.3.18-150200.24.112.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679666" version="1" comment="kernel-default-base is &lt;5.3.18-150200.24.112.1.150200.9.52.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679667" version="1" comment="kernel-default-devel is &lt;5.3.18-150200.24.112.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679668" version="1" comment="kernel-obs-build is &lt;5.3.18-150200.24.112.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679669" version="1" comment="kernel-syms is &lt;5.3.18-150200.24.112.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679670" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-150200.24.112.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679671" version="1" comment="libSDL2-2_0-0 is &lt;2.0.8-150200.11.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679672" version="1" comment="libSDL2-devel is &lt;2.0.8-150200.11.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677930" version="1" comment="libopenjp2-7 is &lt;2.3.0-150000.3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677931" version="1" comment="openjpeg2 is &lt;2.3.0-150000.3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677932" version="1" comment="openjpeg2-devel is &lt;2.3.0-150000.3.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679931" version="1" comment="git is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679932" version="1" comment="git-arch is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679933" version="1" comment="git-core is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679934" version="1" comment="git-cvs is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679935" version="1" comment="git-daemon is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679936" version="1" comment="git-email is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679937" version="1" comment="git-gui is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679938" version="1" comment="git-svn is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679939" version="1" comment="git-web is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679940" version="1" comment="gitk is &lt;2.26.2-150000.36.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679508" version="1" comment="libSDL-1_2-0 is &lt;1.2.15-150000.3.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679509" version="1" comment="libSDL-devel is &lt;1.2.15-150000.3.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679731" version="1" comment="libopenjpeg1 is &lt;1.5.2-150000.4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679732" version="1" comment="openjpeg-devel is &lt;1.5.2-150000.4.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680460" version="1" comment="libinput-devel is &lt;1.10.5-150000.3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680461" version="1" comment="libinput-tools is &lt;1.10.5-150000.3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680462" version="1" comment="libinput-udev is &lt;1.10.5-150000.3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680463" version="1" comment="libinput10 is &lt;1.10.5-150000.3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009679512" version="1" comment="dnsmasq is &lt;2.86-150100.7.20.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663766" version="1" comment="busybox is &lt;1.34.1-4.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663767" version="1" comment="busybox-static is &lt;1.34.1-4.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664215" version="1" comment="MozillaFirefox is &lt;91.5.0-152.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664216" version="1" comment="MozillaFirefox-devel is &lt;91.5.0-152.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664217" version="1" comment="MozillaFirefox-translations-common is &lt;91.5.0-152.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664218" version="1" comment="MozillaFirefox-translations-other is &lt;91.5.0-152.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681201" version="1" comment="cifs-utils is &lt;6.9-150100.5.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681202" version="1" comment="cifs-utils-devel is &lt;6.9-150100.5.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681203" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681204" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681205" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681206" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681207" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681208" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681209" version="1" comment="webkit2gtk3-devel is &lt;2.36.0-150200.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681301" version="1" comment="nodejs12 is &lt;12.22.12-150200.4.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681302" version="1" comment="nodejs12-devel is &lt;12.22.12-150200.4.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681303" version="1" comment="npm12 is &lt;12.22.12-150200.4.32.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681304" version="1" comment="nodejs14 is &lt;14.19.1-150200.15.31.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681305" version="1" comment="nodejs14-devel is &lt;14.19.1-150200.15.31.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009681306" version="1" comment="npm14 is &lt;14.19.1-150200.15.31.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664211" version="1" comment="aide is &lt;0.16-24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664331" version="1" comment="libunbound2 is &lt;1.6.8-10.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664332" version="1" comment="unbound-anchor is &lt;1.6.8-10.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664333" version="1" comment="unbound-devel is &lt;1.6.8-10.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664212" version="1" comment="expat is &lt;2.2.5-3.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664213" version="1" comment="libexpat-devel is &lt;2.2.5-3.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664214" version="1" comment="libexpat1 is &lt;2.2.5-3.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664624" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664625" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664626" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664627" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664628" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664629" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664630" version="1" comment="webkit2gtk3-devel is &lt;2.34.3-23.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664209" version="1" comment="libjson-c-devel is &lt;0.13-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664210" version="1" comment="libjson-c3 is &lt;0.13-3.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664631" version="1" comment="libpolkit0 is &lt;0.116-3.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664632" version="1" comment="polkit is &lt;0.116-3.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664633" version="1" comment="polkit-devel is &lt;0.116-3.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664634" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.116-3.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664899" version="1" comment="kernel-default is &lt;5.3.18-24.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664900" version="1" comment="kernel-default-base is &lt;5.3.18-24.99.1.9.46.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664901" version="1" comment="kernel-default-devel is &lt;5.3.18-24.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664902" version="1" comment="kernel-obs-build is &lt;5.3.18-24.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664903" version="1" comment="kernel-syms is &lt;5.3.18-24.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664904" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.99.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666635" version="1" comment="libdcerpc-binding0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666636" version="1" comment="libdcerpc-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666637" version="1" comment="libdcerpc-samr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666638" version="1" comment="libdcerpc-samr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666639" version="1" comment="libdcerpc0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666640" version="1" comment="libndr-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666641" version="1" comment="libndr-krb5pac-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666642" version="1" comment="libndr-krb5pac0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666643" version="1" comment="libndr-nbt-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666644" version="1" comment="libndr-nbt0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666645" version="1" comment="libndr-standard-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666646" version="1" comment="libndr-standard0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666647" version="1" comment="libndr0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666648" version="1" comment="libnetapi-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666649" version="1" comment="libnetapi0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666650" version="1" comment="libsamba-credentials-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666651" version="1" comment="libsamba-credentials0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666652" version="1" comment="libsamba-errors-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666653" version="1" comment="libsamba-errors0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666654" version="1" comment="libsamba-hostconfig-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666655" version="1" comment="libsamba-hostconfig0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666656" version="1" comment="libsamba-passdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666657" version="1" comment="libsamba-passdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666658" version="1" comment="libsamba-policy-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666659" version="1" comment="libsamba-policy-python3-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666660" version="1" comment="libsamba-policy0-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666661" version="1" comment="libsamba-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666662" version="1" comment="libsamba-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666663" version="1" comment="libsamdb-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666664" version="1" comment="libsamdb0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666665" version="1" comment="libsmbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666666" version="1" comment="libsmbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666667" version="1" comment="libsmbconf-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666668" version="1" comment="libsmbconf0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666669" version="1" comment="libsmbldap-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666670" version="1" comment="libsmbldap2 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666671" version="1" comment="libtevent-util-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666672" version="1" comment="libtevent-util0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666673" version="1" comment="libwbclient-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666674" version="1" comment="libwbclient0 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666675" version="1" comment="samba is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666676" version="1" comment="samba-ad-dc is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666677" version="1" comment="samba-client is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666678" version="1" comment="samba-core-devel is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666679" version="1" comment="samba-dsdb-modules is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666680" version="1" comment="samba-libs is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666681" version="1" comment="samba-libs-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666682" version="1" comment="samba-python3 is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666683" version="1" comment="samba-winbind is &lt;4.11.14+git.319.91d693db37c-4.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667593" version="1" comment="kernel-default is &lt;5.3.18-24.102.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667594" version="1" comment="kernel-default-base is &lt;5.3.18-24.102.1.9.48.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667595" version="1" comment="kernel-default-devel is &lt;5.3.18-24.102.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667596" version="1" comment="kernel-obs-build is &lt;5.3.18-24.102.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667597" version="1" comment="kernel-syms is &lt;5.3.18-24.102.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667598" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.102.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663950" version="1" comment="libwireshark15 is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663951" version="1" comment="libwiretap12 is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663952" version="1" comment="libwsutil13 is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663953" version="1" comment="wireshark is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663954" version="1" comment="wireshark-devel is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663955" version="1" comment="wireshark-ui-qt is &lt;3.6.1-3.68.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663013" version="1" comment="libvirt is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663014" version="1" comment="libvirt-admin is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663015" version="1" comment="libvirt-client is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663016" version="1" comment="libvirt-daemon is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663017" version="1" comment="libvirt-daemon-config-network is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663018" version="1" comment="libvirt-daemon-config-nwfilter is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663019" version="1" comment="libvirt-daemon-driver-interface is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663020" version="1" comment="libvirt-daemon-driver-lxc is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663021" version="1" comment="libvirt-daemon-driver-network is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663022" version="1" comment="libvirt-daemon-driver-nodedev is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663023" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663024" version="1" comment="libvirt-daemon-driver-qemu is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663025" version="1" comment="libvirt-daemon-driver-secret is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663026" version="1" comment="libvirt-daemon-driver-storage is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663027" version="1" comment="libvirt-daemon-driver-storage-core is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663028" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663029" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663030" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663031" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663032" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663033" version="1" comment="libvirt-daemon-hooks is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663034" version="1" comment="libvirt-daemon-lxc is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663035" version="1" comment="libvirt-daemon-qemu is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663036" version="1" comment="libvirt-devel is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663037" version="1" comment="libvirt-libs is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663038" version="1" comment="libvirt-lock-sanlock is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009663039" version="1" comment="libvirt-nss is &lt;6.0.0-13.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667320" version="1" comment="libvirglrenderer0 is &lt;0.6.0-4.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009667321" version="1" comment="virglrenderer-devel is &lt;0.6.0-4.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665983" version="1" comment="libtiff-devel is &lt;4.0.9-45.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665984" version="1" comment="libtiff5 is &lt;4.0.9-45.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664622" version="1" comment="cargo is &lt;1.53.0-22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664623" version="1" comment="rust is &lt;1.53.0-22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668327" version="1" comment="strongswan is &lt;5.8.2-11.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668328" version="1" comment="strongswan-hmac is &lt;5.8.2-11.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668329" version="1" comment="strongswan-ipsec is &lt;5.8.2-11.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668330" version="1" comment="strongswan-libs0 is &lt;5.8.2-11.24.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664618" version="1" comment="clamav is &lt;0.103.5-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664619" version="1" comment="clamav-devel is &lt;0.103.5-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664620" version="1" comment="libclamav9 is &lt;0.103.5-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009664621" version="1" comment="libfreshclam2 is &lt;0.103.5-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665985" version="1" comment="expat is &lt;2.2.5-3.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665986" version="1" comment="libexpat-devel is &lt;2.2.5-3.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009665987" version="1" comment="libexpat1 is &lt;2.2.5-3.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668331" version="1" comment="python3-Twisted is &lt;19.10.0-3.6.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661292" version="1" comment="libsnmp30 is &lt;5.7.3-10.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661293" version="1" comment="net-snmp is &lt;5.7.3-10.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661294" version="1" comment="net-snmp-devel is &lt;5.7.3-10.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661295" version="1" comment="perl-SNMP is &lt;5.7.3-10.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661296" version="1" comment="snmp-mibs is &lt;5.7.3-10.9.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662474" version="1" comment="libsndfile-devel is &lt;1.0.28-5.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662475" version="1" comment="libsndfile1 is &lt;1.0.28-5.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670526" version="1" comment="nodejs12 is &lt;12.22.10-4.29.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670527" version="1" comment="nodejs12-devel is &lt;12.22.10-4.29.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670528" version="1" comment="npm12 is &lt;12.22.10-4.29.3 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670748" version="1" comment="MozillaFirefox is &lt;91.6.0-152.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670749" version="1" comment="MozillaFirefox-devel is &lt;91.6.0-152.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670750" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.0-152.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670751" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.0-152.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669258" version="1" comment="cyrus-sasl is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669259" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669260" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669261" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669262" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669263" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669264" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669265" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669266" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669267" version="1" comment="libsasl2-3 is &lt;2.1.26-5.10.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670752" version="1" comment="nodejs8 is &lt;8.17.0-10.19.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670753" version="1" comment="nodejs8-devel is &lt;8.17.0-10.19.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670754" version="1" comment="npm8 is &lt;8.17.0-10.19.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670755" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670756" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670757" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670758" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670759" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670760" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670761" version="1" comment="webkit2gtk3-devel is &lt;2.34.6-29.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670762" version="1" comment="flatpak is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670763" version="1" comment="flatpak-devel is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670764" version="1" comment="flatpak-zsh-completion is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670765" version="1" comment="libflatpak0 is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670766" version="1" comment="system-user-flatpak is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670767" version="1" comment="typelib-1_0-Flatpak-1_0 is &lt;1.10.7-4.12.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669807" version="1" comment="expat is &lt;2.2.5-3.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669808" version="1" comment="libexpat-devel is &lt;2.2.5-3.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669809" version="1" comment="libexpat1 is &lt;2.2.5-3.15.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670768" version="1" comment="nodejs14 is &lt;14.19.0-15.27.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670769" version="1" comment="nodejs14-devel is &lt;14.19.0-15.27.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670770" version="1" comment="npm14 is &lt;14.19.0-15.27.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669257" version="1" comment="wpa_supplicant is &lt;2.9-4.33.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670086" version="1" comment="libwireshark15 is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670087" version="1" comment="libwiretap12 is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670088" version="1" comment="libwsutil13 is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670089" version="1" comment="wireshark is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670090" version="1" comment="wireshark-devel is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670091" version="1" comment="wireshark-ui-qt is &lt;3.6.2-3.71.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670771" version="1" comment="go1.17 is &lt;1.17.7-1.20.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670772" version="1" comment="go1.17-doc is &lt;1.17.7-1.20.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670773" version="1" comment="go1.16 is &lt;1.16.14-1.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670774" version="1" comment="go1.16-doc is &lt;1.16.14-1.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670775" version="1" comment="libmariadbd-devel is &lt;10.4.24-3.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670776" version="1" comment="libmariadbd19 is &lt;10.4.24-3.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670777" version="1" comment="mariadb is &lt;10.4.24-3.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670778" version="1" comment="mariadb-client is &lt;10.4.24-3.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670779" version="1" comment="mariadb-tools is &lt;10.4.24-3.25.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670523" version="1" comment="zsh is &lt;5.6-7.5.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670092" version="1" comment="gvim is &lt;8.0.1568-5.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670093" version="1" comment="vim is &lt;8.0.1568-5.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671680" version="1" comment="kernel-default is &lt;5.3.18-24.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671681" version="1" comment="kernel-default-base is &lt;5.3.18-24.107.1.9.50.2 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671682" version="1" comment="kernel-default-devel is &lt;5.3.18-24.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671683" version="1" comment="kernel-obs-build is &lt;5.3.18-24.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671684" version="1" comment="kernel-syms is &lt;5.3.18-24.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671685" version="1" comment="reiserfs-kmp-default is &lt;5.3.18-24.107.1 for ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672259" version="1" comment="libcaca-devel is &lt;0.99.beta19.git20171003-11.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672260" version="1" comment="libcaca0 is &lt;0.99.beta19.git20171003-11.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672261" version="1" comment="libcaca0-plugins is &lt;0.99.beta19.git20171003-11.3.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009668005" version="1" comment="tcpdump is &lt;4.9.2-3.18.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672262" version="1" comment="MozillaFirefox is &lt;91.6.1-152.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672263" version="1" comment="MozillaFirefox-devel is &lt;91.6.1-152.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672264" version="1" comment="MozillaFirefox-translations-common is &lt;91.6.1-152.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672265" version="1" comment="MozillaFirefox-translations-other is &lt;91.6.1-152.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670524" version="1" comment="python2-libxml2-python is &lt;2.9.7-3.40.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670525" version="1" comment="python3-libxml2-python is &lt;2.9.7-3.40.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672546" version="1" comment="python2-lxml is &lt;4.7.1-3.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672547" version="1" comment="python2-lxml-devel is &lt;4.7.1-3.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672548" version="1" comment="python3-lxml is &lt;4.7.1-3.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672549" version="1" comment="python3-lxml-devel is &lt;4.7.1-3.7.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672550" version="1" comment="openssh is &lt;8.1p1-5.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672551" version="1" comment="openssh-askpass-gnome is &lt;8.1p1-5.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672552" version="1" comment="openssh-fips is &lt;8.1p1-5.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672553" version="1" comment="openssh-helpers is &lt;8.1p1-5.21.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672757" version="1" comment="MozillaFirefox is &lt;91.7.0-152.22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672758" version="1" comment="MozillaFirefox-devel is &lt;91.7.0-152.22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672759" version="1" comment="MozillaFirefox-translations-common is &lt;91.7.0-152.22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672760" version="1" comment="MozillaFirefox-translations-other is &lt;91.7.0-152.22.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669074" version="1" comment="glibc is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669075" version="1" comment="glibc-devel is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669076" version="1" comment="glibc-devel-static is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669077" version="1" comment="glibc-extra is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669078" version="1" comment="glibc-locale is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669079" version="1" comment="glibc-locale-base is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669080" version="1" comment="glibc-profile is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669081" version="1" comment="glibc-utils is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009669082" version="1" comment="nscd is &lt;2.26-13.65.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672920" version="1" comment="libQt5Concurrent-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672921" version="1" comment="libQt5Concurrent5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672922" version="1" comment="libQt5Core-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672923" version="1" comment="libQt5Core5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672924" version="1" comment="libQt5DBus-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672925" version="1" comment="libQt5DBus5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672926" version="1" comment="libQt5Gui-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672927" version="1" comment="libQt5Gui5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672928" version="1" comment="libQt5KmsSupport-devel-static is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672929" version="1" comment="libQt5Network-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672930" version="1" comment="libQt5Network5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672931" version="1" comment="libQt5OpenGL-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672932" version="1" comment="libQt5OpenGL5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672933" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672934" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672935" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672936" version="1" comment="libQt5PrintSupport-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672937" version="1" comment="libQt5PrintSupport5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672938" version="1" comment="libQt5Sql-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672939" version="1" comment="libQt5Sql5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672940" version="1" comment="libQt5Sql5-mysql is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672941" version="1" comment="libQt5Sql5-postgresql is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672942" version="1" comment="libQt5Sql5-sqlite is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672943" version="1" comment="libQt5Sql5-unixODBC is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672944" version="1" comment="libQt5Test-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672945" version="1" comment="libQt5Test5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672946" version="1" comment="libQt5Widgets-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672947" version="1" comment="libQt5Widgets5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672948" version="1" comment="libQt5Xml-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672949" version="1" comment="libQt5Xml5 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672950" version="1" comment="libqt5-qtbase-common-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672951" version="1" comment="libqt5-qtbase-devel is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672952" version="1" comment="libqt5-qtbase-platformtheme-gtk3 is &lt;5.12.7-4.17.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671245" version="1" comment="expat is &lt;2.2.5-3.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671246" version="1" comment="libexpat-devel is &lt;2.2.5-3.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009671247" version="1" comment="libexpat1 is &lt;2.2.5-3.19.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009157958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672953" version="1" comment="apache2-mod_php7 is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672954" version="1" comment="php7 is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672955" version="1" comment="php7-bcmath is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672956" version="1" comment="php7-bz2 is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672957" version="1" comment="php7-calendar is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672958" version="1" comment="php7-ctype is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672959" version="1" comment="php7-curl is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672960" version="1" comment="php7-dba is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672961" version="1" comment="php7-devel is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672962" version="1" comment="php7-dom is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672963" version="1" comment="php7-enchant is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672964" version="1" comment="php7-exif is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672965" version="1" comment="php7-fastcgi is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672966" version="1" comment="php7-fileinfo is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672967" version="1" comment="php7-fpm is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672968" version="1" comment="php7-ftp is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672969" version="1" comment="php7-gd is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672970" version="1" comment="php7-gettext is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672971" version="1" comment="php7-gmp is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672972" version="1" comment="php7-iconv is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672973" version="1" comment="php7-intl is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672974" version="1" comment="php7-json is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672975" version="1" comment="php7-ldap is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672976" version="1" comment="php7-mbstring is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672977" version="1" comment="php7-mysql is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672978" version="1" comment="php7-odbc is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672979" version="1" comment="php7-opcache is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672980" version="1" comment="php7-openssl is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672981" version="1" comment="php7-pcntl is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672982" version="1" comment="php7-pdo is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672983" version="1" comment="php7-pgsql is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672984" version="1" comment="php7-phar is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672985" version="1" comment="php7-posix is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672986" version="1" comment="php7-readline is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672987" version="1" comment="php7-shmop is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672988" version="1" comment="php7-snmp is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672989" version="1" comment="php7-soap is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672990" version="1" comment="php7-sockets is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672991" version="1" comment="php7-sodium is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672992" version="1" comment="php7-sqlite is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672993" version="1" comment="php7-sysvmsg is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672994" version="1" comment="php7-sysvsem is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672995" version="1" comment="php7-sysvshm is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672996" version="1" comment="php7-tidy is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672997" version="1" comment="php7-tokenizer is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672998" version="1" comment="php7-xmlreader is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672999" version="1" comment="php7-xmlrpc is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673000" version="1" comment="php7-xmlwriter is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673001" version="1" comment="php7-xsl is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673002" version="1" comment="php7-zip is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673003" version="1" comment="php7-zlib is &lt;7.4.6-3.35.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672913" version="1" comment="libopenssl-1_0_0-devel is &lt;1.0.2p-3.49.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672914" version="1" comment="libopenssl1_0_0 is &lt;1.0.2p-3.49.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672915" version="1" comment="openssl-1_0_0 is &lt;1.0.2p-3.49.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673296" version="1" comment="libminizip1 is &lt;1.2.11-3.26.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673301" version="1" comment="libopenssl-1_1-devel is &lt;1.1.1d-11.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673302" version="1" comment="libopenssl1_1 is &lt;1.1.1d-11.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673303" version="1" comment="libopenssl1_1-hmac is &lt;1.1.1d-11.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673297" version="1" comment="libz1 is &lt;1.2.11-3.26.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673304" version="1" comment="linux-glibc-devel is &lt;5.3-3.2.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673298" version="1" comment="minizip-devel is &lt;1.2.11-3.26.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673305" version="1" comment="openssl-1_1 is &lt;1.1.1d-11.43.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673299" version="1" comment="zlib-devel is &lt;1.2.11-3.26.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673300" version="1" comment="zlib-devel-static is &lt;1.2.11-3.26.10 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673306" version="1" comment="stunnel is &lt;5.62-3.14.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672645" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.322-3.64.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672646" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.322-3.64.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672647" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.322-3.64.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009672648" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.322-3.64.2 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673958" version="1" comment="bind is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673959" version="1" comment="bind-chrootenv is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673960" version="1" comment="bind-devel is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673961" version="1" comment="bind-utils is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673962" version="1" comment="libbind9-1600 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673963" version="1" comment="libdns1605 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673964" version="1" comment="libirs-devel is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673965" version="1" comment="libirs1601 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673966" version="1" comment="libisc1606 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673967" version="1" comment="libisccc1600 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673968" version="1" comment="libisccfg1600 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009673969" version="1" comment="libns1604 is &lt;9.16.6-150000.12.60.1 for ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009158426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678596" version="1" comment="apache2-mod_auth_mellon is &lt;0.17.0-150200.5.7.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680505" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680506" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680507" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.23.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680508" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.23.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680509" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680510" version="1" comment="java-11-openjdk is &lt;11.0.15.0-150000.3.80.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680511" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-150000.3.80.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680512" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-150000.3.80.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680513" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-150000.3.80.1 for ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509067" version="1" comment="MozillaThunderbird is &lt;68.9.0-3.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509068" version="1" comment="MozillaThunderbird-translations-common is &lt;68.9.0-3.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509069" version="1" comment="MozillaThunderbird-translations-other is &lt;68.9.0-3.85.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509071" version="1" comment="libEMF1 is &lt;1.0.7-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509072" version="1" comment="libvncclient0 is &lt;0.9.10-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509255" version="1" comment="libvncserver0 is &lt;0.9.10-4.19.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009508524" version="1" comment="libopencv3_3 is &lt;3.3.1-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009508525" version="1" comment="opencv is &lt;3.3.1-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009508526" version="1" comment="opencv-devel is &lt;3.3.1-6.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509073" version="1" comment="MozillaThunderbird is &lt;68.10.0-3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509074" version="1" comment="MozillaThunderbird-translations-common is &lt;68.10.0-3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509075" version="1" comment="MozillaThunderbird-translations-other is &lt;68.10.0-3.88.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509076" version="1" comment="libvncclient0 is &lt;0.9.10-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509256" version="1" comment="libvncserver0 is &lt;0.9.10-4.22.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509077" version="1" comment="openconnect is &lt;7.08-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509078" version="1" comment="openconnect-devel is &lt;7.08-6.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509079" version="1" comment="openconnect-lang is &lt;7.08-6.9.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509080" version="1" comment="libraw-devel is &lt;0.18.9-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509081" version="1" comment="libraw16 is &lt;0.18.9-3.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509257" version="1" comment="freerdp is &lt;2.1.2-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509258" version="1" comment="freerdp-devel is &lt;2.1.2-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509259" version="1" comment="libfreerdp2 is &lt;2.1.2-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509260" version="1" comment="libwinpr2 is &lt;2.1.2-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509261" version="1" comment="winpr2-devel is &lt;2.1.2-15.7.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509262" version="1" comment="kernel-default-extra is &lt;5.3.18-24.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509088" version="1" comment="MozillaThunderbird is &lt;68.11.0-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509089" version="1" comment="MozillaThunderbird-translations-common is &lt;68.11.0-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509090" version="1" comment="MozillaThunderbird-translations-other is &lt;68.11.0-3.91.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509263" version="1" comment="libreoffice is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509264" version="1" comment="libreoffice-base is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509265" version="1" comment="libreoffice-base-drivers-postgresql is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509266" version="1" comment="libreoffice-branding-upstream is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509267" version="1" comment="libreoffice-calc is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509268" version="1" comment="libreoffice-calc-extensions is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509269" version="1" comment="libreoffice-draw is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509270" version="1" comment="libreoffice-filters-optional is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509271" version="1" comment="libreoffice-gnome is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509272" version="1" comment="libreoffice-gtk3 is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509273" version="1" comment="libreoffice-icon-themes is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509274" version="1" comment="libreoffice-impress is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509275" version="1" comment="libreoffice-l10n-af is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509276" version="1" comment="libreoffice-l10n-ar is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509277" version="1" comment="libreoffice-l10n-as is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509278" version="1" comment="libreoffice-l10n-bg is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509279" version="1" comment="libreoffice-l10n-bn is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509280" version="1" comment="libreoffice-l10n-br is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509281" version="1" comment="libreoffice-l10n-ca is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509282" version="1" comment="libreoffice-l10n-cs is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509283" version="1" comment="libreoffice-l10n-cy is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509284" version="1" comment="libreoffice-l10n-da is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509285" version="1" comment="libreoffice-l10n-de is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509286" version="1" comment="libreoffice-l10n-dz is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509287" version="1" comment="libreoffice-l10n-el is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509288" version="1" comment="libreoffice-l10n-en is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509289" version="1" comment="libreoffice-l10n-eo is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509290" version="1" comment="libreoffice-l10n-es is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509291" version="1" comment="libreoffice-l10n-et is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509292" version="1" comment="libreoffice-l10n-eu is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509293" version="1" comment="libreoffice-l10n-fa is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509294" version="1" comment="libreoffice-l10n-fi is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509295" version="1" comment="libreoffice-l10n-fr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509296" version="1" comment="libreoffice-l10n-ga is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509297" version="1" comment="libreoffice-l10n-gl is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509298" version="1" comment="libreoffice-l10n-gu is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509299" version="1" comment="libreoffice-l10n-he is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509300" version="1" comment="libreoffice-l10n-hi is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509301" version="1" comment="libreoffice-l10n-hr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509302" version="1" comment="libreoffice-l10n-hu is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509303" version="1" comment="libreoffice-l10n-it is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509304" version="1" comment="libreoffice-l10n-ja is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509305" version="1" comment="libreoffice-l10n-kk is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509306" version="1" comment="libreoffice-l10n-kn is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509307" version="1" comment="libreoffice-l10n-ko is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509308" version="1" comment="libreoffice-l10n-lt is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509309" version="1" comment="libreoffice-l10n-lv is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509310" version="1" comment="libreoffice-l10n-mai is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509311" version="1" comment="libreoffice-l10n-ml is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509312" version="1" comment="libreoffice-l10n-mr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509313" version="1" comment="libreoffice-l10n-nb is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509314" version="1" comment="libreoffice-l10n-nl is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509315" version="1" comment="libreoffice-l10n-nn is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509316" version="1" comment="libreoffice-l10n-nr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509317" version="1" comment="libreoffice-l10n-nso is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509318" version="1" comment="libreoffice-l10n-or is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509319" version="1" comment="libreoffice-l10n-pa is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509320" version="1" comment="libreoffice-l10n-pl is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509321" version="1" comment="libreoffice-l10n-pt_BR is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509322" version="1" comment="libreoffice-l10n-pt_PT is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509323" version="1" comment="libreoffice-l10n-ro is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509324" version="1" comment="libreoffice-l10n-ru is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509325" version="1" comment="libreoffice-l10n-si is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509326" version="1" comment="libreoffice-l10n-sk is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509327" version="1" comment="libreoffice-l10n-sl is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509328" version="1" comment="libreoffice-l10n-sr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509329" version="1" comment="libreoffice-l10n-ss is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509330" version="1" comment="libreoffice-l10n-st is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509331" version="1" comment="libreoffice-l10n-sv is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509332" version="1" comment="libreoffice-l10n-ta is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509333" version="1" comment="libreoffice-l10n-te is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509334" version="1" comment="libreoffice-l10n-th is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509335" version="1" comment="libreoffice-l10n-tn is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509336" version="1" comment="libreoffice-l10n-tr is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509337" version="1" comment="libreoffice-l10n-ts is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509338" version="1" comment="libreoffice-l10n-uk is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509339" version="1" comment="libreoffice-l10n-ve is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509340" version="1" comment="libreoffice-l10n-xh is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509341" version="1" comment="libreoffice-l10n-zh_CN is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509342" version="1" comment="libreoffice-l10n-zh_TW is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509343" version="1" comment="libreoffice-l10n-zu is &lt;6.4.5.2-13.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509344" version="1" comment="libreoffice-mailmerge is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509345" version="1" comment="libreoffice-math is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509346" version="1" comment="libreoffice-officebean is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509347" version="1" comment="libreoffice-pyuno is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509348" version="1" comment="libreoffice-writer is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509349" version="1" comment="libreoffice-writer-extensions is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509350" version="1" comment="libreofficekit is &lt;6.4.5.2-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509351" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509352" version="1" comment="freerdp is &lt;2.1.2-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509353" version="1" comment="freerdp-devel is &lt;2.1.2-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509354" version="1" comment="libfreerdp2 is &lt;2.1.2-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509355" version="1" comment="libwinpr2 is &lt;2.1.2-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509356" version="1" comment="winpr2-devel is &lt;2.1.2-15.10.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509357" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509358" version="1" comment="kernel-default-extra is &lt;5.3.18-24.12.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509187" version="1" comment="MozillaThunderbird is &lt;68.12.0-3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509188" version="1" comment="MozillaThunderbird-translations-common is &lt;68.12.0-3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509189" version="1" comment="MozillaThunderbird-translations-other is &lt;68.12.0-3.94.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509359" version="1" comment="kernel-default-extra is &lt;5.3.18-24.15.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509360" version="1" comment="kernel-default-extra is &lt;5.3.18-24.24.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509197" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509198" version="1" comment="libproxy1-networkmanager is &lt;0.4.15-4.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509200" version="1" comment="transfig is &lt;3.2.6a-4.9.113 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509361" version="1" comment="kernel-default-extra is &lt;5.3.18-24.29.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509362" version="1" comment="bluez-cups is &lt;5.48-13.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509202" version="1" comment="MozillaThunderbird is &lt;78.4.0-3.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509203" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.0-3.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509204" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.0-3.99.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509363" version="1" comment="kernel-default-extra is &lt;5.3.18-24.34.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509364" version="1" comment="gnome-shell-calendar is &lt;3.34.5-3.13.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509365" version="1" comment="kernel-default-extra is &lt;5.3.18-24.37.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509207" version="1" comment="MozillaThunderbird is &lt;78.4.2-3.103.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509208" version="1" comment="MozillaThunderbird-translations-common is &lt;78.4.2-3.103.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509209" version="1" comment="MozillaThunderbird-translations-other is &lt;78.4.2-3.103.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509211" version="1" comment="libvncclient0 is &lt;0.9.10-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509366" version="1" comment="libvncserver0 is &lt;0.9.10-4.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509212" version="1" comment="MozillaThunderbird is &lt;78.5.0-3.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509213" version="1" comment="MozillaThunderbird-translations-common is &lt;78.5.0-3.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509214" version="1" comment="MozillaThunderbird-translations-other is &lt;78.5.0-3.107.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509367" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.16.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509368" version="1" comment="kernel-default-extra is &lt;5.3.18-24.43.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509369" version="1" comment="PackageKit-gstreamer-plugin is &lt;1.1.13-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509370" version="1" comment="PackageKit-gtk3-module is &lt;1.1.13-4.14.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509371" version="1" comment="MozillaThunderbird is &lt;78.6.0-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509372" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.0-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509373" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.0-8.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509374" version="1" comment="MozillaThunderbird is &lt;78.9.1-8.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509375" version="1" comment="MozillaThunderbird-translations-common is &lt;78.9.1-8.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509376" version="1" comment="MozillaThunderbird-translations-other is &lt;78.9.1-8.20.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509377" version="1" comment="kernel-default-extra is &lt;5.3.18-24.46.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509378" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.25.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509379" version="1" comment="MozillaThunderbird is &lt;78.6.1-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509380" version="1" comment="MozillaThunderbird-translations-common is &lt;78.6.1-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509381" version="1" comment="MozillaThunderbird-translations-other is &lt;78.6.1-8.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509382" version="1" comment="kernel-default-extra is &lt;5.3.18-24.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509383" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.61.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509384" version="1" comment="MozillaThunderbird is &lt;78.10.0-8.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509385" version="1" comment="MozillaThunderbird-translations-common is &lt;78.10.0-8.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509386" version="1" comment="MozillaThunderbird-translations-other is &lt;78.10.0-8.23.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509387" version="1" comment="kernel-default-extra is &lt;5.3.18-24.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509388" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.64.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509389" version="1" comment="gstreamer-plugins-ugly is &lt;1.16.3-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509390" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.16.3-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009116901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509391" version="1" comment="MozillaThunderbird is &lt;78.10.2-8.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509392" version="1" comment="MozillaThunderbird-translations-common is &lt;78.10.2-8.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509393" version="1" comment="MozillaThunderbird-translations-other is &lt;78.10.2-8.27.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009505343" version="1" comment="libwebp6 is &lt;0.5.0-3.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009118059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509394" version="1" comment="kernel-default-extra is &lt;5.3.18-24.67.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509395" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.67.4 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509396" version="1" comment="MozillaThunderbird is &lt;78.11.0-8.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509397" version="1" comment="MozillaThunderbird-translations-common is &lt;78.11.0-8.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509398" version="1" comment="MozillaThunderbird-translations-other is &lt;78.11.0-8.30.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509399" version="1" comment="typelib-1_0-GUPnP-1_0 is &lt;1.2.2-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615927" version="1" comment="libavcodec-devel is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615928" version="1" comment="libavformat-devel is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615929" version="1" comment="libavresample-devel is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615930" version="1" comment="libavresample3 is &lt;3.4.2-11.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624292" version="1" comment="kernel-default-extra is &lt;5.3.18-24.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624293" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.70.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626042" version="1" comment="kernel-default-extra is &lt;5.3.18-24.75.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009626043" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.75.3 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009615931" version="1" comment="transfig is &lt;3.2.8a-4.12.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009146021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625437" version="1" comment="MozillaThunderbird is &lt;78.12.0-8.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625438" version="1" comment="MozillaThunderbird-translations-common is &lt;78.12.0-8.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625439" version="1" comment="MozillaThunderbird-translations-other is &lt;78.12.0-8.33.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509400" version="1" comment="MozillaThunderbird is &lt;78.7.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509401" version="1" comment="MozillaThunderbird-translations-common is &lt;78.7.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509402" version="1" comment="MozillaThunderbird-translations-other is &lt;78.7.0-8.9.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627913" version="1" comment="kernel-default-extra is &lt;5.3.18-24.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009627914" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.78.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009147983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630858" version="1" comment="MozillaThunderbird is &lt;78.13.0-8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630859" version="1" comment="MozillaThunderbird-translations-common is &lt;78.13.0-8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630860" version="1" comment="MozillaThunderbird-translations-other is &lt;78.13.0-8.36.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631240" version="1" comment="libavcodec-devel is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631241" version="1" comment="libavformat-devel is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631242" version="1" comment="libavresample-devel is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631243" version="1" comment="libavresample3 is &lt;3.4.2-11.8.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632525" version="1" comment="libntfs-3g-devel is &lt;2021.8.22-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632526" version="1" comment="libntfs-3g87 is &lt;2021.8.22-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632527" version="1" comment="ntfs-3g is &lt;2021.8.22-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632528" version="1" comment="ntfsprogs is &lt;2021.8.22-3.8.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633363" version="1" comment="libavcodec-devel is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633364" version="1" comment="libavformat-devel is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633365" version="1" comment="libavresample-devel is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633366" version="1" comment="libavresample3 is &lt;3.4.2-11.11.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633361" version="1" comment="grilo-lang is &lt;0.3.12-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633362" version="1" comment="grilo-tools is &lt;0.3.12-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633367" version="1" comment="kernel-default-extra is &lt;5.3.18-24.83.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009633368" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.83.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634476" version="1" comment="libavcodec-devel is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634477" version="1" comment="libavformat-devel is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634478" version="1" comment="libavresample-devel is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009634479" version="1" comment="libavresample3 is &lt;3.4.2-11.14.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652154" version="1" comment="kernel-default-extra is &lt;5.3.18-24.86.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652155" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.86.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652797" version="1" comment="strongswan-nm is &lt;5.8.2-11.21.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652793" version="1" comment="libavcodec-devel is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652794" version="1" comment="libavformat-devel is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652795" version="1" comment="libavresample-devel is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009652796" version="1" comment="libavresample3 is &lt;3.4.2-11.17.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509403" version="1" comment="kernel-default-extra is &lt;5.3.18-24.49.2 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653526" version="1" comment="transfig is &lt;3.2.8b-4.15.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009154983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655939" version="1" comment="kernel-default-extra is &lt;5.3.18-24.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655940" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.93.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009658136" version="1" comment="libpoppler73 is &lt;0.62.0-4.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657531" version="1" comment="kernel-default-extra is &lt;5.3.18-24.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657532" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.96.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659865" version="1" comment="xorg-x11-server-wayland is &lt;1.20.3-22.5.39.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009155956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660132" version="1" comment="MozillaThunderbird is &lt;91.4.0-8.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660133" version="1" comment="MozillaThunderbird-translations-common is &lt;91.4.0-8.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009660134" version="1" comment="MozillaThunderbird-translations-other is &lt;91.4.0-8.45.2 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661876" version="1" comment="gegl-0_4 is &lt;0.4.16-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661861" version="1" comment="gegl-0_4-lang is &lt;0.4.16-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661877" version="1" comment="gegl-devel is &lt;0.4.16-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661878" version="1" comment="libgegl-0_4-0 is &lt;0.4.16-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661879" version="1" comment="typelib-1_0-Gegl-0_4 is &lt;0.4.16-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661873" version="1" comment="gegl-0_3 is &lt;0.3.34-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661874" version="1" comment="libgegl-0_3-0 is &lt;0.3.34-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009661875" version="1" comment="typelib-1_0-Gegl-0_3 is &lt;0.3.34-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509404" version="1" comment="MozillaThunderbird is &lt;78.8.0-8.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509405" version="1" comment="MozillaThunderbird-translations-common is &lt;78.8.0-8.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509406" version="1" comment="MozillaThunderbird-translations-other is &lt;78.8.0-8.15.4 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509407" version="1" comment="kernel-default-extra is &lt;5.3.18-24.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509408" version="1" comment="kernel-preempt-extra is &lt;5.3.18-24.52.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509409" version="1" comment="evolution-data-server is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509410" version="1" comment="evolution-data-server-devel is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509411" version="1" comment="evolution-data-server-lang is &lt;3.34.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509412" version="1" comment="evolution-ews is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509413" version="1" comment="evolution-ews-lang is &lt;3.34.4-3.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509414" version="1" comment="libcamel-1_2-62 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509415" version="1" comment="libebackend-1_2-10 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509416" version="1" comment="libebook-1_2-20 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509417" version="1" comment="libebook-contacts-1_2-3 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509418" version="1" comment="libecal-2_0-1 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509419" version="1" comment="libedata-book-1_2-26 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509420" version="1" comment="libedata-cal-2_0-1 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509421" version="1" comment="libedataserver-1_2-24 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509422" version="1" comment="libedataserverui-1_2-2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509423" version="1" comment="typelib-1_0-Camel-1_2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509424" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509425" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509426" version="1" comment="typelib-1_0-ECal-2_0 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509427" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009509428" version="1" comment="typelib-1_0-EDataServerUI-1_2 is &lt;3.34.4-3.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009119927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601238" version="1" comment="caasp-release is &lt;4.5.2-1.8.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601239" version="1" comment="cri-o-1.18 is &lt;1.18.4-4.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601240" version="1" comment="cri-o-1.18-kubeadm-criconfig is &lt;1.18.4-4.3.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601241" version="1" comment="etcdctl is &lt;3.4.13-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601242" version="1" comment="helm2 is &lt;2.16.12-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601243" version="1" comment="helm3 is &lt;3.3.3-3.8.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601244" version="1" comment="kubernetes-1.18-kubeadm is &lt;1.18.10-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601245" version="1" comment="kubernetes-1.18-kubelet is &lt;1.18.10-4.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601246" version="1" comment="patterns-caasp-Management is &lt;4.5-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601247" version="1" comment="skuba is &lt;2.1.11-3.10.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601248" version="1" comment="skuba-update is &lt;2.1.11-3.10.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601249" version="1" comment="velero is &lt;1.4.2-3.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009302818" version="1" comment="caasp-release is ==4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009074991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632895" version="1" comment="caasp-release is &lt;4.5.5-1.19.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632896" version="1" comment="kubernetes-1.18-kubeadm is &lt;1.18.20-4.11.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632897" version="1" comment="kubernetes-1.18-kubelet is &lt;1.18.20-4.11.3 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632898" version="1" comment="release-notes-caasp is &lt;4.5.20210907-3.22.3 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632899" version="1" comment="skuba is &lt;2.1.15-3.15.13.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009632900" version="1" comment="skuba-update is &lt;2.1.15-3.15.13.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009149081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601250" version="1" comment="caasp-release is &lt;4.5.3-1.13.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601251" version="1" comment="skuba is &lt;2.1.13-3.15.7.2 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009601252" version="1" comment="skuba-update is &lt;2.1.13-3.15.7.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009143058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662468" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662469" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr7.0-3.53.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009156408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009678601" version="1" comment="apache2-mod_auth_mellon is &lt;0.17.0-150200.5.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009159788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680539" version="1" comment="libruby2_5-2_5 is &lt;2.5.9-150000.4.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680540" version="1" comment="ruby2.5 is &lt;2.5.9-150000.4.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680541" version="1" comment="ruby2.5-devel is &lt;2.5.9-150000.4.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680542" version="1" comment="ruby2.5-devel-extra is &lt;2.5.9-150000.4.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680543" version="1" comment="ruby2.5-stdlib is &lt;2.5.9-150000.4.23.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680544" version="1" comment="java-11-openjdk is &lt;11.0.15.0-150000.3.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680545" version="1" comment="java-11-openjdk-demo is &lt;11.0.15.0-150000.3.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680546" version="1" comment="java-11-openjdk-devel is &lt;11.0.15.0-150000.3.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009680547" version="1" comment="java-11-openjdk-headless is &lt;11.0.15.0-150000.3.80.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009160250"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-KHR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-gallium-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libEGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGL1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv1_CM1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libGLESv3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libVulkan-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libd3d-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libglapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-libva</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOSMesa8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgbm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r300</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_r600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_radeonsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvulkan_radeon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxatracker2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE_HPC-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-basesystem-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ses-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-Manager-Proxy-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-manager-server-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-Manager-Server-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-abstractions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-parser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-profiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apparmor-utils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_apparmor-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apr-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudit1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libauparse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>axis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns169</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc166</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblwres160</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbluetooth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfsmaintenance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bubblewrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>c-ares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcephfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librados2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libradospp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librbd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librgw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-argparse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ceph-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cephfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rados</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rgw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rados-objclass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rbd-nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-empty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony-pool-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclammspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-connectivity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-dbi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-mcelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-memcachec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-notify-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-openldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-pcie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-pinba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-procevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-smart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-synproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-sysevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-uptime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-write_stackdriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugin-write_syslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-plugins-all</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>collectd-web-js</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollectdclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcollectdclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrackd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-mt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupscgi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsmime1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsppdc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-ima</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecryptfs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-plugins-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewalld-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-plugins-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphviz6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldns2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5KmsSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXdmcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbsd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaca0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcontainers-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-0_6-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcroco-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_1-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-vnc-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvnc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-ppolicy-check-password</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_3-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblz4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbprivate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmarkdown2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpg123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-iterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo-screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2_asio1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oath-toolkit-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_1-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-32-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre2-posix2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler89</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprocps7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_6m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqpdf26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qpdf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librrd8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_5-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libseccomp2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsha1detectcoll1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsolv-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-coredump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libu2f-host0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwavpack1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdemux2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwscodecs1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinput0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxkbcommon0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykcs11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libykpiv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubico-piv-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzstd1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzzip-0-13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zziplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minicom-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_u2f</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_yubico</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions-zypp-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-newrole</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-CherryPy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-SQLAlchemy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Werkzeug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-paramiko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-python3-saml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>targetcli-fb-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rzsz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sharutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spectre-meltdown-checker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2.0-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-rpiarm64-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u-boot-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-buildtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-multipath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yubikey-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-needs-restarting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-containers-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-libnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-cni-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slirp4netns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-desktop-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-backend-zypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-PackageKitGlib-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conky-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-plugin-conky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firewall-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flatpak-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libflatpak0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-user-flatpak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Flatpak-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwupd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Fwupd-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GCab-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-desktop-3_0-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeDesktop-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnautilus-extension1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Nautilus-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-dict-emoji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibus-1_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-IBus-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libICE6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImfUtil-2_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-platformtheme-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSoundTouch0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>soundtouch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil55</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc54</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio++0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdio16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiso9660-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdjvulibre21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexempi3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgxps2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GXPS-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkpathsea6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libptexenc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsynctex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexlua52-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtexluajit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebong-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua2dox-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstools-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptexenc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texluajit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblouis19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-louis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmad0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenmpt_modplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmp3lame-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnma0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nma-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMA-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libout123-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpg123-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist++3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libplist3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvpx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpdecoder3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebpmux3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-cpp0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yaml-cpp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-File-Path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-MIME-Charset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-vdagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-12many</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-2up</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Asana-Math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ESIEEcv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-FAQ-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-GS1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-HA-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-IEEEtran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-MemoirChapStyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-SIunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Tabbing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-Type1fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a0poster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a2ping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a4wide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-a5comb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abntex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-abstyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-academicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accanthis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-accfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-achemso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acmconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acronym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-acroterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-active-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialangle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-actuarialsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-addlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adforn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adfsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adhocfilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjmulticol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adjustbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adobemapping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adrconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-adtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-advdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aecc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aeguill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afm2pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afparticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-afthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aguplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aiaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aichej</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ajl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-akletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alegreya-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aleph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alertmessage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithm2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithmicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-algorithms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alkalami-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-allrunes-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-almfixed-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alnumsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-alterqcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-altfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ametsoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amiri-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsaddr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amslatex-primer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsldoc-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsmath-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsrefs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-amsthdoc-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-animate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anonymouspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-answers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antiqua-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antomega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-antt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anufinalexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anyfontsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-anysize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aobs-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aomart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apa6e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apacite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apalike2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-appendixnumberbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apprends-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-apxproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabi-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arabxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aramaic-serto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaeologie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-archaic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arev-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arimo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-armtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-around-the-bend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arphic-ttf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arrayjobx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arraysort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arsclassica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-articleingud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arydshln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asaetr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asapsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascelike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-chart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ascii-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asciilist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-askmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aspectratio-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-assoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-astro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-by-example-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-faq-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asymptote-manual-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-asypictureb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-attachfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aucklandthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-augie-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auncial-new-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurical-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-aurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authoraftertitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-authorindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-auto-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoaligne</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autoarea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autobreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-automata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autonum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-autosp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avantgar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-avremu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-awesomebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-axodraw2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-b1encoding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-albanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-azerbaijani</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bosnian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-macedonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-malay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-serbianc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-sorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babel-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-babelbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-background</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-backnaur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baekmuk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bagpipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorcsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangorexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bangtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bankstatement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bardiag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-barr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bartel-chess-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bashful</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basicarith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervald-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervaldx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-baskervillef-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-basque-date</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bbold-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bclogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-FUBerlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer-verona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamer2thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beameraudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamercolorthemeowl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerdarkthemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamersubframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-cuerna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-detlevcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-epyt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-metropolis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-phnompenh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamertheme-upenn-bc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemejltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beamerthemenirma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beebe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begingreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-begriff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-belleek-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bengali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bera-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-berenisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-besjournals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bestpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-betababel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-beuron-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bewerbung</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bez123</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bezos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bgteubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bguq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bhcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibarts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibexport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-abnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-anonymous</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-apa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-archaeology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-arthistory-bonn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bookinother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-bwl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-caspervector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-claves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-dw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-fiwi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gb7714-2015</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-historian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ieee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-iso690</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-juradiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-luh-ipw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-manuscripts-philology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-mla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-morenames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-multiple-dm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-nottsclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-opcit-booktitle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-oxref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-philosophy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-phys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-publist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-realauthor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-sbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-science</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-shortfields</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-source-division</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-subseries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-swiss-legal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-trad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblatex-true-citepages-omit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-lds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-mouth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibleref-parse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibletext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biblist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtex8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexperllibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtexu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibtopicprefix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bibunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidi-atbegshi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidicontour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidihl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipagegrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidipresentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bidishadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bigints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binarytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-binomexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biochemistry-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biocon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-biolett-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bitpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bizcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blacklettert1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blindtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blkarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blochsphere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-block</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blockdraw_mp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bloques</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-blox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bnumexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bodegraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bohr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boisik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bold-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boldtensors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bondgraphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookhands-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booklet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bookman-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-booktabs-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boolexpr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boondox-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bophook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-borceux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bosisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxedminipage2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-boxhandler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bpolynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-br-lex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bracketkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braids</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braille</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-braket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brandeis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breakurl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bredzenie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-breqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bropd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-brushscr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bullcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bundledoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-burmese-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bussproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxcjkjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdpx-beamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxdvidriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxeepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxenclose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjalipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjaprnind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxjscls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxnewfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxorigcapt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpapersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bxpdfver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bytefield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c-pascal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cabin-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cachepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caladea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calcage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calctab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calculator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calligra-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-callouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calrsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cals</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-calxxxx-yyyy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cancel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-canoniclayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cantarell-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-capt-of</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captcont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-captdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-caption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carbohydrates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlisle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-carolmin-ps-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cascadilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-casyl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catchfilebetweentags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catcodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catechis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-catoptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbcoptic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cbfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cc-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ccicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cclicenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cd-cover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cdpbundl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cellspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-celtic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-censor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cfr-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-changes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chappg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chapterfolder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-charter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chbibref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checkcites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-checklistings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chem-journal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemarrow-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chembst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcompounds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemcono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemexec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemmacros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemschemex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chemstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chess-problem-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chessfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chextras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chicago-annote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chickenize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-childdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chivo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chkfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chngcntr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chronosys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-chscite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cinzel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-circuitikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-citeall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cje</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjhebrew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-gs-integrate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkpunct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjkutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classicthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-classpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleanthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clearsans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clefval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cleveref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clipboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cloze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-clrscode3e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-lgc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-super-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cm-unicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmcyr-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmdtrack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmexb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmll-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmpj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cmtiup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnbwp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cnltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntformats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cochineal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codedoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codesection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-codicefiscaleitaliano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collcell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collectbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colordoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coloring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorsep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colortbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorwav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colorweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-colourchange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combelow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combinedgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-combofont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comfortaa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comicneue-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-commath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-compactbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-components-of-TeX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-comprehensive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-computational-complexity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concepts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-concrete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-confproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-constants</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conteq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-algorithmic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-animation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-annotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-bnf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-chromato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmscbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cmttbf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-construction-plan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-cyrillicnumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-degrade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fancybreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-filter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-fullpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-inifile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-letter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-mathsets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-rst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simplefonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-simpleslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-title</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-transliterator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typearea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-typescripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context-visualcounter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-continue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contour</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-contracard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-conv-xkv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-convbkmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooking-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cookingsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coollist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolstr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coolthms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cooltooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coordsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyedit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-copyrightbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cormorantgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-correctmathalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coseoul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-countriesofeurope-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-counttexruns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courier-scaled</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-courseoutline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coursepaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-coverpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-covington</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cprotect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cquthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crimson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossreference</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossrefware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crossword</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-crosswrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryptocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cryst-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csbulletin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csquotes-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-css-colors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cstypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-csvsimple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctablestack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctan_chk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanify</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctanupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ctie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cuisine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-currvita</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cursolatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curve2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-curves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-custom-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cutwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cv4tw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cweb-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cybercic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyklop-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrillic-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cyrplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dad-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dancers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dantelogo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dashundergaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dataref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datatool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dateiliste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bahasai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-breton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-en-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-hebrew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-it-fulltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-lsorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-norsk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-samin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-scottish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-usorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-datetime2-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dblfloatfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dccpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dcpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-de-macro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-decorule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dehyph-exptl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dejavu-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimseasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-delimtxt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-denisbdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-detex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dhua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diadia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagmac2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diagnose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dialogl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dichokey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dickimaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dictsym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-diffcoeff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-digiconfigs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-din1505</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dinbrief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dingbat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-directory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dirtytalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-disser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dk-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dlfltxb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnaseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docbytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doclicense</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmfp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docmute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-docsurvey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-documentation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doipubmed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dosepsbin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dot2texi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotarrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dotseqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doublestroke-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dowith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-download</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dozenal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dpfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dprogress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-draftwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dramatist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dratex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawmatrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drawstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droid-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-droit-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-drv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dsptricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxdescribe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dtxtut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duerer-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-duotenzor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dutchcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvdcoll</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvgloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvicopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvidvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviinfox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dviljk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvipsconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvisvgm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynamicnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dynblocks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dyntree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-e-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ean13isbn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easy-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-easyreview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebgaramond-maths</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebong</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ebsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecclesiastic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecgdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecltree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecobiblatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-econometrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-economic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edfnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-edmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ednotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eemeir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-efbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egameps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-egplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eiad-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eijkhout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfuehrung</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-einfuehrung2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ejpecp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ekaia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elbioimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-electrum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elements</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elocalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elpres</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elsarticle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elteikthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elvish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-elzcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emarks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embedall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-embrac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emisa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emptypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-emulateapj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-encxvlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endheads</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-endnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engpron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engrec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-engtlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enigma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-enumitem-zref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envbig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-environ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-envlab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigrafica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epigraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epiolmec-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsdice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsf-dvipdfmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epsincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epslatex-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epspdfconversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-epstopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eqparbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-erewhon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-errata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-es-tex-faq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esami</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esint-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eskdx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eso-pic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esrelation-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esstix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-estcpmm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-esvect-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etaremune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etdipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etex-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ethiop-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-etoolbox-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eukdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulerpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eulervm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euro-ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europasscv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-europecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-eurosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-euxm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everyhook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-everypage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exam-n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-example</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-examplep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exceltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-excludeonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercise</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exercises</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exp-testopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expdlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-export</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-expressg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exsol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extarrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-exteps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extpfeil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extsizes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facsimile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-factura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-facture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-faktor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyhdr-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancylabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancynum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancypar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytabs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancytooltips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fancyvrb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fandol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fast-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcavtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcltxdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fcolumn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-featpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fenixpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fetamont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feupphdteses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feyn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-feynmp-auto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ffslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fge-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fgruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fibeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifinddo-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fifo-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fig4latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbas-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009043999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figflow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-figsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filecontentsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filedate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filehook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filemod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-findhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-finstrut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fira-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-first-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fitbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fithesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fix2col</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixcmex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixfoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixlatvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixltxhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixmetodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fixpdfmag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fjodor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flacards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flagderiv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flashmovie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flipbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flippdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-float</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-floatrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-flowfram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fltpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fmtcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fn2end</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnbreak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncychap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fncylab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnpct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnspe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fntproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fnumprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foekfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foilhtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonetika-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-font-change-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontawesome-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontaxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontinst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontmfizz-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-churchslavonic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonts-tlwg-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fonttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fontwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footmisx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotebackref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnotehyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnoterange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-footnpag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-foreign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forest-quickstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-forloop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formation-latex-ul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formlett</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-formular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouridx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fourier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fouriernc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fpl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragmaster</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fragments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-framed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-francais-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frankenstein</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frcursive-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frederika2016-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-frontespizio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftcap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ftnxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullblck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullminipage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fullwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-functan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-calligra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fundus-sueterlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fvextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-fwlw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-g-brief</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gaceta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-galois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gamebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garrigues</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-garuda-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gastex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gatech-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gauss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gb4e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gene-logic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genealogytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-genmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentium-tug-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gentle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geometry-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-germkorr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-geschichtsfrkl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getfiledate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-getoptk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfnotation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsartemisia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsbodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfscomplutum-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsdidot-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsneohellenic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfsporson-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gfssolomos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ghsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gillius-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gincltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ginpenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitfile-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitinfo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gitlog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gloss-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-magyar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-portuges</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glossaries-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-glyphlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmdoc-enhance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmiflink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gmverse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnu-freefont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gnuplottex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gobble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gofonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gothic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gotoh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradientframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gradstudentresume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grafcet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-cfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-def</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphics-pln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicx-psmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphicxbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grayhints</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-fontenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greek-inputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greekdates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greektonoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-greenpoint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gregoriotex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grfpaste</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grid-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gridset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grotesq-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-grundgesetze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsemthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gsftopk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrcrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gtrlib-largetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guide-to-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitarchordschemes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-guitlogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gustprog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-gzt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-h2020proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hacm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-halloweenmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-handout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hands</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hanoi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-happy4th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-har2nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hardwrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harmony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harnon-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harpoon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harveyballs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-harvmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hatching</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hausarbeit-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-havannah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-he-she</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-helvetic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepnames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepparticles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hepunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-here</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-heuristica-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hexgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hf-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfbright-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hfoldsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hhtensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-histogr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-historische-zeitschrift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hitec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hobete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hook-pre-commit-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-horoscop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hpsdiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrefhide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hrlatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hustthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hvindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypdvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hypernat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperref-docsrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyperxmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyph-utf8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-afrikaans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ancientgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-arabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-armenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-basque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-belarusian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-churchslavonic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-coptic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-croatian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-esperanto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ethiopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-farsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-friulan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-galician</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-georgian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-hungarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-icelandic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-indonesian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-interlingua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-irish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-kurmanji</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-latvian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-mongolian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-norwegian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-occitan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-piedmontese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-romansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-serbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-ukrainian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-uppersorbian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphen-welsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyphenex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-hyplain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibycus-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ibygrk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-icsv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxcmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-idxlayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ieeepes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ietfbibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iffont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifluatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifmtarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifnextok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifoddpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifplatform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifthenx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ifxetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijmart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijqc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ijsra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-image-gallery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imakeidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imfellenglish-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impatient-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-impnattypo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imsproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-imtekda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-incgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inconsolata-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-index</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-indextools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-initials-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inlinedef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inputtrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-insbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interactiveworkbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interchar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interfaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interpreter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-interval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-intro-scientific</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-inversepath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-invoice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ionumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iopart-num</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ipaex-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iscram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iso10303</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isodoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isomath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isonums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isorot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-isotope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-issuulinks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-itnumpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwhdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-iwona-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jablantile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jacow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jamtimes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-japanese-otf-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jknapltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jlreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jmn-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jneurosci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jpsj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-js-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jsclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jslectureplanner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jumplines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-junicode-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jura</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juraabbrev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurabib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-juramisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jurarsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jvlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kantlipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaugh-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-karnaughmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kastrup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kdgdocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerkis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kerntest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keystroke</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyval2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-keyvaltable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kixfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kluwer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knitting-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knittingpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knowledge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuth-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-knuthotherfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-moderncvclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-koma-script-sfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-komacv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-oblivoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kotex-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpathsea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kpfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksfh_nat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ksp-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ktv-texdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-kurier-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2picfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l2tabu-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3kernel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-l3packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-labyrinth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lacheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ladder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lambda-lists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-langsci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lapdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lastpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bib-ex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bib2-ex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-brochure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-course</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc-ptr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-git-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-graphics-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-make</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-notes-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-papersize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-referenz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tabellen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-tds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-veryshortguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-web-companion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2e-help-texinfo-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex2nemeth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex4wp-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbangla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexbug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-esmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcheat-ptbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexcourse-rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdemo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileinfo-pkgs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexfileversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexindent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lato-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layaureo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-layouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lazylist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcdftypetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lcyw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leading</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leadsheets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leaflet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lecturer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leftidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-leipzig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lengthconvert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lettrine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-levy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lewis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexikon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhcyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertine-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinegc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinus-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libertinust1math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebaskerville-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librebodoni-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-librecaslon-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-libris-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lilyglyphs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-limap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linearA-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linegoal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lineno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ling-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linguex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-linop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lion-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lisp-on-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listings-ext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listlbls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listliketab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofitems</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-listofsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-liturg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lkproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lm-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lmake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lobster2-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-locality</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-localloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logical-markup-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logicpuzzle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logpap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-logreq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lollipop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longdivision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-longnamefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-loops</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lplfitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lroundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-bulgarian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-chinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-english</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-estonian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-finnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-japanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-korean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-mongol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-persian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-slovenian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-turkish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-ukr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lshort-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lstbayes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lt3graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltabptch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltb2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxdockit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltximg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxmisc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxnew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ltxtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-alt-getopt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-check-hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua-visual-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lua2dox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabibentry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luabidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luacode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luahyphenrules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luainputenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaintro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-doc-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualatex-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lualibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamesh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luamplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaotfload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luapackageloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luasseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatex85</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luatodonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-luaxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lwarp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-lxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ly1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-m-tx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macros2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-macroswap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mafr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-magaz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-make4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebarcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makecmds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makedtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-makeshape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mandi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manfnt-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-manuscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-margbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marginnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-markdown</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-marvosym-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matc3mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-match_parens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-math-e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-math-into-latex-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathabx-type1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathalfa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathastext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdesign-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathdots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpartir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpazo-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathpunctspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maths-symbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathspic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mathtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-matlab-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mattens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-maybemath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mbenotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcaption</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mceinleger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcexam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcf2graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mciteplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mcmthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdframed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdputu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mdwtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-media9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-medstarbeamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-meetingmins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memdesign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memexsupp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memoir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-memory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mendex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mentis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-menukeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-merriweather-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metafont-beginners</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metago</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metalogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaobj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metaplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metatype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metauml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-method</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metrix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mf2pt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfirstuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflogo-font-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mflua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfpic4ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mftinc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mfware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mgltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhchem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mhequ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miama-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-microtype-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midnight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-midpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-milog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minibox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minifp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minipage-marginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-miniplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minitoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minorrevision</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mintspirit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-minutes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-missaali-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkgrkindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkjobtexmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mkpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mla-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mnsymbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderncv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moderntimeline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modroman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-modular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mongolian-babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-monofill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-montserrat-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moodle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morehype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moresize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-moreverb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-morewrites</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-movie15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mp3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparhack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mparrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpattern</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpcolornames</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpman-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mpostinl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptopdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mptrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mslapa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-msu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mtgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mucproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mugsthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multenum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiaudience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multibibliography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multicap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multido</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multienv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiexpand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multiobjective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-multirow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009044999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-munich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixguit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtex-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musixtnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musuos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-muthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mwe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mweights</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mxedruli-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mychemistry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mycv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mylatexformat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-mynsfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nameauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-namespc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nanumtype1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-natded</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navigator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-navydocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncclatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncctools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ncntrsbk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nddiss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ndsu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-needspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nestquot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-neuralnetwork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nevelok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newenviron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newlfm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newpx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newsletr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newspaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtx-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxsf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newtxtt-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newunicodechar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newvbtm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-newverbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nextpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nfssext-cfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicefilelist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-niceframe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nicetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nih</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nihbiosketch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nimbus15-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nkarta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nlctdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nmbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noconflict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nodetree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noindentafter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noitcrul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nolbreaks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomencl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nomentbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nonumonpart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nopageno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-norasi-c90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-normalcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nostarch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notes2bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notespages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notex-bst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-noto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-notoccite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-novel-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nowidow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nrc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntgclass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ntheorem-vn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nuc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nucleardata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numberedblock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numericplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-numspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-nwejm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oberdiek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-objectz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-obnov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocg-p</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocgx2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocherokee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-b-outline-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ocr-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-octavo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-odsfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ogham</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oinuit-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-old-arrows-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldlatin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstandard-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oldstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-olsak-misc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omegaware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onlyamsmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-onrannual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opcit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opensans-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oplotsymbl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-opteng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optidef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-options</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ordinalpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-orkhun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oscola</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ot-tableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othello</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-othelloboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-otibet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-oubraces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outliner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-outlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlays</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overlock-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-overpic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pacioli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-padauk-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagecont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagenote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pagerange</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pageslts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-palatino-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papercdcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papermas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-papertex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paracol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parades</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paralist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paratype-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-paresse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parrun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parselines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-parskip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cours</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-crosswords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pas-tableur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-passivetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patchcmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-patgen2-tutorial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-path</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pauldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pawpict</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pb-diagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbibtex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pbsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf-trans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdf14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfbook2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcprot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfcrop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfjam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdflatexpicscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfmarginpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpagediff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfscreen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdftricks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pdfxup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pecha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pedigree-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perception</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perfectcut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-perltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-permute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-persian-bib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petiteannonce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-petri-nets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pfarrei</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgf-umlsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfgantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfkeyx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfmolbio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfornament</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pgfplots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phaistos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phffullpagefigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfparen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfqit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfquotetext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfsvnwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phfthm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philokalia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-philosophersimprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonenumbers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonetic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-phonrule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-photo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-physics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-picinpar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pict2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pictexsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piechartmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-piff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pigpen-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pinlabel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pitex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pittetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkfix-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkgloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pkuthss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pl-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-placeins-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plain-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plainpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plantslabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platex-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-platexcheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-play</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-playfair-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plipsum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plstmary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-plweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmgraph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pmxchords</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pnas2009</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poemscol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poetrytex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poltawski-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polyglossia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polynomial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-polytable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-postcards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-poster-mac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-powerdot-FUBerlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppr-prv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pracjourn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prerex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-present</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-presentations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-presentations-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pressrelease</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prettyref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-preview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prftree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-printlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-probsoln</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-procIAGssymp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prodint-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-productbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-program</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-progressbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proofread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prooftrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-properties</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-proposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-prosper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-protocol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-przechlewski-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ps2pk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psbao</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pseudocode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfrag-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psfragx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psgo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psizzl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pslatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psnfss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pspicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-2dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-abspos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-arrow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-asr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-barcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bezier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-blur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-bspline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-circ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-coil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-cox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-dbicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-diffraction</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-electricfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-eucl-translation-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-exa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fractal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-fun</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-func</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gantt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-geo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ghsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-gr3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-grad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-graphicx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-infixplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-intersect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-jtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-knot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-labo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-layout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-lens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-light3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-magneticfield</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-mirror</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ob3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-optic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-osci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-ovl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pdgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-perspective</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-platon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-plot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-poly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-pulley</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-rubans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-sigsys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-slpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solarsystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-solides3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-soroban</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spectra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-spirograph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-stru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-text</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-thick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-tvz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vectorian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vehicle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vowel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst-vue3d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pst2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks-add</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstricks_calcnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-psu-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fontmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex-fonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptex2pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ptptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punk-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-punknova-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-purifyeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxchfon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxcjkcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxjahyper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxpgfmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxrubrica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtatescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pxtxalfa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pygmentex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythonhighlight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-pythontex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcircuit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qobitree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qpxqtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qrcode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qstest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quattrocento-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quicktype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quoting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quotmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-quran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-r_und_s</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-raleway-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ran_toks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randbild</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randomwalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-randtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rccol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcs-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rcsinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-readarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realboxes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-realscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rec-thy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recipecard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rectopma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-recycle-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refcheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refenums</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reflectgraphics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-refstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regexpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-register</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-regstats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reledmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-relsize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reotex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repeatindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repere</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-repltext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resphilosophica</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumecls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-resumemac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-reverxii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revquantum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-revtex4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ribbonproofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rjlparshap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rlepsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmathbr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rmpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roboto-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-robustindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanbarpagenumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romande-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romanneg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-romannum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rosario-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rotpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-roundrect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rputover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rrgtrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfs-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rsfso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtkinenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rtklage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rubik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ruhyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rulercompass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-russ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rutitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rviewport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-rvwrite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ryethesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sa-tikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sageep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanitize-umlaut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sanskrit-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathaccent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sansmathfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sapthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sasnrdisplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauerj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sauterfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savefnmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savesym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-savetrees</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalebar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scalerel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scanpages-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemabloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schemata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schule</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schulschriften</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-schwalbe-chess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sciposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sclang-prettifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scratch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-screenplay-pkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrjrnl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scrlttr2copy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scsnowman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sdrt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-secdot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-section</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectionbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sectsty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seealso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seetexk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selectp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-selnolig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semantic-markup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semaphor-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seminar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semioneside</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-semproc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepfootnotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sepnum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seqsplit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-apostrophe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-date-lat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-def-cyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-serbian-lig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesamanuel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sesstime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setdeck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-setspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-seuthesix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sf298</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sffms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sfmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sgame</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadethm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shadowtext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapepar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shapes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shipunov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shorttoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-show2e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showcharinbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showdim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showexpl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showlabels</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-showtags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-shuffle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidecap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sidenotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-signchart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-silence</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-resume-cv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simple-thesis-dissertation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplecv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simpler-wick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplewick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simplified-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-simurgh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sitem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-siunitx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skaknew-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeycommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skrapport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-skull</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slantsc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-slideshow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smalltableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartdiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-smartunits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-snotez</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-songs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sort-by-letters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soton</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soul</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-soup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcecodepro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourcesanspro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sourceserifpro-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spalign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spanish-mx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sparklines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spath3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spelling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sphdthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitbib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-splitindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spreadtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-spverbatim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sr-vorl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srbook-mem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-srcredact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sseq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sslides</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-standalone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stanli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-starfont-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-startex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statex2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-statistik</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-staves-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdclsdv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stdpage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-steinmetz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stellenbosch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stix-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stmaryrd-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-storecmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stringstrings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-struktex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sttools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-stubs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-studenthandouts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sty2dtx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suanpan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subdepth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subeqnarray</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigmat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfigure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substances</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substitutefont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-substr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-subsupscripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudoku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sudokubundle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-suftesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sugconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-superiors-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-supertabular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-susy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svg-inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svgcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-multi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svn-prov</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svninfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-svrsymbols-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-swimgraf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syllogism</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-symbol-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-sympytexpackage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synctex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synproof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-syntrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-synttree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-systeme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t-angles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-t2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabfigures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-table-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableaux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablefootnote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tableof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablestyles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablists</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tablor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabriz-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabstackengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabto-ltx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabularew</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulars-e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabulary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tabvar-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tagpair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-talk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamefloats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tamethebeast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tapir-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tasks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tcolorbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tdsfrmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-technics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-fenn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templates-sommer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-templatetools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tempora-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tengwarscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tensor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termlist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-termmenu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testhyphens</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-testidx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-teubner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ewd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-font-errors-cheatsheet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-gyre-math-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ini-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-label</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-overview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-refs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex-virtual-academy-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ebook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texbytopic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdirflatten</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texdraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texfot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikechaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texilikecover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-cz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive-zh-cn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlive.infra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texliveonfly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texloganalyser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texlogos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texmate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texosquery</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texpower</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texproposal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texshade</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textcase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textfit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textglos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textmerg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textopo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-textpos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-texware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tfrupee-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thaienum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thalie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-theoremref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-ekf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thesis-titlepage-fhac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thinsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thmtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threadcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeddice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-threeparttablex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumbs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thumby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-thuthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticket</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ticollege</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-3dplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-bayesnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-cd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dependency</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-dimline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009045999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-feynman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-inet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-kalender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-opm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-optics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-page</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-palattice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-qtree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikz-timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzinclude</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzmark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzorbital</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpagenodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpeople</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzpfeile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tikzsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-times-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-timing-diagrams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tinos-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipa-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tipfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlecaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlefoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlepic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titleref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titlesec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-titling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-berge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-euclide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-fct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-graph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-kiviat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-linknodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-orm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tkz-tab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tlc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocbibind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocdata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocloft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tocvsec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-todonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toolbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-topfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-toptesi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-totpages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpic2pdftex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tpslifonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tqft</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tracklang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trajan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-array-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-arsclassica-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-biblatex-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-chemsym-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-dcolumn-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-ecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-enumitem-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-europecv-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-filecontents-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-moreverb-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-natbib-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translation-tabbing-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tree-dvips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-treetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trfsigns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trigonometry</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trimspaces</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trivfloat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-trsym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-truncate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tsemlines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ttfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tucv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tudscr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tufte-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tugboat-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turabian-formatting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turkmen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnstile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-turnthepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoinone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-twoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfonts-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txfontsb-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txgreeks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-txuprcal-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-type1cm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typed-checklist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typehtml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typeoutfileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typicons-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typoaid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-typogrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uaclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uafthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uantwerpendocs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uassign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucbthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucdavisthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucharclasses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-udesoftec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uebungsblatt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uestcthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhc-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhhassignment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uhrzeit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucredborder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uiucthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ukrhyph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulqda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ulthese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umbclegislation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umich-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umlaute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umoline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-umtypewriter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamth-template</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unamthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undergradmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underlin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underoverlap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-underscore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-undolabl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-core-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unfonts-extra-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-ger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uni-wtal-lin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-bidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unicode-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unisugar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-units</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unitsdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-universalis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unravel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-unswcover</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uothesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uowthesistitlepage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-updmap-map</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uplatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upmethodology</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uppunctlm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-upquote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uptex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urcls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-url</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urlbst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-urwchancal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-usebib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ushort</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uspatent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ut-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utf8mex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-utopia-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwmslide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-uwthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vancouver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variablelm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-variations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varisize</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varsfromjobname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-varwidth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vaucanson-g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vdmlisting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-velthuis-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venndiagram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-venturisadf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbasef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbatimcopy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbdef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verbments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-verse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-versonotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vertbars</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vgrid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vhistory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualfaq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualpstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-visualtikz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vmargin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vntex-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vocaltract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-volumes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-voss-mathcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-vwcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wadalab-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wallpaper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warning</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-warpcol</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-was</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasy2-ps-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wasysym</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-webguide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-widetable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-williams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-withargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wnri-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordcount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wordlike</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wrapfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsemclassic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wsuipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-wtref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xargs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xassoccnt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcharter-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcjk2uni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcntperchap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-material</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcolor-solarized</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcomment</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xcookybooky</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xduthesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xdvi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xebaposter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xecyr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xeindex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xellipsis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xepersian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xesearch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xespotcolor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-devanagari</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-itrans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex-tibetan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexfontinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetexref</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xevlna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xfor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xhfill</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xifthen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xii</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xits-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xkeyval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xlop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xltxtra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltexconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmpincl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xnewcommand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xoptarg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpeek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpiano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpicture</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xprintlen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xpunctuate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsavebox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xskak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xunicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xwatermark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xyling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xymtex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xypic-tut-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xytree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yafoot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yagusylo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yaletter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yannisgr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yathesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ycbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ydoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yfonts-t1-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yhmath-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yinit-otf-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-york-thesis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-youngtab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-yplan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ytableau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfchan-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zapfding-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zed-csp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhmetrics-uptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhnumber</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zhspacing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ziffer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zlmtt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwgetfdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zwpagelayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafbfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjafont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-zxjatype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wavpack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfcgi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-development-tools-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-compress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-pdfbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blktrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build-mkbaselibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clippy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-analysis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-std-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rustfmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc7-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc9-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dom4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdbserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gradle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-18-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-databind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jcl-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jul-to-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j-over-slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slf4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_gui2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_import1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_mmv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_trace2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp_web1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-pmda-perfevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-system-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4j12-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Archive-Extract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-ExtUtils-MakeMaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Load-Conditional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DNS-LDNS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Mail-SpamAssassin-Plugin-iXhash2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Net-Libproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-solv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmunge2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>munge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-hpc-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm35</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_5-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-numpy_1_16_5-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_17_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-numpy_1_17_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-legacy-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libncurses5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-1_0_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-public-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-azure-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-pubcloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-sap-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-server-applications-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_apparmor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_openidc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot23-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-thunderx-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-20_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuplot-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-vnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgvncpulse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GVncPulse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GtkVnc-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool-bmc-snmp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libct4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfpm_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libospfapiclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquagga_pb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzebra1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-bedata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu60_2-ledata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadb_plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libosinfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Libosinfo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librelp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsaml9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensaml-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp-lite7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libshibsp7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shibboleth-sp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirglrenderer0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virglrenderer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-admin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmltooling7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xmltooling-schemas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nginx-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ovmf-x86_64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-uefi-aarch64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql10-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rarpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rmt-server-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skopeo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-xendomains-wait-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-web-scripting-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs10-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs12-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs8-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-dri-nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_nouveau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-we-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-applet-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-connection-editor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gstreamer-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enigmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-pst-import</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-plugin-text-highlight</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_4-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gegl-0_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-photos-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-search-provider-gnome-photos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libical-glib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ICal-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ICalGLib-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libntfs-3g87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfs-3g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopencv3_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opencv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler73</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpskc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-plugin-sametime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstaroffice-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_10-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-plugin-otr-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Twig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gettext-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcm43xx-firmware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbind9-1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns1605</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libirs1601</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisc1606</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccc1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libisccfg1600</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libns1604</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-shadow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-pp-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhunspell-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libclamav9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreshclam2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gssproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fwupdate-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfwup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-engine-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tpm2-tss-engine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsiuio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopeniscsiusr0_2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipvsadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fribidi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>u2f-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Convert-ASN1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsbc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cryptctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arpwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpspell15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp5_6_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Svg5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kmod-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkmod2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Bootloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireguard-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotli-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlicommon1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlidec1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbrotlienc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib-networking-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmp10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libp11-kit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-nss-trust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osasnmpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-hmcdrvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>s390-tools-zdsfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cni-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conmon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-overlayfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>umoci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-bibtexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-binextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontsrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-fontutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-formatsextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-humanities</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langarabic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langchinese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langcyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langczechslovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langenglish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langeuropean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langfrench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgerman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langgreek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langitalian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langjapanese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langkorean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langother</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langpolish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langportuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-langspanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexextra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-latexrecommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-luatex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-mathscience</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-music</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pictures</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-plaingeneric</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-pstricks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-publishers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-collection-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-extratools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-gust</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-infraonly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-medium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-minimal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-scheme-tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpipewire-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-plugins-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-spa-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pipewire-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ftdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libostree-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-OSTree-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-desktop-portal-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfribidi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk-module-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk2-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-gtk3-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caribou-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcaribou0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Caribou-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaom0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspectre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrilo-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlnet-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgrlpls-0_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Grl-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlNet-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GrlPls-0_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtsvg-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-autoar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnome-autoar-gtk-0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoar-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GnomeAutoarGtk-0_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.14-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysuser-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-nvptx-newlib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-go-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc10-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nvptx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groovy-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-http</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-io</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-servlet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jetty-util-ajax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bcc-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbcc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-bcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snakeyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.15-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.16-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jdom2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Bootloader-YAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.17-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmpxx4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmlint-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velocity</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_slurm2_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpmi0_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libslurm36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-auth-none</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-config-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-munge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-node</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-pam_slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-slurmdbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-sview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-torque</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slurm_20_11-webdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mpich-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-mvapich2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi2-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netcdf_4_7_3-gnu-openmpi3-hpc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-livepatch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-live-patching-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpx-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-packagehub-subpackages-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsybdb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nping</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-opencv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ecdsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-waitress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Pygments</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>djvulibre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgupnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUPnP-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice57</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenvswitch-2_13-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-boto3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-botocore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-11-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-ovs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql12-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspeex1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p11-kit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-compute-engine-oslogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-aiohttp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-aws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-azurerm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-external</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-google</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-kubernetes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-local</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-null</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-random</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terraform-provider-tls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-ndb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-python2-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipaddress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-targetcli-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rtslib-fb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cryptography</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-py</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-distro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-asn1crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-cffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-pycparser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Babel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-bottle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-rt-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE_RT-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-virt-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sca-patterns-sle11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libibdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibsim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linuxptp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libovn-20_03-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-pki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ovn-vtep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcmu2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcmu-runner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-transactional-server-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pecl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-ha-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-puma</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-actionpack-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activesupport-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crmsh-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>csync2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-nokogiri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.5-rubygem-activerecord-5_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE_HPC-ESPOS-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzma5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xz-static-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jsr-305</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput-udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libinput10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mellon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-annotations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jackson-dataformat-cbor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python2-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>linux-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SLE_HPC-LTSS-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netty3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>blas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lapack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblas3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapack3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblapacke3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-ltss-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libEMF1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-preempt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grilo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-ews-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserverui-1_2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Camel-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ECal-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServerUI-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>caasp-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o-1.18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cri-o-1.18-kubeadm-criconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etcdctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-1.18-kubeadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubernetes-1.18-kubelet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patterns-caasp-Management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skuba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>skuba-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>velero</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>release-notes-caasp</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.3.4-45.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.3.4-45.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-45.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">15.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">7</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009074900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">4.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.43-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-10.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-2.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.18-2.138</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.37-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-11.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.11.2-12.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.48-11.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.0+20200117-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.0-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.2.18+g1dbcddb5d8-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.3-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-1.108</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.29-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-4.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.1+git1296-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.6-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.25.0-1.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.66.0-2.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.108-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.78-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:049.1+suse.144.ge0eaf296-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43.8-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:111-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.168-4.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.3-3.3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.6-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-3.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.32-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-4.24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.37-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.0-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.46.4-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.52-3.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.4-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.2-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.62.5-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.7-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-4.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.3-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.3-3.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.04-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.32+67-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0+git.e66999f-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.12-1.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.18+git20200204.7ccea28-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20161105-6.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.7.0-3.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20200107-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:530-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.12.7-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.9-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-3.3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20200306-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.13-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.5+git.161.74bc5e6ec8e-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.8-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.47.1-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-2.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-15.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-9.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-1.406</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.4-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-1.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.57-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.100-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.25.10-1.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-3.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1-5.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.80.1-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.20-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.0-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.6-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1d-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1d-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.13-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.44.7+11-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.41-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.31-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.24-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.57-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.34-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.116-1.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.79.0-1.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.15-7.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-4.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.8-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-2.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.68.3-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37-1.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.28.0-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.7-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:234-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.27-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.4-4.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.0-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.1.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-3.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.19.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-3.8.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.7-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.23.6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.69-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.17-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.0-4.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.23-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.70-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19.0-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1p1-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-5.3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-1.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.02-12.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.13-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.60-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.046-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.72-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.06-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0132-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20181224-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.12-8.13.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7.1-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18.3.0-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.2-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.14-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17.3-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.1-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3000-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.52-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.24-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.1-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39.0-2.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.21~rc-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6-3.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.15.2-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15+git47-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3.2-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.2-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.6-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.9-5.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.2-3.21.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.30-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20170711_1.9.8-13.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-1.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2020.01-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20200602-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-4.8.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-2.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3+git20180125-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.63-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-9.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3+20190413-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13.1_02-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6.1-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.3-20.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.37-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-1.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.12-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.11-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.36-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-5.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.03.5_ce-6.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2877_3eb39382bfa6-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0rc8+gitr3917_3e425f80a8c9-6.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc10-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:68.8.0-3.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.55-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2-1.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.32.5-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20200314-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.1-6.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.4-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.4+4-1.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.2-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.2-4.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-4.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-9.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.0-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-6.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-1.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.27-9.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.0-4.3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0+git20180427.26373b3-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.3-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.4-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0beta2-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30357-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27321-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12688-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn28038-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44143-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn3006-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29036-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43843-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18790-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42679-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16219-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17794-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15543-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25623-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38300-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37223-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34112-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30408-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43866-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33902-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24061-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23866-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29741-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17399-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37645-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24759-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29031-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8329-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44515-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40273-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40987-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21000-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29050-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18336-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25860-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14752-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14758-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25997-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13663-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34971-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37813-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32101-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14050-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30983-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42296-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn42300-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16420-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25012-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32150-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10937-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn27025-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31696-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26126-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15093-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41465-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29005-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32346-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29053-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34647-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44549-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43292-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37750-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38769-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23500-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23661-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23406-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14428-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn8457-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33688-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn18674-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn30534-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37026-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn10843-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37537-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn14387-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn17868-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn41779-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn40690-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25962-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn16181-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn39165-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29348-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13364-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn22859-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32405-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn7838-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29333-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44206-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29335-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34996-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn31638-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn32919-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn29688-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn38710-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21215-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43957-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn37771-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn13013-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn21802-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn15506-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn12782-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn33155-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn24062-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn43596-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6898-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn25648-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn26326-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn23262-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn6897-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn44361-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.20170520.svn34398-19.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-3.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.19-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.24-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-3.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4+git20180804.fff99cd-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.150000-1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.012.2-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.13-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-6.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11+git.20130926-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27-4.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19.0-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41578-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.000.955svn37556-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.28svn34303-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.15svn27540-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.21svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8bsvn38238-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7esvn25918-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3asvn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.36svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17022-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn19603-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.22bsvn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29725-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20943-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn17020-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.0svn39929-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn41157-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.6svn39913-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1._svn27880-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.0svn44380-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32089-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.25svn18835-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.10isvn44425-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn44367-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7asvn43186-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.41svn36582-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn20498-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn43751-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43768-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn41972-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn37805-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.42svn26048-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.001_b_2svn20019-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.001svn19766-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29349-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28936-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26555-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44085-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17683-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39438-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20538-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28574-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn35900-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6bsvn17156-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34016-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn26055-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5isvn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42077-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38055-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn38805-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42428-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.000svn44497-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1svn42221-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn35065-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7csvn23385-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3.2svn36030-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.109svn44303-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29630-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36804-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn29208-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn28980-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn21855-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43813-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22930-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn30646-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn44166-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44410-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn17049-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn33441-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn35032-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.001.003svn24266-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn21933-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.08svn18651-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26053-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17050-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn32662-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn44282-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn42428-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn44477-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23350-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.03svn31264-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42045-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn39710-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn42428-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40322-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.02svn19306-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28400-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.5svn44478-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25095-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37709-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.4svn44241-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.17svn25711-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn38299-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30042-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29762-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn44484-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38005-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn15878-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42880-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0_beta3svn33894-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42675-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.04svn18125-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn31576-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.march_2017svn43509-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn38741-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.73svn40847-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0asvn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn40201-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3svn29129-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20536-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn29989-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn41158-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn32320-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn25243-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20431-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.8svn38497-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.20svn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1csvn17512-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.41svn43843-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn33490-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.9svn42099-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41506-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn18948-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0svn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5svn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41853-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.9svn24863-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn26313-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.6svn23723-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3svn43195-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3asvn15878-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn43337-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn19717-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3.11svn36084-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn32377-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44166-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn31835-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn35373-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.1svn44131-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1.0bsvn44396-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn21271-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.10svn44427-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0csvn30254-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0asvn44197-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0fsvn30256-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3hsvn40636-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn38174-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0hsvn30257-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2gsvn31902-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2psvn30259-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3lsvn35198-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.1asvn30261-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3rsvn30262-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.8isvn30263-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.3qsvn44495-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4tsvn30265-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1asvn38064-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3qsvn30267-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.3asvn44270-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3svn39861-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.4.3csvn30270-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn33527-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.9svn42424-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.9gsvn42010-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3hsvn30273-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5csvn41435-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2bsvn39387-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0msvn43235-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.6svn30276-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0hsvn30277-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3nsvn36645-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn43145-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn30279-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.5svn38173-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0asvn34377-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn39587-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0msvn43234-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.0isvn30281-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.2svn39608-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0svn30282-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2lsvn30283-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2qsvn30284-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2lsvn30285-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30286-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3isvn42885-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0csvn30288-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0gsvn30289-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0dsvn30290-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn30348-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.1asvn30292-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2isvn30351-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.lower_sorbian_1.0g._upper_1.0ksvn30294-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.3svn37629-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.5.0psvn39920-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.3dsvn30296-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.0.0svn30564-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.3bsvn33284-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4svn44550-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.4svn39246-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1asvn38372-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.31svn25245-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.1svn42428-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn28513-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.2.2svn42106-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.3.02svn34393-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.5.1svn41919-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.2.0svn43500-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.9.2svn38857-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.4asvn22013-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn38479-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.svn20619-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.0.0.93svn25597-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.1svn35460-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.016svn19490-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.072svn43461-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.043svn43484-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.135.1.20svn32924-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn26477-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17186-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17224-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17187-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33143-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.3svn43928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn39364-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.41svn43073-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02bsvn38159-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn39180-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn27539-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn23427-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn40105-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4.1svn35101-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn37009-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23510-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44568-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42161-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn39048-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41404-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43031-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39100-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29937-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21977-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn20765-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44569-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36294-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20987-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20031-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn32215-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38708-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42038-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37880-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25507-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.11svn44205-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn27401-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn39041-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn40096-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43910-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.02svn39928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn31607-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7svn42680-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1svn43510-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6.0svn43043-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.7.4svn42893-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44522-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43468-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.1asvn40323-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3.0svn43619-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn26556-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.7svn43371-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43650-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1ssvn43116-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0rc4svn44156-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn43723-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn42649-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6csvn43082-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0gsvn43555-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn44172-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn19787-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn43620-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41634-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn44066-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1gsvn29252-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43032-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn32180-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12.2svn43108-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn42445-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.1svn43049-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn37081-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24097-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3bsvn43382-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24011-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41596-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.0svn43621-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn44385-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.5svn43860-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn41922-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn43765-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7.0svn42390-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.1svn42972-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1gsvn42147-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn43738-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.1svn41675-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn43330-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2asvn32750-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41656-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.0svn42120-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn42162-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3.1svn35497-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn21923-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25526-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25527-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22054-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39785-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17116-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99dsvn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.71svn29725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn43549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29743-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.30.7svn44546-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn35154-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34631-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn37795-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34632-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn35267-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34633-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38248-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn41777-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn43960-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42217-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn25779-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39073-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn25039-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.07svn36406-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38388-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22490-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn35014-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn38638-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn20047-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37657-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32235-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn17076-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21670-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn36605-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn43861-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn37536-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23609-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31835-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.618033svn40846-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.61803svn21907-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn21948-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.14svn17830-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02dsvn43344-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn17062-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21047-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16989-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn17087-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36477-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn28031-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.06svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39701-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23790-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20655-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17127-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn32047-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21014-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.40svn29901-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44371-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98esvn43071-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn35383-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28363-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn35041-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25185-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27488-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44481-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44514-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn42292-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41813-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn43219-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30559-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn40213-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn43369-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn44554-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5bsvn43741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn44173-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn44195-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn44174-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43201-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn38736-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18337-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43687-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34991-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.90svn27725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35973-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn33041-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.001.000svn24302-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43515-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17125-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.2svn43003-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20.17asvn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn32508-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24523-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn27066-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17353-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41409-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39000-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18258-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35002-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.2svn25144-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn17123-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21476-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.2svn38859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.7hsvn35069-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16666-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31624-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39936-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2csvn23443-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17122-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn30020-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn34452-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17121-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.36svn36697-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39797-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.21svn31332-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn36728-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36195-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5csvn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16094-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.4svn41737-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17120-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0isvn28572-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38300-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn17146-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17119-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21632-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2esvn44513-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.15esvn43583-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42758-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.8svn44023-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn40522-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43747-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0msvn31096-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn20582-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn39317-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn33801-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38161-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn27118-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.4svn42341-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn44512-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40931-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27473-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7.6svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn20060-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn17157-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn37934-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26700-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9999svn28552-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1svn42751-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34408-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.3svn44488-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.5svn36428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37103-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn44454-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn43444-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8.4svn36951-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170505.0svn44207-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn40373-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8.4svn41119-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29018-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn38304-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.77svn33101-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.1svn38221-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34405-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0svn16549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.19svn32513-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28876-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41531-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34887-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28250-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.0svn19445-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn24378-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.8.1svn21107-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39273-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28910-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40785-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17964-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.01svn44283-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18787-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn39728-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32550-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn38138-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn34668-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37572-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.042svn43462-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn17630-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21126-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34481-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn21539-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4bsvn26557-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn35084-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18270-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn13293-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.0svn42228-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22155-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn31490-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.22svn21741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99fsvn18462-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn19361-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn27198-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44491-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn27536-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42851-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18259-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.11asvn38875-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn41927-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.76svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.12.3svn43001-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.25fsvn39903-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.5_r1svn29020-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17219-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17218-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18791-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn37868-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44436-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23167-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31026-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36188-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42327-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42328-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29905-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36948-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42326-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24582-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27472-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30380-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42329-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42330-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38202-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23171-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6csvn33092-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28434-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29229-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34438-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36189-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29801-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25411-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37413-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36190-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39308-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn18950-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn31745-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43558-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10asvn35923-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn42507-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35929-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.35svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29062-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn37928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24829-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.00svn41865-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23862-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn26042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00asvn27576-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35058-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24940-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn44501-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0esvn21209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn44476-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43525-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn43993-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn32657-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn16896-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn37019-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41553-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43277-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44321-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.2bsvn43469-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn23371-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43961-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41301-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn41986-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn41597-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn38672-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38514-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36304-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.1svn44129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.9svn43669-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn34453-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44489-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7csvn40725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24139-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn20745-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.60svn37839-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.53svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.33svn24729-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34577-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.64bsvn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn37658-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn37659-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.915svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35362-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn38599-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn23425-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn29579-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23373-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn42883-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.27svn41772-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn27974-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn18951-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.60svn36650-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn41686-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36682-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn38287-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36705-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn39991-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn40237-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43742-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36692-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43452-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36635-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn38093-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn37146-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36670-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn43743-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36625-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36699-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36700-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36661-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44562-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36636-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn28983-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41804-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0.0svn30206-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn26355-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23374-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn23487-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn43666-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.34svn31771-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23974-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn39589-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42415-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn42829-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn24035-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37656-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn42843-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn19387-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28946-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28501-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17192-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32925-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41554-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19441-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27918-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.32svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20520-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn43417-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn34295-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17337-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn17194-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24927-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34294-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn40723-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn25741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34474-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn34521-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn29752-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn26237-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17195-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.111svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.32svn38860-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30695-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn43060-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.7.0svn42608-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17196-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44269-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37498-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2esvn35866-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn44471-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28582-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.4svn38157-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn23912-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn39802-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn19232-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34724-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.07asvn44524-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn42661-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.07svn38419-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38375-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn18728-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23448-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29103-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36814-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn44515-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44224-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44167-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44167-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn13293-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.3svn40768-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.3svn38726-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn35193-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.0svn38742-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20851-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99svn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32677-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26424-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.0svn44543-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn32661-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38352-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn35662-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35701-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29466-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn44392-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25033-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn38172-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn41617-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39233-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39396-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32639-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn24928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn25231-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6bsvn21540-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.17svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn27599-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn35829-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1esvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33236-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02asvn20617-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39153-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42003-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn42578-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21758-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.005_bsvn19705-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn38114-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24.11svn38639-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41161-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39025-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn42712-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn22513-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn37063-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24504-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31903-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6dsvn39334-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn42023-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1svn41731-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23483-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18064-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28469-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34957-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34087-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5dsvn24962-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn43750-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1dsvn34486-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17197-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn16558-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn28571-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29802-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9asvn44024-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5.2svn24146-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn21472-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn33821-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn17210-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009112999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20513-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn41154-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7.4svn21461-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2014svn35575-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.3svn40917-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.61svn18703-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.26svn42905-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22931-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn32257-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn43278-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20678-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn20641-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn29419-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn43506-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.97svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn41774-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21385-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18115-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98svn29235-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0gsvn37925-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37236-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22426-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn17335-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn32098-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn36354-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37057-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn41784-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1415926svn20694-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08isvn42182-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn42855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn21906-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1hsvn19795-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1svn43735-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22191-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0bsvn25714-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43033-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34454-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4_subrfixsvn17265-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20202-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn35675-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn37279-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.4svn42755-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.101svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33398-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn16916-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5.1svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17262-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn35417-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1bsvn44499-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn27206-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21isvn43188-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41377-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn19859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn16243-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4asvn17263-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21328-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.00svn43470-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn43865-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn18304-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.9svn44479-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21912-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34684-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18018-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36263-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn41549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn27129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8svn18492-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37889-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29264-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn43464-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2msvn21340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn32796-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38074-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24500-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn38489-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn26722-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.8svn35346-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.6svn43630-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn24730-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43812-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn30962-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.3svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn17259-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30223-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38895-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.25svn37628-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42966-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.7svn44239-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33288-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.3svn28943-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19388-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21462-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn18784-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn24250-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42107-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29529-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5dsvn24280-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.81asvn28421-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn38674-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn24329-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn21719-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn42501-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn38139-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.46svn44472-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn38770-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38816-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn17131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1asvn21631-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn25832-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.4svn43413-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn30168-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20220-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17272-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1bsvn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn19667-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn25768-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn25584-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3dsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3svn36572-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn35291-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.01svn37298-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn25003-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn20710-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17382-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25607-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4esvn40535-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1bsvn43380-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20638-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn29173-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21326-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2015.2svn40403-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2016.1svn40404-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.6.3.2svn41412-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0dsvn33276-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23608-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn17859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.933svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43546-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38345-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43573-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43121-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.3svn41366-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6asvn43661-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6bsvn21399-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn17115-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.5bsvn23330-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20161201svn42621-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27034-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43424-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn25430-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn27819-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.4svn43129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42503-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2016.11_3svn43005-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn21480-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00svn32214-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29646-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.002svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18312-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.96svn26789-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn38922-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24559-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.000_2016_initial_releasesvn42157-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27417-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4asvn24054-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn17275-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29652-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn25434-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn34545-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24684-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26018-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26019-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26030-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn41984-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0.2svn21140-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24714-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37677-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn19886-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32934-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19216-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.20svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36464-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25112-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn43086-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27208-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn37378-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.6svn19716-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21882-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5esvn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42121-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn16189-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39365-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn41503-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23567-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9svn37156-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19469-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn28484-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31978-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31979-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8svn41714-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn19878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32068-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23835-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24980-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn41693-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34049-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn38913-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.betasvn38932-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39609-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.30svn44564-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35665-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35685-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44284-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42873-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn36064-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41545-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.993svn21292-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21691-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.996svn24287-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98svn24288-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.73svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.2svn41904-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28628-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn40936-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43726-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2isvn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38263-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44211-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn21387-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38832-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.5svn22509-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.3svn41905-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35075-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43813-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41448-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43025-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44567-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn32630-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94svn31517-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43561-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13.2svn39606-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn40613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28327-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39419-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0.2svn44502-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn17354-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.0svn32981-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn34439-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.4svn36244-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.19.2svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn38503-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32484-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43279-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn32258-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn41880-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9.2svn27458-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.97svn43254-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27671-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.10asvn44043-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6.0svn43962-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn43280-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20120101svn25019-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20120102svn25020-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17356-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn21396-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26543-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21327-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32003-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn23818-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42054-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36348-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn41359-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn35722-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn35723-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.0svn35720-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16135-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn43507-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3asvn34733-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.61svn24981-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42635-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0betasvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn30002-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44158-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn44474-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27036-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn41378-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn30530-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0fsvn22255-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.23svn18020-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42547-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43732-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn16136-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.02svn34364-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2dsvn17357-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0bsvn17358-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.85asvn43547-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn43316-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44401-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41189-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44419-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41113-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5svn40340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.8gsvn40340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn44401-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0asvn41113-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn40340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn40340-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37354-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2csvn38115-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4dsvn25821-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn17359-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn41332-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24853-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn38823-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn43610-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.47svn20727-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn19363-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23379-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn40726-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn21156-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44194-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24868-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29654-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn25819-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn19685-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn30958-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44551-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17347-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0jsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3esvn42287-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38547-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35573-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35576-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn36448-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn17361-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn17667-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn36500-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.112svn42871-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1betasvn24099-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.1svn38931-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22018-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn28019-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn34299-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn36312-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn21474-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn27232-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn34840-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5th_editionsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39397-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.3svn33457-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn42403-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.2svn42604-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.28svn16613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn39520-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6.1svn27654-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17362-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn23711-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25742-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.50svn37552-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.995bsvn19611-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16364-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.95svn40523-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.13svn41718-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.12svn20408-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7b6svn42950-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.18svn43395-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24858-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44563-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn43458-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22719-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn17346-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16211-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43403-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43476-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn37553-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.7svn28286-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.52svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn24638-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn27994-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21338-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn36989-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24498-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1415svn18042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.15svn44306-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5bsvn28195-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn17992-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn23698-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41414-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21606-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18488-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn19595-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17205-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn44565-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32899-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35820-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38627-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn25025-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.23svn44226-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34243-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26137-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.1svn43902-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.8svn43130-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.1asvn38630-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.2svn38558-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.0svn38727-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44223-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.31svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn24825-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.2svn39080-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.05.34svn27369-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.995bsvn19612-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.50svn19601-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn39597-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8.5.7svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn31315-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn25218-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44483-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33454-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44394-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28669-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31402-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27764-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44096-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23806-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2msvn36680-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170101_pl1svn43813-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25831-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40098-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40612-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn25505-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28888-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn30983-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn29235-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.3svn42914-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.20svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.62svn42296-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2svn36671-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn16979-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn40613-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn41844-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn29349-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn38709-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn42541-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn37356-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.25svn43855-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn42300-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.10svn35999-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.10svn36000-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn42409-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn44566-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.13svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn35702-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.00svn36866-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn40274-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn39026-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn34481-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2.0svn41892-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.22svn26760-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn29349-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn41920-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.1svn44492-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.52csvn43099-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2.1svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn41873-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.2svn24986-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn19087-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.6dsvn42428-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn17691-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn16549-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn44166-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn31474-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.3svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.5asvn43034-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1bsvn43523-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn23916-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.19.4svn41811-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1svn34902-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0asvn30867-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.353svn35145-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.9svn38268-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21750-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0csvn17364-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.1asvn36026-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21818-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.5gsvn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31795-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.0svn23638-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.3.0svn43603-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.00svn39746-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.6.4svn44409-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0.4svn44542-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn27789-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn19880-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31741-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn39375-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn31929-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.007svn19409-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2.3svn33164-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.1svn41390-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.9svn21523-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.41svn21442-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn42268-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.3svn30815-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.1svn41304-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.27svn44131-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn34800-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.0svn38722-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.2svn29349-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.2svn17373-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.6svn37534-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.67svn29349-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.03svn34893-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn42530-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn16134-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn22722-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.1svn20021-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.004svn28119-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.959svn36915-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn25552-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn44368-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn32617-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn20422-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn21934-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn24499-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn33254-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.2.5svn34491-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.6svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn19640-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.07svn41438-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn43159-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn39028-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn34302-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.2svn27889-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn30704-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.svn36918-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.8svn20843-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.9svn31077-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.0.0.7svn21322-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.0svn39804-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.10svn43606-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.4.27svn29803-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.1.3svn15878-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.0.5svn37892-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.05svn39323-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.5.01fr_0svn23332-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.137.3.0bsvn42434-7.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36207-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.17svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.26svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.01svn31296-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.01.0svn22569-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18906-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.20svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn35050-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.00svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn26196-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41550-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.8svn42874-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34923-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.74dsvn17533-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn43746-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2dsvn21869-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn38663-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37006-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.3csvn28332-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21927-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn21586-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.1asvn24897-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.0svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn40229-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn41387-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn31783-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30790-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn25193-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42670-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1bsvn25882-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.973svn20491-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn35490-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30473-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30474-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn40621-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5svn43153-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.51svn43814-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.12.1svn44496-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.8_fix_2svn43194-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn44500-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37877-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn41456-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn38550-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170505.0svn44217-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn44141-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn20747-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn39019-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn32741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.32svn44552-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn32354-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21086-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.62asvn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn23236-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31498-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24694-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn44079-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn41012-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1esvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94bsvn38769-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.6svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn28973-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6.1svn41598-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35799-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn36110-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31598-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn43979-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5.3svn44237-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2asvn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn29845-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn35773-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.43svn36270-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20062-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn43332-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3rsvn42447-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1fsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.31svn31639-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn34301-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn39864-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.003svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn37763-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn42773-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn31957-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.19svn44504-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn34323-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn17582-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2svn31813-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn44171-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.23svn44468-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn18173-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn31648-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.2svn39515-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9bsvn31075-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn20298-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28399-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.79svn44045-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38828-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn31878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34157-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.7fsvn41203-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn30452-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42767-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.994svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41823-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34315-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7182818svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn18611-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.93svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.56svn37105-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.5svn19692-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn17485-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18489-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn40099-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn40855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5asvn33802-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn41785-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.002svn36898-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43947-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19410-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn28444-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn17745-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn41676-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44451-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn38224-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39837-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6asvn41127-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn24549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn17484-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18789-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41610-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn30914-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43752-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.96svn32559-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17483-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.61svn37852-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32165-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4.1svn42418-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32069-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8fsvn42186-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn42810-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn29725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn33700-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20885-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn39057-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn35521-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn37579-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.0svn37992-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn38254-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2gsvn38448-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44142-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28140-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.ivu.04.092svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn43347-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn39367-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn24479-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn37927-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.83svn38815-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn17513-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3asvn22126-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43945-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26473-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn39729-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.20svn23252-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn29776-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.004svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.11svn43670-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41282-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.17.06svn44453-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.40svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17514-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6bsvn41345-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1+svn17967-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43445-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21775-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn38035-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn30939-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn40637-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.42svn18302-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26544-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn38416-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn42588-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.2svn21649-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24svn43375-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37762-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40307-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1dsvn24857-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23861-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn29370-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.75svn44352-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn26422-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43647-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3csvn30021-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.99bsvn28611-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.6svn26807-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4svn21392-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn41996-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn24741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.2svn43586-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29558-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.19svn38100-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.8.31bsvn20668-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn32693-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21819-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41413-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41643-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40536-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3dsvn29601-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27323-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31500-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn39029-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn18704-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29331-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.9.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn44457-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.525svn44520-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41918-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.055svn44510-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28253-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn23996-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn26258-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43640-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn28527-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1csvn36086-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r0.67svn38914-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39460-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn39343-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16437-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.06svn44353-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn37984-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30140-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43011-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.2svn35709-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26786-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn16549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn17598-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn22114-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18128-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37675-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r11svn40125-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0ksvn31162-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.1svn41906-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42361-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42881-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn44529-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn24066-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn30991-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01asvn29027-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.33svn27609-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.203svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn22256-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01dsvn42307-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn33109-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn31729-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18130-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn27498-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43189-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98dsvn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43610-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19389-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn33355-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn28803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn28492-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.29svn44528-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25689-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20852-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20969-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn38449-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16991-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24876-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28668-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42872-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn17932-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn41735-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41526-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn33046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.20svn42927-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17474-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24706-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43091-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27331-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn44505-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2bsvn18131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn39030-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43599-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35095-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23714-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21833-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18360-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.94svn21095-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25192-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43431-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34409-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.53svn19712-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24947-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.002svn42617-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0isvn44487-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn16915-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2fsvn39164-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0lsvn34521-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn23667-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2bsvn19230-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.32svn38621-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7svn43021-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3svn41868-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn21475-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn19963-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn42036-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn32313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn32263-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn39542-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41379-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16490-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.05svn22045-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn16005-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21629-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1lsvn26112-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40986-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24807-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn24830-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn32809-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn17583-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37537-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41484-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7asvn18735-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.37svn29348-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.02svn29752-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.31svn43117-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn23492-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn37946-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5hsvn42973-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20373-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.86svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn31016-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.84svn44412-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.30svn40690-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31990-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42683-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn44175-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn38719-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9svn37297-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0001svn25915-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39165-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r36svn31934-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1asvn44231-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn31693-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn32269-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42986-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.1.1svn33307-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn33045-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn31037-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.1svn26093-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn35152-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1asvn34573-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn39988-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.15svn44469-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41857-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41858-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41860-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41869-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41870-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn41871-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn36396-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn41788-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn43482-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21871-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn43963-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn18739-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn28590-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21574-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn20374-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn39591-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21943-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24965-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.0svn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21894-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn24769-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24731-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.618svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn26032-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn29725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5.0svn35711-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7.4svn43374-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.09svn36012-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn33526-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn19848-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.141592653svn43076-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28424-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn27765-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44208-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42918-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34236-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.3svn30353-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5csvn31088-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.76svn43869-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn39249-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16287-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.72svn40613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0.1svn39921-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn44213-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.101svn20075-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.42.4svn40138-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.18svn42664-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8.2svn31235-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21641-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn18305-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5asvn38984-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4nsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2011svn30447-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009113500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn25953-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43949-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35147-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.11.90svn44227-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn41985-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn19847-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn29371-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21893-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn20886-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.3.14svn44214-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn19519-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0b_4svn33822-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn43370-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn43184-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40538-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn33033-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41633-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn25562-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23552-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.17svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.04svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn26243-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.35svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16416-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.9.2asvn33946-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.10svn17257-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn43703-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn19591-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn41980-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn22138-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn18734-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16asvn43996-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn41981-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.62svn40685-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.47svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn41223-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn41901-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.07svn37377-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.98_betasvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn17556-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.03svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.14svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.56svn43911-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.2svn19296-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.05svn35248-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn28155-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn16958-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.04svn17909-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.85svn43912-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.22asvn35832-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.34svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.02svn21717-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn33210-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn20946-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn16033-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.04svn39077-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.95svn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn18922-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.63svn34786-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn32997-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.39svn43015-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7svn35418-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.2svn35673-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn41999-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.82svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.07svn40873-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn44047-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn39585-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn16538-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.79svn44511-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.63svn35062-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn25142-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn23464-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn42840-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn21667-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn24391-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn24995-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.32asvn43401-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn44507-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn35026-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.13svn38613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16369-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.06svn44320-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.13svn43272-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn23451-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.83svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn28801-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44466-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25228-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.24svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.16svn35247-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5csvn34015-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.68svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.73asvn44506-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.83svn44281-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn34363-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42857-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43899-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170114.0svn44206-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42950-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.20170604.0svn44470-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn30171-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn19440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27388-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27389-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.003svn24649-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44482-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44459-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn27780-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21838-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn40612-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn30212-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn44225-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43009-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn23682-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn34996-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn27064-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43191-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.15svn41746-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.5.3svn42816-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.51svn36065-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31763-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42183-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn28046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1csvn32818-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.252svn43360-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3isvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn42629-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn44429-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn41727-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn38418-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1asvn21939-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.11svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42467-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn23581-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3dsvn39706-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27225-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn37026-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19980-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9.1svn29128-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2csvn40612-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0esvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn20318-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn19979-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2bsvn41204-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn21127-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0hsvn25050-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.22.0svn44545-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22050-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1svn30707-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn34924-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01svn24305-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.17.05svn44298-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn33442-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.31svn43631-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn38427-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24976-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.11svn43505-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1rsvn19652-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16488-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn31137-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19082-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.3svn40415-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.92svn20002-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn38386-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0fsvn25005-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36236-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.008_v7_scsvn19537-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20087-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40843-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn18292-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn18740-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn29675-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn39796-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43624-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27322-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1fsvn41923-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.02svn37965-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30084-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20003-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.0svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn21081-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn32392-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44485-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23739-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn19614-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.36svn33945-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7asvn32815-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn41365-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn42925-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35737-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17997-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30187-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43252-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8svn39014-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.93svn33120-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn13293-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn31565-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn40525-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn42809-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05asvn42633-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn39510-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn37277-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4svn35730-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn39318-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.18svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn35087-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn44490-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn27223-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37893-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27810-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1dsvn39734-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43017-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2.1svn41401-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20208-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20180-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn37749-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43595-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20185-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.302svn38721-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42374-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.62svn34011-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn37568-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3csvn41732-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn20186-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23799-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23446-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23734-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39096-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn36613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn44157-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn40613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.6.7asvn24881-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.2svn33042-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.1svn40088-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn41653-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn20209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.15svn30959-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1svn22212-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20319-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20312-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn26522-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn30708-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1bsvn41991-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn28918-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3osvn42677-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5csvn39787-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn41322-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn20336-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6fsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn40658-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn39707-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5bsvn27028-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43057-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43058-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn29260-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6asvn35537-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.0svn39074-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20620-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.01bsvn31719-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn22136-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7gsvn44428-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2svn32758-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20031-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.52svn22781-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn43170-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn24652-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn30560-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4bsvn42902-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12gsvn42903-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn25608-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.11svn25007-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn20333-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3bsvn42781-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn20311-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn39592-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.14svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn30355-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.5svn18136-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn44553-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn27128-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn16215-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42992-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn40597-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.6svn42852-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn40598-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42225-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1asvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7svn42821-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39794-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.41svn30715-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn34374-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.25svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.17svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2csvn39766-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn22408-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4csvn35531-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn39529-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23454-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn38710-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.01svn31585-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32293-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.01svn43221-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn44100-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn37875-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn42765-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn19982-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.04svn35718-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn20306-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn23961-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn20334-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.11asvn36696-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn40320-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.2svn36914-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22027-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn24895-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.0.2svn24431-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn36203-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.141svn25916-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn43684-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn19440-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn43516-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn29743-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0bsvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1csvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20308-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1.5svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn26645-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.14svn29349-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2asvn40989-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.4svn32066-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn16117-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn16080-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0asvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.9svn40238-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn36422-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.1asvn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19440-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00bsvn44503-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn32199-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.43svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4dsvn26313-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1862svn18017-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7.4svn17554-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0asvn40371-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25446-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31835-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41190-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn44166-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn15878-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.2svn16252-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn32473-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn39024-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn25202-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn41849-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42413-4.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1csvn32804-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4asvn36489-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn34495-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.0esvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.07_gsvn31855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.5svn17255-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn29421-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.01svn42610-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3svn30710-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.8svn21534-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0asvn17885-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn21191-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.10svn34368-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.7svn28908-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn23761-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn42138-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.42svn27345-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.77svn31731-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn20484-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.12svn41851-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.40svn22018-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.03svn44046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.5svn33043-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.06svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.05svn39596-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3.1svn34594-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.1svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.8svn22514-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn18923-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn37700-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.7svn38928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn42294-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.0svn44331-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.4.8svn40197-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.14159265svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn18314-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.004svn18651-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn41264-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn40533-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn16372-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn41403-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4.8svn44131-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn34177-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1esvn44103-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44379-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.04svn24237-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.0svn31323-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.7bsvn26420-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4svn29752-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.1svn29725-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44432-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn31894-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.32svn39660-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0asvn28553-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5.1svn43137-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44191-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44347-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44366-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44424-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44356-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44342-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44357-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44343-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44444-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44341-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44333-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn44462-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn26313-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.9svn35584-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.3.1svn19083-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.5svn44509-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.4svn43151-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.24svn24716-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.18svn39057-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5svn20591-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn30788-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.7svn44192-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.01svn20677-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.5svn23796-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.6svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.8svn41331-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn38809-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.02svn20770-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn44140-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.9bsvn44048-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn30640-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.1svn43745-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.2svn39669-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.66svn33624-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn28754-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn20675-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.svn17383-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.3svn34206-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn16549-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.3.16svn34621-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0qsvn33134-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.1svn16736-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.5.3.2svn43609-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.0.0.4dsvn42280-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.1.0svn36306-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.134.2.4svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25087-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn38295-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.9esvn35485-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42454-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35805-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.0svn39582-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4asvn44393-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.1svn32769-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.3svn43466-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn42039-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3svn43442-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn26108-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.7dsvn21013-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn28715-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn44475-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn36439-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn27723-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn43978-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn25777-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn32732-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2.6svn30637-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.02svn44350-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31491-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn42882-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn22005-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn38646-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn36170-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19457-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn43497-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.1svn18729-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.10.2svn40129-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1dsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16svn22961-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00csvn22891-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1csvn22959-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16csvn22830-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.16csvn22831-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn22832-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn22857-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0csvn22833-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.4svn39408-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3csvn22834-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn26096-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5ksvn20085-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.12svn42623-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3fsvn30209-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn33146-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.142svn17746-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0.5svn42423-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1.0svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.1svn32260-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19084-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.9.06svn42586-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn21178-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.00svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn42428-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn44455-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3.4svn43605-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24344-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0svn42198-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23804-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24345-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24754-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24196-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23840-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24010-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn23957-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25105-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn24228-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.6svn44381-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.91svn21751-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn28176-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43006-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3bsvn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn18732-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn18921-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23440-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn20680-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.05msvn44480-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5.2svn37649-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.18svn42465-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.23svn43560-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.9svn27253-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1.0svn36298-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43537-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn17748-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3asvn29803-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17024-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn21578-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn21839-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn43327-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn21820-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn40389-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn27046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17134-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.31svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0.7svn37623-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4.7svn44238-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.21svn24994-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.12.12svn29349-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.8svn42912-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn38459-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.5svn37776-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn40772-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.03svn38907-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2.1svn40854-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.2svn35853-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.2svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.6.0svn44308-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.5.0svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1.0svn36371-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn16791-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn44026-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2csvn39570-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.00svn29974-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.25svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn21081-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn26785-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn26313-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.4.4svn44456-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2016_6_8svn41348-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.20svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.11svn17476-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn19085-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.001.002svn18651-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn33625-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn43639-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42926-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.01svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.0.1_r1svn29019-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn18261-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0lsvn36681-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44467-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44465-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn31541-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn31409-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.01svn42482-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.5svn41521-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.8dsvn43068-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.92svn22357-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.9bsvn42428-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn33860-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn38506-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn29476-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.5.6svn25355-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn19700-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn32626-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn22511-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43366-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44210-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43453-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn42334-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.3svn26059-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.20svn42950-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn43900-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42853-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn43734-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn21608-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.4svn32528-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.7svn29803-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1svn21701-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0asvn25969-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.2svn32261-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.04svn42456-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn27744-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.1svn38269-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn27354-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.6.13svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn23431-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn34470-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1.1svn43686-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.3svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn32262-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn44154-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.92svn24104-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.4svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn29944-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.17svn44166-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn40058-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.005svn19444-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn21922-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.13svn33197-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.06svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn17177-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.2svn23670-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.4bsvn34017-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.0svn21920-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.55svn21921-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.3svn39084-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0bsvn20589-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn32457-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.6.1svn30080-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn38647-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn39799-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.64svn43239-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn44166-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.5svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.2svn30579-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1svn25629-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.1svn32954-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn26039-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.2.3svn21598-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2svn36254-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn42428-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.10svn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.01svn22028-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0csvn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn21439-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn35831-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn35830-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.4.5svn44166-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn25813-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.1svn16082-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.0.0.2.0svn42756-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.svn22459-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0bsvn22338-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.7svn41381-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.2bsvn15878-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.3.6svn22048-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.136.1.0.1svn31532-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn25469-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3.2svn42981-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn44127-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.08svn43465-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn23783-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn41121-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn44128-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.12svn41044-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn42289-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn41809-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn20031-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5svn36435-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.prot2.5svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.00svn39694-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.22.87.03svn44166-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.51svn42046-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.4.8svn44370-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn29660-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn20221-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn35756-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2svn42764-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.18.7svn44547-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn16041-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.0asvn40118-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41438-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.5svn34296-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.4.2svn35088-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17055-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.1svn28847-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41133-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.16svn43173-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn30636-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn43864-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.05svn15878-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.0svn43222-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn22575-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4.0svn38929-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn31683-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2ksvn42892-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.108svn32763-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.7asvn35741-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.26svn42899-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn39453-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8svn40855-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn35743-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27897-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn27442-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn37604-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.2asvn28770-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41940-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn35928-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn26641-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.4svn35211-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn43589-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.8asvn44430-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4svn35945-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.7csvn31900-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.3fsvn23347-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.981svn30466-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.5.2dsvn28090-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.5.06svn32182-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.8.9svn31859-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn19086-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn42830-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn22613-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.99psvn42671-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.03svn21183-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn43171-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6alphasvn26202-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn36013-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn31155-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40207-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.3.6svn23348-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.1svn17635-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn34398-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.3svn27430-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn17258-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.r206svn22207-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.0svn40728-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.4svn41123-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.svn41145-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.2.1svn32279-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.01svn34485-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.1.4dsvn28846-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.2svn28539-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.3svn37281-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2017.133.0.0.6svn28541-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.0-9.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009114928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-1.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.7-2.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.7-2.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-1.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-1.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0+git.20170126-3.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.64-1.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b6-10.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20200124.1-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.1-1.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.8-16.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.8_k5.3.18_22-16.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-10.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19.0.4-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.1-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1-1.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.14-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.2-1.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.30-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-11.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.8-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.4-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-3.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.02-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.05.0-13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.168.2-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.80-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.30-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.68-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.94-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.05-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.14-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20.02.3-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.5-1.164</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.5-3.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.242-3.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p13-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-3.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.18-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.38-8.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.4-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-5.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.45-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.0-2.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.19-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.25-2.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3.9~git0.3eb8617f6-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.43-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.2-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.11.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:19.11.1_k5.3.18_22-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.21-1.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.3.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:60.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.4.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.15-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14.2-1.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-4.5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.1-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:201911-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.12-8.13.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-2.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0+-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1+-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009065329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-9.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.41-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11-5.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-8.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-7.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-1.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.6-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.19.0-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.18.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.17.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.35-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:68.8.0-3.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-4.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.4-1.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~rc4-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.34-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.16-1.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.12-1.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.34.1-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-5.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-1.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-2.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.2.22-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.62.0-2.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.0-10.105</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.9-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.4.2-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.6-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-2.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.08-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-1.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.6a-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.6.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.53.1-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.70-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_04-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.11+git.180.2cf3b203f07-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.52-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1.9.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.73-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_06-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.52-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.28.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.10-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.8.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1.9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15+git47-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.13+git.189.e9bd318cd13-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200727-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20180314-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.30.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_08-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1.9.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-19.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-4.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.2-3.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2.9.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_10-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.37-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.202.344b137b75d-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1.9.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-11.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.01-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.01-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.7-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-4.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.1-4.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.3-3.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201027-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20201110-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8-3.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.642-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_02-3.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.5.667+g1a579d5bf2-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-8.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.11-3.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.0-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:40.5.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_04-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24-9.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2.9.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.0-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.3-3.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.8.80+g1f4b6229ca-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-3.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.25.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.25-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.25.5-3.25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.48-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.41-3.14.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.41-3.14.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2020.8-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.9.83+g4275378de0-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1.9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.2-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1.9.26.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.8.6-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.3-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.46.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.247.8c858f7ee14-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.11.83+g8a15f484c2-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.02-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.4-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1.9.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.29-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.78-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-5.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-5.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13-4.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.27-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.2.12.83+g528da226523-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.6.P1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3.9.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.5-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20210525-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:62.2.0-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181224-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181224-23.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:330-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.5-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.2-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1a15-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.22-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.36.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1.9.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3.9.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.6-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1.9.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.1+20200724-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.60.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.24.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.9-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-3.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.5.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.17-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.10-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.44-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.6-150.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.4-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.7-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.14-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2.9.38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.66.0-4.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:234-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-22.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-22.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.1-22.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2.9.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.931-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.3.26-20.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.10.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20200827-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.45-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.2-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2.9.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.17-7.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.308.666c63d4eea-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1.9.42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-8.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-4.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.1-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:84.87+git20180409.04c9dae-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1.9.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.1-3.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.10-3.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.1.2-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.4-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-3.91.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.15-3.91.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.22-20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-8.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.2-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.12-3.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.30.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6-8.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3000-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-3.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.04-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-12.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.46-9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1.9.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-7.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.0-9.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.40.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.8-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.12-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.13-3.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.13-5.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.11_ce-6.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.11_ce-6.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2902_153d0769a118-4.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-6.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.7-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.20-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.1-4.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.6-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-6.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.6_ce-6.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0~rc93-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.30.0-5.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-5.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.11-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.10.9_ce-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.9-5.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.15_ce-6.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:19.03.15_ce-6.43.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.0.1+gitr2908_55e924b8a842-4.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0rc10+gitr3981_dc9208a3303f-6.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41616-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44385-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44515-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42330-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43356-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn35830-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn37105-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44177-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42992-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42268-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44496-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42675-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43009-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44401-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn32550-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43650-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44414-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40375-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42045-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44192-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30372-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44554-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn42106-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44371-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn30962-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40587-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41614-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44544-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44500-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44396-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44297-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn40561-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44395-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44460-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44485-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn43059-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn25923-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn35799-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41515-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn13822-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn41825-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2017.135.svn44187-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-3.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.1-3.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.2-3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.0.2-3.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78-9.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.1.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-5.30.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.3.0-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-8.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.2+0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-3.12.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.1-8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.1-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.15-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-8.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.2-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0-5.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.14-5.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-8.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-8.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.28-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-8.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.21-12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-8.26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.27-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-8.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.2.0-8.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91-9.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|i586|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.3.0-152.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-152.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.1-8.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-8.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-8.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.0-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.26.1-7.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.169.1-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.14.02-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.69-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.43.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.7-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.9-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.2.1+git583-1.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.35-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.5-1.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.12-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.11.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0+r278197-4.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.21-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.35-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.05-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.15-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.16-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.28-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.17-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.42-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.12-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.4-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.5-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.13-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009145981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.13-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.14-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.7-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.6-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.6-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.14-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.5.1-3.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.21-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.15-1.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.7-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.43-3.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.8-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.18-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.9-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.2-1.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.37-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.10-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-13.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.2-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.10-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.4.38-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.6-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.02.7-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.11.7-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.3-3.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.252-3.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.10-3.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8p15-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.15-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.272-3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.275-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.20-3.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.292-3.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.302-3.55.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.312-3.58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.282-3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr6.25-3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009123618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-150200.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1-5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2-150200.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.36-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.8.0-3.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-5.15.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.31-6.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.9.0-3.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.9-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.11.0-3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.12.0-3.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.10.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13.0-3.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.2-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.5-3.15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20190801-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13.4-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.32.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009115736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.43.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.13.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.0-5.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.9-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.72.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-18.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1260.0-150000.5.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-3.9.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.18-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.6-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.10_k5.3.18_42-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8_k5.3.18_42-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.12-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_04-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_06-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.4-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.14-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_24.15-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.11.4_k5.3.18_24.15-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_08-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.3.124</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.1_10-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_02-3.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.5-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.15-8.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.17-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.17-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_04-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_06-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009116669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:60.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.2_08-3.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.7.0.2-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.13-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.1-5.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.23~git0.f53d0132b-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.1.1-9.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.14.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.57-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.15-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.17-8.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009117869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.7-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8+git65.g303b08c-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.20-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.20-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.11.3-17.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.21-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.21-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.24~git13.7b705e743-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.15-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_02-3.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.3_04-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.3-3.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.4-5.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.8-8.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.17-5.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.43-3.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.9-8.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.1-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.5-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.14-6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.22-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.22-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_02-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.19-8.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20.03.1-9.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.6-8.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.2-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.21-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.19~git0.bef0b5bed-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.57-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:201911-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-3.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21.0-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.21.0-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.18.4-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22.1-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.2-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.2-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.5-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.1-1.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.21-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-5.15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.17.5-5.15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.15.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.7-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-15.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.18.1-15.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.23.1-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.15.4-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.20.1-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.16.0-5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-4.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.21.0-4.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.24.0-1.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0+git.1602225426.5f84efb5-5.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4+20200616.2deceaa3a-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.4+20200616.2deceaa3a-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.13.0-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0+git.1461714863.10636a4-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.0+git.1611141202.2fe6369e-3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.1+20210702.4e0ee8fb-5.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.5-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1.4-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.0+20210305.9db5c9a8-5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0+git.1607075079.a25648d8-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0+git.1603969748.10468582-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009118750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.3+git.1614684118.af555ad9-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.3.11-150000.3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.319.91d693db37c-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150000.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.29~git18.3fcd3b1bd-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.30.0-150200.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1.150200.9.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.2-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.40.0-5.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_08-150200.3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_08-150200.3.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-150200.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-152.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1.9.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.17-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.0-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.0-150200.3.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.319.91d693db37c-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.319.91d693db37c-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1.9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_04-3.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.13.4_04-3.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20220207-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-152.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20200107-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.24-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.24-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1.9.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-152.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.36-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-3.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150000.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.9.2-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.18-150000.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.29~git18.3fcd3b1bd-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.19.0-150100.3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.30.0-150200.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1.150200.9.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-150000.3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20181225-23.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.9-150000.1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-150200.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0-150200.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-150100.6.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.0.2-150100.6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.62.6-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.0+-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1+-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8-11.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.0-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.6-150200.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34-150000.3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8-150100.3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.1-150000.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-150000.3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-150200.3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1.9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0.7.34-10.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.14-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-3.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-152.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.7-14.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.24-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1.9.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-152.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.14.0-3.74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.19-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.1-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-3.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.52-161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-150200.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.0-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-152.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1.9.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150000.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.29~git18.3fcd3b1bd-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.30.0-150200.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1.150200.9.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-152.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1.9.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1.9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-152.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.24-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1.9.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-152.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-3.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.23.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.12-1.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.5-1.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.5-150000.3.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.3-150000.5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.51-150200.3.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3002.2-150200.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-150000.3.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr7.0-3.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.3.29~git18.3fcd3b1bd-150200.3.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.8.0-150200.152.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.22-150000.5.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.68.3-150000.3.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.22-150200.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.30.0-150200.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.52-150200.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.3-150000.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.6-150000.3.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.15-150000.1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.8-150000.1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.112.1.150200.9.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.8-150200.11.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.0-150000.3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26.2-150000.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.15-150000.3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-150000.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-150000.3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.86-150100.7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.34.1-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.5.0-152.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.9-150100.5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.36.0-150200.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.12-150200.4.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.1-150200.15.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.16-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.8-10.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.3-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.116-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1.9.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.11.14+git.319.91d693db37c-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.102.1.9.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.1-3.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.0-13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.0-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.0.9-45.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.53.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.103.5-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:19.10.0-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.7.3-10.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.28-5.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:12.22.10-4.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.0-152.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.26-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.17.0-10.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.34.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.7-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.19.0-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.17.7-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.16.14-1.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.4.24-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.1568-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1.9.50.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.99.beta19.git20171003-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.9.2-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.6.1-152.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.7-3.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.1p1-5.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.7.0-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.26-13.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.12.7-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009157958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.5-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.4.6-3.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.2p-3.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.11-3.26.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.1d-11.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3-3.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.62-3.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.0.322-3.64.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009158426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.16.6-150000.12.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.0-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.9.0-3.85.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.1-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.10.0-3.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.08-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.9-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-15.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.11.0-3.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.4.5.2-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.2-15.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:68.12.0-3.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.15-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.6a-4.9.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.48-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.0-3.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.5-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.4.2-3.103.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.10-4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.5.0-3.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.13-4.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.9.1-8.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.6.1-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.0-8.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.10.2-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.67.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.11.0-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.2-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009146021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8a-4.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.12.0-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.7.0-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009147983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.13.0-8.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2021.8.22-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.8.2-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009154983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.8b-4.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.62.0-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009155956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.20.3-22.5.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:91.4.0-8.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.16-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.16-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009156355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.3.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:78.8.0-8.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009119928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.34.4-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-1.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.4-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.13-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.16.12-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.3-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.11-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009074991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">4.5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.5-1.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.18.20-4.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.20210907-3.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-3.15.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009149081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.15-3.15.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.13-3.15.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009143058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.1.13-3.15.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009159788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.17.0-150200.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.9-150000.4.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009160250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.15.0-150000.3.80.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
